Home
last modified time | relevance | path

Searched refs:zero (Results 1 – 25 of 45) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_bignum.generated.data12 MPI add #4 0 (null) + negative with leading zero limb
21 MPI add #7 0 (null) + positive with leading zero limb
24 MPI add #8 0 (null) + negative with leading zero limb
42 MPI add #14 0 (1 limb) + negative with leading zero limb
51 MPI add #17 0 (1 limb) + positive with leading zero limb
54 MPI add #18 0 (1 limb) + negative with leading zero limb
72 MPI add #24 negative 0 (null) + negative with leading zero limb
81 MPI add #27 negative 0 (null) + positive with leading zero limb
84 MPI add #28 negative 0 (null) + negative with leading zero limb
93 MPI add #31 negative with leading zero limb + 0 (null)
[all …]
Dtest_suite_bignum.misc.data13 Base test mpi_read_write_string #3 (Read zero decimal)
16 Base test mpi_read_write_string #3 (Read zero hex)
19 Base test mpi_read_write_string #3 (Read minus zero decimal)
22 Base test mpi_read_write_string #3 (Read minus zero hex)
259 Test mbedtls_mpi_cmp_mpi: 0 (null) < positive with leading zero limb
262 Test mbedtls_mpi_cmp_mpi: 0 (1 limb) < positive with leading zero limb
265 Test mbedtls_mpi_cmp_mpi: 0 (null) > negative with leading zero limb
268 Test mbedtls_mpi_cmp_mpi: 0 (1 limb) > negative with leading zero limb
271 Test mbedtls_mpi_cmp_mpi: positive with leading zero limb > 0 (null)
274 Test mbedtls_mpi_cmp_mpi: positive with leading zero limb > 0 (1 limb)
[all …]
Dtest_suite_ecdsa.data1 ECDSA primitive hash zero #1
5 ECDSA primitive hash zero #2
9 ECDSA primitive hash zero #3
13 ECDSA primitive hash zero #4
17 ECDSA primitive hash zero #5
53 ECDSA write-read hash zero #1
57 ECDSA write-read hash zero #2
61 ECDSA write-read hash zero #3
65 ECDSA write-read hash zero #4
69 ECDSA write-read hash zero #5
[all …]
Dtest_suite_ecjpake.data34 ECJPAKE round one: KKP1: first point is zero
58 ECJPAKE round one: KKP1: zero-length r
82 ECJPAKE round one: KKP2: first point is zero
106 ECJPAKE round one: KKP2: zero-length r
148 ECJPAKE round two client: first point is zero
172 ECJPAKE round two client: zero-length r
202 ECJPAKE round two server: first point is zero
226 ECJPAKE round two server: zero-length r
Dtest_suite_psa_crypto_memory.data10 PSA input buffer copy: zero-length source buffer
13 PSA input buffer copy: zero-length both buffers
25 PSA output buffer copy: zero-length source buffer
28 PSA output buffer copy: zero-length both buffers
Dtest_suite_bignum_core.misc.data230 mbedtls_mpi_core_lt_ct: x<y, zero vs non-zero MS limb
266 Test mbedtls_mpi_core_uint_le_mpi: 2^31-1 with leading zero limb
272 Test mbedtls_mpi_core_uint_le_mpi: 2^32-1 with leading zero limb
278 Test mbedtls_mpi_core_uint_le_mpi: 2^32 with leading zero limb
284 Test mbedtls_mpi_core_uint_le_mpi: 2^32+1 with leading zero limb
290 Test mbedtls_mpi_core_uint_le_mpi: 2^63-1 with leading zero limb
296 Test mbedtls_mpi_core_uint_le_mpi: 2^64-1 with leading zero limb
Dtest_suite_ecdsa.function85 mbedtls_mpi d, r, s, r_check, s_check, zero;
92 mbedtls_mpi_init(&zero);
143 /* Invalid signatures: r, s or both (CVE-2022-21449) are zero */
144 TEST_EQUAL(mbedtls_mpi_lset(&zero, 0), 0);
147 &zero, &s_check), MBEDTLS_ERR_ECP_VERIFY_FAILED);
149 &r_check, &zero), MBEDTLS_ERR_ECP_VERIFY_FAILED);
151 &zero, &zero), MBEDTLS_ERR_ECP_VERIFY_FAILED);
189 mbedtls_mpi_free(&zero);
Dtest_suite_platform_util.function17 /* Write non-zero content */
25 /* Check content is non-zero */
34 /* Check content is zero and sentinels un-changed */
Dtest_suite_alignment.data52 Byteswap 16 all-zero
64 Byteswap 32 all-zero
73 Byteswap 64 all-zero
Dtest_suite_ecp.data172 ECP write binary #1 (zero, uncompressed, buffer just fits)
176 ECP write binary #2 (zero, buffer too small)
180 ECP write binary #3 (non-zero, uncompressed, buffer just fits)
184 ECP write binary #4 (non-zero, uncompressed, buffer too small)
188 ECP write binary #5 (zero, compressed, buffer just fits)
192 ECP write binary #6 (zero, buffer too small)
224 ECP read binary #1 (zero, invalid ilen)
228 ECP read binary #2 (zero, invalid first byte)
232 ECP read binary #3 (zero, OK)
236 ECP read binary #4 (non-zero, invalid ilen, too short)
[all …]
Dtest_suite_psa_crypto_util.data125 ECDSA DER -> Raw, 256bit, Valid r only 1 zero byte
129 ECDSA DER -> Raw, 256bit, Valid s only 1 zero byte
149 ECDSA DER -> Raw, 256bit, Invalid r: MSb set without leading zero
Dtest_suite_psa_crypto.function53 * \return 1 if the buffer is all-bits-zero.
