cjson
.github
workflows CI.yml ci-fuzz.yml
CONTRIBUTING.md
fuzzing
inputs test1 test10 test11 test2 test3 test3.bu test3.uf test3.uu test4 test5 test6 test7 test8 test9
.gitignore CMakeLists.txt afl-prepare-linux.sh afl.c afl.sh cjson_read_fuzzer.c fuzz_main.c json.dict ossfuzz.sh
library_config cJSONConfig.cmake.in cJSONConfigVersion.cmake.in libcjson.pc.in libcjson_utils.pc.in uninstall.cmake
tests
inputs test1 test1.expected test10 test10.expected test11 test11.expected test2 test2.expected test3 test3.expected test4 test4.expected test5 test5.expected test6 test7 test7.expected test8 test8.expected test9 test9.expected
json-patch-tests .editorconfig .gitignore .npmignore README.md cjson-utils-tests.json package.json spec_tests.json tests.json
unity
auto colour_prompt.rb colour_reporter.rb generate_config.yml generate_module.rb generate_test_runner.rb parse_output.rb stylize_as_junit.rb test_file_filter.rb type_sanitizer.rb unity_test_summary.py unity_test_summary.rb unity_to_junit.py
docs ThrowTheSwitchCodingStandard.md UnityAssertionsCheatSheetSuitableforPrintingandPossiblyFraming.pdf UnityAssertionsReference.md UnityConfigurationGuide.md UnityGettingStartedGuide.md UnityHelperScriptsGuide.md license.txt
examples
example_1
src ProductionCode.c ProductionCode.h ProductionCode2.c ProductionCode2.h
makefile readme.txt
example_2
src ProductionCode.c ProductionCode.h ProductionCode2.c ProductionCode2.h
makefile readme.txt
example_3
helper UnityHelper.c UnityHelper.h
src ProductionCode.c ProductionCode.h ProductionCode2.c ProductionCode2.h
rakefile.rb rakefile_helper.rb readme.txt target_gcc_32.yml
unity_config.h
extras
eclipse error_parsers.txt
fixture
src unity_fixture.c unity_fixture.h unity_fixture_internals.h unity_fixture_malloc_overrides.h
rakefile.rb rakefile_helper.rb readme.txt
release build.info version.info
src unity.c unity.h unity_internals.h
.gitattributes .gitignore .travis.yml README.md
CMakeLists.txt cjson_add.c common.h compare_tests.c json_patch_tests.c minify_tests.c misc_tests.c misc_utils_tests.c old_utils_tests.c parse_array.c parse_examples.c parse_hex4.c parse_number.c parse_object.c parse_string.c parse_value.c parse_with_opts.c print_array.c print_number.c print_object.c print_string.c print_value.c readme_examples.c unity_setup.c
.editorconfig .gitattributes .gitignore .travis.yml CHANGELOG.md CMakeLists.txt CONTRIBUTORS.md LICENSE Makefile README.md SECURITY.md appveyor.yml cJSON.c cJSON.h cJSON_Utils.c cJSON_Utils.h test.c valgrind.supp
