/mbedtls-latest/tests/suites/ |
D | test_suite_pkcs1_v21.data | 529 RSASSA-PSS Signature Example 1_1 (verify) 537 RSASSA-PSS Signature Example 1_2 (verify) 545 RSASSA-PSS Signature Example 1_3 (verify) 553 RSASSA-PSS Signature Example 1_4 (verify) 561 RSASSA-PSS Signature Example 1_5 (verify) 569 RSASSA-PSS Signature Example 1_6 (verify) 577 RSASSA-PSS Signature Example 2_1 (verify) 585 RSASSA-PSS Signature Example 2_2 (verify) 593 RSASSA-PSS Signature Example 2_3 (verify) 601 RSASSA-PSS Signature Example 2_4 (verify) [all …]
|
D | test_suite_ecdsa.data | 293 ECDSA restartable read-verify: max_ops=0 (disabled) 297 ECDSA restartable read-verify: max_ops=1 301 ECDSA restartable read-verify: max_ops=10000 305 ECDSA restartable read-verify: max_ops=250 365 ECDSA verify invalid pub key (not on curve), zero bytes of data 369 ECDSA verify invalid pub key (not on curve), one byte of data 373 ECDSA verify invalid pub key (not on curve), r=1, s=1 377 ECDSA verify invalid pub key (also not on curve), r=1, s=1 381 ECDSA verify invalid pub key (not on curve), r=12345, s=1 385 ECDSA verify invalid pub key (not on curve), r=1, s=12345 [all …]
|
D | test_suite_psa_crypto_se_driver_hal.data | 4 # Run this test case a second time to verify that the library deinit 190 Import-sign-verify: sign in driver, ECDSA 194 Import-sign-verify: sign in driver then export_public, ECDSA 198 Import-sign-verify: sign in software, ECDSA 202 Generate-sign-verify: sign in driver, ECDSA 206 Generate-sign-verify: sign in driver then export_public, ECDSA 210 Generate-sign-verify: sign in software, ECDSA
|
D | test_suite_psa_crypto.data | 832 PSA key policy: MAC, neither sign nor verify 848 PSA key policy: HMAC, sign-verify, tag length > min-length policy 852 PSA key policy: HMAC, sign-verify, tag length = min-length policy 856 PSA key policy: HMAC, sign-verify, tag length < min-length policy 860 PSA key policy: CMAC, sign-verify, tag length > min-length policy 864 PSA key policy: CMAC, sign-verify, tag length = min-length policy 868 PSA key policy: CMAC, sign-verify, tag length < min-length policy 872 PSA key policy: HMAC, sign-verify, default tag length > min-length policy 876 PSA key policy: HMAC, sign-verify, default tag length = min-length policy 880 PSA key policy: HMAC, sign-verify, default tag length < min-length policy [all …]
|
D | test_suite_pk.data | 329 RSA verify test vector: PKCS1v1.5 (explicit), SHA1, good 333 RSA verify test vector: PKCS1v1.5 (default), SHA1, good 337 RSA verify test vector: PKCS1v1.5, SHA1, wrong signature 341 RSA verify test vector: PSS, SHA1, good 345 RSA verify test vector: PSS, SHA1, wrong signature 349 RSA verify test vector: PSS, SHA1, signature is PKCS1v1.5 353 RSA verify test vector: PKCS1v1.5, SHA1, signature is PSS 357 ECDSA verify test vector #1 (good) 361 ECDSA verify test vector #2 (bad) 365 EC(DSA) verify test vector #1 (good) [all …]
|
D | test_suite_psa_crypto_hash.data | 285 PSA hash verify: SHA-1 289 PSA hash verify: SHA-224 293 PSA hash verify: SHA-256 297 PSA hash verify: SHA-384 301 PSA hash verify: SHA-512 305 PSA hash verify: MD5 309 PSA hash verify: RIPEMD160 313 PSA hash verify: SHA3-224 317 PSA hash verify: SHA3-256 321 PSA hash verify: SHA3-384 [all …]
|
D | test_suite_lmots.data | 1 LMOTS sign-verify test #1 6 LMOTS sign-verify test #2 11 LMOTS NULL-message sign-verify test 92 # verify. 98 # verify. 104 # verify.
|
D | test_suite_lms.data | 1 LMS sign-verify test 6 LMS NULL-message sign-verify test 79 # * hsslms verify tmp/lms message.bin 107 # * <hash-sigs/demo> verify tmp/lms message.bin 137 # * <hash-sigs/demo> verify tmp/lms message.bin 212 # test should fail to verify the signature.
