Home
last modified time | relevance | path

Searched refs:msg (Results 1 – 25 of 32) sorted by relevance

12

/mbedtls/tests/scripts/
A Dall.sh390 msg() function
742 msg "info: $0 configuration"
815 msg "info: output_env.sh"
2288 msg "build: TSan (clang)"
3451 msg "build: TF-M config"
3461 msg "test: TF-M config"
4855 msg "AES tests, plain C"
4884 msg "all loops unrolled"
4889 msg "all loops rolled up"
6383 msg "Check C code style"
[all …]
/mbedtls/tests/suites/
A Dtest_suite_lmots.function45 msg->x, msg->len, sig, sizeof(sig), NULL), 0);
46 TEST_EQUAL(mbedtls_lmots_verify(&pub_ctx, msg->x, msg->len, sig, sizeof(sig)), 0);
95 msg->x[0] ^= 1;
98 msg->x[0] ^= 1;
101 msg->x[msg->len - 1] ^= 1;
104 msg->x[msg->len - 1] ^= 1;
109 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
115 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
209 msg->x, msg->len, sig, sizeof(sig), NULL), 0);
215 msg->x, msg->len, sig, sizeof(sig), NULL),
[all …]
A Dtest_suite_ccm.function117 memset(msg, 0, sizeof(msg));
161 memset(msg, 0, sizeof(msg));
203 memcpy(io_msg_buf, msg->x, msg->len);
261 TEST_EQUAL(0, mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen));
363 memcpy(io_msg_buf, msg->x, msg->len);
640 mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen));
753 mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen));
782 TEST_EQUAL(0, mbedtls_ccm_update(&ctx, msg->x, msg->len - 1, output, msg->len, &olen));
818 TEST_EQUAL(0, mbedtls_ccm_update(&ctx, msg->x, msg->len, output, msg->len, &olen));
841 msg_second_buffer[0] = msg->x[msg->len - 1];
[all …]
A Dtest_suite_lms.function32 msg->x, msg->len, sig, sizeof(sig),
35 TEST_EQUAL(mbedtls_lms_verify(&pub_ctx, msg->x, msg->len, sig,
95 msg->x[0] ^= 1;
96 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
98 msg->x[0] ^= 1;
101 msg->x[msg->len - 1] ^= 1;
102 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
104 msg->x[msg->len - 1] ^= 1;
110 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
116 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, sig->x, sig->len),
[all …]
A Dtest_suite_nist_kw.function237 void mbedtls_nist_kw_wrap(int cipher_id, int mode, data_t *key, data_t *msg,
252 TEST_ASSERT(mbedtls_nist_kw_wrap(&ctx, mode, msg->x, msg->len,
259 padlen = (msg->len % 8 != 0) ? 8 - (msg->len % 8) : 0;
261 for (i = msg->len + 8 + padlen; i < sizeof(result); i++) {
271 void mbedtls_nist_kw_unwrap(int cipher_id, int mode, data_t *key, data_t *msg,
286 TEST_ASSERT(mbedtls_nist_kw_unwrap(&ctx, mode, msg->x, msg->len,
296 for (i = msg->len - 8; i < sizeof(result); i++) {
A Dtest_suite_ecjpake.function139 void read_bad_md(data_t *msg)
154 TEST_EQUAL(mbedtls_ecjpake_read_round_one(&corrupt_ctx, msg->x,
155 msg->len), MBEDTLS_ERR_MD_BAD_INPUT_DATA);
164 void read_round_one(int role, data_t *msg, int ref_ret)
178 TEST_ASSERT(mbedtls_ecjpake_read_round_one(&ctx, msg->x, msg->len) == ref_ret);
187 void read_round_two_cli(data_t *msg, int ref_ret)
207 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret);
216 void read_round_two_srv(data_t *msg, int ref_ret)
236 TEST_ASSERT(mbedtls_ecjpake_read_round_two(&ctx, msg->x, msg->len) == ref_ret);