curl
.circleci config.yml
.github
ISSUE_TEMPLATE bug_report.yml config.yml docs.yml
scripts cleancmd.pl cmp-config.pl cmp-pkg-config.sh codespell-ignore.words codespell.sh distfiles.sh pyspelling.words pyspelling.yaml randcurl.pl requirements-docs.txt requirements-proselint.txt requirements.txt shellcheck-ci.sh shellcheck.sh spellcheck.curl trimmarkdownheader.pl typos.sh typos.toml verify-examples.pl verify-synopsis.pl yamlcheck.sh yamlcheck.yaml
workflows appveyor-status.yml checkdocs.yml checksrc.yml checkurls.yml codeql.yml configure-vs-cmake.yml curl-for-win.yml distcheck.yml fuzz.yml http3-linux.yml label.yml linux-old.yml linux.yml macos.yml non-native.yml windows.yml
CODEOWNERS CONTRIBUTING.md FUNDING.yml dependabot.yml labeler.yml lock.yml stale.yml
CMake CurlSymbolHiding.cmake CurlTests.c FindBrotli.cmake FindCares.cmake FindGSS.cmake FindGnuTLS.cmake FindLDAP.cmake FindLibbacktrace.cmake FindLibgsasl.cmake FindLibidn2.cmake FindLibpsl.cmake FindLibssh.cmake FindLibssh2.cmake FindLibuv.cmake FindMbedTLS.cmake FindNGHTTP2.cmake FindNGHTTP3.cmake FindNGTCP2.cmake FindNettle.cmake FindQuiche.cmake FindRustls.cmake FindWolfSSL.cmake FindZstd.cmake Macros.cmake OtherTests.cmake PickyWarnings.cmake Utilities.cmake cmake_uninstall.in.cmake curl-config.in.cmake unix-cache.cmake win32-cache.cmake
LICENSES BSD-4-Clause-UC.txt ISC.txt curl.txt
docs
cmdline-opts .gitignore CMakeLists.txt MANPAGE.md Makefile.am Makefile.inc _AUTHORS.md _BUGS.md _DESCRIPTION.md _ENVIRONMENT.md _EXITCODES.md _FILES.md _GLOBBING.md _NAME.md _OPTIONS.md _OUTPUT.md _PROGRESS.md _PROTOCOLS.md _PROXYPREFIX.md _SEEALSO.md _SYNOPSIS.md _URL.md _VARIABLES.md _VERSION.md _WWW.md abstract-unix-socket.md alt-svc.md anyauth.md append.md aws-sigv4.md basic.md ca-native.md cacert.md capath.md cert-status.md cert-type.md cert.md ciphers.md compressed-ssh.md compressed.md config.md connect-timeout.md connect-to.md continue-at.md cookie-jar.md cookie.md create-dirs.md create-file-mode.md crlf.md crlfile.md curves.md data-ascii.md data-binary.md data-raw.md data-urlencode.md data.md delegation.md digest.md disable-eprt.md disable-epsv.md disable.md disallow-username-in-url.md dns-interface.md dns-ipv4-addr.md dns-ipv6-addr.md dns-servers.md doh-cert-status.md doh-insecure.md doh-url.md dump-ca-embed.md dump-header.md ech.md egd-file.md engine.md etag-compare.md etag-save.md expect100-timeout.md fail-early.md fail-with-body.md