/mbedtls-3.5.0/tests/scripts/ |
D | all.sh | 366 msg() function 389 msg "build: ARM Compiler 6 ($FLAGS)" 393 msg "size: ARM Compiler 6 ($FLAGS)" 699 msg "info: $0 configuration" 778 msg "info: output_env.sh" 816 msg "Check: recursion.pl" # < 1s 821 msg "Check: check-generated-files, files generated with make" # 2s 825 msg "Check: check-generated-files -u, files present" # 2s 830 msg "Check: check-generated-files -u, files absent" # 2s 841 msg "Check: doxygen markup outside doxygen blocks" # < 1s [all …]
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_lmots.function | 31 void lmots_sign_verify_test(data_t *msg, data_t *key_id, int leaf_id, 45 msg->x, msg->len, sig, sizeof(sig), NULL), 0); 46 TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, msg->x, msg->len, sig, sizeof(sig)), 0); 78 void lmots_verify_test(data_t *msg, data_t *sig, data_t *pub_key, 89 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), expected_rc); 93 if (msg->len >= 1) { 95 msg->x[0] ^= 1; 96 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 98 msg->x[0] ^= 1; 101 msg->x[msg->len - 1] ^= 1; [all …]
|
D | test_suite_ccm.function | 101 unsigned char msg[10]; 112 memset(msg, 0, sizeof(msg)); 121 msg, out, tag, tag_len) == res); 124 msg, out, tag, tag_len); 144 unsigned char msg[10]; 154 memset(msg, 0, sizeof(msg)); 164 add, add_len, msg, out, tag, tag_len) == res); 167 add_len, msg, out, tag, tag_len); 182 data_t *msg, data_t *iv, 189 const size_t expected_tag_len = result->len - msg->len; [all …]
|
D | test_suite_lms.function | 12 void lms_sign_verify_test(data_t *msg, data_t *seed) 32 msg->x, msg->len, sig, sizeof(sig), 35 TEST_EQUAL(mbedtls_lms_verify(&pub_ctx, msg->x, msg->len, sig, 78 void lms_verify_test(data_t *msg, data_t *sig, data_t *pub_key, 89 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), expected_rc); 93 if (msg->len >= 1) { 95 msg->x[0] ^= 1; 96 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 98 msg->x[0] ^= 1; 101 msg->x[msg->len - 1] ^= 1; [all …]
|
D | test_suite_nist_kw.function | 237 void mbedtls_nist_kw_wrap(int cipher_id, int mode, data_t *key, data_t *msg, 252 TEST_ASSERT(mbedtls_nist_kw_wrap(&ctx, mode, msg->x, msg->len, 259 padlen = (msg->len % 8 != 0) ? 8 - (msg->len % 8) : 0; 261 for (i = msg->len + 8 + padlen; i < sizeof(result); i++) { 271 void mbedtls_nist_kw_unwrap(int cipher_id, int mode, data_t *key, data_t *msg, 286 TEST_ASSERT(mbedtls_nist_kw_unwrap(&ctx, mode, msg->x, msg->len, 296 for (i = msg->len - 8; i < sizeof(result); i++) {
|
D | test_suite_ecjpake.function | 133 void read_bad_md(data_t *msg) 146 TEST_EQUAL(mbedtls_ecjpake_read_round_one(&corrupt_ctx, msg->x, 147 msg->len), MBEDTLS_ERR_MD_BAD_INPUT_DATA); 155 void read_round_one(int role, data_t *msg, int ref_ret) 167 TEST_ASSERT(mbedtls_ecjpake_read_round_one(&ctx, msg->x, msg->len) == ref_ret); 175 void read_round_two_cli(data_t *msg, int ref_ret) 193 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret); 201 void read_round_two_srv(data_t *msg, int ref_ret) 219 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret);
|
D | test_suite_debug.data | 1 Debug print msg (threshold 1, level 0) 4 Debug print msg (threshold 1, level 1) 7 Debug print msg (threshold 1, level 2) 10 Debug print msg (threshold 0, level 1) 13 Debug print msg (threshold 0, level 5)
|
D | test_suite_pk.function | 1106 unsigned char msg[50], ciph[64], test[50]; 1117 memset(msg, 0x2a, sizeof(msg)); 1157 TEST_ASSERT(mbedtls_pk_encrypt(&rsa, msg, sizeof(msg), 1163 TEST_ASSERT(test_len == sizeof(msg)); 1164 TEST_ASSERT(memcmp(test, msg, test_len) == 0); 1167 TEST_ASSERT(mbedtls_pk_encrypt(&alt, msg, sizeof(msg),
