Home
last modified time | relevance | path

Searched refs:short (Results 1 – 25 of 41) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_shax.data188 SHA3_224 short #0
192 SHA3_224 short #1
196 SHA3_224 short #2
200 SHA3_224 short #3
204 SHA3_224 short #4
208 SHA3_224 short #5
212 SHA3_224 short #6
216 SHA3_224 short #7
220 SHA3_224 short #8
224 SHA3_224 short #9
[all …]
Dtest_suite_pkcs1_v15.data27 RSAES-V15 Decryption Test Vector Padding too short 7
35 RSAES-V15 Decryption Test Vector Padding too short 5
43 RSAES-V15 Decryption Test Vector Padding too short 0
88 RSAES-V15 decoding: padding too short (0)
91 RSAES-V15 decoding: padding too short (7)
Dtest_suite_bignum_mod.misc.data22 mpi_mod_sub with modulus too long/both inputs too short
34 mpi_mod_sub with first input too short
37 mpi_mod_sub with second input too short
49 mbedtls_mpi_mod_inv non-Mont. form - A too short
64 mbedtls_mpi_mod_inv 32-bit Mont. form - A too short
80 mbedtls_mpi_mod_inv 64-bit Mont. form - A too short
87 mpi_mod_add with modulus too long/both inputs too short
99 mpi_mod_add with first input too short
102 mpi_mod_add with second input too short
Dtest_suite_nist_kw.data39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks)
42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets)
45 NIST KW lengths #8 KW ciphertext too short (3 to 2^54 semiblocks)
48 NIST KW lengths #9 KWP ciphertext too short (2 to 2^29 semiblocks)
60 NIST KW lengths #13 KW wrapping output buffer too short
63 NIST KW lengths #14 KWP wrapping output buffer too short
66 NIST KW lengths #15 KW unwrapping output buffer too short
69 NIST KW lengths #16 KWP unwrapping output buffer too short
Dtest_suite_ecp.data236 ECP read binary #4 (non-zero, invalid ilen, too short)
240 ECP read binary #4a (non-zero, invalid ilen, too short)
244 ECP read binary #4b (non-zero, invalid ilen, too short)
288 ECP read binary #9 (Curve25519, too short)
312 ECP read binary #15 (Curve448, too short)
404 ECP tls read group #1 (record too short)
429 ECP check privkey #1 (short weierstrass, too small)
433 ECP check privkey #2 (short weierstrass, smallest)
437 ECP check privkey #3 (short weierstrass, biggest)
441 ECP check privkey #4 (short weierstrass, too big)
[all …]
Dtest_suite_ssl.data1648 Record crypt, AES-128-CCM, 1.2, short tag
1652 Record crypt, AES-128-CCM, 1.2, short tag, CID 4+4
1656 Record crypt, AES-128-CCM, 1.2, short tag, CID 4+0
1676 Record crypt, AES-192-CCM, 1.2, short tag
1680 Record crypt, AES-192-CCM, 1.2, short tag, CID 4+4
1684 Record crypt, AES-192-CCM, 1.2, short tag, CID 4+0
1704 Record crypt, AES-256-CCM, 1.2, short tag
1708 Record crypt, AES-256-CCM, 1.2, short tag, CID 4+4
1712 Record crypt, AES-256-CCM, 1.2, short tag, CID 4+0
1728 Record crypt, CAMELLIA-128-CCM, 1.2, short tag
[all …]
Dtest_suite_asn1parse.data58 length=0 (short form)
67 length=1 (short form)
82 length=2 (short form)
97 length=127 (short form)
Dtest_suite_asn1write.data232 ASN.1 Write / Read Length #0 (Len = 0, short form)
235 ASN.1 Write / Read Length #1 (Len = 127, short form)
Dtest_suite_ecjpake.data127 ECJPAKE round two client: ECParams too short
Dtest_suite_asn1write.function307 /* Write an OCTET STRING with a short length encoding */
Dtest_suite_pk.data573 Verify ext RSA #15 (PKCS1 v2.1, salt_len = ANY, sig_len too short)
577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short)
581 Verify ext RSA #17 (PKCS1 v2.1, salt_len = ANY, wrong message, sig_len too short)
585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short)
Dtest_suite_psa_crypto.data691 PSA import EC keypair: explicit bit-size, too short
1783 PSA MAC setup: algorithm known but not supported, short key
2255 PSA symmetric encrypt: AES-ECB, input too short (15 bytes)
2259 PSA symmetric encrypt: AES-CBC-nopad, input too short
2343 PSA symmetric encrypt multipart: AES-ECB, input too short (15 bytes)
2347 PSA symmetric encrypt multipart: AES-CBC-nopad, input too short
2403 PSA symmetric decrypt: AES-CBC-PKCS#7, input too short (15 bytes)
2407 PSA symmetric decrypt: AES-ECB, input too short (15 bytes)
