Home
last modified time | relevance | path

Searched refs:invalid (Results 1 – 25 of 63) sorted by relevance

123

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_op_fail.generated.data3 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): invalid
139 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): invalid
143 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CHACHA20_POLY1305,1): invalid
279 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CHACHA20_POLY1305,1): invalid
283 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(GCM,1): invalid
419 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(GCM,1): invalid
423 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,4): invalid
559 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,4): invalid
563 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,13): invalid
699 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,13): invalid
[all …]
Dtest_suite_psa_crypto_slot_management.data111 Open failure: invalid identifier (0)
115 Open failure: invalid identifier (random seed UID)
119 Open failure: invalid identifier (reserved range)
123 Open failure: invalid identifier (implementation range)
135 Create failure: invalid location for a persistent key
139 Create failure: invalid location for a volatile key
143 Create failure: invalid key id (0) for a persistent key
147 Create failure: invalid key id (1) for a volatile key
150 Create failure: invalid key id (random seed UID)
154 Create failure: invalid key id (reserved range)
[all …]
Dtest_suite_cipher.misc.data1 CIPHER - Conditional invalid parameter checks
4 CIPHER - Unconditional invalid parameter checks
Dtest_suite_psa_crypto_pake.data5 PSA PAKE: invalid alg
9 PSA PAKE: invalid primitive type
13 PSA PAKE: invalid primitive family
17 PSA PAKE: invalid primitive bits
21 PSA PAKE: invalid hash
49 PSA PAKE: set invalid user
53 PSA PAKE: set invalid peer
73 PSA PAKE: invalid input
81 PSA PAKE: invalid first input step
93 PSA PAKE: invalid output
[all …]
Dtest_suite_psa_crypto_se_driver_hal.data9 Register SE driver: invalid location (0)
12 Register SE driver: invalid location (local)
15 Register SE driver: invalid version (ancient)
18 Register SE driver: invalid version (future)
151 Key registration: invalid lifetime (volatile internal storage)
154 Key registration: invalid lifetime (internal storage)
157 Key registration: invalid lifetime (no registered driver)
Dtest_suite_lms.data189 LMS negative test (invalid lms type) #1
191 # LMOTS type (0x4) but an invalid LMS type (0x5), and should fail.
194 LMS negative test (invalid lms type) #2
196 # LMOTS type (0x4) but an invalid LMS type (0x7), and should fail.
199 LMS negative test (invalid lm_ots type) #1
201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail.
204 LMS negative test (invalid lm_ots type) #2
206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail.
209 LMS negative test (invalid leaf ID)
211 # the leaf ID is 1024, which is invalid for MBEDTLS_LMS_SHA256_M32_H10. This
[all …]
Dtest_suite_psa_crypto_persistent_key.data60 Persistent key import (RSA) invalid key id (VENDOR_MIN)
64 Persistent key import (RSA) invalid key id (VOLATILE_MIN)
68 Persistent key import (RSA) invalid key id (VENDOR_MAX)
128 Destroy invalid id: 0
134 Destroy invalid id: 0xffffffff
Dtest_suite_pem.data28 PEM read (DES-EDE3-CBC + invalid iv)
32 PEM read (DES-CBC + invalid iv)
36 PEM read (AES-128-CBC + invalid iv)
63 # The text "hello world" together with some invalid padding data is encoded
70 PEM read (AES-128-CBC, invalid padding data)
Dtest_suite_lmots.data95 LMOTS negative test (invalid type) #1
97 # sets an invalid LMOTS type (0x5), and is expected to fail to
101 LMOTS negative test (invalid type) #2
103 # sets an invalid LMOTS type (0x3), and is expected to fail to
129 LMOTS key import invalid type test #1
134 LMOTS key import invalid type test #2
Dtest_suite_ecdsa.data365 ECDSA verify invalid pub key (not on curve), zero bytes of data
369 ECDSA verify invalid pub key (not on curve), one byte of data
373 ECDSA verify invalid pub key (not on curve), r=1, s=1
377 ECDSA verify invalid pub key (also not on curve), r=1, s=1
381 ECDSA verify invalid pub key (not on curve), r=12345, s=1
385 ECDSA verify invalid pub key (not on curve), r=1, s=12345
389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data
393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data
397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data
