/mbedtls/tests/suites/ |
A D | test_suite_asn1write.function | 20 TEST_CALLOC(data->output, data->size == 0 ? 1 : data->size); 21 data->end = data->output + data->size; 22 data->p = data->end; 23 data->start = data->end - data->size; 39 TEST_ASSERT(data->p <= data->end); 40 TEST_MEMORY_COMPARE(data->p, (size_t) (data->end - data->p), 62 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 84 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 112 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 141 for (data.size = 0; data.size <= expected->len + 1; data.size++) { [all …]
|
A D | test_suite_asn1write.data | 346 Store named data: not found 352 Store named data: first 355 Store named data: last 358 Store named data: skip suffix 361 Store named data: skip prefix 364 Store named data: first match 370 Store named data: found, null to data 373 Store named data: found, data to zero 376 Store named data: found, smaller data 379 Store named data: found, same-size data [all …]
|
A D | test_suite_pkcs5.function | 32 data_t *data, int outsize, int ref_ret, 52 pw->x, pw->len, data->x, data->len, my_out); 63 pw->x, pw->len, data->x, data->len, my_out, 80 data_t *data, int outsize, int ref_ret, 101 pw->x, pw->len, data->x, data->len, my_out); 112 pw->x, pw->len, data->x, data->len, my_out,
|
A D | test_suite_constant_time_hmac.function | 30 /* TLS additional data is 13 bytes (hence the "lucky 13" name) */ 33 unsigned char *data = NULL; 89 TEST_CALLOC(data, max_in_len); 95 /* Set up dummy data and add_data */ 99 data[i] = (i & 0xff) ^ rec_num; 107 data, in_len, 112 data, in_len, 125 data, in_len)); 141 mbedtls_free(data); 142 data = NULL; [all …]
|
A D | test_suite_psa_its.function | 10 * before changing how test data is constructed or validated. 95 TEST_CALLOC(buffer, data->len); 97 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, flags)); 100 TEST_ASSERT(info.size == data->len); 103 TEST_MEMORY_COMPARE(data->x, data->len, buffer, ret_len); 205 void get_at(int uid_arg, data_t *data, 221 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, 0)); 241 void get_fail(int uid_arg, data_t *data, 254 PSA_ASSERT(psa_its_set_wrap(uid, data->len, data->x, 0)); 293 void set_fail(int uid_arg, data_t *data, [all …]
|
A D | test_suite_ecjpake.data | 22 ECJPAKE round one: KKP1: no data 31 ECJPAKE round one: KKP1: no point data 49 ECJPAKE round one: KKP1: no second point data 61 ECJPAKE round one: KKP1: no data for r 70 ECJPAKE round one: KKP2: no data 79 ECJPAKE round one: KKP2: no point data 109 ECJPAKE round one: KKP2: no data for r 124 ECJPAKE round two client: no data 175 ECJPAKE round two client: no data for r 190 ECJPAKE round two server: no data [all …]
|
A D | test_suite_pkcs12.function | 74 data_t *data, int outsize, int ref_ret, data_t *ref_out) 96 md_alg, pw->x, pw->len, data->x, data->len, my_out); 112 md_alg, pw->x, pw->len, data->x, data->len, my_out, 129 data_t *data, int outsize, int ref_ret, data_t *ref_out) 151 md_alg, pw->x, pw->len, data->x, data->len, my_out); 168 md_alg, pw->x, pw->len, data->x, data->len, my_out,
|
A D | test_suite_psa_crypto_persistent_key.function | 12 * before changing how test data is constructed or validated. 124 uint8_t *data = NULL; 128 TEST_CALLOC(data, data_length); 135 TEST_EQUAL(psa_import_key(&attributes, data, data_length, &key_id), 143 mbedtls_free(data); 202 data_t *data, int restart, int expected_status) 214 TEST_EQUAL(psa_import_key(&attributes, data->x, data->len, &returned_key_id), 256 void import_export_persistent_key(data_t *data, int type_arg, 264 size_t export_size = data->len; 277 PSA_ASSERT(psa_import_key(&attributes, data->x, data->len, [all …]
