/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto_persistent_key.data | 1 Format for storage: RSA private key 10 Parse storage: AES-128 key 39 Persistent key destroy 55 Persistent key import (RSA) invalid key id (VENDOR_MIN) 59 Persistent key import (RSA) invalid key id (VOLATILE_MIN) 63 Persistent key import (RSA) invalid key id (VENDOR_MAX) 74 import/export persistent key RSA public key: good, 1024-bit 85 import/export persistent key RSA public key file not exist: 1024-bit 100 import/export persistent key RSA public key with restart: good, 1024-bit 111 import/export persistent key RSA public key file not exist with restart: 1024-bit [all …]
|
A D | test_suite_nist_kw.function | 21 unsigned char key[16]; 30 memset( key, 0, sizeof( key ) ); 40 key, sizeof( key ) * 8, 51 key, sizeof( key ) * 8, 76 key, sizeof( key ) * 8, 94 key, sizeof( key ) * 8, 137 memset( key, 0x2A, sizeof( key ) ); 159 memset( key, 0, sizeof( key ) ); 211 memset( key, 0, sizeof( key ) ); 257 key->x, key->len * 8, 1 ) == 0 ); [all …]
|
A D | test_suite_pkwrite.data | 1 Public key write check RSA 5 Public key write check RSA 4096 9 Public key write check EC 192 bits 13 Public key write check EC 521 bits 17 Public key write check EC Brainpool 512 bits 21 Private key write check RSA 23 pk_write_key_check:"data_files/server1.key" 25 Private key write check RSA 4096 29 Private key write check EC 192 bits 37 Private key write check EC 521 bits [all …]
|
A D | test_suite_psa_crypto_se_driver_hal_mocks.data | 13 SE key importing mock test 16 SE key importing mock test: max key bits 19 SE key importing mock test: more than max key bits 22 SE key importing mock test: alloc failed 25 SE key importing mock test: import failed 28 SE key exporting mock test 31 SE key exporting mock test: export failed 34 SE public key exporting mock test 40 SE key generating mock test 43 SE key generating mock test: alloc failed [all …]
|
A D | test_suite_x509write.data | 3 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha1":MBEDTLS_MD_SHA1:0:0:0:0 7 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha224":MBEDTLS_MD_SHA224:0:0:0:0 11 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256":MBEDTLS_MD_SHA256:0:0:0:0 15 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha384":MBEDTLS_MD_SHA384:0:0:0:0 19 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha512":MBEDTLS_MD_SHA512:0:0:0:0 23 x509_csr_check:"data_files/server1.key":"data_files/server1.req.md5":MBEDTLS_MD_MD5:0:0:0:0 31 x509_csr_check:"data_files/server1.key":"data_files/server1.req.key_usage_empty":MBEDTLS_MD_SHA1:0:… 39 x509_csr_check:"data_files/server1.key":"data_files/server1.req.cert_type_empty":MBEDTLS_MD_SHA1:0:… 55 x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-… 71 x509_crt_check:"data_files/server1.key":"":"C=NL,O=PolarSSL,CN=PolarSSL Server 1":"data_files/test-… [all …]
|
A D | test_suite_psa_crypto_attributes.data | 1 PSA key attributes structure 5 PSA key attributes: id only 8 PSA key attributes: lifetime=3 only 11 PSA key attributes: id then back to volatile 14 PSA key attributes: id then back to non local volatile 17 PSA key attributes: id then lifetime 20 PSA key attributes: lifetime then id 23 PSA key attributes: non local volatile lifetime then id 26 PSA key attributes: slot number
|
A D | test_suite_psa_crypto_slot_management.function | 9 /**< Close key(s) */ 12 /**< Destroy key(s) */ 15 /**< Purge key(s) */ 129 /* Import a key. */ 273 * key. 329 * existing key. 372 /* Create a key. */ 542 /* Copy the key. */ 764 * key identifier as the imported key is a volatile key. Volatile 899 * Create a new persistent or volatile key. When creating the key, [all …]
|
A D | test_suite_psa_crypto.function | 167 psa_destroy_key( key ); 834 /* Import the key */ 843 /* Export the key */ 936 /* Import the key */ 993 /* Import the key */ 1669 /* Copy the key. */ 2237 if( ! exercise_mac_setup( key_type, key->x, key->len, alg, 2627 if( ! exercise_cipher_setup( key_type, key->x, key->len, alg, 6940 /* Export the key if permitted by the key policy. */ 6956 /* Check key slot still contains key data */ [all …]
