/mbedtls/scripts/mbedtls_dev/ |
A D | crypto_knowledge.py | 27 short = re.sub(r' +', r'', short) 29 short = re.sub(r'PUBLIC_KEY\b', r'PUB', short) 30 short = re.sub(r'KEY_PAIR\b', r'PAIR', short) 31 short = re.sub(r'\bBRAINPOOL_P', r'BP', short) 32 short = re.sub(r'\bMONTGOMERY\b', r'MGM', short) 34 short = re.sub(r'\bDETERMINISTIC_', r'DET_', short) 35 short = re.sub(r'\bKEY_AGREEMENT\b', r'KA', short) 36 short = re.sub(r'_PSK_TO_MS\b', r'_PSK2MS', short) 332 head = re.sub(r'_ANY\Z', r'', head) 384 prefix = re.sub(r'_*[^_]*\Z', r'', prefix) [all …]
|
A D | c_parsing_helper.py | 28 r'(?P<type>\w[\w\s*]*?)\s*' + 29 r'(?!(?:' + r'|'.join(_KEYWORDS) + r'))(?P<name>\b\w+\b)?' + 30 r'\s*(?P<suffix>\[[^][]*\])?\Z', 36 typ = re.sub(r'\s+', r' ', typ) 37 typ = re.sub(r'\s*\*', r' *', typ) 55 VOID_RE = re.compile(r'\s*\bvoid\s*\Z', re.A) 80 _NOT_NEWLINES_RE = re.compile(r'[^\n]+') 107 r'(?P<qualifiers>(?:(?:extern|inline|static)\b\s*)*)' 108 r'(?P<return_type>\w[\w\s*]*?)\s*' + 109 r'\b(?P<name>\w+)' + [all …]
|
A D | psa_information.py | 59 return re.sub(r'_FAMILY_(.*)', r'_\1_' + str(bits), dep) 85 used.update(re.findall(r'PSA_(?:ALG|ECC_FAMILY|DH_FAMILY|KEY_TYPE)_\w+', expr)) 94 AES_128BIT_ONLY_DEP_REGEX = re.compile(r'AES\s(192|256)') 98 ECB_NO_PADDING_DEP_REGEX = re.compile(r'(AES|ARIA|CAMELLIA).*ECB_NO_PADDING') 124 for symbol in re.findall(r'\bPSA_WANT_\w+\b', line)) 146 ret_list.append(re.sub(r'KEY_PAIR', r'KEY_PAIR_BASIC', dep)) 147 ret_list.append(re.sub(r'KEY_PAIR', r'KEY_PAIR_IMPORT', dep)) 148 ret_list.append(re.sub(r'KEY_PAIR', r'KEY_PAIR_EXPORT', dep)) 150 ret_list.append(re.sub(r'KEY_PAIR', r'KEY_PAIR_GENERATE', dep))
|
A D | macro_collector.py | 147 _argument_split_re = re.compile(r' *, *') 258 if re.match(r'MAC(?:_|\Z)', name): 260 elif re.match(r'KDF(?:_|\Z)', name): 264 elif re.search(r'0x03[0-9A-Fa-f]{6}', expansion): 266 elif re.search(r'0x05[0-9A-Fa-f]{6}', expansion): 279 r'(.+)') 292 expansion = re.sub(r'/\*.*?\*/|//.*', r' ', expansion) 450 re.compile(r'#define +' + 452 r'(?:\(([^\n()]*)\))?') 491 _macro_identifier_re = re.compile(r'[A-Z]\w+') [all …]
|
A D | asymmetric_key_data.py | 27 private = 'PSA_KEY_TYPE_' + re.sub(r'(\(|\Z)', r'_KEY_PAIR\1', typ, 1) 28 public = 'PSA_KEY_TYPE_' + re.sub(r'(\(|\Z)', r'_PUBLIC_KEY\1', typ, 1)
|
/mbedtls/tests/scripts/ |
A D | analyze_outcomes.py | 320 re.compile(r'PBE Encrypt, .*'), 321 re.compile(r'PBE Decrypt, .*'), 326 re.compile(r'PBES2 Encrypt, .*'), 327 re.compile(r'PBES2 Decrypt .*'), 366 re.compile(r'ECP calculate public: .*'), 367 re.compile(r'ECP gen keypair .*'), 368 re.compile(r'ECP point muladd .*'), 370 re.compile(r'ECP test vectors .*'), 447 re.compile(r'ASN.1 Write mpi.*'), 490 re.compile(r'ASN.1 Write mpi.*'), [all …]
|
