Home
last modified time | relevance | path

Searched refs:byte (Results 1 – 25 of 68) sorted by relevance

123

/mbedtls-latest/tests/suites/
Dtest_suite_cipher.nist_kw.data33 KWP AES-128 1 byte input
37 KWP AES-128 2 byte input
41 KWP AES-128 3 byte input
45 KWP AES-128 4 byte input
49 KWP AES-128 5 byte input
53 KWP AES-128 6 byte input
57 KWP AES-128 7 byte input
61 KWP AES-128 8 byte input
65 KWP AES-128 9 byte input
69 KWP AES-128 10 byte input
[all …]
Dtest_suite_psa_crypto_util.data9 # Check coordinates one byte larger than the largest supported curve.
39 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data
43 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data with MSb set
47 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter)
51 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter)
55 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer)
59 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer)
71 # Check coordinates one byte larger than the largest supported curve.
93 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte smaller than the actual size)
97 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte larger than the actual size)
[all …]
Dtest_suite_pkcs7.data157 PKCS7 Parse Failure Invalid ASN1: Add null byte to start #20.0
161 PKCS7 Parse Failure Invalid ASN1: Add null byte to end #21.0
173 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
197 PKCS7 Parse Failure Invalid ASN1: Change contents of tag a0 to contain one unaccounted extra byte #…
213 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
241 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 31 to contain one unaccounted extra byte #…
257 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
293 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
321 PKCS7 Parse Failure Invalid ASN1: Change contents of tag a0 to contain one unaccounted extra byte #…
337 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
[all …]
Dtest_suite_psa_its.data43 Get 1 byte of 10 at 9
49 Get 1 byte of 10 at 0
55 Get 1 byte of 10 at 10: out of range
58 Get 1 byte of 10 at 11: out of range
64 Get -1 byte of 10 at 10: out of range
67 Get 1 byte of 10 at -1: out of range
Dtest_suite_cmac.data60 CMAC Single Blocks #2 AES-128 - Single 16 byte block
64 CMAC Single Blocks #3 AES-128 - Single 64 byte block
68 CMAC Multiple Blocks #1 AES-128 - Multiple 8 byte blocks
72 CMAC Multiple Blocks #2 AES-128 - Multiple 16 byte blocks
80 CMAC Multiple Blocks #4 AES-128 - Multiple 8 byte blocks with gaps
88 CMAC Multiple Operations, same key #2 AES-192 - Empty, 64 byte block
92 CMAC Multiple Operations, same key #3 AES-192 - variable byte blocks
Dtest_suite_bignum_core.misc.data170 mbedtls_mpi_core_lt_ct: x>y (63 bit x, y first byte greater)
173 mbedtls_mpi_core_lt_ct: x<y (63 bit y, x first byte greater)
200 mbedtls_mpi_core_lt_ct: x>y (31 bit x, y first byte greater)
203 mbedtls_mpi_core_lt_ct: x<y (31 bit y, x first byte greater)
431 Fill random core: 1 byte, RNG stops at 0
434 Fill random core: 1 byte, RNG just sufficient
437 Fill random core: 1 byte, RNG not exhausted
440 Fill random core: 1 byte, prior content nonzero
443 Fill random core: 1 byte, 1 extra limb
446 Fill random core: 1 byte, 1 extra limb, prior content nonzero
Dtest_suite_alignment.function33 /* Define 64-bit aligned raw byte array */
63 /* Make a 16/32/64 byte read from the aligned location, and copy to expected */
129 * Check byte by byte by extracting bytes from opposite ends of
248 /* Define 64-bit aligned raw byte array */
289 /* Build up expected value byte by byte, in either big or little endian format */
Dtest_suite_aes.xts.data7 AES-128-XTS Encrypt Fail Sector Too Small (by 1 byte)
10 AES-128-XTS Encrypt Fail Sector Too Large (by 1 byte)
36 # 128-bit keys with 32 byte sector
48 # 128-bit keys with 512 byte sector
69 # 256-bit keys with 512 byte sector
Dtest_suite_ssl_decrypt.function64 /* Change any one byte of the plaintext or MAC. The MAC will be wrong. */
140 * byte that encodes the length. The minimal non-zero plaintext length
149 unsigned char padlen; /* excluding the padding_length byte */
174 * The +1 is for the padding_length byte, not counted in padlen. */
185 * The +1 is for the padding_length byte, not counted in padlen. */
243 * Modify each byte of the pre-encryption record before encrypting and
254 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */
Dtest_suite_oid.data111 OID get numeric string - multi-byte subidentifier
117 OID get numeric string - multi-byte first subidentifier