fail.md false-start.md follow.md form-escape.md form-string.md form.md ftp-account.md ftp-alternative-to-user.md ftp-create-dirs.md ftp-method.md ftp-pasv.md ftp-port.md ftp-pret.md ftp-skip-pasv-ip.md ftp-ssl-ccc-mode.md ftp-ssl-ccc.md ftp-ssl-control.md get.md globoff.md happy-eyeballs-timeout-ms.md haproxy-clientip.md haproxy-protocol.md head.md header.md help.md hostpubmd5.md hostpubsha256.md hsts.md http0.9.md http1.0.md http1.1.md http2-prior-knowledge.md http2.md http3-only.md http3.md ignore-content-length.md insecure.md interface.md ip-tos.md ipfs-gateway.md ipv4.md ipv6.md json.md junk-session-cookies.md keepalive-cnt.md keepalive-time.md key-type.md key.md knownhosts.md krb.md libcurl.md limit-rate.md list-only.md local-port.md location-trusted.md location.md login-options.md mail-auth.md mail-from.md mail-rcpt-allowfails.md mail-rcpt.md mainpage.idx manual.md max-filesize.md max-redirs.md max-time.md metalink.md mptcp.md negotiate.md netrc-file.md netrc-optional.md netrc.md next.md no-alpn.md no-buffer.md no-clobber.md no-keepalive.md no-npn.md no-progress-meter.md no-sessionid.md noproxy.md ntlm-wb.md ntlm.md oauth2-bearer.md out-null.md output-dir.md output.md parallel-immediate.md parallel-max-host.md parallel-max.md parallel.md pass.md path-as-is.md pinnedpubkey.md post301.md post302.md post303.md preproxy.md progress-bar.md proto-default.md proto-redir.md proto.md proxy-anyauth.md proxy-basic.md proxy-ca-native.md proxy-cacert.md proxy-capath.md proxy-cert-type.md proxy-cert.md proxy-ciphers.md proxy-crlfile.md proxy-digest.md proxy-header.md proxy-http2.md proxy-insecure.md proxy-key-type.md proxy-key.md proxy-negotiate.md proxy-ntlm.md proxy-pass.md proxy-pinnedpubkey.md proxy-service-name.md proxy-ssl-allow-beast.md proxy-ssl-auto-client-cert.md proxy-tls13-ciphers.md proxy-tlsauthtype.md proxy-tlspassword.md proxy-tlsuser.md proxy-tlsv1.md proxy-user.md proxy.md proxy1.0.md proxytunnel.md pubkey.md quote.md random-file.md range.md rate.md raw.md referer.md remote-header-name.md remote-name-all.md remote-name.md remote-time.md remove-on-error.md request-target.md request.md resolve.md retry-all-errors.md retry-connrefused.md retry-delay.md retry-max-time.md retry.md sasl-authzid.md sasl-ir.md service-name.md show-error.md show-headers.md sigalgs.md silent.md skip-existing.md socks4.md socks4a.md socks5-basic.md socks5-gssapi-nec.md socks5-gssapi-service.md socks5-gssapi.md socks5-hostname.md socks5.md speed-limit.md