Searched refs:overflow (Results 1 – 15 of 15) sorted by relevance
/mbedtls-development/library/ |
A D | mps_reader.c | 461 int overflow; in mbedtls_mps_reader_reclaim() local 506 overflow = 0; in mbedtls_mps_reader_reclaim() 507 overflow |= ( backup_len < acc_backup_len ); in mbedtls_mps_reader_reclaim() 508 overflow |= ( acc_len_needed < backup_len ); in mbedtls_mps_reader_reclaim() 510 if( overflow || acc_len < acc_len_needed ) in mbedtls_mps_reader_reclaim()
|
A D | cmac.c | 73 unsigned char overflow = 0x00; in cmac_multiply_by_u() local 91 output[i] = input[i] << 1 | overflow; in cmac_multiply_by_u() 92 overflow = input[i] >> 7; in cmac_multiply_by_u()
|
/mbedtls-development/ |
A D | BUGS.md | 14 3. If the issue is a security risk (for example: buffer overflow,
|
A D | ChangeLog | 538 * Fix a stack buffer overflow with mbedtls_net_poll() and 1354 * Fix 1-byte buffer overflow in mbedtls_mpi_write_string() when 1429 previously lead to a stack overflow on constrained targets. 2116 overflow. #1179 2670 * Fix potential integer overflow to buffer overflow in 2797 * Fix stack buffer overflow in pkcs12 decryption (used by 2800 * Fix potential buffer overflow in mbedtls_mpi_read_string(). 3492 * Fixed possible buffer overflow with overlong PSK 3574 * Fixed potential overflow in certificate size verification in 4075 * Potential heap buffer overflow on large hostname setting [all …]
|
A D | CMakeLists.txt | 188 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat-overflow=2 -Wformat-truncation")
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ccm.data | 1589 CCM encrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1597 CCM encrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1605 CCM encrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1621 CCM decrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1629 CCM decrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1637 CCM decrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)) 1653 CCM* encrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1661 CCM* encrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1665 CCM* encrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1685 CCM* decrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) [all …]
|
A D | test_suite_mps.data | 124 MPS Reader: Excess request leading to integer overflow
|
A D | test_suite_gcm.function | 35 * count as an overflow for memory sanitizers and static checkers. */ 90 * count as an overflow for memory sanitizers and static checkers. */
|
A D | test_suite_ccm.function | 34 * count as an overflow for memory sanitizers and static checkers. */ 561 // subtract 1 from configured auth data length to provoke an overflow 708 // subtract 1 from configured msg length to provoke an overflow
|
A D | test_suite_pk.data | 235 RSA hash_len overflow (size_t vs unsigned int)
|
A D | test_suite_ssl.function | 168 size_t overflow = 0; 194 overflow = ( buf->start + buf->content_length + input_len ) 199 input_len - overflow ); 200 memcpy( buf->buffer, input + input_len - overflow, overflow ); 229 size_t overflow = 0; 244 overflow = ( buf->start + output_len ) % buf->capacity; 249 memcpy( output, buf->buffer + buf->start, output_len - overflow ); 250 memcpy( output + output_len - overflow, buf->buffer, overflow );
|
A D | test_suite_x509parse.data | 1052 X509 CRT ASN1 (TBS, valid version tag + length, version number overflow) 2120 X509 CRL ASN1 (invalid version overflow) 2296 X509 OID numstring #5 (arithmetic overflow) 2572 X509 CSR ASN.1 (invalid version overflow)
|
A D | test_suite_ssl.data | 67 Message queue - overflow/underflow 82 Message transport mock - queue overflow/underflow 85 Message transport mock - socket overflow
|
A D | test_suite_psa_crypto.function | 5129 * checking the error code then they don't overflow a buffer. */ 5364 * checking the error code then they don't overflow a buffer. */
|
/mbedtls-development/programs/fuzz/ |
A D | README.md | 6 …he fuzz target, and alert in case of an unwanted behavior (such as a buffer overflow for instance).
|
Completed in 63 milliseconds