141 OID get numeric string - 1 byte first subidentifier beyond 2.39
160 OID from numeric string - multi-byte subidentifier
166 OID from numeric string - multi-byte first subidentifier
Dtest_suite_lms.function94 /* Altering first message byte must cause verification failure */
100 /* Altering last message byte must cause verification failure */
108 /* Altering first signature byte must cause verification failure */
114 /* Altering last signature byte must cause verification failure */
Dtest_suite_psa_crypto_persistent_key.data76 import/export persistent raw key: 1 byte
87 import/export persistent raw key file not exist: 1 byte
102 import/export persistent raw key with restart: 1 byte
113 import/export persistent raw key file not exist with restart: 1 byte
Dtest_suite_lmots.function94 /* Altering first message byte must cause verification failure */
100 /* Altering last message byte must cause verification failure */
107 /* Altering first signature byte must cause verification failure */
113 /* Altering last signature byte must cause verification failure */
Dtest_suite_pkcs1_v15.data79 RSAES-V15 decoding: bad first byte
82 RSAES-V15 decoding: bad second byte (0 instead of 2)
85 RSAES-V15 decoding: bad second byte (1 instead of 2)
Dtest_suite_asn1parse.data61 length=0 (1 length byte)
70 length=1 (1 length byte)
85 length=2 (1 length byte)
100 length=128 (1 length byte)
106 length=255 (1 length byte)
Dtest_suite_ctr_drbg.function468 int byte = (i / 8);
469 c[15 - byte] |= 1 << bit;
477 int byte = n / 8;
478 if (byte < 16) {
479 r[15 - byte] = 1 << bit;
Dtest_suite_lms.data17 # stores public keys and signatures in HSS form, which appends a 4-byte "levels"
57 # stores public keys and signatures in HSS form, which appends a 4-byte
90 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from
118 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from
223 # byte, and then imports it. This should fail.
227 # This test uses the valid public key for hsslms interop test 1, removes a byte,
Dtest_suite_cipher.camellia.data13 CAMELLIA Encrypt and decrypt 1 byte [#1]
73 CAMELLIA Encrypt and decrypt 1 byte with one and zeros padding
133 CAMELLIA Encrypt and decrypt 1 byte with zeros and len padding
193 CAMELLIA Encrypt and decrypt 1 byte with zeros padding
357 CAMELLIA Encrypt and decrypt 1 byte [#2]
461 CAMELLIA Encrypt and decrypt 1 byte [#3]
565 CAMELLIA Encrypt and decrypt 1 byte [#4]
669 CAMELLIA Encrypt and decrypt 1 byte [#5]
773 CAMELLIA-128 CCM*-NO-TAG - Encrypt and decrypt 1 byte
877 CAMELLIA-192-CCM*-NO-TAG - Encrypt and decrypt 1 byte
[all …]
Dtest_suite_x509write.function86 * - 1 byte for MBEDTLS_OID_EXTENDED_KEY_USAGE length
87 * - 1 byte for MBEDTLS_ASN1_OID tag
89 * - 1 byte since we're dealing with sizes which are less than 0x80
91 * - 1 byte
267 // deterministic over multiple runs, removing a single byte isn't enough to
622 // deterministic over multiple runs, removing a single byte isn't enough to
Dtest_suite_ecjpake.data19 ECJPAKE round one: trailing byte
121 ECJPAKE round two client: trailing byte
187 ECJPAKE round two server: trailing byte
Dtest_suite_psa_its.function27 1 /*terminating null byte*/)
260 /* Overwrite the 1st byte of the file, the ITS magic number */
266 /* Reopen file and truncate it to 0 byte by specifying the 'w' flag */
Dtest_suite_cipher.des.data17 DES Encrypt and decrypt 1 byte
77 DES Encrypt and decrypt 1 byte with one and zeros padding
137 DES Encrypt and decrypt 1 byte with zeros and len padding
197 DES Encrypt and decrypt 1 byte with zeros padding
361 DES3 Encrypt and decrypt 1 byte [#1]
465 DES3 Encrypt and decrypt 1 byte [#2]
Dtest_suite_asn1write.data250 ASN.1 Write / Read Length #6 (Len = 258, byte order)
259 ASN.1 Write / Read Length #9 (Len = 66051, byte order)
268 ASN.1 Write / Read Length #12 (Len = 16909060, byte order)
Dtest_suite_constant_time.function290 * over them. The arrays will be identical, except that one byte may be specified
293 * \p diff Index of byte that differs (if out of range, the arrays will match).
307 /* Construct data that matches, except for specified byte (if in range). */
312 // modify the specified byte
/mbedtls-latest/docs/architecture/
Dtls13-support.md204 the address of the first byte of the vector length.
207 address of the first byte of the vector value.
210 the address of the first byte past the vector value.
224 - the macros to extract a byte from a multi-byte integer MBEDTLS_BYTE_{0-8}.
225 - the macros to write in memory in big-endian order a multi-byte integer
227 - the macros to read from memory a multi-byte integer in big-endian order

123