Home
last modified time | relevance | path

Searched refs:bit (Results 1 – 25 of 72) sorted by relevance

123

/mbedtls-latest/tests/suites/
Dtest_suite_psa_crypto_generate_key.generated.data3 PSA AES 128-bit
7 PSA AES 192-bit
11 PSA AES 256-bit
15 PSA ARIA 128-bit
19 PSA ARIA 192-bit
23 PSA ARIA 256-bit
27 PSA CAMELLIA 128-bit
31 PSA CAMELLIA 192-bit
35 PSA CAMELLIA 256-bit
39 PSA CHACHA20 256-bit
[all …]
Dtest_suite_psa_crypto_not_supported.generated.data3 PSA import AES 128-bit not supported
7 PSA generate AES 128-bit not supported
11 PSA import AES 192-bit not supported
15 PSA generate AES 192-bit not supported
19 PSA import AES 256-bit not supported
23 PSA generate AES 256-bit not supported
27 PSA import ARIA 128-bit not supported
31 PSA generate ARIA 128-bit not supported
35 PSA import ARIA 192-bit not supported
39 PSA generate ARIA 192-bit not supported
[all …]
Dtest_suite_psa_crypto_util.data1 ECDSA Raw -> DER, 256bit, Success
5 ECDSA Raw -> DER, 256bit, DER buffer too small
13 ECDSA Raw -> DER, very large input (536-bit)
16 ECDSA Raw -> DER, very large input (1016-bit)
19 ECDSA Raw -> DER, 256bit, Null r
23 ECDSA Raw -> DER, 256bit, Null s
27 ECDSA Raw -> DER, 256bit, r with MSb set
31 ECDSA Raw -> DER, 256bit, s with MSb set
35 ECDSA Raw -> DER, 256bit, both r and s with MSb set
39 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data
[all …]
Dtest_suite_alignment.data1 Aligned 16-bit access
4 Aligned 32-bit access
7 Aligned 64-bit access
10 Unaligned 16-bit access offset=1
13 Unaligned 32-bit access offset=1
16 Unaligned 64-bit access offset=1
19 Unaligned 16-bit access offset=4
22 Unaligned 32-bit access offset=4
25 Unaligned 64-bit access offset=4
28 Unaligned 16-bit access offset=7
[all …]
Dtest_suite_psa_crypto_storage_format.current.data107 save type: AES 128-bit
111 save type: AES 128-bit, AEAD_SHORT(CCM,4)
115 save type: AES 128-bit, AEAD_SHORT(CCM,14)
119 save type: AES 128-bit, AEAD_SHORT(CCM,16)
123 save type: AES 128-bit, CBC_MAC
127 save type: AES 128-bit, CBC_NO_PADDING
131 save type: AES 128-bit, CBC_PKCS7
135 save type: AES 128-bit, CCM
139 save type: AES 128-bit, CCM_STAR_NO_TAG
143 save type: AES 128-bit, CFB
[all …]
Dtest_suite_psa_crypto_storage_format.v0.data195 read type: AES 128-bit
199 read type: AES 128-bit, AEAD_SHORT(CCM,4)
203 read type: AES 128-bit, AEAD_SHORT(CCM,14)
207 read type: AES 128-bit, AEAD_SHORT(CCM,16)
211 read type: AES 128-bit, CBC_MAC
215 read type: AES 128-bit, CBC_NO_PADDING
219 read type: AES 128-bit, CBC_PKCS7
223 read type: AES 128-bit, CCM
227 read type: AES 128-bit, CCM_STAR_NO_TAG
231 read type: AES 128-bit, CFB
[all …]
Dtest_suite_dhm.data4 Diffie-Hellman full exchange: 5-bit, x_size=3
7 Diffie-Hellman full exchange: 5-bit, x_size=2
12 Diffie-Hellman full exchange: 5-bit #1
15 Diffie-Hellman full exchange: 5-bit #2
18 Diffie-Hellman full exchange: 5-bit #3
21 Diffie-Hellman full exchange: 5-bit #4
24 Diffie-Hellman full exchange: 5-bit #5
31 Diffie-Hellman full exchange: 97-bit, x_size=14
34 Diffie-Hellman full exchange: 97-bit #1
37 Diffie-Hellman full exchange: 97-bit #2
[all …]
Dtest_suite_pkparse.data33 Parse RSA Key #9 (2048-bit, DES Encrypted)
37 Parse RSA Key #10 (2048-bit, 3DES Encrypted)
41 Parse RSA Key #11 (2048-bit, AES-128 Encrypted)
45 Parse RSA Key #12 (2048-bit, AES-192 Encrypted)
49 Parse RSA Key #13 (2048-bit, AES-256 Encrypted)
53 Parse RSA Key #14 (4096-bit, DES Encrypted)
57 Parse RSA Key #15 (4096-bit, 3DES Encrypted)
61 Parse RSA Key #16 (4096-bit, AES-128 Encrypted)