|
A D | test_suite_ccm.function | 80 unsigned char key[32]; 85 memset( key, 0x2A, sizeof( key ) ); 100 unsigned char key[16]; 111 memset( key, 0, sizeof( key ) ); 118 key, 8 * sizeof( key ) ) == 0 ); 142 unsigned char key[16]; 152 memset( key, 0, sizeof( key ) ); 160 key, 8 * sizeof( key ) ) == 0 ); 199 TEST_EQUAL( mbedtls_ccm_setkey( &ctx, cipher_id, key->x, key->len * 8 ), 0 ); 243 TEST_EQUAL( mbedtls_ccm_setkey( &ctx, cipher_id, key->x, key->len * 8 ), 0 ); [all …]
|
/mbedtls-development/docs/architecture/ |
A D | mbed-crypto-storage-specification.md | 51 The layout of a key file is: 73 … 1 through 0xfffeffff: [content](#key-file-format-for-0.1.0) of the [key whose identifier is the f… 103 * [Persistent transparent keys](#key-file-format-for-1.0.0) designated by a [key identifier and own… 142 … 1 through 0xfffeffff: [content](#key-file-format-for-1.0.0) of the [key whose identifier is the f… 229 ### Non-key files on TBD 252 * key material: 254 * For an opaque key (unified driver interface): driver-specific opaque key blob. 278 * The file containing the key metadata designated by the key identifier. 282 * The file containing the key metadata designated by the key identifier. 312 * key material: [all …]
|
/mbedtls-development/tests/src/ |
A D | psa_exercise_key.c | 267 PSA_ASSERT( psa_aead_encrypt( key, alg, in exercise_aead_key() 281 TEST_EQUAL( psa_aead_decrypt( key, alg, in exercise_aead_key() 401 psa_asymmetric_decrypt( key, alg, in exercise_asymmetric_encryption_key() 420 mbedtls_svc_key_id_t key, in mbedtls_test_psa_setup_key_derivation_wrap() argument 504 mbedtls_svc_key_id_t key ) in mbedtls_test_psa_key_agreement_with_self() argument 544 mbedtls_svc_key_id_t key ) in mbedtls_test_psa_raw_key_agreement_with_self() argument 565 PSA_ASSERT( psa_export_public_key( key, in mbedtls_test_psa_raw_key_agreement_with_self() 569 status = psa_raw_key_agreement( alg, key, in mbedtls_test_psa_raw_key_agreement_with_self() 820 PSA_ASSERT( psa_export_key( key, in exercise_export_key() 868 PSA_ASSERT( psa_export_public_key( key, in exercise_export_public_key() [all …]
|
/mbedtls-development/docs/ |
A D | getting_started.md | 28 * [Importing a key](#importing-a-key) 32 * [Deriving a new key from an existing key](#deriving-a-new-key-from-an-existing-key) 64 ### Importing a key 98 status = psa_import_key(&attributes, key, key_len, &key); 157 status = psa_import_key(&attributes, key, key_len, &key); 235 status = psa_import_key(&attributes, key, key_len, &key); 319 status = psa_import_key(&attributes, key, key_len, &key); 538 ### Deriving a new key from an existing key 608 /* Import a key for use in key derivation. If such a key has already been 729 status = psa_import_key(&attributes, key, sizeof(key), &key); [all …]
|
/mbedtls-development/include/mbedtls/ |
A D | des.h | 127 void mbedtls_des_key_set_parity( unsigned char key[MBEDTLS_DES_KEY_SIZE] ); 144 int mbedtls_des_key_check_key_parity( const unsigned char key[MBEDTLS_DES_KEY_SIZE] ); 158 int mbedtls_des_key_check_weak( const unsigned char key[MBEDTLS_DES_KEY_SIZE] ); 173 int mbedtls_des_setkey_enc( mbedtls_des_context *ctx, const unsigned char key[MBEDTLS_DES_KEY_SIZE]… 188 int mbedtls_des_setkey_dec( mbedtls_des_context *ctx, const unsigned char key[MBEDTLS_DES_KEY_SIZE]… 200 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 2] ); 212 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 2] ); 224 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 3] ); 236 const unsigned char key[MBEDTLS_DES_KEY_SIZE * 3] ); 345 const unsigned char key[MBEDTLS_DES_KEY_SIZE] );
|
/mbedtls-development/include/psa/ |
