Searched refs:byte (Results 1 – 25 of 68) sorted by relevance
123
/mbedtls-latest/tests/suites/ |
D | test_suite_cipher.nist_kw.data | 33 KWP AES-128 1 byte input 37 KWP AES-128 2 byte input 41 KWP AES-128 3 byte input 45 KWP AES-128 4 byte input 49 KWP AES-128 5 byte input 53 KWP AES-128 6 byte input 57 KWP AES-128 7 byte input 61 KWP AES-128 8 byte input 65 KWP AES-128 9 byte input 69 KWP AES-128 10 byte input [all …]
|
D | test_suite_psa_crypto_util.data | 9 # Check coordinates one byte larger than the largest supported curve. 39 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data 43 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data with MSb set 47 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte shorter) 51 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte shorter) 55 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer) 59 ECDSA Raw -> DER, 256bit, Invalid raw signature (r and s 1 byte longer) 71 # Check coordinates one byte larger than the largest supported curve. 93 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte smaller than the actual size) 97 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte larger than the actual size) [all …]
|
D | test_suite_pkcs7.data | 157 PKCS7 Parse Failure Invalid ASN1: Add null byte to start #20.0 161 PKCS7 Parse Failure Invalid ASN1: Add null byte to end #21.0 173 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #… 197 PKCS7 Parse Failure Invalid ASN1: Change contents of tag a0 to contain one unaccounted extra byte #… 213 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #… 241 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 31 to contain one unaccounted extra byte #… 257 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #… 293 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #… 321 PKCS7 Parse Failure Invalid ASN1: Change contents of tag a0 to contain one unaccounted extra byte #… 337 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #… [all …]
|
D | test_suite_psa_its.data | 43 Get 1 byte of 10 at 9 49 Get 1 byte of 10 at 0 55 Get 1 byte of 10 at 10: out of range 58 Get 1 byte of 10 at 11: out of range 64 Get -1 byte of 10 at 10: out of range 67 Get 1 byte of 10 at -1: out of range
|
D | test_suite_cmac.data | 60 CMAC Single Blocks #2 AES-128 - Single 16 byte block 64 CMAC Single Blocks #3 AES-128 - Single 64 byte block 68 CMAC Multiple Blocks #1 AES-128 - Multiple 8 byte blocks 72 CMAC Multiple Blocks #2 AES-128 - Multiple 16 byte blocks 80 CMAC Multiple Blocks #4 AES-128 - Multiple 8 byte blocks with gaps 88 CMAC Multiple Operations, same key #2 AES-192 - Empty, 64 byte block 92 CMAC Multiple Operations, same key #3 AES-192 - variable byte blocks
|
D | test_suite_bignum_core.misc.data | 170 mbedtls_mpi_core_lt_ct: x>y (63 bit x, y first byte greater) 173 mbedtls_mpi_core_lt_ct: x<y (63 bit y, x first byte greater) 200 mbedtls_mpi_core_lt_ct: x>y (31 bit x, y first byte greater) 203 mbedtls_mpi_core_lt_ct: x<y (31 bit y, x first byte greater) 431 Fill random core: 1 byte, RNG stops at 0 434 Fill random core: 1 byte, RNG just sufficient 437 Fill random core: 1 byte, RNG not exhausted 440 Fill random core: 1 byte, prior content nonzero 443 Fill random core: 1 byte, 1 extra limb 446 Fill random core: 1 byte, 1 extra limb, prior content nonzero
|
D | test_suite_alignment.function | 33 /* Define 64-bit aligned raw byte array */ 63 /* Make a 16/32/64 byte read from the aligned location, and copy to expected */ 129 * Check byte by byte by extracting bytes from opposite ends of 248 /* Define 64-bit aligned raw byte array */ 289 /* Build up expected value byte by byte, in either big or little endian format */
|
D | test_suite_aes.xts.data | 7 AES-128-XTS Encrypt Fail Sector Too Small (by 1 byte) 10 AES-128-XTS Encrypt Fail Sector Too Large (by 1 byte) 36 # 128-bit keys with 32 byte sector 48 # 128-bit keys with 512 byte sector 69 # 256-bit keys with 512 byte sector
|
D | test_suite_ssl_decrypt.function | 64 /* Change any one byte of the plaintext or MAC. The MAC will be wrong. */ 140 * byte that encodes the length. The minimal non-zero plaintext length 149 unsigned char padlen; /* excluding the padding_length byte */ 174 * The +1 is for the padding_length byte, not counted in padlen. */ 185 * The +1 is for the padding_length byte, not counted in padlen. */ 243 * Modify each byte of the pre-encryption record before encrypting and 254 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */
|
D | test_suite_oid.data | 111 OID get numeric string - multi-byte subidentifier 117 OID get numeric string - multi-byte first subidentifier 141 OID get numeric string - 1 byte first subidentifier beyond 2.39 160 OID from numeric string - multi-byte subidentifier 166 OID from numeric string - multi-byte first subidentifier
