/mbedtls-latest/tests/suites/ |
D | test_suite_x509parse.function | 66 static int verify_none(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 76 static int verify_all(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 88 static int ca_callback_fail(void *data, mbedtls_x509_crt const *child, 98 static int ca_callback(void *data, mbedtls_x509_crt const *child, 101 int ret = 0; 148 static int verify_fatal(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 150 int *levels = (int *) data; 204 static int verify_print(void *data, mbedtls_x509_crt *crt, int certificate_depth, uint32_t *flags) 206 int ret; 232 static int verify_parse_san(mbedtls_x509_subject_alternative_name *san, [all …]
|
D | test_suite_psa_crypto_persistent_key.function | 47 int key_lifetime, int key_type, int key_bits, 48 int key_usage, int key_alg, int key_alg2) 78 int expected_key_lifetime, 79 int expected_key_type, 80 int expected_key_bits, 81 int expected_key_usage, 82 int expected_key_alg, 83 int expected_key_alg2, 84 int expected_status) 121 void save_large_persistent_key(int data_length_arg, int expected_status) [all …]
|
D | test_suite_asn1parse.function | 19 static int nested_parse(unsigned char **const p, 22 int ret; 51 int val = -257; 73 /* If we're sure that the number fits in an int, also 75 if (ret == 0 && len < sizeof(int)) { 76 int val = -257; 125 static int get_len_step(const data_t *input, size_t buffer_size, 132 int ret; 182 static int traverse_callback(void *ctx, int tag, 227 int full_result, [all …]
|
D | test_suite_pkcs12.function | 18 void pkcs12_derive_key(int md_type, int key_size_arg, 19 data_t *password_arg, int password_usage, 20 data_t *salt_arg, int salt_usage, 21 int iterations, 22 data_t *expected_output, int expected_status) 49 int ret = mbedtls_pkcs12_derivation(output_data, 73 void pkcs12_pbe_encrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw, 74 data_t *data, int outsize, int ref_ret, data_t *ref_out) 76 int my_ret; 128 void pkcs12_pbe_decrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw, [all …]
|
D | test_suite_psa_crypto_op_fail.function | 6 static int test_equal_status(const char *test, 7 int line_no, const char *filename, 45 void hash_fail(int alg_arg, int expected_status_arg) 72 void mac_fail(int key_type_arg, data_t *key_data, 73 int alg_arg, int expected_status_arg) 118 void cipher_fail(int key_type_arg, data_t *key_data, 119 int alg_arg, int expected_status_arg) 164 void aead_fail(int key_type_arg, data_t *key_data, 165 int alg_arg, int expected_status_arg) 212 void sign_fail(int key_type_arg, data_t *key_data, [all …]
|
D | test_suite_psa_crypto_attributes.function | 11 void attributes_set_get(int owner_id_arg, int id_arg, int lifetime_arg, 12 int usage_flags_arg, int alg_arg, 13 int type_arg, int bits_arg) 63 void persistence_attributes(int id1_arg, int owner_id1_arg, int lifetime_arg, 64 int id2_arg, int owner_id2_arg, 65 int expected_id_arg, int expected_owner_id_arg, 66 int expected_lifetime_arg)
|
D | test_suite_constant_time.function | 95 void mbedtls_ct_uchar_in_range_if(int li, int hi, int ti) 118 void mbedtls_ct_error_if(int cond, int t, int f) 122 int expected = c ? t : f; 123 int expected0 = c ? t : 0; 175 void mbedtls_ct_zeroize_if(char *c_str, int len) 209 int result = mbedtls_ct_memcmp(a, b, size); 243 void mbedtls_ct_memcmp(int same, int size, int offset) 253 for (int i = 0; i < size + offset; i++) { 262 int reference = memcmp(a + offset, b + offset, size); 267 int actual = mbedtls_ct_memcmp(a + offset, b + offset, size); [all …]
|
D | test_suite_cipher.function | 15 static int check_cipher_info(mbedtls_cipher_type_t type, 98 static int cipher_reset_key(mbedtls_cipher_context_t *ctx, int cipher_id, 99 int use_psa, size_t tag_len, const data_t *key, int direction) 132 static int buffer_is_all_zero(const uint8_t *buf, size_t size) 153 const int *cipher_type; 174 int valid_size = sizeof(valid_buffer); 175 int valid_bitlen = valid_size * 8; 176 const int *cipher_list = mbedtls_cipher_list(); 300 int valid_size = sizeof(valid_buffer); 301 int valid_bitlen = valid_size * 8; [all …]
