/mbedtls-latest/tests/suites/ |
D | test_suite_bignum.generated.data | 12 MPI add #4 0 (null) + negative with leading zero limb 21 MPI add #7 0 (null) + positive with leading zero limb 24 MPI add #8 0 (null) + negative with leading zero limb 42 MPI add #14 0 (1 limb) + negative with leading zero limb 51 MPI add #17 0 (1 limb) + positive with leading zero limb 54 MPI add #18 0 (1 limb) + negative with leading zero limb 72 MPI add #24 negative 0 (null) + negative with leading zero limb 81 MPI add #27 negative 0 (null) + positive with leading zero limb 84 MPI add #28 negative 0 (null) + negative with leading zero limb 93 MPI add #31 negative with leading zero limb + 0 (null) [all …]
|
D | test_suite_bignum.misc.data | 13 Base test mpi_read_write_string #3 (Read zero decimal) 16 Base test mpi_read_write_string #3 (Read zero hex) 19 Base test mpi_read_write_string #3 (Read minus zero decimal) 22 Base test mpi_read_write_string #3 (Read minus zero hex) 259 Test mbedtls_mpi_cmp_mpi: 0 (null) < positive with leading zero limb 262 Test mbedtls_mpi_cmp_mpi: 0 (1 limb) < positive with leading zero limb 265 Test mbedtls_mpi_cmp_mpi: 0 (null) > negative with leading zero limb 268 Test mbedtls_mpi_cmp_mpi: 0 (1 limb) > negative with leading zero limb 271 Test mbedtls_mpi_cmp_mpi: positive with leading zero limb > 0 (null) 274 Test mbedtls_mpi_cmp_mpi: positive with leading zero limb > 0 (1 limb) [all …]
|
D | test_suite_ecdsa.data | 1 ECDSA primitive hash zero #1 5 ECDSA primitive hash zero #2 9 ECDSA primitive hash zero #3 13 ECDSA primitive hash zero #4 17 ECDSA primitive hash zero #5 53 ECDSA write-read hash zero #1 57 ECDSA write-read hash zero #2 61 ECDSA write-read hash zero #3 65 ECDSA write-read hash zero #4 69 ECDSA write-read hash zero #5 [all …]
|
D | test_suite_ecjpake.data | 34 ECJPAKE round one: KKP1: first point is zero 58 ECJPAKE round one: KKP1: zero-length r 82 ECJPAKE round one: KKP2: first point is zero 106 ECJPAKE round one: KKP2: zero-length r 148 ECJPAKE round two client: first point is zero 172 ECJPAKE round two client: zero-length r 202 ECJPAKE round two server: first point is zero 226 ECJPAKE round two server: zero-length r
|
D | test_suite_psa_crypto_memory.data | 10 PSA input buffer copy: zero-length source buffer 13 PSA input buffer copy: zero-length both buffers 25 PSA output buffer copy: zero-length source buffer 28 PSA output buffer copy: zero-length both buffers
|
D | test_suite_bignum_core.misc.data | 230 mbedtls_mpi_core_lt_ct: x<y, zero vs non-zero MS limb 266 Test mbedtls_mpi_core_uint_le_mpi: 2^31-1 with leading zero limb 272 Test mbedtls_mpi_core_uint_le_mpi: 2^32-1 with leading zero limb 278 Test mbedtls_mpi_core_uint_le_mpi: 2^32 with leading zero limb 284 Test mbedtls_mpi_core_uint_le_mpi: 2^32+1 with leading zero limb 290 Test mbedtls_mpi_core_uint_le_mpi: 2^63-1 with leading zero limb 296 Test mbedtls_mpi_core_uint_le_mpi: 2^64-1 with leading zero limb
|
D | test_suite_ecdsa.function | 85 mbedtls_mpi d, r, s, r_check, s_check, zero; 92 mbedtls_mpi_init(&zero); 143 /* Invalid signatures: r, s or both (CVE-2022-21449) are zero */ 144 TEST_EQUAL(mbedtls_mpi_lset(&zero, 0), 0); 147 &zero, &s_check), MBEDTLS_ERR_ECP_VERIFY_FAILED); 149 &r_check, &zero), MBEDTLS_ERR_ECP_VERIFY_FAILED); 151 &zero, &zero), MBEDTLS_ERR_ECP_VERIFY_FAILED); 189 mbedtls_mpi_free(&zero);
|
D | test_suite_platform_util.function | 17 /* Write non-zero content */ 25 /* Check content is non-zero */ 34 /* Check content is zero and sentinels un-changed */
|
D | test_suite_alignment.data | 52 Byteswap 16 all-zero 64 Byteswap 32 all-zero 73 Byteswap 64 all-zero
|