|
D | test_suite_x509parse.data | 419 x509_verify_info:MBEDTLS_X509_BADCERT_OTHER | 0x80000000:"":"Other reason (can be used by verify ca… 2616 X509 CRT verify long chain (max intermediate CA, trusted) 2620 X509 CRT verify long chain (max intermediate CA, untrusted) 2624 X509 CRT verify long chain (max intermediate CA + 1) 2628 X509 CRT verify chain #1 (zero pathlen intermediate) 2632 X509 CRT verify chain #2 (zero pathlen root) 2636 X509 CRT verify chain #3 (nonzero pathlen root) 2640 X509 CRT verify chain #4 (nonzero pathlen intermediate) 2644 X509 CRT verify chain #5 (nonzero maxpathlen intermediate) 2648 X509 CRT verify chain #6 (nonzero maxpathlen root) [all …]
|
D | test_suite_psa_crypto_driver_wrappers.data | 550 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 0 554 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 1 558 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 2 562 PSA MAC verify multipart, through driver: HMAC-SHA-224, parts: 3 566 PSA MAC verify, through driver: HMAC-SHA-224 570 PSA MAC verify, fallback: HMAC-SHA-224 574 PSA MAC verify, driver reports error: RFC4231 Test case 1 - HMAC-SHA-224 578 PSA MAC verify, through driver: CMAC-AES-128 582 PSA MAC verify, fallback: CMAC-AES-128 586 PSA MAC verify, driver reports error: CMAC-AES-128
|
D | test_suite_psa_crypto_se_driver_hal_mocks.data | 58 SE verification mock test: verify failed
|
D | test_suite_pk.function | 171 /* Get an available MD alg to be used in sign/verify tests. */ 705 /* unsupported operations: verify, decrypt, encrypt */ 1295 /* Do we leak memory when aborting? try verify then sign 1716 * Test it against the public operations (encrypt, verify) of a 1829 * - [EC only] verify with opaque context; 1830 * - verify that public keys of opaque and non-opaque contexts match; 1831 * - verify with non-opaque context. 1932 /* Create a new non-opaque PK context to verify the signature. */
|
D | test_suite_ecdsa.function | 250 /* generate and write signature, then read and verify it */ 319 /* generate and write signature, then read and verify it */
|
D | test_suite_lms.function | 121 /* Signatures of all sizes must not verify, whether shorter or longer */
|
D | test_suite_lmots.function | 119 /* Signatures of all sizes must not verify, whether shorter or longer */
|
D | test_suite_psa_crypto.function | 585 * \param is_verify If non-zero this is a verify operation. 3227 /* Call verify without calling setup beforehand. */ 3233 /* Call verify after finish. */ 3242 /* Call verify twice in a row. */ 3269 /* Call finish after calling verify. */ 3545 /* Call verify finish without calling setup beforehand. */ 3570 /* Call update after verify finish. */ 3591 /* Call verify finish twice in a row. */ 3601 /* Setup sign but try verify. */ 3612 /* Setup verify but try sign. */ [all …]
|
D | test_suite_psa_crypto_persistent_key.function | 3 /* The tests in this module verify the contents of key store files. They
|
/mbedtls-latest/programs/x509/ |
D | cert_app.c | 132 int verify = 0; in main() local 239 verify = 1; in main() 247 verify = 1; in main() 260 verify = 1; in main() 314 if (verify) { in main() 376 if (verify) { in main()
|
/mbedtls-latest/library/ |
D | memory_buffer_alloc.c | 53 int verify; member 286 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc() 350 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_ALLOC) && verify_chain() != 0) { in buffer_alloc_calloc() 476 if ((heap.verify & MBEDTLS_MEMORY_VERIFY_FREE) && verify_chain() != 0) { in buffer_alloc_free() 481 void mbedtls_memory_buffer_set_verify(int verify) in mbedtls_memory_buffer_set_verify() argument 483 heap.verify = verify; in mbedtls_memory_buffer_set_verify()
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 183 certificates (otherwise, add one 'verify' for each link in the peer's 224 | ECDSA verify | 752 | 824 | 233 | ECDSA verify | 700 | 808 | 247 | ECDSA verify | 1976 | 1130 | 257 | ECDSA verify | 309 | 210 | 267 | ECDSA verify | 24 | 15 | 279 | ECDSA verify | 2279 | 1888 | 379 for ECDSA verify where all data is public);
|
/mbedtls-latest/include/mbedtls/ |
D | memory_buffer_alloc.h | 71 void mbedtls_memory_buffer_set_verify(int verify);
|
/mbedtls-latest/programs/ |
D | README.md | 28 …rify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short string. 38 …(pkey/rsa_verify.c): loads an RSA private/public key and uses it to sign/verify a short string wit… 40 …y/rsa_verify_pss.c): loads an RSA private/public key and uses it to sign/verify a short string wit…
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 251 …re is only a default that can be overridden by calling `mbedtls_pk_{sign,verify}_ext`. Also there … 284 …rithm policy is `PSA_ALG_RSA_PKCS1V15_SIGN(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL… 285 …orithm policy is `PSA_ALG_RSA_PSS_ANY_SALT(PSA_ALG_ANY_HASH)` for a sign/verify usage, and `PSA_AL… 286 …* For an `MBEDTLS_PK_ECKEY` or `MBEDTLS_PK_ECDSA` with a sign/verify usage, the algorithm policy i… 311 …icy (`psa_get_key_algorithm`) if that is a matching operation type (sign/verify, encrypt/decrypt),… 313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the… 341 …signature format used by `mbedtls_pk_{sign,verify}{,_ext}` and the signature format used by `psa_{…
|
D | psa-limitations.md | 17 Support for interruptible ECDSA sign/verify was added to PSA in Mbed TLS 3.4. 51 verify the strength of these parameters. This led to the development of RFC
|
/mbedtls-latest/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 55 …ust not reach the driver, call the API function with such parameters and verify that the driver me… 125 …ic operations, …) must be exercised in at least one build. The test must verify that the driver co…
|