| /mbedtls/tests/suites/ |
| A D | test_suite_pkcs1_v21.data | 529 RSASSA-PSS Signature Example 1_1 (verify) 537 RSASSA-PSS Signature Example 1_2 (verify) 545 RSASSA-PSS Signature Example 1_3 (verify) 553 RSASSA-PSS Signature Example 1_4 (verify) 561 RSASSA-PSS Signature Example 1_5 (verify) 569 RSASSA-PSS Signature Example 1_6 (verify) 577 RSASSA-PSS Signature Example 2_1 (verify) 585 RSASSA-PSS Signature Example 2_2 (verify) 593 RSASSA-PSS Signature Example 2_3 (verify) 601 RSASSA-PSS Signature Example 2_4 (verify) [all …]
|
| A D | test_suite_ecdsa.data | 293 ECDSA restartable read-verify: max_ops=0 (disabled) 297 ECDSA restartable read-verify: max_ops=1 301 ECDSA restartable read-verify: max_ops=10000 305 ECDSA restartable read-verify: max_ops=250 373 ECDSA verify invalid pub key (not on curve), r=1, s=1 377 ECDSA verify invalid pub key (also not on curve), r=1, s=1 381 ECDSA verify invalid pub key (not on curve), r=12345, s=1 385 ECDSA verify invalid pub key (not on curve), r=1, s=12345 413 ECDSA verify valid public key, correct sig, 0 bytes of data 417 ECDSA verify valid pub key, correct sig, 1 byte of data [all …]
|
| A D | test_suite_psa_crypto_se_driver_hal.data | 4 # Run this test case a second time to verify that the library deinit 181 Import-sign-verify: sign in driver, ECDSA 185 Import-sign-verify: sign in driver then export_public, ECDSA 189 Import-sign-verify: sign in software, ECDSA 193 Generate-sign-verify: sign in driver, ECDSA 197 Generate-sign-verify: sign in driver then export_public, ECDSA 201 Generate-sign-verify: sign in software, ECDSA
|
| A D | test_suite_psa_crypto.data | 832 PSA key policy: MAC, neither sign nor verify 1647 PSA hash verify: bad arguments 2110 PSA MAC verify: CMAC-3DES (CAVP vector #95) 2134 PSA MAC verify: CMAC-AES-128 2142 PSA MAC verify multipart: CMAC-AES-128 4482 PSA sign/verify hash: RSA PKCS#1 v1.5, raw 4486 PSA sign/verify hash: RSA PKCS#1 v1.5 SHA-256 4650 PSA verify hash: RSA-528 PSS SHA-512, slen=0 4682 PSA verify hash: ECDSA SECP256R1, good 4870 PSA sign/verify message: RSA PSS SHA-256 [all …]
|
| A D | test_suite_pk.data | 361 ECDSA verify test vector #2 (bad) 405 ECDSA sign-verify: SECP192R1 409 ECDSA sign-verify: SECP256R1 413 ECDSA sign-verify: SECP384R1 417 ECDSA sign-verify: SECP521R1 421 ECDSA sign-verify: BP256R1 425 ECDSA sign-verify: BP512R1 429 EC(DSA) sign-verify: SECP192R1 433 EC_DH (no) sign-verify: SECP192R1 437 RSA sign-verify, PKCS1v1.5, SHA1 [all …]
|
| A D | test_suite_lmots.data | 1 LMOTS sign-verify test #1 6 LMOTS sign-verify test #2 11 LMOTS NULL-message sign-verify test 92 # verify. 98 # verify. 104 # verify.
|
| A D | test_suite_psa_crypto_hash.data | 285 PSA hash verify: SHA-1 289 PSA hash verify: SHA-224 293 PSA hash verify: SHA-256 297 PSA hash verify: SHA-384 301 PSA hash verify: SHA-512 305 PSA hash verify: MD5 309 PSA hash verify: RIPEMD160 313 PSA hash verify: SHA3-224 317 PSA hash verify: SHA3-256 321 PSA hash verify: SHA3-384 [all …]
|
| A D | test_suite_lms.data | 1 LMS sign-verify test 6 LMS NULL-message sign-verify test 79 # * hsslms verify tmp/lms message.bin 107 # * <hash-sigs/demo> verify tmp/lms message.bin 137 # * <hash-sigs/demo> verify tmp/lms message.bin 212 # test should fail to verify the signature.