A D | crypto.h | 141 mbedtls_svc_key_id_t key ); 428 psa_status_t psa_purge_key(mbedtls_svc_key_id_t key); 571 psa_status_t psa_destroy_key(mbedtls_svc_key_id_t key); 655 mbedtls_svc_key_id_t *key); 747 psa_status_t psa_export_key(mbedtls_svc_key_id_t key, 1225 psa_status_t psa_mac_compute(mbedtls_svc_key_id_t key, 1266 psa_status_t psa_mac_verify(mbedtls_svc_key_id_t key, 3026 psa_status_t psa_sign_hash(mbedtls_svc_key_id_t key, 3077 psa_status_t psa_verify_hash(mbedtls_svc_key_id_t key, 3537 mbedtls_svc_key_id_t key); [all …]
|
/mbedtls-development/programs/pkey/ |
A D | key_app_writer.c | 215 mbedtls_pk_context key; in main() local 224 mbedtls_pk_init( &key ); in main() 335 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_RSA ) in main() 337 mbedtls_rsa_context *rsa = mbedtls_pk_rsa( key ); in main() 358 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_ECKEY ) in main() 360 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( key ); in main() 395 if( mbedtls_pk_get_type( &key ) == MBEDTLS_PK_RSA ) in main() 413 mbedtls_ecp_keypair *ecp = mbedtls_pk_ec( key ); in main() 427 write_public_key( &key, opt.output_file ); in main() 431 write_private_key( &key, opt.output_file ); in main() [all …]
|
/mbedtls-development/library/ |
A D | pkwrite.c | 185 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_pubkey() 188 if( mbedtls_pk_get_type( key ) == MBEDTLS_PK_RSA ) in mbedtls_pk_write_pubkey() 193 if( mbedtls_pk_get_type( key ) == MBEDTLS_PK_ECKEY ) in mbedtls_pk_write_pubkey() 233 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_pubkey_der() 256 pk_type = mbedtls_pk_get_type( key ); in mbedtls_pk_write_pubkey_der() 272 key_id = *((psa_key_id_t*) key->pk_ctx ); in mbedtls_pk_write_pubkey_der() 319 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_key_der() 327 if( mbedtls_pk_get_type( key ) == MBEDTLS_PK_RSA ) in mbedtls_pk_write_key_der() 562 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_pubkey_pem() 588 PK_VALIDATE_RET( key != NULL ); in mbedtls_pk_write_key_pem() [all …]
|
A D | aesni.c | 275 const unsigned char *key ) in aesni_setkey_enc_128() argument 317 : "r" (rk), "r" (key) in aesni_setkey_enc_128() 325 const unsigned char *key ) in aesni_setkey_enc_192() argument 374 : "r" (rk), "r" (key) in aesni_setkey_enc_192() 382 const unsigned char *key ) in aesni_setkey_enc_256() argument 440 : "r" (rk), "r" (key) in aesni_setkey_enc_256() 448 const unsigned char *key, in mbedtls_aesni_setkey_enc() argument 453 case 128: aesni_setkey_enc_128( rk, key ); break; in mbedtls_aesni_setkey_enc() 454 case 192: aesni_setkey_enc_192( rk, key ); break; in mbedtls_aesni_setkey_enc() 455 case 256: aesni_setkey_enc_256( rk, key ); break; in mbedtls_aesni_setkey_enc()
|
A D | des.c | 326 key[i] = odd_parity_table[key[i] / 2]; in mbedtls_des_key_set_parity() 337 if( key[i] != odd_parity_table[key[i] / 2] ) in mbedtls_des_key_check_key_parity() 404 X = MBEDTLS_GET_UINT32_BE( key, 0 ); in mbedtls_des_setkey() 474 mbedtls_des_setkey( ctx->sk, key ); in mbedtls_des_setkey_enc() 486 mbedtls_des_setkey( ctx->sk, key ); in mbedtls_des_setkey_dec() 503 mbedtls_des_setkey( esk, key ); in des3_set2key() 530 des3_set2key( ctx->sk, sk, key ); in mbedtls_des3_set2key_enc() 544 des3_set2key( sk, ctx->sk, key ); in mbedtls_des3_set2key_dec() 556 mbedtls_des_setkey( esk, key ); in des3_set3key() 581 des3_set3key( ctx->sk, sk, key ); in mbedtls_des3_set3key_enc() [all …]
|
A D | cipher_wrap.c | 190 static int aes_setkey_dec_wrap( void *ctx, const unsigned char *key, in aes_setkey_dec_wrap() argument 196 static int aes_setkey_enc_wrap( void *ctx, const unsigned char *key, in aes_setkey_enc_wrap() argument 511 key, key_bitlen ); in gcm_aes_setkey_wrap() 580 key, key_bitlen ); in ccm_aes_setkey_wrap() 919 key, key_bitlen ); in gcm_camellia_setkey_wrap() 988 key, key_bitlen ); in ccm_camellia_setkey_wrap() 1328 key, key_bitlen ); in gcm_aria_setkey_wrap() 1397 key, key_bitlen ); in ccm_aria_setkey_wrap() 1855 const unsigned char *key, in chachapoly_setkey_wrap() argument 1934 static int null_setkey( void *ctx, const unsigned char *key, in null_setkey() argument [all …]
|
