Home
last modified time | relevance | path

Searched refs:sign (Results 1 – 25 of 39) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_psa_crypto_op_fail.generated.data1703 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with AES
1707 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with ARIA
1711 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with CAMELLIA
2043 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with AES
2047 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with ARIA
2051 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with CAMELLIA
2243 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with AES
2247 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with ARIA
2251 PSA sign AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with CAMELLIA
4546 PSA sign CBC_MAC: invalid with AES
[all …]
Dtest_suite_psa_crypto_se_driver_hal.data190 Import-sign-verify: sign in driver, ECDSA
194 Import-sign-verify: sign in driver then export_public, ECDSA
198 Import-sign-verify: sign in software, ECDSA
202 Generate-sign-verify: sign in driver, ECDSA
206 Generate-sign-verify: sign in driver then export_public, ECDSA
210 Generate-sign-verify: sign in software, ECDSA
Dtest_suite_pk.data405 ECDSA sign-verify: SECP192R1
409 ECDSA sign-verify: SECP256R1
413 ECDSA sign-verify: SECP384R1
417 ECDSA sign-verify: SECP521R1
421 ECDSA sign-verify: BP256R1
425 ECDSA sign-verify: BP512R1
429 EC(DSA) sign-verify: SECP192R1
433 EC_DH (no) sign-verify: SECP192R1
437 RSA sign-verify, PKCS1v1.5, SHA1
441 RSA sign-verify, PKCS1v2.1, SHA1
[all …]
Dtest_suite_lms.data1 LMS sign-verify test
6 LMS NULL-message sign-verify test
33 # sig1 = private_key.sign(message1)[4:]
47 # sig2 = private_key.sign(message2)[4:]
66 # * hsslms sign tmp/lms.prv message.bin (incorrect signature using leaf node 0)
68 # * hsslms sign tmp/lms.prv message.bin (incorrect signature using leaf node 1)
70 # * hsslms sign tmp/lms.prv message.bin (correct signature using leaf node 2)
99 # * <hash-sigs>/demo sign tmp/lms message.bin
127 # * <hash-sigs>/demo sign tmp/lms message.bin (incorrect signature using leaf node 0)
129 # * <hash-sigs>/demo sign tmp/lms message.bin (correct signature using leaf node 1)
[all …]
Dtest_suite_lmots.data1 LMOTS sign-verify test #1
6 LMOTS sign-verify test #2
11 LMOTS NULL-message sign-verify test
37 # sig = ots_private_key.sign(message)
62 #sig = ots_private_key.sign(message)
85 #sig = ots_private_key.sign(message)
142 # message, and then attempts to sign the message again. The second signature
143 # must fail as private key material must be deleted after a key is used to sign.
Dtest_suite_psa_crypto.data367 PSA import/export RSA keypair: policy forbids export (sign)
495 PSA import/export RSA keypair: policy forbids export (sign), opaque
832 PSA key policy: MAC, neither sign nor verify
848 PSA key policy: HMAC, sign-verify, tag length > min-length policy
852 PSA key policy: HMAC, sign-verify, tag length = min-length policy
856 PSA key policy: HMAC, sign-verify, tag length < min-length policy
860 PSA key policy: CMAC, sign-verify, tag length > min-length policy
864 PSA key policy: CMAC, sign-verify, tag length = min-length policy
868 PSA key policy: CMAC, sign-verify, tag length < min-length policy
872 PSA key policy: HMAC, sign-verify, default tag length > min-length policy
[all …]
Dtest_suite_psa_crypto_op_fail.misc.data9 PSA sign RSA_PSS(SHA_256): incompatible key type
13 PSA sign RSA_PSS(SHA_256): RSA_PSS not enabled, key pair
Dtest_suite_psa_crypto_driver_wrappers.data510 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 0
514 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 1
518 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 2
522 PSA MAC sign multipart, through driver: HMAC-SHA-224, parts: 3
526 PSA MAC sign, through driver: HMAC-SHA-224
530 PSA MAC sign, fallback: HMAC-SHA-224
534 PSA MAC sign, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224
538 PSA MAC sign, through driver: CMAC-AES-128
542 PSA MAC sign, fallback: CMAC-AES-128
546 PSA MAC sign, driver reports error: CMAC-AES-128
Dtest_suite_ecdsa.data309 ECDSA restartable sign-write: secp256r1 max_ops=0 (disabled)
313 ECDSA restartable sign-write: secp256r1 restart max_ops=1
317 ECDSA restartable sign-write: secp256r1 restart max_ops=10000
321 ECDSA restartable sign-write: secp256r1 restart max_ops=250
Dtest_suite_psa_crypto_se_driver_hal_mocks.data52 SE signing mock test: sign failed
Dtest_suite_bignum.function13 /* Check the validity of the sign bit in an MPI object. Reject representations
18 /* Only +1 and -1 are valid sign bits, not e.g. 0 */
23 /* The value 0 must be represented with the sign +1. A "negative zero"
1243 /* Set X to sign(before) * 2^(|before|-1) */
Dtest_suite_lmots.function211 /* Running another sign operation should fail, since the key should now have
Dtest_suite_psa_crypto_storage_format.function105 * Hash-and-sign algorithms where the asymmetric part doesn't use
Dtest_suite_pk.function171 /* Get an available MD alg to be used in sign/verify tests. */
1295 /* Do we leak memory when aborting? try verify then sign
1715 * An rsa_alt context can only do private operations (decrypt, sign).
