Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 42) sorted by relevance

12

/mbedtls/tests/suites/
A Dtest_suite_pkcs1_v21.data529 RSASSA-PSS Signature Example 1_1 (verify)
537 RSASSA-PSS Signature Example 1_2 (verify)
545 RSASSA-PSS Signature Example 1_3 (verify)
553 RSASSA-PSS Signature Example 1_4 (verify)
561 RSASSA-PSS Signature Example 1_5 (verify)
569 RSASSA-PSS Signature Example 1_6 (verify)
577 RSASSA-PSS Signature Example 2_1 (verify)
585 RSASSA-PSS Signature Example 2_2 (verify)
593 RSASSA-PSS Signature Example 2_3 (verify)
601 RSASSA-PSS Signature Example 2_4 (verify)
[all …]
A Dtest_suite_ecdsa.data293 ECDSA restartable read-verify: max_ops=0 (disabled)
297 ECDSA restartable read-verify: max_ops=1
301 ECDSA restartable read-verify: max_ops=10000
305 ECDSA restartable read-verify: max_ops=250
373 ECDSA verify invalid pub key (not on curve), r=1, s=1
377 ECDSA verify invalid pub key (also not on curve), r=1, s=1
381 ECDSA verify invalid pub key (not on curve), r=12345, s=1
385 ECDSA verify invalid pub key (not on curve), r=1, s=12345
413 ECDSA verify valid public key, correct sig, 0 bytes of data
417 ECDSA verify valid pub key, correct sig, 1 byte of data
[all …]
A Dtest_suite_psa_crypto_se_driver_hal.data4 # Run this test case a second time to verify that the library deinit
181 Import-sign-verify: sign in driver, ECDSA
185 Import-sign-verify: sign in driver then export_public, ECDSA
189 Import-sign-verify: sign in software, ECDSA
193 Generate-sign-verify: sign in driver, ECDSA
197 Generate-sign-verify: sign in driver then export_public, ECDSA
201 Generate-sign-verify: sign in software, ECDSA
A Dtest_suite_psa_crypto.data832 PSA key policy: MAC, neither sign nor verify
1647 PSA hash verify: bad arguments
2110 PSA MAC verify: CMAC-3DES (CAVP vector #95)
2134 PSA MAC verify: CMAC-AES-128
2142 PSA MAC verify multipart: CMAC-AES-128
4482 PSA sign/verify hash: RSA PKCS#1 v1.5, raw
4486 PSA sign/verify hash: RSA PKCS#1 v1.5 SHA-256
4650 PSA verify hash: RSA-528 PSS SHA-512, slen=0
4682 PSA verify hash: ECDSA SECP256R1, good
4870 PSA sign/verify message: RSA PSS SHA-256
[all …]
A Dtest_suite_pk.data361 ECDSA verify test vector #2 (bad)
405 ECDSA sign-verify: SECP192R1
409 ECDSA sign-verify: SECP256R1
413 ECDSA sign-verify: SECP384R1
417 ECDSA sign-verify: SECP521R1
421 ECDSA sign-verify: BP256R1
425 ECDSA sign-verify: BP512R1
429 EC(DSA) sign-verify: SECP192R1
433 EC_DH (no) sign-verify: SECP192R1
437 RSA sign-verify, PKCS1v1.5, SHA1
[all …]
A Dtest_suite_lmots.data1 LMOTS sign-verify test #1
6 LMOTS sign-verify test #2
11 LMOTS NULL-message sign-verify test
92 # verify.
98 # verify.
104 # verify.
A Dtest_suite_psa_crypto_hash.data285 PSA hash verify: SHA-1
289 PSA hash verify: SHA-224
293 PSA hash verify: SHA-256
297 PSA hash verify: SHA-384
301 PSA hash verify: SHA-512
305 PSA hash verify: MD5
309 PSA hash verify: RIPEMD160
313 PSA hash verify: SHA3-224
317 PSA hash verify: SHA3-256
321 PSA hash verify: SHA3-384
[all …]
A Dtest_suite_lms.data1 LMS sign-verify test
6 LMS NULL-message sign-verify test
79 # * hsslms verify tmp/lms message.bin
107 # * <hash-sigs/demo> verify tmp/lms message.bin
137 # * <hash-sigs/demo> verify tmp/lms message.bin
212 # test should fail to verify the signature.
A Dtest_suite_x509parse.data2624 X509 CRT verify long chain (max intermediate CA + 1)
2628 X509 CRT verify chain #1 (zero pathlen intermediate)
2632 X509 CRT verify chain #2 (zero pathlen root)
2636 X509 CRT verify chain #3 (nonzero pathlen root)
2648 X509 CRT verify chain #6 (nonzero maxpathlen root)
2696 X509 CRT verify chain #17 (SHA-512 profile)
3286 X509 CRT verify restart: trusted EE, max_ops=1
3294 X509 CRT verify restart: no intermediate, max_ops=1
3326 X509 CRT verify restart: one int, max_ops=1
3330 X509 CRT verify restart: one int, max_ops=30000
[all …]
A Dtest_suite_psa_crypto_driver_wrappers.data546 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 0
550 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 1
554 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 2
558 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 3
562 PSA MAC verify, through driver: HMAC-SHA-224
566 PSA MAC verify, fallback: HMAC-SHA-224
570 PSA MAC verify, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224
574 PSA MAC verify, through driver: CMAC-AES-128
578 PSA MAC verify, fallback: CMAC-AES-128