A D | psa_crypto_storage.c | 65 uint32_t unsigned_owner_id = MBEDTLS_SVC_KEY_ID_GET_OWNER_ID( key ); in psa_its_identifier_of_slot() 67 MBEDTLS_SVC_KEY_ID_GET_KEY_ID( key ) ); in psa_its_identifier_of_slot() 73 return( key ); in psa_its_identifier_of_slot() 95 const mbedtls_svc_key_id_t key, uint8_t *data, size_t data_size ) in psa_crypto_storage_load() argument 98 psa_storage_uid_t data_identifier = psa_its_identifier_of_slot( key ); in psa_crypto_storage_load() 113 int psa_is_key_present_in_storage( const mbedtls_svc_key_id_t key ) in psa_is_key_present_in_storage() argument 116 psa_storage_uid_t data_identifier = psa_its_identifier_of_slot( key ); in psa_is_key_present_in_storage() 151 if( psa_is_key_present_in_storage( key ) == 1 ) in psa_crypto_storage_store() 184 psa_status_t psa_destroy_persistent_key( const mbedtls_svc_key_id_t key ) in psa_destroy_persistent_key() argument 217 const mbedtls_svc_key_id_t key, in psa_crypto_storage_get_data_length() argument [all …]
|
/mbedtls-development/tests/scripts/ |
A D | analyze_outcomes.py | 65 key = ';'.join([base_name, description.decode('utf-8')]) 66 self.descriptions.add(key) 77 for key in available: 78 hits = outcomes[key].hits() if key in outcomes else 0 82 results.warning('Test case not executed: {}', key) 101 key = ';'.join([suite, case]) 103 if key not in outcomes: 104 outcomes[key] = TestCaseOutcomes() 106 outcomes[key].successes.append(setup) 108 outcomes[key].failures.append(setup)
|
/mbedtls-development/programs/psa/ |
A D | key_ladder_demo.sh | 31 if [ -e master.key ]; then 36 "$program" generate master=master.key 42 "$program" wrap master=master.key label=hello label=world \ 47 "$program" unwrap master=master.key label=hello label=world \ 54 …"$program" unwrap master=master.key input=hello_world.wrap output=hellow_orld.txt label=hellow lab… 58 "$program" save master=master.key label=hello \ 59 input=hello_world.wrap output=hello.key 61 "$program" unwrap master=hello.key label=world \
|
A D | crypto_examples.c | 97 static psa_status_t cipher_encrypt( psa_key_id_t key, in cipher_encrypt() argument 128 static psa_status_t cipher_decrypt( psa_key_id_t key, in cipher_decrypt() argument 170 psa_key_id_t key = 0; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local 186 status = psa_generate_key( &attributes, &key ); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 203 psa_destroy_key( key ); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 220 psa_key_id_t key = 0; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local 234 status = psa_generate_key( &attributes, &key ); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 251 psa_destroy_key( key ); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 267 psa_key_id_t key = 0; in cipher_example_encrypt_decrypt_aes_ctr_multi() local 281 status = psa_generate_key( &attributes, &key ); in cipher_example_encrypt_decrypt_aes_ctr_multi() [all …]
|
/mbedtls-development/tests/data_files/dir-maxpath/ |
A D | long.sh | 26 $OPENSSL ecparam -name prime256v1 -genkey -out 00.key 28 -key 00.key -out 00.crt 39 $OPENSSL ecparam -name prime256v1 -genkey -out ${ME}.key 41 -key ${ME}.key -out ${ME}.csr 42 $OPENSSL x509 -req -CA ${UP}.crt -CAkey ${UP}.key -set_serial 1 $OPT \
|
/mbedtls-development/docs/proposed/ |
A D | psa-driver-interface.md | 183 2. `const uint8_t *key_buffer`: a key material or key context buffer. 191 1. `uint8_t *key_buffer`: a buffer for the key material or key context. 353 The PSA Cryptography API exposes the key size as part of the key attributes. 375 * For symmetric key types, check that the key size is suitable for the type. 450 …`"import_key"`](#key-import-with-transparent-drivers): called by `psa_import_key()`, only when imp… 611 …true, for a key pair, the key context includes space for the public key. If omitted or false, no a… 643 * For a symmetric key (not a key pair or public key): 772 …key. Drivers implementers may choose to store the public key in the key context buffer or to recal… 851 psa_key_id_t key; 873 To declare a volatile key: [all …]
|