Home
last modified time | relevance | path

Searched refs:key (Results 1 – 25 of 186) sorted by relevance

12345678

/mbedtls-development/tests/suites/
A Dtest_suite_psa_crypto_persistent_key.data1 Format for storage: RSA private key
10 Parse storage: AES-128 key
39 Persistent key destroy
55 Persistent key import (RSA) invalid key id (VENDOR_MIN)
59 Persistent key import (RSA) invalid key id (VOLATILE_MIN)
63 Persistent key import (RSA) invalid key id (VENDOR_MAX)
74 import/export persistent key RSA public key: good, 1024-bit
85 import/export persistent key RSA public key file not exist: 1024-bit
100 import/export persistent key RSA public key with restart: good, 1024-bit
111 import/export persistent key RSA public key file not exist with restart: 1024-bit
[all …]
A Dtest_suite_nist_kw.function21 unsigned char key[16];
30 memset( key, 0, sizeof( key ) );
40 key, sizeof( key ) * 8,
51 key, sizeof( key ) * 8,
76 key, sizeof( key ) * 8,
94 key, sizeof( key ) * 8,
137 memset( key, 0x2A, sizeof( key ) );
159 memset( key, 0, sizeof( key ) );
211 memset( key, 0, sizeof( key ) );
257 key->x, key->len * 8, 1 ) == 0 );
[all …]
A Dtest_suite_pkwrite.data1 Public key write check RSA
5 Public key write check RSA 4096
9 Public key write check EC 192 bits
13 Public key write check EC 521 bits
17 Public key write check EC Brainpool 512 bits
21 Private key write check RSA
23 pk_write_key_check:"data_files/server1.key"
25 Private key write check RSA 4096
29 Private key write check EC 192 bits
37 Private key write check EC 521 bits
[all …]
A Dtest_suite_psa_crypto_se_driver_hal_mocks.data13 SE key importing mock test
16 SE key importing mock test: max key bits
19 SE key importing mock test: more than max key bits
22 SE key importing mock test: alloc failed
25 SE key importing mock test: import failed
28 SE key exporting mock test
31 SE key exporting mock test: export failed
34 SE public key exporting mock test
40 SE key generating mock test
43 SE key generating mock test: alloc failed
[all …]
A Dtest_suite_x509write.data3 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha1":MBEDTLS_MD_SHA1:0:0:0:0
7 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha224":MBEDTLS_MD_SHA224:0:0:0:0
11 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256":MBEDTLS_MD_SHA256:0:0:0:0
15 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha384":MBEDTLS_MD_SHA384:0:0:0:0
19 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha512":MBEDTLS_MD_SHA512:0:0:0:0
23 x509_csr_check:"data_files/server1.key":"data_files/server1.req.md5":MBEDTLS_MD_MD5:0:0:0:0
31 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage_empty":MBEDTLS_MD_SHA1:0:…
39 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type_empty":MBEDTLS_MD_SHA1:0:…
55 x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-…
71 x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-…
[all …]
A Dtest_suite_psa_crypto_attributes.data1 PSA key attributes structure
5 PSA key attributes: id only
8 PSA key attributes: lifetime=3 only
11 PSA key attributes: id then back to volatile
14 PSA key attributes: id then back to non local volatile
17 PSA key attributes: id then lifetime
20 PSA key attributes: lifetime then id
23 PSA key attributes: non local volatile lifetime then id
26 PSA key attributes: slot number
A Dtest_suite_psa_crypto_slot_management.function9 /**< Close key(s) */
12 /**< Destroy key(s) */
15 /**< Purge key(s) */
129 /* Import a key. */
273 * key.
329 * existing key.