65 Parse RSA Key #17 (4096-bit, AES-192 Encrypted)
69 Parse RSA Key #18 (4096-bit, AES-256 Encrypted)
[all …]
Dtest_suite_bignum_core.misc.data46 Test mbedtls_mpi_core_io_be #15 (One limb, 32 bit)
50 Test mbedtls_mpi_core_io_be #16 (One limb, 64 bit)
134 Test mbedtls_mpi_core_bitlen 764-bit
170 mbedtls_mpi_core_lt_ct: x>y (63 bit x, y first byte greater)
173 mbedtls_mpi_core_lt_ct: x<y (63 bit y, x first byte greater)
176 mbedtls_mpi_core_lt_ct: x>y (64 bit x, y=x-1)
179 mbedtls_mpi_core_lt_ct: x<y (64 bit y, x=y-1)
182 mbedtls_mpi_core_lt_ct: x>y (64 bit x, y=1)
185 mbedtls_mpi_core_lt_ct: x<y (64 bit y, x=1)
188 mbedtls_mpi_core_lt_ct: x>y (64 bit x, y=0)
[all …]
Dtest_suite_rsa.data401 RSA Generate Key - 1024 bit key
405 RSA Generate Key - 2048 bit key
524 RSA Import (N,P,Q,D,E) 512-bit complete pair
527 RSA Import (N,-,-,-,E) 512-bit public
530 RSA Import (N,P,Q,D,E) 513-bit complete pair
533 RSA Import (N,-,-,-,E) 513-bit public
536 RSA Import (N,P,Q,D,E) 514-bit complete pair
539 RSA Import (N,-,-,-,E) 514-bit public
542 RSA Import (N,P,Q,D,E) 515-bit complete pair
545 RSA Import (N,-,-,-,E) 515-bit public
[all …]
Dtest_suite_psa_crypto_persistent_key.data79 import/export persistent key RSA public key: good, 1024-bit
83 import/export persistent key RSA keypair: good, 1024-bit
90 import/export persistent key RSA public key file not exist: 1024-bit
94 import/export persistent key RSA keypair file not exist: 1024-bit
105 import/export persistent key RSA public key with restart: good, 1024-bit
109 import/export persistent key RSA keypair with restart: good, 1024-bit
116 import/export persistent key RSA public key file not exist with restart: 1024-bit
120 import/export persistent key RSA keypair file not exist with restart: 1024-bit
Dtest_suite_bignum.misc.data145 Test mbedtls_mpi_bitlen 764-bit
343 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #1
346 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #2
349 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #3
352 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #4
355 Base test mbedtls_mpi_lt_mpi_ct (corner case - 64 bit) #5
358 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #1
361 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #2
364 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #3
367 Base test mbedtls_mpi_lt_mpi_ct (corner case - 32 bit) #4
[all …]
Dtest_suite_bignum_mod.misc.data52 mbedtls_mpi_mod_inv 32-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-…
56 mbedtls_mpi_mod_inv 32-bit Mont. form - A == 0
60 mbedtls_mpi_mod_inv 32-bit Mont. form - A too long
64 mbedtls_mpi_mod_inv 32-bit Mont. form - A too short
68 mbedtls_mpi_mod_inv 64-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-…
72 mbedtls_mpi_mod_inv 64-bit Mont. form - A == 0
76 mbedtls_mpi_mod_inv 64-bit Mont. form - A too long
80 mbedtls_mpi_mod_inv 64-bit Mont. form - A too short
Dtest_suite_aes.xts.data36 # 128-bit keys with 32 byte sector
48 # 128-bit keys with 512 byte sector
69 # 256-bit keys with 512 byte sector
92 # 128-bit keys with sector size not evenly divisible by 16 bytes
Dtest_suite_ctr_drbg.function460 // test all increments from 2^n - 1 to 2^n (i.e. where we roll over into the next bit)
467 int bit = i % 8;
469 c[15 - byte] |= 1 << bit;
474 // now generate a reference result equal to 2^n - i.e. set only bit (n + 1)
476 int bit = n % 8;
479 r[15 - byte] = 1 << bit;
Dtest_suite_bignum_random.function64 * of unset bits after the most significant bit.
