/mbedtls-development/scripts/mbedtls_dev/ |
A D | crypto_knowledge.py | 29 def __init__(self, name: str, params: Optional[Iterable[str]] = None): 46 if params is None: 51 params = m.group(2).split(',') 52 self.params = (None if params is None else 53 [param.strip() for param in params]) 62 if self.params is not None: 63 self.expression += '(' + ', '.join(self.params) + ')' 107 assert self.params is not None 108 return self.ECC_KEY_SIZES[self.params[0]]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_pkcs5.data | 113 PBES2 Decrypt (bad params tag) 129 PBES2 Decrypt (bad PBKDF2 params: not a sequence) 133 PBES2 Decrypt (bad PBKDF2 params: overlong) 141 PBES2 Decrypt (bad PBKDF2 params salt: overlong) 145 PBES2 Decrypt (bad PBKDF2 params iter: not an int) 149 PBES2 Decrypt (bad PBKDF2 params iter: overlong) 153 PBES2 Decrypt (OK, PBKDF2 params explicit keylen) 161 PBES2 Decrypt (OK, PBKDF2 params explicit prf_alg) 177 PBES2 Decrypt (bad, PBKDF2 params extra data) 197 PBES2 Decrypt (bad enc_scheme_alg params: overlong) [all …]
|
A D | test_suite_pkcs5.function | 40 mbedtls_asn1_buf params; 43 params.tag = params_tag; 44 params.p = params_hex->x; 45 params.len = params_hex->len; 49 my_ret = mbedtls_pkcs5_pbes2( ¶ms, MBEDTLS_PKCS5_DECRYPT,
|
A D | host_test.function | 155 * \param params Out params found 167 params[cnt++] = cur; 183 params[cnt++] = cur; 194 p = params[i]; 195 q = params[i]; 243 char ** cur = params; 244 char ** out = params; 247 while ( cur < params + cnt ) 521 char *params[50]; 657 sizeof( params ) / sizeof( params[0] ) ); [all …]
|
A D | test_suite_asn1parse.data | 541 AlgorithmIdentifier, no params 544 AlgorithmIdentifier, no params, trailing garbage 547 AlgorithmIdentifier, null params 550 AlgorithmIdentifier, null params, trailing garbage 553 AlgorithmIdentifier, OCTET STRING params 568 AlgorithmIdentifier, truncated in params after tag 571 AlgorithmIdentifier, truncated in params after length 574 AlgorithmIdentifier, truncated inside params content
|
A D | main_test.function | 153 * \param params The array of parameters to pass to the test function. 160 int dispatch_test( size_t func_idx, void ** params ) 174 fp( params );
|
A D | test_suite_asn1parse.function | 677 mbedtls_asn1_buf params = { -1, 0, NULL }; 682 &oid, ¶ms ), 689 TEST_EQUAL( params.tag, params_tag ); 691 TEST_EQUAL( params.p - input->x, params_offset ); 693 TEST_ASSERT( params.p == NULL ); 694 TEST_EQUAL( params.len, (size_t) params_length );
|
A D | test_suite_dhm.function | 117 * Set params
|
A D | test_suite_x509parse.function | 1241 void x509_parse_rsassa_pss_params( data_t * params, int params_tag, 1250 buf.p = params->x; 1251 buf.len = params->len;
|
A D | test_suite_ecdh.function | 299 /* client read server params */
|
A D | test_suite_x509parse.data | 1120 X509 CRT ASN1 (TBS, inv AlgID, params present but empty) 1124 X509 CRT ASN1 (TBS, inv AlgID, bad RSASSA-PSS params) 2422 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong tag) 2425 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1a) 2428 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1b) 2431 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg not an OID) 2434 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.alg unknown OID) 2437 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params NULL) 2441 X509 RSASSA-PSS parameters ASN1 (MGAlg.params.params wrong tag) 2445 X509 RSASSA-PSS parameters ASN1 (MGAlg.params wrong len #1c) [all …]
|
A D | test_suite_ecp.data | 1 ECP invalid params
|
/mbedtls-development/library/ |
