/mbedtls-latest/tests/suites/ |
D | test_suite_asn1write.function | 15 static int generic_write_start_step(generic_write_data_t *data) 17 mbedtls_test_set_step(data->size); 18 mbedtls_free(data->output); 19 data->output = NULL; 20 TEST_CALLOC(data->output, data->size == 0 ? 1 : data->size); 21 data->end = data->output + data->size; 22 data->p = data->end; 23 data->start = data->end - data->size; 29 static int generic_write_finish_step(generic_write_data_t *data, 34 if (data->size < expected->len) { [all …]
|
D | test_suite_asn1write.data | 346 Store named data: not found 349 Store named data: empty haystack 352 Store named data: first 355 Store named data: last 358 Store named data: skip suffix 361 Store named data: skip prefix 364 Store named data: first match 367 Store named data: found, null to zero 370 Store named data: found, null to data 373 Store named data: found, data to zero [all …]
|
D | test_suite_psa_its.function | 10 * before changing how test data is constructed or validated. 87 void set_get_remove(int uid_arg, int flags_arg, data_t *data) 95 TEST_CALLOC(buffer, data->len); 97 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags)); 100 TEST_ASSERT(info.size == data->len); 102 PSA_ASSERT(psa_its_get(uid, 0, data->len, buffer, &ret_len)); 103 TEST_MEMORY_COMPARE(data->x, data->len, buffer, ret_len); 205 void get_at(int uid_arg, data_t *data, 221 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, 0)); 226 TEST_MEMORY_COMPARE(data->x + offset, (size_t) length_arg, [all …]
|
D | test_suite_constant_time_hmac.function | 30 /* TLS additional data is 13 bytes (hence the "lucky 13" name) */ 33 unsigned char *data = NULL; 89 TEST_CALLOC(data, max_in_len); 95 /* Set up dummy data and add_data */ 99 data[i] = (i & 0xff) ^ rec_num; 107 data, in_len, 112 data, in_len, 125 data, in_len)); 132 TEST_EQUAL(0, mbedtls_md_hmac_update(&ref_ctx, data, in_len)); 141 mbedtls_free(data); [all …]
|
D | test_suite_ecjpake.data | 22 ECJPAKE round one: KKP1: no data 31 ECJPAKE round one: KKP1: no point data 49 ECJPAKE round one: KKP1: no second point data 61 ECJPAKE round one: KKP1: no data for r 70 ECJPAKE round one: KKP2: no data 79 ECJPAKE round one: KKP2: no point data 97 ECJPAKE round one: KKP2: no second point data 109 ECJPAKE round one: KKP2: no data for r 124 ECJPAKE round two client: no data 136 ECJPAKE round two client: no data after ECParams [all …]
|
D | test_suite_pkcs5.function | 32 data_t *data, int outsize, int ref_ret, 52 pw->x, pw->len, data->x, data->len, my_out); 63 pw->x, pw->len, data->x, data->len, my_out, 80 data_t *data, int outsize, int ref_ret, 101 pw->x, pw->len, data->x, data->len, my_out); 112 pw->x, pw->len, data->x, data->len, my_out,
|
D | test_suite_pkcs12.function | 74 data_t *data, int outsize, int ref_ret, data_t *ref_out) 96 md_alg, pw->x, pw->len, data->x, data->len, my_out); 112 md_alg, pw->x, pw->len, data->x, data->len, my_out, 129 data_t *data, int outsize, int ref_ret, data_t *ref_out) 151 md_alg, pw->x, pw->len, data->x, data->len, my_out); 168 md_alg, pw->x, pw->len, data->x, data->len, my_out,
|
D | test_suite_psa_crypto_persistent_key.function | 12 * before changing how test data is constructed or validated. 124 uint8_t *data = NULL; 128 TEST_CALLOC(data, data_length); 135 TEST_EQUAL(psa_import_key(&attributes, data, data_length, &key_id), 143 mbedtls_free(data); 202 data_t *data, int restart, int expected_status) 214 TEST_EQUAL(psa_import_key(&attributes, data->x, data->len, &returned_key_id), 256 void import_export_persistent_key(data_t *data, int type_arg, 264 size_t export_size = data->len; 277 PSA_ASSERT(psa_import_key(&attributes, data->x, data->len, [all …]
|
