Home
last modified time | relevance | path

Searched refs:msg (Results 1 – 17 of 17) sorted by relevance

/mbedtls-development/tests/scripts/
A Dall.sh359 msg() function
692 msg "info: $0 configuration"
771 msg "info: output_env.sh"
1428 msg "build: make, crypto only"
1491 msg "test: cpp_dummy_build"
2191 msg "test: AES_FEWER_TABLES"
2200 msg "test: AES_ROM_TABLES"
2539 msg "build: ARM Compiler 5"
2543 msg "size: ARM Compiler 5"
2773 msg "Lint: Python scripts"
[all …]
/mbedtls-development/tests/suites/
A Dtest_suite_ccm.function112 memset( msg, 0, sizeof( msg ) );
153 memset( msg, 0, sizeof( msg ) );
193 memcpy( io_msg_buf, msg->x, msg->len );
204 ASSERT_COMPARE( io_msg_buf, msg->len, result->x, msg->len );
248 TEST_EQUAL( 0, mbedtls_ccm_update( &ctx, msg->x, msg->len, output, msg->len, &olen ) );
347 memcpy( io_msg_buf, msg->x, msg->len );
715 mbedtls_ccm_update( &ctx, msg->x, msg->len, output, msg->len, &olen ) );
742 TEST_EQUAL( 0, mbedtls_ccm_update( &ctx, msg->x, msg->len - 1, output, msg->len, &olen ) );
776 TEST_EQUAL( 0, mbedtls_ccm_update( &ctx, msg->x, msg->len, output, msg->len, &olen ) );
798 msg_second_buffer[0] = msg->x[ msg->len - 1 ];
[all …]
A Dtest_suite_nist_kw.function245 void mbedtls_nist_kw_wrap( int cipher_id, int mode, data_t *key, data_t *msg,
260 TEST_ASSERT( mbedtls_nist_kw_wrap( &ctx, mode, msg->x, msg->len,
267 padlen = ( msg->len % 8 != 0 ) ? 8 - (msg->len % 8 ) : 0;
269 for( i = msg->len + 8 + padlen; i < sizeof( result ); i++ )
280 void mbedtls_nist_kw_unwrap( int cipher_id, int mode, data_t *key, data_t *msg,
295 TEST_ASSERT( mbedtls_nist_kw_unwrap( &ctx, mode, msg->x, msg->len,
308 for( i = msg->len - 8; i < sizeof( result ); i++ )
A Dtest_suite_ecjpake.function131 void read_bad_md( data_t *msg )
143 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &corrupt_ctx, msg->x,
144 msg->len ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
152 void read_round_one( int role, data_t * msg, int ref_ret )
163 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &ctx, msg->x, msg->len ) == ref_ret );
171 void read_round_two_cli( data_t * msg, int ref_ret )
188 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg->x, msg->len ) == ref_ret );
196 void read_round_two_srv( data_t * msg, int ref_ret )
213 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg->x, msg->len ) == ref_ret );
A Dhelpers.function104 const char *msg = mbedtls_test_helper_is_psa_leaking( );
105 if( msg == NULL )
109 mbedtls_test_fail( msg, line_no, filename );
A Dtest_suite_debug.data1 Debug print msg (threshold 1, level 0)
4 Debug print msg (threshold 1, level 1)
7 Debug print msg (threshold 1, level 2)
10 Debug print msg (threshold 0, level 1)
13 Debug print msg (threshold 0, level 5)
A Dtest_suite_ecdsa.function145 void ecdsa_det_test_vectors( int id, char * d_str, int md_alg, char * msg,
167 TEST_ASSERT( mbedtls_md( md_info, (const unsigned char *) msg,
168 strlen( msg ), hash ) == 0 );
374 char *msg, data_t *sig_check,
398 (const unsigned char *) msg, strlen( msg ),
A Dtest_suite_pk.function519 int md_alg, char *msg, data_t *sig_check,
549 (const unsigned char *) msg, strlen( msg ),
877 unsigned char msg[50], ciph[64], test[50];
886 memset( msg, 0x2a, sizeof msg );
925 TEST_ASSERT( mbedtls_pk_encrypt( &rsa, msg, sizeof msg,