|
A D | test_suite_pem.function | 38 unsigned char data[256] = { 0 }; 42 for (size_t l = 0; l <= sizeof(data); l++) { 43 ret = mbedtls_pem_write_buffer("\n", "\n", data, l, NULL, 0, &olen_needed); 47 ret = mbedtls_pem_write_buffer("\n", "\n", data, l, buf, sizeof(buf), &olen); 53 ret = mbedtls_pem_write_buffer("\n", "\n", data, l, buf, olen_needed, &olen); 65 void mbedtls_pem_read_buffer(char *header, char *footer, char *data, 78 ret = mbedtls_pem_read_buffer(&ctx, header, footer, (unsigned char *) data,
|
/mbedtls/library/ |
A D | alignment.h | 557 #define MBEDTLS_GET_UINT24_BE(data, offset) \ argument 559 ((uint32_t) (data)[(offset)] << 16) \ 560 | ((uint32_t) (data)[(offset) + 1] << 8) \ 561 | ((uint32_t) (data)[(offset) + 2]) \ 573 #define MBEDTLS_PUT_UINT24_BE(n, data, offset) \ argument 575 (data)[(offset)] = MBEDTLS_BYTE_2(n); \ 576 (data)[(offset) + 1] = MBEDTLS_BYTE_1(n); \ 589 #define MBEDTLS_GET_UINT24_LE(data, offset) \ argument 591 ((uint32_t) (data)[(offset)]) \ 592 | ((uint32_t) (data)[(offset) + 1] << 8) \ [all …]
|
A D | psa_crypto.c | 731 memcpy(slot->key.data, data, data_length); in psa_copy_key_material_into_slot() 1527 uint8_t *data, in psa_export_public_key_internal() argument 1583 (void) data; in psa_export_public_key_internal() 6149 uint8_t **data in psa_generate_derived_ecc_key_weierstrass_helper() argument 6256 uint8_t **data in psa_generate_derived_ecc_key_montgomery_helper() argument 6311 (void) data; in psa_generate_derived_ecc_key_weierstrass_helper() 6320 (void) data; in psa_generate_derived_ecc_key_montgomery_helper() 7088 uint64_t data) in psa_pbkdf2_set_input_cost() argument 7102 if (data == 0) { in psa_pbkdf2_set_input_cost() 7350 (void) data; in psa_key_derivation_input_internal() [all …]
|
A D | psa_crypto_storage.c | 77 const mbedtls_svc_key_id_t key, uint8_t *data, size_t data_size) in psa_crypto_storage_load() argument 129 const uint8_t *data, in psa_crypto_storage_store() argument 236 void psa_format_key_data_for_storage(const uint8_t *data, in psa_format_key_data_for_storage() argument 254 memcpy(storage_format->key_data, data, data_length); in psa_format_key_data_for_storage() 257 static psa_status_t check_magic_header(const uint8_t *data) in check_magic_header() argument 259 if (memcmp(data, PSA_KEY_STORAGE_MAGIC_HEADER, in check_magic_header() 318 const uint8_t *data, in psa_save_persistent_key() argument 326 if (data == NULL || data_length == 0) { in psa_save_persistent_key() 356 uint8_t **data, in psa_load_persistent_key() argument 381 data, data_length, attr); in psa_load_persistent_key() [all …]
|
A D | psa_crypto_rsa.c | 111 const uint8_t *data, size_t data_length, in mbedtls_psa_rsa_import_key() argument 120 data, in mbedtls_psa_rsa_import_key() 153 uint8_t *data, in mbedtls_psa_rsa_export_key() argument 158 uint8_t *end = data + data_size; in mbedtls_psa_rsa_export_key() 164 ret = mbedtls_rsa_write_key(rsa, data, &end); in mbedtls_psa_rsa_export_key() 171 memset(data, 0, data_size); in mbedtls_psa_rsa_export_key() 179 memcpy(data, data + data_size - ret, ret); in mbedtls_psa_rsa_export_key() 180 memset(data + data_size - ret, 0, ret); in mbedtls_psa_rsa_export_key() 182 memmove(data, data + data_size - ret, ret); in mbedtls_psa_rsa_export_key() 183 memset(data + ret, 0, data_size - ret); in mbedtls_psa_rsa_export_key() [all …]
