Home
last modified time | relevance | path

Searched refs:e (Results 1 – 25 of 76) sorted by relevance

1234

/mbedtls-latest/tests/suites/
Dtest_suite_debug.data32 …6 bytes)\nMyFile(0999)\: 0000\: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................…
35 …7 bytes)\nMyFile(0999)\: 0000\: 00 01 02 03 04 05 06 07 08 09 0a 0b 0c 0d 0e 0f ................…
38e 0f ................\nMyFile(0999)\: 0010\: 10 11 12 13 14 15 16 17 18 19 1a 1b 1c 1d 1e 1f ..…
53e 62 90 ff\nMyFile(0999)\: e7 03 f4 ea 59 63 bf 21 27 13 ce e4 6b 10 7c 09\nMyFile(0999)\: 18 2b…
56e 62 90\nMyFile(0999)\: ff e7 03 f4 ea 59 63 bf 21 27 13 ce e4 6b 10 7c\nMyFile(0999)\: 09 18 2b…
59e 62 90\nMyFile(0999)\: ff e7 03 f4 ea 59 63 bf 21 27 13 ce e4 6b 10 7c\nMyFile(0999)\: 09 18 2b…
63e\nMyFile(0999)\: 15 61 5e 89 bf b8 e8 45 90 db ee 88 16 52 d3 f1\nMyFile(0999)\: 43 50 47 96 12…
67e e0 6e c3 0e 57 53 33 39 58 d4 52 b4 91 95\nMyFile(0999)\: 39 0b 23 df 5f 17 24 62 48 fc 1a 95 2…
Dtest_suite_pem.data58 # length read from the decoded ASN.1 data (i.e. extra padding, if any, is ignored).
69 # echo -n -e "\x68\x65\x6c\x6c\x6f\x20\x77\x6f\x72\x6c\x64\x01\x02\x03\x04\x05" | openssl aes-128…
76 # echo -n -e "\x68\x65\x6c\x6c\x6f\x20\x77\x6f\x72\x6c\x64\x11\x11\x11\x11\x11" | openssl aes-128…
83 # echo -n -e "\x68\x65\x6c\x6c\x6f\x09\x09\x09" | openssl des-cbc -e -base64 -p -K "bbb0ddff1b944…
Dtest_suite_asn1parse.data407 get_bitstring:"030200417e":1:0:MBEDTLS_ERR_ASN1_LENGTH_MISMATCH:0
410 get_bitstring:"030207417e":1:7:MBEDTLS_ERR_ASN1_LENGTH_MISMATCH:MBEDTLS_ERR_ASN1_INVALID_DATA
413 get_bitstring:"030208417e":1:8:MBEDTLS_ERR_ASN1_INVALID_LENGTH:MBEDTLS_ERR_ASN1_INVALID_DATA
422 get_sequence_of:"30007e":0x04:"":MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
491 traverse_sequence_of:"30007e":0:0:0:0:"":MBEDTLS_ERR_ASN1_LENGTH_MISMATCH
Dtest_suite_ctr_drbg.function460 // test all increments from 2^n - 1 to 2^n (i.e. where we roll over into the next bit)
465 // set least significant (highest address) n bits to 1, i.e. generate (2^n - 1)
474 // now generate a reference result equal to 2^n - i.e. set only bit (n + 1)
475 // if n == 127, this will not set any bits (i.e. wraps to 0).
Dtest_suite_platform.data11 # can be avoided with e.g. ASAN_OPTIONS=allocator_may_return_null=1,
Dmain_test.function93 * \brief Checks if the dependency i.e. the compile flag is set.
