/mbedtls-latest/library/ |
D | mps_reader.c | 439 int overflow; in mbedtls_mps_reader_reclaim() local 480 overflow = 0; in mbedtls_mps_reader_reclaim() 481 overflow |= (backup_len < acc_backup_len); in mbedtls_mps_reader_reclaim() 482 overflow |= (acc_len_needed < backup_len); in mbedtls_mps_reader_reclaim() 484 if (overflow || acc_len < acc_len_needed) { in mbedtls_mps_reader_reclaim()
|
D | cmac.c | 61 uint32_t overflow = 0x00; in cmac_multiply_by_u() local 80 i32 = (i32 << 1) | overflow; in cmac_multiply_by_u() 82 overflow = new_overflow; in cmac_multiply_by_u()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_ccm.data | 1589 CCM encrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1597 CCM encrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1601 CCM encrypt, incomplete ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1605 CCM encrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1613 CCM encrypt, full update and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1617 CCM encrypt, incomplete update and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1621 CCM decrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1629 CCM decrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1633 CCM decrypt, incomplete ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16) 1637 CCM decrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)) [all …]
|
D | test_suite_ecp.data | 1741 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1758 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1775 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1792 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1809 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1826 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1845 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1862 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1879 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. 1896 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested. [all …]
|
D | test_suite_gcm.function | 35 * count as an overflow for memory sanitizers and static checkers. */ 89 * count as an overflow for memory sanitizers and static checkers. */ 553 // Test if potential total AD length overflow is handled properly 595 // Test if potential total input length overflow is handled properly
|
D | test_suite_platform.data | 9 # This test case exercises an integer overflow in calloc. Under Asan, with
|
D | test_suite_oid.data | 145 OID get numeric string - 32-bit overflow 148 OID get numeric string - 32-bit overflow, second subidentifier
|
D | test_suite_pem.function | 56 /* Test the function didn't overflow the given buffer */
|
D | test_suite_mps.data | 124 MPS Reader: Excess request leading to integer overflow
|
D | test_suite_ccm.function | 34 * count as an overflow for memory sanitizers and static checkers. */ 586 // subtract 1 from configured auth data length to provoke an overflow 746 // subtract 1 from configured msg length to provoke an overflow
|
D | test_suite_bignum_mod.function | 626 /* Test write overflow only when the representation is large and read is successful */
|
D | test_suite_ssl.data | 67 Message queue - overflow/underflow 82 Message transport mock - queue overflow/underflow 85 Message transport mock - socket overflow 3253 Cookie parsing: cookie_len overflow 3259 Cookie parsing: sid_len overflow
|
D | test_suite_x509parse.data | 1347 X509 CRT ASN1 (TBS, valid version tag + length, version number overflow) 2563 X509 CRL ASN1 (invalid version overflow) 2753 X509 OID numstring #5 (arithmetic overflow) 3049 X509 CSR ASN.1 (invalid version overflow)
|
D | test_suite_pk.data | 617 RSA hash_len overflow (size_t vs unsigned int)
|
D | test_suite_psa_crypto.function | 7005 * checking the error code then they don't overflow a buffer. */ 7150 * checking the error code then they don't overflow a buffer. */ 8296 * checking the error code then they don't overflow a buffer. */
|
/mbedtls-latest/tests/src/test_helpers/ |
D | ssl_helpers.c | 140 size_t overflow = 0; in mbedtls_test_ssl_buffer_put() local 163 overflow = (buf->start + buf->content_length + input_len) in mbedtls_test_ssl_buffer_put() 168 input_len - overflow); in mbedtls_test_ssl_buffer_put() 169 memcpy(buf->buffer, input + input_len - overflow, overflow); in mbedtls_test_ssl_buffer_put() 184 size_t overflow = 0; in mbedtls_test_ssl_buffer_get() local 201 overflow = (buf->start + output_len) % buf->capacity; in mbedtls_test_ssl_buffer_get() 205 memcpy(output, buf->buffer + buf->start, output_len - overflow); in mbedtls_test_ssl_buffer_get() 206 memcpy(output + output_len - overflow, buf->buffer, overflow); in mbedtls_test_ssl_buffer_get()
|
/mbedtls-latest/ |
D | BUGS.md | 14 3. If the issue is a security risk (for example: buffer overflow,
|
D | ChangeLog | 94 * Fix a stack buffer overflow in mbedtls_ecdsa_der_to_raw() and 469 could result in an integer overflow, causing a zero-length buffer to be 471 the buffer, causing a heap buffer overflow. 520 for overflow of the output buffer and reporting the actual length 642 which checks for overflow of the output buffer and reports the actual 661 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing. 888 * Fix possible integer overflow in mbedtls_timing_hardclock(), which 1430 non-compliant. This could not lead to a buffer overflow. In particular, 2173 * Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating 2184 * Fix a stack buffer overflow with mbedtls_net_poll() and [all …]
|
D | CMakeLists.txt | 227 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat-overflow=2 -Wformat-truncation")
|
/mbedtls-latest/programs/fuzz/ |
D | README.md | 6 …he fuzz target, and alert in case of an unwanted behavior (such as a buffer overflow for instance).
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 328 CPU's carry flag. When overflow may occur, functions return a carry flag.
|