| /mbedtls-development/tests/src/ |
| A D | random.c | 85 if( len > info->length ) in mbedtls_test_rnd_buffer_rand() 86 use_len = info->length; in mbedtls_test_rnd_buffer_rand() 90 memcpy( output, info->buf, use_len ); in mbedtls_test_rnd_buffer_rand() 91 info->buf += use_len; in mbedtls_test_rnd_buffer_rand() 92 info->length -= use_len; in mbedtls_test_rnd_buffer_rand() 97 if( info->fallback_f_rng != NULL ) in mbedtls_test_rnd_buffer_rand() 99 return( info->fallback_f_rng( info->fallback_p_rng, in mbedtls_test_rnd_buffer_rand() 114 mbedtls_test_rnd_pseudo_info *info = in mbedtls_test_rnd_pseudo_rand() local 122 k = info->key; in mbedtls_test_rnd_pseudo_rand() 131 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) ) in mbedtls_test_rnd_pseudo_rand() [all …]
|
| /mbedtls-development/include/mbedtls/ |
| A D | ssl_ciphersuites.h | 394 int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info ); 395 int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info ); 400 switch( info->MBEDTLS_PRIVATE(key_exchange) ) in mbedtls_ssl_ciphersuite_has_pfs() 417 static inline int mbedtls_ssl_ciphersuite_no_pfs( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_ciphersuite_no_pfs() argument 419 switch( info->MBEDTLS_PRIVATE(key_exchange) ) in mbedtls_ssl_ciphersuite_no_pfs() 437 switch( info->MBEDTLS_PRIVATE(key_exchange) ) in mbedtls_ssl_ciphersuite_uses_ecdh() 451 switch( info->MBEDTLS_PRIVATE(key_exchange) ) in mbedtls_ssl_ciphersuite_cert_req_allowed() 468 switch( info->MBEDTLS_PRIVATE(key_exchange) ) in mbedtls_ssl_ciphersuite_uses_srv_cert() 487 switch( info->MBEDTLS_PRIVATE(key_exchange) ) in mbedtls_ssl_ciphersuite_uses_dhe() 502 switch( info->MBEDTLS_PRIVATE(key_exchange) ) in mbedtls_ssl_ciphersuite_uses_ecdhe() [all …]
|
| A D | cipher.h | 444 const mbedtls_cipher_info_t *info ) in mbedtls_cipher_info_get_type() argument 446 if( info == NULL ) in mbedtls_cipher_info_get_type() 449 return( info->MBEDTLS_PRIVATE(type) ); in mbedtls_cipher_info_get_type() 462 const mbedtls_cipher_info_t *info ) in mbedtls_cipher_info_get_mode() argument 464 if( info == NULL ) in mbedtls_cipher_info_get_mode() 467 return( info->MBEDTLS_PRIVATE(mode) ); in mbedtls_cipher_info_get_mode() 482 const mbedtls_cipher_info_t *info ) in mbedtls_cipher_info_get_key_bitlen() argument 484 if( info == NULL ) in mbedtls_cipher_info_get_key_bitlen() 502 const mbedtls_cipher_info_t *info ) in mbedtls_cipher_info_get_name() argument 504 if( info == NULL ) in mbedtls_cipher_info_get_name() [all …]
|
| A D | hkdf.h | 70 const unsigned char *info, size_t info_len, 129 size_t prk_len, const unsigned char *info,
|
| A D | pem.h | 68 unsigned char *MBEDTLS_PRIVATE(info); /*!< buffer for extra header information */
|
| /mbedtls-development/ |
| A D | Makefile | 119 find . \( -name \*.gcno -o -name \*.gcda -o -name \*.info \) -exec rm {} + 149 lcov --capture --initial --directory library -o files.info 150 lcov --rc lcov_branch_coverage=1 --capture --directory library -o tests.info 151 lcov --rc lcov_branch_coverage=1 --add-tracefile files.info --add-tracefile tests.info -o all.info 152 lcov --rc lcov_branch_coverage=1 --remove all.info -o final.info '*.h' 154 …description-file descriptions --keep-descriptions --legend --branch-coverage -o Coverage final.info 155 rm -f files.info tests.info all.info final.info descriptions
|
| A D | CMakeLists.txt | 300 … COMMAND lcov --capture --initial --directory library/CMakeFiles/mbedtls.dir -o files.info 301 COMMAND lcov --capture --directory library/CMakeFiles/mbedtls.dir -o tests.info 302 COMMAND lcov --add-tracefile files.info --add-tracefile tests.info -o all.info 303 COMMAND lcov --remove all.info -o final.info '*.h' 305 …cription-file descriptions --keep-descriptions --legend --no-branch-coverage -o Coverage final.info 306 COMMAND rm -f files.info tests.info all.info final.info descriptions
|
| A D | .pylintrc | 50 # ``log.info('...'.format(...))``. It insists on ``log.info('...', ...)``. 55 # and complain about something like ``log.info('{}', foo)`` with
