Home
last modified time | relevance | path

Searched refs:zeros (Results 1 – 16 of 16) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_cipher.padding.data140 Check one and zeros padding #1 (correct)
144 Check one and zeros padding #2 (correct)
148 Check one and zeros padding #3 (correct)
152 Check one and zeros padding #4 (correct)
156 Check one and zeros padding #5 (correct)
160 Check one and zeros padding #6 (missing one)
164 Check one and zeros padding #7 (overlong)
168 Check one and zeros padding #8 (last byte 0x80 | x)
172 Check zeros and len padding #1 (correct)
176 Check zeros and len padding #2 (correct)
[all …]
Dtest_suite_cipher.des.data73 DES Encrypt and decrypt 0 bytes with one and zeros padding
77 DES Encrypt and decrypt 1 byte with one and zeros padding
81 DES Encrypt and decrypt 2 bytes with one and zeros padding
85 DES Encrypt and decrypt 7 bytes with one and zeros padding
89 DES Encrypt and decrypt 8 bytes with one and zeros padding
93 DES Encrypt and decrypt 9 bytes with one and zeros padding
97 DES Encrypt and decrypt 15 bytes with one and zeros padding
101 DES Encrypt and decrypt 16 bytes with one and zeros padding
105 DES Encrypt and decrypt 17 bytes with one and zeros padding
109 DES Encrypt and decrypt 31 bytes with one and zeros padding
[all …]
Dtest_suite_cipher.camellia.data69 CAMELLIA Encrypt and decrypt 0 bytes with one and zeros padding
73 CAMELLIA Encrypt and decrypt 1 byte with one and zeros padding
77 CAMELLIA Encrypt and decrypt 2 bytes with one and zeros padding
81 CAMELLIA Encrypt and decrypt 7 bytes with one and zeros padding
85 CAMELLIA Encrypt and decrypt 8 bytes with one and zeros padding
89 CAMELLIA Encrypt and decrypt 9 bytes with one and zeros padding
93 CAMELLIA Encrypt and decrypt 15 bytes with one and zeros padding
97 CAMELLIA Encrypt and decrypt 16 bytes with one and zeros padding
101 CAMELLIA Encrypt and decrypt 17 bytes with one and zeros padding
105 CAMELLIA Encrypt and decrypt 31 bytes with one and zeros padding
[all …]
Dtest_suite_cipher.aes.data69 AES-128 CBC - Encrypt and decrypt 0 bytes with one and zeros padding
73 AES-128 CBC - Encrypt and decrypt 1 byte with one and zeros padding
77 AES-128 CBC - Encrypt and decrypt 2 bytes with one and zeros padding
81 AES-128 CBC - Encrypt and decrypt 7 bytes with one and zeros padding
85 AES-128 CBC - Encrypt and decrypt 8 bytes with one and zeros padding
89 AES-128 CBC - Encrypt and decrypt 9 bytes with one and zeros padding
93 AES-128 CBC - Encrypt and decrypt 15 bytes with one and zeros padding
97 AES-128 CBC - Encrypt and decrypt 16 bytes with one and zeros padding
101 AES-128 CBC - Encrypt and decrypt 17 bytes with one and zeros padding
105 AES-128 CBC - Encrypt and decrypt 31 bytes with one and zeros padding
[all …]
Dtest_suite_psa_crypto_util.data117 ECDSA DER -> Raw, 256bit, Invalid r all zeros
121 ECDSA DER -> Raw, 256bit, Invalid s all zeros
141 ECDSA DER -> Raw, 256bit, Invalid r 2 leading zeros
145 ECDSA DER -> Raw, 256bit, Invalid s 2 leading zeros
Dtest_suite_psa_crypto_entropy.function157 uint8_t zeros[32] = { 0 };
196 TEST_ASSERT(memcmp(output, zeros, sizeof(output)) != 0);
Dtest_suite_dhm.function39 /* The DHM param output from Mbed TLS has leading zeros stripped, as
Dtest_suite_bignum_random.data192 ## the input, without first checking for leading zeros. If this was
Dtest_suite_bignum_core.function317 // can't fit required number of leading and trailing zeros - skip test
321 // Construct a test input value where the count of leading zeros and
322 // trailing zeros is given in the test case, and we add ones to fill
Dtest_suite_psa_crypto.data7268 PSA raw key agreement: FFDH 2048 bits (shared secred with leading zeros)
7276 PSA raw key agreement: FFDH 3072 bits (shared secred with leading zeros)
7284 PSA raw key agreement: FFDH 4096 bits (shared secred with leading zeros)
7292 PSA raw key agreement: FFDH 6144 bits (shared secred with leading zeros)
7547 PSA generate key custom: RSA, e=3 with leading zeros
7553 # for leading zeros. This is a very minor bug. Re-enable this test when this
7555 #PSA generate key custom: RSA, e=3 with many leading zeros
Dtest_suite_psa_crypto_driver_wrappers.function421 * \param modulus Key modulus. Must not have leading zeros.
/mbedtls-latest/library/
Drsa.c1698 const unsigned char zeros[8] = { 0, 0, 0, 0, 0, 0, 0, 0 }; in hash_mprime() local
1715 if ((ret = mbedtls_md_update(&md_ctx, zeros, sizeof(zeros))) != 0) { in hash_mprime()
Dpsa_crypto.c7248 uint8_t zeros[16] = { 0 }; local
7250 psa_set_key_bits(&attributes, PSA_BYTES_TO_BITS(sizeof(zeros)));
7256 zeros, sizeof(zeros),
/mbedtls-latest/docs/architecture/testing/
Dpsa-storage-format-testing.md105 * RSA keys: can invalid DER encodings (e.g. leading zeros, ignored sign bit) have been stored?
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-legacy-bridges.md343 …ecessary in the DER-to-raw direction because the DER format lacks leading zeros, so something else…
/mbedtls-latest/
DChangeLog2788 * Fix mbedtls_asn1_get_int to support any number of leading zeros. Credit
3802 zeros.
5290 * Support for zeros-and-length (ANSI X.923) padding, one-and-zeros