/mbedtls-development/tests/suites/ |
A D | test_suite_asn1parse.data | 61 length=0 (1 length byte) 64 length=0 (2 length bytes) 70 length=1 (1 length byte) 73 length=1 (2 length bytes) 76 length=1 (3 length bytes) 79 length=1 (4 length bytes) 85 length=2 (1 length byte) 88 length=2 (2 length bytes) 91 length=2 (3 length bytes) 94 length=2 (4 length bytes) [all …]
|
A D | test_suite_asn1write.data | 130 ASN.1 Write OCTET STRING: length=0 133 ASN.1 Write OCTET STRING: length=1 136 ASN.1 Write OCTET STRING: length=2 151 ASN.1 Write UTF8 STRING: length=0 154 ASN.1 Write UTF8 STRING: length=1 157 ASN.1 Write UTF8 STRING: length=128 169 ASN.1 Write IA5 STRING: length=0 172 ASN.1 Write IA5 STRING: length=1 175 ASN.1 Write IA5 STRING: length=128 187 ASN.1 Write OID: length=0 [all …]
|
A D | test_suite_psa_crypto_metadata.function | 233 /* Tag length */ 250 size_t length = length_arg; 284 /* Hash length */ 296 size_t length = length_arg; 325 * length of the outer truncation (even if the outer length is smaller 346 * length of the outer truncation (even if the outer length is smaller 358 * inner length). */ 442 * the length of the outer truncation (even if the outer length is 453 * gives the length of the outer truncation (even if the outer length is 475 * gives the length of the outer truncation (even if the outer length is [all …]
|
A D | test_suite_ecjpake.data | 25 ECJPAKE round one: KKP1: length of first point too small 28 ECJPAKE round one: KKP1: length of first point too big 43 ECJPAKE round one: KKP1: length of second point too small 46 ECJPAKE round one: KKP1: length of second point too big 58 ECJPAKE round one: KKP1: zero-length r 73 ECJPAKE round one: KKP2: length of first point too small 76 ECJPAKE round one: KKP2: length of first point too big 94 ECJPAKE round one: KKP2: length of second point too big 106 ECJPAKE round one: KKP2: zero-length r 172 ECJPAKE round two client: zero-length r [all …]
|
A D | test_suite_entropy.data | 25 Entropy output length: 0 28 Entropy output length: 1 31 Entropy output length: 2 34 Entropy output length: 31 37 Entropy output length: 65 > BLOCK_SIZE
|
A D | test_suite_cipher.function | 428 TEST_ASSERT( total_len == length || 430 total_len < length && 440 TEST_ASSERT( total_len == length || 442 total_len > length && 449 TEST_ASSERT( total_len == length || 451 total_len < length && 462 TEST_ASSERT( total_len == length ); 479 size_t length = length_val; 678 TEST_ASSERT( totaloutlen == length || 685 TEST_ASSERT( totaloutlen == length || [all …]
|
A D | test_suite_aes.rest.data | 7 AES-256-CBC Encrypt (Invalid input length) 10 AES-256-CBC Decrypt (Invalid input length)
|
A D | test_suite_x509parse.data | 980 X509 CRT ASN1 (inv Certificate, no length) 995 X509 CRT ASN1 (inv TBS, length missing) 998 X509 CRT ASN1 (inv TBS, invalid length encoding) 1001 X509 CRT ASN1 (inv TBS, length data incomplete) 1004 X509 CRT ASN1 (inv TBS, length out of bounds) 1064 X509 CRT ASN1 (TBS, inv serial, length missing) 1513 X509 CRT ASN1 (TBS, inv IssuerID, length missing) 1581 X509 CRT ASN1 (TBS, inv v3Ext, outer length 0) 1861 X509 CRT ASN1 (inv Signature, length missing) 1899 X509 CRT ASN1 (inv Signature, length mismatch) [all …]
|
/mbedtls-development/programs/psa/ |
A D | psa_constant_names.c | 59 *required_size += length; in append() 62 *buffer += length; in append() 143 size_t length = strlen(name); in psa_snprint_status() local 144 if (length < buffer_size) { in psa_snprint_status() 146 return (int) length; in psa_snprint_status() 160 size_t length = strlen(name); in psa_snprint_ecc_curve() local 161 if (length < buffer_size) { in psa_snprint_ecc_curve() 163 return (int) length; in psa_snprint_ecc_curve() 177 size_t length = strlen(name); in psa_snprint_dh_group() local 178 if (length < buffer_size) { in psa_snprint_dh_group() [all …]
