/mbedtls-latest/tests/suites/ |
D | test_suite_debug.data | 32 …6 bytes)\nMyFile(0999)\: 0000\: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................… 35 …7 bytes)\nMyFile(0999)\: 0000\: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................… 38 …e 0f ................\nMyFile(0999)\: 0010\: 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ..… 53 …e 62 90 ff\nMyFile(0999)\: e7 03 f4 ea 59 63 bf 21 27 13 ce e4 6b 10 7c 09\nMyFile(0999)\: 18 2b… 56 …e 62 90\nMyFile(0999)\: ff e7 03 f4 ea 59 63 bf 21 27 13 ce e4 6b 10 7c\nMyFile(0999)\: 09 18 2b… 59 …e 62 90\nMyFile(0999)\: ff e7 03 f4 ea 59 63 bf 21 27 13 ce e4 6b 10 7c\nMyFile(0999)\: 09 18 2b… 63 …e\nMyFile(0999)\: 15 61 5e 89 bf b8 e8 45 90 db ee 88 16 52 d3 f1\nMyFile(0999)\: 43 50 47 96 12… 67 …e e0 6e c3 0e 57 53 33 39 58 d4 52 b4 91 95\nMyFile(0999)\: 39 0b 23 df 5f 17 24 62 48 fc 1a 95 2…
|
D | test_suite_pem.data | 58 # length read from the decoded ASN.1 data (i.e. extra padding, if any, is ignored). 69 # echo -n -e "\x68\x65\x6c\x6c\x6f\x20\x77\x6f\x72\x6c\x64\x01\x02\x03\x04\x05" | openssl aes-128… 76 # echo -n -e "\x68\x65\x6c\x6c\x6f\x20\x77\x6f\x72\x6c\x64\x11\x11\x11\x11\x11" | openssl aes-128… 83 # echo -n -e "\x68\x65\x6c\x6c\x6f\x09\x09\x09" | openssl des-cbc -e -base64 -p -K "bbb0ddff1b944…
|
D | test_suite_asn1parse.data | 407 get_bitstring:"030200417e":1:0:MBEDTLS_ERR_ASN1_LENGTH_MISMATCH:0 410 get_bitstring:"030207417e":1:7:MBEDTLS_ERR_ASN1_LENGTH_MISMATCH:MBEDTLS_ERR_ASN1_INVALID_DATA 413 get_bitstring:"030208417e":1:8:MBEDTLS_ERR_ASN1_INVALID_LENGTH:MBEDTLS_ERR_ASN1_INVALID_DATA 422 get_sequence_of:"30007e":0x04:"":MBEDTLS_ERR_ASN1_LENGTH_MISMATCH 491 traverse_sequence_of:"30007e":0:0:0:0:"":MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
|
D | test_suite_ctr_drbg.function | 460 // test all increments from 2^n - 1 to 2^n (i.e. where we roll over into the next bit) 465 // set least significant (highest address) n bits to 1, i.e. generate (2^n - 1) 474 // now generate a reference result equal to 2^n - i.e. set only bit (n + 1) 475 // if n == 127, this will not set any bits (i.e. wraps to 0).