372 /* Create a key. */
542 /* Copy the key. */
764 * key identifier as the imported key is a volatile key. Volatile
899 * Create a new persistent or volatile key. When creating the key,
[all …]
A Dtest_suite_psa_crypto.function167 psa_destroy_key( key );
834 /* Import the key */
843 /* Export the key */
936 /* Import the key */
993 /* Import the key */
1669 /* Copy the key. */
2237 if( ! exercise_mac_setup( key_type, key->x, key->len, alg,
2627 if( ! exercise_cipher_setup( key_type, key->x, key->len, alg,
6940 /* Export the key if permitted by the key policy. */
6956 /* Check key slot still contains key data */
[all …]
A Dtest_suite_ccm.function80 unsigned char key[32];
85 memset( key, 0x2A, sizeof( key ) );
100 unsigned char key[16];
111 memset( key, 0, sizeof( key ) );
118 key, 8 * sizeof( key ) ) == 0 );
142 unsigned char key[16];
152 memset( key, 0, sizeof( key ) );
160 key, 8 * sizeof( key ) ) == 0 );
199 TEST_EQUAL( mbedtls_ccm_setkey( &ctx, cipher_id, key->x, key->len * 8 ), 0 );
243 TEST_EQUAL( mbedtls_ccm_setkey( &ctx, cipher_id, key->x, key->len * 8 ), 0 );
[all …]
/mbedtls-development/docs/architecture/
A Dmbed-crypto-storage-specification.md51 The layout of a key file is:
73 … 1 through 0xfffeffff: [content](#key-file-format-for-0.1.0) of the [key whose identifier is the f…
103 * [Persistent transparent keys](#key-file-format-for-1.0.0) designated by a [key identifier and own…
142 … 1 through 0xfffeffff: [content](#key-file-format-for-1.0.0) of the [key whose identifier is the f…
229 ### Non-key files on TBD
252 * key material:
254 * For an opaque key (unified driver interface): driver-specific opaque key blob.
278 * The file containing the key metadata designated by the key identifier.
282 * The file containing the key metadata designated by the key identifier.
312 * key material:
[all …]
/mbedtls-development/tests/src/
A Dpsa_exercise_key.c267 PSA_ASSERT( psa_aead_encrypt( key, alg, in exercise_aead_key()
281 TEST_EQUAL( psa_aead_decrypt( key, alg, in exercise_aead_key()
401 psa_asymmetric_decrypt( key, alg, in exercise_asymmetric_encryption_key()
420 mbedtls_svc_key_id_t key, in mbedtls_test_psa_setup_key_derivation_wrap() argument
504 mbedtls_svc_key_id_t key ) in mbedtls_test_psa_key_agreement_with_self() argument
544 mbedtls_svc_key_id_t key ) in mbedtls_test_psa_raw_key_agreement_with_self() argument
565 PSA_ASSERT( psa_export_public_key( key, in mbedtls_test_psa_raw_key_agreement_with_self()
569 status = psa_raw_key_agreement( alg, key, in mbedtls_test_psa_raw_key_agreement_with_self()
820 PSA_ASSERT( psa_export_key( key, in exercise_export_key()
868 PSA_ASSERT( psa_export_public_key( key, in exercise_export_public_key()
[all …]
/mbedtls-development/docs/
A Dgetting_started.md28 * [Importing a key](#importing-a-key)
32 * [Deriving a new key from an existing key](#deriving-a-new-key-from-an-existing-key)
64 ### Importing a key
98 status = psa_import_key(&attributes, key, key_len, &key);
157 status = psa_import_key(&attributes, key, key_len, &key);
235 status = psa_import_key(&attributes, key, key_len, &key);
319 status = psa_import_key(&attributes, key, key_len, &key);
538 ### Deriving a new key from an existing key
608 /* Import a key for use in key derivation. If such a key has already been
729 status = psa_import_key(&attributes, key, sizeof(key), &key);
[all …]
/mbedtls-development/include/mbedtls/
A Ddes.h127 void mbedtls_des_key_set_parity( unsigned char key[MBEDTLS_DES_KEY_SIZE] );
144 int mbedtls_des_key_check_key_parity( const unsigned char key[MBEDTLS_DES_KEY_SIZE] );
158 int mbedtls_des_key_check_weak( const unsigned char key[MBEDTLS_DES_KEY_SIZE] );
173 int mbedtls_des_setkey_enc( mbedtls_des_context *ctx, const unsigned char key[MBEDTLS_DES_KEY_SIZE]…
188 int mbedtls_des_setkey_dec( mbedtls_des_context *ctx, const unsigned char key[MBEDTLS_DES_KEY_SIZE]…
200 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 2] );
212 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 2] );
224 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 3] );
236 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 3] );
