Home
last modified time | relevance | path

Searched refs:v1 (Results 1 – 20 of 20) sorted by relevance

/openthread-2.7.6/third_party/mbedtls/repo/library/
Dxtea.c97 uint32_t *k, v0, v1, i; in mbedtls_xtea_crypt_ecb() local
102 GET_UINT32_BE( v1, input, 4 ); in mbedtls_xtea_crypt_ecb()
110 v0 += (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb()
112 v1 += (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb()
121 v1 -= (((v0 << 4) ^ (v0 >> 5)) + v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_xtea_crypt_ecb()
123 v0 -= (((v1 << 4) ^ (v1 >> 5)) + v1) ^ (sum + k[sum & 3]); in mbedtls_xtea_crypt_ecb()
128 PUT_UINT32_BE( v1, output, 4 ); in mbedtls_xtea_crypt_ecb()
Dbignum.c1056 size_t i, v0, v1; in mbedtls_mpi_shift_r() local
1061 v1 = count & (biL - 1); in mbedtls_mpi_shift_r()
1063 if( v0 > X->n || ( v0 == X->n && v1 > 0 ) ) in mbedtls_mpi_shift_r()
1081 if( v1 > 0 ) in mbedtls_mpi_shift_r()
1085 r1 = X->p[i - 1] << (biL - v1); in mbedtls_mpi_shift_r()
1086 X->p[i - 1] >>= v1; in mbedtls_mpi_shift_r()
Dcipher.c83 static int mbedtls_constant_time_memcmp( const void *v1, const void *v2, in mbedtls_constant_time_memcmp() argument
86 const unsigned char *p1 = (const unsigned char*) v1; in mbedtls_constant_time_memcmp()
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_rsa.data4 RSA PKCS1 Verify v1.5 CAVS #1
9 RSA PKCS1 Verify v1.5 CAVS #2
13 RSA PKCS1 Verify v1.5 CAVS #3
17 RSA PKCS1 Verify v1.5 CAVS #4
21 RSA PKCS1 Verify v1.5 CAVS #5
25 RSA PKCS1 Verify v1.5 CAVS #6
29 RSA PKCS1 Verify v1.5 CAVS #7
34 RSA PKCS1 Verify v1.5 CAVS #8
38 RSA PKCS1 Verify v1.5 CAVS #9
42 RSA PKCS1 Verify v1.5 CAVS #10
[all …]
Dtest_suite_psa_crypto_metadata.data148 Asymmetric signature: RSA PKCS#1 v1.5 raw
152 Asymmetric signature: RSA PKCS#1 v1.5 SHA-256
172 Asymmetric signature: RSA PKCS#1 v1.5 with wildcard hash
188 Asymmetric encryption: RSA PKCS#1 v1.5
Dtest_suite_psa_crypto.data474 PSA key policy: asymmetric encryption, wrong algorithm (v1.5/OAEP)
518 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256
522 PSA key policy: asymmetric signature, wildcard in policy, PKCS#1v1.5 raw
1691 PSA signature size: RSA keypair, 1024 bits, PKCS#1 v1.5 raw
1694 PSA signature size: RSA public key, 1024 bits, PKCS#1 v1.5 raw
1697 PSA signature size: RSA keypair, 1024 bits, PKCS#1 v1.5 SHA-256
1703 PSA signature size: RSA keypair, 1023 bits, PKCS#1 v1.5 raw
1706 PSA signature size: RSA keypair, 1025 bits, PKCS#1 v1.5 raw
1709 PSA import/exercise RSA keypair, PKCS#1 v1.5 raw
1717 PSA import/exercise RSA public key, PKCS#1 v1.5 raw
[all …]
Dtest_suite_pk.data202 Verify ext RSA #9 (PKCS1 v1.5, RSA with options)
206 Verify ext RSA #10 (PKCS1 v1.5, RSA without options)
214 Verify ext RSA #12 (PKCS1 v1.5, good)
Dtest_suite_psa_crypto_se_driver_hal.data102 Key import smoke test: RSA PKCS#1v1.5 signature
105 Key import smoke test: RSA PKCS#1v1.5 encryption
Dtest_suite_x509write.data71 …"20290210144406":MBEDTLS_MD_SHA1:0:0:0:0:1:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt":0
87 …"20290210144406":MBEDTLS_MD_SHA1:0:0:0:0:0:MBEDTLS_X509_CRT_VERSION_1:"data_files/server1.v1.crt":1
Dtest_suite_x509parse.data181 X509 certificate v1 with extension
798 X509 CRT verification #70 (v1 trusted CA)
800 x509_verify:"data_files/server1-v1.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NULL":0:0…
802 X509 CRT verification #71 (v1 trusted CA, other)
804 x509_verify:"data_files/server2-v1.crt":"data_files/server1-v1.crt":"data_files/crl.pem":"NULL":0:0…
806 X509 CRT verification #72 (v1 chain)
