/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_op_fail.generated.data | 1703 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with AES 1707 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with ARIA 1711 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with CAMELLIA 2043 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with AES 2047 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with ARIA 2051 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with CAMELLIA 2243 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with AES 2247 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with ARIA 2251 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with CAMELLIA 4546 PSA sign CBC_MAC: invalid with AES [all …]
|
D | test_suite_psa_crypto_se_driver_hal.data | 190 Import-sign-verify: sign in driver, ECDSA 194 Import-sign-verify: sign in driver then export_public, ECDSA 198 Import-sign-verify: sign in software, ECDSA 202 Generate-sign-verify: sign in driver, ECDSA 206 Generate-sign-verify: sign in driver then export_public, ECDSA 210 Generate-sign-verify: sign in software, ECDSA
|
D | test_suite_pk.data | 405 ECDSA sign-verify: SECP192R1 409 ECDSA sign-verify: SECP256R1 413 ECDSA sign-verify: SECP384R1 417 ECDSA sign-verify: SECP521R1 421 ECDSA sign-verify: BP256R1 425 ECDSA sign-verify: BP512R1 429 EC(DSA) sign-verify: SECP192R1 433 EC_DH (no) sign-verify: SECP192R1 437 RSA sign-verify, PKCS1v1.5, SHA1 441 RSA sign-verify, PKCS1v2.1, SHA1 [all …]
|
D | test_suite_lms.data | 1 LMS sign-verify test 6 LMS NULL-message sign-verify test 33 # sig1 = private_key.sign(message1)[4:] 47 # sig2 = private_key.sign(message2)[4:] 66 # * hsslms sign tmp/lms.prv message.bin (incorrect signature using leaf node 0) 68 # * hsslms sign tmp/lms.prv message.bin (incorrect signature using leaf node 1) 70 # * hsslms sign tmp/lms.prv message.bin (correct signature using leaf node 2) 99 # * <hash-sigs>/demo sign tmp/lms message.bin 127 # * <hash-sigs>/demo sign tmp/lms message.bin (incorrect signature using leaf node 0) 129 # * <hash-sigs>/demo sign tmp/lms message.bin (correct signature using leaf node 1) [all …]
|
D | test_suite_lmots.data | 1 LMOTS sign-verify test #1 6 LMOTS sign-verify test #2 11 LMOTS NULL-message sign-verify test 37 # sig = ots_private_key.sign(message) 62 #sig = ots_private_key.sign(message) 85 #sig = ots_private_key.sign(message) 142 # message, and then attempts to sign the message again. The second signature 143 # must fail as private key material must be deleted after a key is used to sign.
|
D | test_suite_psa_crypto.data | 367 PSA import/export RSA keypair: policy forbids export (sign) 495 PSA import/export RSA keypair: policy forbids export (sign), opaque 832 PSA key policy: MAC, neither sign nor verify 848 PSA key policy: HMAC, sign-verify, tag length > min-length policy 852 PSA key policy: HMAC, sign-verify, tag length = min-length policy 856 PSA key policy: HMAC, sign-verify, tag length < min-length policy 860 PSA key policy: CMAC, sign-verify, tag length > min-length policy 864 PSA key policy: CMAC, sign-verify, tag length = min-length policy 868 PSA key policy: CMAC, sign-verify, tag length < min-length policy 872 PSA key policy: HMAC, sign-verify, default tag length > min-length policy [all …]
|
D | test_suite_psa_crypto_op_fail.misc.data | 9 PSA sign RSA_PSS(SHA_256): incompatible key type 13 PSA sign RSA_PSS(SHA_256): RSA_PSS not enabled, key pair
|
D | test_suite_psa_crypto_driver_wrappers.data | 510 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 0 514 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 1 518 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 2 522 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 3 526 PSA MAC sign, through driver: HMAC-SHA-224 530 PSA MAC sign, fallback: HMAC-SHA-224 534 PSA MAC sign, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224 538 PSA MAC sign, through driver: CMAC-AES-128 542 PSA MAC sign, fallback: CMAC-AES-128 546 PSA MAC sign, driver reports error: CMAC-AES-128
