Home
last modified time | relevance | path

Searched refs:msg (Results 1 – 25 of 26) sorted by relevance

12

/mbedtls-3.5.0/tests/scripts/
Dall.sh366 msg() function
389 msg "build: ARM Compiler 6 ($FLAGS)"
393 msg "size: ARM Compiler 6 ($FLAGS)"
699 msg "info: $0 configuration"
778 msg "info: output_env.sh"
816 msg "Check: recursion.pl" # < 1s
821 msg "Check: check-generated-files, files generated with make" # 2s
825 msg "Check: check-generated-files -u, files present" # 2s
830 msg "Check: check-generated-files -u, files absent" # 2s
841 msg "Check: doxygen markup outside doxygen blocks" # < 1s
[all …]
/mbedtls-3.5.0/tests/suites/
Dtest_suite_lmots.function31 void lmots_sign_verify_test(data_t *msg, data_t *key_id, int leaf_id,
45 msg->x, msg->len, sig, sizeof(sig), NULL), 0);
46 TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, msg->x, msg->len, sig, sizeof(sig)), 0);
78 void lmots_verify_test(data_t *msg, data_t *sig, data_t *pub_key,
89 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), expected_rc);
93 if (msg->len >= 1) {
95 msg->x[0] ^= 1;
96 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
98 msg->x[0] ^= 1;
101 msg->x[msg->len - 1] ^= 1;
[all …]
Dtest_suite_ccm.function101 unsigned char msg[10];
112 memset(msg, 0, sizeof(msg));
121 msg, out, tag, tag_len) == res);
124 msg, out, tag, tag_len);
144 unsigned char msg[10];
154 memset(msg, 0, sizeof(msg));
164 add, add_len, msg, out, tag, tag_len) == res);
167 add_len, msg, out, tag, tag_len);
182 data_t *msg, data_t *iv,
189 const size_t expected_tag_len = result->len - msg->len;
[all …]
Dtest_suite_lms.function12 void lms_sign_verify_test(data_t *msg, data_t *seed)
32 msg->x, msg->len, sig, sizeof(sig),
35 TEST_EQUAL(mbedtls_lms_verify(&pub_ctx, msg->x, msg->len, sig,
78 void lms_verify_test(data_t *msg, data_t *sig, data_t *pub_key,
89 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), expected_rc);
93 if (msg->len >= 1) {
95 msg->x[0] ^= 1;
96 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
98 msg->x[0] ^= 1;
101 msg->x[msg->len - 1] ^= 1;
[all …]
Dtest_suite_nist_kw.function237 void mbedtls_nist_kw_wrap(int cipher_id, int mode, data_t *key, data_t *msg,
252 TEST_ASSERT(mbedtls_nist_kw_wrap(&ctx, mode, msg->x, msg->len,
259 padlen = (msg->len % 8 != 0) ? 8 - (msg->len % 8) : 0;
261 for (i = msg->len + 8 + padlen; i < sizeof(result); i++) {
271 void mbedtls_nist_kw_unwrap(int cipher_id, int mode, data_t *key, data_t *msg,
286 TEST_ASSERT(mbedtls_nist_kw_unwrap(&ctx, mode, msg->x, msg->len,
296 for (i = msg->len - 8; i < sizeof(result); i++) {
Dtest_suite_ecjpake.function133 void read_bad_md(data_t *msg)
146 TEST_EQUAL(mbedtls_ecjpake_read_round_one(&corrupt_ctx, msg->x,
147 msg->len), MBEDTLS_ERR_MD_BAD_INPUT_DATA);
155 void read_round_one(int role, data_t *msg, int ref_ret)
167 TEST_ASSERT(mbedtls_ecjpake_read_round_one(&ctx, msg->x, msg->len) == ref_ret);
175 void read_round_two_cli(data_t *msg, int ref_ret)
193 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret);
201 void read_round_two_srv(data_t *msg, int ref_ret)
219 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret);
Dtest_suite_debug.data1 Debug print msg (threshold 1, level 0)
4 Debug print msg (threshold 1, level 1)
7 Debug print msg (threshold 1, level 2)
10 Debug print msg (threshold 0, level 1)
13 Debug print msg (threshold 0, level 5)
Dtest_suite_pk.function1106 unsigned char msg[50], ciph[64], test[50];
1117 memset(msg, 0x2a, sizeof(msg));