|
D | test_suite_lms.function | 94 /* Altering first message byte must cause verification failure */ 100 /* Altering last message byte must cause verification failure */ 108 /* Altering first signature byte must cause verification failure */ 114 /* Altering last signature byte must cause verification failure */
|
D | test_suite_psa_crypto_persistent_key.data | 76 import/export persistent raw key: 1 byte 87 import/export persistent raw key file not exist: 1 byte 102 import/export persistent raw key with restart: 1 byte 113 import/export persistent raw key file not exist with restart: 1 byte
|
D | test_suite_lmots.function | 94 /* Altering first message byte must cause verification failure */ 100 /* Altering last message byte must cause verification failure */ 107 /* Altering first signature byte must cause verification failure */ 113 /* Altering last signature byte must cause verification failure */
|
D | test_suite_pkcs1_v15.data | 79 RSAES-V15 decoding: bad first byte 82 RSAES-V15 decoding: bad second byte (0 instead of 2) 85 RSAES-V15 decoding: bad second byte (1 instead of 2)
|
D | test_suite_asn1parse.data | 61 length=0 (1 length byte) 70 length=1 (1 length byte) 85 length=2 (1 length byte) 100 length=128 (1 length byte) 106 length=255 (1 length byte)
|
D | test_suite_ctr_drbg.function | 468 int byte = (i / 8); 469 c[15 - byte] |= 1 << bit; 477 int byte = n / 8; 478 if (byte < 16) { 479 r[15 - byte] = 1 << bit;
|
D | test_suite_lms.data | 17 # stores public keys and signatures in HSS form, which appends a 4-byte "levels" 57 # stores public keys and signatures in HSS form, which appends a 4-byte 90 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from 118 # 4-byte "levels" word at the start of the key/sig. We strip these 4 bytes from 223 # byte, and then imports it. This should fail. 227 # This test uses the valid public key for hsslms interop test 1, removes a byte,
|
D | test_suite_cipher.camellia.data | 13 CAMELLIA Encrypt and decrypt 1 byte [#1] 73 CAMELLIA Encrypt and decrypt 1 byte with one and zeros padding 133 CAMELLIA Encrypt and decrypt 1 byte with zeros and len padding 193 CAMELLIA Encrypt and decrypt 1 byte with zeros padding 357 CAMELLIA Encrypt and decrypt 1 byte [#2] 461 CAMELLIA Encrypt and decrypt 1 byte [#3] 565 CAMELLIA Encrypt and decrypt 1 byte [#4] 669 CAMELLIA Encrypt and decrypt 1 byte [#5] 773 CAMELLIA-128 CCM*-NO-TAG - Encrypt and decrypt 1 byte 877 CAMELLIA-192-CCM*-NO-TAG - Encrypt and decrypt 1 byte [all …]
|
D | test_suite_x509write.function | 86 * - 1 byte for MBEDTLS_OID_EXTENDED_KEY_USAGE length 87 * - 1 byte for MBEDTLS_ASN1_OID tag 89 * - 1 byte since we're dealing with sizes which are less than 0x80 91 * - 1 byte 267 // deterministic over multiple runs, removing a single byte isn't enough to 622 // deterministic over multiple runs, removing a single byte isn't enough to
|
D | test_suite_ecjpake.data | 19 ECJPAKE round one: trailing byte 121 ECJPAKE round two client: trailing byte 187 ECJPAKE round two server: trailing byte
|
D | test_suite_psa_its.function | 27 1 /*terminating null byte*/) 260 /* Overwrite the 1st byte of the file, the ITS magic number */ 266 /* Reopen file and truncate it to 0 byte by specifying the 'w' flag */
|
D | test_suite_cipher.des.data | 17 DES Encrypt and decrypt 1 byte 77 DES Encrypt and decrypt 1 byte with one and zeros padding 137 DES Encrypt and decrypt 1 byte with zeros and len padding 197 DES Encrypt and decrypt 1 byte with zeros padding 361 DES3 Encrypt and decrypt 1 byte [#1] 465 DES3 Encrypt and decrypt 1 byte [#2]
|
D | test_suite_asn1write.data | 250 ASN.1 Write / Read Length #6 (Len = 258, byte order) 259 ASN.1 Write / Read Length #9 (Len = 66051, byte order) 268 ASN.1 Write / Read Length #12 (Len = 16909060, byte order)
|
D | test_suite_constant_time.function | 290 * over them. The arrays will be identical, except that one byte may be specified 293 * \p diff Index of byte that differs (if out of range, the arrays will match). 307 /* Construct data that matches, except for specified byte (if in range). */ 312 // modify the specified byte
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 204 the address of the first byte of the vector length. 207 address of the first byte of the vector value. 210 the address of the first byte past the vector value. 224 - the macros to extract a byte from a multi-byte integer MBEDTLS_BYTE_{0-8}. 225 - the macros to write in memory in big-endian order a multi-byte integer 227 - the macros to read from memory a multi-byte integer in big-endian order
|
123