|
| /mbedtls-development/tests/suites/ |
| A D | test_suite_hkdf.function | 12 void test_hkdf( int md_alg, data_t *ikm, data_t *salt, data_t *info, 24 info->x, info->len, okm, expected_okm->len ); 72 unsigned char *info = NULL; 84 info = mbedtls_test_unhexify_alloc( hex_info_string, &info_len ); 89 ret = mbedtls_hkdf_expand( md, prk, prk_len, info, info_len, 95 mbedtls_free(info); 133 unsigned char *info = NULL; 152 info, info_len, okm, okm_len );
|
| A D | test_suite_pkcs1_v21.function | 18 mbedtls_test_rnd_buf_info info; 21 info.fallback_f_rng = mbedtls_test_rnd_std_rand; 22 info.fallback_p_rng = NULL; 23 info.buf = rnd_buf->x; 24 info.length = rnd_buf->len; 129 mbedtls_test_rnd_buf_info info; 133 info.fallback_p_rng = NULL; 134 info.buf = rnd_buf->x; 135 info.length = rnd_buf->len; 170 info.buf = rnd_buf->x; [all …]
|
| A D | test_suite_psa_its.function | 86 struct psa_storage_info_t info; 94 PSA_ASSERT( psa_its_get_info( uid, &info ) ); 95 TEST_ASSERT( info.size == data->len ); 96 TEST_ASSERT( info.flags == flags ); 116 struct psa_storage_info_t info; 123 PSA_ASSERT( psa_its_get_info( uid, &info ) ); 124 TEST_ASSERT( info.size == data1->len ); 125 TEST_ASSERT( info.flags == flags1 ); 131 TEST_ASSERT( info.size == data2->len ); 132 TEST_ASSERT( info.flags == flags2 ); [all …]
|
| A D | test_suite_pkcs5.function | 15 const mbedtls_md_info_t *info; 21 info = mbedtls_md_info_from_type( hash ); 22 TEST_ASSERT( info != NULL ); 23 TEST_ASSERT( mbedtls_md_setup( &ctx, info, 1 ) == 0 );
|
| A D | test_suite_pkcs1_v15.function | 19 mbedtls_test_rnd_buf_info info; 22 info.fallback_f_rng = mbedtls_test_rnd_std_rand; 23 info.fallback_p_rng = NULL; 24 info.buf = rnd_buf->x; 25 info.length = rnd_buf->len; 43 &info, message_str->len, 276 mbedtls_test_rnd_buf_info info; 278 info.fallback_f_rng = mbedtls_test_rnd_std_rand; 279 info.fallback_p_rng = NULL; 280 info.buf = rnd_buf->x; [all …]
|
| A D | test_suite_cipher.function | 23 TEST_ASSERT( info != NULL ); 25 TEST_EQUAL( type, info->type ); 28 TEST_EQUAL( info->mode, mbedtls_cipher_info_get_mode( info ) ); 32 TEST_ASSERT( mbedtls_cipher_info_get_name( info ) == info->name ); 33 TEST_ASSERT( mbedtls_cipher_info_from_string( info->name ) == info ); 36 if( info->type == MBEDTLS_CIPHER_NULL ) 38 else if( info->mode == MBEDTLS_MODE_XTS ) 138 const mbedtls_cipher_info_t *info = 311 /* Check and get info structures */ 367 /* Check and get info structures */ [all …]
|
| A D | test_suite_md.function | 14 const mbedtls_md_info_t *info; 30 info = mbedtls_md_info_from_type( *md_type_ptr ); 31 TEST_ASSERT( info != NULL ); 32 TEST_ASSERT( mbedtls_md_setup( &ctx, info, 0 ) == 0 ); 46 const mbedtls_md_info_t *info = mbedtls_md_info_from_type( *( mbedtls_md_list() ) ); 58 TEST_ASSERT( mbedtls_md_setup( NULL, info, 0 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
|
| /mbedtls-development/library/ |
| A D | hkdf.c | 30 const unsigned char *info, size_t info_len, in mbedtls_hkdf() argument 41 info, info_len, okm, okm_len ); in mbedtls_hkdf() 80 size_t prk_len, const unsigned char *info, in mbedtls_hkdf_expand() argument 104 if( info == NULL ) in mbedtls_hkdf_expand() 106 info = (const unsigned char *) ""; in mbedtls_hkdf_expand() 156 ret = mbedtls_md_hmac_update( &ctx, info, info_len ); in mbedtls_hkdf_expand()
|
| A D | pk.c | 138 if( info == NULL || ctx->pk_info != NULL ) in mbedtls_pk_setup() 141 if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) in mbedtls_pk_setup() 144 ctx->pk_info = info; in mbedtls_pk_setup() 173 if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) in mbedtls_pk_setup_opaque() 176 ctx->pk_info = info; in mbedtls_pk_setup_opaque() 195 const mbedtls_pk_info_t *info = &mbedtls_rsa_alt_info; in mbedtls_pk_setup_rsa_alt() local 201 if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) in mbedtls_pk_setup_rsa_alt() 204 ctx->pk_info = info; in mbedtls_pk_setup_rsa_alt() 260 if( info->rs_alloc_func == NULL || info->rs_free_func == NULL ) in pk_restart_setup() 263 if( ( ctx->rs_ctx = info->rs_alloc_func() ) == NULL ) in pk_restart_setup() [all …]
