| /mbedtls/tests/data_files/dir4/ |
| A D | Readme | 23 …nzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (valid) 28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid) 33 … on the root CA with maximum number of elements and a self signed certificate in the chain (valid) 39 8. zero pathlen constraint on first intermediate CA (valid) 44 9. zero pathlen constraint on trusted root (valid)
|
| /mbedtls/tests/suites/ |
| A D | test_suite_lmots.data | 90 # This test uses the valid signature from hsslms interop test 1, and then 96 # This test uses the valid signature from hsslms interop test 1, and then 102 # This test uses the valid signature from hsslms interop test 1, and then 108 # This test uses the valid public key for hsslms interop test 1, imports it, and 114 # This test uses the valid public key for hsslms interop test 1, add an extra 119 # This test uses the valid public key for hsslms interop test 1, removes a byte, 124 # This test uses the valid public key for hsslms interop test 1, cuts it down so 130 # This test uses the valid public key for hsslms interop test 1, alters the 135 # This test uses the valid public key for hsslms interop test 1, alters the
|
| A D | test_suite_ecdsa.data | 389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data 393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data 397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data 401 ECDSA verify valid pub key, valid/incorrect sig, 0 bytes of data 405 ECDSA verify valid pub key, valid/incorrect sig, 1 byte of data 409 ECDSA verify valid pub key, valid/incorrect sig, 32 bytes of data 413 ECDSA verify valid public key, correct sig, 0 bytes of data 417 ECDSA verify valid pub key, correct sig, 1 byte of data 421 ECDSA verify valid pub key, correct sig, 32 bytes of data
|
| A D | test_suite_lms.data | 190 # This test uses the data from hash-sigs interop test #1. This test has a valid 195 # This test uses the data from hash-sigs interop test #1. This test has a valid 201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail. 206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail. 222 # This test uses the valid public key for hsslms interop test 1, add an extra 227 # This test uses the valid public key for hsslms interop test 1, removes a byte, 232 # This test uses the valid public key for hsslms interop test 1, cuts it down so 244 # This test uses the valid public key for hsslms interop test 1, alters the 249 # This test uses the valid public key for hsslms interop test 1, alters the 255 # This test uses the valid public key for hsslms interop test 1, alters the [all …]
|
| A D | test_suite_base64.data | 162 Base64 encode hex all valid input bytes #0 165 Base64 encode hex all valid input bytes #1 168 Base64 encode hex all valid input bytes #2 171 Base64 encode all valid output characters at all offsets 189 Base64 decode all valid input characters at all offsets
|
| A D | test_suite_ecjpake.data | 10 ECJPAKE round one: client, valid 13 ECJPAKE round one: server, valid 118 ECJPAKE round two client: valid 184 ECJPAKE round two server: valid
|
| A D | test_suite_pk.data | 4 PK valid parameters 7 PK write valid parameters 1582 Copy from PSA: valid EC (SECP_R1_256 + ECDSA_ANY) 1618 Copy from PSA: valid RSA (PKCS1V15_CRYPT) 1622 Copy from PSA: valid RSA (OAEP + SHA_256) 1626 Copy from PSA: valid RSA (OAEP + SHA_512) 1642 Copy from PSA: valid RSA (PSS + ANY_HASH) 1646 Copy from PSA: valid RSA (PSS + SHA_256) 1650 Copy from PSA: valid RSA (PSS + SHA_512) 1654 Copy from PSA: valid RSA, PSA_ALG_NONE [all …]
|
| A D | test_suite_pem.data | 22 PEM read (unencrypted, valid) 59 PEM read (valid EC key encoded with AES-128-CBC)
|
| A D | test_suite_x509parse.data | 494 # Parse the following valid DN: 838 X509 CRT verification #52 (CA keyUsage valid) 962 X509 CRT verification #82 (Not yet valid CA and valid CA) 966 X509 CRT verification #83 (valid CA and Not yet valid CA) 970 X509 CRT verification #84 (valid CA and Not yet valid CA) 974 X509 CRT verification #85 (Not yet valid CA and valid CA) 1082 X509 CRT parse CN: IPv4 valid address 1127 X509 CRT parse CN: IPv6 valid address 2256 X509 CRT (TBS, valid v3Ext in v3 CRT) 2260 X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT) [all …]
|
| A D | test_suite_block_cipher.function | 28 /* That size is valid for a key or an input/output block. */
|
| A D | test_suite_net.function | 113 /* In principle, mbedtls_net_poll() with valid arguments should succeed.
