Searched refs:zeros (Results 1 – 16 of 16) sorted by relevance
/mbedtls-latest/tests/suites/ |
D | test_suite_cipher.padding.data | 140 Check one and zeros padding #1 (correct) 144 Check one and zeros padding #2 (correct) 148 Check one and zeros padding #3 (correct) 152 Check one and zeros padding #4 (correct) 156 Check one and zeros padding #5 (correct) 160 Check one and zeros padding #6 (missing one) 164 Check one and zeros padding #7 (overlong) 168 Check one and zeros padding #8 (last byte 0x80 | x) 172 Check zeros and len padding #1 (correct) 176 Check zeros and len padding #2 (correct) [all …]
|
D | test_suite_cipher.des.data | 73 DES Encrypt and decrypt 0 bytes with one and zeros padding 77 DES Encrypt and decrypt 1 byte with one and zeros padding 81 DES Encrypt and decrypt 2 bytes with one and zeros padding 85 DES Encrypt and decrypt 7 bytes with one and zeros padding 89 DES Encrypt and decrypt 8 bytes with one and zeros padding 93 DES Encrypt and decrypt 9 bytes with one and zeros padding 97 DES Encrypt and decrypt 15 bytes with one and zeros padding 101 DES Encrypt and decrypt 16 bytes with one and zeros padding 105 DES Encrypt and decrypt 17 bytes with one and zeros padding 109 DES Encrypt and decrypt 31 bytes with one and zeros padding [all …]
|
D | test_suite_cipher.camellia.data | 69 CAMELLIA Encrypt and decrypt 0 bytes with one and zeros padding 73 CAMELLIA Encrypt and decrypt 1 byte with one and zeros padding 77 CAMELLIA Encrypt and decrypt 2 bytes with one and zeros padding 81 CAMELLIA Encrypt and decrypt 7 bytes with one and zeros padding 85 CAMELLIA Encrypt and decrypt 8 bytes with one and zeros padding 89 CAMELLIA Encrypt and decrypt 9 bytes with one and zeros padding 93 CAMELLIA Encrypt and decrypt 15 bytes with one and zeros padding 97 CAMELLIA Encrypt and decrypt 16 bytes with one and zeros padding 101 CAMELLIA Encrypt and decrypt 17 bytes with one and zeros padding 105 CAMELLIA Encrypt and decrypt 31 bytes with one and zeros padding [all …]
|
D | test_suite_cipher.aes.data | 69 AES-128 CBC - Encrypt and decrypt 0 bytes with one and zeros padding 73 AES-128 CBC - Encrypt and decrypt 1 byte with one and zeros padding 77 AES-128 CBC - Encrypt and decrypt 2 bytes with one and zeros padding 81 AES-128 CBC - Encrypt and decrypt 7 bytes with one and zeros padding 85 AES-128 CBC - Encrypt and decrypt 8 bytes with one and zeros padding 89 AES-128 CBC - Encrypt and decrypt 9 bytes with one and zeros padding 93 AES-128 CBC - Encrypt and decrypt 15 bytes with one and zeros padding 97 AES-128 CBC - Encrypt and decrypt 16 bytes with one and zeros padding 101 AES-128 CBC - Encrypt and decrypt 17 bytes with one and zeros padding 105 AES-128 CBC - Encrypt and decrypt 31 bytes with one and zeros padding [all …]
|
D | test_suite_psa_crypto_util.data | 117 ECDSA DER -> Raw, 256bit, Invalid r all zeros 121 ECDSA DER -> Raw, 256bit, Invalid s all zeros 141 ECDSA DER -> Raw, 256bit, Invalid r 2 leading zeros 145 ECDSA DER -> Raw, 256bit, Invalid s 2 leading zeros
|
D | test_suite_psa_crypto_entropy.function | 157 uint8_t zeros[32] = { 0 }; 196 TEST_ASSERT(memcmp(output, zeros, sizeof(output)) != 0);
|
D | test_suite_dhm.function | 39 /* The DHM param output from Mbed TLS has leading zeros stripped, as
|
D | test_suite_bignum_random.data | 192 ## the input, without first checking for leading zeros. If this was
|
D | test_suite_bignum_core.function | 317 // can't fit required number of leading and trailing zeros - skip test 321 // Construct a test input value where the count of leading zeros and 322 // trailing zeros is given in the test case, and we add ones to fill
|
D | test_suite_psa_crypto.data | 7268 PSA raw key agreement: FFDH 2048 bits (shared secred with leading zeros) 7276 PSA raw key agreement: FFDH 3072 bits (shared secred with leading zeros) 7284 PSA raw key agreement: FFDH 4096 bits (shared secred with leading zeros) 7292 PSA raw key agreement: FFDH 6144 bits (shared secred with leading zeros) 7547 PSA generate key custom: RSA, e=3 with leading zeros 7553 # for leading zeros. This is a very minor bug. Re-enable this test when this 7555 #PSA generate key custom: RSA, e=3 with many leading zeros
|
D | test_suite_psa_crypto_driver_wrappers.function | 421 * \param modulus Key modulus. Must not have leading zeros.
|
/mbedtls-latest/library/ |
D | rsa.c | 1698 const unsigned char zeros[8] = { 0, 0, 0, 0, 0, 0, 0, 0 }; in hash_mprime() local 1715 if ((ret = mbedtls_md_update(&md_ctx, zeros, sizeof(zeros))) != 0) { in hash_mprime()
|
D | psa_crypto.c | 7248 uint8_t zeros[16] = { 0 }; local 7250 psa_set_key_bits(&attributes, PSA_BYTES_TO_BITS(sizeof(zeros))); 7256 zeros, sizeof(zeros),
|
/mbedtls-latest/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 105 * RSA keys: can invalid DER encodings (e.g. leading zeros, ignored sign bit) have been stored?
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 343 …ecessary in the DER-to-raw direction because the DER format lacks leading zeros, so something else…
|
/mbedtls-latest/ |
D | ChangeLog | 2788 * Fix mbedtls_asn1_get_int to support any number of leading zeros. Credit 3802 zeros. 5290 * Support for zeros-and-length (ANSI X.923) padding, one-and-zeros
|