/mbedtls/tests/suites/ |
A D | test_suite_common.data | 1 Block xor, length 0 4 Block xor, length 1 7 Block xor, length 3 10 Block xor, length 4 13 Block xor, length 7 16 Block xor, length 8 19 Block xor, length 16 22 Block xor, length 64 25 Block xor, length 256 28 Block xor, length 257 [all …]
|
A D | test_suite_asn1parse.data | 61 length=0 (1 length byte) 64 length=0 (2 length bytes) 70 length=1 (1 length byte) 73 length=1 (2 length bytes) 76 length=1 (3 length bytes) 79 length=1 (4 length bytes) 85 length=2 (1 length byte) 88 length=2 (2 length bytes) 91 length=2 (3 length bytes) 94 length=2 (4 length bytes) [all …]
|
A D | test_suite_pkcs7.data | 181 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 10 #26.0 185 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 8 #27.0 225 PKCS7 Parse Failure Invalid ASN1: Change length from 1 to 2 #37.0 229 PKCS7 Parse Failure Invalid ASN1: Change length from 1 to 0 #38.0 273 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 8 #49.0 281 PKCS7 Parse Failure Invalid ASN1: Change length from 0 to 1 #51.0 309 PKCS7 Parse Failure Invalid ASN1: Change length from 9 to 8 #58.0 365 PKCS7 Parse Failure Invalid ASN1: Change length from 3 to 4 #72.0 373 PKCS7 Parse Failure Invalid ASN1: Change length from 3 to 2 #74.0 381 PKCS7 Parse Failure Invalid ASN1: Change length from 1 to 2 #76.0 [all …]
|
A D | test_suite_psa_crypto_low_hash.function | 32 size_t length = SIZE_MAX; 39 ASSERT_COMPARE(expected->x, expected->len, output, length); 49 ASSERT_COMPARE(expected->x, expected->len, output, length); 70 size_t length = SIZE_MAX; 99 ASSERT_COMPARE(expected2->x, expected2->len, output, length); 108 ASSERT_COMPARE(expected1->x, expected1->len, output, length); 117 ASSERT_COMPARE(expected2->x, expected2->len, output, length); 172 size_t length = SIZE_MAX; 182 ASSERT_COMPARE(expected->x, expected->len, output, length); 191 ASSERT_COMPARE(expected->x, expected->len, output, length); [all …]
|
A D | test_suite_psa_crypto_metadata.function | 237 /* Tag length */ 254 size_t length = length_arg; 288 /* Hash length */ 300 size_t length = length_arg; 328 * length of the outer truncation (even if the outer length is smaller 348 * length of the outer truncation (even if the outer length is smaller 360 * inner length). */ 442 * the length of the outer truncation (even if the outer length is 453 * gives the length of the outer truncation (even if the outer length is 475 * gives the length of the outer truncation (even if the outer length is [all …]
|
A D | test_suite_asn1write.data | 139 ASN.1 Write OCTET STRING: length=0 142 ASN.1 Write OCTET STRING: length=1 145 ASN.1 Write OCTET STRING: length=2 160 ASN.1 Write UTF8 STRING: length=0 163 ASN.1 Write UTF8 STRING: length=1 166 ASN.1 Write UTF8 STRING: length=128 178 ASN.1 Write IA5 STRING: length=0 181 ASN.1 Write IA5 STRING: length=1 184 ASN.1 Write IA5 STRING: length=128 196 ASN.1 Write OID: length=0 [all …]
|
A D | test_suite_psa_crypto_memory.function | 120 local_input.length = input_len; 126 TEST_EQUAL(local_input.length, 0); 131 local_input.length = 0; 154 TEST_EQUAL(local_input.length, 0); 174 TEST_EQUAL(local_output.length, output_len); 181 local_output.length = 0; 201 local_output.length = output_len; 204 if (local_output.length != 0) { 215 TEST_EQUAL(local_output.length, 0); 224 local_output.length = 0; [all …]
|
A D | test_suite_ecjpake.data | 25 ECJPAKE round one: KKP1: length of first point too small 28 ECJPAKE round one: KKP1: length of first point too big 43 ECJPAKE round one: KKP1: length of second point too small 46 ECJPAKE round one: KKP1: length of second point too big 58 ECJPAKE round one: KKP1: zero-length r 73 ECJPAKE round one: KKP2: length of first point too small 76 ECJPAKE round one: KKP2: length of first point too big 94 ECJPAKE round one: KKP2: length of second point too big 106 ECJPAKE round one: KKP2: zero-length r 172 ECJPAKE round two client: zero-length r [all …]
|
