/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_generate_key.generated.data | 3 PSA AES 128-bit 7 PSA AES 192-bit 11 PSA AES 256-bit 15 PSA ARIA 128-bit 19 PSA ARIA 192-bit 23 PSA ARIA 256-bit 27 PSA CAMELLIA 128-bit 31 PSA CAMELLIA 192-bit 35 PSA CAMELLIA 256-bit 39 PSA CHACHA20 256-bit [all …]
|
D | test_suite_psa_crypto_not_supported.generated.data | 3 PSA import AES 128-bit not supported 7 PSA generate AES 128-bit not supported 11 PSA import AES 192-bit not supported 15 PSA generate AES 192-bit not supported 19 PSA import AES 256-bit not supported 23 PSA generate AES 256-bit not supported 27 PSA import ARIA 128-bit not supported 31 PSA generate ARIA 128-bit not supported 35 PSA import ARIA 192-bit not supported 39 PSA generate ARIA 192-bit not supported [all …]
|
D | test_suite_psa_crypto_util.data | 1 ECDSA Raw -> DER, 256bit, Success 5 ECDSA Raw -> DER, 256bit, DER buffer too small 13 ECDSA Raw -> DER, very large input (536-bit) 16 ECDSA Raw -> DER, very large input (1016-bit) 19 ECDSA Raw -> DER, 256bit, Null r 23 ECDSA Raw -> DER, 256bit, Null s 27 ECDSA Raw -> DER, 256bit, r with MSb set 31 ECDSA Raw -> DER, 256bit, s with MSb set 35 ECDSA Raw -> DER, 256bit, both r and s with MSb set 39 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data [all …]
|
D | test_suite_alignment.data | 1 Aligned 16-bit access 4 Aligned 32-bit access 7 Aligned 64-bit access 10 Unaligned 16-bit access offset=1 13 Unaligned 32-bit access offset=1 16 Unaligned 64-bit access offset=1 19 Unaligned 16-bit access offset=4 22 Unaligned 32-bit access offset=4 25 Unaligned 64-bit access offset=4 28 Unaligned 16-bit access offset=7 [all …]
|
D | test_suite_psa_crypto_storage_format.current.data | 107 save type: AES 128-bit 111 save type: AES 128-bit, AEAD_SHORT(CCM,4) 115 save type: AES 128-bit, AEAD_SHORT(CCM,14) 119 save type: AES 128-bit, AEAD_SHORT(CCM,16) 123 save type: AES 128-bit, CBC_MAC 127 save type: AES 128-bit, CBC_NO_PADDING 131 save type: AES 128-bit, CBC_PKCS7 135 save type: AES 128-bit, CCM 139 save type: AES 128-bit, CCM_STAR_NO_TAG 143 save type: AES 128-bit, CFB [all …]
|
D | test_suite_psa_crypto_storage_format.v0.data | 195 read type: AES 128-bit 199 read type: AES 128-bit, AEAD_SHORT(CCM,4) 203 read type: AES 128-bit, AEAD_SHORT(CCM,14) 207 read type: AES 128-bit, AEAD_SHORT(CCM,16) 211 read type: AES 128-bit, CBC_MAC 215 read type: AES 128-bit, CBC_NO_PADDING 219 read type: AES 128-bit, CBC_PKCS7 223 read type: AES 128-bit, CCM 227 read type: AES 128-bit, CCM_STAR_NO_TAG 231 read type: AES 128-bit, CFB [all …]
|
D | test_suite_dhm.data | 4 Diffie-Hellman full exchange: 5-bit, x_size=3 7 Diffie-Hellman full exchange: 5-bit, x_size=2 12 Diffie-Hellman full exchange: 5-bit #1 15 Diffie-Hellman full exchange: 5-bit #2 18 Diffie-Hellman full exchange: 5-bit #3 21 Diffie-Hellman full exchange: 5-bit #4 24 Diffie-Hellman full exchange: 5-bit #5 31 Diffie-Hellman full exchange: 97-bit, x_size=14 34 Diffie-Hellman full exchange: 97-bit #1 37 Diffie-Hellman full exchange: 97-bit #2 [all …]
|
D | test_suite_pkparse.data | 33 Parse RSA Key #9 (2048-bit, DES Encrypted) 37 Parse RSA Key #10 (2048-bit, 3DES Encrypted) 41 Parse RSA Key #11 (2048-bit, AES-128 Encrypted) 45 Parse RSA Key #12 (2048-bit, AES-192 Encrypted) 49 Parse RSA Key #13 (2048-bit, AES-256 Encrypted) 53 Parse RSA Key #14 (4096-bit, DES Encrypted) 57 Parse RSA Key #15 (4096-bit, 3DES Encrypted) 61 Parse RSA Key #16 (4096-bit, AES-128 Encrypted) 65 Parse RSA Key #17 (4096-bit, AES-192 Encrypted) 69 Parse RSA Key #18 (4096-bit, AES-256 Encrypted) [all …]
|
