Home
last modified time | relevance | path

Searched refs:overflow (Results 1 – 21 of 21) sorted by relevance

/mbedtls-latest/library/
Dmps_reader.c439 int overflow; in mbedtls_mps_reader_reclaim() local
480 overflow = 0; in mbedtls_mps_reader_reclaim()
481 overflow |= (backup_len < acc_backup_len); in mbedtls_mps_reader_reclaim()
482 overflow |= (acc_len_needed < backup_len); in mbedtls_mps_reader_reclaim()
484 if (overflow || acc_len < acc_len_needed) { in mbedtls_mps_reader_reclaim()
Dcmac.c61 uint32_t overflow = 0x00; in cmac_multiply_by_u() local
80 i32 = (i32 << 1) | overflow; in cmac_multiply_by_u()
82 overflow = new_overflow; in cmac_multiply_by_u()
/mbedtls-latest/tests/suites/
Dtest_suite_ccm.data1589 CCM encrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1597 CCM encrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1601 CCM encrypt, incomplete ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1605 CCM encrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1613 CCM encrypt, full update and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1617 CCM encrypt, incomplete update and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1621 CCM decrypt, overflow ad NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1629 CCM decrypt, full ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1633 CCM decrypt, incomplete ad and overflow NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
1637 CCM decrypt, overflow update NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16))
[all …]
Dtest_suite_ecp.data1741 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1758 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1775 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1792 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1809 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1826 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1845 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1862 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1879 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
1896 # Use the test data "modulus - 1" and "modulus - 2" to ensure the sum overflow case be tested.
[all …]
Dtest_suite_gcm.function35 * count as an overflow for memory sanitizers and static checkers. */
89 * count as an overflow for memory sanitizers and static checkers. */
553 // Test if potential total AD length overflow is handled properly
595 // Test if potential total input length overflow is handled properly
Dtest_suite_platform.data9 # This test case exercises an integer overflow in calloc. Under Asan, with
Dtest_suite_oid.data145 OID get numeric string - 32-bit overflow
148 OID get numeric string - 32-bit overflow, second subidentifier
Dtest_suite_pem.function56 /* Test the function didn't overflow the given buffer */
Dtest_suite_mps.data124 MPS Reader: Excess request leading to integer overflow
Dtest_suite_ccm.function34 * count as an overflow for memory sanitizers and static checkers. */
586 // subtract 1 from configured auth data length to provoke an overflow
746 // subtract 1 from configured msg length to provoke an overflow
Dtest_suite_bignum_mod.function626 /* Test write overflow only when the representation is large and read is successful */
Dtest_suite_ssl.data67 Message queue - overflow/underflow
82 Message transport mock - queue overflow/underflow
85 Message transport mock - socket overflow
3253 Cookie parsing: cookie_len overflow
3259 Cookie parsing: sid_len overflow
Dtest_suite_x509parse.data1347 X509 CRT ASN1 (TBS, valid version tag + length, version number overflow)
2563 X509 CRL ASN1 (invalid version overflow)
2753 X509 OID numstring #5 (arithmetic overflow)
3049 X509 CSR ASN.1 (invalid version overflow)
Dtest_suite_pk.data617 RSA hash_len overflow (size_t vs unsigned int)
Dtest_suite_psa_crypto.function7005 * checking the error code then they don't overflow a buffer. */
7150 * checking the error code then they don't overflow a buffer. */
8296 * checking the error code then they don't overflow a buffer. */
/mbedtls-latest/tests/src/test_helpers/
Dssl_helpers.c140 size_t overflow = 0; in mbedtls_test_ssl_buffer_put() local
163 overflow = (buf->start + buf->content_length + input_len) in mbedtls_test_ssl_buffer_put()
168 input_len - overflow); in mbedtls_test_ssl_buffer_put()
169 memcpy(buf->buffer, input + input_len - overflow, overflow); in mbedtls_test_ssl_buffer_put()
184 size_t overflow = 0; in mbedtls_test_ssl_buffer_get() local
201 overflow = (buf->start + output_len) % buf->capacity; in mbedtls_test_ssl_buffer_get()
205 memcpy(output, buf->buffer + buf->start, output_len - overflow); in mbedtls_test_ssl_buffer_get()
206 memcpy(output + output_len - overflow, buf->buffer, overflow); in mbedtls_test_ssl_buffer_get()
/mbedtls-latest/
DBUGS.md14 3. If the issue is a security risk (for example: buffer overflow,
DChangeLog94 * Fix a stack buffer overflow in mbedtls_ecdsa_der_to_raw() and
469 could result in an integer overflow, causing a zero-length buffer to be
471 the buffer, causing a heap buffer overflow.
520 for overflow of the output buffer and reporting the actual length
642 which checks for overflow of the output buffer and reports the actual
661 * Fix a remotely exploitable heap buffer overflow in TLS handshake parsing.
888 * Fix possible integer overflow in mbedtls_timing_hardclock(), which
1430 non-compliant. This could not lead to a buffer overflow. In particular,
2173 * Fix a buffer overflow in mbedtls_mpi_sub_abs() when calculating
2184 * Fix a stack buffer overflow with mbedtls_net_poll() and
[all …]
DCMakeLists.txt227 set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wformat-overflow=2 -Wformat-truncation")
/mbedtls-latest/programs/fuzz/
DREADME.md6 …he fuzz target, and alert in case of an unwanted behavior (such as a buffer overflow for instance).
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md328 CPU's carry flag. When overflow may occur, functions return a carry flag.