2411 PSA symmetric decrypt: AES-CBC-nopad, input too short (5 bytes)
2415 PSA symmetric decrypt: CCM*-no-tag, input too short (15 bytes)
[all …]
/openthread-latest/third_party/mbedtls/repo/scripts/mbedtls_dev/
Dcrypto_knowledge.py25 short = original
26 short = re.sub(r'\bPSA_(?:ALG|DH_FAMILY|ECC_FAMILY|KEY_[A-Z]+)_', r'', short)
27 short = re.sub(r' +', r'', short)
29 short = re.sub(r'PUBLIC_KEY\b', r'PUB', short)
30 short = re.sub(r'KEY_PAIR\b', r'PAIR', short)
31 short = re.sub(r'\bBRAINPOOL_P', r'BP', short)
32 short = re.sub(r'\bMONTGOMERY\b', r'MGM', short)
33 short = re.sub(r'AEAD_WITH_SHORTENED_TAG\b', r'AEAD_SHORT', short)
34 short = re.sub(r'\bDETERMINISTIC_', r'DET_', short)
35 short = re.sub(r'\bKEY_AGREEMENT\b', r'KA', short)
[all …]
Dcrypto_data_tests.py91 short = b'abc'
92 hash_short = calc(short)
102 [short.hex(), hash_short])
/openthread-latest/tools/cp-caps/
DREADME.md178 TX ver:2003,Cmd,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ----------------…
179 RX ver:2003,Cmd,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ----------------…
182 TX ver:2006,Cmd,seq,dst[addr:short,pan:id],src[addr:short,pan:no],sec:l5,ie:no,plen:0 -------------…
183 RX ver:2006,Cmd,seq,dst[addr:short,pan:id],src[addr:short,pan:no],sec:l5,ie:no,plen:0 -------------…
188 TX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------…
189 RX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------…
192 TX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ---------------…
193 RX ver:2006,Data,seq,dst[addr:short,pan:id],src[addr:no,pan:no],sec:no,ie:no,plen:0 ---------------…
210 TX ver:2015,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------…
211 RX ver:2015,Data,seq,dst[addr:short,pan:id],src[addr:short,pan:id],sec:no,ie:no,plen:0 ------------…
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/scripts/
Dgenerate_psa_tests.py526 short = lifetime
527 short = re.sub(r'PSA_KEY_LIFETIME_FROM_PERSISTENCE_AND_LOCATION',
528 r'', short)
529 short = crypto_knowledge.short_expression(short)
530 description = 'lifetime: ' + short
556 short: Optional[str] = None,
570 if short is None:
574 key1.description += short
589 yield self.key_for_usage_flags(known_flags, short='all known')
/openthread-latest/third_party/mbedtls/repo/programs/
DREADME.md26 … PEM or DER public/private key file and uses the key to encrypt/decrypt a short string through the…
28 …rify.c): loads a PEM or DER private/public key file and uses the key to sign/verify a short string.
34 …rypt.c): loads an RSA public/private key and uses it to encrypt/decrypt a short string through the…
38 …a_verify.c): loads an RSA private/public key and uses it to sign/verify a short string with the RS…
40 …rify_pss.c): loads an RSA private/public key and uses it to sign/verify a short string with the RS…
69 * [`ssl/mini_client.c`](ssl/mini_client.c): a minimalistic SSL client, which sends a short string a…
/openthread-latest/third_party/mbedtls/repo/
D.pylintrc6 # We're ok with short funtion argument names.
32 # We're ok with short local or global variable names.
DCONTRIBUTING.md28 1. For quick merging, the contribution should be short, and concentrated on a single feature or top…
/openthread-latest/tests/unit/
DREADME.md48 This will only build the test and take a short time.
/openthread-latest/tests/toranj/
Dstart.sh201 run cli/test-033-alt-short-addr-role-transition.py
/openthread-latest/src/core/diags/
DREADME.md266 - destaddress: The destination mac address. It can be a short, extended or none. Use '-' to specify…
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dalternative-implementations.md34 …ustom implementations are called “alternative implementations”, or “ALT implementations” for short.
/openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/
Ddriver-interface-test-strategy.md19 The dynamic secure element driver interface (SE interface for short) is defined by [`psa/crypto_se_…
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dpsa-limitations.md144 doesn't fit because the key is too short, then the maximum length that fits is

12