|
A D | timing.c | 108 void mbedtls_timing_set_delay(void *data, uint32_t int_ms, uint32_t fin_ms) in mbedtls_timing_set_delay() argument 110 mbedtls_timing_delay_context *ctx = (mbedtls_timing_delay_context *) data; in mbedtls_timing_set_delay() 123 int mbedtls_timing_get_delay(void *data) in mbedtls_timing_get_delay() argument 125 mbedtls_timing_delay_context *ctx = (mbedtls_timing_delay_context *) data; in mbedtls_timing_get_delay() 149 const mbedtls_timing_delay_context *data) in mbedtls_timing_get_final_delay() argument 151 return data->fin_ms; in mbedtls_timing_get_final_delay()
|
A D | md5.c | 71 local.X[0] = MBEDTLS_GET_UINT32_LE(data, 0); in mbedtls_internal_md5_process() 72 local.X[1] = MBEDTLS_GET_UINT32_LE(data, 4); in mbedtls_internal_md5_process() 73 local.X[2] = MBEDTLS_GET_UINT32_LE(data, 8); in mbedtls_internal_md5_process() 74 local.X[3] = MBEDTLS_GET_UINT32_LE(data, 12); in mbedtls_internal_md5_process() 75 local.X[4] = MBEDTLS_GET_UINT32_LE(data, 16); in mbedtls_internal_md5_process() 76 local.X[5] = MBEDTLS_GET_UINT32_LE(data, 20); in mbedtls_internal_md5_process() 77 local.X[6] = MBEDTLS_GET_UINT32_LE(data, 24); in mbedtls_internal_md5_process() 78 local.X[7] = MBEDTLS_GET_UINT32_LE(data, 28); in mbedtls_internal_md5_process() 79 local.X[8] = MBEDTLS_GET_UINT32_LE(data, 32); in mbedtls_internal_md5_process() 80 local.X[9] = MBEDTLS_GET_UINT32_LE(data, 36); in mbedtls_internal_md5_process() [all …]
|
A D | psa_crypto_driver_wrappers_no_static.c | 125 uint8_t *data, size_t data_size, size_t *data_length ) in psa_driver_wrapper_export_public_key() argument 149 data, data_size, data_length ) ); in psa_driver_wrapper_export_public_key() 165 data, in psa_driver_wrapper_export_public_key() 179 data, in psa_driver_wrapper_export_public_key() 194 data, in psa_driver_wrapper_export_public_key() 207 data, in psa_driver_wrapper_export_public_key()
|
A D | ssl_msg.c | 909 unsigned char *data; in mbedtls_ssl_encrypt_buf() local 955 data = rec->buf + rec->data_offset; in mbedtls_ssl_encrypt_buf() 1202 data, rec->buf_len - (data - rec->buf), in mbedtls_ssl_encrypt_buf() 1494 unsigned char *data; in mbedtls_ssl_decrypt_buf() local 1572 dynamic_iv = data; in mbedtls_ssl_decrypt_buf() 1574 data += dynamic_iv_len; in mbedtls_ssl_decrypt_buf() 1629 data, rec->buf_len - (data - rec->buf), in mbedtls_ssl_decrypt_buf() 1643 data, rec->buf_len - (size_t) (data - rec->buf), &olen, /* dst */ in mbedtls_ssl_decrypt_buf() 1844 data += transform->ivlen; in mbedtls_ssl_decrypt_buf() 1894 data, rec->data_len, data, &olen)) != 0) { in mbedtls_ssl_decrypt_buf() [all …]
|
/mbedtls/tests/scripts/ |
A D | generate_pkcs7_tests.py | 58 data = fp.read() 84 def asn1_mutate(data): argument 99 mutations.append(["00"] + data) 101 mutations.append(data + ["00"]) 108 while i < len(data): 111 data_i = leng_i + 1 + (int(data[leng_i][1], 16) if data[leng_i][0] == '8' else 0) 112 if data[leng_i][0] == '8': 117 tag = data[tag_i] 128 mutations.append(data[:tag_i] + [new_tag] + data[leng_i:]) 137 mutations.append(data[:data_i -1] + [new_length] + data[data_i:]) [all …]
|
A D | test_generate_test_code.py | 386 data = ''' 401 data = ''' 413 data = ''' 559 data = ''' 574 data = ''' 593 data = ''' 620 data = ''' 665 data = ''' 719 data = ''' 821 data = ''' [all …]
|
/mbedtls/tests/src/drivers/ |