|
/mbedtls-development/library/ |
A D | cipher_wrap.h | 53 int (*cbc_func)( void *ctx, mbedtls_operation_t mode, size_t length, 60 int (*cfb_func)( void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off, 67 int (*ofb_func)( void *ctx, size_t length, size_t *iv_off, 75 int (*ctr_func)( void *ctx, size_t length, size_t *nc_off, 82 int (*xts_func)( void *ctx, mbedtls_operation_t mode, size_t length, 89 int (*stream_func)( void *ctx, size_t length,
|
A D | chachapoly.c | 280 size_t length, in chachapoly_crypt_and_tag() argument 298 ret = mbedtls_chachapoly_update( ctx, length, input, output ); in chachapoly_crypt_and_tag() 309 size_t length, in mbedtls_chachapoly_encrypt_and_tag() argument 321 CHACHAPOLY_VALIDATE_RET( length == 0 || input != NULL ); in mbedtls_chachapoly_encrypt_and_tag() 322 CHACHAPOLY_VALIDATE_RET( length == 0 || output != NULL ); in mbedtls_chachapoly_encrypt_and_tag() 325 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag() 330 size_t length, in mbedtls_chachapoly_auth_decrypt() argument 346 CHACHAPOLY_VALIDATE_RET( length == 0 || input != NULL ); in mbedtls_chachapoly_auth_decrypt() 347 CHACHAPOLY_VALIDATE_RET( length == 0 || output != NULL ); in mbedtls_chachapoly_auth_decrypt() 350 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce, in mbedtls_chachapoly_auth_decrypt() [all …]
|
A D | cipher_wrap.c | 136 size_t length, size_t *iv_off, unsigned char *iv, in aes_crypt_cfb128_wrap() argument 165 size_t length, in aes_crypt_xts_wrap() argument 185 return mbedtls_aes_crypt_xts( xts_ctx, mode, length, in aes_crypt_xts_wrap() 690 size_t length, unsigned char *iv, in camellia_crypt_cbc_wrap() argument 700 size_t length, size_t *iv_off, unsigned char *iv, in camellia_crypt_cfb128_wrap() argument 1099 size_t length, unsigned char *iv, in aria_crypt_cbc_wrap() argument 1109 size_t length, size_t *iv_off, unsigned char *iv, in aria_crypt_cfb128_wrap() argument 1782 static int chacha20_stream_wrap( void *ctx, size_t length, in chacha20_stream_wrap() argument 1788 ret = mbedtls_chacha20_update( ctx, length, input, output ); in chacha20_stream_wrap() 1925 static int null_crypt_stream( void *ctx, size_t length, in null_crypt_stream() argument [all …]
|
A D | camellia.c | 546 size_t length, in mbedtls_camellia_crypt_cbc() argument 560 if( length % 16 ) in mbedtls_camellia_crypt_cbc() 565 while( length > 0 ) in mbedtls_camellia_crypt_cbc() 577 length -= 16; in mbedtls_camellia_crypt_cbc() 582 while( length > 0 ) in mbedtls_camellia_crypt_cbc() 592 length -= 16; in mbedtls_camellia_crypt_cbc() 606 size_t length, in mbedtls_camellia_crypt_cfb128() argument 628 while( length-- ) in mbedtls_camellia_crypt_cfb128() 642 while( length-- ) in mbedtls_camellia_crypt_cfb128() 664 size_t length, in mbedtls_camellia_crypt_ctr() argument [all …]
|
