Searched refs:small (Results 1 – 25 of 60) sorted by relevance
123
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_bignum.misc.data | 52 Test mpi_read_write_string #4 (Buffer too small) 100 Test mbedtls_mpi_write_binary #2 (Buffer too small) 109 Test mbedtls_mpi_write_binary_le #2 (Buffer too small) 442 Copy large negative to small negative 445 Copy large negative to small positive 460 Copy large positive to small negative 463 Copy large positive to small positive 472 Copy small negative to large negative 475 Copy small negative to large positive 478 Copy small negative to small negative [all …]
|
| D | test_suite_base64.data | 13 Test case mbedtls_base64_encode #2 buffer too small 19 Test case mbedtls_base64_encode #3 buffer too small 25 Test case mbedtls_base64_encode #4 buffer too small 31 Test case mbedtls_base64_encode #5 buffer too small 37 Test case mbedtls_base64_encode #6 buffer too small 43 Test case mbedtls_base64_encode #7 buffer too small 151 Base64 encode hex #2 (buffer too small) 177 Base64 decode hex #2 (buffer too small) 186 Base64 decode hex #5 (buffer too small)
|
| D | test_suite_ecjpake.data | 25 ECJPAKE round one: KKP1: length of first point too small 43 ECJPAKE round one: KKP1: length of second point too small 73 ECJPAKE round one: KKP2: length of first point too small 91 ECJPAKE round one: KKP2: length of second point too small 139 ECJPAKE round two client: length of first point too small 157 ECJPAKE round two client: length of second point too small 193 ECJPAKE round two server: length of first point too small 211 ECJPAKE round two server: length of second point too small
|
| D | test_suite_psa_crypto_memory.data | 7 PSA input buffer copy: copy buffer too small 22 PSA output buffer copy: output buffer too small
|
| D | test_suite_bignum_mod_raw.data | 119 Test mbedtls_mpi_mod_raw_io #19 BE (buffer too small, input limb-aligned) 122 Test mbedtls_mpi_mod_raw_io #19 LE (buffer too small, input limb-aligned) 125 Test mbedtls_mpi_mod_raw_io #20 BE (buffer too small, input unaligned) 128 Test mbedtls_mpi_mod_raw_io #20 LE (buffer too small, input unaligned)
|
| D | test_suite_psa_crypto_entropy.data | 37 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_MIN_PLATFORM 40 PSA validate entropy injection: bad, too small using MBEDTLS_ENTROPY_BLOCK_SIZE
|
| D | test_suite_asn1write.data | 238 ASN.1 Write / Read Length #2 (Len = 127, buffer too small) 247 ASN.1 Write / Read Length #5 (Len = 255, buffer too small) 256 ASN.1 Write / Read Length #8 (Len = 65535, buffer too small) 265 ASN.1 Write / Read Length #11 (Len = 16777215, buffer too small) 271 ASN.1 Write / Read Length #12 (Len = 16909060, buffer too small)
|
| D | test_suite_memory_buffer_alloc.data | 19 Memory buffer: heap too small (header verification should fail)
|
| D | test_suite_bignum_random.function | 32 * helps in validating the output range, through test cases with a small 280 /* If upper_bound is small, stats[b] is the number of times the value b 293 /* Consider a bound "small" if it's less than 2^5. This value is chosen 294 * to be small enough that the probability of missing one value is 296 * 256 because some of the code below assumes that "small" values 352 * too small, it would be extremely unlikely for this not to be
|
| D | test_suite_bignum_random.data | 210 MPI random in range: previously small >0 213 MPI random in range: previously small <0 330 MPI random mod validation: 2+ limbs, output too small
|
| D | test_suite_bignum_core.misc.data | 60 Test mbedtls_mpi_core_io_be #19 (buffer too small, input limb-aligned) 63 Test mbedtls_mpi_core_io_be #20 (buffer too small, input unaligned) 125 Test mbedtls_mpi_core_io_le #19 (buffer too small, input limb-aligned) 128 Test mbedtls_mpi_core_io_le #20 (buffer too small, input unaligned)
|
| D | test_suite_psa_crypto_util.data | 5 ECDSA Raw -> DER, 256bit, DER buffer too small 57 ECDSA DER -> Raw, 256bit, Raw buffer too small
|
| D | test_suite_mps.data | 28 MPS Reader: Pausing needed + enabled, but buffer too small
|
| D | test_suite_lmots.data | 110 # buffer is too small. 118 LMOTS key import too small key test
|
| D | test_suite_ecp.data | 176 ECP write binary #2 (zero, buffer too small) 184 ECP write binary #4 (non-zero, uncompressed, buffer too small) 192 ECP write binary #6 (zero, buffer too small) 200 ECP write binary #8 (even, compressed, buffer too small) 212 ECP write binary #11 (Montgomery curve25519, buffer too small) 220 ECP write binary #13 (Montgomery curve448, buffer too small) 429 ECP check privkey #1 (short weierstrass, too small) 644 ECP read key #1 (short weierstrass, too small) 775 ECP write key: secp256r1, top byte = 0, output_size=30 (too small) 994 ECP mod p192 small (more than 192 bits, less limbs than 2 * 192 bits) [all …]
|
| D | test_suite_dhm.data | 73 Diffie-Hellman small modulus
|
| D | test_suite_rsa.data | 271 RSA PKCS1 Decrypt #2 (Data too small) 275 RSA PKCS1 Decrypt #4 (Output buffer too small) 395 RSA Generate Key (Number of bits too small) 398 RSA Generate Key (Exponent too small) 751 RSA parse private key - correct format, modulus too small (127 bit)
|
| D | test_suite_lms.function | 172 /* Export into too-small buffer should fail */
|
| D | test_suite_lmots.function | 170 /* Export into too-small buffer should fail */
|
| /openthread-latest/ |
| D | .clang-tidy | 5 bugprone-too-small-loop-variable,
|
| /openthread-latest/third_party/mbedtls/repo/pkgconfig/ |
| D | CMakeLists.txt | 8 …s, X.509 certificate manipulation and the SSL/TLS and DTLS protocols. Its small code footprint mak…
|
| /openthread-latest/third_party/jlink/SEGGER_RTT_V640/ |
| D | README.txt | 9 - Main_RTT_PrintfTest.c - Sample application to test RTT small printf implementation.
|
| /openthread-latest/third_party/mbedtls/repo/.github/ |
| D | pull_request_template.md | 24 - please structure your PR into a series of small commits, each of which does one thing
|
| /openthread-latest/third_party/mbedtls/repo/tests/ |
| D | Descriptions.txt | 17 and a small data exchange.
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
| D | psa-shared-memory.md | 136 For buffers with a small static size limit, this is something we often do for convenience, especial… 150 #### Operations involving small buffers 152 For operations involving **small buffers**, the cost of copying is low. For many of those, the risk… 157 …small buffer” is one with a size limit that is known at compile time, and small enough that copyin… 159 The following buffers are considered small buffers: 166 **Design decision: the dispatch layer shall copy all small buffers**. 168 #### Symmetric cryptography inputs with small output 174 TODO: what about IV/nonce inputs? They are typically small, but don't necessarily have a static siz… 180 … i.e. deriving a structured key, which is considered a [small buffer](#operations-involving-small-… 206 …ame rules as [symmetric cryptography inputs with small output](#symmetric-cryptography-inputs-with… [all …]
|
123