|
D | test_suite_platform.data | 11 # can be avoided with e.g. ASAN_OPTIONS=allocator_may_return_null=1,
|
D | main_test.function | 93 * \brief Checks if the dependency i.e. the compile flag is set. 242 * from another directory (e.g. the project root) and still access
|
/mbedtls-latest/scripts/ |
D | generate_driver_wrappers.py | 108 except JsonValidationException as e: 109 raise DriverReaderException from e 154 def trace_exception(e: Exception, file=sys.stderr) -> None: 157 e.__class__, str(e), format_tb(e.__traceback__) 204 except DriverReaderException as e: 205 trace_exception(e)
|
D | code_size_compare.py | 362 except subprocess.CalledProcessError as e: 363 self._handle_called_process_error(e, git_worktree_path) 380 except subprocess.CalledProcessError as e: 381 self._handle_called_process_error(e, git_worktree_path) 396 def _handle_called_process_error(self, e: subprocess.CalledProcessError, 402 self.logger.error(e, exc_info=True) 403 self.logger.error("Process output:\n {}".format(e.output))
|
D | assemble_changelog.py | 207 except CategoryParseError as e: 208 raise InputFormatError(filename, line_offset + e.line_offset, 209 e.error_message)
|
/mbedtls-latest/library/ |
D | ecdsa.c | 254 mbedtls_mpi k, e, t; in mbedtls_ecdsa_sign_restartable() local 268 mbedtls_mpi_init(&k); mbedtls_mpi_init(&e); mbedtls_mpi_init(&t); in mbedtls_ecdsa_sign_restartable() 340 MBEDTLS_MPI_CHK(derive_mpi(grp, &e, buf, blen)); in mbedtls_ecdsa_sign_restartable() 353 MBEDTLS_MPI_CHK(mbedtls_mpi_add_mpi(&e, &e, s)); in mbedtls_ecdsa_sign_restartable() 354 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(&e, &e, &t)); in mbedtls_ecdsa_sign_restartable() 358 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(s, s, &e)); in mbedtls_ecdsa_sign_restartable() 370 mbedtls_mpi_free(&k); mbedtls_mpi_free(&e); mbedtls_mpi_free(&t); in mbedtls_ecdsa_sign_restartable() 496 mbedtls_mpi e, s_inv, u1, u2; in mbedtls_ecdsa_verify_restartable() local 501 mbedtls_mpi_init(&e); mbedtls_mpi_init(&s_inv); in mbedtls_ecdsa_verify_restartable() 536 MBEDTLS_MPI_CHK(derive_mpi(grp, &e, buf, blen)); in mbedtls_ecdsa_verify_restartable() [all …]
|
D | aesce.c | 535 uint8x16_t c, d, e; in poly_mult_128() local 541 e = pmull_low(a, c); /* :e2:e1:00 = a0*b1 */ in poly_mult_128() 542 m = veorq_u8(d, e); /* :m2:m1:00 = d + e */ in poly_mult_128() 577 uint8x16_t c, d, e, f, g, n, o; in poly_mult_reduce() local 583 e = veorq_u8(c, m); /* :e2:e1:00 = m2:m1:00 + c2:c1:00 */ in poly_mult_reduce() 584 f = pmull_high(e, MODULO); /* : :f1:f0 = reduction of e2 */ in poly_mult_reduce() 585 g = vextq_u8(ZERO, e, 8); /* : :g1:00 = e1:00 */ in poly_mult_reduce()
|
D | bn_mul.h | 47 #define MBEDTLS_BYTES_TO_T_UINT_8(a, b, c, d, e, f, g, h) \ argument 49 MBEDTLS_BYTES_TO_T_UINT_4(e, f, g, h) 53 #define MBEDTLS_BYTES_TO_T_UINT_8(a, b, c, d, e, f, g, h) \ argument 58 ((mbedtls_mpi_uint) (e) << 32) | \
|
D | ripemd160.c | 107 #define P(a, b, c, d, e, r, s, f, k) \ in mbedtls_internal_ripemd160_process() argument 111 (a) = S((a), (s)) + (e); \ in mbedtls_internal_ripemd160_process() 115 #define P2(a, b, c, d, e, r, s, rp, sp) \ in mbedtls_internal_ripemd160_process() argument 118 P((a), (b), (c), (d), (e), (r), (s), F, K); \ in mbedtls_internal_ripemd160_process() 119 P(a ## p, b ## p, c ## p, d ## p, e ## p, \ in mbedtls_internal_ripemd160_process()
|
/mbedtls-latest/tests/scripts/ |
D | check_test_cases.py | 231 except ScriptOutputError as e: 232 results.error(e.script_name, e.idx, 234 e.line)
|
D | test-ref-configs.pl | 69 if (!-e "tests/seedfile" || -s "tests/seedfile" < 64) {
|
/mbedtls-latest/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 43 …n a secure element with a driver that does not have the requisite method (i.e. the method pointer … 44 …with a driver that does not have the substructure containing that method (i.e. the pointer to the … 64 * Expected errors (e.g. `PSA_ERROR_INVALID_SIGNATURE` from a signature verification method). 87 * This must be done for each possible flow, including error cases (e.g. a key creation that fails m… 90 * Check both that the storage has the expected content (this can be done by e.g. using a key that i… 103 * Run at least one test application (e.g. the Mbed OS TLS example).
