| /mbedtls/tests/suites/ |
| A D | test_suite_asn1parse.function | 144 memcpy(buf, input->x, input->len); 317 TEST_ASSERT(p == input->x + input->len); 336 p = input->x; 343 p = input->x; 404 TEST_ASSERT(p == input->x + input->len); 443 TEST_ASSERT(p == input->x + input->len); 492 TEST_ASSERT(p == input->x + input->len); 542 TEST_EQUAL(bs.p - input->x + bs.len, input->len); 543 TEST_ASSERT(p == input->x + input->len); 553 TEST_ASSERT(p == input->x + input->len - bs.len); [all …]
|
| A D | test_suite_bignum_mod_raw.data | 1 Test mbedtls_mpi_mod_raw_io #1 BE (Buffer and limbs just fit, input limb-aligned) 4 Test mbedtls_mpi_mod_raw_io #1 LE (Buffer and limbs just fit, input limb-aligned) 7 Test mbedtls_mpi_mod_raw_io #2 BE (Buffer and limbs just fit, input unaligned) 73 Test mbedtls_mpi_mod_raw_io #13 BE (Zero, empty input) 76 Test mbedtls_mpi_mod_raw_io #13 LE (Zero, empty input) 113 Test mbedtls_mpi_mod_raw_io #18 BE (not enough limbs, input unaligned) 116 Test mbedtls_mpi_mod_raw_io #18 LE (not enough limbs, input unaligned) 125 Test mbedtls_mpi_mod_raw_io #20 BE (buffer too small, input unaligned) 128 Test mbedtls_mpi_mod_raw_io #20 LE (buffer too small, input unaligned) 131 Test mbedtls_mpi_mod_raw_io #21 BE (modulus is equal to input) [all …]
|
| A D | test_suite_psa_crypto_op_fail.function | 59 psa_hash_compute(alg, input, sizeof(input), 62 psa_hash_compare(alg, input, sizeof(input), 102 input, sizeof(input), 106 input, sizeof(input), 148 input, sizeof(input), 152 input, sizeof(input), 194 input, sizeof(input), 199 input, sizeof(input), 245 input, sizeof(input), 250 input, sizeof(input))); [all …]
|
| A D | test_suite_psa_crypto_hash.function | 14 void hash_finish(int alg_arg, data_t *input, data_t *expected_hash) 25 input->x, input->len)); 39 void hmac(int alg_arg, char *input, data_t *expected_mac) 62 size_t input_len = strlen(input); 85 void hash_verify(int alg_arg, data_t *input, data_t *expected_hash) 94 input->x, 95 input->len)); 123 input->x, len)); 126 input->x + len, input->len - len)); 128 input->x + len, input->len - len)); [all …]
|
| A D | test_suite_psa_crypto_util.function | 7 void ecdsa_raw_to_der(int key_bits, data_t *input, data_t *exp_result, int exp_ret) 15 TEST_EQUAL(mbedtls_ecdsa_raw_to_der(key_bits, input->x, input->len, 28 void ecdsa_raw_to_der_incremental(int key_bits, data_t *input, data_t *exp_result) 37 TEST_ASSERT(mbedtls_ecdsa_raw_to_der(key_bits, input->x, input->len, 46 TEST_ASSERT(mbedtls_ecdsa_raw_to_der(key_bits, input->x, input->len, 58 void ecdsa_der_to_raw(int key_bits, data_t *input, data_t *exp_result, int exp_ret) 68 /* Verify that parsing of truncated input always fails. */ 69 for (in_buf_len = 1; in_buf_len < input->len; in_buf_len++) { 70 /* We alloc a copy of input buffer with limited length so that sanitizers 73 memcpy(in_buf, input->x, in_buf_len); [all …]
|
| A D | test_suite_cipher.nist_kw.data | 33 KWP AES-128 1 byte input 37 KWP AES-128 2 byte input 41 KWP AES-128 3 byte input 45 KWP AES-128 4 byte input 49 KWP AES-128 5 byte input 53 KWP AES-128 6 byte input 57 KWP AES-128 7 byte input 61 KWP AES-128 8 byte input 65 KWP AES-128 9 byte input 69 KWP AES-128 10 byte input [all …]
|
| A D | test_suite_bignum_core.misc.data | 4 Test mbedtls_mpi_core_io_be #1 (Buffer and limbs just fit, input limb-aligned) 7 Test mbedtls_mpi_core_io_be #2 (Buffer and limbs just fit, input unaligned) 40 Test mbedtls_mpi_core_io_be #13 (Zero, empty input) 54 Test mbedtls_mpi_core_io_be #17 (not enough limbs, input limb-aligned) 57 Test mbedtls_mpi_core_io_be #18 (not enough limbs, input unaligned) 60 Test mbedtls_mpi_core_io_be #19 (buffer too small, input limb-aligned) 63 Test mbedtls_mpi_core_io_be #20 (buffer too small, input unaligned) 105 Test mbedtls_mpi_core_io_le #13 (Zero, empty input) 122 Test mbedtls_mpi_core_io_le #18 (not enough limbs, input unaligned) 128 Test mbedtls_mpi_core_io_le #20 (buffer too small, input unaligned) [all …]
|