|
| A D | psa_its_file.c | 143 struct psa_storage_info_t info; in psa_its_get() local 145 status = psa_its_read_file( uid, &info, &stream ); in psa_its_get() 155 if( data_offset + data_length > info.size ) in psa_its_get()
|
| A D | cipher.c | 126 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_type() 128 return( def->info ); in mbedtls_cipher_info_from_type() 141 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_string() 142 if( ! strcmp( def->info->name, cipher_name ) ) in mbedtls_cipher_info_from_string() 143 return( def->info ); in mbedtls_cipher_info_from_string() 155 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_values() 156 if( def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values() 157 def->info->key_bitlen == (unsigned) key_bitlen && in mbedtls_cipher_info_from_values() 158 def->info->mode == mode ) in mbedtls_cipher_info_from_values() 159 return( def->info ); in mbedtls_cipher_info_from_values()
|
| A D | ssl_tls13_client.c | 155 const mbedtls_ecp_curve_info *info; in ssl_tls13_write_named_group_list_ecdhe() local 156 info = mbedtls_ecp_curve_info_from_tls_id( *group_list ); in ssl_tls13_write_named_group_list_ecdhe() 157 if( info == NULL ) in ssl_tls13_write_named_group_list_ecdhe() 168 info->name, *group_list ) ); in ssl_tls13_write_named_group_list_ecdhe() 330 const mbedtls_ecp_curve_info *info; in ssl_tls13_get_default_group_id() local 331 info = mbedtls_ecp_curve_info_from_tls_id( *group_list ); in ssl_tls13_get_default_group_id() 332 if( info != NULL && in ssl_tls13_get_default_group_id()
|
| A D | ssl_ciphersuites.c | 2068 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_get_ciphersuite_sig_pk_alg() argument 2070 switch( info->key_exchange ) in mbedtls_ssl_get_ciphersuite_sig_pk_alg() 2090 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_alg( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_get_ciphersuite_sig_alg() argument 2092 switch( info->key_exchange ) in mbedtls_ssl_get_ciphersuite_sig_alg() 2111 int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_ciphersuite_uses_ec() argument 2113 switch( info->key_exchange ) in mbedtls_ssl_ciphersuite_uses_ec() 2130 int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_ciphersuite_uses_psk() argument 2132 switch( info->key_exchange ) in mbedtls_ssl_ciphersuite_uses_psk()
|
| /mbedtls-development/tests/scripts/ |
| A D | generate_psa_tests.py | 161 def __init__(self, info: Information) -> None: 162 self.constructors = info.constructors 257 def __init__(self, info: Information) -> None: 258 self.constructors = info.constructors 586 super().__init__(info, version, True) 592 super().__init__(info, 0, False) 708 self.info = Information() 730 lambda info: KeyGenerate(info).test_cases_for_key_generation(), 732 lambda info: NotSupported(info).test_cases_for_not_supported(), 734 lambda info: StorageFormatForward(info, 0).all_test_cases(), [all …]
|
| A D | check_names.py | 246 self.log.info("Parsing source code...") 578 self.log.info("Compiling...") 691 self.log.info("=============") 706 self.log.info("=============") 708 self.log.info("FAIL: {0} problem(s) to fix".format(str(problems))) 710 self.log.info("Remove --quiet to see explanations.") 712 self.log.info("Use --quiet for minimal output.") 715 self.log.info("PASS") 812 self.log.info("{}: FAIL\n".format(name)) 816 self.log.info("{}: PASS".format(name))
|
| A D | check_files.py | 104 logger.info(self.heading) 107 logger.info("{}: {}".format( 111 logger.info(filename) 112 logger.info("")
|
| /mbedtls-development/programs/ssl/ |
| A D | ssl_test_common_source.c | 301 #define X509_CRT_ERROR_INFO( err, err_str, info ) \ in x509_crt_verify_info() 304 ret = mbedtls_snprintf( p, n, "%s%s\n", prefix, info ); \ in x509_crt_verify_info()
|