Home
last modified time | relevance | path

Searched refs:valid (Results 1 – 25 of 65) sorted by relevance

123

/lib/mbedtls/external/mbedtls/tests/data_files/dir4/
A DReadme23 …nzero pathlen constraint on an intermediate CA with maximum number of elements in the chain (valid)
28 6. nonzero pathlen constraint on the root CA with maximum number of elements in the chain (valid)
33 … on the root CA with maximum number of elements and a self signed certificate in the chain (valid)
39 8. zero pathlen constraint on first intermediate CA (valid)
44 9. zero pathlen constraint on trusted root (valid)
/lib/lwip/lwip/src/core/ipv4/
A Dip4_frag.c351 int valid = 1; in ip_reass_chain_frag_into_datagram_and_validate() local
397 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate()
424 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate()
442 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate()
458 if (valid) { in ip_reass_chain_frag_into_datagram_and_validate()
462 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate()
470 valid = 0; in ip_reass_chain_frag_into_datagram_and_validate()
478 if (valid) { in ip_reass_chain_frag_into_datagram_and_validate()
511 int valid; in ip4_reass() local
599 if (valid == IP_REASS_VALIDATE_PBUF_DROPPED) { in ip4_reass()
[all …]
/lib/
A Dtpm-v1.c24 int valid; member
546 if (!auth_session || !auth_session->valid) in create_request_auth()
610 if (!auth_session || !auth_session->valid) in verify_response_auth()
668 oiap_session.valid = 0; in tpm1_terminate_auth_session()
677 if (oiap_session.valid) in tpm1_end_oiap()
695 if (oiap_session.valid) in tpm1_oiap()
706 oiap_session.valid = 1; in tpm1_oiap()
732 if (!oiap_session.valid) { in tpm1_load_key2_oiap()
756 oiap_session.valid = 0; in tpm1_load_key2_oiap()
797 if (!oiap_session.valid) { in tpm1_get_pub_key_oiap()
[all …]
A Duuid.c43 int i, valid; in uuid_str_valid() local
48 for (i = 0, valid = 1; uuid[i] && valid; i++) { in uuid_str_valid()
51 valid = (uuid[i] == '-'); in uuid_str_valid()
54 valid = isxdigit(uuid[i]); in uuid_str_valid()
59 if (i != UUID_STR_LEN || !valid) in uuid_str_valid()
/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_lmots.data90 # This test uses the valid signature from hsslms interop test 1, and then
96 # This test uses the valid signature from hsslms interop test 1, and then
102 # This test uses the valid signature from hsslms interop test 1, and then
108 # This test uses the valid public key for hsslms interop test 1, imports it, and
114 # This test uses the valid public key for hsslms interop test 1, add an extra
119 # This test uses the valid public key for hsslms interop test 1, removes a byte,
124 # This test uses the valid public key for hsslms interop test 1, cuts it down so
130 # This test uses the valid public key for hsslms interop test 1, alters the
135 # This test uses the valid public key for hsslms interop test 1, alters the
A Dtest_suite_ecdsa.data389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data
393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data
397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data
401 ECDSA verify valid pub key, valid/incorrect sig, 0 bytes of data
405 ECDSA verify valid pub key, valid/incorrect sig, 1 byte of data
409 ECDSA verify valid pub key, valid/incorrect sig, 32 bytes of data
413 ECDSA verify valid public key, correct sig, 0 bytes of data
417 ECDSA verify valid pub key, correct sig, 1 byte of data
421 ECDSA verify valid pub key, correct sig, 32 bytes of data
A Dtest_suite_lms.data190 # This test uses the data from hash-sigs interop test #1. This test has a valid
195 # This test uses the data from hash-sigs interop test #1. This test has a valid
201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail.
206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail.
222 # This test uses the valid public key for hsslms interop test 1, add an extra
227 # This test uses the valid public key for hsslms interop test 1, removes a byte,
232 # This test uses the valid public key for hsslms interop test 1, cuts it down so
244 # This test uses the valid public key for hsslms interop test 1, alters the