speed-time.md ssl-allow-beast.md ssl-auto-client-cert.md ssl-no-revoke.md ssl-reqd.md ssl-revoke-best-effort.md ssl-sessions.md ssl.md sslv2.md sslv3.md stderr.md styled-output.md suppress-connect-headers.md tcp-fastopen.md tcp-nodelay.md telnet-option.md tftp-blksize.md tftp-no-options.md time-cond.md tls-earlydata.md tls-max.md tls13-ciphers.md tlsauthtype.md tlspassword.md tlsuser.md tlsv1.0.md tlsv1.1.md tlsv1.2.md tlsv1.3.md tlsv1.md tr-encoding.md trace-ascii.md trace-config.md trace-ids.md trace-time.md trace.md unix-socket.md upload-file.md upload-flags.md url-query.md url.md use-ascii.md user-agent.md user.md variable.md verbose.md version.md vlan-priority.md write-out.md xattr.md
examples .checksrc .gitignore 10-at-a-time.c CMakeLists.txt Makefile.am Makefile.example Makefile.inc README.md adddocsref.pl address-scope.c altsvc.c anyauthput.c block_ip.c cacertinmem.c certinfo.c chkspeed.c connect-to.c cookie_interface.c crawler.c debug.c default-scheme.c ephiperfifo.c evhiperfifo.c externalsocket.c fileupload.c ftp-delete.c ftp-wildcard.c ftpget.c ftpgetinfo.c ftpgetresp.c ftpsget.c ftpupload.c ftpuploadfrommem.c ftpuploadresume.c getinfo.c getinmemory.c getredirect.c getreferrer.c ghiper.c headerapi.c hiperfifo.c hsts-preload.c htmltidy.c htmltitle.cpp http-options.c http-post.c http2-download.c http2-pushinmemory.c http2-serverpush.c http2-upload.c http3-present.c http3.c httpcustomheader.c httpput-postfields.c httpput.c https.c imap-append.c imap-authzid.c imap-copy.c imap-create.c imap-delete.c imap-examine.c imap-fetch.c imap-list.c imap-lsub.c imap-multi.c imap-noop.c imap-search.c imap-ssl.c imap-store.c imap-tls.c interface.c ipv6.c keepalive.c localport.c log_failed_transfers.c maxconnects.c multi-app.c multi-debugcallback.c multi-double.c multi-event.c multi-formadd.c multi-legacy.c multi-post.c multi-single.c multi-uv.c netrc.c parseurl.c persistent.c pop3-authzid.c pop3-dele.c pop3-list.c pop3-multi.c pop3-noop.c pop3-retr.c pop3-ssl.c pop3-stat.c pop3-tls.c pop3-top.c pop3-uidl.c post-callback.c postinmemory.c postit2-formadd.c postit2.c progressfunc.c protofeats.c range.c resolve.c rtsp-options.c sendrecv.c sepheaders.c sessioninfo.c sftpget.c sftpuploadresume.c shared-connection-cache.c simple.c simplepost.c simplessl.c smooth-gtk-thread.c smtp-authzid.c smtp-expn.c smtp-mail.c smtp-mime.c smtp-multi.c smtp-ssl.c smtp-tls.c smtp-vrfy.c sslbackend.c synctime.c threaded.c unixsocket.c url2file.c urlapi.c usercertinmem.c version-check.pl websocket-cb.c websocket-updown.c websocket.c xmlstream.c