| A D | test_suite_psa_crypto_memory.function | 87 uint8_t *input = NULL; 93 TEST_CALLOC(input, input_len); 94 fill_buffer_pattern(input, input_len); 104 TEST_MEMORY_COMPARE(input, input_len, 110 mbedtls_free(input); 139 uint8_t input[200]; 142 fill_buffer_pattern(input, sizeof(input)); 144 status = psa_crypto_local_input_alloc(input, sizeof(input), &local_input); 147 MBEDTLS_TEST_MEMORY_UNPOISON(input, sizeof(input)); 149 input, sizeof(input)); [all …]
|
| A D | test_suite_psa_crypto_memory.data | 1 PSA input buffer copy: straightforward copy 4 PSA input buffer copy: copy buffer larger than required 7 PSA input buffer copy: copy buffer too small 10 PSA input buffer copy: zero-length source buffer 13 PSA input buffer copy: zero-length both buffers 31 PSA crypto local input alloc 34 PSA crypto local input alloc, NULL buffer 37 PSA crypto local input free 40 PSA crypto local input free, NULL buffer 43 PSA crypto local input round-trip
|
| /mbedtls/3rdparty/everest/library/ |
| A D | Hacl_Curve25519.c | 118 memcpy(tmp, input, (uint32_t)5U * sizeof input[0U]); in Hacl_Bignum_Fmul_fmul() 226 memcpy(output, input, (uint32_t)5U * sizeof input[0U]); in Hacl_Bignum_Fsquare_fsquare_times() 409 memcpy(output, input, (uint32_t)5U * sizeof input[0U]); in Hacl_EC_Point_copy() 453 input[0U] = t0_; in Hacl_EC_Format_fcontract_first_carry_pass() 457 input[4U] = t4_; in Hacl_EC_Format_fcontract_first_carry_pass() 481 input[0U] = t0_; in Hacl_EC_Format_fcontract_second_carry_pass() 485 input[4U] = t4_; in Hacl_EC_Format_fcontract_second_carry_pass() 496 i0 = input[0U]; in Hacl_EC_Format_fcontract_second_carry_full() 497 i1 = input[1U]; in Hacl_EC_Format_fcontract_second_carry_full() 500 input[0U] = i0_; in Hacl_EC_Format_fcontract_second_carry_full() [all …]
|
| /mbedtls/3rdparty/everest/library/legacy/ |
| A D | Hacl_Curve25519.c | 58 uint64_t *input, in Hacl_Bignum_Fproduct_sum_scalar_multiplication_() argument 107 uint64_t *input, in Hacl_Bignum_Fmul_mul_shift_reduce_() argument 130 memcpy(tmp, input, (uint32_t)5U * sizeof input[0U]); in Hacl_Bignum_Fmul_fmul() 246 uint64_t *input, in Hacl_Bignum_Fsquare_fsquare_times_() argument 268 memcpy(output, input, (uint32_t)5U * sizeof input[0U]); in Hacl_Bignum_Fsquare_fsquare_times() 454 memcpy(output, input, (uint32_t)5U * sizeof input[0U]); in Hacl_EC_Point_copy() 498 input[0U] = t0_; in Hacl_EC_Format_fcontract_first_carry_pass() 502 input[4U] = t4_; in Hacl_EC_Format_fcontract_first_carry_pass() 526 input[0U] = t0_; in Hacl_EC_Format_fcontract_second_carry_pass() 541 i0 = input[0U]; in Hacl_EC_Format_fcontract_second_carry_full() [all …]
|
| /mbedtls/programs/psa/ |
| A D | crypto_examples.c | 160 uint8_t input[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local 164 status = psa_generate_random(input, sizeof(input)); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 177 input, sizeof(input), part_size, in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 186 status = memcmp(input, decrypt, sizeof(input)); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 209 uint8_t iv[block_size], input[input_size], in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local 212 status = psa_generate_random(input, sizeof(input)); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 225 input, sizeof(input), part_size, in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 234 status = memcmp(input, decrypt, sizeof(input)); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 259 status = psa_generate_random(input, sizeof(input)); in cipher_example_encrypt_decrypt_aes_ctr_multi() 272 input, sizeof(input), part_size, in cipher_example_encrypt_decrypt_aes_ctr_multi() [all …]
|
| A D | key_ladder_demo.sh | 27 echo "Here is some input. See it wrapped." >input.txt 30 input=input.txt output=hello_world.wrap 35 input=hello_world.wrap output=hello_world.txt 37 cmp input.txt hello_world.txt 41 …"$program" unwrap master=master.key input=hello_world.wrap output=hellow_orld.txt label=hellow lab… 46 input=hello_world.wrap output=hello.key 49 input=hello_world.wrap output=hello_world.txt