808 x509_verify:"data_files/server2-v1-chain.crt":"data_files/test-ca-v1.crt":"data_files/crl.pem":"NUL…
1605 X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT)
1609 X509 CRT ASN1 (TBS, IssuerID unsupported in v1 CRT, ALLOW_EXTENSIONS_NON_V3)
1613 X509 CRT ASN1 (TBS, SubjectID unsupported in v1 CRT)
[all …]
Dtest_suite_rsa.function595 /* For PKCS#1 v1.5, there is an alternative way to generate signatures */
656 /* For PKCS#1 v1.5, there is an alternative way to verify signatures */
Dtest_suite_psa_crypto.function39 * in RSA PKCS#1v1.5 signatures. A RIPEMD160-only configuration would be
/openthread-2.7.6/third_party/mbedtls/repo/tests/src/
Drandom.c121 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) ) in mbedtls_test_rnd_pseudo_rand()
122 + info->v1 ) ^ ( sum + k[sum & 3] ); in mbedtls_test_rnd_pseudo_rand()
124 info->v1 += ( ( ( info->v0 << 4 ) ^ ( info->v0 >> 5 ) ) in mbedtls_test_rnd_pseudo_rand()
/openthread-2.7.6/third_party/mbedtls/repo/tests/data_files/
DReadme-x509.txt30 - test-ca-v1.crt: v1 "CA", signs
31 server1-v1.crt: v1 "intermediate CA", signs
32 server2-v1*.crt: EE cert (without of with chain in same file)
58 - cert_v1_with_ext.crt: 1 R: v1 with extensions (illegal)
63 - server1*.crt: 1* R C* P1*: misc *(server1-v1 see test-ca-v1.crt above)
64 *CRL for: .cert_type.crt, .crt, .key_usage.crt, .v1.crt
66 - server2-v1*.crt: O R: see test-ca-v1.crt above
114 - crl.pem, crl-futureRevocationDate.pem, crl_expired.pem: (1) server1{,.cert_type,.key_usage,.v1}.c…
DMakefile404 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES
407 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES
412 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES
415 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES
420 …m PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-RC4-128
423 …m PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-RC4-128
431 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES
434 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-3DES
439 …form PEM -in $< -outform DER -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES
442 …form PEM -in $< -outform PEM -out $@ -passout "pass:$(keys_rsa_pkcs8_pwd)" -topk8 -v1 PBE-SHA1-2DES
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/tests/include/test/
Drandom.h53 uint32_t v0, v1; member
/openthread-2.7.6/tools/harness-automation/doc/
Dquickstart.rst7 #. Install Thread-Test-Harness1.1-Alpha v1.0-Release_40.0
/openthread-2.7.6/third_party/mbedtls/repo/programs/
DREADME.md41 …SA private/public key and uses it to sign/verify a short string with the RSA PKCS#1 v1.5 algorithm.
/openthread-2.7.6/third_party/mbedtls/repo/
DChangeLog742 * It is now possible to perform RSA PKCS v1.5 signatures with RIPEMD-160 digest.
977 * Fix timing variations and memory access variations in RSA PKCS#1 v1.5
988 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
1707 * Don't print X.509 version tag for v1 CRT's, and omit extensions for
1756 * Tighten the RSA PKCS#1 v1.5 signature verification code and remove the
1858 * Tighten parsing of RSA PKCS#1 v1.5 signatures, to avoid a
2258 * Add countermeasure against Lenstra's RSA-CRT attack for PKCS#1 v1.5
2782 * Restore ability to use a v1 cert as a CA if trusted locally. (This had
2923 * Fixed bug in RSA PKCS#1 v1.5 "reversed" operations
3099 * Support faulty X509 v1 certificates with extensions
[all …]
/openthread-2.7.6/third_party/mbedtls/repo/docs/proposed/
Dpsa-conditional-inclusion-c.md14 …ical implementation offers many algorithms (e.g. for signatures: RSA-PKCS#1v1.5, RSA-PSS, ECDSA). …