internals BUFQ.md BUFREF.md CHECKSRC.md CLIENT-READERS.md CLIENT-WRITERS.md CODE_STYLE.md CONNECTION-FILTERS.md CREDENTIALS.md CURLX.md DYNBUF.md HASH.md LLIST.md MID.md MQTT.md MULTI-EV.md NEW-PROTOCOL.md PEERS.md PORTING.md RATELIMITS.md README.md SCORECARD.md SPLAY.md STRPARSE.md THRDPOOL-AND-QUEUE.md TIME-KEEPING.md TLS-SESSIONS.md UINT_SETS.md WEBSOCKET.md
libcurl
opts CMakeLists.txt CURLINFO_ACTIVESOCKET.md CURLINFO_APPCONNECT_TIME.md CURLINFO_APPCONNECT_TIME_T.md CURLINFO_CAINFO.md CURLINFO_CAPATH.md CURLINFO_CERTINFO.md CURLINFO_CONDITION_UNMET.md CURLINFO_CONNECT_TIME.md CURLINFO_CONNECT_TIME_T.md CURLINFO_CONN_ID.md CURLINFO_CONTENT_LENGTH_DOWNLOAD.md CURLINFO_CONTENT_LENGTH_DOWNLOAD_T.md CURLINFO_CONTENT_LENGTH_UPLOAD.md CURLINFO_CONTENT_LENGTH_UPLOAD_T.md CURLINFO_CONTENT_TYPE.md CURLINFO_COOKIELIST.md CURLINFO_EARLYDATA_SENT_T.md CURLINFO_EFFECTIVE_METHOD.md CURLINFO_EFFECTIVE_URL.md CURLINFO_FILETIME.md CURLINFO_FILETIME_T.md CURLINFO_FTP_ENTRY_PATH.md CURLINFO_HEADER_SIZE.md CURLINFO_HTTPAUTH_AVAIL.md CURLINFO_HTTPAUTH_USED.md CURLINFO_HTTP_CONNECTCODE.md CURLINFO_HTTP_VERSION.md CURLINFO_LASTSOCKET.md CURLINFO_LOCAL_IP.md CURLINFO_LOCAL_PORT.md CURLINFO_NAMELOOKUP_TIME.md CURLINFO_NAMELOOKUP_TIME_T.md CURLINFO_NUM_CONNECTS.md CURLINFO_OS_ERRNO.md CURLINFO_POSTTRANSFER_TIME_T.md CURLINFO_PRETRANSFER_TIME.md CURLINFO_PRETRANSFER_TIME_T.md CURLINFO_PRIMARY_IP.md CURLINFO_PRIMARY_PORT.md CURLINFO_PRIVATE.md CURLINFO_PROTOCOL.md CURLINFO_PROXYAUTH_AVAIL.md CURLINFO_PROXYAUTH_USED.md CURLINFO_PROXY_ERROR.md CURLINFO_PROXY_SSL_VERIFYRESULT.md CURLINFO_QUEUE_TIME_T.md CURLINFO_REDIRECT_COUNT.md CURLINFO_REDIRECT_TIME.md CURLINFO_REDIRECT_TIME_T.md CURLINFO_REDIRECT_URL.md CURLINFO_REFERER.md CURLINFO_REQUEST_SIZE.md CURLINFO_RESPONSE_CODE.md CURLINFO_RETRY_AFTER.md CURLINFO_RTSP_CLIENT_CSEQ.md CURLINFO_RTSP_CSEQ_RECV.md CURLINFO_RTSP_SERVER_CSEQ.md CURLINFO_RTSP_SESSION_ID.md CURLINFO_SCHEME.md CURLINFO_SIZE_DELIVERED.md CURLINFO_SIZE_DOWNLOAD.md CURLINFO_SIZE_DOWNLOAD_T.md CURLINFO_SIZE_UPLOAD.md CURLINFO_SIZE_UPLOAD_T.md CURLINFO_SPEED_DOWNLOAD.md CURLINFO_SPEED_DOWNLOAD_T.md CURLINFO_SPEED_UPLOAD.md CURLINFO_SPEED_UPLOAD_T.md CURLINFO_SSL_ENGINES.md CURLINFO_SSL_VERIFYRESULT.md CURLINFO_STARTTRANSFER_TIME.md CURLINFO_STARTTRANSFER_TIME_T.md CURLINFO_TLS_SESSION.md CURLINFO_TLS_SSL_PTR.md CURLINFO_TOTAL_TIME.md