/mbedtls-development/tests/suites/ |
A D | test_suite_dhm.data | 4 Diffie-Hellman full exchange: 5-bit, x_size=3 7 Diffie-Hellman full exchange: 5-bit, x_size=2 12 Diffie-Hellman full exchange: 5-bit #1 15 Diffie-Hellman full exchange: 5-bit #2 18 Diffie-Hellman full exchange: 5-bit #3 21 Diffie-Hellman full exchange: 5-bit #4 24 Diffie-Hellman full exchange: 5-bit #5 34 Diffie-Hellman full exchange: 97-bit #1 37 Diffie-Hellman full exchange: 97-bit #2 40 Diffie-Hellman full exchange: 97-bit #3 [all …]
|
A D | test_suite_pkparse.data | 33 Parse RSA Key #9 (2048-bit, DES Encrypted) 37 Parse RSA Key #10 (2048-bit, 3DES Encrypted) 41 Parse RSA Key #11 (2048-bit, AES-128 Encrypted) 45 Parse RSA Key #12 (2048-bit, AES-192 Encrypted) 49 Parse RSA Key #13 (2048-bit, AES-256 Encrypted) 53 Parse RSA Key #14 (4096-bit, DES Encrypted) 57 Parse RSA Key #15 (4096-bit, 3DES Encrypted) 61 Parse RSA Key #16 (4096-bit, AES-128 Encrypted) 65 Parse RSA Key #17 (4096-bit, AES-192 Encrypted) 69 Parse RSA Key #18 (4096-bit, AES-256 Encrypted) [all …]
|
A D | test_suite_psa_crypto_persistent_key.data | 74 import/export persistent key RSA public key: good, 1024-bit 78 import/export persistent key RSA keypair: good, 1024-bit 85 import/export persistent key RSA public key file not exist: 1024-bit 89 import/export persistent key RSA keypair file not exist: 1024-bit 100 import/export persistent key RSA public key with restart: good, 1024-bit 104 import/export persistent key RSA keypair with restart: good, 1024-bit 111 import/export persistent key RSA public key file not exist with restart: 1024-bit 115 import/export persistent key RSA keypair file not exist with restart: 1024-bit
|
A D | test_suite_mpi.data | 1597 Test bit getting (Value bit 25) 1600 Test bit getting (Larger but same limb) 1603 Test bit getting (Larger and non-existing limb) 1606 Test bit getting in 0 (null) 1609 Test bit getting (Value bit 24) 1612 Test bit getting (Value bit 23) 1615 Test bit set (Change existing value with a 1) 1618 Test bit set (Change existing value with a 0) 1627 Test bit set (Add to 0 (null) with a 0) 1630 Test bit set (Add to 0 (null) with a 1) [all …]
|
A D | test_suite_ecp.data | 252 ECP read binary #8 (Curve25519, masked first bit) 369 ECP check privkey #9 (montgomery curve25519, bit 0 set) 401 ECP check privkey #17 (montgomery curve448, bit 0 set) 405 ECP check privkey #18 (montgomery curve448, bit 1 set) 477 ECP generate Montgomery key: Curve448, set high bit 508 ECP read key #5 (Curve25519, most significant bit set) 520 ECP read key #8 (Curve25519, bit 0 set) 524 ECP read key #9 (Curve25519, bit 1 set) 528 ECP read key #10 (Curve25519, bit 2 set) 552 ECP read key #16 (Curve448, bit 0 set) [all …]
|
A D | test_suite_aes.xts.data | 35 # 128-bit keys with 32 byte sector 47 # 128-bit keys with 512 byte sector 68 # 256-bit keys with 512 byte sector 86 # 128-bit keys with sector size not evenly divisible by 16 bytes
|
A D | test_suite_psa_its.function | 19 16 + /*UID (64-bit number in hex)*/ \ 20 16 + /*UID (64-bit number in hex)*/ \ 27 /* Break up the UID into two 32-bit pieces so as not to rely on
|
A D | test_suite_pkwrite.data | 33 Private key write check EC 256 bits (top bit set)
|
A D | test_suite_pkcs1_v21.data | 807 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 811 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 815 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 819 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0 823 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 827 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0 831 RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large) 835 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 839 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 843 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