1157 TEST_ASSERT(mbedtls_pk_encrypt(&rsa, msg, sizeof(msg),
1163 TEST_ASSERT(test_len == sizeof(msg));
1164 TEST_ASSERT(memcmp(test, msg, test_len) == 0);
1167 TEST_ASSERT(mbedtls_pk_encrypt(&alt, msg, sizeof(msg),
Dtest_suite_psa_crypto.data966 PSA key policy: msg asymmetric signature, sign | verify
970 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt)
974 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt)
978 PSA key policy: msg asymmetric signature, wrong alg family (RSA v15/PSS)
982 PSA key policy: msg asymmetric signature, wildcard in policy, wrong alg family
986 PSA key policy: msg asymmetric signature, wildcard in policy, ECDSA SHA-256
990 PSA key policy: msg asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256
994 PSA key policy: msg asymmetric signature, wrong hash algorithm
998 PSA key policy: msg asymmetric signature, alg=0 in policy
1002 PSA key policy: msg asymmetric signature, sign but not verify
[all …]
Dtest_suite_ccm.data42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
/mbedtls-3.5.0/library/
Dlmots.c149 const unsigned char *msg, in create_digit_array_with_checksum() argument
187 status = psa_hash_update(&op, msg, msg_len); in create_digit_array_with_checksum()
494 const unsigned char *msg, in mbedtls_lmots_calculate_public_key_candidate() argument
506 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_calculate_public_key_candidate()
515 ret = create_digit_array_with_checksum(params, msg, msg_size, in mbedtls_lmots_calculate_public_key_candidate()
544 const unsigned char *msg, size_t msg_size, in mbedtls_lmots_verify() argument
550 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_verify()
573 msg, msg_size, sig, sig_size, in mbedtls_lmots_verify()
733 void *p_rng, const unsigned char *msg, size_t msg_size, in mbedtls_lmots_sign() argument
748 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_sign()
[all …]
Dcommon.h162 #define MBEDTLS_STATIC_ASSERT(expr, msg) static_assert(expr, msg); argument
164 #define MBEDTLS_STATIC_ASSERT(expr, msg) argument
Dlmots.h180 const unsigned char *msg,
214 const unsigned char *msg,
314 void *p_rng, const unsigned char *msg, size_t msg_size,
Dsha512.c380 mbedtls_sha512_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha512_process_many_a64_crypto() argument
392 msg += SHA512_BLOCK_SIZE, in mbedtls_internal_sha512_process_many_a64_crypto()
401 uint64x2_t s0 = (uint64x2_t) vld1q_u8(msg + 16 * 0); in mbedtls_internal_sha512_process_many_a64_crypto()
402 uint64x2_t s1 = (uint64x2_t) vld1q_u8(msg + 16 * 1); in mbedtls_internal_sha512_process_many_a64_crypto()
403 uint64x2_t s2 = (uint64x2_t) vld1q_u8(msg + 16 * 2); in mbedtls_internal_sha512_process_many_a64_crypto()
404 uint64x2_t s3 = (uint64x2_t) vld1q_u8(msg + 16 * 3); in mbedtls_internal_sha512_process_many_a64_crypto()
405 uint64x2_t s4 = (uint64x2_t) vld1q_u8(msg + 16 * 4); in mbedtls_internal_sha512_process_many_a64_crypto()
406 uint64x2_t s5 = (uint64x2_t) vld1q_u8(msg + 16 * 5); in mbedtls_internal_sha512_process_many_a64_crypto()
407 uint64x2_t s6 = (uint64x2_t) vld1q_u8(msg + 16 * 6); in mbedtls_internal_sha512_process_many_a64_crypto()
408 uint64x2_t s7 = (uint64x2_t) vld1q_u8(msg + 16 * 7); in mbedtls_internal_sha512_process_many_a64_crypto()
[all …]
Dsha256.c293 mbedtls_sha256_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many_a64_crypto() argument
303 msg += SHA256_BLOCK_SIZE, in mbedtls_internal_sha256_process_many_a64_crypto()