CURLINFO_TOTAL_TIME_T.md CURLINFO_USED_PROXY.md CURLINFO_XFER_ID.md CURLMINFO_XFERS_ADDED.md CURLMINFO_XFERS_CURRENT.md CURLMINFO_XFERS_DONE.md CURLMINFO_XFERS_PENDING.md CURLMINFO_XFERS_RUNNING.md CURLMOPT_CHUNK_LENGTH_PENALTY_SIZE.md CURLMOPT_CONTENT_LENGTH_PENALTY_SIZE.md CURLMOPT_MAXCONNECTS.md CURLMOPT_MAX_CONCURRENT_STREAMS.md CURLMOPT_MAX_HOST_CONNECTIONS.md CURLMOPT_MAX_PIPELINE_LENGTH.md CURLMOPT_MAX_TOTAL_CONNECTIONS.md CURLMOPT_NETWORK_CHANGED.md CURLMOPT_NOTIFYDATA.md CURLMOPT_NOTIFYFUNCTION.md CURLMOPT_PIPELINING.md CURLMOPT_PIPELINING_SERVER_BL.md CURLMOPT_PIPELINING_SITE_BL.md CURLMOPT_PUSHDATA.md CURLMOPT_PUSHFUNCTION.md CURLMOPT_QUICK_EXIT.md CURLMOPT_RESOLVE_THREADS_MAX.md CURLMOPT_SOCKETDATA.md CURLMOPT_SOCKETFUNCTION.md CURLMOPT_TIMERDATA.md CURLMOPT_TIMERFUNCTION.md CURLOPT_ABSTRACT_UNIX_SOCKET.md CURLOPT_ACCEPTTIMEOUT_MS.md CURLOPT_ACCEPT_ENCODING.md CURLOPT_ADDRESS_SCOPE.md CURLOPT_ALTSVC.md CURLOPT_ALTSVC_CTRL.md CURLOPT_APPEND.md CURLOPT_AUTOREFERER.md CURLOPT_AWS_SIGV4.md CURLOPT_BUFFERSIZE.md CURLOPT_CAINFO.md CURLOPT_CAINFO_BLOB.md CURLOPT_CAPATH.md CURLOPT_CA_CACHE_TIMEOUT.md CURLOPT_CERTINFO.md CURLOPT_CHUNK_BGN_FUNCTION.md CURLOPT_CHUNK_DATA.md CURLOPT_CHUNK_END_FUNCTION.md CURLOPT_CLOSESOCKETDATA.md CURLOPT_CLOSESOCKETFUNCTION.md CURLOPT_CONNECTTIMEOUT.md CURLOPT_CONNECTTIMEOUT_MS.md CURLOPT_CONNECT_ONLY.md CURLOPT_CONNECT_TO.md CURLOPT_CONV_FROM_NETWORK_FUNCTION.md CURLOPT_CONV_FROM_UTF8_FUNCTION.md CURLOPT_CONV_TO_NETWORK_FUNCTION.md CURLOPT_COOKIE.md CURLOPT_COOKIEFILE.md CURLOPT_COOKIEJAR.md CURLOPT_COOKIELIST.md CURLOPT_COOKIESESSION.md CURLOPT_COPYPOSTFIELDS.md CURLOPT_CRLF.md CURLOPT_CRLFILE.md CURLOPT_CURLU.md CURLOPT_CUSTOMREQUEST.md CURLOPT_DEBUGDATA.md CURLOPT_DEBUGFUNCTION.md CURLOPT_DEFAULT_PROTOCOL.md CURLOPT_DIRLISTONLY.md CURLOPT_DISALLOW_USERNAME_IN_URL.md CURLOPT_DNS_CACHE_TIMEOUT.md CURLOPT_DNS_INTERFACE.md CURLOPT_DNS_LOCAL_IP4.md CURLOPT_DNS_LOCAL_IP6.md CURLOPT_DNS_SERVERS.md CURLOPT_DNS_SHUFFLE_ADDRESSES.md CURLOPT_DNS_USE_GLOBAL_CACHE.md CURLOPT_DOH_SSL_VERIFYHOST.md CURLOPT_DOH_SSL_VERIFYPEER.md CURLOPT_DOH_SSL_VERIFYSTATUS.md CURLOPT_DOH_URL.md CURLOPT_ECH.md CURLOPT_EGDSOCKET.md CURLOPT_ERRORBUFFER.md CURLOPT_EXPECT_100_TIMEOUT_MS.md CURLOPT_FAILONERROR.md CURLOPT_FILETIME.md CURLOPT_FNMATCH_DATA.md CURLOPT_FNMATCH_FUNCTION.md CURLOPT_FOLLOWLOCATION.md CURLOPT_FORBID_REUSE.md CURLOPT_FRESH_CONNECT.md CURLOPT_FTPPORT.md CURLOPT_FTPSSLAUTH.md CURLOPT_FTP_ACCOUNT.md CURLOPT_FTP_ALTERNATIVE_TO_USER.md