A Dtest_suite_debug.data1 Debug print msg (threshold 1, level 0)
4 Debug print msg (threshold 1, level 1)
7 Debug print msg (threshold 1, level 2)
10 Debug print msg (threshold 0, level 1)
13 Debug print msg (threshold 0, level 5)
/mbedtls/programs/test/
A Ddlopen_demo.sh11 msg "Test the dynamic loading of libmbed*"
19 msg "$0: this demo requires a shared library build."
40 msg "Running dynamic loading test program: $program"
41 msg "Loading libraries from: $library_dir"
A Dudp_proxy.c307 static const char *msg_type(unsigned char *msg, size_t len) in msg_type() argument
312 switch (msg[0]) { in msg_type()
330 if (msg[14] || msg[19] || msg[22]) { in msg_type()
334 switch (msg[13]) { in msg_type()
/mbedtls/library/
A Dlmots.c120 const unsigned char *msg, in create_digit_array_with_checksum() argument
158 status = psa_hash_update(&op, msg, msg_len); in create_digit_array_with_checksum()
457 const unsigned char *msg, in mbedtls_lmots_calculate_public_key_candidate() argument
469 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_calculate_public_key_candidate()
478 ret = create_digit_array_with_checksum(params, msg, msg_size, in mbedtls_lmots_calculate_public_key_candidate()
507 const unsigned char *msg, size_t msg_size, in mbedtls_lmots_verify() argument
513 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_verify()
534 msg, msg_size, sig, sig_size, in mbedtls_lmots_verify()
688 void *p_rng, const unsigned char *msg, size_t msg_size, in mbedtls_lmots_sign() argument
703 if (msg == NULL && msg_size != 0) { in mbedtls_lmots_sign()
[all …]
A Dlmots.h145 const unsigned char *msg,
179 const unsigned char *msg,
279 void *p_rng, const unsigned char *msg, size_t msg_size,
A Dsha512.c382 mbedtls_sha512_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha512_process_many_a64_crypto() argument
394 msg += SHA512_BLOCK_SIZE, in mbedtls_internal_sha512_process_many_a64_crypto()
403 uint64x2_t s0 = (uint64x2_t) vld1q_u8(msg + 16 * 0); in mbedtls_internal_sha512_process_many_a64_crypto()
404 uint64x2_t s1 = (uint64x2_t) vld1q_u8(msg + 16 * 1); in mbedtls_internal_sha512_process_many_a64_crypto()
405 uint64x2_t s2 = (uint64x2_t) vld1q_u8(msg + 16 * 2); in mbedtls_internal_sha512_process_many_a64_crypto()
406 uint64x2_t s3 = (uint64x2_t) vld1q_u8(msg + 16 * 3); in mbedtls_internal_sha512_process_many_a64_crypto()
407 uint64x2_t s4 = (uint64x2_t) vld1q_u8(msg + 16 * 4); in mbedtls_internal_sha512_process_many_a64_crypto()
408 uint64x2_t s5 = (uint64x2_t) vld1q_u8(msg + 16 * 5); in mbedtls_internal_sha512_process_many_a64_crypto()
409 uint64x2_t s6 = (uint64x2_t) vld1q_u8(msg + 16 * 6); in mbedtls_internal_sha512_process_many_a64_crypto()
410 uint64x2_t s7 = (uint64x2_t) vld1q_u8(msg + 16 * 7); in mbedtls_internal_sha512_process_many_a64_crypto()
[all …]
A Dsha256.c326 mbedtls_sha256_context *ctx, const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many_a64_crypto() argument
336 msg += SHA256_BLOCK_SIZE, in mbedtls_internal_sha256_process_many_a64_crypto()
343 uint32x4_t sched0 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 0)); in mbedtls_internal_sha256_process_many_a64_crypto()
