/mbedtls-latest/tests/suites/ |
D | test_suite_ecjpake.data | 25 ECJPAKE round one: KKP1: length of first point too small 28 ECJPAKE round one: KKP1: length of first point too big 34 ECJPAKE round one: KKP1: first point is zero 37 ECJPAKE round one: KKP1: unknown first point format 40 ECJPAKE round one: KKP1: nothing after first point 73 ECJPAKE round one: KKP2: length of first point too small 76 ECJPAKE round one: KKP2: length of first point too big 82 ECJPAKE round one: KKP2: first point is zero 85 ECJPAKE round one: KKP2: unknown first point format 88 ECJPAKE round one: KKP2: nothing after first point [all …]
|
D | test_suite_oid.data | 117 OID get numeric string - multi-byte first subidentifier 141 OID get numeric string - 1 byte first subidentifier beyond 2.39 166 OID from numeric string - multi-byte first subidentifier 172 OID from numeric string - first component not a number 178 OID from numeric string - first component too large 181 OID from numeric string - first component < 2, second > 39 187 OID from numeric string - non-'.' separator between first and second
|
D | test_suite_ecdh.data | 76 ECDH calc_secret: ours first, SECP256R1 (RFC 5903) 80 ECDH calc_secret: theirs first, SECP256R1 (RFC 5903) 84 ecdh calc_secret: ours first (Alice), curve25519 (rfc 7748) 88 ecdh calc_secret: theirs first (Alice), curve25519 (rfc 7748) 92 ecdh calc_secret: ours first (Bob), curve25519 (rfc 7748)
|
D | test_suite_bignum_core.misc.data | 170 mbedtls_mpi_core_lt_ct: x>y (63 bit x, y first byte greater) 173 mbedtls_mpi_core_lt_ct: x<y (63 bit y, x first byte greater) 194 mbedtls_mpi_core_lt_ct: x>y (64 bit x, first bytes equal) 197 mbedtls_mpi_core_lt_ct: x<y (64 bit y, first bytes equal) 200 mbedtls_mpi_core_lt_ct: x>y (31 bit x, y first byte greater) 203 mbedtls_mpi_core_lt_ct: x<y (31 bit y, x first byte greater) 224 mbedtls_mpi_core_lt_ct: x>y (32 bit x, first bytes equal) 227 mbedtls_mpi_core_lt_ct: x<y (32 bit y, first bytes equal)
|
D | test_suite_x509parse.function | 103 mbedtls_x509_crt *first; 115 first = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); 116 if (first == NULL) { 120 mbedtls_x509_crt_init(first); 122 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 129 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { 138 mbedtls_x509_crt_free(first); 139 mbedtls_free(first); 140 first = NULL; 143 *candidates = first; [all …]
|
D | test_suite_psa_crypto_pake.data | 81 PSA PAKE: invalid first input step 101 PSA PAKE: invalid first output step 121 PSA PAKE: check rounds w/o forced errors, client input first 137 PSA PAKE: no injected errors, client input first
|
D | test_suite_bignum_mod.misc.data | 25 mpi_mod_sub with first input too long 34 mpi_mod_sub with first input too short 90 mpi_mod_add with first input too long 99 mpi_mod_add with first input too short
|
D | test_suite_lms.function | 94 /* Altering first message byte must cause verification failure */ 108 /* Altering first signature byte must cause verification failure */
|
D | test_suite_psa_crypto_memory.function | 47 /* Note: We compare the first src_len bytes of each buffer, as this is what was copied. */ 74 /* Note: We compare the first src_len bytes of each buffer, as this is what was copied. */
|
D | test_suite_lmots.function | 94 /* Altering first message byte must cause verification failure */ 107 /* Altering first signature byte must cause verification failure */
|
D | test_suite_psa_crypto_pake.function | 147 /* Server first round Output */ 216 /* Client first round Input */ 260 /* Client first round Output */ 316 /* Client first round Input */ 354 /* Server first round Input */
|
D | test_suite_alignment.function | 351 /* Big-endian: data stored MSB first, i.e. p == { 0x12, 0x34 } */ 355 /* Little-endian: data stored LSB first, i.e. p == { 0x34, 0x12 } */
|
D | test_suite_asn1write.data | 352 Store named data: first 364 Store named data: first match
|
D | test_suite_lms.data | 15 # uses leaf key 0, so must be the first signature generated by the key if the 44 # first signature: 87 # signature uses leaf key 0, so must be the first signature generated by the key
|