D | test_suite_mps.function | 33 * - After processing, the consuming layer commits the data 41 * since the consumer's request can be fulfilled from the data 80 * - After processing, the consuming layer commits the data 88 * since the consumer's request can be fulfilled from the data 137 * - After processing, the consuming layer commits the data 145 * since the consumer's requests can be fulfilled from the data 149 /* Lower layer provides data that the upper layer fully consumes 273 * hold the requested amount of data. 276 * but it should be possible to continue fetching data as if 279 * because of data remaining. [all …]
|
/mbedtls-latest/library/ |
D | alignment.h | 412 #define MBEDTLS_GET_UINT32_BE(data, offset) \ argument 414 ? mbedtls_get_unaligned_uint32((data) + (offset)) \ 415 : MBEDTLS_BSWAP32(mbedtls_get_unaligned_uint32((data) + (offset))) \ 427 #define MBEDTLS_PUT_UINT32_BE(n, data, offset) \ argument 431 mbedtls_put_unaligned_uint32((data) + (offset), (uint32_t) (n)); \ 435 mbedtls_put_unaligned_uint32((data) + (offset), MBEDTLS_BSWAP32((uint32_t) (n))); \ 448 #define MBEDTLS_GET_UINT32_LE(data, offset) \ argument 450 ? MBEDTLS_BSWAP32(mbedtls_get_unaligned_uint32((data) + (offset))) \ 451 : mbedtls_get_unaligned_uint32((data) + (offset)) \ 464 #define MBEDTLS_PUT_UINT32_LE(n, data, offset) \ argument [all …]
|
D | psa_crypto.c | 718 if (slot->key.data != NULL) { in psa_allocate_buffer_to_slot() 722 slot->key.data = mbedtls_calloc(1, buffer_length); in psa_allocate_buffer_to_slot() 723 if (slot->key.data == NULL) { in psa_allocate_buffer_to_slot() 733 const uint8_t *data, in psa_copy_key_material_into_slot() argument 742 memcpy(slot->key.data, data, data_length); in psa_copy_key_material_into_slot() 748 const uint8_t *data, size_t data_length, in psa_import_key_into_slot() argument 770 memcpy(key_buffer, data, data_length); in psa_import_key_into_slot() 783 data, data_length, in psa_import_key_into_slot() 794 data, data_length, in psa_import_key_into_slot() 806 data, data_length, in psa_import_key_into_slot() [all …]
|
D | psa_crypto_storage.c | 77 const mbedtls_svc_key_id_t key, uint8_t *data, size_t data_size) in psa_crypto_storage_load() argument 89 status = psa_its_get(data_identifier, 0, (uint32_t) data_size, data, &data_length); in psa_crypto_storage_load() 129 const uint8_t *data, in psa_crypto_storage_store() argument 140 status = psa_its_set(data_identifier, (uint32_t) data_length, data, 0); in psa_crypto_storage_store() 236 void psa_format_key_data_for_storage(const uint8_t *data, in psa_format_key_data_for_storage() argument 254 memcpy(storage_format->key_data, data, data_length); in psa_format_key_data_for_storage() 257 static psa_status_t check_magic_header(const uint8_t *data) in check_magic_header() argument 259 if (memcmp(data, PSA_KEY_STORAGE_MAGIC_HEADER, in check_magic_header() 318 const uint8_t *data, in psa_save_persistent_key() argument 326 if (data == NULL || data_length == 0) { in psa_save_persistent_key() [all …]
|
D | psa_crypto_rsa.c | 60 psa_key_type_t type, const uint8_t *data, size_t data_length, in mbedtls_psa_rsa_load_representation() argument 74 status = mbedtls_to_psa_error(mbedtls_rsa_parse_key(*p_rsa, data, data_length)); in mbedtls_psa_rsa_load_representation() 76 status = mbedtls_to_psa_error(mbedtls_rsa_parse_pubkey(*p_rsa, data, data_length)); in mbedtls_psa_rsa_load_representation() 111 const uint8_t *data, size_t data_length, in mbedtls_psa_rsa_import_key() argument 120 data, in mbedtls_psa_rsa_import_key() 153 uint8_t *data, in mbedtls_psa_rsa_export_key() argument 158 uint8_t *end = data + data_size; in mbedtls_psa_rsa_export_key() 164 ret = mbedtls_rsa_write_key(rsa, data, &end); in mbedtls_psa_rsa_export_key() 166 ret = mbedtls_rsa_write_pubkey(rsa, data, &end); in mbedtls_psa_rsa_export_key() 171 memset(data, 0, data_size); in mbedtls_psa_rsa_export_key() [all …]