66 * Let n be the bit-size of b, i.e. the integer such that 2^n <= b < 2^{n+1}.
95 /* Shift the most significant bit of x to position 8 and mask it out */
282 * value with bit b set has been generated. */
350 /* Assert that each bit has been set in at least one result and
355 * As an exception, the top bit may legitimately never be set
Dtest_suite_oid.data126 OID get numeric string - no final / all bytes have top bit set
145 OID get numeric string - 32-bit overflow
148 OID get numeric string - 32-bit overflow, second subidentifier
Dtest_suite_ecp.data284 ECP read binary #8 (Curve25519, masked first bit)
461 ECP check privkey #9 (montgomery curve25519, bit 0 set)
465 ECP check privkey #10 (montgomery curve25519, bit 1 set)
469 ECP check privkey #11 (montgomery curve25519, bit 2 set)
493 ECP check privkey #17 (montgomery curve448, bit 0 set)
497 ECP check privkey #18 (montgomery curve448, bit 1 set)
569 ECP generate Montgomery key: Curve25519, clear higher bit
587 ECP generate Montgomery key: Curve448, set high bit
660 ECP read key #5 (Curve25519, most significant bit set)
664 ECP read key #6 (Curve25519, second most significant bit unset)
[all …]
Dtest_suite_psa_its.function24 16 + /*UID (64-bit number in hex)*/ \
25 16 + /*UID (64-bit number in hex)*/ \
32 /* Break up the UID into two 32-bit pieces so as not to rely on
Dtest_suite_pkcs1_v21.data1057 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature
1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature
1065 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature
1069 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0
1073 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature
1077 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0
1081 RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large)
1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature
1089 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature
1093 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature
/mbedtls-latest/docs/architecture/
Dmbed-crypto-storage-specification.md41 …acing documentation: according to the user-facing documentation, arbitrary 32-bit values are valid.
51 All integers are encoded in little-endian order in 8-bit bytes.
72 Assumption: ITS provides a 32-bit file identifier namespace. The Crypto service can use arbitrary f…
116 …name is just the key identifier as defined in the PSA crypto specification. This is a 32-bit value.
117 …lling partition identifier provided to the server by the partition manager. This is a 64-bit value.
133 Assumption: ITS provides a 64-bit file identifier namespace. The Crypto service can use arbitrary f…
143 Assumption: ITS provides a 64-bit file identifier namespace. The entity using the crypto library ca…
166 It would simplify things to always have a 32-bit owner, with a nonzero value, and thus reserve the …
188 …_its", key_id)`: a key or non-key file. The `key_id` in the name is the 64-bit file identifier, wh…
201 All integers are encoded in little-endian order in 8-bit bytes.
[all …]
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md6 especially suited to constrained 32-bit environments. It's written in standard
93 integer division, and for multiplication by default it only uses 16x16->32 bit
94 unsigned multiplication. On cores which have a constant-time 32x32->64 bit
270 _64-bit Intel_ (i7-6500U at 2.50GHz) laptop running Ubuntu 20.04
304 faster (though a bit larger) than the mixed affine-Jacobian formulas
306 - p256-m uses bits of inline assembly for 64-bit multiplication on the
458 - The number of limbs is hard-coded to 8. For other 256-bit curves, nothing to
498 - This layer assumes that the bit size of the curve's order n is the same as
503 - The bit size of the curve's order is hard-coded in `scalar_mult()`. For
506 significant bit of the curve's order n is set in order to avoid a special
[all …]
/mbedtls-latest/library/
Dasn1write.c274 unsigned char bit; in mbedtls_asn1_write_named_bitstring() local
289 bit = cur_byte_shifted & 0x1; in mbedtls_asn1_write_named_bitstring()
292 if (bit != 0) { in mbedtls_asn1_write_named_bitstring()
/mbedtls-latest/scripts/
Dgenerate_psa_constants.py296 return '\n'.join([self._make_bit_test('usage', bit)
297 for bit in sorted(self.key_usage_flags)])
/mbedtls-latest/
DMakefile120 CTR_DRBG_128_BIT_KEY_WARN_L2=**** Using 128-bit keys for CTR_DRBG limits the security of generated…
121 CTR_DRBG_128_BIT_KEY_WARN_L3=**** keys and operations that use random values generated to 128-bit

123