/mbedtls-3.5.0/tests/suites/ |
D | test_suite_psa_crypto_slot_management.data | 1 Transient slot, check after closing 4 Transient slot, check after closing and restarting 7 Transient slot, check after destroying 10 Transient slot, check after destroying and restarting 13 Transient slot, check after restart with live handles 16 Persistent slot, check after closing, id=min 19 Persistent slot, check after closing and restarting, id=min 22 Persistent slot, check after destroying, id=min 25 Persistent slot, check after destroying and restarting, id=min 28 Persistent slot, check after purging, id=min [all …]
|
D | test_suite_ecjpake.data | 40 ECJPAKE round one: KKP1: nothing after first point 55 ECJPAKE round one: KKP1: nothing after second point 88 ECJPAKE round one: KKP2: nothing after first point 103 ECJPAKE round one: KKP2: nothing after second point 136 ECJPAKE round two client: no data after ECParams 154 ECJPAKE round two client: nothing after first point 169 ECJPAKE round two client: nothing after second point 208 ECJPAKE round two server: nothing after first point 223 ECJPAKE round two server: nothing after second point
|
D | test_suite_psa_crypto_init.data | 19 No random after deinit 22 No key slot access after deinit
|
D | test_suite_psa_crypto_se_driver_hal.data | 33 SE key import-export persistent, check after restart (slot 0) 36 SE key import-export persistent, check after restart (slot 3) 45 SE key import-export volatile, check after restart (slot 0) 48 SE key import-export volatile, check after restart (slot 3)
|
D | test_suite_asn1parse.data | 424 SEQUENCE of 1 OCTET STRING truncated after tag 451 SEQUENCE of 2 OCTET STRINGs, second truncated after tag 559 AlgorithmIdentifier, truncated in OID after tag 562 AlgorithmIdentifier, truncated in OID after length 568 AlgorithmIdentifier, truncated in params after tag 571 AlgorithmIdentifier, truncated in params after length
|
D | test_suite_constant_time.function | 39 * same gives the number of bytes (after the initial offset) 40 * that will match; after that it will differ.
|
D | test_suite_entropy.function | 51 * To be called immediately after mbedtls_entropy_init(). 333 * updates: before and after updating the NV seed. */ 378 * updates: before and after updating the NV seed. */
|
D | test_suite_psa_crypto_entropy.data | 43 PSA validate entropy injection: before and after crypto_init
|
D | test_suite_psa_crypto.function | 65 * `mem_is_char(buffer, c, size)` is true after `memset(buffer, c, size)`. 1265 * been implemented, but we can at least test before/after full init. */ 2871 /* Call update after finish. */ 2885 /* Call verify after finish. */ 2921 /* Call finish after calling verify. */ 3212 /* Call update after sign finish. */ 3222 /* Call update after verify finish. */ 3654 /* Generate an IV after it's already set. */ 3670 /* Set an IV after it's already set. */ 3682 /* Set an IV after it's already generated. */ [all …]
|
D | test_suite_bignum.misc.data | 1770 Fill random: 2 bytes, RNG failure after 1 byte 1773 Fill random: 4 bytes, RNG failure after 3 bytes 1776 Fill random: 8 bytes, RNG failure after 7 bytes 1779 Fill random: 16 bytes, RNG failure after 1 bytes 1782 Fill random: 16 bytes, RNG failure after 8 bytes 1785 Fill random: 16 bytes, RNG failure after 15 bytes 1788 Fill random: MAX_SIZE bytes, RNG failure after MAX_SIZE-1 bytes
|
D | test_suite_x509write.data | 69 Certificate write check Server1 SHA1, not after 2050 73 Certificate write check Server1 SHA1, not before 1970, not after 2050 77 Certificate write check Server1 SHA1, not before 2050, not after 2059
|
D | test_suite_memory_buffer_alloc.function | 137 * we don't check the size after blocks have been reallocated. */
|
D | test_suite_psa_crypto_persistent_key.data | 48 Persistent key destroy after restart
|
