/mbedtls-development/tests/scripts/ |
A D | all.sh | 359 msg() function 692 msg "info: $0 configuration" 771 msg "info: output_env.sh" 1428 msg "build: make, crypto only" 1491 msg "test: cpp_dummy_build" 2191 msg "test: AES_FEWER_TABLES" 2200 msg "test: AES_ROM_TABLES" 2539 msg "build: ARM Compiler 5" 2543 msg "size: ARM Compiler 5" 2773 msg "Lint: Python scripts" [all …]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_ccm.function | 112 memset( msg, 0, sizeof( msg ) ); 153 memset( msg, 0, sizeof( msg ) ); 193 memcpy( io_msg_buf, msg->x, msg->len ); 204 ASSERT_COMPARE( io_msg_buf, msg->len, result->x, msg->len ); 248 TEST_EQUAL( 0, mbedtls_ccm_update( &ctx, msg->x, msg->len, output, msg->len, &olen ) ); 347 memcpy( io_msg_buf, msg->x, msg->len ); 715 mbedtls_ccm_update( &ctx, msg->x, msg->len, output, msg->len, &olen ) ); 742 TEST_EQUAL( 0, mbedtls_ccm_update( &ctx, msg->x, msg->len - 1, output, msg->len, &olen ) ); 776 TEST_EQUAL( 0, mbedtls_ccm_update( &ctx, msg->x, msg->len, output, msg->len, &olen ) ); 798 msg_second_buffer[0] = msg->x[ msg->len - 1 ]; [all …]
|
A D | test_suite_nist_kw.function | 245 void mbedtls_nist_kw_wrap( int cipher_id, int mode, data_t *key, data_t *msg, 260 TEST_ASSERT( mbedtls_nist_kw_wrap( &ctx, mode, msg->x, msg->len, 267 padlen = ( msg->len % 8 != 0 ) ? 8 - (msg->len % 8 ) : 0; 269 for( i = msg->len + 8 + padlen; i < sizeof( result ); i++ ) 280 void mbedtls_nist_kw_unwrap( int cipher_id, int mode, data_t *key, data_t *msg, 295 TEST_ASSERT( mbedtls_nist_kw_unwrap( &ctx, mode, msg->x, msg->len, 308 for( i = msg->len - 8; i < sizeof( result ); i++ )
|
A D | test_suite_ecjpake.function | 131 void read_bad_md( data_t *msg ) 143 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &corrupt_ctx, msg->x, 144 msg->len ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA ); 152 void read_round_one( int role, data_t * msg, int ref_ret ) 163 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &ctx, msg->x, msg->len ) == ref_ret ); 171 void read_round_two_cli( data_t * msg, int ref_ret ) 188 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg->x, msg->len ) == ref_ret ); 196 void read_round_two_srv( data_t * msg, int ref_ret ) 213 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg->x, msg->len ) == ref_ret );
|
A D | helpers.function | 104 const char *msg = mbedtls_test_helper_is_psa_leaking( ); 105 if( msg == NULL ) 109 mbedtls_test_fail( msg, line_no, filename );
|
A D | test_suite_debug.data | 1 Debug print msg (threshold 1, level 0) 4 Debug print msg (threshold 1, level 1) 7 Debug print msg (threshold 1, level 2) 10 Debug print msg (threshold 0, level 1) 13 Debug print msg (threshold 0, level 5)
|
A D | test_suite_ecdsa.function | 145 void ecdsa_det_test_vectors( int id, char * d_str, int md_alg, char * msg, 167 TEST_ASSERT( mbedtls_md( md_info, (const unsigned char *) msg, 168 strlen( msg ), hash ) == 0 ); 374 char *msg, data_t *sig_check, 398 (const unsigned char *) msg, strlen( msg ),
|
A D | test_suite_pk.function | 519 int md_alg, char *msg, data_t *sig_check, 549 (const unsigned char *) msg, strlen( msg ), 877 unsigned char msg[50], ciph[64], test[50]; 886 memset( msg, 0x2a, sizeof msg ); 925 TEST_ASSERT( mbedtls_pk_encrypt( &rsa, msg, sizeof msg, 931 TEST_ASSERT( test_len == sizeof msg ); 932 TEST_ASSERT( memcmp( test, msg, test_len ) == 0 ); 935 TEST_ASSERT( mbedtls_pk_encrypt( &alt, msg, sizeof msg,
