| /mbedtls/tests/suites/ |
| A D | test_suite_bignum.generated.data | 102 MPI add #34 negative with leading zero limb + negative with leading zero limb 111 MPI add #37 negative with leading zero limb + positive with leading zero limb 114 MPI add #38 negative with leading zero limb + negative with leading zero limb 192 MPI add #64 positive with leading zero limb + negative with leading zero limb 201 MPI add #67 positive with leading zero limb + positive with leading zero limb 222 MPI add #74 negative with leading zero limb + negative with leading zero limb 234 MPI add #78 negative with leading zero limb + negative with leading zero limb 459 MPI compare #37 negative with leading zero limb < positive with leading zero limb 462 MPI compare #38 negative with leading zero limb > negative with leading zero limb 540 MPI compare #64 positive with leading zero limb > negative with leading zero limb [all …]
|
| A D | test_suite_bignum.misc.data | 373 Multi-limb mbedtls_mpi_lt_mpi_ct (X<Y, zero vs non-zero MS limb) 520 Copy zero (1 limb) to zero (1 limb) 523 Copy zero (1 limb) to zero (null) 538 Copy zero (null) to zero (1 limb) 541 Copy zero (null) to zero (null) 559 Copy self: zero (null) 646 Swap zero (1 limb) with zero (1 limb) 649 Swap zero (1 limb) with zero (null) 664 Swap zero (null) with zero (1 limb) 667 Swap zero (null) with zero (null) [all …]
|
| A D | test_suite_ecdsa.data | 1 ECDSA primitive hash zero #1 5 ECDSA primitive hash zero #2 9 ECDSA primitive hash zero #3 13 ECDSA primitive hash zero #4 17 ECDSA primitive hash zero #5 53 ECDSA write-read hash zero #1 57 ECDSA write-read hash zero #2 61 ECDSA write-read hash zero #3 65 ECDSA write-read hash zero #4 69 ECDSA write-read hash zero #5 [all …]
|
| A D | test_suite_psa_crypto_memory.data | 10 PSA input buffer copy: zero-length source buffer 13 PSA input buffer copy: zero-length both buffers 25 PSA output buffer copy: zero-length source buffer 28 PSA output buffer copy: zero-length both buffers
|
| A D | test_suite_ecjpake.data | 34 ECJPAKE round one: KKP1: first point is zero 58 ECJPAKE round one: KKP1: zero-length r 82 ECJPAKE round one: KKP2: first point is zero 106 ECJPAKE round one: KKP2: zero-length r 148 ECJPAKE round two client: first point is zero 172 ECJPAKE round two client: zero-length r 202 ECJPAKE round two server: first point is zero 226 ECJPAKE round two server: zero-length r
|
| A D | test_suite_platform_util.function | 17 /* Write non-zero content */ 25 /* Check content is non-zero */ 34 /* Check content is zero and sentinels un-changed */
|
| A D | test_suite_alignment.data | 52 Byteswap 16 all-zero 64 Byteswap 32 all-zero 73 Byteswap 64 all-zero
|
| A D | test_suite_bignum_core.misc.data | 230 mbedtls_mpi_core_lt_ct: x<y, zero vs non-zero MS limb 266 Test mbedtls_mpi_core_uint_le_mpi: 2^31-1 with leading zero limb 272 Test mbedtls_mpi_core_uint_le_mpi: 2^32-1 with leading zero limb 278 Test mbedtls_mpi_core_uint_le_mpi: 2^32 with leading zero limb 284 Test mbedtls_mpi_core_uint_le_mpi: 2^32+1 with leading zero limb 290 Test mbedtls_mpi_core_uint_le_mpi: 2^63-1 with leading zero limb 296 Test mbedtls_mpi_core_uint_le_mpi: 2^64-1 with leading zero limb
|
| A D | test_suite_ecdsa.function | 85 mbedtls_mpi d, r, s, r_check, s_check, zero; 92 mbedtls_mpi_init(&zero); 143 /* Invalid signatures: r, s or both (CVE-2022-21449) are zero */ 144 TEST_EQUAL(mbedtls_mpi_lset(&zero, 0), 0); 147 &zero, &s_check), MBEDTLS_ERR_ECP_VERIFY_FAILED); 149 &r_check, &zero), MBEDTLS_ERR_ECP_VERIFY_FAILED); 151 &zero, &zero), MBEDTLS_ERR_ECP_VERIFY_FAILED); 189 mbedtls_mpi_free(&zero);
|
