/mbedtls-latest/tests/suites/ |
D | test_suite_bignum.generated.data | 3 MPI add #1 0 (null) + 0 (null) 6 MPI add #2 0 (null) + 0 (1 limb) 9 MPI add #3 0 (null) + negative 0 (null) 12 MPI add #4 0 (null) + negative with leading zero limb 15 MPI add #5 0 (null) + positive 18 MPI add #6 0 (null) + negative 21 MPI add #7 0 (null) + positive with leading zero limb 24 MPI add #8 0 (null) + negative with leading zero limb 27 MPI add #9 0 (null) + large positive 30 MPI add #10 0 (null) + large negative [all …]
|
D | test_suite_ccm.function | 10 const data_t *add, 20 size_t n2_add = add->len - n1_add; 25 TEST_ASSERT(n1_add <= add->len); 28 TEST_EQUAL(0, mbedtls_ccm_set_lengths(ctx, add->len, input->len, tag->len)); 29 TEST_EQUAL(0, mbedtls_ccm_update_ad(ctx, add->x, n1_add)); 30 TEST_EQUAL(0, mbedtls_ccm_update_ad(ctx, add->x + n1_add, n2_add)); 107 unsigned char *add = NULL; 115 TEST_CALLOC_OR_SKIP(add, add_len); 125 TEST_ASSERT(mbedtls_ccm_encrypt_and_tag(&ctx, msg_len, iv, iv_len, add, add_len, 128 decrypt_ret = mbedtls_ccm_auth_decrypt(&ctx, msg_len, iv, iv_len, add, add_len, [all …]
|
D | test_suite_gcm.function | 10 const data_t *add, 20 size_t n2_add = add->len - n1_add; 25 TEST_ASSERT(n1_add <= add->len); 30 TEST_EQUAL(0, mbedtls_gcm_update_ad(ctx, add->x, n1_add)); 31 TEST_EQUAL(0, mbedtls_gcm_update_ad(ctx, add->x + n1_add, n2_add)); 110 const data_t *add, 119 TEST_EQUAL(0, mbedtls_gcm_update_ad(ctx, add->x, add->len));
|
D | test_suite_ctr_drbg.function | 254 unsigned char add[16]; 268 memset(add, 0, sizeof(add)); 292 add, sizeof(add)) == 0); 314 add, sizeof(add)) == 0);
|
D | test_suite_ctr_drbg.data | 1 CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=no, add=no 5 CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=no, add=yes 9 CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=yes, add=no 13 CTR_DRBG_withDF.pdf: AES-256, PR=no, perso=yes, add=yes 17 CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=no, add=no 21 CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=no, add=yes 25 CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=yes, add=no 29 CTR_DRBG_withDF.pdf: AES-256, PR=yes, perso=yes, add=yes
|
D | test_suite_psa_crypto_util.data | 10 # If we add an even larger curve, this test case will fail in the full 72 # If we add an even larger curve, this test case will fail in the full
|
D | test_suite_platform_printf.function | 8 * (It may be useful to add tests that allow compiler optimizations.
