Home
last modified time | relevance | path

Searched refs:correct (Results 1 – 22 of 22) sorted by relevance

/openthread-2.7.6/third_party/mbedtls/repo/tests/suites/
Dtest_suite_cipher.padding.data64 Check PKCS padding #1 (correct)
68 Check PKCS padding #2 (correct)
72 Check PKCS padding #3 (correct)
76 Check PKCS padding #4 (correct)
156 Check one and zeros padding #1 (correct)
160 Check one and zeros padding #2 (correct)
164 Check one and zeros padding #3 (correct)
168 Check one and zeros padding #4 (correct)
172 Check one and zeros padding #5 (correct)
188 Check zeros and len padding #1 (correct)
[all …]
Dtest_suite_pkparse.data1093 Key ASN1 (RSAPrivateKey, correct version, incorrect tag)
1097 Key ASN1 (RSAPrivateKey, correct format+values, minimal modulus size (128 bit))
1101 Key ASN1 (RSAPrivateKey, correct format, modulus too small (127 bit))
1105 Key ASN1 (RSAPrivateKey, correct format, modulus even)
1109 Key ASN1 (RSAPrivateKey, correct format, d == 0)
1113 Key ASN1 (RSAPrivateKey, correct format, d == p == q == 0)
1117 Key ASN1 (RSAPrivateKey, correct values, trailing garbage)
1121 Key ASN1 (RSAPrivateKey, correct values, n wrong tag)
1125 Key ASN1 (RSAPrivateKey, correct values, e wrong tag)
1129 Key ASN1 (RSAPrivateKey, correct values, d wrong tag)
[all …]
Dtest_suite_ssl.function450 * the correct value allows for simulation of MTU, sanity testing the mock
1525 * message was sent in the correct number of fragments.
2123 * correct and works as expected.
2240 * correct and works as expected on unconnected sockets.
3589 /* Save correct pre-encryption record */
3595 * Encrypt and decrypt the correct record, expecting success
3614 /* Restore correct pre-encryption record */
3644 * (Start the loop with correct padding, just to double-check that record
3645 * saving did work, and that we're overwriting the correct bytes.)
3651 /* Restore correct pre-encryption record */
Dtest_suite_rsa.function634 data_t * result_str, int correct )
653 …BEDTLS_RSA_PUBLIC, MBEDTLS_MD_NONE, hash_result->len, hash_result->x, result_str->x ) == correct );
677 if( correct == 0 )
Dtest_suite_psa_crypto_se_driver_hal.function185 /* We're supposed to return a key size. Return one that's correct for
1082 /* Test that the key is reported with the correct attributes,
Dtest_suite_ecp.function769 * Store correct result before we touch N
Dtest_suite_x509parse.data2079 X509 CRL ASN1 (TBSCertList, version correct, alg missing)
2082 X509 CRL ASN1 (TBSCertList, alg correct, incorrect version)
2085 X509 CRL ASN1 (TBSCertList, correct version, sig_oid1 unknown)
2091 X509 CRL ASN1 (TBSCertList, sig_oid1 correct, issuer missing)
2099 X509 CRL ASN1 (TBSCertList, correct issuer, thisUpdate missing)
2103 X509 CRL ASN1 (TBSCertList, correct thisUpdate, nextUpdate missing, entries length missing)
Dtest_suite_cipher.function1379 /* authentic message: is the plaintext correct? */
Dtest_suite_psa_crypto.function2660 /* Compare with correct hash */
3207 /* Test the correct MAC. */
4333 /* Use the library to verify that the signature is correct. */
Dtest_suite_psa_crypto.data1907 PSA verify: ECDSA SECP256R1, wrong signature size (correct but ASN1-encoded)
1911 PSA verify: ECDSA SECP256R1, wrong signature of correct size
/openthread-2.7.6/third_party/mbedtls/repo/library/
Dssl_msg.c1288 size_t padlen = 0, correct = 1; in mbedtls_ssl_decrypt_buf() local
1619 correct &= mask; in mbedtls_ssl_decrypt_buf()
1637 correct &= mask; in mbedtls_ssl_decrypt_buf()
1660 correct = 0; in mbedtls_ssl_decrypt_buf()
1695 correct &= mbedtls_ssl_cf_bool_eq( pad_count, padlen ); in mbedtls_ssl_decrypt_buf()
1698 if( padlen > 0 && correct == 0 ) in mbedtls_ssl_decrypt_buf()
1701 padlen &= mbedtls_ssl_cf_mask_from_bit( correct ); in mbedtls_ssl_decrypt_buf()
1819 correct = 0; in mbedtls_ssl_decrypt_buf()
1827 if( correct == 0 ) in mbedtls_ssl_decrypt_buf()
/openthread-2.7.6/third_party/nlbuild-autotools/repo/tools/packages/make/make.patches/
Dmake-00.patch224 keep the COMMANDS_RECURSE setting. Even this isn't 100% correct; we are
234 be ignored. Remove it now so the output is correct. */
/openthread-2.7.6/third_party/nlbuild-autotools/repo/
DCHANGES190 * Specify the correct m4 URL.
/openthread-2.7.6/third_party/mbedtls/repo/docs/architecture/testing/
Ddriver-interface-test-strategy.md44 …n a test that checks the outputs if the only realistic way to obtain the correct outputs is to sta…
Dinvasive-testing.md111 …to test resilience: if the system is reset during an operation, does it restart in a correct state?
/openthread-2.7.6/third_party/mbedtls/repo/
DCONTRIBUTING.md46 1. All bug fixes that correct a defect that is also present in an LTS branch must be backported to …
DChangeLog760 incoming record with the correct connection data even after the peer has
1528 with flag MBEDTLS_X509_BADCERT_BAD_PK even when the key type was correct.
1543 * Log correct number of ciphersuites used in Client Hello message. #918
1741 structure. Do not assume that zeroizing a context is a correct way to
3396 * Server not always sending correct CertificateRequest message
3575 * Fixed generation of DHM parameters to correct length (found by Ruslan
3960 serial number, setup correct server port in the ssl client example
/openthread-2.7.6/third_party/nlbuild-autotools/repo/third_party/autoconf/
Dconfig.guess686 true for CPU_PA_RISC1_0. CPU_IS_PA_RISC returns correct
/openthread-2.7.6/third_party/mbedtls/repo/docs/proposed/
Dpsa-driver-interface.md217 …l for drivers of secure elements that verify a MAC without revealing the correct MAC. Although tra…
353 …port_key"` entry point must set the `bits` input-output parameter to the correct key size. The sem…
/openthread-2.7.6/third_party/mbedtls/repo/doxygen/
Dmbedtls.doxyfile1464 # would be unable to find the correct page. The default is NO.
/openthread-2.7.6/third_party/nlbuild-autotools/repo/examples/
DDoxyfile.in1836 # them the man command would be unable to find the correct page.
/openthread-2.7.6/doc/
DDoxyfile.in1849 # them the man command would be unable to find the correct page.