A D | check_names.py | 498 r'//.*', # line comment 520 m = re.search(r"\*/", line) 536 m = re.search(r"/\*", line) 550 r".* \**(\w+) *\( *\w", 552 r".*\( *\* *(\w+) *\) *\(", 556 r"}? *(\w+)[;[].*", 560 r"extern +\"C\"", 562 r"} *;?$", 563 r"$", 564 r"//", [all …]
|
A D | generate_test_code.py | 189 BEGIN_DEP_REGEX = r'BEGIN_DEPENDENCIES' 190 END_DEP_REGEX = r'END_DEPENDENCIES' 193 END_CASE_REGEX = r'/\*\s*END_CASE\s*\*/' 196 C_IDENTIFIER_REGEX = r'!?[a-z_][a-z0-9_]*' 197 CONDITION_OPERATOR_REGEX = r'[!=]=|[<>]=?' 204 FUNCTION_ARG_LIST_END_REGEX = r'.*\)' 205 EXIT_LABEL_REGEX = r'^exit:' 482 arg = re.sub(r'\s*\*\s*', r'*', arg) 483 arg = re.sub(r'\s+', r' ', arg) 610 re.sub(r'.', r' ', line[opening.start(0):pos]) + [all …]
|
A D | check_files.py | 107 r'docs/.*\.pdf\Z', 108 r'docs/.*\.png\Z', 109 r'programs/fuzz/corpuses/[^.]+\Z', 110 r'tests/data_files/[^.]+\Z', 112 r'tests/data_files/.*\.req\.[^/]+\Z', 113 r'tests/data_files/.*malformed[^/]+\Z', 114 r'tests/data_files/format_pkcs12\.fmt\Z', 115 r'tests/data_files/.*\.bin\Z', 373 r'3rdparty/(?!(p256-m)/.*)', 381 r'configs/ext/README\.md\Z', [all …]
|
A D | translate_ciphers.py | 89 s_cipher = re.sub(r'\ATLS-', '+', s_cipher) 101 s_cipher = re.sub(r"GCM-SHA\d\d\d", "GCM", s_cipher) 121 s_cipher = re.sub(r'^TLS-', '', s_cipher) 130 s_cipher = re.sub(r'^RSA-', r'', s_cipher) 138 s_cipher = re.sub(r'(?<!DES-)CBC-', r'', s_cipher)
|
/mbedtls/library/ |
A D | ecdsa.c | 93 mbedtls_mpi_init(&ctx->r); in ecdsa_restart_sig_init() 107 mbedtls_mpi_free(&ctx->r); in ecdsa_restart_sig_free() 255 mbedtls_mpi *pk = &k, *pr = r; in mbedtls_ecdsa_sign_restartable() 278 pr = &rs_ctx->sig->r; in mbedtls_ecdsa_sign_restartable() 527 if (mbedtls_mpi_cmp_int(r, 1) < 0 || mbedtls_mpi_cmp_mpi(r, &grp->N) >= 0 || in mbedtls_ecdsa_verify_restartable() 648 mbedtls_mpi r, s; in mbedtls_ecdsa_write_signature_restartable() local 653 mbedtls_mpi_init(&r); in mbedtls_ecdsa_write_signature_restartable() 679 mbedtls_mpi_free(&r); in mbedtls_ecdsa_write_signature_restartable() 723 mbedtls_mpi r, s; in mbedtls_ecdsa_read_signature_restartable() local 724 mbedtls_mpi_init(&r); in mbedtls_ecdsa_read_signature_restartable() [all …]
|
A D | bignum_mod.c | 34 r->limbs = N->limbs; in mbedtls_mpi_mod_residue_setup() 35 r->p = p; in mbedtls_mpi_mod_residue_setup() 42 if (r == NULL) { in mbedtls_mpi_mod_residue_release() 46 r->limbs = 0; in mbedtls_mpi_mod_residue_release() 47 r->p = NULL; in mbedtls_mpi_mod_residue_release() 326 if (r->limbs == 0 || N->limbs == 0) { in mbedtls_mpi_mod_read() 329 if (r->limbs != N->limbs) { in mbedtls_mpi_mod_read() 338 r->limbs = N->limbs; in mbedtls_mpi_mod_read() 353 if (r->limbs == 0 || N->limbs == 0) { in mbedtls_mpi_mod_write() 356 if (r->limbs != N->limbs) { in mbedtls_mpi_mod_write() [all …]
|