|
D | ssl_msg.c | 68 const unsigned char *data, in mbedtls_ct_hmac() argument 131 PSA_CHK(psa_hash_update(&operation, data, min_data_len)); in mbedtls_ct_hmac() 149 PSA_CHK(psa_hash_update(&operation, data + offset, 1)); in mbedtls_ct_hmac() 188 const unsigned char *data, in mbedtls_ct_hmac() argument 235 MD_CHK(mbedtls_md_update(ctx, data, min_data_len)); in mbedtls_ct_hmac() 252 MD_CHK(mbedtls_md_update(ctx, data + offset, 1)); in mbedtls_ct_hmac() 909 unsigned char *data; in mbedtls_ssl_encrypt_buf() local 955 data = rec->buf + rec->data_offset; in mbedtls_ssl_encrypt_buf() 958 data, rec->data_len); in mbedtls_ssl_encrypt_buf() 985 if (ssl_build_inner_plaintext(data, in mbedtls_ssl_encrypt_buf() [all …]
|
D | md5.c | 65 const unsigned char data[64]) in mbedtls_internal_md5_process() 71 local.X[0] = MBEDTLS_GET_UINT32_LE(data, 0); in mbedtls_internal_md5_process() 72 local.X[1] = MBEDTLS_GET_UINT32_LE(data, 4); in mbedtls_internal_md5_process() 73 local.X[2] = MBEDTLS_GET_UINT32_LE(data, 8); in mbedtls_internal_md5_process() 74 local.X[3] = MBEDTLS_GET_UINT32_LE(data, 12); in mbedtls_internal_md5_process() 75 local.X[4] = MBEDTLS_GET_UINT32_LE(data, 16); in mbedtls_internal_md5_process() 76 local.X[5] = MBEDTLS_GET_UINT32_LE(data, 20); in mbedtls_internal_md5_process() 77 local.X[6] = MBEDTLS_GET_UINT32_LE(data, 24); in mbedtls_internal_md5_process() 78 local.X[7] = MBEDTLS_GET_UINT32_LE(data, 28); in mbedtls_internal_md5_process() 79 local.X[8] = MBEDTLS_GET_UINT32_LE(data, 32); in mbedtls_internal_md5_process() [all …]
|
D | psa_crypto_driver_wrappers_no_static.c | 160 uint8_t *data, size_t data_size, size_t *data_length ) in psa_driver_wrapper_export_public_key() argument 184 data, data_size, data_length ) ); in psa_driver_wrapper_export_public_key() 203 data, in psa_driver_wrapper_export_public_key() 217 data, in psa_driver_wrapper_export_public_key() 228 data, in psa_driver_wrapper_export_public_key() 243 data, in psa_driver_wrapper_export_public_key() 256 data, in psa_driver_wrapper_export_public_key()
|
D | timing.c | 108 void mbedtls_timing_set_delay(void *data, uint32_t int_ms, uint32_t fin_ms) in mbedtls_timing_set_delay() argument 110 mbedtls_timing_delay_context *ctx = (mbedtls_timing_delay_context *) data; in mbedtls_timing_set_delay() 123 int mbedtls_timing_get_delay(void *data) in mbedtls_timing_get_delay() argument 125 mbedtls_timing_delay_context *ctx = (mbedtls_timing_delay_context *) data; in mbedtls_timing_get_delay() 149 const mbedtls_timing_delay_context *data) in mbedtls_timing_get_final_delay() argument 151 return data->fin_ms; in mbedtls_timing_get_final_delay()
|
/mbedtls-latest/tests/src/drivers/ |
D | test_driver_key_management.c | 267 const uint8_t *data, in mbedtls_test_transparent_import_key() argument 289 data, data_length, in mbedtls_test_transparent_import_key() 296 data, data_length, in mbedtls_test_transparent_import_key() 306 data, data_length, in mbedtls_test_transparent_import_key() 313 data, data_length, in mbedtls_test_transparent_import_key() 323 data, data_length, in mbedtls_test_transparent_import_key() 330 data, data_length, in mbedtls_test_transparent_import_key() 335 (void) data; in mbedtls_test_transparent_import_key() 349 const uint8_t *data, in mbedtls_test_opaque_import_key() argument 388 memcpy(key_buffer_temp, data, data_length); in mbedtls_test_opaque_import_key() [all …]
|
/mbedtls-latest/docs/ |
