| /lib/mbedtls/external/mbedtls/tests/data_files/dir4/ |
| A D | Readme | 23 …nzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (valid) 28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid) 33 … on the root CA with maximum number of elements and a self signed certificate in the chain (valid) 39 8. zero pathlen constraint on first intermediate CA (valid) 44 9. zero pathlen constraint on trusted root (valid)
|
| /lib/lwip/lwip/src/core/ipv4/ |
| A D | ip4_frag.c | 351 int valid = 1; in ip_reass_chain_frag_into_datagram_and_validate() local 397 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate() 424 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate() 442 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate() 458 if (valid) { in ip_reass_chain_frag_into_datagram_and_validate() 462 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate() 470 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate() 478 if (valid) { in ip_reass_chain_frag_into_datagram_and_validate() 511 int valid; in ip4_reass() local 599 if (valid == IP_REASS_VALIDATE_PBUF_DROPPED) { in ip4_reass() [all …]
|
| /lib/ |
| A D | tpm-v1.c | 24 int valid; member 546 if (!auth_session || !auth_session->valid) in create_request_auth() 610 if (!auth_session || !auth_session->valid) in verify_response_auth() 668 oiap_session.valid = 0; in tpm1_terminate_auth_session() 677 if (oiap_session.valid) in tpm1_end_oiap() 695 if (oiap_session.valid) in tpm1_oiap() 706 oiap_session.valid = 1; in tpm1_oiap() 732 if (!oiap_session.valid) { in tpm1_load_key2_oiap() 756 oiap_session.valid = 0; in tpm1_load_key2_oiap() 797 if (!oiap_session.valid) { in tpm1_get_pub_key_oiap() [all …]
|
| A D | uuid.c | 43 int i, valid; in uuid_str_valid() local 48 for (i = 0, valid = 1; uuid[i] && valid; i++) { in uuid_str_valid() 51 valid = (uuid[i] == '-'); in uuid_str_valid() 54 valid = isxdigit(uuid[i]); in uuid_str_valid() 59 if (i != UUID_STR_LEN || !valid) in uuid_str_valid()
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_lmots.data | 90 # This test uses the valid signature from hsslms interop test 1, and then 96 # This test uses the valid signature from hsslms interop test 1, and then 102 # This test uses the valid signature from hsslms interop test 1, and then 108 # This test uses the valid public key for hsslms interop test 1, imports it, and 114 # This test uses the valid public key for hsslms interop test 1, add an extra 119 # This test uses the valid public key for hsslms interop test 1, removes a byte, 124 # This test uses the valid public key for hsslms interop test 1, cuts it down so 130 # This test uses the valid public key for hsslms interop test 1, alters the 135 # This test uses the valid public key for hsslms interop test 1, alters the
|
| A D | test_suite_ecdsa.data | 389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data 393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data 397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data 401 ECDSA verify valid pub key, valid/incorrect sig, 0 bytes of data 405 ECDSA verify valid pub key, valid/incorrect sig, 1 byte of data 409 ECDSA verify valid pub key, valid/incorrect sig, 32 bytes of data 413 ECDSA verify valid public key, correct sig, 0 bytes of data 417 ECDSA verify valid pub key, correct sig, 1 byte of data 421 ECDSA verify valid pub key, correct sig, 32 bytes of data
|
| A D | test_suite_lms.data | 190 # This test uses the data from hash-sigs interop test #1. This test has a valid 195 # This test uses the data from hash-sigs interop test #1. This test has a valid 201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail. 206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail. 222 # This test uses the valid public key for hsslms interop test 1, add an extra 227 # This test uses the valid public key for hsslms interop test 1, removes a byte, 232 # This test uses the valid public key for hsslms interop test 1, cuts it down so 244 # This test uses the valid public key for hsslms interop test 1, alters the 249 # This test uses the valid public key for hsslms interop test 1, alters the 255 # This test uses the valid public key for hsslms interop test 1, alters the [all …]
