Searched refs:v1 (Results 1 – 11 of 11) sorted by relevance
/net-tools-3.4.0/mbedtls-2.4.0/library/ |
D | xtea.c | 107 uint32_t *k, v0, v1, i; in mbedtls_xtea_crypt_ecb() local 112 GET_UINT32_BE( v1, input, 4 ); in mbedtls_xtea_crypt_ecb() 120 v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb() 122 v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 131 v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 133 v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb() 138 PUT_UINT32_BE( v1, output, 4 ); in mbedtls_xtea_crypt_ecb()
|
D | bignum.c | 762 size_t i, v0, v1; in mbedtls_mpi_shift_r() local 766 v1 = count & (biL - 1); in mbedtls_mpi_shift_r() 768 if( v0 > X->n || ( v0 == X->n && v1 > 0 ) ) in mbedtls_mpi_shift_r() 786 if( v1 > 0 ) in mbedtls_mpi_shift_r() 790 r1 = X->p[i - 1] << (biL - v1); in mbedtls_mpi_shift_r() 791 X->p[i - 1] >>= v1; in mbedtls_mpi_shift_r()
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_rsa.data | 1 RSA PKCS1 Verify v1.5 CAVS #1 5 RSA PKCS1 Verify v1.5 CAVS #2 9 RSA PKCS1 Verify v1.5 CAVS #3 13 RSA PKCS1 Verify v1.5 CAVS #4 17 RSA PKCS1 Verify v1.5 CAVS #5 21 RSA PKCS1 Verify v1.5 CAVS #6 25 RSA PKCS1 Verify v1.5 CAVS #7 29 RSA PKCS1 Verify v1.5 CAVS #8 33 RSA PKCS1 Verify v1.5 CAVS #9 37 RSA PKCS1 Verify v1.5 CAVS #10 [all …]
|
D | helpers.function | 346 * State( v0, v1 ) should be set to zero. 351 uint32_t v0, v1; 380 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) ) 381 + info->v1 ) ^ ( sum + k[sum & 3] ); 383 info->v1 += ( ( ( info->v0 << 4 ) ^ ( info->v0 >> 5 ) )
|
D | test_suite_x509write.data | 59 …144406":"20210212144406":MBEDTLS_MD_SHA1:0:0:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt"
|
D | test_suite_pk.data | 129 Verify ext RSA #12 (PKCS1 v1.5, good)
|
D | test_suite_x509parse.data | 121 X509 certificate v1 with extension 654 X509 Certificate verification #70 (v1 trusted CA) 656 x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0… 658 X509 Certificate verification #71 (v1 trusted CA, other) 660 x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0… 662 X509 Certificate verification #72 (v1 chain) 664 x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NUL… 1446 X509 CSR ASN.1 (bad CRI.Version: not v1)
|
D | test_suite_rsa.function | 165 /* For PKCS#1 v1.5, there is an alternative way to generate signatures */ 217 /* For PKCS#1 v1.5, there is an alternative way to verify signatures */
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/data_files/ |
D | Readme-x509.txt | 26 - test-ca-v1.crt: v1 "CA", signs 27 server1-v1.crt: v1 "intermediate CA", signs 28 server2-v1*.crt: EE cert (without of with chain in same file) 54 - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal) 57 - server1*.crt: 1* R C* P1*: misc *(server1-v1 see test-ca-v1.crt above) 58 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt 60 - server2-v1*.crt: O R: see test-ca-v1.crt above 86 - crl.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.crt + unknown
|
/net-tools-3.4.0/docker/ |
D | Dockerfile | 31 git checkout v1.6.9 && \
|
/net-tools-3.4.0/mbedtls-2.4.0/ |
D | ChangeLog | 253 * Add countermeasure against Lenstra's RSA-CRT attack for PKCS#1 v1.5 777 * Restore ability to use a v1 cert as a CA if trusted locally. (This had 918 * Fixed bug in RSA PKCS#1 v1.5 "reversed" operations 1094 * Support faulty X509 v1 certificates with extensions 1235 * Fix bug in RSA PKCS#1 v1.5 "reversed" operations 1348 rsa_pkcs1_sign() and rsa_pkcs1_verify() to separate PKCS#1 v1.5 and 1361 rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5 1525 rsa_rsaes_pkcs1_v15_decrypt() and rsa_pkcs1_decrypt() for PKCS#1 v1.5 1776 * Added support for TLS v1.1 1891 one way hash functions with the PKCS#1 v1.5 signing and [all …]
|