Home
last modified time | relevance | path

Searched refs:bit (Results 1 – 25 of 48) sorted by relevance

12

/mbedtls-development/tests/suites/
A Dtest_suite_dhm.data4 Diffie-Hellman full exchange: 5-bit, x_size=3
7 Diffie-Hellman full exchange: 5-bit, x_size=2
12 Diffie-Hellman full exchange: 5-bit #1
15 Diffie-Hellman full exchange: 5-bit #2
18 Diffie-Hellman full exchange: 5-bit #3
21 Diffie-Hellman full exchange: 5-bit #4
24 Diffie-Hellman full exchange: 5-bit #5
34 Diffie-Hellman full exchange: 97-bit #1
37 Diffie-Hellman full exchange: 97-bit #2
40 Diffie-Hellman full exchange: 97-bit #3
[all …]
A Dtest_suite_pkparse.data33 Parse RSA Key #9 (2048-bit, DES Encrypted)
37 Parse RSA Key #10 (2048-bit, 3DES Encrypted)
41 Parse RSA Key #11 (2048-bit, AES-128 Encrypted)
45 Parse RSA Key #12 (2048-bit, AES-192 Encrypted)
49 Parse RSA Key #13 (2048-bit, AES-256 Encrypted)
53 Parse RSA Key #14 (4096-bit, DES Encrypted)
57 Parse RSA Key #15 (4096-bit, 3DES Encrypted)
61 Parse RSA Key #16 (4096-bit, AES-128 Encrypted)
65 Parse RSA Key #17 (4096-bit, AES-192 Encrypted)
69 Parse RSA Key #18 (4096-bit, AES-256 Encrypted)
[all …]
A Dtest_suite_psa_crypto_persistent_key.data74 import/export persistent key RSA public key: good, 1024-bit
78 import/export persistent key RSA keypair: good, 1024-bit
85 import/export persistent key RSA public key file not exist: 1024-bit
89 import/export persistent key RSA keypair file not exist: 1024-bit
100 import/export persistent key RSA public key with restart: good, 1024-bit
104 import/export persistent key RSA keypair with restart: good, 1024-bit
111 import/export persistent key RSA public key file not exist with restart: 1024-bit
115 import/export persistent key RSA keypair file not exist with restart: 1024-bit
A Dtest_suite_mpi.data1597 Test bit getting (Value bit 25)
1600 Test bit getting (Larger but same limb)
1603 Test bit getting (Larger and non-existing limb)
1606 Test bit getting in 0 (null)
1609 Test bit getting (Value bit 24)
1612 Test bit getting (Value bit 23)
1615 Test bit set (Change existing value with a 1)
1618 Test bit set (Change existing value with a 0)
1627 Test bit set (Add to 0 (null) with a 0)
1630 Test bit set (Add to 0 (null) with a 1)
[all …]
A Dtest_suite_ecp.data252 ECP read binary #8 (Curve25519, masked first bit)
369 ECP check privkey #9 (montgomery curve25519, bit 0 set)
401 ECP check privkey #17 (montgomery curve448, bit 0 set)
405 ECP check privkey #18 (montgomery curve448, bit 1 set)
477 ECP generate Montgomery key: Curve448, set high bit
508 ECP read key #5 (Curve25519, most significant bit set)
520 ECP read key #8 (Curve25519, bit 0 set)
524 ECP read key #9 (Curve25519, bit 1 set)
528 ECP read key #10 (Curve25519, bit 2 set)
552 ECP read key #16 (Curve448, bit 0 set)
[all …]
A Dtest_suite_aes.xts.data35 # 128-bit keys with 32 byte sector
47 # 128-bit keys with 512 byte sector
68 # 256-bit keys with 512 byte sector
86 # 128-bit keys with sector size not evenly divisible by 16 bytes
A Dtest_suite_psa_its.function19 16 + /*UID (64-bit number in hex)*/ \
20 16 + /*UID (64-bit number in hex)*/ \
27 /* Break up the UID into two 32-bit pieces so as not to rely on
A Dtest_suite_pkwrite.data33 Private key write check EC 256 bits (top bit set)
A Dtest_suite_pkcs1_v21.data807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
819 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
827 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
831 RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large)