|
/mbedtls-latest/ |
D | .uncrustify.cfg | 47 sp_brace_else = add 52 nl_fcall_brace = add 53 nl_fdef_brace = add 59 sp_assign = add 65 sp_bool = add 89 sp_compare = add 128 sp_before_ptr_star = add 143 sp_after_type = add 158 sp_after_semi = add 160 sp_after_semi_for = add [all …]
|
/mbedtls-latest/library/ |
D | ccm.c | 290 const unsigned char *add, in mbedtls_ccm_update_ad() argument 330 mbedtls_xor(ctx->y + offset, ctx->y + offset, add, use_len); in mbedtls_ccm_update_ad() 334 add += use_len; in mbedtls_ccm_update_ad() 514 const unsigned char *add, size_t add_len, in ccm_auth_crypt() argument 529 if ((ret = mbedtls_ccm_update_ad(ctx, add, add_len)) != 0) { in ccm_auth_crypt() 550 const unsigned char *add, size_t add_len, in mbedtls_ccm_star_encrypt_and_tag() argument 555 add, add_len, input, output, tag, tag_len); in mbedtls_ccm_star_encrypt_and_tag() 560 const unsigned char *add, size_t add_len, in mbedtls_ccm_encrypt_and_tag() argument 565 add, add_len, input, output, tag, tag_len); in mbedtls_ccm_encrypt_and_tag() 587 const unsigned char *add, size_t add_len, in ccm_auth_decrypt() argument [all …]
|
D | gcm.c | 468 const unsigned char *add, size_t add_len) in mbedtls_gcm_update_ad() argument 487 p = add; in mbedtls_gcm_update_ad() 708 const unsigned char *add, in mbedtls_gcm_crypt_and_tag() argument 722 if ((ret = mbedtls_gcm_update_ad(ctx, add, add_len)) != 0) { in mbedtls_gcm_crypt_and_tag() 742 const unsigned char *add, in mbedtls_gcm_auth_decrypt() argument 754 iv, iv_len, add, add_len, in mbedtls_gcm_auth_decrypt()
|
D | bignum_core.c | 433 mbedtls_mpi_uint add = mbedtls_ct_mpi_uint_if_else_0(do_add, A[i]); in mbedtls_mpi_core_add_if() local 436 t += add; in mbedtls_mpi_core_add_if() 437 c += (t < add); in mbedtls_mpi_core_add_if()
|
D | bn_mul.h | 935 __asm add eax, ecx \ 937 __asm add eax, [edi] \
|
/mbedtls-latest/include/mbedtls/ |
D | gcm.h | 171 const unsigned char *add, 215 const unsigned char *add, 261 const unsigned char *add,
|
/mbedtls-latest/tests/scripts/ |
D | gen_gcm_encrypt.pl | 62 my $add = get_val("AAD"); 72 print(":\"$add\"");
|
D | gen_gcm_decrypt.pl | 80 my $add = get_val("AAD"); 89 print(":\"$add\"");
|
D | docker_env.sh | 81 --cap-add SYS_PTRACE \
|
D | analyze_outcomes.py | 192 outcomes[component].successes.add(suite_case) 194 outcomes[component].failures.add(suite_case)
|
D | psa_collect_statuses.py | 49 self.codes.add(int(value))
|
/mbedtls-latest/scripts/ |
D | lcov.sh | 56 …lcov --rc lcov_branch_coverage=1 --add-tracefile "$COVTMP/files.info" --add-tracefile "$COVTMP/tes…
|
D | ci.requirements.txt | 5 # Use a known version of Pylint, because new versions tend to add warnings
|
/mbedtls-latest/docs/architecture/testing/ |
D | invasive-testing.md | 30 Do not add test-specific interfaces if there's a practical way of doing it another way. All public … 38 …n internal details of the library and not just on its documented behavior, add a comment in the co… 55 If the most practical way to test something is to add code to the product that is only useful for t… 60 …OKS` must not change the behavior**. It may define extra functions. It may add fields to structure… 145 As a rule, we do not add public interfaces solely for testing purposes. We only add public interfac… 209 If there's code that we want to have in the product for testing, but not in production, we can add … 366 …when running without isolation. To corrupt the key store, we would need to add a function to the l…
|
/mbedtls-latest/programs/test/cmake_subproject/ |
D | CMakeLists.txt | 7 # projects that use Mbed TLS as a subproject are likely to add by their own
|
/mbedtls-latest/.github/ |
D | pull_request_template.md | 27 - please do not force-push to update your PR - just add new commit(s)
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 183 certificates (otherwise, add one 'verify' for each link in the peer's 337 - multiply-and-add, shift by one limb (for Montgomery multiplication); 385 ladder, which is a variant of the good old double-and-add algorithm where an 460 curves of various sizes, add a parameter to each function specifying the 472 support multiple sizes there is no need to add a new parameter to functions 481 add a "curve id" parameter to all functions in this layer.
|
/mbedtls-latest/programs/test/ |
D | CMakeLists.txt | 59 …# https://gitlab.kitware.com/cmake/community/-/wikis/FAQ#how-can-i-add-a-dependency-to-a-source-fi…
|