Dtest_suite_oid.data4 OID get certificate policy invalid oid
31 OID get Ext Key Usage invalid oid
55 OID get x509 extension - invalid oid
105 OID hash id - invalid oid
Dtest_suite_pk.data1 PK invalid parameters
69 PK can do ext: ECDSA(ANY)/NONE, invalid check STREAM_CIPHER
73 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
77 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT
81 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PSS(SHA256)
85 PK can do ext: ECDSA(ANY)/NONE, invalid check ECDH
105 PK can do ext: ECDSA(SHA256)/NONE, invalid check ECDSA(ANY)
109 PK can do ext: ECDSA(SHA1)/NONE, invalid check ECDSA(SHA256)
113 PK can do ext: ECDH/NONE, invalid check STREAM_CIPHER
117 PK can do ext: ECDH/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
[all …]
Dtest_suite_x509parse.data237 X509 CRT information Parsing IP (invalid data)
978 X509 CRT verification #86 (Not yet valid CA and invalid CA)
980 x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-invalid.crt":"data_files/crl-e…
982 X509 CRT verification #87 (Expired CA and invalid CA)
984 x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-invalid.crt":"data_files/crl-ec-…
1010 X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA)
1014 X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA)
1097 X509 CRT parse CN: IPv4 invalid ? char
1100 X509 CRT parse CN: IPv4 invalid - char
1103 X509 CRT parse CN: IPv4 invalid + char
[all …]
Dtest_suite_psa_crypto_op_fail.misc.data6 PSA hash: invalid algorithm
Dtest_suite_psa_crypto.data543 PSA import/export FFDH RFC7919 2040 key pair: import invalid key length
547 PSA import/export FFDH RFC7919 2040 public key: import invalid key length
551 PSA import/export FFDH RFC7919 3064 key pair: import invalid key length
555 PSA import/export FFDH RFC7919 3064 public key: import invalid key length
559 PSA import/export FFDH RFC7919 4088 key pair: import invalid key length
563 PSA import/export FFDH RFC7919 4088 public key: import invalid key length
567 PSA import/export FFDH RFC7919 6136 key pair: import invalid key length
571 PSA import/export FFDH RFC7919 6136 public key: import invalid key length
575 PSA import/export FFDH RFC7919 8184 key pair: import invalid key length
579 PSA import/export FFDH RFC7919 8184 public key: import invalid key length
[all …]
Dtest_suite_bignum_mod_raw.data137 Test mbedtls_mpi_mod_raw_io #22 (reading with invalid endianness)
140 Test mbedtls_mpi_mod_raw_io #22 (writing with invalid endianness)
Dtest_suite_aria.function37 42 /* invalid mode */,
47 42, /* invalid mode */
Dtest_suite_psa_crypto_se_driver_hal_mocks.data7 SE init mock test: invalid location (0)
Dtest_suite_ecdsa.function264 /* try verification with invalid length */
270 /* try invalid sequence tag */
333 /* try verification with invalid length */
339 /* try invalid sequence tag */
Dtest_suite_ecp.data1 ECP invalid params
224 ECP read binary #1 (zero, invalid ilen)
228 ECP read binary #2 (zero, invalid first byte)
236 ECP read binary #4 (non-zero, invalid ilen, too short)
240 ECP read binary #4a (non-zero, invalid ilen, too short)
244 ECP read binary #4b (non-zero, invalid ilen, too short)
248 ECP read binary #4c (non-zero, invalid ilen, too long)
252 ECP read binary #4d (non-zero, invalid ilen, too long)
256 ECP read binary #4e (non-zero, invalid ilen, too long)
260 ECP read binary #5 (non-zero, invalid first byte)
[all …]
Dtest_suite_block_cipher.function26 void invalid()
/openthread-latest/third_party/mbedtls/repo/tests/data_files/dir4/
DReadme3 1. zero pathlen constraint on an intermediate CA (invalid)
8 2. zero pathlen constraint on the root CA (invalid)
13 3. nonzero pathlen constraint on the root CA (invalid)
18 4. nonzero pathlen constraint on an intermediate CA (invalid)
/openthread-latest/third_party/mbedtls/repo/tests/data_files/base64/
Ddef_b64_ff.bin2 // character. Note that this byte is invalid UTF-8, making this
3 // entire file invalid UTF-8. Use care when editing.
/openthread-latest/third_party/mbedtls/repo/
D.pylintrc7 # [invalid-name]
20 # [invalid-name]
25 # [invalid-name]
33 # [invalid-name]
/openthread-latest/src/posix/platform/
Dmulticast_routing.cpp550 MulticastForwardingCache *invalid = nullptr; in SaveMulticastForwardingCache() local
568 else if (invalid == nullptr) in SaveMulticastForwardingCache()
570 invalid = &mfc; in SaveMulticastForwardingCache()
574 if (invalid != nullptr) in SaveMulticastForwardingCache()
576 invalid->Set(aSrcAddr, aGroupAddr, aIif, aOif); in SaveMulticastForwardingCache()

123