/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | xtea.c | 97 uint32_t *k, v0, v1, i; in mbedtls_xtea_crypt_ecb() local 102 GET_UINT32_BE( v1, input, 4 ); in mbedtls_xtea_crypt_ecb() 110 v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb() 112 v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 121 v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb() 123 v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb() 128 PUT_UINT32_BE( v1, output, 4 ); in mbedtls_xtea_crypt_ecb()
|
D | bignum.c | 1056 size_t i, v0, v1; in mbedtls_mpi_shift_r() local 1061 v1 = count & (biL - 1); in mbedtls_mpi_shift_r() 1063 if( v0 > X->n || ( v0 == X->n && v1 > 0 ) ) in mbedtls_mpi_shift_r() 1081 if( v1 > 0 ) in mbedtls_mpi_shift_r() 1085 r1 = X->p[i - 1] << (biL - v1); in mbedtls_mpi_shift_r() 1086 X->p[i - 1] >>= v1; in mbedtls_mpi_shift_r()
|
D | cipher.c | 83 static int mbedtls_constant_time_memcmp( const void *v1, const void *v2, in mbedtls_constant_time_memcmp() argument 86 const unsigned char *p1 = (const unsigned char*) v1; in mbedtls_constant_time_memcmp()
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_rsa.data | 4 RSA PKCS1 Verify v1.5 CAVS #1 9 RSA PKCS1 Verify v1.5 CAVS #2 13 RSA PKCS1 Verify v1.5 CAVS #3 17 RSA PKCS1 Verify v1.5 CAVS #4 21 RSA PKCS1 Verify v1.5 CAVS #5 25 RSA PKCS1 Verify v1.5 CAVS #6 29 RSA PKCS1 Verify v1.5 CAVS #7 34 RSA PKCS1 Verify v1.5 CAVS #8 38 RSA PKCS1 Verify v1.5 CAVS #9 42 RSA PKCS1 Verify v1.5 CAVS #10 [all …]
|
D | test_suite_psa_crypto_metadata.data | 148 Asymmetric signature: RSA PKCS#1 v1.5 raw 152 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256 172 Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash 188 Asymmetric encryption: RSA PKCS#1 v1.5
|
D | test_suite_psa_crypto.data | 474 PSA key policy: asymmetric encryption, wrong algorithm (v1.5/OAEP) 518 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256 522 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 raw 1691 PSA signature size: RSA keypair, 1024 bits, PKCS#1 v1.5 raw 1694 PSA signature size: RSA public key, 1024 bits, PKCS#1 v1.5 raw 1697 PSA signature size: RSA keypair, 1024 bits, PKCS#1 v1.5 SHA-256 1703 PSA signature size: RSA keypair, 1023 bits, PKCS#1 v1.5 raw 1706 PSA signature size: RSA keypair, 1025 bits, PKCS#1 v1.5 raw 1709 PSA import/exercise RSA keypair, PKCS#1 v1.5 raw 1717 PSA import/exercise RSA public key, PKCS#1 v1.5 raw [all …]
|
D | test_suite_pk.data | 202 Verify ext RSA #9 (PKCS1 v1.5, RSA with options) 206 Verify ext RSA #10 (PKCS1 v1.5, RSA without options) 214 Verify ext RSA #12 (PKCS1 v1.5, good)
|
D | test_suite_psa_crypto_se_driver_hal.data | 102 Key import smoke test: RSA PKCS#1v1.5 signature 105 Key import smoke test: RSA PKCS#1v1.5 encryption
|
D | test_suite_x509write.data | 71 …"20290210144406":MBEDTLS_MD_SHA1:0:0:0:0:1:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt":0 87 …"20290210144406":MBEDTLS_MD_SHA1:0:0:0:0:0:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt":1
|
D | test_suite_x509parse.data | 181 X509 certificate v1 with extension 798 X509 CRT verification #70 (v1 trusted CA) 800 x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0… 802 X509 CRT verification #71 (v1 trusted CA, other) 804 x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0… 806 X509 CRT verification #72 (v1 chain) 808 x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NUL… 1605 X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT) 1609 X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT, ALLOW_EXTENSIONS_NON_V3) 1613 X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT) [all …]
|
D | test_suite_rsa.function | 595 /* For PKCS#1 v1.5, there is an alternative way to generate signatures */ 656 /* For PKCS#1 v1.5, there is an alternative way to verify signatures */
|
D | test_suite_psa_crypto.function | 39 * in RSA PKCS#1v1.5 signatures. A RIPEMD160-only configuration would be
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/src/ |
D | random.c | 121 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) ) in mbedtls_test_rnd_pseudo_rand() 122 + info->v1 ) ^ ( sum + k[sum & 3] ); in mbedtls_test_rnd_pseudo_rand() 124 info->v1 += ( ( ( info->v0 << 4 ) ^ ( info->v0 >> 5 ) ) in mbedtls_test_rnd_pseudo_rand()
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/data_files/ |
D | Readme-x509.txt | 30 - test-ca-v1.crt: v1 "CA", signs 31 server1-v1.crt: v1 "intermediate CA", signs 32 server2-v1*.crt: EE cert (without of with chain in same file) 58 - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal) 63 - server1*.crt: 1* R C* P1*: misc *(server1-v1 see test-ca-v1.crt above) 64 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt 66 - server2-v1*.crt: O R: see test-ca-v1.crt above 114 - crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.c…
|
D | Makefile | 404 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES 407 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES 412 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES 415 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES 420 …m PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-RC4-128 423 …m PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-RC4-128 431 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES 434 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES 439 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES 442 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/tests/include/test/ |
D | random.h | 53 uint32_t v0, v1; member
|
/openthread-2.7.6/tools/harness-automation/doc/ |
D | quickstart.rst | 7 #. Install Thread-Test-Harness1.1-Alpha v1.0-Release_40.0
|
/openthread-2.7.6/third_party/mbedtls/repo/programs/ |
D | README.md | 41 …SA private/public key and uses it to sign/verify a short string with the RSA PKCS#1 v1.5 algorithm.
|
/openthread-2.7.6/third_party/mbedtls/repo/ |
D | ChangeLog | 742 * It is now possible to perform RSA PKCS v1.5 signatures with RIPEMD-160 digest. 977 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5 988 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing 1707 * Don't print X.509 version tag for v1 CRT's, and omit extensions for 1756 * Tighten the RSA PKCS#1 v1.5 signature verification code and remove the 1858 * Tighten parsing of RSA PKCS#1 v1.5 signatures, to avoid a 2258 * Add countermeasure against Lenstra's RSA-CRT attack for PKCS#1 v1.5 2782 * Restore ability to use a v1 cert as a CA if trusted locally. (This had 2923 * Fixed bug in RSA PKCS#1 v1.5 "reversed" operations 3099 * Support faulty X509 v1 certificates with extensions [all …]
|
/openthread-2.7.6/third_party/mbedtls/repo/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 14 …ical implementation offers many algorithms (e.g. for signatures: RSA-PKCS#1v1.5, RSA-PSS, ECDSA). …
|