|
D | test_suite_ecdsa.data | 309 ECDSA restartable sign-write: secp256r1 max_ops=0 (disabled) 313 ECDSA restartable sign-write: secp256r1 restart max_ops=1 317 ECDSA restartable sign-write: secp256r1 restart max_ops=10000 321 ECDSA restartable sign-write: secp256r1 restart max_ops=250
|
D | test_suite_psa_crypto_se_driver_hal_mocks.data | 52 SE signing mock test: sign failed
|
D | test_suite_bignum.function | 13 /* Check the validity of the sign bit in an MPI object. Reject representations 18 /* Only +1 and -1 are valid sign bits, not e.g. 0 */ 23 /* The value 0 must be represented with the sign +1. A "negative zero" 1243 /* Set X to sign(before) * 2^(|before|-1) */
|
D | test_suite_lmots.function | 211 /* Running another sign operation should fail, since the key should now have
|
D | test_suite_psa_crypto_storage_format.function | 105 * Hash-and-sign algorithms where the asymmetric part doesn't use
|
D | test_suite_pk.function | 171 /* Get an available MD alg to be used in sign/verify tests. */ 1295 /* Do we leak memory when aborting? try verify then sign 1715 * An rsa_alt context can only do private operations (decrypt, sign). 1828 * - sign with opaque context for both EC and RSA keys;
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 56 * Cryptographic operations: hash, sign, encrypt, etc. 251 …on there is only a default that can be overridden by calling `mbedtls_pk_{sign,verify}_ext`. Also … 284 …e algorithm policy is `PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `… 285 …he algorithm policy is `PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `… 286 …* For an `MBEDTLS_PK_ECKEY` or `MBEDTLS_PK_ECDSA` with a sign/verify usage, the algorithm policy i… 311 …hm policy (`psa_get_key_algorithm`) if that is a matching operation type (sign/verify, encrypt/dec… 313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the… 341 …n the signature format used by `mbedtls_pk_{sign,verify}{,_ext}` and the signature format used by …
|
/mbedtls-latest/programs/ |
D | README.md | 28 …verify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short stri… 38 …fy.c`](pkey/rsa_verify.c): loads an RSA private/public key and uses it to sign/verify a short stri… 40 …`](pkey/rsa_verify_pss.c): loads an RSA private/public key and uses it to sign/verify a short stri…
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 223 | ECDSA sign | 664 | 880 | 232 | ECDSA sign | 604 | 844 | 246 | ECDSA sign | 990 | 1009 | 256 | ECDSA sign | 155 | 188 | 266 | ECDSA sign | 12 | 14 | 278 | ECDSA sign | 1136 | 1712 |
|
/mbedtls-latest/ |
D | dco.txt | 35 personal information I submit with it, including my sign-off) is
|
/mbedtls-latest/library/ |
D | ecdsa.c | 429 goto sign; in mbedtls_ecdsa_sign_det_restartable() 445 sign: in mbedtls_ecdsa_sign_det_restartable()
|
D | ecjpake.c | 621 static int ecjpake_mul_secret(mbedtls_mpi *R, int sign, in ecjpake_mul_secret() argument 640 R->s *= sign; in ecjpake_mul_secret()
|
D | bignum.c | 517 int sign = 1; in mbedtls_mpi_read_string() local 534 sign = -1; in mbedtls_mpi_read_string() 563 if (sign < 0 && mbedtls_mpi_bitlen(X) != 0) { in mbedtls_mpi_read_string()
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 62 …sign comes from an attestation application which signs some data on behalf of a final client: the … 206 …sign framework, the input to sign/verify-message is passed to a hash, and thus can follow the same… 208 **Design decision: for now, require sign/verify-message drivers to read their input without a risk …
|
/mbedtls-latest/docs/ |
D | psa-driver-example-and-guide.md | 153 …not necessary for a sign-and-hash algorithm. The core still implements these functions by doing th…
|
/mbedtls-latest/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 105 * RSA keys: can invalid DER encodings (e.g. leading zeros, ignored sign bit) have been stored?
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server2.c | 3120 mbedtls_ssl_async_sign_t *sign = NULL; in main() local 3129 sign = ssl_async_sign; in main() 3139 sign, in main()
|