|
A D | test_suite_psa_crypto.data | 963 PSA key policy: msg asymmetric signature, sign | verify 967 PSA key policy: msg asymmetric signature, wrong alg family (PSS std/any salt) 971 PSA key policy: msg asymmetric signature, wrong alg family (PSS any/std salt) 975 PSA key policy: msg asymmetric signature, wrong alg family (RSA v15/PSS) 979 PSA key policy: msg asymmetric signature, wildcard in policy, wrong alg family 983 PSA key policy: msg asymmetric signature, wildcard in policy, ECDSA SHA-256 987 PSA key policy: msg asymmetric signature, wildcard in policy, PKCS#1v1.5 SHA-256 991 PSA key policy: msg asymmetric signature, wrong hash algorithm 995 PSA key policy: msg asymmetric signature, alg=0 in policy 999 PSA key policy: msg asymmetric signature, sign but not verify [all …]
|
A D | test_suite_ccm.data | 42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
|
/mbedtls-development/tests/src/ |
A D | threading_helpers.c | 102 const char *msg ) in mbedtls_test_mutex_usage_error() argument 106 mbedtls_test_info.mutex_usage_error = msg; in mbedtls_test_mutex_usage_error() 107 mbedtls_fprintf( stdout, "[mutex: %s] ", msg ); in mbedtls_test_mutex_usage_error()
|
/mbedtls-development/3rdparty/everest/include/everest/kremlin/internal/ |
A D | target.h | 69 #define KRML_EABORT(t, msg) \ argument 70 (KRML_HOST_PRINTF("KreMLin abort at %s:%d\n%s\n", __FILE__, __LINE__, msg), \
|
/mbedtls-development/programs/test/ |
A D | udp_proxy.c | 333 static const char *msg_type( unsigned char *msg, size_t len ) in msg_type() argument 336 switch( msg[0] ) in msg_type() 353 if( msg[14] || msg[19] || msg[22] ) return( "Encrypted handshake" ); in msg_type() 355 switch( msg[13] ) in msg_type()
|
/mbedtls-development/library/ |
A D | ssl_msg.c | 2037 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local 2050 if( ( msg->p = mbedtls_calloc( 1, ssl->out_msglen ) ) == NULL ) in ssl_flight_append() 2054 mbedtls_free( msg ); in ssl_flight_append() 2059 memcpy( msg->p, ssl->out_msg, ssl->out_msglen ); in ssl_flight_append() 2060 msg->len = ssl->out_msglen; in ssl_flight_append() 2061 msg->type = ssl->out_msgtype; in ssl_flight_append() 2062 msg->next = NULL; in ssl_flight_append() 2066 ssl->handshake->flight = msg; in ssl_flight_append() 2072 cur->next = msg; in ssl_flight_append() 4097 unsigned char * const msg = hs_buf->data + 12; in ssl_buffer_message() local [all …]
|
A D | ssl_cli.c | 4069 const unsigned char *msg; in ssl_parse_new_session_ticket() local 4108 msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); in ssl_parse_new_session_ticket() 4110 lifetime = ( ((uint32_t) msg[0]) << 24 ) | ( msg[1] << 16 ) | in ssl_parse_new_session_ticket() 4111 ( msg[2] << 8 ) | ( msg[3] ); in ssl_parse_new_session_ticket() 4113 ticket_len = ( msg[4] << 8 ) | ( msg[5] ); in ssl_parse_new_session_ticket() 4159 memcpy( ticket, msg + 6, ticket_len ); in ssl_parse_new_session_ticket()
|
A D | ssl_tls13_generic.c | 114 unsigned char const *msg, in mbedtls_ssl_tls1_3_add_hs_msg_to_checksum() argument 118 ssl->handshake->update_checksum( ssl, msg, msg_len ); in mbedtls_ssl_tls1_3_add_hs_msg_to_checksum()
|
A D | ssl_misc.h | 1693 unsigned char const *msg,
|