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | p256-m.c | 1419 uint32_t e[8]; in p256_ecdsa_verify() local 1420 ecdsa_m256_from_hash(e, hash, hlen); in p256_ecdsa_verify() 1426 m256_mul(u1, e, s, &p256_n); /* u1 = e * s^-1 mod n */ in p256_ecdsa_verify() 1440 scalar_mult(e, s, px, py, u2); /* (e, s) = R2 = u2 * Qu */ in p256_ecdsa_verify() 1444 u256_cmov(u1, e, 1); in p256_ecdsa_verify() 1450 point_add_or_double_leaky(u1, u2, px, py, e, s); in p256_ecdsa_verify()
|
/mbedtls-latest/3rdparty/everest/library/ |
D | Hacl_Curve25519.c | 734 uint8_t e[32U] = { 0U }; in Hacl_Curve25519_crypto_scalarmult() local 741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult() 742 e0 = e[0U]; in Hacl_Curve25519_crypto_scalarmult() 743 e31 = e[31U]; in Hacl_Curve25519_crypto_scalarmult() 747 e[0U] = e01; in Hacl_Curve25519_crypto_scalarmult() 748 e[31U] = e312; in Hacl_Curve25519_crypto_scalarmult() 749 scalar = e; in Hacl_Curve25519_crypto_scalarmult()
|
/mbedtls-latest/3rdparty/everest/library/legacy/ |
D | Hacl_Curve25519.c | 779 uint8_t e[32U] = { 0U }; in Hacl_Curve25519_crypto_scalarmult() local 786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult() 787 e0 = e[0U]; in Hacl_Curve25519_crypto_scalarmult() 788 e31 = e[31U]; in Hacl_Curve25519_crypto_scalarmult() 792 e[0U] = e01; in Hacl_Curve25519_crypto_scalarmult() 793 e[31U] = e312; in Hacl_Curve25519_crypto_scalarmult() 794 scalar = e; in Hacl_Curve25519_crypto_scalarmult()
|
/mbedtls-latest/programs/fuzz/ |
D | README.md | 52 * Extract tcp payloads, for instance with tshark : `tshark -Tfields -e tcp.dstport -e tcp.payload -…
|
/mbedtls-latest/ |
D | BRANCHES.md | 22 API compatibility in the `main` branch across minor version changes (e.g. 24 compatibility on major version changes (e.g. from 3.x to 4.0). We also maintain 60 change is a reasonable extension of the current behavior, i.e. the
|
D | CONTRIBUTING.md | 60 …e files (e.g. `test_suite_rsa.c`). These files are generated from a `function file` (e.g. `suites/… 91 All new files should include the standard SPDX license identifier where possible, i.e. "SPDX-Licens…
|
D | .uncrustify.cfg | 136 # But allow a space in the case of e.g. char * const x; 145 # Force exactly 1 space between a statement keyword (e.g. 'if') and an opening parenthesis
|
/mbedtls-latest/docs/ |
D | driver-only-builds.md | 114 - HMAC algorithm and key type, i.e. `[PSA_WANT|MBEDTLS_PSA_ACCEL]_ALG_HMAC` and 127 - disabling HMAC_DRBG_C cause deterministic ECDSA (i.e. 278 removing builtin support (i.e. `MBEDTLS_DHM_C`). 395 Note that the relationship between legacy (i.e. `MBEDTLS_xxx_C`) and PSA 396 (i.e. `PSA_WANT_xxx`) symbols is not always 1:1. For example: 436 - AES is supported on the PSA side together with ECB mode, i.e.
|
/mbedtls-latest/docs/architecture/ |
D | psa-crypto-implementation-structure.md | 115 Constants (algorithm identifiers, key type identifiers, etc.) and associated destructor macros (e.g… 146 …hm or key type, there are typically things to change in `library/crypto.c` (e.g. buffer size calcu… 170 * Potential edge cases (e.g. data less/equal/more than the block size, number equal to zero in asym… 171 * Tests with invalid keys (e.g. wrong size or format). 172 * Tests with invalid data (e.g. wrong size or format, output buffer too small, invalid padding).
|