345 const unsigned char key[MBEDTLS_DES_KEY_SIZE] );
/mbedtls-development/include/psa/
A Dcrypto.h141 mbedtls_svc_key_id_t key );
428 psa_status_t psa_purge_key(mbedtls_svc_key_id_t key);
571 psa_status_t psa_destroy_key(mbedtls_svc_key_id_t key);
655 mbedtls_svc_key_id_t *key);
747 psa_status_t psa_export_key(mbedtls_svc_key_id_t key,
1225 psa_status_t psa_mac_compute(mbedtls_svc_key_id_t key,
1266 psa_status_t psa_mac_verify(mbedtls_svc_key_id_t key,
3026 psa_status_t psa_sign_hash(mbedtls_svc_key_id_t key,
3077 psa_status_t psa_verify_hash(mbedtls_svc_key_id_t key,
3537 mbedtls_svc_key_id_t key);
[all …]
/mbedtls-development/programs/pkey/
A Dkey_app_writer.c215 mbedtls_pk_context key; in main() local
224 mbedtls_pk_init( &key ); in main()
335 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_RSA ) in main()
337 mbedtls_rsa_context *rsa = mbedtls_pk_rsa( key ); in main()
358 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_ECKEY ) in main()
360 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( key ); in main()
395 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_RSA ) in main()
413 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( key ); in main()
427 write_public_key( &key, opt.output_file ); in main()
431 write_private_key( &key, opt.output_file ); in main()
[all …]
/mbedtls-development/library/
A Dpkwrite.c185 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_pubkey()
188 if( mbedtls_pk_get_type( key ) == MBEDTLS_PK_RSA ) in mbedtls_pk_write_pubkey()
193 if( mbedtls_pk_get_type( key ) == MBEDTLS_PK_ECKEY ) in mbedtls_pk_write_pubkey()
233 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_pubkey_der()
256 pk_type = mbedtls_pk_get_type( key ); in mbedtls_pk_write_pubkey_der()
272 key_id = *((psa_key_id_t*) key->pk_ctx ); in mbedtls_pk_write_pubkey_der()
319 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_key_der()
327 if( mbedtls_pk_get_type( key ) == MBEDTLS_PK_RSA ) in mbedtls_pk_write_key_der()
562 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_pubkey_pem()
588 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_key_pem()
[all …]
A Daesni.c275 const unsigned char *key ) in aesni_setkey_enc_128() argument
317 : "r" (rk), "r" (key) in aesni_setkey_enc_128()
325 const unsigned char *key ) in aesni_setkey_enc_192() argument
374 : "r" (rk), "r" (key) in aesni_setkey_enc_192()
382 const unsigned char *key ) in aesni_setkey_enc_256() argument
440 : "r" (rk), "r" (key) in aesni_setkey_enc_256()
448 const unsigned char *key, in mbedtls_aesni_setkey_enc() argument
453 case 128: aesni_setkey_enc_128( rk, key ); break; in mbedtls_aesni_setkey_enc()
454 case 192: aesni_setkey_enc_192( rk, key ); break; in mbedtls_aesni_setkey_enc()
455 case 256: aesni_setkey_enc_256( rk, key ); break; in mbedtls_aesni_setkey_enc()
A Ddes.c326 key[i] = odd_parity_table[key[i] / 2]; in mbedtls_des_key_set_parity()
337 if( key[i] != odd_parity_table[key[i] / 2] ) in mbedtls_des_key_check_key_parity()
404 X = MBEDTLS_GET_UINT32_BE( key, 0 ); in mbedtls_des_setkey()
474 mbedtls_des_setkey( ctx->sk, key ); in mbedtls_des_setkey_enc()
486 mbedtls_des_setkey( ctx->sk, key ); in mbedtls_des_setkey_dec()
503 mbedtls_des_setkey( esk, key ); in des3_set2key()
530 des3_set2key( ctx->sk, sk, key ); in mbedtls_des3_set2key_enc()
544 des3_set2key( sk, ctx->sk, key ); in mbedtls_des3_set2key_dec()
556 mbedtls_des_setkey( esk, key ); in des3_set3key()
581 des3_set3key( ctx->sk, sk, key ); in mbedtls_des3_set3key_enc()
[all …]
A Dcipher_wrap.c190 static int aes_setkey_dec_wrap( void *ctx, const unsigned char *key, in aes_setkey_dec_wrap() argument
196 static int aes_setkey_enc_wrap( void *ctx, const unsigned char *key, in aes_setkey_enc_wrap() argument
511 key, key_bitlen ); in gcm_aes_setkey_wrap()
580 key, key_bitlen ); in ccm_aes_setkey_wrap()
919 key, key_bitlen ); in gcm_camellia_setkey_wrap()
988 key, key_bitlen ); in ccm_camellia_setkey_wrap()
1328 key, key_bitlen ); in gcm_aria_setkey_wrap()
1397 key, key_bitlen ); in ccm_aria_setkey_wrap()
1855 const unsigned char *key, in chachapoly_setkey_wrap() argument