|
| /mbedtls/library/ |
| A D | cipher.c | 623 input, ilen, in mbedtls_cipher_update() 644 if (input == output && in mbedtls_cipher_update() 691 input += copy_len; in mbedtls_cipher_update() 847 if (NULL == input || NULL == data_len) { in get_pkcs_padding() 851 padding_len = input[input_len - 1]; in get_pkcs_padding() 889 if (NULL == input || NULL == data_len) { in get_one_and_zeros_padding() 937 if (NULL == input || NULL == data_len) { in get_zeros_and_len_padding() 941 padding_len = input[input_len - 1]; in get_zeros_and_len_padding() 977 if (NULL == input || NULL == data_len) { in get_zeros_padding() 1001 if (NULL == input || NULL == data_len) { in get_no_padding() [all …]
|
| A D | psa_crypto_driver_wrappers.h | 116 const uint8_t *input, in psa_driver_wrapper_sign_message() argument 191 const uint8_t *input, in psa_driver_wrapper_verify_message() argument 1076 const uint8_t *input, in psa_driver_wrapper_cipher_encrypt() argument 1152 (void)input; in psa_driver_wrapper_cipher_encrypt() 1234 (void)input; in psa_driver_wrapper_cipher_decrypt() 1461 (void)input; in psa_driver_wrapper_cipher_update() 1575 (void) input; in psa_driver_wrapper_hash_compute() 1985 const uint8_t *input, in psa_driver_wrapper_aead_update_ad() argument 2011 (void)input; in psa_driver_wrapper_aead_update_ad() 2019 const uint8_t *input, in psa_driver_wrapper_aead_update() argument [all …]
|
| A D | md.c | 589 return mbedtls_md5_update(ctx->md_ctx, input, ilen); in mbedtls_md_update() 696 input, ilen, in mbedtls_md() 705 return mbedtls_md5(input, ilen, output); in mbedtls_md() 709 return mbedtls_ripemd160(input, ilen, output); in mbedtls_md() 713 return mbedtls_sha1(input, ilen, output); in mbedtls_md() 717 return mbedtls_sha256(input, ilen, output, 1); in mbedtls_md() 721 return mbedtls_sha256(input, ilen, output, 0); in mbedtls_md() 725 return mbedtls_sha512(input, ilen, output, 1); in mbedtls_md() 729 return mbedtls_sha512(input, ilen, output, 0); in mbedtls_md() 1023 return mbedtls_md_update(ctx, input, ilen); in mbedtls_md_hmac_update() [all …]
|
| A D | cipher_wrap.c | 184 input, output); in aes_crypt_cfb128_wrap() 193 iv, input, output); in aes_crypt_ofb_wrap() 203 stream_block, input, output); in aes_crypt_ctr_wrap() 211 const unsigned char *input, in aes_crypt_xts_wrap() argument 229 data_unit, input, output); in aes_crypt_xts_wrap() 790 input, output); in camellia_crypt_cbc_wrap() 1208 input, output); in aria_crypt_cbc_wrap() 1901 const unsigned char *input, in chacha20_stream_wrap() argument 1906 ret = mbedtls_chacha20_update(ctx, length, input, output); in chacha20_stream_wrap() 2053 const unsigned char *input, in null_crypt_stream() argument [all …]
|
| A D | cipher_wrap.h | 80 const unsigned char *input, unsigned char *output); 85 unsigned char *iv, const unsigned char *input, 92 unsigned char *iv, const unsigned char *input, 100 const unsigned char *input, 108 const unsigned char *input, unsigned char *output); 115 const unsigned char *input, unsigned char *output); 121 const unsigned char *input, unsigned char *output);
|
| A D | ccm.c | 125 const unsigned char *input, in mbedtls_ccm_crypt() argument 143 mbedtls_xor(output, input, tmp_buf + offset, use_len); in mbedtls_ccm_crypt() 359 const unsigned char *input, size_t input_len, in mbedtls_ccm_update() argument 417 ret = mbedtls_ccm_crypt(ctx, offset, use_len, input, output); in mbedtls_ccm_update() 462 input += use_len; in mbedtls_ccm_update() 533 if ((ret = mbedtls_ccm_update(ctx, input, length, in ccm_auth_crypt() 555 add, add_len, input, output, tag, tag_len); in mbedtls_ccm_star_encrypt_and_tag() 565 add, add_len, input, output, tag, tag_len); in mbedtls_ccm_encrypt_and_tag() 596 input, output, check_tag, tag_len)) != 0) { in ccm_auth_decrypt() 616 input, output, tag, tag_len); in mbedtls_ccm_star_auth_decrypt() [all …]
|