|
| A D | test_suite_x509parse.data | 2624 X509 CRT verify long chain (max intermediate CA + 1) 2628 X509 CRT verify chain #1 (zero pathlen intermediate) 2632 X509 CRT verify chain #2 (zero pathlen root) 2636 X509 CRT verify chain #3 (nonzero pathlen root) 2648 X509 CRT verify chain #6 (nonzero maxpathlen root) 2696 X509 CRT verify chain #17 (SHA-512 profile) 3286 X509 CRT verify restart: trusted EE, max_ops=1 3294 X509 CRT verify restart: no intermediate, max_ops=1 3326 X509 CRT verify restart: one int, max_ops=1 3330 X509 CRT verify restart: one int, max_ops=30000 [all …]
|
| A D | test_suite_psa_crypto_driver_wrappers.data | 546 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 0 550 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 1 554 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 2 558 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 3 562 PSA MAC verify, through driver: HMAC-SHA-224 566 PSA MAC verify, fallback: HMAC-SHA-224 570 PSA MAC verify, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224 574 PSA MAC verify, through driver: CMAC-AES-128 578 PSA MAC verify, fallback: CMAC-AES-128 582 PSA MAC verify, driver reports error: CMAC-AES-128
|
| A D | test_suite_psa_crypto_se_driver_hal_mocks.data | 58 SE verification mock test: verify failed
|
| A D | test_suite_pk.function | 175 /* Get an available MD alg to be used in sign/verify tests. */ 719 /* unsupported operations: verify, decrypt, encrypt */ 1313 /* Do we leak memory when aborting? try verify then sign 1735 * Test it against the public operations (encrypt, verify) of a 1850 * - [EC only] verify with opaque context; 1851 * - verify that public keys of opaque and non-opaque contexts match; 1852 * - verify with non-opaque context. 1956 /* Create a new non-opaque PK context to verify the signature. */ 2670 /* Test #3: sign/verify with the following pattern: 2678 * or with ECDSA verify support but not signature, the signature might be [all …]
|
| A D | test_suite_lms.function | 121 /* Signatures of all sizes must not verify, whether shorter or longer */
|
| A D | test_suite_ecdsa.function | 250 /* generate and write signature, then read and verify it */ 319 /* generate and write signature, then read and verify it */
|
| A D | test_suite_lmots.function | 119 /* Signatures of all sizes must not verify, whether shorter or longer */
|
| A D | test_suite_pkparse.function | 307 * is to verify this enforcing by feeding the parse algorithm with a x25519
|
| A D | test_suite_psa_crypto.function | 3247 /* Call verify without calling setup beforehand. */ 3253 /* Call verify after finish. */ 3262 /* Call verify twice in a row. */ 3289 /* Call finish after calling verify. */ 3590 /* Call update after verify finish. */ 3611 /* Call verify finish twice in a row. */ 3621 /* Setup sign but try verify. */ 3632 /* Setup verify but try sign. */ 6765 /* Test calling verify on encryption. */ 7958 * verify passes all inputs to start. --- */ [all …]
|
| A D | test_suite_psa_crypto_persistent_key.function | 3 /* The tests in this module verify the contents of key store files. They
|
| /mbedtls/programs/x509/ |
| A D | cert_app.c | 132 int verify = 0; in main() local 239 verify = 1; in main() 247 verify = 1; in main() 260 verify = 1; in main() 314 if (verify) { in main() 376 if (verify) { in main()
|
| /mbedtls/library/ |
| A D | memory_buffer_alloc.c | 53 int verify; member 286 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc() 350 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc() 476 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_FREE) && verify_chain() != 0) { in buffer_alloc_free() 481 void mbedtls_memory_buffer_set_verify(int verify) in mbedtls_memory_buffer_set_verify() argument 483 heap.verify = verify; in mbedtls_memory_buffer_set_verify()
|
| /mbedtls/include/mbedtls/ |
| A D | memory_buffer_alloc.h | 71 void mbedtls_memory_buffer_set_verify(int verify);
|
| /mbedtls/3rdparty/p256-m/p256-m/ |
| A D | README.md | 183 certificates (otherwise, add one 'verify' for each link in the peer's 224 | ECDSA verify | 752 | 824 | 233 | ECDSA verify | 700 | 808 | 247 | ECDSA verify | 1976 | 1130 | 257 | ECDSA verify | 309 | 210 | 267 | ECDSA verify | 24 | 15 | 279 | ECDSA verify | 2279 | 1888 | 379 for ECDSA verify where all data is public);
|
| /mbedtls/programs/ |
| A D | README.md | 28 …rify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short string. 38 …(pkey/rsa_verify.c): loads an RSA private/public key and uses it to sign/verify a short string wit… 40 …y/rsa_verify_pss.c): loads an RSA private/public key and uses it to sign/verify a short string wit…
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | psa-legacy-bridges.md | 251 …re is only a default that can be overridden by calling `mbedtls_pk_{sign,verify}_ext`. Also there … 284 …rithm policy is `PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL… 285 …orithm policy is `PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL… 286 …* For an `MBEDTLS_PK_ECKEY` or `MBEDTLS_PK_ECDSA` with a sign/verify usage, the algorithm policy i… 311 …icy (`psa_get_key_algorithm`) if that is a matching operation type (sign/verify, encrypt/decrypt),… 313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the… 341 …signature format used by `mbedtls_pk_{sign,verify}{,_ext}` and the signature format used by `psa_{…
|
| /mbedtls/docs/architecture/testing/ |
| A D | driver-interface-test-strategy.md | 55 …ust not reach the driver, call the API function with such parameters and verify that the driver me… 125 …ic operations, …) must be exercised in at least one build. The test must verify that the driver co…
|