Searched refs:read (Results 1 – 25 of 109) sorted by relevance
12345
3 read lifetime: (DEFAULT,LOCAL_STORAGE)7 read lifetime: (READ_ONLY,LOCAL_STORAGE)11 read lifetime: (2,LOCAL_STORAGE)15 read lifetime: (254,LOCAL_STORAGE)19 read lifetime: PERSISTENT23 read usage without implication: 027 read usage without implication: COPY31 read usage without implication: DECRYPT35 read usage without implication: DERIVE39 read usage without implication: ENCRYPT[all …]
63 /* Make a 16/32/64 byte read from the aligned location, and copy to expected */256 uint64_t read = 0;260 read = MBEDTLS_GET_UINT16_BE(x, offset);263 read = MBEDTLS_GET_UINT24_BE(x, offset);266 read = MBEDTLS_GET_UINT32_BE(x, offset);269 read = MBEDTLS_GET_UINT64_BE(x, offset);275 read = MBEDTLS_GET_UINT16_LE(x, offset);278 read = MBEDTLS_GET_UINT24_LE(x, offset);281 read = MBEDTLS_GET_UINT32_LE(x, offset);284 read = MBEDTLS_GET_UINT64_LE(x, offset);[all …]
22 PEM read (unencrypted, valid)25 PEM read (unencrypted, empty content)28 PEM read (DES-EDE3-CBC + invalid iv)32 PEM read (DES-CBC + invalid iv)36 PEM read (AES-128-CBC + invalid iv)40 PEM read (unknown encryption algorithm)44 PEM read (malformed PEM DES-CBC)48 PEM read (malformed PEM DES-EDE3-CBC)52 PEM read (malformed PEM AES-128-CBC)58 # length read from the decoded ASN.1 data (i.e. extra padding, if any, is ignored).[all …]
94 int read = 0xdeadbeef;95 TEST_EQUAL(mbedtls_asn1_get_bool(&data.p, data.end, &read), 0);96 TEST_EQUAL(val, read);122 int read = 0xdeadbeef;123 TEST_EQUAL(mbedtls_asn1_get_int(&data.p, data.end, &read), 0);124 TEST_EQUAL(val, read);151 int read = 0xdeadbeef;152 TEST_EQUAL(mbedtls_asn1_get_enum(&data.p, data.end, &read), 0);153 TEST_EQUAL(val, read);167 mbedtls_mpi mpi, read;[all …]
224 ECP read binary #1 (zero, invalid ilen)228 ECP read binary #2 (zero, invalid first byte)232 ECP read binary #3 (zero, OK)236 ECP read binary #4 (non-zero, invalid ilen, too short)240 ECP read binary #4a (non-zero, invalid ilen, too short)244 ECP read binary #4b (non-zero, invalid ilen, too short)248 ECP read binary #4c (non-zero, invalid ilen, too long)252 ECP read binary #4d (non-zero, invalid ilen, too long)256 ECP read binary #4e (non-zero, invalid ilen, too long)260 ECP read binary #5 (non-zero, invalid first byte)[all …]
53 ECDSA write-read hash zero #157 ECDSA write-read hash zero #261 ECDSA write-read hash zero #365 ECDSA write-read hash zero #469 ECDSA write-read hash zero #573 ECDSA write-read random #177 ECDSA write-read random #281 ECDSA write-read random #385 ECDSA write-read random #489 ECDSA write-read random #5[all …]
195 fc, seq = struct.unpack("<HB", data.read(3))236 dest_pan_id = struct.unpack("<H", data.read(2))[0]257 src_pan_id = struct.unpack("<H", data.read(2))[0]292 header_ie = struct.unpack("<H", data.read(2))[0]301 header_ie_content = data.read(header_ie_length)311 payload = data.read(payload_len)316 mhr_bytes = data.read(mhr_len)319 aux_sec_hdr_bytes = data.read(aux_sec_header_len)325 extra_open_fields += data.read(header_ie_end - header_ie_start)379 return MacAddress(data.read(2), MacAddressType.SHORT, big_endian=False)[all …]
219 ext_header_length = ord(data.read(1))221 ext_header_data = data.read(ext_header_length)243 return ord(data.read(1))256 nhc = LowpanNHC.from_bytes(bytearray(data.read(1)))278 src_port = struct.unpack(">H", data.read(2))[0]279 dst_port = struct.unpack(">H", data.read(2))[0]282 src_port = struct.unpack(">H", data.read(2))[0]283 dst_port = 0xf000 + ord(data.read(1))286 src_port = 0xf000 + ord(data.read(1))287 dst_port = struct.unpack(">H", data.read(2))[0][all …]
135 address = struct.unpack(">H", data.read(2))[0]177 mode = ord(data.read(1))206 timeout = struct.unpack(">I", data.read(4))[0]231 challenge = data.read()256 response = data.read()281 frame_counter = struct.unpack(">I", data.read(4))[0]306 frame_counter = struct.unpack(">I", data.read(4))[0]341 lqrd = ord(data.read(1))385 id_sequence = ord(data.read(1))386 router_id_mask = struct.unpack(">Q", data.read(8))[0][all …]
67 data_byte = ord(data.read(1))72 length = ord(data.read(1))73 value = data.read(length)111 border_router_16 = struct.unpack(">H", data.read(2))[0]113 data_byte = ord(data.read(1))223 domain_id = ord(data.read(1))225 prefix_length = ord(data.read(1))227 prefix = bytearray(data.read(self._bits_to_bytes(prefix_length)))229 sub_tlvs = self._sub_tlvs_factory.parse(io.BytesIO(data.read()), message_info)309 border_router_16 = struct.unpack(">H", data.read(2))[0][all …]
319 b = bytearray(data.read(4))325 payload_length = struct.unpack(">H", data.read(2))[0]326 next_header = ord(data.read(1))327 hop_limit = ord(data.read(1))328 src_addr = bytearray(data.read(16))329 dst_addr = bytearray(data.read(16))511 src_port = struct.unpack(">H", data.read(2))[0]512 dst_port = struct.unpack(">H", data.read(2))[0]513 payload_length = struct.unpack(">H", data.read(2))[0]514 checksum = struct.unpack(">H", data.read(2))[0][all …]