CURLOPT_FTP_CREATE_MISSING_DIRS.md CURLOPT_FTP_FILEMETHOD.md CURLOPT_FTP_SKIP_PASV_IP.md CURLOPT_FTP_SSL_CCC.md CURLOPT_FTP_USE_EPRT.md CURLOPT_FTP_USE_EPSV.md CURLOPT_FTP_USE_PRET.md CURLOPT_GSSAPI_DELEGATION.md CURLOPT_HAPPY_EYEBALLS_TIMEOUT_MS.md CURLOPT_HAPROXYPROTOCOL.md CURLOPT_HAPROXY_CLIENT_IP.md CURLOPT_HEADER.md CURLOPT_HEADERDATA.md CURLOPT_HEADERFUNCTION.md CURLOPT_HEADEROPT.md CURLOPT_HSTS.md CURLOPT_HSTSREADDATA.md CURLOPT_HSTSREADFUNCTION.md CURLOPT_HSTSWRITEDATA.md CURLOPT_HSTSWRITEFUNCTION.md CURLOPT_HSTS_CTRL.md CURLOPT_HTTP09_ALLOWED.md CURLOPT_HTTP200ALIASES.md CURLOPT_HTTPAUTH.md CURLOPT_HTTPGET.md CURLOPT_HTTPHEADER.md CURLOPT_HTTPPOST.md CURLOPT_HTTPPROXYTUNNEL.md CURLOPT_HTTP_CONTENT_DECODING.md CURLOPT_HTTP_TRANSFER_DECODING.md CURLOPT_HTTP_VERSION.md CURLOPT_IGNORE_CONTENT_LENGTH.md CURLOPT_INFILESIZE.md CURLOPT_INFILESIZE_LARGE.md CURLOPT_INTERFACE.md CURLOPT_INTERLEAVEDATA.md CURLOPT_INTERLEAVEFUNCTION.md CURLOPT_IOCTLDATA.md CURLOPT_IOCTLFUNCTION.md CURLOPT_IPRESOLVE.md CURLOPT_ISSUERCERT.md CURLOPT_ISSUERCERT_BLOB.md CURLOPT_KEEP_SENDING_ON_ERROR.md CURLOPT_KEYPASSWD.md CURLOPT_KRBLEVEL.md CURLOPT_LOCALPORT.md CURLOPT_LOCALPORTRANGE.md CURLOPT_LOGIN_OPTIONS.md CURLOPT_LOW_SPEED_LIMIT.md CURLOPT_LOW_SPEED_TIME.md CURLOPT_MAIL_AUTH.md CURLOPT_MAIL_FROM.md CURLOPT_MAIL_RCPT.md CURLOPT_MAIL_RCPT_ALLOWFAILS.md CURLOPT_MAXAGE_CONN.md CURLOPT_MAXCONNECTS.md CURLOPT_MAXFILESIZE.md CURLOPT_MAXFILESIZE_LARGE.md CURLOPT_MAXLIFETIME_CONN.md CURLOPT_MAXREDIRS.md CURLOPT_MAX_RECV_SPEED_LARGE.md CURLOPT_MAX_SEND_SPEED_LARGE.md CURLOPT_MIMEPOST.md CURLOPT_MIME_OPTIONS.md CURLOPT_NETRC.md CURLOPT_NETRC_FILE.md CURLOPT_NEW_DIRECTORY_PERMS.md CURLOPT_NEW_FILE_PERMS.md CURLOPT_NOBODY.md CURLOPT_NOPROGRESS.md CURLOPT_NOPROXY.md CURLOPT_NOSIGNAL.md CURLOPT_OPENSOCKETDATA.md CURLOPT_OPENSOCKETFUNCTION.md CURLOPT_PASSWORD.md CURLOPT_PATH_AS_IS.md CURLOPT_PINNEDPUBLICKEY.md CURLOPT_PIPEWAIT.md CURLOPT_PORT.md CURLOPT_POST.md CURLOPT_POSTFIELDS.md CURLOPT_POSTFIELDSIZE.md CURLOPT_POSTFIELDSIZE_LARGE.md CURLOPT_POSTQUOTE.md CURLOPT_POSTREDIR.md CURLOPT_PREQUOTE.md CURLOPT_PREREQDATA.md CURLOPT_PREREQFUNCTION.md CURLOPT_PRE_PROXY.md CURLOPT_PRIVATE.md CURLOPT_PROGRESSDATA.md CURLOPT_PROGRESSFUNCTION.md CURLOPT_PROTOCOLS.md CURLOPT_PROTOCOLS_STR.md CURLOPT_PROXY.md CURLOPT_PROXYAUTH.md CURLOPT_PROXYHEADER.md CURLOPT_PROXYPASSWORD.md CURLOPT_PROXYPORT.md CURLOPT_PROXYTYPE.md CURLOPT_PROXYUSERNAME.md