582 PSA MAC verify, driver reports error: CMAC-AES-128
A Dtest_suite_psa_crypto_se_driver_hal_mocks.data58 SE verification mock test: verify failed
A Dtest_suite_pk.function175 /* Get an available MD alg to be used in sign/verify tests. */
719 /* unsupported operations: verify, decrypt, encrypt */
1313 /* Do we leak memory when aborting? try verify then sign
1735 * Test it against the public operations (encrypt, verify) of a
1850 * - [EC only] verify with opaque context;
1851 * - verify that public keys of opaque and non-opaque contexts match;
1852 * - verify with non-opaque context.
1956 /* Create a new non-opaque PK context to verify the signature. */
2670 /* Test #3: sign/verify with the following pattern:
2678 * or with ECDSA verify support but not signature, the signature might be
[all …]
A Dtest_suite_lms.function121 /* Signatures of all sizes must not verify, whether shorter or longer */
A Dtest_suite_ecdsa.function250 /* generate and write signature, then read and verify it */
319 /* generate and write signature, then read and verify it */
A Dtest_suite_lmots.function119 /* Signatures of all sizes must not verify, whether shorter or longer */
A Dtest_suite_pkparse.function307 * is to verify this enforcing by feeding the parse algorithm with a x25519
A Dtest_suite_psa_crypto.function3247 /* Call verify without calling setup beforehand. */
3253 /* Call verify after finish. */
3262 /* Call verify twice in a row. */
3289 /* Call finish after calling verify. */
3590 /* Call update after verify finish. */
3611 /* Call verify finish twice in a row. */
3621 /* Setup sign but try verify. */
3632 /* Setup verify but try sign. */
6765 /* Test calling verify on encryption. */
7958 * verify passes all inputs to start. --- */
[all …]
A Dtest_suite_psa_crypto_persistent_key.function3 /* The tests in this module verify the contents of key store files. They
/mbedtls/programs/x509/
A Dcert_app.c132 int verify = 0; in main() local
239 verify = 1; in main()
247 verify = 1; in main()
260 verify = 1; in main()
314 if (verify) { in main()
376 if (verify) { in main()
/mbedtls/library/
A Dmemory_buffer_alloc.c53 int verify; member
286 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc()
350 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc()
476 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_FREE) && verify_chain() != 0) { in buffer_alloc_free()
481 void mbedtls_memory_buffer_set_verify(int verify) in mbedtls_memory_buffer_set_verify() argument
483 heap.verify = verify; in mbedtls_memory_buffer_set_verify()
/mbedtls/include/mbedtls/
A Dmemory_buffer_alloc.h71 void mbedtls_memory_buffer_set_verify(int verify);
/mbedtls/3rdparty/p256-m/p256-m/
A DREADME.md183 certificates (otherwise, add one 'verify' for each link in the peer's
224 | ECDSA verify | 752 | 824 |
233 | ECDSA verify | 700 | 808 |
247 | ECDSA verify | 1976 | 1130 |
257 | ECDSA verify | 309 | 210 |
267 | ECDSA verify | 24 | 15 |
279 | ECDSA verify | 2279 | 1888 |
379 for ECDSA verify where all data is public);
/mbedtls/programs/
A DREADME.md28 …rify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short string.
38 …(pkey/rsa_verify.c): loads an RSA private/public key and uses it to sign/verify a short string wit…
40 …y/rsa_verify_pss.c): loads an RSA private/public key and uses it to sign/verify a short string wit…
/mbedtls/docs/architecture/psa-migration/
A Dpsa-legacy-bridges.md251 …re is only a default that can be overridden by calling `mbedtls_pk_{sign,verify}_ext`. Also there …
284 …rithm policy is `PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL…
285 …orithm policy is `PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL…
286 …* For an `MBEDTLS_PK_ECKEY` or `MBEDTLS_PK_ECDSA` with a sign/verify usage, the algorithm policy i…
311 …icy (`psa_get_key_algorithm`) if that is a matching operation type (sign/verify, encrypt/decrypt),…
313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the…
341 …signature format used by `mbedtls_pk_{sign,verify}{,_ext}` and the signature format used by `psa_{…
/mbedtls/docs/architecture/testing/
A Ddriver-interface-test-strategy.md55 …ust not reach the driver, call the API function with such parameters and verify that the driver me…
125 …ic operations, …) must be exercised in at least one build. The test must verify that the driver co…

Completed in 86 milliseconds

12