|
| A D | test_suite_psa_crypto_metadata.function | 102 * possibly turn a valid encoding into another valid encoding. Here in 106 * The expected parity is even so that 0 is considered a valid encoding.
|
| A D | test_suite_asn1parse.function | 37 /* Since we have a valid element start (tag and length), retrieve and 234 * valid depending on what the trailing garbage is. */ 335 /* An INTEGER with no content is not valid. */
|
| A D | test_suite_lms.function | 91 /* Test negative cases if the input data is valid */
|
| A D | test_suite_lmots.function | 91 /* Test negative cases if the input data is valid */
|
| A D | test_suite_bignum.function | 17 /* Only +1 and -1 are valid sign bits, not e.g. 0 */ 1277 * is a valid value. However, negating it (`-n`) has undefined behavior 1399 /* Test mbedtls_mpi_mod_int(): never valid */ 1403 /* Test mbedtls_mpi_random(): never valid */
|
| A D | host_test.function | 88 /* Read until we get a valid line */ 268 * only. They are still valid for other compilers. Avoid this warning by
|
| A D | test_suite_ssl.data | 3115 Version config: valid client TLS 1.2 only 3119 Version config: valid client DTLS 1.2 only 3123 Version config: valid server TLS 1.2 only 3127 Version config: valid server DTLS 1.2 only 3147 Version config: valid client TLS 1.3 only 3155 Version config: valid server TLS 1.3 only 3179 Version config: valid client hybrid TLS 1.2/3 3187 Version config: valid server hybrid TLS 1.2/3 3195 Version config: valid client hybrid TLS 1.2/3, no TLS 1.2 3203 Version config: valid server hybrid TLS 1.2/3, no TLS 1.2 [all …]
|
| A D | test_suite_psa_crypto_pake.data | 25 PSA PAKE: duplicate a valid setup
|
| A D | test_suite_md.function | 30 * Test that mbedtls_md_list() only returns valid MDs.
|
| /mbedtls/library/ |
| A D | constant_time.c | 137 mbedtls_ct_condition_t valid = mbedtls_ct_bool_and(mbedtls_ct_uint_ge(i, skip_head), in mbedtls_ct_memcmp_partial() local 139 diff |= mbedtls_ct_uint_if_else_0(valid, d); in mbedtls_ct_memcmp_partial()
|
| /mbedtls/doxygen/ |
| A D | mbedtls.doxyfile | 37 # This is perfectly valid as far as Doxygen is concerned. However, with
|
| /mbedtls/docs/architecture/ |
| A D | psa-crypto-implementation-structure.md | 26 * checking PSA API arguments and translating them into valid arguments for the necessary calls to t… 159 * Attempt to perform an operation with a combination of key type and algorithm that is not valid or… 165 * `scripts/mbedtls_dev/asymmetric_key_data.py` contains valid key data for asymmetric key types.
|
| /mbedtls/docs/proposed/ |
| A D | psa-driver-interface.md | 77 * `"prefix"` (mandatory, string). This must be a valid, non-empty prefix for a C identifier. All th… 373 * `PSA_KEY_DERIVATION_INPUT_TYPE_BYTES`: the step is valid and present and is a transparent byte st… 374 * `PSA_KEY_DERIVATION_INPUT_TYPE_KEY`: the step is valid and present and is a byte string passed vi… 375 * `PSA_KEY_DERIVATION_INPUT_TYPE_INTEGER`: the step is valid and present and is an integer. Call `p… 403 …` to the size of the key context in bytes. The key context buffer remains valid for the duration o… 409 * `PSA_ERROR_DOES_NOT_EXIST`: the input step is valid for this particular algorithm, but it is not … 685 The pointer output by `psa_crypto_driver_pake_get_password_key` is only valid until the "pake_setup… 785 All key creation entry points must ensure that the resulting key is valid as specified in the secti… 801 …valid key data. Key data is _valid_ if operations involving the key are guaranteed to work functio… 806 * On the other hand, it is acceptable for import to accept a key that cannot be verified as valid i… [all …]
|
| /mbedtls/tests/data_files/ |
| A D | Readme-x509.txt | 97 _trailing_space.crt: S7 + I1 both with trailing space (valid PEM)
|