| /mbedtls/tests/suites/ |
| A D | test_suite_ecjpake.data | 28 ECJPAKE round one: KKP1: length of first point too big 34 ECJPAKE round one: KKP1: first point is zero 37 ECJPAKE round one: KKP1: unknown first point format 40 ECJPAKE round one: KKP1: nothing after first point 82 ECJPAKE round one: KKP2: first point is zero 85 ECJPAKE round one: KKP2: unknown first point format 88 ECJPAKE round one: KKP2: nothing after first point 145 ECJPAKE round two client: no first point data 148 ECJPAKE round two client: first point is zero 199 ECJPAKE round two server: no first point data [all …]
|
| A D | test_suite_ecdh.data | 76 ECDH calc_secret: ours first, SECP256R1 (RFC 5903) 80 ECDH calc_secret: theirs first, SECP256R1 (RFC 5903) 84 ecdh calc_secret: ours first (Alice), curve25519 (rfc 7748) 88 ecdh calc_secret: theirs first (Alice), curve25519 (rfc 7748) 92 ecdh calc_secret: ours first (Bob), curve25519 (rfc 7748)
|
| A D | test_suite_oid.data | 117 OID get numeric string - multi-byte first subidentifier 141 OID get numeric string - 1 byte first subidentifier beyond 2.39 166 OID from numeric string - multi-byte first subidentifier 172 OID from numeric string - first component not a number 178 OID from numeric string - first component too large 181 OID from numeric string - first component < 2, second > 39 187 OID from numeric string - non-'.' separator between first and second
|
| A D | test_suite_bignum_core.misc.data | 170 mbedtls_mpi_core_lt_ct: x>y (63 bit x, y first byte greater) 173 mbedtls_mpi_core_lt_ct: x<y (63 bit y, x first byte greater) 194 mbedtls_mpi_core_lt_ct: x>y (64 bit x, first bytes equal) 197 mbedtls_mpi_core_lt_ct: x<y (64 bit y, first bytes equal) 200 mbedtls_mpi_core_lt_ct: x>y (31 bit x, y first byte greater) 203 mbedtls_mpi_core_lt_ct: x<y (31 bit y, x first byte greater) 224 mbedtls_mpi_core_lt_ct: x>y (32 bit x, first bytes equal) 227 mbedtls_mpi_core_lt_ct: x<y (32 bit y, first bytes equal)
|
| A D | test_suite_psa_crypto_pake.data | 81 PSA PAKE: invalid first input step 101 PSA PAKE: invalid first output step 121 PSA PAKE: check rounds w/o forced errors, client input first 137 PSA PAKE: no injected errors, client input first
|
| A D | test_suite_bignum_mod.misc.data | 25 mpi_mod_sub with first input too long 34 mpi_mod_sub with first input too short 90 mpi_mod_add with first input too long 99 mpi_mod_add with first input too short
|
| A D | test_suite_x509parse.function | 98 mbedtls_x509_crt *first; 110 first = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); 111 if (first == NULL) { 115 mbedtls_x509_crt_init(first); 117 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 124 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 133 mbedtls_x509_crt_free(first); 134 mbedtls_free(first); 135 first = NULL; 138 *candidates = first; [all …]
|
| A D | test_suite_lms.function | 94 /* Altering first message byte must cause verification failure */ 108 /* Altering first signature byte must cause verification failure */
|
| A D | test_suite_psa_crypto_memory.function | 47 /* Note: We compare the first src_len bytes of each buffer, as this is what was copied. */ 74 /* Note: We compare the first src_len bytes of each buffer, as this is what was copied. */
|
| A D | test_suite_lmots.function | 94 /* Altering first message byte must cause verification failure */ 107 /* Altering first signature byte must cause verification failure */
|
| A D | test_suite_alignment.function | 351 /* Big-endian: data stored MSB first, i.e. p == { 0x12, 0x34 } */ 355 /* Little-endian: data stored LSB first, i.e. p == { 0x34, 0x12 } */
|
| A D | test_suite_psa_crypto_pake.function | 147 /* Server first round Output */ 216 /* Client first round Input */ 260 /* Client first round Output */ 316 /* Client first round Input */ 354 /* Server first round Input */
