/aosp_15_r20/external/wycheproof/keystore-cts/testvectors/ |
H A D | ecdsa_secp384r1_sha512_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of r misses leading 0", string 51 "comment" : "Legacy:ASN encoding of s misses leading 0", string 61 "comment" : "valid", string 69 "comment" : "long form encoding of length of sequence", string 79 "comment" : "length of sequence contains leading 0", string 89 "comment" : "wrong length of sequence", string 97 "comment" : "wrong length of sequence", string 105 "comment" : "uint32 overflow in length of sequence", string 113 "comment" : "uint64 overflow in length of sequence", string [all …]
|
H A D | ecdsa_secp384r1_sha3_384_test.json | 32 "comment" : "signature malleability", string 40 "comment" : "valid", string 48 "comment" : "long form encoding of length of sequence", string 58 "comment" : "length of sequence contains leading 0", string 68 "comment" : "wrong length of sequence", string 76 "comment" : "wrong length of sequence", string 84 "comment" : "uint32 overflow in length of sequence", string 92 "comment" : "uint64 overflow in length of sequence", string 100 "comment" : "length of sequence = 2**31 - 1", string 108 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_brainpoolP256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "valid", string 49 "comment" : "long form encoding of length of sequence", string 59 "comment" : "length of sequence contains leading 0", string 69 "comment" : "wrong length of sequence", string 77 "comment" : "wrong length of sequence", string 85 "comment" : "uint32 overflow in length of sequence", string 93 "comment" : "uint64 overflow in length of sequence", string 101 "comment" : "length of sequence = 2**31 - 1", string 109 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_secp256k1_sha3_256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of r misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_secp256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of s misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_test.json | 34 "comment" : "signature malleability", string 42 "comment" : "Legacy:ASN encoding of r misses leading 0", string 52 "comment" : "Legacy:ASN encoding of s misses leading 0", string 62 "comment" : "valid", string 70 "comment" : "long form encoding of length of sequence", string 80 "comment" : "length of sequence contains leading 0", string 90 "comment" : "wrong length of sequence", string 98 "comment" : "wrong length of sequence", string 106 "comment" : "uint32 overflow in length of sequence", string 114 "comment" : "uint64 overflow in length of sequence", string [all …]
|
/aosp_15_r20/external/cronet/third_party/rust/chromium_crates_io/vendor/wycheproof-0.4.0/src/data/ |
H A D | ecdsa_secp384r1_sha512_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of r misses leading 0", string 51 "comment" : "Legacy:ASN encoding of s misses leading 0", string 61 "comment" : "valid", string 69 "comment" : "long form encoding of length of sequence", string 79 "comment" : "length of sequence contains leading 0", string 89 "comment" : "wrong length of sequence", string 97 "comment" : "wrong length of sequence", string 105 "comment" : "uint32 overflow in length of sequence", string 113 "comment" : "uint64 overflow in length of sequence", string [all …]
|
H A D | ecdsa_secp384r1_sha3_384_test.json | 32 "comment" : "signature malleability", string 40 "comment" : "valid", string 48 "comment" : "long form encoding of length of sequence", string 58 "comment" : "length of sequence contains leading 0", string 68 "comment" : "wrong length of sequence", string 76 "comment" : "wrong length of sequence", string 84 "comment" : "uint32 overflow in length of sequence", string 92 "comment" : "uint64 overflow in length of sequence", string 100 "comment" : "length of sequence = 2**31 - 1", string 108 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_brainpoolP256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "valid", string 49 "comment" : "long form encoding of length of sequence", string 59 "comment" : "length of sequence contains leading 0", string 69 "comment" : "wrong length of sequence", string 77 "comment" : "wrong length of sequence", string 85 "comment" : "uint32 overflow in length of sequence", string 93 "comment" : "uint64 overflow in length of sequence", string 101 "comment" : "length of sequence = 2**31 - 1", string 109 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_secp256k1_sha3_256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of r misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_secp256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of s misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_test.json | 34 "comment" : "signature malleability", string 42 "comment" : "Legacy:ASN encoding of r misses leading 0", string 52 "comment" : "Legacy:ASN encoding of s misses leading 0", string 62 "comment" : "valid", string 70 "comment" : "long form encoding of length of sequence", string 80 "comment" : "length of sequence contains leading 0", string 90 "comment" : "wrong length of sequence", string 98 "comment" : "wrong length of sequence", string 106 "comment" : "uint32 overflow in length of sequence", string 114 "comment" : "uint64 overflow in length of sequence", string [all …]
|
H A D | ecdsa_secp224r1_sha256_test.json | 32 "comment" : "signature malleability", string 40 "comment" : "valid", string 48 "comment" : "long form encoding of length of sequence", string 58 "comment" : "length of sequence contains leading 0", string 68 "comment" : "wrong length of sequence", string 76 "comment" : "wrong length of sequence", string 84 "comment" : "uint32 overflow in length of sequence", string 92 "comment" : "uint64 overflow in length of sequence", string 100 "comment" : "length of sequence = 2**31 - 1", string 108 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