| A D | psa_crypto_hash.c | 263 const uint8_t *input, in mbedtls_psa_hash_update() argument 272 input, input_length); in mbedtls_psa_hash_update() 278 input, input_length); in mbedtls_psa_hash_update() 284 input, input_length); in mbedtls_psa_hash_update() 290 input, input_length); in mbedtls_psa_hash_update() 296 input, input_length); in mbedtls_psa_hash_update() 302 input, input_length); in mbedtls_psa_hash_update() 308 input, input_length); in mbedtls_psa_hash_update() 328 input, input_length); in mbedtls_psa_hash_update() 332 (void) input; in mbedtls_psa_hash_update() [all …]
|
| /mbedtls/tests/src/drivers/ |
| A D | test_driver_asymmetric_encryption.c | 30 size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *input, in mbedtls_test_transparent_asymmetric_encrypt() argument 57 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 62 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_encrypt() 98 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 103 alg, input, input_length, salt, salt_length, in mbedtls_test_transparent_asymmetric_decrypt() 115 size_t key_length, psa_algorithm_t alg, const uint8_t *input, in mbedtls_test_opaque_asymmetric_encrypt() argument 135 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 140 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_encrypt() 149 size_t key_length, psa_algorithm_t alg, const uint8_t *input, in mbedtls_test_opaque_asymmetric_decrypt() argument 169 alg, input, input_length, salt, salt_length, in mbedtls_test_opaque_asymmetric_decrypt() [all …]
|
| A D | test_driver_cipher.c | 37 const uint8_t *input, in mbedtls_test_transparent_cipher_encrypt() argument 88 const uint8_t *input, in mbedtls_test_transparent_cipher_decrypt() argument 118 alg, input, input_length, in mbedtls_test_transparent_cipher_decrypt() 123 alg, input, input_length, in mbedtls_test_transparent_cipher_decrypt() 237 const uint8_t *input, in mbedtls_test_transparent_cipher_update() argument 265 operation, input, input_length, in mbedtls_test_transparent_cipher_update() 269 operation, input, input_length, in mbedtls_test_transparent_cipher_update() 330 (void) input; in mbedtls_test_opaque_cipher_encrypt() 349 (void) input; in mbedtls_test_opaque_cipher_decrypt() 405 const uint8_t *input, in mbedtls_test_opaque_cipher_update() argument [all …]
|
| A D | hash.c | 24 const uint8_t *input, size_t input_length, in mbedtls_test_transparent_hash_compute() argument 37 alg, input, input_length, in mbedtls_test_transparent_hash_compute() 42 alg, input, input_length, in mbedtls_test_transparent_hash_compute() 46 (void) input; in mbedtls_test_transparent_hash_compute() 115 const uint8_t *input, in mbedtls_test_transparent_hash_update() argument 128 operation, input, input_length); in mbedtls_test_transparent_hash_update() 131 mbedtls_psa_hash_update(operation, input, input_length); in mbedtls_test_transparent_hash_update() 134 (void) input; in mbedtls_test_transparent_hash_update()
|
| A D | test_driver_mac.c | 27 const uint8_t *input, in mbedtls_test_transparent_mac_compute() argument 45 input, input_length, in mbedtls_test_transparent_mac_compute() 51 input, input_length, in mbedtls_test_transparent_mac_compute() 58 (void) input; in mbedtls_test_transparent_mac_compute() 146 const uint8_t *input, in mbedtls_test_transparent_mac_update() argument 159 operation, input, input_length); in mbedtls_test_transparent_mac_update() 166 (void) input; in mbedtls_test_transparent_mac_update() 269 const uint8_t *input, in mbedtls_test_opaque_mac_compute() argument 285 (void) input; in mbedtls_test_opaque_mac_compute() 346 const uint8_t *input, in mbedtls_test_opaque_mac_update() argument [all …]
|
| /mbedtls/include/mbedtls/ |
| A D | aes.h | 249 const unsigned char input[16], 299 const unsigned char *input, 344 const unsigned char *input, 394 const unsigned char *input, 438 const unsigned char *input, 493 const unsigned char *input, 577 const unsigned char *input, 594 const unsigned char input[16], 611 const unsigned char input[16],
|