344 uint32x4_t sched1 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 1)); in mbedtls_internal_sha256_process_many_a64_crypto()
345 uint32x4_t sched2 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 2)); in mbedtls_internal_sha256_process_many_a64_crypto()
346 uint32x4_t sched3 = vreinterpretq_u32_u8(vld1q_u8(msg + 16 * 3)); in mbedtls_internal_sha256_process_many_a64_crypto()
616 const uint8_t *msg, size_t len) in mbedtls_internal_sha256_process_many() argument
619 return mbedtls_internal_sha256_process_many_a64_crypto(ctx, msg, len); in mbedtls_internal_sha256_process_many()
621 return mbedtls_internal_sha256_process_many_c(ctx, msg, len); in mbedtls_internal_sha256_process_many()
A Dcommon.h363 #define MBEDTLS_STATIC_ASSERT(expr, msg) static_assert(expr, msg); argument
365 #define MBEDTLS_STATIC_ASSERT(expr, msg) argument
A Dlms.c298 const unsigned char *msg, size_t msg_size, in mbedtls_lms_verify() argument
362 msg, in mbedtls_lms_verify()
689 void *p_rng, const unsigned char *msg, in mbedtls_lms_sign() argument
732 msg, in mbedtls_lms_sign()
A Dssl_msg.c2416 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local
2428 if ((msg->p = mbedtls_calloc(1, ssl->out_msglen)) == NULL) { in ssl_flight_append()
2431 mbedtls_free(msg); in ssl_flight_append()
2436 memcpy(msg->p, ssl->out_msg, ssl->out_msglen); in ssl_flight_append()
2437 msg->len = ssl->out_msglen; in ssl_flight_append()
2438 msg->type = ssl->out_msgtype; in ssl_flight_append()
2439 msg->next = NULL; in ssl_flight_append()
2443 ssl->handshake->flight = msg; in ssl_flight_append()
2449 cur->next = msg; in ssl_flight_append()
4564 unsigned char * const msg = hs_buf->data + 12; in ssl_buffer_message() local
[all …]
/mbedtls/tests/src/
A Dpsa_crypto_helpers.c142 const char *msg = mbedtls_test_helper_is_psa_leaking(); in mbedtls_test_fail_if_psa_leaking() local
143 if (msg == NULL) { in mbedtls_test_fail_if_psa_leaking()
146 mbedtls_test_fail(msg, line_no, filename); in mbedtls_test_fail_if_psa_leaking()
A Dthreading_helpers.c174 const char *msg) in mbedtls_test_mutex_usage_error() argument
178 mbedtls_test_set_mutex_usage_error(msg); in mbedtls_test_mutex_usage_error()
179 mbedtls_fprintf(stdout, "[mutex: %s] ", msg); in mbedtls_test_mutex_usage_error()
A Dhelpers.c249 void mbedtls_test_set_mutex_usage_error(const char *msg) in mbedtls_test_set_mutex_usage_error() argument
255 if (mbedtls_test_info.mutex_usage_error == NULL || msg == NULL) { in mbedtls_test_set_mutex_usage_error()
256 mbedtls_test_info.mutex_usage_error = msg; in mbedtls_test_set_mutex_usage_error()
/mbedtls/3rdparty/everest/include/everest/kremlin/internal/
A Dtarget.h69 #define KRML_EABORT(t, msg) \ argument
70 (KRML_HOST_PRINTF("KreMLin abort at %s:%d\n%s\n", __FILE__, __LINE__, msg), \
/mbedtls/include/mbedtls/
A Dlms.h321 const unsigned char *msg, size_t msg_size,
431 void *p_rng, const unsigned char *msg,
/mbedtls/programs/psa/
A Dpsa_hash_demo.sh8 msg <<'EOF'
A Dkey_ladder_demo.sh8 msg <<'EOF'
/mbedtls/programs/
A Ddemo_common.sh48 msg () { function
/mbedtls/tests/include/test/
A Dhelpers.h166 void mbedtls_test_set_mutex_usage_error(const char *msg);

Completed in 56 milliseconds

12