A D | test_suite_psa_crypto_op_fail.function | 52 size_t length = SIZE_MAX; 60 output, sizeof(output), &length)); 83 size_t length = SIZE_MAX; 103 output, sizeof(output), &length)); 129 size_t length = SIZE_MAX; 175 size_t length = SIZE_MAX; 223 size_t length = SIZE_MAX; 298 size_t length = SIZE_MAX; 317 &length)); 324 &length)); [all …]
|
A D | test_suite_psa_crypto_util.data | 65 ECDSA DER -> Raw, 256bit, Invalid sequence length 73 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte smaller than the actual size) 77 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte larger than the actual size) 85 ECDSA DER -> Raw, 256bit, Wrong s integer length (1 byte larger than the actual size) 113 ECDSA DER -> Raw, 256bit, Invalid 0-length r 117 ECDSA DER -> Raw, 256bit, Invalid 0-length s 133 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 138 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 143 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. 148 # 512/521 bit sizes are useful to test sequence's length encoded with 2 bytes. [all …]
|
A D | test_suite_cipher.function | 456 TEST_ASSERT(total_len == length || 458 total_len < length && 490 TEST_ASSERT(total_len == length); 507 size_t length = length_val; 741 TEST_ASSERT(totaloutlen == length || 743 totaloutlen < length && 748 TEST_ASSERT(totaloutlen == length || 750 totaloutlen > length && 765 TEST_ASSERT(totaloutlen == length || 767 totaloutlen < length && [all …]
|
A D | test_suite_entropy.data | 25 Entropy output length: 0 28 Entropy output length: 1 31 Entropy output length: 2 34 Entropy output length: 31 37 Entropy output length: 65 > BLOCK_SIZE
|
A D | test_suite_gcm.misc.data | 4 GCM - Invalid IV length 8 GCM - Additional data length too long 12 GCM - Input length too long
|
/mbedtls/programs/psa/ |
A D | psa_constant_names.c | 47 *required_size += length; in append() 49 memcpy(*buffer, string, length); in append() 50 *buffer += length; in append() 133 size_t length = strlen(name); in psa_snprint_status() local 134 if (length < buffer_size) { in psa_snprint_status() 136 return (int) length; in psa_snprint_status() 150 size_t length = strlen(name); in psa_snprint_ecc_curve() local 151 if (length < buffer_size) { in psa_snprint_ecc_curve() 153 return (int) length; in psa_snprint_ecc_curve() 168 if (length < buffer_size) { in psa_snprint_dh_group() [all …]
|
/mbedtls/tests/scripts/ |
A D | generate_pkcs7_tests.py | 113 length = int(''.join(data[leng_i + 1: data_i]), 16) 115 length = int(data[leng_i], 16) 119 ", length = " + str(length)+ ":") 120 print(''.join(data[data_i:data_i+length])) 138 reasons.append("Change length from " + str(length) + " to " \ 139 + str(length + 1)) 144 data[data_i:data_i + length] + ["00"] + \ 145 data[data_i + length:]) 154 reasons.append("Change length from " + str(length) + " to " + str(length - 1)) 160 i = data_i + length
|
/mbedtls/library/ |
A D | cipher_wrap.h | 84 int (*cbc_func)(void *ctx, mbedtls_operation_t mode, size_t length, 91 int (*cfb_func)(void *ctx, mbedtls_operation_t mode, size_t length, size_t *iv_off, 98 int (*ofb_func)(void *ctx, size_t length, size_t *iv_off, 106 int (*ctr_func)(void *ctx, size_t length, size_t *nc_off, 113 int (*xts_func)(void *ctx, mbedtls_operation_t mode, size_t length, 120 int (*stream_func)(void *ctx, size_t length,
|
A D | cipher_wrap.c | 189 static int aes_crypt_ofb_wrap(void *ctx, size_t length, size_t *iv_off, in aes_crypt_ofb_wrap() argument 198 static int aes_crypt_ctr_wrap(void *ctx, size_t length, size_t *nc_off, in aes_crypt_ctr_wrap() argument 209 size_t length, in aes_crypt_xts_wrap() argument 228 return mbedtls_aes_crypt_xts(xts_ctx, mode, length, in aes_crypt_xts_wrap() 786 size_t length, unsigned char *iv, in camellia_crypt_cbc_wrap() argument 1204 size_t length, unsigned char *iv, in aria_crypt_cbc_wrap() argument 1223 static int aria_crypt_ctr_wrap(void *ctx, size_t length, size_t *nc_off, in aria_crypt_ctr_wrap() argument 1900 static int chacha20_stream_wrap(void *ctx, size_t length, in chacha20_stream_wrap() argument 1906 ret = mbedtls_chacha20_update(ctx, length, input, output); in chacha20_stream_wrap() 2052 static int null_crypt_stream(void *ctx, size_t length, in null_crypt_stream() argument [all …]
|