109 content_type = ContentType(struct.unpack(">B", data.read(1))[0])111 epoch = struct.unpack(">H", data.read(2))[0]112 sequence_number = struct.unpack(">Q", b'\x00\x00' + data.read(6))[0]113 length = struct.unpack(">H", data.read(2))[0]114 fragment = bytes(data.read(length))166 handshake_type = HandshakeType(struct.unpack(">B", data.read(1))[0])167 length = struct.unpack(">I", b'\x00' + data.read(3))[0]168 message_seq = struct.unpack(">H", data.read(2))[0]169 fragment_offset = struct.unpack(">I", b'\x00' + bytes(data.read(3)))[0]170 fragment_length = struct.unpack(">I", b'\x00' + bytes(data.read(3)))[0][all …]
82 eid = bytearray(data.read(16))107 mac_address = bytearray(data.read(8))132 rloc16 = struct.unpack(">H", data.read(2))[0]157 ml_eid = bytearray(data.read(8))182 status = StatusValues(ord(data.read(1)))207 seconds = struct.unpack(">L", data.read(4))[0]237 id_sequence = ord(data.read(1))238 router_id_mask = struct.unpack(">Q", data.read(8))[0]263 options = [opt for opt in bytearray(data.read())]326 data = bytes(data.read())
85 return ord(data.read(1)) + 1387 data.read(1)88 return ord(data.read(1)) + 26994 initial_byte = ord(data.read(1))137 value = data.read(option_header.length)393 initial_byte = ord(data.read(1))404 code = CoapCode(ord(data.read(1)))405 message_id = struct.unpack(">H", data.read(2))[0]406 token = data.read(token_length)421 data.read(),
136 data_tp = struct.unpack('>BH', data.read(3))175 extended_panid = struct.unpack(">Q", data.read(8))[0]200 network_name = struct.unpack("{}s".format(10), data.read(len))[0]282 bloom_filter = data.read(message_info.length)311 border_agent_locator = struct.unpack(">H", data.read(2))[0]369 session_id = struct.unpack(">H", data.read(2))[0]434 udp_port = struct.unpack(">H", data.read(2))[0]458 state = ord(data.read(1))495 udp_port = struct.unpack(">H", data.read(2))[0]690 stack_vendor_oui = struct.unpack(">H", data.read(2))[0][all …]
68 _type = ord(data.read(1))70 length = ord(data.read(1))71 value = data.read(length)
81 addresses.append(ipaddress.IPv6Address(data.read(16)))146 return MacCounters(struct.unpack('>9I', data.read(4 * 9)))170 return BatteryLevel(struct.unpack('>B', data.read(1))[0])194 return SupplyVoltage(struct.unpack('>H', data.read(2))[0])248 timeout_and_id = struct.unpack('>H', data.read(2))[0]330 return MaxChildTimeout(struct.unpack('>I', data.read(4))[0])
291 self.assertEqual(source_eui64, nonce_bytes.read(8))292 self.assertEqual(struct.pack(">L", frame_counter), nonce_bytes.read(4))293 self.assertEqual(security_level, ord(nonce_bytes.read(1)))315 self.assertEqual(source_address.packed, authenticated_data_bytes.read(16))316 self.assertEqual(destination_address.packed, authenticated_data_bytes.read(16))317 self.assertEqual(auxiliary_security_header_bytes, authenticated_data_bytes.read(10))
366 security_control_bytes = bytearray(data.read(self._SECURITY_CONTROL_LENGTH))367 frame_counter_bytes = bytearray(data.read(self._FRAME_COUNTER_LENGTH))373 key_id_bytes = bytearray(data.read(key_id_length))
84 rval = read(mSettingsFd, &key, sizeof(key)); in Init()87 rval = read(mSettingsFd, &length, sizeof(length)); in Init()131 rval = read(mSettingsFd, &key, sizeof(key)); in Get()134 rval = read(mSettingsFd, &length, sizeof(length)); in Get()149 … VerifyOrExit(read(mSettingsFd, aValue, readLength) == readLength, error = OT_ERROR_PARSE); in Get()245 rval = read(mSettingsFd, &key, sizeof(key)); in Delete()248 rval = read(mSettingsFd, &length, sizeof(length)); in Delete()334 ssize_t rval = read(mSettingsFd, buffer, count); in SwapWrite()
91 data = self.outgoing.read()99 data = self.outgoing.read()118 encode = self.outgoing.read(4096)134 decode = self.ssl_object.read(4096)
47 def read(cls, member in PcapReader76 pkts = PcapReader.read("../../../../merged.pcap")
37 #### Read-read inconsistency39 If an input argument is in shared memory, there is a risk of a **read-read inconsistency**:45 …eld in the shared memory between the two reads and thus cause a buffer overread on the second read.52 #### Write-read inconsistency54 If an output argument is in shared memory, there is a risk of a **write-read inconsistency**:74 …ation, which re-shares it with the crypto service. A malicious client can read another client (the…76 #### Write-read feedback102 …memory cannot result in a security violation other than [write-read feedback](#write-read-feedback…104 * Never read the same input twice at the same index.105 * Never read back from an output.[all …]
67 data = f.read(12)70 data = f.read(12)
32 long_description = fh.read()