D | test_suite_ccm.function | 675 /* Provide complete auth data on first update_ad. 701 /* Provide incomplete auth data on first update_ad. 796 /* Provide full plaintext/ciphertext of first update 829 /* Provide incomplete plaintext/ciphertext of first update
|
D | test_suite_ssl.function | 929 /* Test that the first half of the message is valid, and second one isn't */ 940 /* Test that the first half of the message is valid */ 2208 /* Allocate first buffer */ 3318 * the raw key agreement. Flipping the first byte makes the 3647 * Run first handshake to get a ticket from the server. 3738 * Run first handshake to get a ticket from the server. 3937 * Run first handshake to get a ticket from the server. 4310 * Run first handshake to get a ticket from the server. 4593 * the first ClientHello and ServerHello otherwise we just keep playing 4594 * this first part of the handshake with HRR. [all …]
|
/mbedtls-latest/scripts/ |
D | generate_errors.pl | 148 my $first; 168 $first = 0; 171 ${$code_check} .= " || " if ($first++); 179 $first = 0; 182 ${$code_check} .= " || " if ($first); 183 $headers .= " || " if ($first++); 202 my $first = 0; 205 $ll_code_check .= " || " if ($first++); 213 my $first = 0; 216 $hl_code_check .= " || " if ($first++);
|
/mbedtls-latest/library/ |
D | memory_buffer_alloc.c | 51 memory_header *first; member 95 memory_header *cur = heap.first; in debug_chain() 155 memory_header *prv = heap.first, *cur; in verify_chain() 165 if (heap.first->prev != NULL) { in verify_chain() 173 cur = heap.first->next; in verify_chain() 210 if (heap.buf == NULL || heap.first == NULL) { in buffer_alloc_calloc() 365 if (ptr == NULL || heap.buf == NULL || heap.first == NULL) { in buffer_alloc_free() 503 if (heap.first->next == NULL) { in mbedtls_memory_buffer_alloc_status() 589 heap.first = (memory_header *) buf; in mbedtls_memory_buffer_alloc_init() 590 heap.first->size = len - sizeof(memory_header); in mbedtls_memory_buffer_alloc_init() [all …]
|
D | x509_create.c | 447 mbedtls_asn1_named_data *first) in mbedtls_x509_write_names() argument 451 mbedtls_asn1_named_data *cur = first; in mbedtls_x509_write_names() 549 mbedtls_asn1_named_data *first) in mbedtls_x509_write_extensions() argument 553 mbedtls_asn1_named_data *cur_ext = first; in mbedtls_x509_write_extensions()
|
D | x509_internal.h | 55 mbedtls_asn1_named_data *first); 57 mbedtls_asn1_named_data *first);
|
/mbedtls-latest/programs/ssl/ |
D | ssl_test_lib.c | 316 mbedtls_x509_crt *first; in ca_callback() local 328 first = mbedtls_calloc(1, sizeof(mbedtls_x509_crt)); in ca_callback() 329 if (first == NULL) { in ca_callback() 333 mbedtls_x509_crt_init(first); in ca_callback() 335 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 342 if (mbedtls_x509_crt_parse_der(first, ca->raw.p, ca->raw.len) != 0) { in ca_callback() 351 mbedtls_x509_crt_free(first); in ca_callback() 352 mbedtls_free(first); in ca_callback() 353 first = NULL; in ca_callback() 356 *candidates = first; in ca_callback()
|
/mbedtls-latest/docs/architecture/testing/ |
D | test-framework.md | 13 …n which succinctly describes for a human audience what the test does. The first non-comment line o… 21 …criptions, but they should be avoided. At least please make sure that the first 66 characters desc… 33 …ibes for a human audience what the test does. The test description is the first parameter to `run_…
|
/mbedtls-latest/ |
D | .uncrustify.cfg | 107 # No spaces inside the first parentheses in a function type 152 # (Uncrustify >= 0.73.0) Remove space in empty first statement of a for 238 # Disable removal of leading spaces in a multi-line comment if the first and
|
D | BRANCHES.md | 66 comes in conflict with backwards compatibility, we will put security first, 95 will put security first but provide a compatibility option. (So far we never
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 170 PR upstreaming the first part of TLS 1.3 ClientHello writing code. 204 the address of the first byte of the vector length. 207 address of the first byte of the vector value. 210 the address of the first byte past the vector value. 234 The three first types, MBEDTLS_BYTE_{0-8}, MBEDTLS_PUT_UINT{8|16|32|64}_BE 303 at the 80 first characters is enough to fully understand the line. For
|