Home
last modified time | relevance | path

Searched refs:verify (Results 1 – 25 of 42) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_pkcs1_v21.data529 RSASSA-PSS Signature Example 1_1 (verify)
537 RSASSA-PSS Signature Example 1_2 (verify)
545 RSASSA-PSS Signature Example 1_3 (verify)
553 RSASSA-PSS Signature Example 1_4 (verify)
561 RSASSA-PSS Signature Example 1_5 (verify)
569 RSASSA-PSS Signature Example 1_6 (verify)
577 RSASSA-PSS Signature Example 2_1 (verify)
585 RSASSA-PSS Signature Example 2_2 (verify)
593 RSASSA-PSS Signature Example 2_3 (verify)
601 RSASSA-PSS Signature Example 2_4 (verify)
[all …]
Dtest_suite_ecdsa.data293 ECDSA restartable read-verify: max_ops=0 (disabled)
297 ECDSA restartable read-verify: max_ops=1
301 ECDSA restartable read-verify: max_ops=10000
305 ECDSA restartable read-verify: max_ops=250
365 ECDSA verify invalid pub key (not on curve), zero bytes of data
369 ECDSA verify invalid pub key (not on curve), one byte of data
373 ECDSA verify invalid pub key (not on curve), r=1, s=1
377 ECDSA verify invalid pub key (also not on curve), r=1, s=1
381 ECDSA verify invalid pub key (not on curve), r=12345, s=1
385 ECDSA verify invalid pub key (not on curve), r=1, s=12345
[all …]
Dtest_suite_psa_crypto_se_driver_hal.data4 # Run this test case a second time to verify that the library deinit
190 Import-sign-verify: sign in driver, ECDSA
194 Import-sign-verify: sign in driver then export_public, ECDSA
198 Import-sign-verify: sign in software, ECDSA
202 Generate-sign-verify: sign in driver, ECDSA
206 Generate-sign-verify: sign in driver then export_public, ECDSA
210 Generate-sign-verify: sign in software, ECDSA
Dtest_suite_psa_crypto.data832 PSA key policy: MAC, neither sign nor verify
848 PSA key policy: HMAC, sign-verify, tag length > min-length policy
852 PSA key policy: HMAC, sign-verify, tag length = min-length policy
856 PSA key policy: HMAC, sign-verify, tag length < min-length policy
860 PSA key policy: CMAC, sign-verify, tag length > min-length policy
864 PSA key policy: CMAC, sign-verify, tag length = min-length policy
868 PSA key policy: CMAC, sign-verify, tag length < min-length policy
872 PSA key policy: HMAC, sign-verify, default tag length > min-length policy
876 PSA key policy: HMAC, sign-verify, default tag length = min-length policy
880 PSA key policy: HMAC, sign-verify, default tag length < min-length policy
[all …]
Dtest_suite_pk.data329 RSA verify test vector: PKCS1v1.5 (explicit), SHA1, good
333 RSA verify test vector: PKCS1v1.5 (default), SHA1, good
337 RSA verify test vector: PKCS1v1.5, SHA1, wrong signature
341 RSA verify test vector: PSS, SHA1, good
345 RSA verify test vector: PSS, SHA1, wrong signature
349 RSA verify test vector: PSS, SHA1, signature is PKCS1v1.5
353 RSA verify test vector: PKCS1v1.5, SHA1, signature is PSS
357 ECDSA verify test vector #1 (good)
361 ECDSA verify test vector #2 (bad)
365 EC(DSA) verify test vector #1 (good)
[all …]
Dtest_suite_psa_crypto_hash.data285 PSA hash verify: SHA-1
289 PSA hash verify: SHA-224
293 PSA hash verify: SHA-256
297 PSA hash verify: SHA-384
301 PSA hash verify: SHA-512
305 PSA hash verify: MD5
309 PSA hash verify: RIPEMD160
313 PSA hash verify: SHA3-224
317 PSA hash verify: SHA3-256
321 PSA hash verify: SHA3-384
[all …]
Dtest_suite_lmots.data1 LMOTS sign-verify test #1
6 LMOTS sign-verify test #2
11 LMOTS NULL-message sign-verify test
92 # verify.
98 # verify.
104 # verify.
Dtest_suite_lms.data1 LMS sign-verify test
6 LMS NULL-message sign-verify test
79 # * hsslms verify tmp/lms message.bin
107 # * <hash-sigs/demo> verify tmp/lms message.bin
137 # * <hash-sigs/demo> verify tmp/lms message.bin
212 # test should fail to verify the signature.
