Home
last modified time | relevance | path

Searched refs:v1 (Results 1 – 11 of 11) sorted by relevance

/net-tools-3.4.0/mbedtls-2.4.0/library/
Dxtea.c107 uint32_t *k, v0, v1, i; in mbedtls_xtea_crypt_ecb() local
112 GET_UINT32_BE( v1, input, 4 ); in mbedtls_xtea_crypt_ecb()
120 v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb()
122 v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb()
131 v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb()
133 v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb()
138 PUT_UINT32_BE( v1, output, 4 ); in mbedtls_xtea_crypt_ecb()
Dbignum.c762 size_t i, v0, v1; in mbedtls_mpi_shift_r() local
766 v1 = count & (biL - 1); in mbedtls_mpi_shift_r()
768 if( v0 > X->n || ( v0 == X->n && v1 > 0 ) ) in mbedtls_mpi_shift_r()
786 if( v1 > 0 ) in mbedtls_mpi_shift_r()
790 r1 = X->p[i - 1] << (biL - v1); in mbedtls_mpi_shift_r()
791 X->p[i - 1] >>= v1; in mbedtls_mpi_shift_r()
/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_rsa.data1 RSA PKCS1 Verify v1.5 CAVS #1
5 RSA PKCS1 Verify v1.5 CAVS #2
9 RSA PKCS1 Verify v1.5 CAVS #3
13 RSA PKCS1 Verify v1.5 CAVS #4
17 RSA PKCS1 Verify v1.5 CAVS #5
21 RSA PKCS1 Verify v1.5 CAVS #6
25 RSA PKCS1 Verify v1.5 CAVS #7
29 RSA PKCS1 Verify v1.5 CAVS #8
33 RSA PKCS1 Verify v1.5 CAVS #9
37 RSA PKCS1 Verify v1.5 CAVS #10
[all …]
Dhelpers.function346 * State( v0, v1 ) should be set to zero.
351 uint32_t v0, v1;
380 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) )
381 + info->v1 ) ^ ( sum + k[sum & 3] );
383 info->v1 += ( ( ( info->v0 << 4 ) ^ ( info->v0 >> 5 ) )
Dtest_suite_x509write.data59 …144406":"20210212144406":MBEDTLS_MD_SHA1:0:0:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt"
Dtest_suite_pk.data129 Verify ext RSA #12 (PKCS1 v1.5, good)
Dtest_suite_x509parse.data121 X509 certificate v1 with extension
654 X509 Certificate verification #70 (v1 trusted CA)
656 x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0…
658 X509 Certificate verification #71 (v1 trusted CA, other)
660 x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0…
662 X509 Certificate verification #72 (v1 chain)
664 x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NUL…
1446 X509 CSR ASN.1 (bad CRI.Version: not v1)
Dtest_suite_rsa.function165 /* For PKCS#1 v1.5, there is an alternative way to generate signatures */
217 /* For PKCS#1 v1.5, there is an alternative way to verify signatures */
/net-tools-3.4.0/mbedtls-2.4.0/tests/data_files/
DReadme-x509.txt26 - test-ca-v1.crt: v1 "CA", signs
27 server1-v1.crt: v1 "intermediate CA", signs
28 server2-v1*.crt: EE cert (without of with chain in same file)
54 - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal)
57 - server1*.crt: 1* R C* P1*: misc *(server1-v1 see test-ca-v1.crt above)
58 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt
60 - server2-v1*.crt: O R: see test-ca-v1.crt above
86 - crl.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.crt + unknown
/net-tools-3.4.0/docker/
DDockerfile31 git checkout v1.6.9 && \
/net-tools-3.4.0/mbedtls-2.4.0/
DChangeLog253 * Add countermeasure against Lenstra's RSA-CRT attack for PKCS#1 v1.5
777 * Restore ability to use a v1 cert as a CA if trusted locally. (This had
918 * Fixed bug in RSA PKCS#1 v1.5 "reversed" operations
1094 * Support faulty X509 v1 certificates with extensions
1235 * Fix bug in RSA PKCS#1 v1.5 "reversed" operations
1348 rsa_pkcs1_sign() and rsa_pkcs1_verify() to separate PKCS#1 v1.5 and
1361 rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
1525 rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5
1776 * Added support for TLS v1.1
1891 one way hash functions with the PKCS#1 v1.5 signing and
[all …]