|
| A D | test_suite_asn1write.data | 352 Store named data: first 364 Store named data: first match
|
| A D | test_suite_pkcs1_v15.data | 79 RSAES-V15 decoding: bad first byte
|
| /mbedtls/scripts/ |
| A D | generate_errors.pl | 148 my $first; 168 $first = 0; 171 ${$code_check} .= " || " if ($first++); 179 $first = 0; 182 ${$code_check} .= " || " if ($first); 183 $headers .= " || " if ($first++); 202 my $first = 0; 205 $ll_code_check .= " || " if ($first++); 213 my $first = 0; 216 $hl_code_check .= " || " if ($first++);
|
| /mbedtls/library/ |
| A D | memory_buffer_alloc.c | 51 memory_header *first; member 95 memory_header *cur = heap.first; in debug_chain() 155 memory_header *prv = heap.first, *cur; in verify_chain() 165 if (heap.first->prev != NULL) { in verify_chain() 173 cur = heap.first->next; in verify_chain() 503 if (heap.first->next == NULL) { in mbedtls_memory_buffer_alloc_status() 589 heap.first = (memory_header *) buf; in mbedtls_memory_buffer_alloc_init() 591 heap.first->magic1 = MAGIC1; in mbedtls_memory_buffer_alloc_init() 592 heap.first->magic2 = MAGIC2; in mbedtls_memory_buffer_alloc_init() 593 heap.first_free = heap.first; in mbedtls_memory_buffer_alloc_init() [all …]
|
| A D | x509_internal.h | 55 mbedtls_asn1_named_data *first); 57 mbedtls_asn1_named_data *first);
|
| A D | x509_create.c | 447 mbedtls_asn1_named_data *first) in mbedtls_x509_write_names() argument 451 mbedtls_asn1_named_data *cur = first; in mbedtls_x509_write_names() 549 mbedtls_asn1_named_data *first) in mbedtls_x509_write_extensions() argument 553 mbedtls_asn1_named_data *cur_ext = first; in mbedtls_x509_write_extensions()
|
| /mbedtls/programs/ssl/ |
| A D | ssl_test_lib.c | 316 mbedtls_x509_crt *first; in ca_callback() local 328 first = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); in ca_callback() 329 if (first == NULL) { in ca_callback() 333 mbedtls_x509_crt_init(first); in ca_callback() 335 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 342 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 351 mbedtls_x509_crt_free(first); in ca_callback() 352 mbedtls_free(first); in ca_callback() 353 first = NULL; in ca_callback() 356 *candidates = first; in ca_callback()
|
| /mbedtls/docs/architecture/testing/ |
| A D | test-framework.md | 13 …n which succinctly describes for a human audience what the test does. The first non-comment line o… 21 …criptions, but they should be avoided. At least please make sure that the first 66 characters desc… 33 …ibes for a human audience what the test does. The test description is the first parameter to `run_…
|
| /mbedtls/ |
| A D | .uncrustify.cfg | 107 # No spaces inside the first parentheses in a function type 152 # (Uncrustify >= 0.73.0) Remove space in empty first statement of a for 238 # Disable removal of leading spaces in a multi-line comment if the first and
|
| A D | .readthedocs.yaml | 24 … # Work around Readthedocs bug: Command parsing fails if the 'if' statement is on the first line
|
| A D | BRANCHES.md | 66 comes in conflict with backwards compatibility, we will put security first, 95 will put security first but provide a compatibility option. (So far we never
|
| /mbedtls/docs/architecture/ |
| A D | tls13-support.md | 170 PR upstreaming the first part of TLS 1.3 ClientHello writing code. 204 the address of the first byte of the vector length. 207 address of the first byte of the vector value. 210 the address of the first byte past the vector value. 234 The three first types, MBEDTLS_BYTE_{0-8}, MBEDTLS_PUT_UINT{8|16|32|64}_BE 303 at the 80 first characters is enough to fully understand the line. For
|
| /mbedtls/tests/data_files/dir4/ |
| A D | Readme | 39 8. zero pathlen constraint on first intermediate CA (valid)
|