Searched refs:correct (Results 1 – 22 of 22) sorted by relevance
/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_cipher.padding.data | 64 Check PKCS padding #1 (correct) 68 Check PKCS padding #2 (correct) 72 Check PKCS padding #3 (correct) 76 Check PKCS padding #4 (correct) 156 Check one and zeros padding #1 (correct) 160 Check one and zeros padding #2 (correct) 164 Check one and zeros padding #3 (correct) 168 Check one and zeros padding #4 (correct) 172 Check one and zeros padding #5 (correct) 188 Check zeros and len padding #1 (correct) [all …]
|
D | test_suite_pkparse.data | 1093 Key ASN1 (RSAPrivateKey, correct version, incorrect tag) 1097 Key ASN1 (RSAPrivateKey, correct format+values, minimal modulus size (128 bit)) 1101 Key ASN1 (RSAPrivateKey, correct format, modulus too small (127 bit)) 1105 Key ASN1 (RSAPrivateKey, correct format, modulus even) 1109 Key ASN1 (RSAPrivateKey, correct format, d == 0) 1113 Key ASN1 (RSAPrivateKey, correct format, d == p == q == 0) 1117 Key ASN1 (RSAPrivateKey, correct values, trailing garbage) 1121 Key ASN1 (RSAPrivateKey, correct values, n wrong tag) 1125 Key ASN1 (RSAPrivateKey, correct values, e wrong tag) 1129 Key ASN1 (RSAPrivateKey, correct values, d wrong tag) [all …]
|
D | test_suite_ssl.function | 450 * the correct value allows for simulation of MTU, sanity testing the mock 1525 * message was sent in the correct number of fragments. 2123 * correct and works as expected. 2240 * correct and works as expected on unconnected sockets. 3589 /* Save correct pre-encryption record */ 3595 * Encrypt and decrypt the correct record, expecting success 3614 /* Restore correct pre-encryption record */ 3644 * (Start the loop with correct padding, just to double-check that record 3645 * saving did work, and that we're overwriting the correct bytes.) 3651 /* Restore correct pre-encryption record */
|
D | test_suite_rsa.function | 634 data_t * result_str, int correct ) 653 …BEDTLS_RSA_PUBLIC, MBEDTLS_MD_NONE, hash_result->len, hash_result->x, result_str->x ) == correct ); 677 if( correct == 0 )
|
D | test_suite_psa_crypto_se_driver_hal.function | 185 /* We're supposed to return a key size. Return one that's correct for 1082 /* Test that the key is reported with the correct attributes,
|
D | test_suite_ecp.function | 769 * Store correct result before we touch N
|
D | test_suite_x509parse.data | 2079 X509 CRL ASN1 (TBSCertList, version correct, alg missing) 2082 X509 CRL ASN1 (TBSCertList, alg correct, incorrect version) 2085 X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown) 2091 X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing) 2099 X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing) 2103 X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing)
|
D | test_suite_cipher.function | 1379 /* authentic message: is the plaintext correct? */
|
D | test_suite_psa_crypto.function | 2660 /* Compare with correct hash */ 3207 /* Test the correct MAC. */ 4333 /* Use the library to verify that the signature is correct. */
|
D | test_suite_psa_crypto.data | 1907 PSA verify: ECDSA SECP256R1, wrong signature size (correct but ASN1-encoded) 1911 PSA verify: ECDSA SECP256R1, wrong signature of correct size
|
/openthread-2.7.6/third_party/mbedtls/repo/library/ |
D | ssl_msg.c | 1288 size_t padlen = 0, correct = 1; in mbedtls_ssl_decrypt_buf() local 1619 correct &= mask; in mbedtls_ssl_decrypt_buf() 1637 correct &= mask; in mbedtls_ssl_decrypt_buf() 1660 correct = 0; in mbedtls_ssl_decrypt_buf() 1695 correct &= mbedtls_ssl_cf_bool_eq( pad_count, padlen ); in mbedtls_ssl_decrypt_buf() 1698 if( padlen > 0 && correct == 0 ) in mbedtls_ssl_decrypt_buf() 1701 padlen &= mbedtls_ssl_cf_mask_from_bit( correct ); in mbedtls_ssl_decrypt_buf() 1819 correct = 0; in mbedtls_ssl_decrypt_buf() 1827 if( correct == 0 ) in mbedtls_ssl_decrypt_buf()
|
/openthread-2.7.6/third_party/nlbuild-autotools/repo/tools/packages/make/make.patches/ |
D | make-00.patch | 224 keep the COMMANDS_RECURSE setting. Even this isn't 100% correct; we are 234 be ignored. Remove it now so the output is correct. */
|
/openthread-2.7.6/third_party/nlbuild-autotools/repo/ |
D | CHANGES | 190 * Specify the correct m4 URL.
|
/openthread-2.7.6/third_party/mbedtls/repo/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 44 …n a test that checks the outputs if the only realistic way to obtain the correct outputs is to sta…
|
D | invasive-testing.md | 111 …to test resilience: if the system is reset during an operation, does it restart in a correct state?
|
/openthread-2.7.6/third_party/mbedtls/repo/ |
D | CONTRIBUTING.md | 46 1. All bug fixes that correct a defect that is also present in an LTS branch must be backported to …
|
D | ChangeLog | 760 incoming record with the correct connection data even after the peer has 1528 with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct. 1543 * Log correct number of ciphersuites used in Client Hello message. #918 1741 structure. Do not assume that zeroizing a context is a correct way to 3396 * Server not always sending correct CertificateRequest message 3575 * Fixed generation of DHM parameters to correct length (found by Ruslan 3960 serial number, setup correct server port in the ssl client example
|
/openthread-2.7.6/third_party/nlbuild-autotools/repo/third_party/autoconf/ |
D | config.guess | 686 true for CPU_PA_RISC1_0. CPU_IS_PA_RISC returns correct
|
/openthread-2.7.6/third_party/mbedtls/repo/docs/proposed/ |
D | psa-driver-interface.md | 217 …l for drivers of secure elements that verify a MAC without revealing the correct MAC. Although tra… 353 …port_key"` entry point must set the `bits` input-output parameter to the correct key size. The sem…
|
/openthread-2.7.6/third_party/mbedtls/repo/doxygen/ |
D | mbedtls.doxyfile | 1464 # would be unable to find the correct page. The default is NO.
|
/openthread-2.7.6/third_party/nlbuild-autotools/repo/examples/ |
D | Doxyfile.in | 1836 # them the man command would be unable to find the correct page.
|
/openthread-2.7.6/doc/ |
D | Doxyfile.in | 1849 # them the man command would be unable to find the correct page.
|