1934 static int null_setkey( void *ctx, const unsigned char *key, in null_setkey() argument
[all …]
A Dpsa_crypto_storage.c65 uint32_t unsigned_owner_id = MBEDTLS_SVC_KEY_ID_GET_OWNER_ID( key ); in psa_its_identifier_of_slot()
67 MBEDTLS_SVC_KEY_ID_GET_KEY_ID( key ) ); in psa_its_identifier_of_slot()
73 return( key ); in psa_its_identifier_of_slot()
95 const mbedtls_svc_key_id_t key, uint8_t *data, size_t data_size ) in psa_crypto_storage_load() argument
98 psa_storage_uid_t data_identifier = psa_its_identifier_of_slot( key ); in psa_crypto_storage_load()
113 int psa_is_key_present_in_storage( const mbedtls_svc_key_id_t key ) in psa_is_key_present_in_storage() argument
116 psa_storage_uid_t data_identifier = psa_its_identifier_of_slot( key ); in psa_is_key_present_in_storage()
151 if( psa_is_key_present_in_storage( key ) == 1 ) in psa_crypto_storage_store()
184 psa_status_t psa_destroy_persistent_key( const mbedtls_svc_key_id_t key ) in psa_destroy_persistent_key() argument
217 const mbedtls_svc_key_id_t key, in psa_crypto_storage_get_data_length() argument
[all …]
/mbedtls-development/tests/scripts/
A Danalyze_outcomes.py65 key = ';'.join([base_name, description.decode('utf-8')])
66 self.descriptions.add(key)
77 for key in available:
78 hits = outcomes[key].hits() if key in outcomes else 0
82 results.warning('Test case not executed: {}', key)
101 key = ';'.join([suite, case])
103 if key not in outcomes:
104 outcomes[key] = TestCaseOutcomes()
106 outcomes[key].successes.append(setup)
108 outcomes[key].failures.append(setup)
/mbedtls-development/programs/psa/
A Dkey_ladder_demo.sh31 if [ -e master.key ]; then
36 "$program" generate master=master.key
42 "$program" wrap master=master.key label=hello label=world \
47 "$program" unwrap master=master.key label=hello label=world \
54 …"$program" unwrap master=master.key input=hello_world.wrap output=hellow_orld.txt label=hellow lab…
58 "$program" save master=master.key label=hello \
59 input=hello_world.wrap output=hello.key
61 "$program" unwrap master=hello.key label=world \
A Dcrypto_examples.c97 static psa_status_t cipher_encrypt( psa_key_id_t key, in cipher_encrypt() argument
128 static psa_status_t cipher_decrypt( psa_key_id_t key, in cipher_decrypt() argument
170 psa_key_id_t key = 0; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local
186 status = psa_generate_key( &attributes, &key ); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
203 psa_destroy_key( key ); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block()
220 psa_key_id_t key = 0; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local
234 status = psa_generate_key( &attributes, &key ); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi()
251 psa_destroy_key( key ); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi()
267 psa_key_id_t key = 0; in cipher_example_encrypt_decrypt_aes_ctr_multi() local
281 status = psa_generate_key( &attributes, &key ); in cipher_example_encrypt_decrypt_aes_ctr_multi()
[all …]
/mbedtls-development/tests/data_files/dir-maxpath/
A Dlong.sh26 $OPENSSL ecparam -name prime256v1 -genkey -out 00.key
28 -key 00.key -out 00.crt
39 $OPENSSL ecparam -name prime256v1 -genkey -out ${ME}.key
41 -key ${ME}.key -out ${ME}.csr
42 $OPENSSL x509 -req -CA ${UP}.crt -CAkey ${UP}.key -set_serial 1 $OPT \
/mbedtls-development/docs/proposed/
A Dpsa-driver-interface.md183 2. `const uint8_t *key_buffer`: a key material or key context buffer.
191 1. `uint8_t *key_buffer`: a buffer for the key material or key context.
353 The PSA Cryptography API exposes the key size as part of the key attributes.
375 * For symmetric key types, check that the key size is suitable for the type.
450 …`"import_key"`](#key-import-with-transparent-drivers): called by `psa_import_key()`, only when imp…
611 …true, for a key pair, the key context includes space for the public key. If omitted or false, no a…
643 * For a symmetric key (not a key pair or public key):
772key. Drivers implementers may choose to store the public key in the key context buffer or to recal…
851 psa_key_id_t key;
873 To declare a volatile key:
[all …]

Completed in 54 milliseconds

12345678