| /mbedtls/tests/suites/ |
| A D | test_suite_constant_time.function | 203 size_t size = 32; 204 TEST_CALLOC(a, size); 205 TEST_CALLOC(b, size); 207 TEST_CF_SECRET(a, size); 208 TEST_CF_SECRET(b, size); 210 TEST_CF_PUBLIC(a, size); 211 TEST_CF_PUBLIC(b, size); 362 TEST_MEMORY_COMPARE(expected, size, result + offset, size); 382 TEST_MEMORY_COMPARE(expected, size, result, size); 405 TEST_MEMORY_COMPARE(expected, size, result, size); [all …]
|
| A D | test_suite_alignment.function | 42 TEST_ASSERT(size == 16 || size == 32 || size == 64); 45 switch (size) { 65 switch (size) { 87 switch (size) { 113 switch (size) { 141 switch (size) { 245 TEST_ASSERT(size == 16 || size == 24 || size == 32 || size == 64); 258 switch (size) { 273 switch (size) { 306 switch (size) { [all …]
|
| A D | test_suite_asn1write.function | 12 size_t size; 17 mbedtls_test_set_step(data->size); 20 TEST_CALLOC(data->output, data->size == 0 ? 1 : data->size); 62 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 84 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 112 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 141 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 174 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 207 for (data.size = 0; data.size <= expected->len + 1; data.size++) { 267 for (data.size = 0; data.size <= expected->len + 1; data.size++) { [all …]
|
| A D | test_suite_lms.function | 82 unsigned int size; 122 for (size = 0; size < sig->len; size++) { 123 if (size == sig->len) { 127 TEST_CALLOC(tmp_sig, size); 129 memcpy(tmp_sig, sig->x, MIN(size, sig->len)); 132 TEST_EQUAL(mbedtls_lms_verify(&ctx, msg->x, msg->len, tmp_sig, size),
|
| A D | test_suite_test_helpers.function | 19 void memory_poison_unpoison(int align, int size) 22 const size_t buffer_size = align + size; 30 mbedtls_test_memory_poison(start, (size_t) size); 31 mbedtls_test_memory_unpoison(start, (size_t) size);
|
| A D | test_suite_lmots.function | 82 unsigned int size; 120 for (size = 0; size < sig->len; size++) { 121 if (size == sig->len) { 125 TEST_CALLOC(tmp_sig, size); 127 memcpy(tmp_sig, sig->x, MIN(size, sig->len)); 130 TEST_EQUAL(mbedtls_lmots_verify(&ctx, msg->x, msg->len, tmp_sig, size),
|
| A D | test_suite_aes.function | 176 // encrypt in multiple steps of varying size 372 void aes_crypt_xts_size(int size, int retval) 378 size_t length = size; 391 void aes_crypt_xts_keysize(int size, int retval) 395 size_t key_len = size; 566 size_t size; 570 &size, out, in, out)); 598 size_t size; 624 size = 16; 626 &size, out, in, out) [all …]
|
| A D | test_suite_psa_crypto_util.data | 73 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte smaller than the actual size) 77 ECDSA DER -> Raw, 256bit, Wrong r integer length (1 byte larger than the actual size) 81 ECDSA DER -> Raw, 256bit, Wrong s integer length (1 byte smaller than the actual size) 85 ECDSA DER -> Raw, 256bit, Wrong s integer length (1 byte larger than the actual size) 89 ECDSA DER -> Raw, 256bit, r size 1 byte larger than allowed for output raw coordinate
|
| /mbedtls/tests/include/test/ |
| A D | memory.h | 80 void mbedtls_test_memory_poison(const unsigned char *ptr, size_t size); 81 #define MBEDTLS_TEST_MEMORY_POISON(ptr, size) \ argument 84 mbedtls_test_memory_poison(ptr, size); \ 94 void mbedtls_test_memory_unpoison(const unsigned char *ptr, size_t size); 95 #define MBEDTLS_TEST_MEMORY_UNPOISON(ptr, size) \ argument 97 mbedtls_test_memory_unpoison(ptr, size); \ 104 #define MBEDTLS_TEST_MEMORY_POISON(ptr, size) ((void) (ptr), (void) (size)) argument 105 #define MBEDTLS_TEST_MEMORY_UNPOISON(ptr, size) ((void) (ptr), (void) (size)) argument
|
| A D | constant_flow.h | 65 #define TEST_CF_SECRET(ptr, size) argument 66 #define TEST_CF_PUBLIC(ptr, size) argument
|
| /mbedtls/tests/src/ |
