| /mbedtls/tests/scripts/ |
| A D | all.sh | 390 msg() function 742 msg "info: $0 configuration" 815 msg "info: output_env.sh" 2288 msg "build: TSan (clang)" 3451 msg "build: TF-M config" 3461 msg "test: TF-M config" 4855 msg "AES tests, plain C" 4884 msg "all loops unrolled" 4889 msg "all loops rolled up" 6383 msg "Check C code style" [all …]
|
| /mbedtls/tests/suites/ |
| A D | test_suite_lmots.function | 45 msg->x, msg->len, sig, sizeof(sig), NULL), 0); 46 TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, msg->x, msg->len, sig, sizeof(sig)), 0); 95 msg->x[0] ^= 1; 98 msg->x[0] ^= 1; 101 msg->x[msg->len - 1] ^= 1; 104 msg->x[msg->len - 1] ^= 1; 109 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 115 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 209 msg->x, msg->len, sig, sizeof(sig), NULL), 0); 215 msg->x, msg->len, sig, sizeof(sig), NULL), [all …]
|
| A D | test_suite_ccm.function | 117 memset(msg, 0, sizeof(msg)); 161 memset(msg, 0, sizeof(msg)); 203 memcpy(io_msg_buf, msg->x, msg->len); 261 TEST_EQUAL(0, mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen)); 363 memcpy(io_msg_buf, msg->x, msg->len); 640 mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen)); 753 mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen)); 782 TEST_EQUAL(0, mbedtls_ccm_update(&ctx, msg->x, msg->len - 1, output, msg->len, &olen)); 818 TEST_EQUAL(0, mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen)); 841 msg_second_buffer[0] = msg->x[msg->len - 1]; [all …]
|
| A D | test_suite_lms.function | 32 msg->x, msg->len, sig, sizeof(sig), 35 TEST_EQUAL(mbedtls_lms_verify(&pub_ctx, msg->x, msg->len, sig, 95 msg->x[0] ^= 1; 96 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 98 msg->x[0] ^= 1; 101 msg->x[msg->len - 1] ^= 1; 102 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 104 msg->x[msg->len - 1] ^= 1; 110 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), 116 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len), [all …]
|
| A D | test_suite_nist_kw.function | 237 void mbedtls_nist_kw_wrap(int cipher_id, int mode, data_t *key, data_t *msg, 252 TEST_ASSERT(mbedtls_nist_kw_wrap(&ctx, mode, msg->x, msg->len, 259 padlen = (msg->len % 8 != 0) ? 8 - (msg->len % 8) : 0; 261 for (i = msg->len + 8 + padlen; i < sizeof(result); i++) { 271 void mbedtls_nist_kw_unwrap(int cipher_id, int mode, data_t *key, data_t *msg, 286 TEST_ASSERT(mbedtls_nist_kw_unwrap(&ctx, mode, msg->x, msg->len, 296 for (i = msg->len - 8; i < sizeof(result); i++) {
|
| A D | test_suite_ecjpake.function | 139 void read_bad_md(data_t *msg) 154 TEST_EQUAL(mbedtls_ecjpake_read_round_one(&corrupt_ctx, msg->x, 155 msg->len), MBEDTLS_ERR_MD_BAD_INPUT_DATA); 164 void read_round_one(int role, data_t *msg, int ref_ret) 178 TEST_ASSERT(mbedtls_ecjpake_read_round_one(&ctx, msg->x, msg->len) == ref_ret); 187 void read_round_two_cli(data_t *msg, int ref_ret) 207 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret); 216 void read_round_two_srv(data_t *msg, int ref_ret) 236 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret);
|
| A D | test_suite_debug.data | 1 Debug print msg (threshold 1, level 0) 4 Debug print msg (threshold 1, level 1) 7 Debug print msg (threshold 1, level 2) 10 Debug print msg (threshold 0, level 1) 13 Debug print msg (threshold 0, level 5)
|
| /mbedtls/programs/test/ |
| A D | dlopen_demo.sh | 11 msg "Test the dynamic loading of libmbed*" 19 msg "$0: this demo requires a shared library build." 40 msg "Running dynamic loading test program: $program" 41 msg "Loading libraries from: $library_dir"
|
| A D | udp_proxy.c | 307 static const char *msg_type(unsigned char *msg, size_t len) in msg_type() argument 312 switch (msg[0]) { in msg_type() 330 if (msg[14] || msg[19] || msg[22]) { in msg_type() 334 switch (msg[13]) { in msg_type()
|
| /mbedtls/library/ |
| A D | lmots.c | 120 const unsigned char *msg, in create_digit_array_with_checksum() argument 158 status = psa_hash_update(&op, msg, msg_len); in create_digit_array_with_checksum() 457 const unsigned char *msg, in mbedtls_lmots_calculate_public_key_candidate() argument 469 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_calculate_public_key_candidate() 478 ret = create_digit_array_with_checksum(params, msg, msg_size, in mbedtls_lmots_calculate_public_key_candidate() 507 const unsigned char *msg, size_t msg_size, in mbedtls_lmots_verify() argument 513 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_verify() 534 msg, msg_size, sig, sig_size, in mbedtls_lmots_verify() 688 void *p_rng, const unsigned char *msg, size_t msg_size, in mbedtls_lmots_sign() argument 703 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_sign() [all …]
|
| A D | lmots.h | 145 const unsigned char *msg, 179 const unsigned char *msg, 279 void *p_rng, const unsigned char *msg, size_t msg_size,