|
D | test_suite_psa_crypto.data | 966 PSA key policy: msg asymmetric signature, sign | verify 970 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt) 974 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt) 978 PSA key policy: msg asymmetric signature, wrong alg family (RSA v15/PSS) 982 PSA key policy: msg asymmetric signature, wildcard in policy, wrong alg family 986 PSA key policy: msg asymmetric signature, wildcard in policy, ECDSA SHA-256 990 PSA key policy: msg asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256 994 PSA key policy: msg asymmetric signature, wrong hash algorithm 998 PSA key policy: msg asymmetric signature, alg=0 in policy 1002 PSA key policy: msg asymmetric signature, sign but not verify [all …]
|
D | test_suite_ccm.data | 42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
|
/mbedtls-3.5.0/library/ |
D | lmots.c | 149 const unsigned char *msg, in create_digit_array_with_checksum() argument 187 status = psa_hash_update(&op, msg, msg_len); in create_digit_array_with_checksum() 494 const unsigned char *msg, in mbedtls_lmots_calculate_public_key_candidate() argument 506 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_calculate_public_key_candidate() 515 ret = create_digit_array_with_checksum(params, msg, msg_size, in mbedtls_lmots_calculate_public_key_candidate() 544 const unsigned char *msg, size_t msg_size, in mbedtls_lmots_verify() argument 550 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_verify() 573 msg, msg_size, sig, sig_size, in mbedtls_lmots_verify() 733 void *p_rng, const unsigned char *msg, size_t msg_size, in mbedtls_lmots_sign() argument 748 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_sign() [all …]
|
D | common.h | 162 #define MBEDTLS_STATIC_ASSERT(expr, msg) static_assert(expr, msg); argument 164 #define MBEDTLS_STATIC_ASSERT(expr, msg) argument
|
D | lmots.h | 180 const unsigned char *msg, 214 const unsigned char *msg, 314 void *p_rng, const unsigned char *msg, size_t msg_size,
|
D | sha512.c | 380 mbedtls_sha512_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha512_process_many_a64_crypto() argument 392 msg += SHA512_BLOCK_SIZE, in mbedtls_internal_sha512_process_many_a64_crypto() 401 uint64x2_t s0 = (uint64x2_t) vld1q_u8(msg + 16 * 0); in mbedtls_internal_sha512_process_many_a64_crypto() 402 uint64x2_t s1 = (uint64x2_t) vld1q_u8(msg + 16 * 1); in mbedtls_internal_sha512_process_many_a64_crypto() 403 uint64x2_t s2 = (uint64x2_t) vld1q_u8(msg + 16 * 2); in mbedtls_internal_sha512_process_many_a64_crypto() 404 uint64x2_t s3 = (uint64x2_t) vld1q_u8(msg + 16 * 3); in mbedtls_internal_sha512_process_many_a64_crypto() 405 uint64x2_t s4 = (uint64x2_t) vld1q_u8(msg + 16 * 4); in mbedtls_internal_sha512_process_many_a64_crypto() 406 uint64x2_t s5 = (uint64x2_t) vld1q_u8(msg + 16 * 5); in mbedtls_internal_sha512_process_many_a64_crypto() 407 uint64x2_t s6 = (uint64x2_t) vld1q_u8(msg + 16 * 6); in mbedtls_internal_sha512_process_many_a64_crypto() 408 uint64x2_t s7 = (uint64x2_t) vld1q_u8(msg + 16 * 7); in mbedtls_internal_sha512_process_many_a64_crypto() [all …]
|