| A D | test_memory.c | 40 void mbedtls_test_memory_poison(const unsigned char *ptr, size_t size) in mbedtls_test_memory_poison() argument 45 if (size == 0) { in mbedtls_test_memory_poison() 48 align_for_asan(&ptr, &size); in mbedtls_test_memory_poison() 49 __asan_poison_memory_region(ptr, size); in mbedtls_test_memory_poison() 52 void mbedtls_test_memory_unpoison(const unsigned char *ptr, size_t size) in mbedtls_test_memory_unpoison() argument 54 if (size == 0) { in mbedtls_test_memory_unpoison() 57 align_for_asan(&ptr, &size); in mbedtls_test_memory_unpoison() 58 __asan_unpoison_memory_region(ptr, size); in mbedtls_test_memory_unpoison()
|
| /mbedtls/library/ |
| A D | memory_buffer_alloc.c | 35 size_t size; member 214 original_len = len = n * size; in buffer_alloc_calloc() 216 if (n == 0 || size == 0 || len / n != size) { in buffer_alloc_calloc() 230 if (cur->size >= len) { in buffer_alloc_calloc() 275 heap.total_used += cur->size; in buffer_alloc_calloc() 299 new->size = cur->size - len - sizeof(memory_header); in buffer_alloc_calloc() 329 cur->size = len; in buffer_alloc_calloc() 339 heap.total_used += cur->size; in buffer_alloc_calloc() 396 heap.total_used -= hdr->size; in buffer_alloc_free() 411 hdr->prev->size += sizeof(memory_header) + hdr->size; in buffer_alloc_free() [all …]
|
| A D | x509write_csr.c | 132 size_t size, in x509write_csr_der_internal() argument 151 c = buf + size; in x509write_csr_der_internal() 258 c2 = buf + size; in x509write_csr_der_internal() 285 size_t size, in mbedtls_x509write_csr_der() argument 296 ret = x509write_csr_der_internal(ctx, buf, size, in mbedtls_x509write_csr_der() 309 int mbedtls_x509write_csr_pem(mbedtls_x509write_csr *ctx, unsigned char *buf, size_t size, in mbedtls_x509write_csr_pem() argument 316 if ((ret = mbedtls_x509write_csr_der(ctx, buf, size, in mbedtls_x509write_csr_pem() 322 buf + size - ret, in mbedtls_x509write_csr_pem() 323 ret, buf, size, &olen)) != 0) { in mbedtls_x509write_csr_pem()
|
| A D | chacha20.c | 202 size_t size, in mbedtls_chacha20_update() argument 209 while (size > 0U && ctx->keystream_bytes_used < CHACHA20_BLOCK_SIZE_BYTES) { in mbedtls_chacha20_update() 215 size--; in mbedtls_chacha20_update() 219 while (size >= CHACHA20_BLOCK_SIZE_BYTES) { in mbedtls_chacha20_update() 227 size -= CHACHA20_BLOCK_SIZE_BYTES; in mbedtls_chacha20_update() 231 if (size > 0U) { in mbedtls_chacha20_update() 236 mbedtls_xor(output + offset, input + offset, ctx->keystream8, size); in mbedtls_chacha20_update() 238 ctx->keystream_bytes_used = size; in mbedtls_chacha20_update()
|
| A D | x509_internal.h | 46 int mbedtls_x509_sig_alg_gets(char *buf, size_t size, const mbedtls_x509_buf *sig_oid, 60 unsigned char *sig, size_t size, 74 int mbedtls_x509_info_subject_alt_name(char **buf, size_t *size, 78 int mbedtls_x509_info_cert_type(char **buf, size_t *size, 80 int mbedtls_x509_info_key_usage(char **buf, size_t *size,
|
| A D | md.c | 637 size_t size = ctx->md_info->size; in mbedtls_md_finish() local 639 output, size, &size); in mbedtls_md_finish() 678 return mbedtls_sha3_finish(ctx->md_ctx, output, ctx->md_info->size); in mbedtls_md_finish() 694 size_t size = md_info->size; in mbedtls_md() local 697 output, size, &size); in mbedtls_md() 733 return mbedtls_sha3(MBEDTLS_SHA3_224, input, ilen, output, md_info->size); in mbedtls_md() 735 return mbedtls_sha3(MBEDTLS_SHA3_256, input, ilen, output, md_info->size); in mbedtls_md() 737 return mbedtls_sha3(MBEDTLS_SHA3_384, input, ilen, output, md_info->size); in mbedtls_md() 752 return md_info->size; in mbedtls_md_get_size() 990 keylen = ctx->md_info->size; in mbedtls_md_hmac_starts() [all …]
|