A D | ccm.c | 512 static int ccm_auth_crypt(mbedtls_ccm_context *ctx, int mode, size_t length, in ccm_auth_crypt() argument 533 if ((ret = mbedtls_ccm_update(ctx, input, length, in ccm_auth_crypt() 534 output, length, &olen)) != 0) { in ccm_auth_crypt() 558 int mbedtls_ccm_encrypt_and_tag(mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_encrypt_and_tag() argument 564 return ccm_auth_crypt(ctx, MBEDTLS_CCM_ENCRYPT, length, iv, iv_len, in mbedtls_ccm_encrypt_and_tag() 594 if ((ret = ccm_auth_crypt(ctx, mode, length, in ccm_auth_decrypt() 601 mbedtls_platform_zeroize(output, length); in ccm_auth_decrypt() 608 int mbedtls_ccm_star_auth_decrypt(mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_star_auth_decrypt() argument 614 return ccm_auth_decrypt(ctx, MBEDTLS_CCM_STAR_DECRYPT, length, in mbedtls_ccm_star_auth_decrypt() 619 int mbedtls_ccm_auth_decrypt(mbedtls_ccm_context *ctx, size_t length, in mbedtls_ccm_auth_decrypt() argument [all …]
|
A D | des.c | 628 size_t length, in mbedtls_des_crypt_cbc() argument 636 if (length % 8) { in mbedtls_des_crypt_cbc() 641 while (length > 0) { in mbedtls_des_crypt_cbc() 652 length -= 8; in mbedtls_des_crypt_cbc() 655 while (length > 0) { in mbedtls_des_crypt_cbc() 668 length -= 8; in mbedtls_des_crypt_cbc() 734 if (length % 8) { in mbedtls_des3_crypt_cbc() 739 while (length > 0) { in mbedtls_des3_crypt_cbc() 750 length -= 8; in mbedtls_des3_crypt_cbc() 753 while (length > 0) { in mbedtls_des3_crypt_cbc() [all …]
|
A D | chachapoly.c | 246 size_t length, in chachapoly_crypt_and_tag() argument 266 ret = mbedtls_chachapoly_update(ctx, length, input, output); in chachapoly_crypt_and_tag() 278 size_t length, in mbedtls_chachapoly_encrypt_and_tag() argument 287 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag() 292 size_t length, in mbedtls_chachapoly_auth_decrypt() argument 305 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce, in mbedtls_chachapoly_auth_decrypt() 314 mbedtls_platform_zeroize(output, length); in mbedtls_chachapoly_auth_decrypt()
|
A D | camellia.c | 521 size_t length, in mbedtls_camellia_crypt_cbc() argument 531 if (length % 16) { in mbedtls_camellia_crypt_cbc() 536 while (length > 0) { in mbedtls_camellia_crypt_cbc() 546 length -= 16; in mbedtls_camellia_crypt_cbc() 549 while (length > 0) { in mbedtls_camellia_crypt_cbc() 557 length -= 16; in mbedtls_camellia_crypt_cbc() 571 size_t length, in mbedtls_camellia_crypt_cfb128() argument 589 while (length--) { in mbedtls_camellia_crypt_cfb128() 601 while (length--) { in mbedtls_camellia_crypt_cfb128() 623 size_t length, in mbedtls_camellia_crypt_ctr() argument [all …]
|
A D | psa_crypto_pake.c | 290 size_t length; in mbedtls_psa_pake_output_internal() local 354 length = operation->buffer[operation->buffer_offset]; in mbedtls_psa_pake_output_internal() 357 if (operation->buffer_offset + length > operation->buffer_length) { in mbedtls_psa_pake_output_internal() 361 if (output_size < length) { in mbedtls_psa_pake_output_internal() 367 length); in mbedtls_psa_pake_output_internal() 368 *output_length = length; in mbedtls_psa_pake_output_internal() 370 operation->buffer_offset += length; in mbedtls_psa_pake_output_internal()
|
/mbedtls/include/mbedtls/ |
A D | aes.h | 297 size_t length, 342 size_t length, 391 size_t length, 436 size_t length, 490 size_t length, 573 size_t length,
|
A D | ccm.h | 173 int mbedtls_ccm_encrypt_and_tag(mbedtls_ccm_context *ctx, size_t length, 222 int mbedtls_ccm_star_encrypt_and_tag(mbedtls_ccm_context *ctx, size_t length, 259 int mbedtls_ccm_auth_decrypt(mbedtls_ccm_context *ctx, size_t length, 305 int mbedtls_ccm_star_auth_decrypt(mbedtls_ccm_context *ctx, size_t length,
|
/mbedtls/tests/data_files/ |
A D | test_certs.h.jinja2 | 15 #define {{name}}{{ '\\' | put_to_column(position=80-9-name|length)}} 17 "{{line}}\r\n"{% if not loop.last %}{{ '\\' | put_to_column(position=80-10-1-line|length)}} 26 #define {{name}} {% raw -%} { {%- endraw %} {{ '\\' | put_to_column(position=80-11-name|length)}} 29 {{line}},{{ '\\' | put_to_column(position=80-9-line|length)}} 31 {{line}}{{ '\\' | put_to_column(position=80-8-line|length)}}
|