A D | alignment.h | 117 uint16_t r; in mbedtls_get_unaligned_uint16() local 120 r = *p16; in mbedtls_get_unaligned_uint16() 123 r = p16->x; in mbedtls_get_unaligned_uint16() 125 memcpy(&r, p, sizeof(r)); in mbedtls_get_unaligned_uint16() 127 return r; in mbedtls_get_unaligned_uint16() 172 r = *p32; in mbedtls_get_unaligned_uint32() 177 memcpy(&r, p, sizeof(r)); in mbedtls_get_unaligned_uint32() 179 return r; in mbedtls_get_unaligned_uint32() 224 r = *p64; in mbedtls_get_unaligned_uint64() 229 memcpy(&r, p, sizeof(r)); in mbedtls_get_unaligned_uint64() [all …]
|
A D | common.h | 186 static inline void mbedtls_xor(unsigned char *r, in mbedtls_xor() argument 200 vst1q_u8(r + i, x); in mbedtls_xor() 215 mbedtls_put_unaligned_uint64(r + i, x); in mbedtls_xor() 225 mbedtls_put_unaligned_uint32(r + i, x); in mbedtls_xor() 235 r[i] = a[i] ^ b[i]; in mbedtls_xor() 268 static inline void mbedtls_xor_no_simd(unsigned char *r, in mbedtls_xor_no_simd() argument 279 mbedtls_put_unaligned_uint64(r + i, x); in mbedtls_xor_no_simd() 293 mbedtls_put_unaligned_uint32(r + i, x); in mbedtls_xor_no_simd() 303 r[i] = a[i] ^ b[i]; in mbedtls_xor_no_simd()
|
A D | aria.c | 44 uint32_t r; in aria_p1() local 46 return r; in aria_p1() 53 uint32_t r; in aria_p1() local 55 return r; in aria_p1() 287 r[0] = a ^ x[0]; in aria_fo_xor() 288 r[1] = b ^ x[1]; in aria_fo_xor() 289 r[2] = c ^ x[2]; in aria_fo_xor() 290 r[3] = d ^ x[3]; in aria_fo_xor() 309 r[0] = a ^ x[0]; in aria_fe_xor() 310 r[1] = b ^ x[1]; in aria_fe_xor() [all …]
|
A D | psa_crypto_ecp.c | 375 mbedtls_mpi r, s; in mbedtls_psa_ecdsa_sign_hash() local 387 mbedtls_mpi_init(&r); in mbedtls_psa_ecdsa_sign_hash() 400 &ecp->grp, &r, &s, in mbedtls_psa_ecdsa_sign_hash() 411 MBEDTLS_MPI_CHK(mbedtls_ecdsa_sign(&ecp->grp, &r, &s, &ecp->d, in mbedtls_psa_ecdsa_sign_hash() 417 MBEDTLS_MPI_CHK(mbedtls_mpi_write_binary(&r, in mbedtls_psa_ecdsa_sign_hash() 424 mbedtls_mpi_free(&r); in mbedtls_psa_ecdsa_sign_hash() 460 mbedtls_mpi r, s; in mbedtls_psa_ecdsa_verify_hash() local 474 mbedtls_mpi_init(&r); in mbedtls_psa_ecdsa_verify_hash() 482 status = mbedtls_to_psa_error(mbedtls_mpi_read_binary(&r, in mbedtls_psa_ecdsa_verify_hash() 503 &r, &s)); in mbedtls_psa_ecdsa_verify_hash() [all …]
|
/mbedtls/tests/suites/ |
A D | test_suite_ecdsa.function | 15 mbedtls_mpi d, r, s; 47 mbedtls_mpi d, r, s; 85 mbedtls_mpi d, r, s, r_check, s_check, zero; 132 /* Invalid signatures: r or s or both one off */ 153 /* Invalid signatures: r, s or both are == N */ 198 mbedtls_mpi d, r, s, r_check, s_check; 212 mbedtls_ecdsa_sign_det_ext(&grp, &r, &s, &d, 276 /* try modifying r */ 345 /* try modifying r */ 391 /* try modifying r */ [all …]
|
A D | test_suite_alignment.function | 44 uint64_t r = 0; 77 TEST_EQUAL(r, expected); 112 uint64_t r = 0; 115 r = MBEDTLS_BSWAP16(input); 118 r = MBEDTLS_BSWAP32(input); 126 TEST_EQUAL(r, expected); 130 * input and r. 143 r = MBEDTLS_BSWAP16(r); 147 r = MBEDTLS_BSWAP32(r); 151 r = MBEDTLS_BSWAP64(r); [all …]