|
A D | test_suite_mpi.function | 9 /* Check the validity of the sign bit in an MPI object. Reject representations 15 return( 0 ); // invalid sign bit, e.g. 0 81 * of unset bits after the most significant bit. 83 * Let n be the bit-size of b, i.e. the integer such that 2^n <= b < 2^{n+1}. 111 /* Shift the most significant bit of x to position 8 and mask it out */ 1275 * value with bit b set has been generated. */ 1346 /* Assert that each bit has been set in at least one result and 1351 * As an exception, the top bit may legitimately never be set
|
A D | test_suite_cipher.chachapoly.data | 117 ChaCha20+Poly1305 RFC 7539 Test Vector #1 Unauthentic (1st bit flipped)
|
A D | test_suite_rsa.data | 388 RSA Generate Key - 128bit key 397 RSA Generate Key - 1024 bit key 400 RSA Generate Key - 2048 bit key 403 RSA Generate Key - 1025 bit key
|
/mbedtls-development/docs/architecture/ |
A D | mbed-crypto-storage-specification.md | 49 All integers are encoded in little-endian order in 8-bit bytes. 70 Assumption: ITS provides a 32-bit file identifier namespace. The Crypto service can use arbitrary f… 114 …name is just the key identifier as defined in the PSA crypto specification. This is a 32-bit value. 127 Assumption: ITS provides a 64-bit file identifier namespace. The Crypto service can use arbitrary f… 137 Assumption: ITS provides a 64-bit file identifier namespace. The entity using the crypto library ca… 160 It would simplify things to always have a 32-bit owner, with a nonzero value, and thus reserve the … 181 All integers are encoded in little-endian order in 8-bit bytes. 210 Assumption: ITS provides a 64-bit file identifier namespace. The Crypto service can use arbitrary f… 220 Assumption: ITS provides a 64-bit file identifier namespace. The entity using the crypto library ca… 240 All integers are encoded in little-endian order in 8-bit bytes except where otherwise indicated. [all …]
|
/mbedtls-development/scripts/ |
A D | generate_psa_constants.py | 307 return '\n'.join([self._make_bit_test('usage', bit) 308 for bit in sorted(self.key_usage_flags)])
|
/mbedtls-development/library/ |
A D | asn1write.c | 309 unsigned char bit; in mbedtls_asn1_write_named_bitstring() local 326 bit = cur_byte_shifted & 0x1; in mbedtls_asn1_write_named_bitstring() 329 if( bit != 0 ) in mbedtls_asn1_write_named_bitstring()
|
/mbedtls-development/tests/data_files/ |
A D | dh.998.pem | 1 DH Parameters: (998 bit)
|
A D | dh.999.pem | 1 DH Parameters: (999 bit)
|
A D | server9-with-ca.crt | 32 RSA Public Key: (2048 bit) 33 Modulus (2048 bit):
|
A D | server10_int3_int-ca2_ca.crt | 53 RSA Public Key: (2048 bit) 54 Modulus (2048 bit):
|
/mbedtls-development/tests/data_files/dir3/ |
A D | test-ca.crt | 13 RSA Public Key: (2048 bit) 14 Modulus (2048 bit):
|
/mbedtls-development/tests/data_files/dir1/ |
A D | test-ca.crt | 13 RSA Public Key: (2048 bit) 14 Modulus (2048 bit):
|
/mbedtls-development/tests/data_files/dir2/ |
A D | test-ca.crt | 13 RSA Public Key: (2048 bit) 14 Modulus (2048 bit):
|
/mbedtls-development/3rdparty/everest/ |
A D | README.md | 5 …n most systems. The main issue is that some platforms do not provide a 128-bit integer type and Kr…
|
/mbedtls-development/ |
A D | Makefile | 97 CTR_DRBG_128_BIT_KEY_WARN_L2=**** Using 128-bit keys for CTR_DRBG limits the security of generated… 98 CTR_DRBG_128_BIT_KEY_WARN_L3=**** keys and operations that use random values generated to 128-bit …
|
/mbedtls-development/programs/ssl/ |
A D | ssl_context_info.c | 321 void print_if_bit( const char *str, int bit, int val ) in print_if_bit() argument 323 if( bit & val ) in print_if_bit()
|