| A D | test_suite_ecp.data | 176 ECP write binary #2 (zero, buffer too small) 192 ECP write binary #6 (zero, buffer too small) 224 ECP read binary #1 (zero, invalid ilen) 228 ECP read binary #2 (zero, invalid first byte) 232 ECP read binary #3 (zero, OK) 260 ECP read binary #5 (non-zero, invalid first byte) 276 ECP read binary #6 (non-zero, OK) 328 ECP tls read point #1 (zero, invalid length byte) 332 ECP tls read point #2 (zero, OK) 340 ECP tls read point #4 (non-zero, OK) [all …]
|
| A D | test_suite_psa_crypto_util.data | 105 ECDSA DER -> Raw, 256bit, Valid r only 1 zero byte 109 ECDSA DER -> Raw, 256bit, Valid s only 1 zero byte 129 ECDSA DER -> Raw, 256bit, Invalid r: MSb set without leading zero
|
| A D | test_suite_timing.function | 28 /* Check that a non-zero time was written back */
|
| A D | test_suite_psa_crypto.function | 349 * \param do_zero_parts If non-zero, interleave zero length chunks 608 * \param do_zero_parts If non-zero, interleave zero length chunks 2133 psa_key_attributes_t zero; 2135 memset(&zero, 0, sizeof(zero)); 2944 memset(&zero, 0, sizeof(zero)); 3462 psa_mac_operation_t zero; 3464 memset(&zero, 0, sizeof(zero)); 3889 memset(&zero, 0, sizeof(zero)); 5620 /* -1 == zero length and valid buffer, 0 = zero length and NULL buffer. */ 8763 memset(&zero, 0, sizeof(zero)); [all …]
|
| A D | test_suite_psa_crypto_entropy.function | 24 * or \p expected_size is zero and the file does not exist. 27 * or \p expected_size is zero but the file exists.
|
| A D | test_suite_bignum_core.function | 326 // some zero bits 635 /* All of the inputs are +ve (or zero) */ 746 /* All of the inputs are +ve (or zero) */ 820 /* All of the inputs are +ve (or zero) */ 871 /* All of the inputs are +ve (or zero) */ 950 /* Test for zero divisor */ 985 /* All of the inputs are +ve (or zero) */ 995 /* Output is +ve (or zero) */ 1093 * expected value. Bytes above wanted_bytes must be zero. */
|
| A D | host_test.function | 371 * \param missing_unmet_dependencies Non-zero if there was a problem tracking 533 mbedtls_fprintf(stderr, "all-bits-zero is not a NULL pointer\n"); 538 * Make sure we have a snprintf that correctly zero-terminates 606 "FATAL: Dep count larger than zero at start of loop\n");
|
| A D | test_suite_bignum_mod.function | 252 * with a non-zero final parameter. */ 354 * with a non-zero final parameter. */ 404 * with a non-zero final parameter. */ 455 * with a non-zero final parameter. */
|
| A D | test_suite_asn1write.data | 367 Store named data: found, null to zero 373 Store named data: found, data to zero
|
| A D | test_suite_ssl_decrypt.function | 140 * byte that encodes the length. The minimal non-zero plaintext length 184 /* Minimal non-zero plaintext_length giving desired padding.
|
| A D | test_suite_dhm.data | 76 Diffie-Hellman zero modulus
|
| A D | test_suite_pkcs7.function | 131 /* Special-case for zero-length input so that data will be non-NULL */
|
| /mbedtls/tests/data_files/dir4/ |
| A D | Readme | 3 1. zero pathlen constraint on an intermediate CA (invalid) 8 2. zero pathlen constraint on the root CA (invalid) 39 8. zero pathlen constraint on first intermediate CA (valid) 44 9. zero pathlen constraint on trusted root (valid)
|
| /mbedtls/library/ |
| A D | mps_reader.c | 113 static mbedtls_mps_reader const zero = in mps_reader_zero() local 123 *rd = zero; in mps_reader_zero()
|
| A D | aesce.c | 316 uint8x16_t zero = vdupq_n_u8(0); in aes_sub_word() local 320 v = vaeseq_u8(zero, v); in aes_sub_word()
|
| A D | nist_kw.c | 417 const uint8_t zero[KW_SEMIBLOCK_LENGTH] = { 0 }; in mbedtls_nist_kw_unwrap() local 419 &output[*out_len - KW_SEMIBLOCK_LENGTH], zero, in mbedtls_nist_kw_unwrap()
|