/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_op_fail.generated.data | 3 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): invalid 139 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,1): invalid 143 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CHACHA20_POLY1305,1): invalid 279 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CHACHA20_POLY1305,1): invalid 283 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(GCM,1): invalid 419 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(GCM,1): invalid 423 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,4): invalid 559 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,4): invalid 563 PSA hash AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,13): invalid 699 PSA key_derivation AEAD_WITH_AT_LEAST_THIS_LENGTH_TAG(CCM,13): invalid [all …]
|
D | test_suite_psa_crypto_slot_management.data | 111 Open failure: invalid identifier (0) 115 Open failure: invalid identifier (random seed UID) 119 Open failure: invalid identifier (reserved range) 123 Open failure: invalid identifier (implementation range) 135 Create failure: invalid location for a persistent key 139 Create failure: invalid location for a volatile key 143 Create failure: invalid key id (0) for a persistent key 147 Create failure: invalid key id (1) for a volatile key 150 Create failure: invalid key id (random seed UID) 154 Create failure: invalid key id (reserved range) [all …]
|
D | test_suite_cipher.misc.data | 1 CIPHER - Conditional invalid parameter checks 4 CIPHER - Unconditional invalid parameter checks
|
D | test_suite_psa_crypto_pake.data | 5 PSA PAKE: invalid alg 9 PSA PAKE: invalid primitive type 13 PSA PAKE: invalid primitive family 17 PSA PAKE: invalid primitive bits 21 PSA PAKE: invalid hash 49 PSA PAKE: set invalid user 53 PSA PAKE: set invalid peer 73 PSA PAKE: invalid input 81 PSA PAKE: invalid first input step 93 PSA PAKE: invalid output [all …]
|
D | test_suite_psa_crypto_se_driver_hal.data | 9 Register SE driver: invalid location (0) 12 Register SE driver: invalid location (local) 15 Register SE driver: invalid version (ancient) 18 Register SE driver: invalid version (future) 151 Key registration: invalid lifetime (volatile internal storage) 154 Key registration: invalid lifetime (internal storage) 157 Key registration: invalid lifetime (no registered driver)
|
D | test_suite_lms.data | 189 LMS negative test (invalid lms type) #1 191 # LMOTS type (0x4) but an invalid LMS type (0x5), and should fail. 194 LMS negative test (invalid lms type) #2 196 # LMOTS type (0x4) but an invalid LMS type (0x7), and should fail. 199 LMS negative test (invalid lm_ots type) #1 201 # invalid LMOTS type (0x3) but a valid LMS type (0x6), and should fail. 204 LMS negative test (invalid lm_ots type) #2 206 # invalid LMOTS type (0x5) but a valid LMS type (0x6), and should fail. 209 LMS negative test (invalid leaf ID) 211 # the leaf ID is 1024, which is invalid for MBEDTLS_LMS_SHA256_M32_H10. This [all …]
|
D | test_suite_psa_crypto_persistent_key.data | 60 Persistent key import (RSA) invalid key id (VENDOR_MIN) 64 Persistent key import (RSA) invalid key id (VOLATILE_MIN) 68 Persistent key import (RSA) invalid key id (VENDOR_MAX) 128 Destroy invalid id: 0 134 Destroy invalid id: 0xffffffff
|
D | test_suite_pem.data | 28 PEM read (DES-EDE3-CBC + invalid iv) 32 PEM read (DES-CBC + invalid iv) 36 PEM read (AES-128-CBC + invalid iv) 63 # The text "hello world" together with some invalid padding data is encoded 70 PEM read (AES-128-CBC, invalid padding data)
|
D | test_suite_lmots.data | 95 LMOTS negative test (invalid type) #1 97 # sets an invalid LMOTS type (0x5), and is expected to fail to 101 LMOTS negative test (invalid type) #2 103 # sets an invalid LMOTS type (0x3), and is expected to fail to 129 LMOTS key import invalid type test #1 134 LMOTS key import invalid type test #2
|
D | test_suite_ecdsa.data | 365 ECDSA verify invalid pub key (not on curve), zero bytes of data 369 ECDSA verify invalid pub key (not on curve), one byte of data 373 ECDSA verify invalid pub key (not on curve), r=1, s=1 377 ECDSA verify invalid pub key (also not on curve), r=1, s=1 381 ECDSA verify invalid pub key (not on curve), r=12345, s=1 385 ECDSA verify invalid pub key (not on curve), r=1, s=12345 389 ECDSA verify valid pub key, invalid sig (r=0), 0 bytes of data 393 ECDSA verify valid pub key, invalid sig (r=0), 1 byte of data 397 ECDSA verify valid pub key, invalid sig (r>n-1), 32 bytes of data
|