D | tls13-early-data.md | 2 Writing early data 5 An application function to write and send a buffer of data to a server through 33 where ssl is the SSL context to use, data_to_write the address of the data 34 buffer and data_to_write_len the number of data bytes. The handshake may 37 completing the handshake before to write and send data to the server. The 38 mbedtls_ssl_write() may not be able to write and send all data in one go thus 39 the need for a loop calling it as long as there are still data to write and 42 An application function to write and send early data and only early data, 43 data sent during the first flight of client messages while the handshake is in 77 All together, code to write and send a buffer of data as long as possible as [all …]
|
/mbedtls-latest/scripts/ |
D | generate_psa_constants.py | 303 data = {} 304 data['status_cases'] = self._make_status_cases() 305 data['ecc_curve_cases'] = self._make_ecc_curve_cases() 306 data['dh_group_cases'] = self._make_dh_group_cases() 307 data['key_type_cases'] = self._make_key_type_cases() 308 data['key_type_code'] = (self._make_ecc_key_type_code() + 310 data['hash_algorithm_cases'] = self._make_hash_algorithm_cases() 311 data['ka_algorithm_cases'] = self._make_ka_algorithm_cases() 312 data['algorithm_cases'] = self._make_algorithm_cases() 313 data['algorithm_code'] = self._make_algorithm_code() [all …]
|
D | code_size_compare.py | 483 def __init__(self, text: int, data: int, bss: int, dec: int): 485 self.data = data 515 data = line.split() 516 if re.match(r'\s*\(TOTALS\)', data[5]): 517 data[5] = mod + self.mod_total_suffix 519 size_record[data[5]] = CodeSizeGeneratorWithSize.SizeEntry( 520 int(data[0]), int(data[1]), int(data[2]), int(data[3])) 532 data = line.strip().split() 534 if data and data[0] in MBEDTLS_STATIC_LIB: 535 mod = data[0] [all …]
|
/mbedtls-latest/programs/ssl/ |
D | ssl_mail_client.c | 225 unsigned char data[128]; in write_ssl_and_get_response() local 238 len = sizeof(data) - 1; in write_ssl_and_get_response() 239 memset(data, 0, sizeof(data)); in write_ssl_and_get_response() 240 ret = mbedtls_ssl_read(ssl, data, len); in write_ssl_and_get_response() 255 mbedtls_printf("\n%s", data); in write_ssl_and_get_response() 258 if (data[i] != '\n') { in write_ssl_and_get_response() 260 code[idx++] = data[i]; in write_ssl_and_get_response() 278 unsigned char data[128]; in write_and_get_response() local 289 len = sizeof(data) - 1; in write_and_get_response() 290 memset(data, 0, sizeof(data)); in write_and_get_response() [all …]
|
/mbedtls-latest/tests/src/ |
D | psa_crypto_stubs.c | 26 uint8_t *data, in psa_export_key() argument 31 (void) data; in psa_export_key() 38 uint8_t *data, in psa_export_public_key() argument 43 (void) data; in psa_export_public_key() 64 const uint8_t *data, in psa_import_key() argument 69 (void) data; in psa_import_key()
|
/mbedtls-latest/tests/scripts/ |
D | audit-validity-dates.py | 116 def wrapper(data: bytes): 117 pem_type = X509Parser.pem_data_type(data) 120 return pem_loader(data) 126 result = der_loader(data) 143 def pem_data_type(data: bytes) -> typing.Optional[str]: 149 m = re.search(X509Parser.PEM_TAG_REGEX, data) 230 def parse_bytes(self, data: bytes): 234 result = self.parser[data_type](data) 290 data = f.read() 295 for idx, m in enumerate(re.finditer(X509Parser.PEM_REGEX, data, flags=re.S), 1): [all …]
|
/mbedtls-latest/tests/ |
D | CMakeLists.txt | 17 # generated .data files will go there 69 # Derive generated file paths in the build directory. The generated data 198 # Get the test names of the tests with generated .data files 207 # Remove the ".data" extension 216 # Remove the ".data" extension 225 # Remove the ".data" extension 234 # Remove the ".data" extension 243 ${CMAKE_CURRENT_BINARY_DIR}/suites/test_suite_${data_name}.data) 247 ${CMAKE_CURRENT_BINARY_DIR}/suites/test_suite_${data_name}.data) 251 ${CMAKE_CURRENT_BINARY_DIR}/suites/test_suite_${data_name}.data) [all …]
|