Home
last modified time | relevance | path

Searched refs:overflow (Results 1 – 15 of 15) sorted by relevance

/mbedtls-development/library/
A Dmps_reader.c461 int overflow; in mbedtls_mps_reader_reclaim() local
506 overflow = 0; in mbedtls_mps_reader_reclaim()
507 overflow |= ( backup_len < acc_backup_len ); in mbedtls_mps_reader_reclaim()
508 overflow |= ( acc_len_needed < backup_len ); in mbedtls_mps_reader_reclaim()
510 if( overflow || acc_len < acc_len_needed ) in mbedtls_mps_reader_reclaim()
A Dcmac.c73 unsigned char overflow = 0x00; in cmac_multiply_by_u() local
91 output[i] = input[i] << 1 | overflow; in cmac_multiply_by_u()
92 overflow = input[i] >> 7; in cmac_multiply_by_u()
/mbedtls-development/
A DBUGS.md14 3. If the issue is a security risk (for example: buffer overflow,
A DChangeLog538 * Fix a stack buffer overflow with mbedtls_net_poll() and
1354 * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when
1429 previously lead to a stack overflow on constrained targets.
2116 overflow. #1179
2670 * Fix potential integer overflow to buffer overflow in
2797 * Fix stack buffer overflow in pkcs12 decryption (used by
2800 * Fix potential buffer overflow in mbedtls_mpi_read_string().
3492 * Fixed possible buffer overflow with overlong PSK
3574 * Fixed potential overflow in certificate size verification in
4075 * Potential heap buffer overflow on large hostname setting
[all …]
A DCMakeLists.txt188 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat-overflow=2 -Wformat-truncation")
/mbedtls-development/tests/suites/
A Dtest_suite_ccm.data1589 CCM encrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1597 CCM encrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1605 CCM encrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1621 CCM decrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1629 CCM decrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1637 CCM decrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16))
1653 CCM* encrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1661 CCM* encrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1665 CCM* encrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1685 CCM* decrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
[all …]
A Dtest_suite_mps.data124 MPS Reader: Excess request leading to integer overflow
A Dtest_suite_gcm.function35 * count as an overflow for memory sanitizers and static checkers. */
90 * count as an overflow for memory sanitizers and static checkers. */
A Dtest_suite_ccm.function34 * count as an overflow for memory sanitizers and static checkers. */
561 // subtract 1 from configured auth data length to provoke an overflow
708 // subtract 1 from configured msg length to provoke an overflow
A Dtest_suite_pk.data235 RSA hash_len overflow (size_t vs unsigned int)
A Dtest_suite_ssl.function168 size_t overflow = 0;
194 overflow = ( buf->start + buf->content_length + input_len )
199 input_len - overflow );
200 memcpy( buf->buffer, input + input_len - overflow, overflow );
229 size_t overflow = 0;
244 overflow = ( buf->start + output_len ) % buf->capacity;
249 memcpy( output, buf->buffer + buf->start, output_len - overflow );
250 memcpy( output + output_len - overflow, buf->buffer, overflow );
A Dtest_suite_x509parse.data1052 X509 CRT ASN1 (TBS, valid version tag + length, version number overflow)
2120 X509 CRL ASN1 (invalid version overflow)
2296 X509 OID numstring #5 (arithmetic overflow)
2572 X509 CSR ASN.1 (invalid version overflow)
A Dtest_suite_ssl.data67 Message queue - overflow/underflow
82 Message transport mock - queue overflow/underflow
85 Message transport mock - socket overflow
A Dtest_suite_psa_crypto.function5129 * checking the error code then they don't overflow a buffer. */
5364 * checking the error code then they don't overflow a buffer. */
/mbedtls-development/programs/fuzz/
A DREADME.md6 …he fuzz target, and alert in case of an unwanted behavior (such as a buffer overflow for instance).

Completed in 63 milliseconds