1828 * - sign with opaque context for both EC and RSA keys;
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md56 * Cryptographic operations: hash, sign, encrypt, etc.
251 …on there is only a default that can be overridden by calling `mbedtls_pk_{sign,verify}_ext`. Also …
284 …e algorithm policy is `PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `…
285 …he algorithm policy is `PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `…
286 …* For an `MBEDTLS_PK_ECKEY` or `MBEDTLS_PK_ECDSA` with a sign/verify usage, the algorithm policy i…
311 …hm policy (`psa_get_key_algorithm`) if that is a matching operation type (sign/verify, encrypt/dec…
313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the…
341 …n the signature format used by `mbedtls_pk_{sign,verify}{,_ext}` and the signature format used by …
/mbedtls-latest/programs/
DREADME.md28 …verify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short stri…
38 …fy.c`](pkey/rsa_verify.c): loads an RSA private/public key and uses it to sign/verify a short stri…
40 …`](pkey/rsa_verify_pss.c): loads an RSA private/public key and uses it to sign/verify a short stri…
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md223 | ECDSA sign | 664 | 880 |
232 | ECDSA sign | 604 | 844 |
246 | ECDSA sign | 990 | 1009 |
256 | ECDSA sign | 155 | 188 |
266 | ECDSA sign | 12 | 14 |
278 | ECDSA sign | 1136 | 1712 |
/mbedtls-latest/
Ddco.txt35 personal information I submit with it, including my sign-off) is
/mbedtls-latest/library/
Decdsa.c429 goto sign; in mbedtls_ecdsa_sign_det_restartable()
445 sign: in mbedtls_ecdsa_sign_det_restartable()
Decjpake.c621 static int ecjpake_mul_secret(mbedtls_mpi *R, int sign, in ecjpake_mul_secret() argument
640 R->s *= sign; in ecjpake_mul_secret()
Dbignum.c517 int sign = 1; in mbedtls_mpi_read_string() local
534 sign = -1; in mbedtls_mpi_read_string()
563 if (sign < 0 && mbedtls_mpi_bitlen(X) != 0) { in mbedtls_mpi_read_string()
/mbedtls-latest/docs/architecture/
Dpsa-shared-memory.md62sign comes from an attestation application which signs some data on behalf of a final client: the …
206sign framework, the input to sign/verify-message is passed to a hash, and thus can follow the same…
208 **Design decision: for now, require sign/verify-message drivers to read their input without a risk …
/mbedtls-latest/docs/
Dpsa-driver-example-and-guide.md153 …not necessary for a sign-and-hash algorithm. The core still implements these functions by doing th…
/mbedtls-latest/docs/architecture/testing/
Dpsa-storage-format-testing.md105 * RSA keys: can invalid DER encodings (e.g. leading zeros, ignored sign bit) have been stored?
/mbedtls-latest/programs/ssl/
Dssl_server2.c3120 mbedtls_ssl_async_sign_t *sign = NULL; in main() local
3129 sign = ssl_async_sign; in main()
3139 sign, in main()

12