Dtest_suite_x509parse.data419 x509_verify_info:MBEDTLS_X509_BADCERT_OTHER | 0x80000000:"":"Other reason (can be used by verify ca…
2616 X509 CRT verify long chain (max intermediate CA, trusted)
2620 X509 CRT verify long chain (max intermediate CA, untrusted)
2624 X509 CRT verify long chain (max intermediate CA + 1)
2628 X509 CRT verify chain #1 (zero pathlen intermediate)
2632 X509 CRT verify chain #2 (zero pathlen root)
2636 X509 CRT verify chain #3 (nonzero pathlen root)
2640 X509 CRT verify chain #4 (nonzero pathlen intermediate)
2644 X509 CRT verify chain #5 (nonzero maxpathlen intermediate)
2648 X509 CRT verify chain #6 (nonzero maxpathlen root)
[all …]
Dtest_suite_psa_crypto_driver_wrappers.data550 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 0
554 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 1
558 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 2
562 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 3
566 PSA MAC verify, through driver: HMAC-SHA-224
570 PSA MAC verify, fallback: HMAC-SHA-224
574 PSA MAC verify, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224
578 PSA MAC verify, through driver: CMAC-AES-128
582 PSA MAC verify, fallback: CMAC-AES-128
586 PSA MAC verify, driver reports error: CMAC-AES-128
Dtest_suite_psa_crypto_se_driver_hal_mocks.data58 SE verification mock test: verify failed
Dtest_suite_pk.function171 /* Get an available MD alg to be used in sign/verify tests. */
705 /* unsupported operations: verify, decrypt, encrypt */
1295 /* Do we leak memory when aborting? try verify then sign
1716 * Test it against the public operations (encrypt, verify) of a
1829 * - [EC only] verify with opaque context;
1830 * - verify that public keys of opaque and non-opaque contexts match;
1831 * - verify with non-opaque context.
1932 /* Create a new non-opaque PK context to verify the signature. */
Dtest_suite_ecdsa.function250 /* generate and write signature, then read and verify it */
319 /* generate and write signature, then read and verify it */
Dtest_suite_lms.function121 /* Signatures of all sizes must not verify, whether shorter or longer */
Dtest_suite_lmots.function119 /* Signatures of all sizes must not verify, whether shorter or longer */
Dtest_suite_psa_crypto.function585 * \param is_verify If non-zero this is a verify operation.
3227 /* Call verify without calling setup beforehand. */
3233 /* Call verify after finish. */
3242 /* Call verify twice in a row. */
3269 /* Call finish after calling verify. */
3545 /* Call verify finish without calling setup beforehand. */
3570 /* Call update after verify finish. */
3591 /* Call verify finish twice in a row. */
3601 /* Setup sign but try verify. */
3612 /* Setup verify but try sign. */
[all …]
Dtest_suite_psa_crypto_persistent_key.function3 /* The tests in this module verify the contents of key store files. They
/mbedtls-latest/programs/x509/
Dcert_app.c132 int verify = 0; in main() local
239 verify = 1; in main()
247 verify = 1; in main()
260 verify = 1; in main()
314 if (verify) { in main()
376 if (verify) { in main()
/mbedtls-latest/library/
Dmemory_buffer_alloc.c53 int verify; member
286 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc()
350 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc()
476 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_FREE) && verify_chain() != 0) { in buffer_alloc_free()
481 void mbedtls_memory_buffer_set_verify(int verify) in mbedtls_memory_buffer_set_verify() argument
483 heap.verify = verify; in mbedtls_memory_buffer_set_verify()
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md183 certificates (otherwise, add one 'verify' for each link in the peer's
224 | ECDSA verify | 752 | 824 |
233 | ECDSA verify | 700 | 808 |
247 | ECDSA verify | 1976 | 1130 |
257 | ECDSA verify | 309 | 210 |
267 | ECDSA verify | 24 | 15 |
279 | ECDSA verify | 2279 | 1888 |
379 for ECDSA verify where all data is public);
/mbedtls-latest/include/mbedtls/
Dmemory_buffer_alloc.h71 void mbedtls_memory_buffer_set_verify(int verify);
/mbedtls-latest/programs/
DREADME.md28 …rify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short string.
38 …(pkey/rsa_verify.c): loads an RSA private/public key and uses it to sign/verify a short string wit…
40 …y/rsa_verify_pss.c): loads an RSA private/public key and uses it to sign/verify a short string wit…
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md251 …re is only a default that can be overridden by calling `mbedtls_pk_{sign,verify}_ext`. Also there …
284 …rithm policy is `PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL…
285 …orithm policy is `PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL…
286 …* For an `MBEDTLS_PK_ECKEY` or `MBEDTLS_PK_ECDSA` with a sign/verify usage, the algorithm policy i…
311 …icy (`psa_get_key_algorithm`) if that is a matching operation type (sign/verify, encrypt/decrypt),…
313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the…
341 …signature format used by `mbedtls_pk_{sign,verify}{,_ext}` and the signature format used by `psa_{…
Dpsa-limitations.md17 Support for interruptible ECDSA sign/verify was added to PSA in Mbed TLS 3.4.
51 verify the strength of these parameters. This led to the development of RFC
/mbedtls-latest/docs/architecture/testing/
Ddriver-interface-test-strategy.md55 …ust not reach the driver, call the API function with such parameters and verify that the driver me…
125 …ic operations, …) must be exercised in at least one build. The test must verify that the driver co…

12