|
| A D | sha512.c | 382 mbedtls_sha512_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha512_process_many_a64_crypto() argument 394 msg += SHA512_BLOCK_SIZE, in mbedtls_internal_sha512_process_many_a64_crypto() 403 uint64x2_t s0 = (uint64x2_t) vld1q_u8(msg + 16 * 0); in mbedtls_internal_sha512_process_many_a64_crypto() 404 uint64x2_t s1 = (uint64x2_t) vld1q_u8(msg + 16 * 1); in mbedtls_internal_sha512_process_many_a64_crypto() 405 uint64x2_t s2 = (uint64x2_t) vld1q_u8(msg + 16 * 2); in mbedtls_internal_sha512_process_many_a64_crypto() 406 uint64x2_t s3 = (uint64x2_t) vld1q_u8(msg + 16 * 3); in mbedtls_internal_sha512_process_many_a64_crypto() 407 uint64x2_t s4 = (uint64x2_t) vld1q_u8(msg + 16 * 4); in mbedtls_internal_sha512_process_many_a64_crypto() 408 uint64x2_t s5 = (uint64x2_t) vld1q_u8(msg + 16 * 5); in mbedtls_internal_sha512_process_many_a64_crypto() 409 uint64x2_t s6 = (uint64x2_t) vld1q_u8(msg + 16 * 6); in mbedtls_internal_sha512_process_many_a64_crypto() 410 uint64x2_t s7 = (uint64x2_t) vld1q_u8(msg + 16 * 7); in mbedtls_internal_sha512_process_many_a64_crypto() [all …]
|
| A D | sha256.c | 326 mbedtls_sha256_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many_a64_crypto() argument 336 msg += SHA256_BLOCK_SIZE, in mbedtls_internal_sha256_process_many_a64_crypto() 343 uint32x4_t sched0 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 0)); in mbedtls_internal_sha256_process_many_a64_crypto() 344 uint32x4_t sched1 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 1)); in mbedtls_internal_sha256_process_many_a64_crypto() 345 uint32x4_t sched2 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 2)); in mbedtls_internal_sha256_process_many_a64_crypto() 346 uint32x4_t sched3 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 3)); in mbedtls_internal_sha256_process_many_a64_crypto() 616 const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many() argument 619 return mbedtls_internal_sha256_process_many_a64_crypto(ctx, msg, len); in mbedtls_internal_sha256_process_many() 621 return mbedtls_internal_sha256_process_many_c(ctx, msg, len); in mbedtls_internal_sha256_process_many()
|
| A D | common.h | 363 #define MBEDTLS_STATIC_ASSERT(expr, msg) static_assert(expr, msg); argument 365 #define MBEDTLS_STATIC_ASSERT(expr, msg) argument
|
| A D | lms.c | 298 const unsigned char *msg, size_t msg_size, in mbedtls_lms_verify() argument 362 msg, in mbedtls_lms_verify() 689 void *p_rng, const unsigned char *msg, in mbedtls_lms_sign() argument 732 msg, in mbedtls_lms_sign()
|
| A D | ssl_msg.c | 2416 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local 2428 if ((msg->p = mbedtls_calloc(1, ssl->out_msglen)) == NULL) { in ssl_flight_append() 2431 mbedtls_free(msg); in ssl_flight_append() 2436 memcpy(msg->p, ssl->out_msg, ssl->out_msglen); in ssl_flight_append() 2437 msg->len = ssl->out_msglen; in ssl_flight_append() 2438 msg->type = ssl->out_msgtype; in ssl_flight_append() 2439 msg->next = NULL; in ssl_flight_append() 2443 ssl->handshake->flight = msg; in ssl_flight_append() 2449 cur->next = msg; in ssl_flight_append() 4564 unsigned char * const msg = hs_buf->data + 12; in ssl_buffer_message() local [all …]
|
| /mbedtls/tests/src/ |
| A D | psa_crypto_helpers.c | 142 const char *msg = mbedtls_test_helper_is_psa_leaking(); in mbedtls_test_fail_if_psa_leaking() local 143 if (msg == NULL) { in mbedtls_test_fail_if_psa_leaking() 146 mbedtls_test_fail(msg, line_no, filename); in mbedtls_test_fail_if_psa_leaking()
|
| A D | threading_helpers.c | 174 const char *msg) in mbedtls_test_mutex_usage_error() argument 178 mbedtls_test_set_mutex_usage_error(msg); in mbedtls_test_mutex_usage_error() 179 mbedtls_fprintf(stdout, "[mutex: %s] ", msg); in mbedtls_test_mutex_usage_error()
|
| A D | helpers.c | 249 void mbedtls_test_set_mutex_usage_error(const char *msg) in mbedtls_test_set_mutex_usage_error() argument 255 if (mbedtls_test_info.mutex_usage_error == NULL || msg == NULL) { in mbedtls_test_set_mutex_usage_error() 256 mbedtls_test_info.mutex_usage_error = msg; in mbedtls_test_set_mutex_usage_error()
|
| /mbedtls/3rdparty/everest/include/everest/kremlin/internal/ |
| A D | target.h | 69 #define KRML_EABORT(t, msg) \ argument 70 (KRML_HOST_PRINTF("KreMLin abort at %s:%d\n%s\n", __FILE__, __LINE__, msg), \
|
| /mbedtls/include/mbedtls/ |
| A D | lms.h | 321 const unsigned char *msg, size_t msg_size, 431 void *p_rng, const unsigned char *msg,
|
| /mbedtls/programs/psa/ |
| A D | psa_hash_demo.sh | 8 msg <<'EOF'
|
| A D | key_ladder_demo.sh | 8 msg <<'EOF'
|
| /mbedtls/programs/ |
| A D | demo_common.sh | 48 msg () { function
|
| /mbedtls/tests/include/test/ |
| A D | helpers.h | 166 void mbedtls_test_set_mutex_usage_error(const char *msg);
|