835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
A Dtest_suite_mpi.function9 /* Check the validity of the sign bit in an MPI object. Reject representations
15 return( 0 ); // invalid sign bit, e.g. 0
81 * of unset bits after the most significant bit.
83 * Let n be the bit-size of b, i.e. the integer such that 2^n <= b < 2^{n+1}.
111 /* Shift the most significant bit of x to position 8 and mask it out */
1275 * value with bit b set has been generated. */
1346 /* Assert that each bit has been set in at least one result and
1351 * As an exception, the top bit may legitimately never be set
A Dtest_suite_cipher.chachapoly.data117 ChaCha20+Poly1305 RFC 7539 Test Vector #1 Unauthentic (1st bit flipped)
A Dtest_suite_rsa.data388 RSA Generate Key - 128bit key
397 RSA Generate Key - 1024 bit key
400 RSA Generate Key - 2048 bit key
403 RSA Generate Key - 1025 bit key
/mbedtls-development/docs/architecture/
A Dmbed-crypto-storage-specification.md49 All integers are encoded in little-endian order in 8-bit bytes.
70 Assumption: ITS provides a 32-bit file identifier namespace. The Crypto service can use arbitrary f…
114 …name is just the key identifier as defined in the PSA crypto specification. This is a 32-bit value.
127 Assumption: ITS provides a 64-bit file identifier namespace. The Crypto service can use arbitrary f…
137 Assumption: ITS provides a 64-bit file identifier namespace. The entity using the crypto library ca…
160 It would simplify things to always have a 32-bit owner, with a nonzero value, and thus reserve the …
181 All integers are encoded in little-endian order in 8-bit bytes.
210 Assumption: ITS provides a 64-bit file identifier namespace. The Crypto service can use arbitrary f…
220 Assumption: ITS provides a 64-bit file identifier namespace. The entity using the crypto library ca…
240 All integers are encoded in little-endian order in 8-bit bytes except where otherwise indicated.
[all …]
/mbedtls-development/scripts/
A Dgenerate_psa_constants.py307 return '\n'.join([self._make_bit_test('usage', bit)
308 for bit in sorted(self.key_usage_flags)])
/mbedtls-development/library/
A Dasn1write.c309 unsigned char bit; in mbedtls_asn1_write_named_bitstring() local
326 bit = cur_byte_shifted & 0x1; in mbedtls_asn1_write_named_bitstring()
329 if( bit != 0 ) in mbedtls_asn1_write_named_bitstring()
/mbedtls-development/tests/data_files/
A Ddh.998.pem1 DH Parameters: (998 bit)
A Ddh.999.pem1 DH Parameters: (999 bit)
A Dserver9-with-ca.crt32 RSA Public Key: (2048 bit)
33 Modulus (2048 bit):
A Dserver10_int3_int-ca2_ca.crt53 RSA Public Key: (2048 bit)
54 Modulus (2048 bit):
/mbedtls-development/tests/data_files/dir3/
A Dtest-ca.crt13 RSA Public Key: (2048 bit)
14 Modulus (2048 bit):
/mbedtls-development/tests/data_files/dir1/
A Dtest-ca.crt13 RSA Public Key: (2048 bit)
14 Modulus (2048 bit):
/mbedtls-development/tests/data_files/dir2/
A Dtest-ca.crt13 RSA Public Key: (2048 bit)
14 Modulus (2048 bit):
/mbedtls-development/3rdparty/everest/
A DREADME.md5 …n most systems. The main issue is that some platforms do not provide a 128-bit integer type and Kr…
/mbedtls-development/
A DMakefile97 CTR_DRBG_128_BIT_KEY_WARN_L2=**** Using 128-bit keys for CTR_DRBG limits the security of generated…
98 CTR_DRBG_128_BIT_KEY_WARN_L3=**** keys and operations that use random values generated to 128-bit
/mbedtls-development/programs/ssl/
A Dssl_context_info.c321 void print_if_bit( const char *str, int bit, int val ) in print_if_bit() argument
323 if( bit & val ) in print_if_bit()

Completed in 37 milliseconds

12