931 TEST_ASSERT( test_len == sizeof msg );
932 TEST_ASSERT( memcmp( test, msg, test_len ) == 0 );
935 TEST_ASSERT( mbedtls_pk_encrypt( &alt, msg, sizeof msg,
A Dtest_suite_psa_crypto.data963 PSA key policy: msg asymmetric signature, sign | verify
967 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt)
971 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt)
975 PSA key policy: msg asymmetric signature, wrong alg family (RSA v15/PSS)
979 PSA key policy: msg asymmetric signature, wildcard in policy, wrong alg family
983 PSA key policy: msg asymmetric signature, wildcard in policy, ECDSA SHA-256
987 PSA key policy: msg asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256
991 PSA key policy: msg asymmetric signature, wrong hash algorithm
995 PSA key policy: msg asymmetric signature, alg=0 in policy
999 PSA key policy: msg asymmetric signature, sign but not verify
[all …]
A Dtest_suite_ccm.data42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
/mbedtls-development/tests/src/
A Dthreading_helpers.c102 const char *msg ) in mbedtls_test_mutex_usage_error() argument
106 mbedtls_test_info.mutex_usage_error = msg; in mbedtls_test_mutex_usage_error()
107 mbedtls_fprintf( stdout, "[mutex: %s] ", msg ); in mbedtls_test_mutex_usage_error()
/mbedtls-development/3rdparty/everest/include/everest/kremlin/internal/
A Dtarget.h69 #define KRML_EABORT(t, msg) \ argument
70 (KRML_HOST_PRINTF("KreMLin abort at %s:%d\n%s\n", __FILE__, __LINE__, msg), \
/mbedtls-development/programs/test/
A Dudp_proxy.c333 static const char *msg_type( unsigned char *msg, size_t len ) in msg_type() argument
336 switch( msg[0] ) in msg_type()
353 if( msg[14] || msg[19] || msg[22] ) return( "Encrypted handshake" ); in msg_type()
355 switch( msg[13] ) in msg_type()
/mbedtls-development/library/
A Dssl_msg.c2037 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local
2050 if( ( msg->p = mbedtls_calloc( 1, ssl->out_msglen ) ) == NULL ) in ssl_flight_append()
2054 mbedtls_free( msg ); in ssl_flight_append()
2059 memcpy( msg->p, ssl->out_msg, ssl->out_msglen ); in ssl_flight_append()
2060 msg->len = ssl->out_msglen; in ssl_flight_append()
2061 msg->type = ssl->out_msgtype; in ssl_flight_append()
2062 msg->next = NULL; in ssl_flight_append()
2066 ssl->handshake->flight = msg; in ssl_flight_append()
2072 cur->next = msg; in ssl_flight_append()
4097 unsigned char * const msg = hs_buf->data + 12; in ssl_buffer_message() local
[all …]
A Dssl_cli.c4069 const unsigned char *msg; in ssl_parse_new_session_ticket() local
4108 msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); in ssl_parse_new_session_ticket()
4110 lifetime = ( ((uint32_t) msg[0]) << 24 ) | ( msg[1] << 16 ) | in ssl_parse_new_session_ticket()
4111 ( msg[2] << 8 ) | ( msg[3] ); in ssl_parse_new_session_ticket()
4113 ticket_len = ( msg[4] << 8 ) | ( msg[5] ); in ssl_parse_new_session_ticket()
4159 memcpy( ticket, msg + 6, ticket_len ); in ssl_parse_new_session_ticket()
A Dssl_tls13_generic.c114 unsigned char const *msg, in mbedtls_ssl_tls1_3_add_hs_msg_to_checksum() argument
118 ssl->handshake->update_checksum( ssl, msg, msg_len ); in mbedtls_ssl_tls1_3_add_hs_msg_to_checksum()
A Dssl_misc.h1693 unsigned char const *msg,

Completed in 48 milliseconds