D | test_suite_bignum_core.misc.data | 46 Test mbedtls_mpi_core_io_be #15 (One limb, 32 bit) 50 Test mbedtls_mpi_core_io_be #16 (One limb, 64 bit) 134 Test mbedtls_mpi_core_bitlen 764-bit 170 mbedtls_mpi_core_lt_ct: x>y (63 bit x, y first byte greater) 173 mbedtls_mpi_core_lt_ct: x<y (63 bit y, x first byte greater) 176 mbedtls_mpi_core_lt_ct: x>y (64 bit x, y=x-1) 179 mbedtls_mpi_core_lt_ct: x<y (64 bit y, x=y-1) 182 mbedtls_mpi_core_lt_ct: x>y (64 bit x, y=1) 185 mbedtls_mpi_core_lt_ct: x<y (64 bit y, x=1) 188 mbedtls_mpi_core_lt_ct: x>y (64 bit x, y=0) [all …]
|
D | test_suite_rsa.data | 401 RSA Generate Key - 1024 bit key 405 RSA Generate Key - 2048 bit key 524 RSA Import (N,P,Q,D,E) 512-bit complete pair 527 RSA Import (N,-,-,-,E) 512-bit public 530 RSA Import (N,P,Q,D,E) 513-bit complete pair 533 RSA Import (N,-,-,-,E) 513-bit public 536 RSA Import (N,P,Q,D,E) 514-bit complete pair 539 RSA Import (N,-,-,-,E) 514-bit public 542 RSA Import (N,P,Q,D,E) 515-bit complete pair 545 RSA Import (N,-,-,-,E) 515-bit public [all …]
|
D | test_suite_psa_crypto_persistent_key.data | 79 import/export persistent key RSA public key: good, 1024-bit 83 import/export persistent key RSA keypair: good, 1024-bit 90 import/export persistent key RSA public key file not exist: 1024-bit 94 import/export persistent key RSA keypair file not exist: 1024-bit 105 import/export persistent key RSA public key with restart: good, 1024-bit 109 import/export persistent key RSA keypair with restart: good, 1024-bit 116 import/export persistent key RSA public key file not exist with restart: 1024-bit 120 import/export persistent key RSA keypair file not exist with restart: 1024-bit
|
D | test_suite_bignum.misc.data | 145 Test mbedtls_mpi_bitlen 764-bit 343 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #1 346 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #2 349 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #3 352 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #4 355 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #5 358 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #1 361 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #2 364 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #3 367 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #4 [all …]
|
D | test_suite_bignum_mod.misc.data | 52 mbedtls_mpi_mod_inv 32-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-… 56 mbedtls_mpi_mod_inv 32-bit Mont. form - A == 0 60 mbedtls_mpi_mod_inv 32-bit Mont. form - A too long 64 mbedtls_mpi_mod_inv 32-bit Mont. form - A too short 68 mbedtls_mpi_mod_inv 64-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-… 72 mbedtls_mpi_mod_inv 64-bit Mont. form - A == 0 76 mbedtls_mpi_mod_inv 64-bit Mont. form - A too long 80 mbedtls_mpi_mod_inv 64-bit Mont. form - A too short
|
D | test_suite_aes.xts.data | 36 # 128-bit keys with 32 byte sector 48 # 128-bit keys with 512 byte sector 69 # 256-bit keys with 512 byte sector 92 # 128-bit keys with sector size not evenly divisible by 16 bytes
|
D | test_suite_ctr_drbg.function | 460 // test all increments from 2^n - 1 to 2^n (i.e. where we roll over into the next bit) 467 int bit = i % 8; 469 c[15 - byte] |= 1 << bit; 474 // now generate a reference result equal to 2^n - i.e. set only bit (n + 1) 476 int bit = n % 8; 479 r[15 - byte] = 1 << bit;
|
D | test_suite_bignum_random.function | 64 * of unset bits after the most significant bit. 66 * Let n be the bit-size of b, i.e. the integer such that 2^n <= b < 2^{n+1}. 95 /* Shift the most significant bit of x to position 8 and mask it out */ 282 * value with bit b set has been generated. */ 350 /* Assert that each bit has been set in at least one result and 355 * As an exception, the top bit may legitimately never be set
|
D | test_suite_oid.data | 126 OID get numeric string - no final / all bytes have top bit set 145 OID get numeric string - 32-bit overflow 148 OID get numeric string - 32-bit overflow, second subidentifier
|