A D | test_driver_key_management.c | 266 const uint8_t *data, in mbedtls_test_transparent_import_key() argument 288 data, data_length, in mbedtls_test_transparent_import_key() 295 data, data_length, in mbedtls_test_transparent_import_key() 305 data, data_length, in mbedtls_test_transparent_import_key() 312 data, data_length, in mbedtls_test_transparent_import_key() 322 data, data_length, in mbedtls_test_transparent_import_key() 329 data, data_length, in mbedtls_test_transparent_import_key() 334 (void) data; in mbedtls_test_transparent_import_key() 348 const uint8_t *data, in mbedtls_test_opaque_import_key() argument 395 data, data_length, in mbedtls_test_opaque_import_key() [all …]
|
/mbedtls/docs/ |
A D | tls13-early-data.md | 2 Writing early data 5 An application function to write and send a buffer of data to a server through 33 where ssl is the SSL context to use, data_to_write the address of the data 34 buffer and data_to_write_len the number of data bytes. The handshake may 37 completing the handshake before to write and send data to the server. The 42 An application function to write and send early data and only early data, 78 early data and then as standard post-handshake application data could 103 code to write and send a buffer of data could plausibly look like: 147 Reading early data 154 the reception of early data is signaled by an API returning the [all …]
|
/mbedtls/scripts/mbedtls_dev/ |
A D | crypto_data_tests.py | 51 'PSA_ALG_MD5': lambda data: hashlib.md5(data).hexdigest(), 53 'PSA_ALG_SHA_1': lambda data: hashlib.sha1(data).hexdigest(), 54 'PSA_ALG_SHA_224': lambda data: hashlib.sha224(data).hexdigest(), 55 'PSA_ALG_SHA_256': lambda data: hashlib.sha256(data).hexdigest(), 56 'PSA_ALG_SHA_384': lambda data: hashlib.sha384(data).hexdigest(), 57 'PSA_ALG_SHA_512': lambda data: hashlib.sha512(data).hexdigest(),
|
/mbedtls/scripts/ |
A D | generate_psa_constants.py | 302 data = {} 303 data['status_cases'] = self._make_status_cases() 304 data['ecc_curve_cases'] = self._make_ecc_curve_cases() 305 data['dh_group_cases'] = self._make_dh_group_cases() 306 data['key_type_cases'] = self._make_key_type_cases() 307 data['key_type_code'] = (self._make_ecc_key_type_code() + 310 data['ka_algorithm_cases'] = self._make_ka_algorithm_cases() 311 data['algorithm_cases'] = self._make_algorithm_cases() 312 data['algorithm_code'] = self._make_algorithm_code() 313 data['key_usage_code'] = self._make_key_usage_code() [all …]
|
/mbedtls/tests/src/ |
A D | psa_crypto_stubs.c | 26 uint8_t *data, in psa_export_key() argument 31 (void) data; in psa_export_key() 38 uint8_t *data, in psa_export_public_key() argument 43 (void) data; in psa_export_public_key() 64 const uint8_t *data, in psa_import_key() argument 69 (void) data; in psa_import_key()
|
/mbedtls/programs/ssl/ |
A D | ssl_mail_client.c | 225 unsigned char data[128]; in write_ssl_and_get_response() local 238 len = sizeof(data) - 1; in write_ssl_and_get_response() 239 memset(data, 0, sizeof(data)); in write_ssl_and_get_response() 255 mbedtls_printf("\n%s", data); in write_ssl_and_get_response() 258 if (data[i] != '\n') { in write_ssl_and_get_response() 278 unsigned char data[128]; in write_and_get_response() local 289 len = sizeof(data) - 1; in write_and_get_response() 290 memset(data, 0, sizeof(data)); in write_and_get_response() 298 data[len] = '\0'; in write_and_get_response() 299 mbedtls_printf("\n%s", data); in write_and_get_response() [all …]
|