Home
last modified time | relevance | path

Searched refs:valid (Results 1 – 25 of 48) sorted by relevance

12

/mbedtls/tests/data_files/dir4/
A DReadme23 …nzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (valid)
28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid)
33 … on the root CA with maximum number of elements and a self signed certificate in the chain (valid)
39 8. zero pathlen constraint on first intermediate CA (valid)
44 9. zero pathlen constraint on trusted root (valid)
/mbedtls/tests/suites/
A Dtest_suite_lmots.data90 # This test uses the valid signature from hsslms interop test 1, and then
96 # This test uses the valid signature from hsslms interop test 1, and then
102 # This test uses the valid signature from hsslms interop test 1, and then
108 # This test uses the valid public key for hsslms interop test 1, imports it, and
114 # This test uses the valid public key for hsslms interop test 1, add an extra
119 # This test uses the valid public key for hsslms interop test 1, removes a byte,
124 # This test uses the valid public key for hsslms interop test 1, cuts it down so
130 # This test uses the valid public key for hsslms interop test 1, alters the
135 # This test uses the valid public key for hsslms interop test 1, alters the
A Dtest_suite_ecdsa.data389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data
393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data
397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data
401 ECDSA verify valid pub key, valid/incorrect sig, 0 bytes of data
405 ECDSA verify valid pub key, valid/incorrect sig, 1 byte of data
409 ECDSA verify valid pub key, valid/incorrect sig, 32 bytes of data
413 ECDSA verify valid public key, correct sig, 0 bytes of data
417 ECDSA verify valid pub key, correct sig, 1 byte of data
421 ECDSA verify valid pub key, correct sig, 32 bytes of data
A Dtest_suite_lms.data190 # This test uses the data from hash-sigs interop test #1. This test has a valid
195 # This test uses the data from hash-sigs interop test #1. This test has a valid
201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail.
206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail.
222 # This test uses the valid public key for hsslms interop test 1, add an extra
227 # This test uses the valid public key for hsslms interop test 1, removes a byte,
232 # This test uses the valid public key for hsslms interop test 1, cuts it down so
244 # This test uses the valid public key for hsslms interop test 1, alters the
249 # This test uses the valid public key for hsslms interop test 1, alters the
255 # This test uses the valid public key for hsslms interop test 1, alters the
[all …]
A Dtest_suite_base64.data162 Base64 encode hex all valid input bytes #0
165 Base64 encode hex all valid input bytes #1
168 Base64 encode hex all valid input bytes #2
171 Base64 encode all valid output characters at all offsets
189 Base64 decode all valid input characters at all offsets
A Dtest_suite_ecjpake.data10 ECJPAKE round one: client, valid
13 ECJPAKE round one: server, valid
118 ECJPAKE round two client: valid
184 ECJPAKE round two server: valid
A Dtest_suite_pk.data4 PK valid parameters
7 PK write valid parameters
1582 Copy from PSA: valid EC (SECP_R1_256 + ECDSA_ANY)
1618 Copy from PSA: valid RSA (PKCS1V15_CRYPT)
1622 Copy from PSA: valid RSA (OAEP + SHA_256)
1626 Copy from PSA: valid RSA (OAEP + SHA_512)
1642 Copy from PSA: valid RSA (PSS + ANY_HASH)
1646 Copy from PSA: valid RSA (PSS + SHA_256)
1650 Copy from PSA: valid RSA (PSS + SHA_512)
1654 Copy from PSA: valid RSA, PSA_ALG_NONE
[all …]
A Dtest_suite_pem.data22 PEM read (unencrypted, valid)
59 PEM read (valid EC key encoded with AES-128-CBC)
A Dtest_suite_x509parse.data494 # Parse the following valid DN:
838 X509 CRT verification #52 (CA keyUsage valid)
962 X509 CRT verification #82 (Not yet valid CA and valid CA)
966 X509 CRT verification #83 (valid CA and Not yet valid CA)
970 X509 CRT verification #84 (valid CA and Not yet valid CA)
974 X509 CRT verification #85 (Not yet valid CA and valid CA)