249 # This test uses the valid public key for hsslms interop test 1, alters the
255 # This test uses the valid public key for hsslms interop test 1, alters the
[all …]
A Dtest_suite_base64.data162 Base64 encode hex all valid input bytes #0
165 Base64 encode hex all valid input bytes #1
168 Base64 encode hex all valid input bytes #2
171 Base64 encode all valid output characters at all offsets
189 Base64 decode all valid input characters at all offsets
A Dtest_suite_ecjpake.data10 ECJPAKE round one: client, valid
13 ECJPAKE round one: server, valid
118 ECJPAKE round two client: valid
184 ECJPAKE round two server: valid
A Dtest_suite_pk.data4 PK valid parameters
7 PK write valid parameters
1582 Copy from PSA: valid EC (SECP_R1_256 + ECDSA_ANY)
1618 Copy from PSA: valid RSA (PKCS1V15_CRYPT)
1622 Copy from PSA: valid RSA (OAEP + SHA_256)
1626 Copy from PSA: valid RSA (OAEP + SHA_512)
1642 Copy from PSA: valid RSA (PSS + ANY_HASH)
1646 Copy from PSA: valid RSA (PSS + SHA_256)
1650 Copy from PSA: valid RSA (PSS + SHA_512)
1654 Copy from PSA: valid RSA, PSA_ALG_NONE
[all …]
A Dtest_suite_pem.data22 PEM read (unencrypted, valid)
59 PEM read (valid EC key encoded with AES-128-CBC)
A Dtest_suite_block_cipher.function28 /* That size is valid for a key or an input/output block. */
A Dtest_suite_x509parse.data494 # Parse the following valid DN:
838 X509 CRT verification #52 (CA keyUsage valid)
962 X509 CRT verification #82 (Not yet valid CA and valid CA)
966 X509 CRT verification #83 (valid CA and Not yet valid CA)
970 X509 CRT verification #84 (valid CA and Not yet valid CA)
974 X509 CRT verification #85 (Not yet valid CA and valid CA)
1082 X509 CRT parse CN: IPv4 valid address
1127 X509 CRT parse CN: IPv6 valid address
2256 X509 CRT (TBS, valid v3Ext in v3 CRT)
2260 X509 CRT ASN1 (TBS, valid v3Ext in v1 CRT)
[all …]
A Dtest_suite_net.function113 /* In principle, mbedtls_net_poll() with valid arguments should succeed.
A Dtest_suite_lms.function91 /* Test negative cases if the input data is valid */
A Dtest_suite_asn1parse.function37 /* Since we have a valid element start (tag and length), retrieve and
234 * valid depending on what the trailing garbage is. */
335 /* An INTEGER with no content is not valid. */
A Dtest_suite_psa_crypto_metadata.function102 * possibly turn a valid encoding into another valid encoding. Here in
106 * The expected parity is even so that 0 is considered a valid encoding.
A Dtest_suite_lmots.function91 /* Test negative cases if the input data is valid */
A Dtest_suite_bignum.function17 /* Only +1 and -1 are valid sign bits, not e.g. 0 */
1277 * is a valid value. However, negating it (`-n`) has undefined behavior
1399 /* Test mbedtls_mpi_mod_int(): never valid */
1403 /* Test mbedtls_mpi_random(): never valid */
/lib/lwip/lwip/src/core/ipv6/
A Dip6_frag.c280 u8_t valid = 1; in ip6_reass() local
475 valid = 0; in ip6_reass()
493 valid = 0; in ip6_reass()
533 valid = 0; in ip6_reass()
536 valid = 0; in ip6_reass()
542 while ((q != NULL) && valid) { in ip6_reass()
545 valid = 0; in ip6_reass()
552 if (valid) { in ip6_reass()
/lib/mbedtls/external/mbedtls/library/
A Dconstant_time.c137 mbedtls_ct_condition_t valid = mbedtls_ct_bool_and(mbedtls_ct_uint_ge(i, skip_head), in mbedtls_ct_memcmp_partial() local
139 diff |= mbedtls_ct_uint_if_else_0(valid, d); in mbedtls_ct_memcmp_partial()
/lib/mbedtls/external/mbedtls/doxygen/
A Dmbedtls.doxyfile37 # This is perfectly valid as far as Doxygen is concerned. However, with
/lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/
A DSNMPv2-CONF300 Defvalue ::= -- must be valid for the object's syntax
/lib/mbedtls/external/mbedtls/docs/architecture/
A Dpsa-crypto-implementation-structure.md26 * checking PSA API arguments and translating them into valid arguments for the necessary calls to t…
159 * Attempt to perform an operation with a combination of key type and algorithm that is not valid or…
165 * `scripts/mbedtls_dev/asymmetric_key_data.py` contains valid key data for asymmetric key types.
/lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/IANA/
A DIANA-ITU-ALARM-TC-MIB199 --be valid. Usage example: The managed

Completed in 57 milliseconds

123