| A D | pkwrite.c | 437 int mbedtls_pk_write_pubkey_der(const mbedtls_pk_context *key, unsigned char *buf, size_t size) in mbedtls_pk_write_pubkey_der() argument 446 if (size == 0) { in mbedtls_pk_write_pubkey_der() 450 c = buf + size; in mbedtls_pk_write_pubkey_der() 504 int mbedtls_pk_write_key_der(const mbedtls_pk_context *key, unsigned char *buf, size_t size) in mbedtls_pk_write_key_der() argument 508 if (size == 0) { in mbedtls_pk_write_key_der() 512 c = buf + size; in mbedtls_pk_write_key_der() 544 int mbedtls_pk_write_pubkey_pem(const mbedtls_pk_context *key, unsigned char *buf, size_t size) in mbedtls_pk_write_pubkey_pem() argument 561 ret, buf, size, &olen)) != 0) { in mbedtls_pk_write_pubkey_pem() 571 int mbedtls_pk_write_key_pem(const mbedtls_pk_context *key, unsigned char *buf, size_t size) in mbedtls_pk_write_key_pem() argument 610 ret, buf, size, &olen)) != 0) { in mbedtls_pk_write_key_pem()
|
| A D | x509write_crt.c | 388 const char *t, size_t size) in x509_write_time() argument 399 size - 2)); in x509_write_time() 406 size)); in x509_write_time() 416 unsigned char *buf, size_t size, in mbedtls_x509write_crt_der() argument 440 c = buf + size; in mbedtls_x509write_crt_der() 630 c2 = buf + size; in mbedtls_x509write_crt_der() 660 unsigned char *buf, size_t size, in mbedtls_x509write_crt_pem() argument 667 if ((ret = mbedtls_x509write_crt_der(crt, buf, size, in mbedtls_x509write_crt_pem() 673 buf + size - ret, ret, in mbedtls_x509write_crt_pem() 674 buf, size, &olen)) != 0) { in mbedtls_x509write_crt_pem()
|
| A D | psa_its_file.c | 58 uint8_t size[sizeof(uint32_t)]; member 101 p_info->size = MBEDTLS_GET_UINT32_LE(header.size, 0); in psa_its_read_file() 143 if (data_offset + data_length > info.size) { in psa_its_get() 191 MBEDTLS_PUT_UINT32_LE(data_length, header.size, 0); in psa_its_set()
|
| A D | x509.c | 830 n = size; in mbedtls_x509_dn_gets() 938 return (int) (size - n); in mbedtls_x509_dn_gets() 952 n = size; in mbedtls_x509_serial_gets() 972 return (int) (size - n); in mbedtls_x509_serial_gets() 985 size_t n = size; in mbedtls_x509_sig_alg_gets() 1518 size_t n = *size; in mbedtls_x509_info_subject_alt_name() 1701 *size = n; in mbedtls_x509_info_subject_alt_name() 1725 size_t n = *size; in mbedtls_x509_info_cert_type() 1738 *size = n; in mbedtls_x509_info_cert_type() 1755 size_t n = *size; in mbedtls_x509_info_key_usage() [all …]
|
| A D | platform.c | 25 static void *platform_calloc_uninit(size_t n, size_t size) in platform_calloc_uninit() argument 28 ((void) size); in platform_calloc_uninit() 47 void *mbedtls_calloc(size_t nmemb, size_t size) in mbedtls_calloc() argument 49 return (*mbedtls_calloc_func)(nmemb, size); in mbedtls_calloc()
|
| A D | asn1write.c | 83 const unsigned char *buf, size_t size) in mbedtls_asn1_write_raw_buffer() argument 87 if (*p < start || (size_t) (*p - start) < size) { in mbedtls_asn1_write_raw_buffer() 91 len = size; in mbedtls_asn1_write_raw_buffer() 340 const unsigned char *buf, size_t size) in mbedtls_asn1_write_octet_string() argument 345 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_raw_buffer(p, start, buf, size)); in mbedtls_asn1_write_octet_string()
|
| /mbedtls/scripts/mbedtls_dev/ |
| A D | asymmetric_key_data.py | 31 for size in src[typ]: 32 dst[private][size] = unhexlify(src[typ][size][0]) 33 dst[public][size] = unhexlify(src[typ][size][1])
|
| /mbedtls/tests/configs/ |
| A D | user-config-malloc-0-null.h | 12 static inline void *custom_calloc(size_t nmemb, size_t size) in custom_calloc() argument 14 if (nmemb == 0 || size == 0) { in custom_calloc() 17 return calloc(nmemb, size); in custom_calloc()
|
| /mbedtls/include/mbedtls/ |
| A D | x509_csr.h | 201 int mbedtls_x509_csr_info(char *buf, size_t size, const char *prefix, 351 int mbedtls_x509write_csr_der(mbedtls_x509write_csr *ctx, unsigned char *buf, size_t size, 370 int mbedtls_x509write_csr_pem(mbedtls_x509write_csr *ctx, unsigned char *buf, size_t size,
|