1082 X509 CRT parse CN: IPv4 valid address
1127 X509 CRT parse CN: IPv6 valid address
2256 X509 CRT (TBS, valid v3Ext in v3 CRT)
2260 X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT)
[all …]
A Dtest_suite_block_cipher.function28 /* That size is valid for a key or an input/output block. */
A Dtest_suite_net.function113 /* In principle, mbedtls_net_poll() with valid arguments should succeed.
A Dtest_suite_psa_crypto_metadata.function102 * possibly turn a valid encoding into another valid encoding. Here in
106 * The expected parity is even so that 0 is considered a valid encoding.
A Dtest_suite_asn1parse.function37 /* Since we have a valid element start (tag and length), retrieve and
234 * valid depending on what the trailing garbage is. */
335 /* An INTEGER with no content is not valid. */
A Dtest_suite_lms.function91 /* Test negative cases if the input data is valid */
A Dtest_suite_lmots.function91 /* Test negative cases if the input data is valid */
A Dtest_suite_bignum.function17 /* Only +1 and -1 are valid sign bits, not e.g. 0 */
1277 * is a valid value. However, negating it (`-n`) has undefined behavior
1399 /* Test mbedtls_mpi_mod_int(): never valid */
1403 /* Test mbedtls_mpi_random(): never valid */
A Dhost_test.function88 /* Read until we get a valid line */
268 * only. They are still valid for other compilers. Avoid this warning by
A Dtest_suite_ssl.data3115 Version config: valid client TLS 1.2 only
3119 Version config: valid client DTLS 1.2 only
3123 Version config: valid server TLS 1.2 only
3127 Version config: valid server DTLS 1.2 only
3147 Version config: valid client TLS 1.3 only
3155 Version config: valid server TLS 1.3 only
3179 Version config: valid client hybrid TLS 1.2/3
3187 Version config: valid server hybrid TLS 1.2/3
3195 Version config: valid client hybrid TLS 1.2/3, no TLS 1.2
3203 Version config: valid server hybrid TLS 1.2/3, no TLS 1.2
[all …]
A Dtest_suite_psa_crypto_pake.data25 PSA PAKE: duplicate a valid setup
A Dtest_suite_md.function30 * Test that mbedtls_md_list() only returns valid MDs.
/mbedtls/library/
A Dconstant_time.c137 mbedtls_ct_condition_t valid = mbedtls_ct_bool_and(mbedtls_ct_uint_ge(i, skip_head), in mbedtls_ct_memcmp_partial() local
139 diff |= mbedtls_ct_uint_if_else_0(valid, d); in mbedtls_ct_memcmp_partial()
/mbedtls/doxygen/
A Dmbedtls.doxyfile37 # This is perfectly valid as far as Doxygen is concerned. However, with
/mbedtls/docs/architecture/
A Dpsa-crypto-implementation-structure.md26 * checking PSA API arguments and translating them into valid arguments for the necessary calls to t…
159 * Attempt to perform an operation with a combination of key type and algorithm that is not valid or…
165 * `scripts/mbedtls_dev/asymmetric_key_data.py` contains valid key data for asymmetric key types.
/mbedtls/docs/proposed/
A Dpsa-driver-interface.md77 * `"prefix"` (mandatory, string). This must be a valid, non-empty prefix for a C identifier. All th…
373 * `PSA_KEY_DERIVATION_INPUT_TYPE_BYTES`: the step is valid and present and is a transparent byte st…
374 * `PSA_KEY_DERIVATION_INPUT_TYPE_KEY`: the step is valid and present and is a byte string passed vi…
375 * `PSA_KEY_DERIVATION_INPUT_TYPE_INTEGER`: the step is valid and present and is an integer. Call `p…
403 …` to the size of the key context in bytes. The key context buffer remains valid for the duration o…
409 * `PSA_ERROR_DOES_NOT_EXIST`: the input step is valid for this particular algorithm, but it is not …
685 The pointer output by `psa_crypto_driver_pake_get_password_key` is only valid until the "pake_setup…
785 All key creation entry points must ensure that the resulting key is valid as specified in the secti…
801valid key data. Key data is _valid_ if operations involving the key are guaranteed to work functio…
806 * On the other hand, it is acceptable for import to accept a key that cannot be verified as valid i…
[all …]
/mbedtls/tests/data_files/
A DReadme-x509.txt97 _trailing_space.crt: S7 + I1 both with trailing space (valid PEM)

Completed in 45 milliseconds

12