A D | ccm.c | 488 static int ccm_auth_crypt( mbedtls_ccm_context *ctx, int mode, size_t length, in ccm_auth_crypt() argument 506 if( ( ret = mbedtls_ccm_update( ctx, input, length, in ccm_auth_crypt() 507 output, length, &olen ) ) != 0 ) in ccm_auth_crypt() 529 int mbedtls_ccm_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_encrypt_and_tag() argument 535 return( ccm_auth_crypt( ctx, MBEDTLS_CCM_ENCRYPT, length, iv, iv_len, in mbedtls_ccm_encrypt_and_tag() 568 if( ( ret = ccm_auth_crypt( ctx, mode, length, in ccm_auth_decrypt() 577 mbedtls_platform_zeroize( output, length ); in ccm_auth_decrypt() 584 int mbedtls_ccm_star_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_star_auth_decrypt() argument 590 return ccm_auth_decrypt( ctx, MBEDTLS_CCM_STAR_DECRYPT, length, in mbedtls_ccm_star_auth_decrypt() 595 int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_auth_decrypt() argument [all …]
|
A D | aria.c | 593 size_t length, in mbedtls_aria_crypt_cbc() argument 608 if( length % MBEDTLS_ARIA_BLOCKSIZE ) in mbedtls_aria_crypt_cbc() 613 while( length > 0 ) in mbedtls_aria_crypt_cbc() 625 length -= MBEDTLS_ARIA_BLOCKSIZE; in mbedtls_aria_crypt_cbc() 630 while( length > 0 ) in mbedtls_aria_crypt_cbc() 640 length -= MBEDTLS_ARIA_BLOCKSIZE; in mbedtls_aria_crypt_cbc() 654 size_t length, in mbedtls_aria_crypt_cfb128() argument 681 while( length-- ) in mbedtls_aria_crypt_cfb128() 695 while( length-- ) in mbedtls_aria_crypt_cfb128() 717 size_t length, in mbedtls_aria_crypt_ctr() argument [all …]
|
A D | des.c | 640 size_t length, in mbedtls_des_crypt_cbc() argument 649 if( length % 8 ) in mbedtls_des_crypt_cbc() 654 while( length > 0 ) in mbedtls_des_crypt_cbc() 666 length -= 8; in mbedtls_des_crypt_cbc() 671 while( length > 0 ) in mbedtls_des_crypt_cbc() 685 length -= 8; in mbedtls_des_crypt_cbc() 755 if( length % 8 ) in mbedtls_des3_crypt_cbc() 760 while( length > 0 ) in mbedtls_des3_crypt_cbc() 772 length -= 8; in mbedtls_des3_crypt_cbc() 777 while( length > 0 ) in mbedtls_des3_crypt_cbc() [all …]
|
/mbedtls-development/include/mbedtls/ |
A D | aes.h | 308 size_t length, 353 size_t length, 402 size_t length, 447 size_t length, 501 size_t length, 588 size_t length,
|
A D | ccm.h | 179 int mbedtls_ccm_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, 228 int mbedtls_ccm_star_encrypt_and_tag( mbedtls_ccm_context *ctx, size_t length, 265 int mbedtls_ccm_auth_decrypt( mbedtls_ccm_context *ctx, size_t length, 311 int mbedtls_ccm_star_auth_decrypt( mbedtls_ccm_context *ctx, size_t length,
|
A D | camellia.h | 164 size_t length, 210 size_t length, 293 size_t length,
|
A D | aria.h | 201 size_t length, 251 size_t length, 337 size_t length,
|
/mbedtls-development/tests/include/test/ |
A D | macros.h | 112 #define ASSERT_ALLOC( pointer, length ) \ argument 116 if( ( length ) != 0 ) \ 119 ( length ) ); \ 130 #define ASSERT_ALLOC_WEAK( pointer, length ) \ argument 134 if( ( length ) != 0 ) \ 137 ( length ) ); \
|
/mbedtls-development/ChangeLog.d/ |
A D | psa_alg_rsa_pss.txt | 2 * Fix PSA_ALG_RSA_PSS verification accepting an arbitrary salt length. 3 This algorithm now accepts only the same salt length for verification 5 PSA_ALG_RSA_PSS_ANY_SALT to accept any salt length. Fixes #4946.
|
A D | psa_gcm_buffer_limitation.txt | 6 * Move GCM's update output buffer length verification from PSA AEAD to 15 the length of the provided output buffers and to return the 16 MBEDTLS_ERR_GCM_BUFFER_TOO_SMALL in case the buffer length is too small.
|
/mbedtls-development/scripts/mbedtls_dev/ |
A D | crypto_knowledge.py | 134 length = bits // 8 138 return des3[:length] 139 return b''.join([self.DATA_BLOCK] * (length // len(self.DATA_BLOCK)) + 140 [self.DATA_BLOCK[:length % len(self.DATA_BLOCK)]])
|
/mbedtls-development/tests/src/ |
A D | random.c | 85 if( len > info->length ) in mbedtls_test_rnd_buffer_rand() 86 use_len = info->length; in mbedtls_test_rnd_buffer_rand() 92 info->length -= use_len; in mbedtls_test_rnd_buffer_rand()
|