D | test_suite_oid.data | 4 OID get certificate policy invalid oid 31 OID get Ext Key Usage invalid oid 55 OID get x509 extension - invalid oid 105 OID hash id - invalid oid
|
D | test_suite_pk.data | 1 PK invalid parameters 69 PK can do ext: ECDSA(ANY)/NONE, invalid check STREAM_CIPHER 73 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256) 77 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT 81 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PSS(SHA256) 85 PK can do ext: ECDSA(ANY)/NONE, invalid check ECDH 105 PK can do ext: ECDSA(SHA256)/NONE, invalid check ECDSA(ANY) 109 PK can do ext: ECDSA(SHA1)/NONE, invalid check ECDSA(SHA256) 113 PK can do ext: ECDH/NONE, invalid check STREAM_CIPHER 117 PK can do ext: ECDH/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256) [all …]
|
D | test_suite_x509parse.data | 237 X509 CRT information Parsing IP (invalid data) 978 X509 CRT verification #86 (Not yet valid CA and invalid CA) 980 x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-future-invalid.crt":"data_files/crl-e… 982 X509 CRT verification #87 (Expired CA and invalid CA) 984 x509_verify:"data_files/server5.crt":"data_files/test-ca2_cat-past-invalid.crt":"data_files/crl-ec-… 1010 X509 CRT verification #93 (Suite B invalid, EC cert, RSA CA) 1014 X509 CRT verification #94 (Suite B invalid, RSA cert, EC CA) 1097 X509 CRT parse CN: IPv4 invalid ? char 1100 X509 CRT parse CN: IPv4 invalid - char 1103 X509 CRT parse CN: IPv4 invalid + char [all …]
|
D | test_suite_psa_crypto_op_fail.misc.data | 6 PSA hash: invalid algorithm
|
D | test_suite_psa_crypto.data | 543 PSA import/export FFDH RFC7919 2040 key pair: import invalid key length 547 PSA import/export FFDH RFC7919 2040 public key: import invalid key length 551 PSA import/export FFDH RFC7919 3064 key pair: import invalid key length 555 PSA import/export FFDH RFC7919 3064 public key: import invalid key length 559 PSA import/export FFDH RFC7919 4088 key pair: import invalid key length 563 PSA import/export FFDH RFC7919 4088 public key: import invalid key length 567 PSA import/export FFDH RFC7919 6136 key pair: import invalid key length 571 PSA import/export FFDH RFC7919 6136 public key: import invalid key length 575 PSA import/export FFDH RFC7919 8184 key pair: import invalid key length 579 PSA import/export FFDH RFC7919 8184 public key: import invalid key length [all …]
|
D | test_suite_bignum_mod_raw.data | 137 Test mbedtls_mpi_mod_raw_io #22 (reading with invalid endianness) 140 Test mbedtls_mpi_mod_raw_io #22 (writing with invalid endianness)
|
D | test_suite_aria.function | 37 42 /* invalid mode */, 47 42, /* invalid mode */
|
D | test_suite_psa_crypto_se_driver_hal_mocks.data | 7 SE init mock test: invalid location (0)
|
D | test_suite_ecdsa.function | 264 /* try verification with invalid length */ 270 /* try invalid sequence tag */ 333 /* try verification with invalid length */ 339 /* try invalid sequence tag */
|
D | test_suite_ecp.data | 1 ECP invalid params 224 ECP read binary #1 (zero, invalid ilen) 228 ECP read binary #2 (zero, invalid first byte) 236 ECP read binary #4 (non-zero, invalid ilen, too short) 240 ECP read binary #4a (non-zero, invalid ilen, too short) 244 ECP read binary #4b (non-zero, invalid ilen, too short) 248 ECP read binary #4c (non-zero, invalid ilen, too long) 252 ECP read binary #4d (non-zero, invalid ilen, too long) 256 ECP read binary #4e (non-zero, invalid ilen, too long) 260 ECP read binary #5 (non-zero, invalid first byte) [all …]
|
D | test_suite_block_cipher.function | 26 void invalid()
|
/openthread-latest/third_party/mbedtls/repo/tests/data_files/dir4/ |
D | Readme | 3 1. zero pathlen constraint on an intermediate CA (invalid) 8 2. zero pathlen constraint on the root CA (invalid) 13 3. nonzero pathlen constraint on the root CA (invalid) 18 4. nonzero pathlen constraint on an intermediate CA (invalid)
|
/openthread-latest/third_party/mbedtls/repo/tests/data_files/base64/ |
D | def_b64_ff.bin | 2 // character. Note that this byte is invalid UTF-8, making this 3 // entire file invalid UTF-8. Use care when editing.
|
/openthread-latest/third_party/mbedtls/repo/ |
D | .pylintrc | 7 # [invalid-name] 20 # [invalid-name] 25 # [invalid-name] 33 # [invalid-name]
|
/openthread-latest/src/posix/platform/ |
D | multicast_routing.cpp | 550 MulticastForwardingCache *invalid = nullptr; in SaveMulticastForwardingCache() local 568 else if (invalid == nullptr) in SaveMulticastForwardingCache() 570 invalid = &mfc; in SaveMulticastForwardingCache() 574 if (invalid != nullptr) in SaveMulticastForwardingCache() 576 invalid->Set(aSrcAddr, aGroupAddr, aIif, aOif); in SaveMulticastForwardingCache()
|