|
| A D | test_suite_base64.data | 162 Base64 encode hex all valid input bytes #0 165 Base64 encode hex all valid input bytes #1 168 Base64 encode hex all valid input bytes #2 171 Base64 encode all valid output characters at all offsets 189 Base64 decode all valid input characters at all offsets
|
| A D | test_suite_ecjpake.data | 10 ECJPAKE round one: client, valid 13 ECJPAKE round one: server, valid 118 ECJPAKE round two client: valid 184 ECJPAKE round two server: valid
|
| A D | test_suite_pk.data | 4 PK valid parameters 7 PK write valid parameters 1582 Copy from PSA: valid EC (SECP_R1_256 + ECDSA_ANY) 1618 Copy from PSA: valid RSA (PKCS1V15_CRYPT) 1622 Copy from PSA: valid RSA (OAEP + SHA_256) 1626 Copy from PSA: valid RSA (OAEP + SHA_512) 1642 Copy from PSA: valid RSA (PSS + ANY_HASH) 1646 Copy from PSA: valid RSA (PSS + SHA_256) 1650 Copy from PSA: valid RSA (PSS + SHA_512) 1654 Copy from PSA: valid RSA, PSA_ALG_NONE [all …]
|
| A D | test_suite_pem.data | 22 PEM read (unencrypted, valid) 59 PEM read (valid EC key encoded with AES-128-CBC)
|
| A D | test_suite_block_cipher.function | 28 /* That size is valid for a key or an input/output block. */
|
| A D | test_suite_x509parse.data | 494 # Parse the following valid DN: 838 X509 CRT verification #52 (CA keyUsage valid) 962 X509 CRT verification #82 (Not yet valid CA and valid CA) 966 X509 CRT verification #83 (valid CA and Not yet valid CA) 970 X509 CRT verification #84 (valid CA and Not yet valid CA) 974 X509 CRT verification #85 (Not yet valid CA and valid CA) 1082 X509 CRT parse CN: IPv4 valid address 1127 X509 CRT parse CN: IPv6 valid address 2256 X509 CRT (TBS, valid v3Ext in v3 CRT) 2260 X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT) [all …]
|
| A D | test_suite_net.function | 113 /* In principle, mbedtls_net_poll() with valid arguments should succeed.
|
| A D | test_suite_lms.function | 91 /* Test negative cases if the input data is valid */
|
| A D | test_suite_asn1parse.function | 37 /* Since we have a valid element start (tag and length), retrieve and 234 * valid depending on what the trailing garbage is. */ 335 /* An INTEGER with no content is not valid. */
|
| A D | test_suite_psa_crypto_metadata.function | 102 * possibly turn a valid encoding into another valid encoding. Here in 106 * The expected parity is even so that 0 is considered a valid encoding.
|
| A D | test_suite_lmots.function | 91 /* Test negative cases if the input data is valid */
|
| A D | test_suite_bignum.function | 17 /* Only +1 and -1 are valid sign bits, not e.g. 0 */ 1277 * is a valid value. However, negating it (`-n`) has undefined behavior 1399 /* Test mbedtls_mpi_mod_int(): never valid */ 1403 /* Test mbedtls_mpi_random(): never valid */
|
| /lib/lwip/lwip/src/core/ipv6/ |
| A D | ip6_frag.c | 280 u8_t valid = 1; in ip6_reass() local 475 valid = 0; in ip6_reass() 493 valid = 0; in ip6_reass() 533 valid = 0; in ip6_reass() 536 valid = 0; in ip6_reass() 542 while ((q != NULL) && valid) { in ip6_reass() 545 valid = 0; in ip6_reass() 552 if (valid) { in ip6_reass()
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | constant_time.c | 137 mbedtls_ct_condition_t valid = mbedtls_ct_bool_and(mbedtls_ct_uint_ge(i, skip_head), in mbedtls_ct_memcmp_partial() local 139 diff |= mbedtls_ct_uint_if_else_0(valid, d); in mbedtls_ct_memcmp_partial()
|
| /lib/mbedtls/external/mbedtls/doxygen/ |
| A D | mbedtls.doxyfile | 37 # This is perfectly valid as far as Doxygen is concerned. However, with
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/ |
| A D | SNMPv2-CONF | 300 Defvalue ::= -- must be valid for the object's syntax
|
| /lib/mbedtls/external/mbedtls/docs/architecture/ |
| A D | psa-crypto-implementation-structure.md | 26 * checking PSA API arguments and translating them into valid arguments for the necessary calls to t… 159 * Attempt to perform an operation with a combination of key type and algorithm that is not valid or… 165 * `scripts/mbedtls_dev/asymmetric_key_data.py` contains valid key data for asymmetric key types.
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/IANA/ |
| A D | IANA-ITU-ALARM-TC-MIB | 199 --be valid. Usage example: The managed
|