A D | asn1parse.c | 381 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params ) in mbedtls_asn1_get_alg() argument 404 mbedtls_platform_zeroize( params, sizeof(mbedtls_asn1_buf) ); in mbedtls_asn1_get_alg() 408 params->tag = **p; in mbedtls_asn1_get_alg() 411 if( ( ret = mbedtls_asn1_get_len( p, end, ¶ms->len ) ) != 0 ) in mbedtls_asn1_get_alg() 414 params->p = *p; in mbedtls_asn1_get_alg() 415 *p += params->len; in mbedtls_asn1_get_alg() 428 mbedtls_asn1_buf params; in mbedtls_asn1_get_alg_null() local 430 memset( ¶ms, 0, sizeof(mbedtls_asn1_buf) ); in mbedtls_asn1_get_alg_null() 432 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, ¶ms ) ) != 0 ) in mbedtls_asn1_get_alg_null() 435 if( ( params.tag != MBEDTLS_ASN1_NULL && params.tag != 0 ) || params.len != 0 ) in mbedtls_asn1_get_alg_null()
|
A D | pkparse.c | 194 params->tag = **p; in pk_get_ecparams() 195 if( params->tag != MBEDTLS_ASN1_OID in pk_get_ecparams() 205 if( ( ret = mbedtls_asn1_get_tag( p, end, ¶ms->len, params->tag ) ) != 0 ) in pk_get_ecparams() 210 params->p = *p; in pk_get_ecparams() 211 *p += params->len; in pk_get_ecparams() 243 unsigned char *p = params->p; in pk_group_from_specified() 244 const unsigned char * const end = params->p + params->len; in pk_group_from_specified() 597 ( ( params->tag != MBEDTLS_ASN1_NULL && params->tag != 0 ) || in pk_get_pk_alg() 598 params->len != 0 ) ) in pk_get_pk_alg() 869 mbedtls_asn1_buf params; in pk_parse_key_sec1_der() local [all …]
|
A D | pkcs12.c | 44 static int pkcs12_parse_pbe_params( mbedtls_asn1_buf *params, in pkcs12_parse_pbe_params() argument 48 unsigned char **p = ¶ms->p; in pkcs12_parse_pbe_params() 49 const unsigned char *end = params->p + params->len; in pkcs12_parse_pbe_params() 58 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in pkcs12_parse_pbe_params()
|
A D | pkcs5.c | 53 static int pkcs5_parse_pbkdf2_params( const mbedtls_asn1_buf *params, in pkcs5_parse_pbkdf2_params() argument 59 unsigned char *p = params->p; in pkcs5_parse_pbkdf2_params() 60 const unsigned char *end = params->p + params->len; in pkcs5_parse_pbkdf2_params() 62 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in pkcs5_parse_pbkdf2_params()
|
A D | x509.c | 124 mbedtls_x509_buf *alg, mbedtls_x509_buf *params ) in mbedtls_x509_get_alg() argument 128 if( ( ret = mbedtls_asn1_get_alg( p, end, alg, params ) ) != 0 ) in mbedtls_x509_get_alg() 203 int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params, in mbedtls_x509_get_rsassa_pss_params() argument 219 if( params->tag != ( MBEDTLS_ASN1_CONSTRUCTED | MBEDTLS_ASN1_SEQUENCE ) ) in mbedtls_x509_get_rsassa_pss_params() 223 p = (unsigned char *) params->p; in mbedtls_x509_get_rsassa_pss_params() 224 end = p + params->len; in mbedtls_x509_get_rsassa_pss_params()
|
A D | ssl_cli.c | 3087 unsigned char *params = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); in ssl_parse_server_key_exchange() local 3088 size_t params_len = p - params; in ssl_parse_server_key_exchange() 3165 params, params_len, in ssl_parse_server_key_exchange()
|
/mbedtls-development/include/mbedtls/ |
A D | x509.h | 320 mbedtls_x509_buf *alg, mbedtls_x509_buf *params ); 322 int mbedtls_x509_get_rsassa_pss_params( const mbedtls_x509_buf *params,
|
A D | asn1.h | 576 mbedtls_asn1_buf *alg, mbedtls_asn1_buf *params );
|
/mbedtls-development/tests/scripts/ |
A D | generate_psa_tests.py | 186 if kt.params is not None: 189 for i, sym in enumerate(kt.params)] 275 if kt.params is not None: 277 for i, sym in enumerate(kt.params)] 499 params: Optional[Iterable[str]] = None 507 kt = crypto_knowledge.KeyType(key_type, params)
|