/aosp_15_r20/external/cronet/third_party/boringssl/src/third_party/wycheproof_testvectors/ |
H A D | ecdsa_secp384r1_sha3_384_test.json | 32 "comment" : "signature malleability", string 40 "comment" : "valid", string 48 "comment" : "long form encoding of length of sequence", string 58 "comment" : "length of sequence contains leading 0", string 68 "comment" : "wrong length of sequence", string 76 "comment" : "wrong length of sequence", string 84 "comment" : "uint32 overflow in length of sequence", string 92 "comment" : "uint64 overflow in length of sequence", string 100 "comment" : "length of sequence = 2**31 - 1", string 108 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_brainpoolP256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "valid", string 49 "comment" : "long form encoding of length of sequence", string 59 "comment" : "length of sequence contains leading 0", string 69 "comment" : "wrong length of sequence", string 77 "comment" : "wrong length of sequence", string 85 "comment" : "uint32 overflow in length of sequence", string 93 "comment" : "uint64 overflow in length of sequence", string 101 "comment" : "length of sequence = 2**31 - 1", string 109 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_secp256k1_sha3_256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of r misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_secp256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of s misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_test.json | 34 "comment" : "signature malleability", string 42 "comment" : "Legacy:ASN encoding of r misses leading 0", string 52 "comment" : "Legacy:ASN encoding of s misses leading 0", string 62 "comment" : "valid", string 70 "comment" : "long form encoding of length of sequence", string 80 "comment" : "length of sequence contains leading 0", string 90 "comment" : "wrong length of sequence", string 98 "comment" : "wrong length of sequence", string 106 "comment" : "uint32 overflow in length of sequence", string 114 "comment" : "uint64 overflow in length of sequence", string [all …]
|
H A D | ecdsa_secp224r1_sha256_test.json | 32 "comment" : "signature malleability", string 40 "comment" : "valid", string 48 "comment" : "long form encoding of length of sequence", string 58 "comment" : "length of sequence contains leading 0", string 68 "comment" : "wrong length of sequence", string 76 "comment" : "wrong length of sequence", string 84 "comment" : "uint32 overflow in length of sequence", string 92 "comment" : "uint64 overflow in length of sequence", string 100 "comment" : "length of sequence = 2**31 - 1", string 108 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
/aosp_15_r20/external/boringssl/src/third_party/wycheproof_testvectors/ |
H A D | ecdsa_secp384r1_sha3_384_test.json | 32 "comment" : "signature malleability", string 40 "comment" : "valid", string 48 "comment" : "long form encoding of length of sequence", string 58 "comment" : "length of sequence contains leading 0", string 68 "comment" : "wrong length of sequence", string 76 "comment" : "wrong length of sequence", string 84 "comment" : "uint32 overflow in length of sequence", string 92 "comment" : "uint64 overflow in length of sequence", string 100 "comment" : "length of sequence = 2**31 - 1", string 108 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_brainpoolP256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "valid", string 49 "comment" : "long form encoding of length of sequence", string 59 "comment" : "length of sequence contains leading 0", string 69 "comment" : "wrong length of sequence", string 77 "comment" : "wrong length of sequence", string 85 "comment" : "uint32 overflow in length of sequence", string 93 "comment" : "uint64 overflow in length of sequence", string 101 "comment" : "length of sequence = 2**31 - 1", string 109 "comment" : "length of sequence = 2**32 - 1", string [all …]
|
H A D | ecdsa_secp256k1_sha3_256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of r misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_secp256r1_sha256_test.json | 33 "comment" : "signature malleability", string 41 "comment" : "Legacy:ASN encoding of s misses leading 0", string 51 "comment" : "valid", string 59 "comment" : "long form encoding of length of sequence", string 69 "comment" : "length of sequence contains leading 0", string 79 "comment" : "wrong length of sequence", string 87 "comment" : "wrong length of sequence", string 95 "comment" : "uint32 overflow in length of sequence", string 103 "comment" : "uint64 overflow in length of sequence", string 111 "comment" : "length of sequence = 2**31 - 1", string [all …]
|
H A D | ecdsa_brainpoolP224r1_sha224_test.json | 34 "comment" : "signature malleability", string 42 "comment" : "Legacy:ASN encoding of r misses leading 0", string 52 "comment" : "Legacy:ASN encoding of s misses leading 0", string 62 "comment" : "valid", string 70 "comment" : "long form encoding of length of sequence", string 80 "comment" : "length of sequence contains leading 0", string 90 "comment" : "wrong length of sequence", string 98 "comment" : "wrong length of sequence", string 106 "comment" : "uint32 overflow in length of sequence", string 114 "comment" : "uint64 overflow in length of sequence", string [all …]
|
H A D | ecdsa_secp224r1_sha256_test.json | 32 "comment" : "signature malleability", string 40 "comment" : "valid", string 48 "comment" : "long form encoding of length of sequence", string 58 "comment" : "length of sequence contains leading 0", string 68 "comment" : "wrong length of sequence", string 76 "comment" : "wrong length of sequence", string 84 "comment" : "uint32 overflow in length of sequence", string 92 "comment" : "uint64 overflow in length of sequence", string 100 "comment" : "length of sequence = 2**31 - 1", string 108 "comment" : "length of sequence = 2**32 - 1", string [all …]
|