D | test_suite_base64.data | 97 Base64 decode (Invalid char after equal signs)
|
/mbedtls-3.5.0/ |
D | .uncrustify.cfg | 79 # But no space after the '!' operator 82 # No space after the bitwise-not '~' operator 85 # No space after the addressof '&' operator 91 # No space after the dereference '*' operator 94 # No space after a unary negation '-' 145 # No space after a pointer star 151 # Remove space after star in a function return type 154 # At least 1 space after a type in variable definition etc 169 # Add a space after a ';' (unless a comment follows) 171 # (Uncrustify >= 0.73.0) Add a space after a semi in non-empty for statements [all …]
|
D | ChangeLog | 322 a secure enclave) could recover an RSA private key after observing the 500 Furthermore you may name an additional file to include after the main 549 potentially left in memory after file operations. Reported by 559 after the end of the SSL input buffer. The buffer overread only happens 608 the function needs to be re-called after initially returning 767 * Fix a double-free that happened after mbedtls_ssl_set_session() or 979 after initializing the context. mbedtls_rsa_set_padding() now returns an 1180 signature, allowing the recovery of the private key after observing a 1185 a secure enclave) could recover an RSA private key after observing the 1190 or Curve448 static ECDH key after inputting a chosen public key and [all …]
|
/mbedtls-3.5.0/library/ |
D | x509.c | 1030 static int x509_check_time(const mbedtls_x509_time *before, const mbedtls_x509_time *after) in x509_check_time() argument 1032 if (before->year > after->year) { in x509_check_time() 1036 if (before->year == after->year && in x509_check_time() 1037 before->mon > after->mon) { in x509_check_time() 1041 if (before->year == after->year && in x509_check_time() 1042 before->mon == after->mon && in x509_check_time() 1043 before->day > after->day) { in x509_check_time() 1047 if (before->year == after->year && in x509_check_time() 1048 before->mon == after->mon && in x509_check_time() 1049 before->day == after->day && in x509_check_time() [all …]
|
/mbedtls-3.5.0/scripts/ |
D | generate_errors.pl | 84 my ($before, $name, $value, $after) = ($1, $2, $3, $4); 90 if !defined($before) && !defined($after); 92 if defined($before) && defined($after); 93 my $description = (defined($before) ? $before : $after);
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | outcome-analysis.sh | 136 compare_builds before-default after-default 137 compare_builds before-full after-full
|
/mbedtls-3.5.0/tests/data_files/base64/ |
D | def_b64_ff.bin | 1 // Ensure that the b64 parser continues after encountering a 0xFF
|
/mbedtls-3.5.0/tests/data_files/ |
D | Readme-x509.txt | 77 -expired.crt: S5 with "not after" date in the past 86 -expired.crt: S7 with "not after" date in the past + I1
|
/mbedtls-3.5.0/tests/scripts/ |
D | test_zeroize.gdb | 39 # inserting a test after a call to mbedtls_platform_zeroize() to check whether
|
/mbedtls-3.5.0/docs/proposed/ |
D | psa-driver-wrappers-codegen-migration-guide.md | 7 …while the Mbed TLS project tides over multiple minor revs of version 1.0, after which this will be…
|
/mbedtls-3.5.0/docs/architecture/testing/ |
D | invasive-testing.md | 117 * Zeroization of confidential data after use. 128 * Check the format of files (which matters so that the product can still read old files after an up… 288 …ector, each test function or test program must clean up after itself. Use the cleanup code (after … 308 Goal: test that no stray files are left over in the key store after a test that succeeded.
|
D | driver-interface-test-strategy.md | 70 …nds up in the expected state. At least make sure that no intermediate file remains after a failure. 85 …oint (before M<sub>1</sub>, between M<sub>1</sub> and M<sub>2</sub>, ..., after M<sub>n</sub>), ca…
|