242 * from another directory (e.g. the project root) and still access
/mbedtls-latest/scripts/
Dgenerate_driver_wrappers.py108 except JsonValidationException as e:
109 raise DriverReaderException from e
154 def trace_exception(e: Exception, file=sys.stderr) -> None:
157 e.__class__, str(e), format_tb(e.__traceback__)
204 except DriverReaderException as e:
205 trace_exception(e)
Dcode_size_compare.py362 except subprocess.CalledProcessError as e:
363 self._handle_called_process_error(e, git_worktree_path)
380 except subprocess.CalledProcessError as e:
381 self._handle_called_process_error(e, git_worktree_path)
396 def _handle_called_process_error(self, e: subprocess.CalledProcessError,
402 self.logger.error(e, exc_info=True)
403 self.logger.error("Process output:\n {}".format(e.output))
Dassemble_changelog.py207 except CategoryParseError as e:
208 raise InputFormatError(filename, line_offset + e.line_offset,
209 e.error_message)
/mbedtls-latest/library/
Decdsa.c254 mbedtls_mpi k, e, t; in mbedtls_ecdsa_sign_restartable() local
268 mbedtls_mpi_init(&k); mbedtls_mpi_init(&e); mbedtls_mpi_init(&t); in mbedtls_ecdsa_sign_restartable()
340 MBEDTLS_MPI_CHK(derive_mpi(grp, &e, buf, blen)); in mbedtls_ecdsa_sign_restartable()
353 MBEDTLS_MPI_CHK(mbedtls_mpi_add_mpi(&e, &e, s)); in mbedtls_ecdsa_sign_restartable()
354 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(&e, &e, &t)); in mbedtls_ecdsa_sign_restartable()
358 MBEDTLS_MPI_CHK(mbedtls_mpi_mul_mpi(s, s, &e)); in mbedtls_ecdsa_sign_restartable()
370 mbedtls_mpi_free(&k); mbedtls_mpi_free(&e); mbedtls_mpi_free(&t); in mbedtls_ecdsa_sign_restartable()
496 mbedtls_mpi e, s_inv, u1, u2; in mbedtls_ecdsa_verify_restartable() local
501 mbedtls_mpi_init(&e); mbedtls_mpi_init(&s_inv); in mbedtls_ecdsa_verify_restartable()
536 MBEDTLS_MPI_CHK(derive_mpi(grp, &e, buf, blen)); in mbedtls_ecdsa_verify_restartable()
[all …]
Daesce.c535 uint8x16_t c, d, e; in poly_mult_128() local
541 e = pmull_low(a, c); /* :e2:e1:00 = a0*b1 */ in poly_mult_128()
542 m = veorq_u8(d, e); /* :m2:m1:00 = d + e */ in poly_mult_128()
577 uint8x16_t c, d, e, f, g, n, o; in poly_mult_reduce() local
583 e = veorq_u8(c, m); /* :e2:e1:00 = m2:m1:00 + c2:c1:00 */ in poly_mult_reduce()
584 f = pmull_high(e, MODULO); /* : :f1:f0 = reduction of e2 */ in poly_mult_reduce()
585 g = vextq_u8(ZERO, e, 8); /* : :g1:00 = e1:00 */ in poly_mult_reduce()
Dbn_mul.h47 #define MBEDTLS_BYTES_TO_T_UINT_8(a, b, c, d, e, f, g, h) \ argument
49 MBEDTLS_BYTES_TO_T_UINT_4(e, f, g, h)
53 #define MBEDTLS_BYTES_TO_T_UINT_8(a, b, c, d, e, f, g, h) \ argument
58 ((mbedtls_mpi_uint) (e) << 32) | \
Dripemd160.c107 #define P(a, b, c, d, e, r, s, f, k) \ in mbedtls_internal_ripemd160_process() argument
111 (a) = S((a), (s)) + (e); \ in mbedtls_internal_ripemd160_process()
115 #define P2(a, b, c, d, e, r, s, rp, sp) \ in mbedtls_internal_ripemd160_process() argument
118 P((a), (b), (c), (d), (e), (r), (s), F, K); \ in mbedtls_internal_ripemd160_process()
119 P(a ## p, b ## p, c ## p, d ## p, e ## p, \ in mbedtls_internal_ripemd160_process()
/mbedtls-latest/tests/scripts/
Dcheck_test_cases.py231 except ScriptOutputError as e:
232 results.error(e.script_name, e.idx,
234 e.line)
Dtest-ref-configs.pl69 if (!-e "tests/seedfile" || -s "tests/seedfile" < 64) {
/mbedtls-latest/docs/architecture/testing/
Ddriver-interface-test-strategy.md43 …n a secure element with a driver that does not have the requisite method (i.e. the method pointer …
44 …with a driver that does not have the substructure containing that method (i.e. the pointer to the …
64 * Expected errors (e.g. `PSA_ERROR_INVALID_SIGNATURE` from a signature verification method).