|
D | test_suite_pkcs1_v21.function | 11 void pkcs1_rsaes_oaep_encrypt(int mod, data_t *input_N, data_t *input_E, 12 int hash, data_t *message_str, data_t *rnd_buf, 13 data_t *result_str, int result) 62 void pkcs1_rsaes_oaep_decrypt(int mod, data_t *input_P, data_t *input_Q, 63 data_t *input_N, data_t *input_E, int hash, 65 int result) 126 void pkcs1_rsassa_pss_sign(int mod, data_t *input_P, data_t *input_Q, 127 data_t *input_N, data_t *input_E, int digest, 128 int hash, data_t *hash_digest, data_t *rnd_buf, 129 data_t *result_str, int fixed_salt_length, [all …]
|
D | test_suite_rsa.function | 16 const int invalid_padding = 42; 17 const int invalid_hash_id = 0xff; 137 void rsa_init_free(int reinit) 161 void mbedtls_rsa_pkcs1_sign(data_t *message_str, int padding_mode, 162 int digest, int mod, char *input_P, 164 data_t *result_str, int result) 209 void mbedtls_rsa_pkcs1_verify(data_t *message_str, int padding_mode, 210 int digest, int mod, 212 data_t *result_str, int result) 241 int padding_mode, int mod, [all …]
|
D | test_suite_bignum.function | 16 static int sign_is_valid(const mbedtls_mpi *X) 49 static int mbedtls_test_mpi_miller_rabin_determinizer(void *state, 81 static int f_rng_bytes_left(void *state, unsigned char *buf, size_t len) 122 void mpi_read_write_string(int radix_X, char *input_X, int radix_A, 123 char *input_A, int output_size, int result_read, 124 int result_write) 211 int output_size, int result) 242 int output_size, int result) 272 void mpi_read_file(char *input_file, data_t *input_A, int result) 278 int ret; [all …]
|
D | test_suite_ccm.function | 7 static int check_multipart(mbedtls_ccm_context *ctx, 8 int mode, 17 int ok = 0; 79 void mbedtls_ccm_setkey(int cipher_id, int key_size, int result) 83 int ret; 101 void ccm_lengths(int msg_len, int iv_len, int add_len, int tag_len, int res) 110 int decrypt_ret; 145 void ccm_star_lengths(int msg_len, int iv_len, int add_len, int tag_len, 146 int res) 155 int decrypt_ret; [all …]
|
D | test_suite_cmac.function | 102 void mbedtls_cmac_setkey(int cipher_type, int key_size, int result) 128 void mbedtls_cmac_multiple_blocks(int cipher_type, data_t *key, 129 int keybits, int block_size, 130 data_t *block1, int block1_len, 131 data_t *block2, int block2_len, 132 data_t *block3, int block3_len, 133 data_t *block4, int block4_len, 196 void mbedtls_cmac_multiple_operations_same_key(int cipher_type, 197 data_t *key, int keybits, 198 int block_size, [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 7 int pake_in_driver = 0; 16 static void ecjpake_do_round(psa_algorithm_t alg, unsigned int primitive, 19 int client_input_first, 20 int round) 428 static int sanity_check_rsa_encryption_result( 442 int ok = 0; 508 void sign_hash(int key_type_arg, 509 int alg_arg, 510 int force_status_arg, 514 int fake_output, [all …]
|
D | test_suite_nist_kw.function | 125 void mbedtls_nist_kw_setkey(int cipher_id, int key_size, 126 int is_wrap, int result) 130 int ret; 146 void nist_kw_plaintext_lengths(int in_len, int out_len, int mode, int res) 193 void nist_kw_ciphertext_lengths(int in_len, int out_len, int mode, int res) 199 int unwrap_ret; 237 void mbedtls_nist_kw_wrap(int cipher_id, int mode, data_t *key, data_t *msg, 271 void mbedtls_nist_kw_unwrap(int cipher_id, int mode, data_t *key, data_t *msg, 272 data_t *expected_result, int expected_ret)
|
D | test_suite_hkdf.function | 12 void test_hkdf(int md_alg, data_t *ikm, data_t *salt, data_t *info, 15 int ret; 38 void test_hkdf_extract(int md_alg, 43 int ret; 68 void test_hkdf_expand(int md_alg, 74 int ret; 100 void test_hkdf_extract_ret(int hash_len, int ret) 102 int output_ret; 127 void test_hkdf_expand_ret(int hash_len, int prk_len, int okm_len, int ret) 129 int output_ret;
|
