/external/python/cryptography/tests/wycheproof/ |
D | test_rsa.py | 26 def should_verify(backend, wycheproof): argument 27 if wycheproof.valid: 30 if wycheproof.acceptable: 33 wycheproof.has_flag("MissingNull") 65 def test_rsa_pkcs1v15_signature(backend, wycheproof): argument 67 binascii.unhexlify(wycheproof.testgroup["keyDer"]), backend 69 digest = _DIGESTS[wycheproof.testgroup["sha"]] 71 if should_verify(backend, wycheproof): 73 binascii.unhexlify(wycheproof.testcase["sig"]), 74 binascii.unhexlify(wycheproof.testcase["msg"]), [all …]
|
D | test_aes.py | 24 def test_aes_cbc_pkcs5(backend, wycheproof): argument 25 key = binascii.unhexlify(wycheproof.testcase["key"]) 26 iv = binascii.unhexlify(wycheproof.testcase["iv"]) 27 msg = binascii.unhexlify(wycheproof.testcase["msg"]) 28 ct = binascii.unhexlify(wycheproof.testcase["ct"]) 39 if wycheproof.valid or wycheproof.acceptable: 51 def test_aes_gcm(backend, wycheproof): argument 52 key = binascii.unhexlify(wycheproof.testcase["key"]) 53 iv = binascii.unhexlify(wycheproof.testcase["iv"]) 54 aad = binascii.unhexlify(wycheproof.testcase["aad"]) [all …]
|
D | test_ecdh.py | 52 def test_ecdh(backend, wycheproof): argument 53 curve = _CURVES[wycheproof.testgroup["curve"]] 56 "Unsupported curve ({})".format(wycheproof.testgroup["curve"]) 61 int(wycheproof.testcase["private"], 16), curve, backend 66 binascii.unhexlify(wycheproof.testcase["public"]), backend 69 assert wycheproof.has_flag("UnnamedCurve") 72 assert wycheproof.invalid or wycheproof.acceptable 77 if wycheproof.valid or wycheproof.acceptable: 79 expected_shared = binascii.unhexlify(wycheproof.testcase["shared"]) 93 def test_ecdh_ecpoint(backend, wycheproof): argument [all …]
|
D | test_keywrap.py | 17 def test_keywrap_with_padding(backend, wycheproof): argument 18 wrapping_key = binascii.unhexlify(wycheproof.testcase["key"]) 19 key_to_wrap = binascii.unhexlify(wycheproof.testcase["msg"]) 20 expected = binascii.unhexlify(wycheproof.testcase["ct"]) 25 if wycheproof.valid or wycheproof.acceptable: 28 if wycheproof.valid or (wycheproof.acceptable and not len(expected) < 16): 42 def test_keywrap(backend, wycheproof): argument 43 wrapping_key = binascii.unhexlify(wycheproof.testcase["key"]) 44 key_to_wrap = binascii.unhexlify(wycheproof.testcase["msg"]) 45 expected = binascii.unhexlify(wycheproof.testcase["ct"]) [all …]
|
D | test_ecdsa.py | 45 def test_ecdsa_signature(backend, wycheproof): argument 48 binascii.unhexlify(wycheproof.testgroup["keyDer"]), backend 56 wycheproof.testgroup["key"]["curve"] 59 digest = _DIGESTS[wycheproof.testgroup["sha"]] 62 wycheproof.valid or 63 (wycheproof.acceptable and not wycheproof.has_flag("MissingZero")) 66 binascii.unhexlify(wycheproof.testcase["sig"]), 67 binascii.unhexlify(wycheproof.testcase["msg"]), 73 binascii.unhexlify(wycheproof.testcase["sig"]), 74 binascii.unhexlify(wycheproof.testcase["msg"]),
|
D | test_dsa.py | 27 def test_dsa_signature(backend, wycheproof): argument 29 binascii.unhexlify(wycheproof.testgroup["keyDer"]), backend 31 digest = _DIGESTS[wycheproof.testgroup["sha"]] 34 wycheproof.valid or ( 35 wycheproof.acceptable and not wycheproof.has_flag("NoLeadingZero") 39 binascii.unhexlify(wycheproof.testcase["sig"]), 40 binascii.unhexlify(wycheproof.testcase["msg"]), 46 binascii.unhexlify(wycheproof.testcase["sig"]), 47 binascii.unhexlify(wycheproof.testcase["msg"]),
|
D | test_x25519.py | 23 def test_x25519(backend, wycheproof): argument 24 assert list(wycheproof.testgroup.items()) == [("curve", "curve25519")] 27 binascii.unhexlify(wycheproof.testcase["private"]) 30 binascii.unhexlify(wycheproof.testcase["public"]) 33 assert wycheproof.valid or wycheproof.acceptable 35 expected = binascii.unhexlify(wycheproof.testcase["shared"]) 37 assert wycheproof.acceptable
|
D | test_chacha20poly1305.py | 24 def test_chacha2poly1305(wycheproof): argument 25 key = binascii.unhexlify(wycheproof.testcase["key"]) 26 iv = binascii.unhexlify(wycheproof.testcase["iv"]) 27 aad = binascii.unhexlify(wycheproof.testcase["aad"]) 28 msg = binascii.unhexlify(wycheproof.testcase["msg"]) 29 ct = binascii.unhexlify(wycheproof.testcase["ct"]) 30 tag = binascii.unhexlify(wycheproof.testcase["tag"]) 32 if wycheproof.valid:
|
D | test_cmac.py | 19 def test_aes_cmac(backend, wycheproof): argument 20 key = binascii.unhexlify(wycheproof.testcase["key"]) 21 msg = binascii.unhexlify(wycheproof.testcase["msg"]) 22 tag = binascii.unhexlify(wycheproof.testcase["tag"]) 25 if wycheproof.valid and len(tag) == 16:
|