310 uint32x4_t sched0 = (uint32x4_t) vld1q_u8(msg + 16 * 0); in mbedtls_internal_sha256_process_many_a64_crypto()
311 uint32x4_t sched1 = (uint32x4_t) vld1q_u8(msg + 16 * 1); in mbedtls_internal_sha256_process_many_a64_crypto()
312 uint32x4_t sched2 = (uint32x4_t) vld1q_u8(msg + 16 * 2); in mbedtls_internal_sha256_process_many_a64_crypto()
313 uint32x4_t sched3 = (uint32x4_t) vld1q_u8(msg + 16 * 3); in mbedtls_internal_sha256_process_many_a64_crypto()
583 const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many() argument
586 return mbedtls_internal_sha256_process_many_a64_crypto(ctx, msg, len); in mbedtls_internal_sha256_process_many()
588 return mbedtls_internal_sha256_process_many_c(ctx, msg, len); in mbedtls_internal_sha256_process_many()
Dlms.c308 const unsigned char *msg, size_t msg_size, in mbedtls_lms_verify() argument
378 msg, in mbedtls_lms_verify()
707 void *p_rng, const unsigned char *msg, in mbedtls_lms_sign() argument
750 msg, in mbedtls_lms_sign()
Dssl_tls12_client.c3377 const unsigned char *msg; in ssl_parse_new_session_ticket() local
3413 msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len(ssl); in ssl_parse_new_session_ticket()
3415 lifetime = (((uint32_t) msg[0]) << 24) | (msg[1] << 16) | in ssl_parse_new_session_ticket()
3416 (msg[2] << 8) | (msg[3]); in ssl_parse_new_session_ticket()
3418 ticket_len = (msg[4] << 8) | (msg[5]); in ssl_parse_new_session_ticket()
3462 memcpy(ticket, msg + 6, ticket_len); in ssl_parse_new_session_ticket()
Dssl_msg.c2187 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local
2193 if ((msg = mbedtls_calloc(1, sizeof(mbedtls_ssl_flight_item))) == NULL) { in ssl_flight_append()
2199 if ((msg->p = mbedtls_calloc(1, ssl->out_msglen)) == NULL) { in ssl_flight_append()
2202 mbedtls_free(msg); in ssl_flight_append()
2207 memcpy(msg->p, ssl->out_msg, ssl->out_msglen); in ssl_flight_append()
2208 msg->len = ssl->out_msglen; in ssl_flight_append()
2209 msg->type = ssl->out_msgtype; in ssl_flight_append()
2210 msg->next = NULL; in ssl_flight_append()
2214 ssl->handshake->flight = msg; in ssl_flight_append()
2220 cur->next = msg; in ssl_flight_append()
[all …]
Dssl_misc.h1476 unsigned char const *msg,
Dssl_tls.c820 unsigned char const *msg, in mbedtls_ssl_add_hs_msg_to_checksum() argument
828 return ssl->handshake->update_checksum(ssl, msg, msg_len); in mbedtls_ssl_add_hs_msg_to_checksum()
/mbedtls-3.5.0/tests/src/
Dpsa_crypto_helpers.c143 const char *msg = mbedtls_test_helper_is_psa_leaking(); in mbedtls_test_fail_if_psa_leaking() local
144 if (msg == NULL) { in mbedtls_test_fail_if_psa_leaking()
147 mbedtls_test_fail(msg, line_no, filename); in mbedtls_test_fail_if_psa_leaking()
Dthreading_helpers.c100 const char *msg) in mbedtls_test_mutex_usage_error() argument
104 mbedtls_test_info.mutex_usage_error = msg; in mbedtls_test_mutex_usage_error()
106 mbedtls_fprintf(stdout, "[mutex: %s] ", msg); in mbedtls_test_mutex_usage_error()
/mbedtls-3.5.0/3rdparty/everest/include/everest/kremlin/internal/
Dtarget.h69 #define KRML_EABORT(t, msg) \ argument
70 (KRML_HOST_PRINTF("KreMLin abort at %s:%d\n%s\n", __FILE__, __LINE__, msg), \
/mbedtls-3.5.0/include/mbedtls/
Dlms.h333 const unsigned char *msg, size_t msg_size,
443 void *p_rng, const unsigned char *msg,
/mbedtls-3.5.0/programs/test/
Dudp_proxy.c320 static const char *msg_type(unsigned char *msg, size_t len) in msg_type() argument
325 switch (msg[0]) { in msg_type()
343 if (msg[14] || msg[19] || msg[22]) { in msg_type()
347 switch (msg[13]) { in msg_type()

12