D | test_suite_pk.function | 190 static int get_predefined_key_data(int is_ec, int group_id_or_keybits, 257 static int pk_setup(mbedtls_pk_context *pk, mbedtls_pk_type_t pk_type, int curve_or_keybits) 263 int ret = MBEDTLS_ERR_PK_BAD_INPUT_DATA; 396 static int pk_public_same(const mbedtls_pk_context *pk1, 399 int ok = 0; 416 int len1 = mbedtls_rsa_write_pubkey(rsa1, buf1, &p1); 420 int len2 = mbedtls_rsa_write_pubkey(rsa2, buf2, &p2); 471 static int mbedtls_rsa_decrypt_func(void *ctx, size_t *olen, 479 static int mbedtls_rsa_sign_func(void *ctx, 480 int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, [all …]
|
D | test_suite_psa_crypto_metadata.function | 109 static int has_even_parity(uint32_t value) 195 static void mac_algorithm_core(psa_algorithm_t alg, int classification_flags, 221 static void aead_algorithm_core(psa_algorithm_t alg, int classification_flags, 251 void hash_algorithm(int alg_arg, int length_arg) 295 void mac_algorithm(int alg_arg, int classification_flags, 296 int length_arg, 297 int key_type_arg, int key_bits_arg) 375 void hmac_algorithm(int alg_arg, 376 int length_arg, 377 int block_size_arg) [all …]
|
D | test_suite_psa_crypto.function | 56 static int mem_is_char(void *buffer, unsigned char c, size_t size) 68 static int asn1_write_10x(unsigned char **p, 73 int ret; 74 int len = bits / 8 + 1; 97 static int construct_fake_rsa_key(unsigned char *buffer, 101 int keypair) 104 int ret; 105 int len = 0; 156 static int exercise_mac_setup(psa_key_type_t key_type, 188 static int exercise_cipher_setup(psa_key_type_t key_type, [all …]
|
D | test_suite_psa_crypto_init.function | 11 static int check_stats(void) 55 static int fake_entropy_source(void *state_arg, 136 int do_init; 156 int can_do = psa_can_do_hash(PSA_ALG_NONE); 202 void init_deinit(int count) 205 int i; 228 void deinit_without_init(int count) 230 int i; 240 void psa_threaded_init(int arg_thread_count) 301 void validate_module_init_generate_random(int count) [all …]
|
D | test_suite_ecdh.function | 4 static int load_public_key(int grp_id, data_t *point, 7 int ok = 0; 20 static int load_private_key(int grp_id, data_t *private_key, 24 int ok = 0; 51 int invalid_side = 42; 66 void ecdh_primitive_random(int id) 105 void ecdh_primitive_testvec(int id, data_t *rnd_buf_A, char *xA_str, 196 void ecdh_exchange(int id) 240 void ecdh_restart(int id, data_t *dA, data_t *dB, data_t *z, 241 int enable, int max_ops, int min_restart, int max_restart) [all …]
|
D | test_suite_ecp.function | 19 inline static int mbedtls_ecp_group_cmp(mbedtls_ecp_group *grp1, 83 int invalid_fmt = 42; 108 void mbedtls_ecp_curve_info(int id, int tls_id, int size, char *name) 129 void ecp_check_pub(int grp_id, char *x_hex, char *y_hex, char *z_hex, 130 int ret) 153 void ecp_test_vect_restart(int id, 156 int max_ops, int min_restarts, int max_restarts) 180 int cnt_restarts; 181 int ret; 252 void ecp_muladd_restart(int id, char *xR_str, char *yR_str, [all …]
|
D | test_suite_gcm.function | 7 static int check_multipart(mbedtls_gcm_context *ctx, 8 int mode, 17 int ok = 0; 66 int mode, 108 int mode, 138 int mode, 158 int starts_ret) 160 int mode = MBEDTLS_GCM_ENCRYPT; 179 void gcm_bad_parameters(int cipher_id, int direction, 182 int tag_len_bits, int gcm_result) [all …]
|
D | test_suite_psa_crypto_storage_format.function | 19 static int test_written_key(const psa_key_attributes_t *attributes, 28 int ok = 0; 53 static int can_export(const psa_key_attributes_t *attributes) 65 static int is_accelerated_rsa(psa_algorithm_t alg) 89 static int can_exercise(const psa_key_attributes_t *attributes) 145 static int test_read_key(const psa_key_attributes_t *expected_attributes, 149 int flags) 154 int ok = 0; 222 void key_storage_save(int lifetime_arg, int type_arg, int bits_arg, 223 int usage_arg, int alg_arg, int alg2_arg, [all …]
|
D | test_suite_oid.function | 17 int ret; 38 int ret; 56 void oid_get_x509_extension(data_t *oid, int exp_type) 59 int ret; 60 int ext_type; 77 void oid_get_md_alg_id(data_t *oid, int exp_md_id) 80 int ret; 100 void mbedtls_oid_get_md_hmac(data_t *oid, int exp_md_id) 103 int ret; 123 void oid_get_numeric_string(data_t *oid, int error_ret, char *result_str) [all …]
|