D | sha256.c | 293 mbedtls_sha256_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many_a64_crypto() argument 303 msg += SHA256_BLOCK_SIZE, in mbedtls_internal_sha256_process_many_a64_crypto() 310 uint32x4_t sched0 = (uint32x4_t) vld1q_u8(msg + 16 * 0); in mbedtls_internal_sha256_process_many_a64_crypto() 311 uint32x4_t sched1 = (uint32x4_t) vld1q_u8(msg + 16 * 1); in mbedtls_internal_sha256_process_many_a64_crypto() 312 uint32x4_t sched2 = (uint32x4_t) vld1q_u8(msg + 16 * 2); in mbedtls_internal_sha256_process_many_a64_crypto() 313 uint32x4_t sched3 = (uint32x4_t) vld1q_u8(msg + 16 * 3); in mbedtls_internal_sha256_process_many_a64_crypto() 583 const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many() argument 586 return mbedtls_internal_sha256_process_many_a64_crypto(ctx, msg, len); in mbedtls_internal_sha256_process_many() 588 return mbedtls_internal_sha256_process_many_c(ctx, msg, len); in mbedtls_internal_sha256_process_many()
|
D | lms.c | 308 const unsigned char *msg, size_t msg_size, in mbedtls_lms_verify() argument 378 msg, in mbedtls_lms_verify() 707 void *p_rng, const unsigned char *msg, in mbedtls_lms_sign() argument 750 msg, in mbedtls_lms_sign()
|
D | ssl_tls12_client.c | 3377 const unsigned char *msg; in ssl_parse_new_session_ticket() local 3413 msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len(ssl); in ssl_parse_new_session_ticket() 3415 lifetime = (((uint32_t) msg[0]) << 24) | (msg[1] << 16) | in ssl_parse_new_session_ticket() 3416 (msg[2] << 8) | (msg[3]); in ssl_parse_new_session_ticket() 3418 ticket_len = (msg[4] << 8) | (msg[5]); in ssl_parse_new_session_ticket() 3462 memcpy(ticket, msg + 6, ticket_len); in ssl_parse_new_session_ticket()
|
D | ssl_msg.c | 2187 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local 2193 if ((msg = mbedtls_calloc(1, sizeof(mbedtls_ssl_flight_item))) == NULL) { in ssl_flight_append() 2199 if ((msg->p = mbedtls_calloc(1, ssl->out_msglen)) == NULL) { in ssl_flight_append() 2202 mbedtls_free(msg); in ssl_flight_append() 2207 memcpy(msg->p, ssl->out_msg, ssl->out_msglen); in ssl_flight_append() 2208 msg->len = ssl->out_msglen; in ssl_flight_append() 2209 msg->type = ssl->out_msgtype; in ssl_flight_append() 2210 msg->next = NULL; in ssl_flight_append() 2214 ssl->handshake->flight = msg; in ssl_flight_append() 2220 cur->next = msg; in ssl_flight_append() [all …]
|
D | ssl_misc.h | 1476 unsigned char const *msg,
|
D | ssl_tls.c | 820 unsigned char const *msg, in mbedtls_ssl_add_hs_msg_to_checksum() argument 828 return ssl->handshake->update_checksum(ssl, msg, msg_len); in mbedtls_ssl_add_hs_msg_to_checksum()
|
/mbedtls-3.5.0/tests/src/ |
D | psa_crypto_helpers.c | 143 const char *msg = mbedtls_test_helper_is_psa_leaking(); in mbedtls_test_fail_if_psa_leaking() local 144 if (msg == NULL) { in mbedtls_test_fail_if_psa_leaking() 147 mbedtls_test_fail(msg, line_no, filename); in mbedtls_test_fail_if_psa_leaking()
|
D | threading_helpers.c | 100 const char *msg) in mbedtls_test_mutex_usage_error() argument 104 mbedtls_test_info.mutex_usage_error = msg; in mbedtls_test_mutex_usage_error() 106 mbedtls_fprintf(stdout, "[mutex: %s] ", msg); in mbedtls_test_mutex_usage_error()
|
/mbedtls-3.5.0/3rdparty/everest/include/everest/kremlin/internal/ |
D | target.h | 69 #define KRML_EABORT(t, msg) \ argument 70 (KRML_HOST_PRINTF("KreMLin abort at %s:%d\n%s\n", __FILE__, __LINE__, msg), \
|
/mbedtls-3.5.0/include/mbedtls/ |
D | lms.h | 333 const unsigned char *msg, size_t msg_size, 443 void *p_rng, const unsigned char *msg,
|
/mbedtls-3.5.0/programs/test/ |
D | udp_proxy.c | 320 static const char *msg_type(unsigned char *msg, size_t len) in msg_type() argument 325 switch (msg[0]) { in msg_type() 343 if (msg[14] || msg[19] || msg[22]) { in msg_type() 347 switch (msg[13]) { in msg_type()
|