326 * \param is_encrypt If non-zero this is an encryption operation.
327 * \param do_zero_parts If non-zero, interleave zero length chunks
329 * \return int Zero on failure, non-zero on success.
585 * \param is_verify If non-zero this is a verify operation.
586 * \param do_zero_parts If non-zero, interleave zero length chunks
588 * \return int Zero on failure, non-zero on success.
2113 psa_key_attributes_t zero;
2115 memset(&zero, 0, sizeof(zero));
2119 TEST_EQUAL(psa_get_key_lifetime(&zero), PSA_KEY_LIFETIME_VOLATILE);
[all …]
Dtest_suite_bignum_core.function326 // some zero bits
635 /* All of the inputs are +ve (or zero) */
746 /* All of the inputs are +ve (or zero) */
820 /* All of the inputs are +ve (or zero) */
871 /* All of the inputs are +ve (or zero) */
950 /* Test for zero divisor */
985 /* All of the inputs are +ve (or zero) */
995 /* Output is +ve (or zero) */
1093 * expected value. Bytes above wanted_bytes must be zero. */
Dtest_suite_psa_crypto_entropy.function24 * or \p expected_size is zero and the file does not exist.
27 * or \p expected_size is zero but the file exists.
Dhost_test.function371 * \param missing_unmet_dependencies Non-zero if there was a problem tracking
533 mbedtls_fprintf(stderr, "all-bits-zero is not a NULL pointer\n");
538 * Make sure we have a snprintf that correctly zero-terminates
606 "FATAL: Dep count larger than zero at start of loop\n");
Dtest_suite_timing.function28 /* Check that a non-zero time was written back */
Dtest_suite_bignum_mod.function252 * with a non-zero final parameter. */
354 * with a non-zero final parameter. */
404 * with a non-zero final parameter. */
455 * with a non-zero final parameter. */
Dtest_suite_asn1write.data367 Store named data: found, null to zero
373 Store named data: found, data to zero
Dtest_suite_ssl_decrypt.function140 * byte that encodes the length. The minimal non-zero plaintext length
184 /* Minimal non-zero plaintext_length giving desired padding.
Dtest_suite_bignum.function23 /* The value 0 must be represented with the sign +1. A "negative zero"
26 * a negative zero input. If a test case has a negative zero as input,
27 * we don't mind if the function has a negative zero output. */
1259 * leading zero bytes the number has. */
Dtest_suite_dhm.data76 Diffie-Hellman zero modulus
Dtest_suite_pkcs7.function131 /* Special-case for zero-length input so that data will be non-NULL */
/mbedtls-latest/library/
Dmps_reader.c113 static mbedtls_mps_reader const zero = in mps_reader_zero() local
123 *rd = zero; in mps_reader_zero()
Daesce.c316 uint8x16_t zero = vdupq_n_u8(0); in aes_sub_word() local
320 v = vaeseq_u8(zero, v); in aes_sub_word()
Dnist_kw.c421 const uint8_t zero[KW_SEMIBLOCK_LENGTH] = { 0 }; in mbedtls_nist_kw_unwrap() local
423 &output[*out_len - KW_SEMIBLOCK_LENGTH], zero, in mbedtls_nist_kw_unwrap()

12