D | test_suite_ecp.data | 284 ECP read binary #8 (Curve25519, masked first bit) 461 ECP check privkey #9 (montgomery curve25519, bit 0 set) 465 ECP check privkey #10 (montgomery curve25519, bit 1 set) 469 ECP check privkey #11 (montgomery curve25519, bit 2 set) 493 ECP check privkey #17 (montgomery curve448, bit 0 set) 497 ECP check privkey #18 (montgomery curve448, bit 1 set) 569 ECP generate Montgomery key: Curve25519, clear higher bit 587 ECP generate Montgomery key: Curve448, set high bit 660 ECP read key #5 (Curve25519, most significant bit set) 664 ECP read key #6 (Curve25519, second most significant bit unset) [all …]
|
D | test_suite_psa_its.function | 24 16 + /*UID (64-bit number in hex)*/ \ 25 16 + /*UID (64-bit number in hex)*/ \ 32 /* Break up the UID into two 32-bit pieces so as not to rely on
|
D | test_suite_pkcs1_v21.data | 1057 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 1065 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 1069 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0 1073 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 1077 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0 1081 RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large) 1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 1089 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 1093 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
|
/mbedtls-latest/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 41 …acing documentation: according to the user-facing documentation, arbitrary 32-bit values are valid. 51 All integers are encoded in little-endian order in 8-bit bytes. 72 Assumption: ITS provides a 32-bit file identifier namespace. The Crypto service can use arbitrary f… 116 …name is just the key identifier as defined in the PSA crypto specification. This is a 32-bit value. 117 …lling partition identifier provided to the server by the partition manager. This is a 64-bit value. 133 Assumption: ITS provides a 64-bit file identifier namespace. The Crypto service can use arbitrary f… 143 Assumption: ITS provides a 64-bit file identifier namespace. The entity using the crypto library ca… 166 It would simplify things to always have a 32-bit owner, with a nonzero value, and thus reserve the … 188 …_its", key_id)`: a key or non-key file. The `key_id` in the name is the 64-bit file identifier, wh… 201 All integers are encoded in little-endian order in 8-bit bytes. [all …]
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 6 especially suited to constrained 32-bit environments. It's written in standard 93 integer division, and for multiplication by default it only uses 16x16->32 bit 94 unsigned multiplication. On cores which have a constant-time 32x32->64 bit 270 _64-bit Intel_ (i7-6500U at 2.50GHz) laptop running Ubuntu 20.04 304 faster (though a bit larger) than the mixed affine-Jacobian formulas 306 - p256-m uses bits of inline assembly for 64-bit multiplication on the 458 - The number of limbs is hard-coded to 8. For other 256-bit curves, nothing to 498 - This layer assumes that the bit size of the curve's order n is the same as 503 - The bit size of the curve's order is hard-coded in `scalar_mult()`. For 506 significant bit of the curve's order n is set in order to avoid a special [all …]
|
/mbedtls-latest/library/ |
D | asn1write.c | 274 unsigned char bit; in mbedtls_asn1_write_named_bitstring() local 289 bit = cur_byte_shifted & 0x1; in mbedtls_asn1_write_named_bitstring() 292 if (bit != 0) { in mbedtls_asn1_write_named_bitstring()
|
/mbedtls-latest/scripts/ |
D | generate_psa_constants.py | 296 return '\n'.join([self._make_bit_test('usage', bit) 297 for bit in sorted(self.key_usage_flags)])
|
/mbedtls-latest/ |
D | Makefile | 120 CTR_DRBG_128_BIT_KEY_WARN_L2=**** Using 128-bit keys for CTR_DRBG limits the security of generated… 121 CTR_DRBG_128_BIT_KEY_WARN_L3=**** keys and operations that use random values generated to 128-bit …
|