|
A D | test_suite_psa_crypto_util.data | 9 ECDSA Raw -> DER, 256bit, Null r 17 ECDSA Raw -> DER, 256bit, r with MSb set 25 ECDSA Raw -> DER, 256bit, both r and s with MSb set 29 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data 33 ECDSA Raw -> DER, 256bit, r and s only 1 byte of data with MSb set 45 ECDSA Raw -> DER, 256bit, Invalid raw signature (r 1 byte longer) 93 ECDSA DER -> Raw, 256bit, r with MSb set 97 ECDSA DER -> Raw, 256bit, Invalid r all zeros 105 ECDSA DER -> Raw, 256bit, Valid r only 1 zero byte 113 ECDSA DER -> Raw, 256bit, Invalid 0-length r [all …]
|
A D | test_suite_bignum_mod.function | 27 r->p = p; 28 r->limbs = limbs; 546 mbedtls_mpi_mod_residue r; 560 TEST_ASSERT(r.p == R); 606 r.limbs--; 607 TEST_ASSERT(r.limbs < m.limbs); 612 r.limbs++; 616 TEST_ASSERT(r.limbs > m.limbs); 627 if (r.limbs > 1 && ret == 0) { 649 mbedtls_mpi_mod_residue r; [all …]
|
A D | test_suite_ecjpake.data | 58 ECJPAKE round one: KKP1: zero-length r 61 ECJPAKE round one: KKP1: no data for r 64 ECJPAKE round one: KKP1: corrupted r 106 ECJPAKE round one: KKP2: zero-length r 109 ECJPAKE round one: KKP2: no data for r 112 ECJPAKE round one: KKP2: corrupted r 172 ECJPAKE round two client: zero-length r 175 ECJPAKE round two client: no data for r 178 ECJPAKE round two client: corrupted r 226 ECJPAKE round two server: zero-length r [all …]
|
/mbedtls/scripts/ |
A D | prepare_release.sh | 58 r=' yes' 60 r='' 62 sed -i 's/^\(GEN_FILES[ ?:]*=\)\([^#]*\)/\1'"$r/" Makefile */Makefile 66 r='ON' 68 r='OFF' 70 …ent/! s/^\( *option *( *GEN_FILES *"[^"]*" *\)\([A-Za-z0-9][A-Za-z0-9]*\)/\1'"$r/" CMakeLists.txt
|
A D | generate_ssl_debug_helpers.py | 24 string_pattern = r"(?P<string>\".*?\"|\'.*?\')" 25 comment_pattern = r"(?P<comment>/\*.*?\*/|//[^\r\n]*$)" 26 pattern = re.compile(string_pattern + r'|' + comment_pattern, 53 pattern = re.compile(r"^[ \t]*#[ \t]*" + 54 r"(?P<directive>(if[ \t]|ifndef[ \t]|ifdef[ \t]|else|endif))" + 55 r"[ \t]*(?P<param>(.*\\\n)*.*$)", 145 enum_pattern = re.compile(r'enum\s*(?P<prefix_name>\w*)\s*' + 146 r'{\s*(?P<body>[^}]*)}' + 147 r'\s*(?P<suffix_name>\w*)\s*;', 235 r'(?P<value>0[xX][0-9a-fA-F]+)$', [all …]
|
/mbedtls/programs/x509/ |
A D | cert_req.c | 147 char *p, *q, *r; in main() local 218 r = q; in main() 224 r = semicolon; in main() 232 r = semicolon; in main() 238 *r++ = '\0'; in main() 240 r = NULL; in main() 307 q = r; in main() 320 *r++ = '\0'; in main() 341 q = r; in main() 352 *r++ = '\0'; in main() [all …]
|
/mbedtls/include/mbedtls/ |
A D | ecdsa.h | 161 int mbedtls_ecdsa_sign(mbedtls_ecp_group *grp, mbedtls_mpi *r, mbedtls_mpi *s, 206 int mbedtls_ecdsa_sign_det_ext(mbedtls_ecp_group *grp, mbedtls_mpi *r, 271 mbedtls_mpi *r, mbedtls_mpi *s, 334 mbedtls_mpi *r, mbedtls_mpi *s, 375 const mbedtls_ecp_point *Q, const mbedtls_mpi *r, 417 const mbedtls_mpi *r,
|