D | test_suite_ecp.data | 172 ECP write binary #1 (zero, uncompressed, buffer just fits) 176 ECP write binary #2 (zero, buffer too small) 180 ECP write binary #3 (non-zero, uncompressed, buffer just fits) 184 ECP write binary #4 (non-zero, uncompressed, buffer too small) 188 ECP write binary #5 (zero, compressed, buffer just fits) 192 ECP write binary #6 (zero, buffer too small) 224 ECP read binary #1 (zero, invalid ilen) 228 ECP read binary #2 (zero, invalid first byte) 232 ECP read binary #3 (zero, OK) 236 ECP read binary #4 (non-zero, invalid ilen, too short) [all …]
|
D | test_suite_psa_crypto_util.data | 125 ECDSA DER -> Raw, 256bit, Valid r only 1 zero byte 129 ECDSA DER -> Raw, 256bit, Valid s only 1 zero byte 149 ECDSA DER -> Raw, 256bit, Invalid r: MSb set without leading zero
|
D | test_suite_psa_crypto.function | 53 * \return 1 if the buffer is all-bits-zero. 326 * \param is_encrypt If non-zero this is an encryption operation. 327 * \param do_zero_parts If non-zero, interleave zero length chunks 329 * \return int Zero on failure, non-zero on success. 585 * \param is_verify If non-zero this is a verify operation. 586 * \param do_zero_parts If non-zero, interleave zero length chunks 588 * \return int Zero on failure, non-zero on success. 2113 psa_key_attributes_t zero; 2115 memset(&zero, 0, sizeof(zero)); 2119 TEST_EQUAL(psa_get_key_lifetime(&zero), PSA_KEY_LIFETIME_VOLATILE); [all …]
|
D | test_suite_bignum_core.function | 326 // some zero bits 635 /* All of the inputs are +ve (or zero) */ 746 /* All of the inputs are +ve (or zero) */ 820 /* All of the inputs are +ve (or zero) */ 871 /* All of the inputs are +ve (or zero) */ 950 /* Test for zero divisor */ 985 /* All of the inputs are +ve (or zero) */ 995 /* Output is +ve (or zero) */ 1093 * expected value. Bytes above wanted_bytes must be zero. */
|
D | test_suite_psa_crypto_entropy.function | 24 * or \p expected_size is zero and the file does not exist. 27 * or \p expected_size is zero but the file exists.
|
D | host_test.function | 371 * \param missing_unmet_dependencies Non-zero if there was a problem tracking 533 mbedtls_fprintf(stderr, "all-bits-zero is not a NULL pointer\n"); 538 * Make sure we have a snprintf that correctly zero-terminates 606 "FATAL: Dep count larger than zero at start of loop\n");
|
D | test_suite_timing.function | 28 /* Check that a non-zero time was written back */
|
D | test_suite_bignum_mod.function | 252 * with a non-zero final parameter. */ 354 * with a non-zero final parameter. */ 404 * with a non-zero final parameter. */ 455 * with a non-zero final parameter. */
|
D | test_suite_asn1write.data | 367 Store named data: found, null to zero 373 Store named data: found, data to zero
|
D | test_suite_ssl_decrypt.function | 140 * byte that encodes the length. The minimal non-zero plaintext length 184 /* Minimal non-zero plaintext_length giving desired padding.
|
D | test_suite_bignum.function | 23 /* The value 0 must be represented with the sign +1. A "negative zero" 26 * a negative zero input. If a test case has a negative zero as input, 27 * we don't mind if the function has a negative zero output. */ 1259 * leading zero bytes the number has. */
|
D | test_suite_dhm.data | 76 Diffie-Hellman zero modulus
|
D | test_suite_pkcs7.function | 131 /* Special-case for zero-length input so that data will be non-NULL */
|
/mbedtls-latest/library/ |
D | mps_reader.c | 113 static mbedtls_mps_reader const zero = in mps_reader_zero() local 123 *rd = zero; in mps_reader_zero()
|
D | aesce.c | 316 uint8x16_t zero = vdupq_n_u8(0); in aes_sub_word() local 320 v = vaeseq_u8(zero, v); in aes_sub_word()
|
D | nist_kw.c | 421 const uint8_t zero[KW_SEMIBLOCK_LENGTH] = { 0 }; in mbedtls_nist_kw_unwrap() local 423 &output[*out_len - KW_SEMIBLOCK_LENGTH], zero, in mbedtls_nist_kw_unwrap()
|