Searched refs:correct (Results 1 – 13 of 13) sorted by relevance
/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_cipher.padding.data | 67 Check PKCS padding #1 (correct) 71 Check PKCS padding #2 (correct) 75 Check PKCS padding #3 (correct) 79 Check PKCS padding #4 (correct) 159 Check one and zeros padding #1 (correct) 163 Check one and zeros padding #2 (correct) 167 Check one and zeros padding #3 (correct) 171 Check one and zeros padding #4 (correct) 175 Check one and zeros padding #5 (correct) 187 Check zeros and len padding #1 (correct) [all …]
|
D | test_suite_x509parse.data | 818 X509 Certificate ASN1 (TBSCertificate, correct serial, no alg) 821 X509 Certificate ASN1 (TBSCertificate, correct serial, no alg oid) 830 X509 Certificate ASN1 (TBSCertificate, correct alg data, no params unknown version) 833 X509 Certificate ASN1 (TBSCertificate, correct alg data, unknown version) 836 X509 Certificate ASN1 (TBSCertificate, correct alg data, length mismatch) 839 X509 Certificate ASN1 (TBSCertificate, correct alg, unknown alg_id) 842 X509 Certificate ASN1 (TBSCertificate, correct alg, specific alg_id) 846 X509 Certificate ASN1 (TBSCertificate, correct alg, unknown specific alg_id) 849 X509 Certificate ASN1 (TBSCertificate, correct alg, bad RSASSA-PSS params) 1021 X509 Certificate ASN1 (correct pubkey, no sig_alg) [all …]
|
D | test_suite_rsa.function | 190 char *result_hex_str, int correct ) 215 … NULL, NULL, MBEDTLS_RSA_PUBLIC, MBEDTLS_MD_NONE, hash_len, hash_result, result_str ) == correct ); 227 if( correct == 0 )
|
D | test_suite_pkparse.data | 221 Key ASN1 (RSAPrivateKey, correct version, incorrect tag)
|
D | test_suite_ecp.function | 173 * Store correct result before we touch N
|
/net-tools-3.6.0/tinydtls-0.8.2/sha2/testvectors/testvectors/ |
D | vector002.info | 4 output from my own implementation which may not be correct.
|
D | vector003.info | 5 my own implementation and so may not be correct.
|
/net-tools-3.6.0/mbedtls-2.4.0/library/ |
D | ssl_tls.c | 1573 size_t padlen = 0, correct = 1; in ssl_decrypt_buf() local 1833 correct = 0; in ssl_decrypt_buf() 1846 correct = 0; in ssl_decrypt_buf() 1872 correct &= ( ssl->in_msglen >= padlen + 1 ); in ssl_decrypt_buf() 1873 correct &= ( padding_idx < MBEDTLS_SSL_MAX_CONTENT_LEN + in ssl_decrypt_buf() 1876 padding_idx *= correct; in ssl_decrypt_buf() 1885 correct &= ( pad_count == padlen ); /* Only 1 on correct padding */ in ssl_decrypt_buf() 1888 if( padlen > 0 && correct == 0 ) in ssl_decrypt_buf() 1891 padlen &= correct * 0x1FF; in ssl_decrypt_buf() 1961 extra_run &= correct * 0xFF; in ssl_decrypt_buf() [all …]
|
/net-tools-3.6.0/tinydtls-0.8.2/sha2/ |
D | README | 188 so that output is correct. I cannot verify this, however,
|
/net-tools-3.6.0/mbedtls-2.4.0/ |
D | ChangeLog | 1391 * Server not always sending correct CertificateRequest message 1570 * Fixed generation of DHM parameters to correct length (found by Ruslan 1955 serial number, setup correct server port in the ssl client example
|
/net-tools-3.6.0/tinydtls-0.8.2/doc/ |
D | Doxyfile.in | 1162 # would be unable to find the correct page. The default is NO. 1329 # does not have to be run to correct the links.
|
/net-tools-3.6.0/mbedtls-2.4.0/doxygen/ |
D | mbedtls.doxyfile | 1464 # would be unable to find the correct page. The default is NO.
|
/net-tools-3.6.0/libcoap/doc/ |
D | Doxyfile.in | 1811 # them the man command would be unable to find the correct page.
|