Home
last modified time | relevance | path

Searched refs:correct (Results 1 – 13 of 13) sorted by relevance

/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_cipher.padding.data67 Check PKCS padding #1 (correct)
71 Check PKCS padding #2 (correct)
75 Check PKCS padding #3 (correct)
79 Check PKCS padding #4 (correct)
159 Check one and zeros padding #1 (correct)
163 Check one and zeros padding #2 (correct)
167 Check one and zeros padding #3 (correct)
171 Check one and zeros padding #4 (correct)
175 Check one and zeros padding #5 (correct)
187 Check zeros and len padding #1 (correct)
[all …]
Dtest_suite_x509parse.data818 X509 Certificate ASN1 (TBSCertificate, correct serial, no alg)
821 X509 Certificate ASN1 (TBSCertificate, correct serial, no alg oid)
830 X509 Certificate ASN1 (TBSCertificate, correct alg data, no params unknown version)
833 X509 Certificate ASN1 (TBSCertificate, correct alg data, unknown version)
836 X509 Certificate ASN1 (TBSCertificate, correct alg data, length mismatch)
839 X509 Certificate ASN1 (TBSCertificate, correct alg, unknown alg_id)
842 X509 Certificate ASN1 (TBSCertificate, correct alg, specific alg_id)
846 X509 Certificate ASN1 (TBSCertificate, correct alg, unknown specific alg_id)
849 X509 Certificate ASN1 (TBSCertificate, correct alg, bad RSASSA-PSS params)
1021 X509 Certificate ASN1 (correct pubkey, no sig_alg)
[all …]
Dtest_suite_rsa.function190 char *result_hex_str, int correct )
215 … NULL, NULL, MBEDTLS_RSA_PUBLIC, MBEDTLS_MD_NONE, hash_len, hash_result, result_str ) == correct );
227 if( correct == 0 )
Dtest_suite_pkparse.data221 Key ASN1 (RSAPrivateKey, correct version, incorrect tag)
Dtest_suite_ecp.function173 * Store correct result before we touch N
/net-tools-3.4.0/tinydtls-0.8.2/sha2/testvectors/testvectors/
Dvector002.info4 output from my own implementation which may not be correct.
Dvector003.info5 my own implementation and so may not be correct.
/net-tools-3.4.0/mbedtls-2.4.0/library/
Dssl_tls.c1573 size_t padlen = 0, correct = 1; in ssl_decrypt_buf() local
1833 correct = 0; in ssl_decrypt_buf()
1846 correct = 0; in ssl_decrypt_buf()
1872 correct &= ( ssl->in_msglen >= padlen + 1 ); in ssl_decrypt_buf()
1873 correct &= ( padding_idx < MBEDTLS_SSL_MAX_CONTENT_LEN + in ssl_decrypt_buf()
1876 padding_idx *= correct; in ssl_decrypt_buf()
1885 correct &= ( pad_count == padlen ); /* Only 1 on correct padding */ in ssl_decrypt_buf()
1888 if( padlen > 0 && correct == 0 ) in ssl_decrypt_buf()
1891 padlen &= correct * 0x1FF; in ssl_decrypt_buf()
1961 extra_run &= correct * 0xFF; in ssl_decrypt_buf()
[all …]
/net-tools-3.4.0/tinydtls-0.8.2/sha2/
DREADME188 so that output is correct. I cannot verify this, however,
/net-tools-3.4.0/mbedtls-2.4.0/
DChangeLog1391 * Server not always sending correct CertificateRequest message
1570 * Fixed generation of DHM parameters to correct length (found by Ruslan
1955 serial number, setup correct server port in the ssl client example
/net-tools-3.4.0/tinydtls-0.8.2/doc/
DDoxyfile.in1162 # would be unable to find the correct page. The default is NO.
1329 # does not have to be run to correct the links.
/net-tools-3.4.0/mbedtls-2.4.0/doxygen/
Dmbedtls.doxyfile1464 # would be unable to find the correct page. The default is NO.
/net-tools-3.4.0/libcoap/doc/
DDoxyfile.in1811 # them the man command would be unable to find the correct page.