D | test_utils.py | 13 wycheproof = WycheproofTest({}, {"tcId": 3}) 14 assert repr(wycheproof) == "<WycheproofTest({}, {'tcId': 3}, tcId=3)>"
|
/external/wycheproof/ |
D | BUILD | 6 "java/com/google/security/wycheproof/EcUtil.java", 7 "java/com/google/security/wycheproof/RandomUtil.java", 8 "java/com/google/security/wycheproof/TestUtil.java", 16 …t_srcs = glob(["java/com/google/security/wycheproof/testcases/*.java"]) + ["java/com/google/securi… 36 srcs = ["java/com/google/security/wycheproof/BouncyCastleAllTests.java"] + test_srcs, 37 test_class = "com.google.security.wycheproof.BouncyCastleAllTests", 47 srcs = ["java/com/google/security/wycheproof/BouncyCastleAllTests.java"] + test_srcs, 48 test_class = "com.google.security.wycheproof.BouncyCastleAllTests", 66 srcs = ["java/com/google/security/wycheproof/SpongyCastleAllTests.java"] + test_srcs, 67 test_class = "com.google.security.wycheproof.SpongyCastleAllTests", [all …]
|
D | Android.bp | 22 name: "wycheproof", 24 "//cts/tests/libcore/wycheproof", 25 "//cts/tests/libcore/wycheproof-bc", 29 "java/com/google/security/wycheproof/SpongyCastleTest.java", 30 "java/com/google/security/wycheproof/SpongyCastleAllTests.java",
|
D | README.md | 2 https://github.com/google/wycheproof 94 git clone https://github.com/google/wycheproof.git 172 [DsaTest](https://github.com/google/wycheproof/blob/master/java/com/google/security/wycheproof/test… 179 [EcdhTest](https://github.com/google/wycheproof/blob/master/java/com/google/security/wycheproof/tes… 197 [mailing list](https://groups.google.com/forum/#!forum/wycheproof-users). To 198 join, simply send an empty mail to wycheproof-users+subscribe@googlegroups.com.
|
/external/wycheproof/java/com/google/security/wycheproof/ |
D | OpenJDKTest.java | 1 package com.google.security.wycheproof; 3 import com.google.security.wycheproof.WycheproofRunner.Fast; 4 import com.google.security.wycheproof.WycheproofRunner.Provider; 5 import com.google.security.wycheproof.WycheproofRunner.ProviderType;
|
D | ConscryptTest.java | 17 package com.google.security.wycheproof; 19 import com.google.security.wycheproof.WycheproofRunner.Fast; 20 import com.google.security.wycheproof.WycheproofRunner.Provider; 21 import com.google.security.wycheproof.WycheproofRunner.ProviderType;
|
D | BouncyCastleTest.java | 17 package com.google.security.wycheproof; 19 import com.google.security.wycheproof.WycheproofRunner.Fast; 20 import com.google.security.wycheproof.WycheproofRunner.Provider; 21 import com.google.security.wycheproof.WycheproofRunner.ProviderType;
|
D | SpongyCastleTest.java | 17 package com.google.security.wycheproof; 19 import com.google.security.wycheproof.WycheproofRunner.Fast; 20 import com.google.security.wycheproof.WycheproofRunner.Provider; 21 import com.google.security.wycheproof.WycheproofRunner.ProviderType;
|
D | OpenJDKAllTests.java | 1 package com.google.security.wycheproof; 3 import com.google.security.wycheproof.WycheproofRunner.Provider; 4 import com.google.security.wycheproof.WycheproofRunner.ProviderType;
|
D | BouncyCastleAllTests.java | 17 package com.google.security.wycheproof; 19 import com.google.security.wycheproof.WycheproofRunner.Provider; 20 import com.google.security.wycheproof.WycheproofRunner.ProviderType;
|
D | SpongyCastleAllTests.java | 17 package com.google.security.wycheproof; 19 import com.google.security.wycheproof.WycheproofRunner.Provider; 20 import com.google.security.wycheproof.WycheproofRunner.ProviderType;
|
/external/python/cryptography/ |
D | Jenkinsfile | 86 relativeTargetDir: 'wycheproof', 89 'url': 'https://github.com/google/wycheproof', 133 tox -r -- --wycheproof-root=../wycheproof 153 tox -r -- --color=yes --wycheproof-root=../wycheproof 166 tox -r -- --color=yes --wycheproof-root=../wycheproof
|
/external/python/cryptography/tests/ |
D | conftest.py | 26 wycheproof = metafunc.config.getoption("--wycheproof-root") 27 skip_if_wycheproof_none(wycheproof) 32 testcases.extend(load_wycheproof_tests(wycheproof, path))
|
/external/python/cryptography/.travis/ |
D | run.sh | 30 -v "${HOME}/wycheproof":/wycheproof \ 35 tox -- --wycheproof-root="$HOME/wycheproof"
|
/external/wycheproof/java/com/google/security/wycheproof/testcases/ |
D | DhiesTest.java | 17 package com.google.security.wycheproof; 19 import com.google.security.wycheproof.WycheproofRunner.ProviderType; 20 import com.google.security.wycheproof.WycheproofRunner.SlowTest;
|
D | DhTest.java | 17 package com.google.security.wycheproof; 19 import com.google.security.wycheproof.WycheproofRunner.ProviderType; 20 import com.google.security.wycheproof.WycheproofRunner.SlowTest;
|