87 * This must be done for each possible flow, including error cases (e.g. a key creation that fails m…
90 * Check both that the storage has the expected content (this can be done by e.g. using a key that i…
103 * Run at least one test application (e.g. the Mbed OS TLS example).
/mbedtls-latest/3rdparty/p256-m/p256-m/
Dp256-m.c1419 uint32_t e[8]; in p256_ecdsa_verify() local
1420 ecdsa_m256_from_hash(e, hash, hlen); in p256_ecdsa_verify()
1426 m256_mul(u1, e, s, &p256_n); /* u1 = e * s^-1 mod n */ in p256_ecdsa_verify()
1440 scalar_mult(e, s, px, py, u2); /* (e, s) = R2 = u2 * Qu */ in p256_ecdsa_verify()
1444 u256_cmov(u1, e, 1); in p256_ecdsa_verify()
1450 point_add_or_double_leaky(u1, u2, px, py, e, s); in p256_ecdsa_verify()
/mbedtls-latest/3rdparty/everest/library/
DHacl_Curve25519.c734 uint8_t e[32U] = { 0U }; in Hacl_Curve25519_crypto_scalarmult() local
741 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
742 e0 = e[0U]; in Hacl_Curve25519_crypto_scalarmult()
743 e31 = e[31U]; in Hacl_Curve25519_crypto_scalarmult()
747 e[0U] = e01; in Hacl_Curve25519_crypto_scalarmult()
748 e[31U] = e312; in Hacl_Curve25519_crypto_scalarmult()
749 scalar = e; in Hacl_Curve25519_crypto_scalarmult()
/mbedtls-latest/3rdparty/everest/library/legacy/
DHacl_Curve25519.c779 uint8_t e[32U] = { 0U }; in Hacl_Curve25519_crypto_scalarmult() local
786 memcpy(e, secret, (uint32_t)32U * sizeof secret[0U]); in Hacl_Curve25519_crypto_scalarmult()
787 e0 = e[0U]; in Hacl_Curve25519_crypto_scalarmult()
788 e31 = e[31U]; in Hacl_Curve25519_crypto_scalarmult()
792 e[0U] = e01; in Hacl_Curve25519_crypto_scalarmult()
793 e[31U] = e312; in Hacl_Curve25519_crypto_scalarmult()
794 scalar = e; in Hacl_Curve25519_crypto_scalarmult()
/mbedtls-latest/programs/fuzz/
DREADME.md52 * Extract tcp payloads, for instance with tshark : `tshark -Tfields -e tcp.dstport -e tcp.payload -…
/mbedtls-latest/
DBRANCHES.md22 API compatibility in the `main` branch across minor version changes (e.g.
24 compatibility on major version changes (e.g. from 3.x to 4.0). We also maintain
60 change is a reasonable extension of the current behavior, i.e. the
DCONTRIBUTING.md60 …e files (e.g. `test_suite_rsa.c`). These files are generated from a `function file` (e.g. `suites/…
91 All new files should include the standard SPDX license identifier where possible, i.e. "SPDX-Licens…
D.uncrustify.cfg136 # But allow a space in the case of e.g. char * const x;
145 # Force exactly 1 space between a statement keyword (e.g. 'if') and an opening parenthesis
/mbedtls-latest/docs/
Ddriver-only-builds.md114 - HMAC algorithm and key type, i.e. `[PSA_WANT|MBEDTLS_PSA_ACCEL]_ALG_HMAC` and
127 - disabling HMAC_DRBG_C cause deterministic ECDSA (i.e.
278 removing builtin support (i.e. `MBEDTLS_DHM_C`).
395 Note that the relationship between legacy (i.e. `MBEDTLS_xxx_C`) and PSA
396 (i.e. `PSA_WANT_xxx`) symbols is not always 1:1. For example:
436 - AES is supported on the PSA side together with ECB mode, i.e.
/mbedtls-latest/docs/architecture/
Dpsa-crypto-implementation-structure.md115 Constants (algorithm identifiers, key type identifiers, etc.) and associated destructor macros (e.g…
146 …hm or key type, there are typically things to change in `library/crypto.c` (e.g. buffer size calcu…
170 * Potential edge cases (e.g. data less/equal/more than the block size, number equal to zero in asym…
171 * Tests with invalid keys (e.g. wrong size or format).
172 * Tests with invalid data (e.g. wrong size or format, output buffer too small, invalid padding).

1234