CURLOPT_PROXYUSERPWD.md CURLOPT_PROXY_CAINFO.md CURLOPT_PROXY_CAINFO_BLOB.md CURLOPT_PROXY_CAPATH.md CURLOPT_PROXY_CRLFILE.md CURLOPT_PROXY_ISSUERCERT.md CURLOPT_PROXY_ISSUERCERT_BLOB.md CURLOPT_PROXY_KEYPASSWD.md CURLOPT_PROXY_PINNEDPUBLICKEY.md CURLOPT_PROXY_SERVICE_NAME.md CURLOPT_PROXY_SSLCERT.md CURLOPT_PROXY_SSLCERTTYPE.md CURLOPT_PROXY_SSLCERT_BLOB.md CURLOPT_PROXY_SSLKEY.md CURLOPT_PROXY_SSLKEYTYPE.md CURLOPT_PROXY_SSLKEY_BLOB.md CURLOPT_PROXY_SSLVERSION.md CURLOPT_PROXY_SSL_CIPHER_LIST.md CURLOPT_PROXY_SSL_OPTIONS.md CURLOPT_PROXY_SSL_VERIFYHOST.md CURLOPT_PROXY_SSL_VERIFYPEER.md CURLOPT_PROXY_TLS13_CIPHERS.md CURLOPT_PROXY_TLSAUTH_PASSWORD.md CURLOPT_PROXY_TLSAUTH_TYPE.md CURLOPT_PROXY_TLSAUTH_USERNAME.md CURLOPT_PROXY_TRANSFER_MODE.md CURLOPT_PUT.md CURLOPT_QUICK_EXIT.md CURLOPT_QUOTE.md CURLOPT_RANDOM_FILE.md CURLOPT_RANGE.md CURLOPT_READDATA.md CURLOPT_READFUNCTION.md CURLOPT_REDIR_PROTOCOLS.md CURLOPT_REDIR_PROTOCOLS_STR.md CURLOPT_REFERER.md CURLOPT_REQUEST_TARGET.md CURLOPT_RESOLVE.md CURLOPT_RESOLVER_START_DATA.md CURLOPT_RESOLVER_START_FUNCTION.md CURLOPT_RESUME_FROM.md CURLOPT_RESUME_FROM_LARGE.md CURLOPT_RTSP_CLIENT_CSEQ.md CURLOPT_RTSP_REQUEST.md CURLOPT_RTSP_SERVER_CSEQ.md CURLOPT_RTSP_SESSION_ID.md CURLOPT_RTSP_STREAM_URI.md CURLOPT_RTSP_TRANSPORT.md CURLOPT_SASL_AUTHZID.md CURLOPT_SASL_IR.md CURLOPT_SEEKDATA.md CURLOPT_SEEKFUNCTION.md CURLOPT_SERVER_RESPONSE_TIMEOUT.md CURLOPT_SERVER_RESPONSE_TIMEOUT_MS.md CURLOPT_SERVICE_NAME.md CURLOPT_SHARE.md CURLOPT_SOCKOPTDATA.md CURLOPT_SOCKOPTFUNCTION.md CURLOPT_SOCKS5_AUTH.md CURLOPT_SOCKS5_GSSAPI_NEC.md CURLOPT_SOCKS5_GSSAPI_SERVICE.md CURLOPT_SSH_AUTH_TYPES.md CURLOPT_SSH_COMPRESSION.md CURLOPT_SSH_HOSTKEYDATA.md CURLOPT_SSH_HOSTKEYFUNCTION.md CURLOPT_SSH_HOST_PUBLIC_KEY_MD5.md CURLOPT_SSH_HOST_PUBLIC_KEY_SHA256.md CURLOPT_SSH_KEYDATA.md CURLOPT_SSH_KEYFUNCTION.md CURLOPT_SSH_KNOWNHOSTS.md CURLOPT_SSH_PRIVATE_KEYFILE.md CURLOPT_SSH_PUBLIC_KEYFILE.md CURLOPT_SSLCERT.md CURLOPT_SSLCERTTYPE.md CURLOPT_SSLCERT_BLOB.md CURLOPT_SSLENGINE.md CURLOPT_SSLENGINE_DEFAULT.md CURLOPT_SSLKEY.md CURLOPT_SSLKEYTYPE.md CURLOPT_SSLKEY_BLOB.md CURLOPT_SSLVERSION.md CURLOPT_SSL_CIPHER_LIST.md CURLOPT_SSL_CTX_DATA.md CURLOPT_SSL_CTX_FUNCTION.md CURLOPT_SSL_EC_CURVES.md CURLOPT_SSL_ENABLE_ALPN.md CURLOPT_SSL_ENABLE_NPN.md CURLOPT_SSL_FALSESTART.md CURLOPT_SSL_OPTIONS.md CURLOPT_SSL_SESSIONID_CACHE.md CURLOPT_SSL_SIGNATURE_ALGORITHMS.md CURLOPT_SSL_VERIFYHOST.md CURLOPT_SSL_VERIFYPEER.md CURLOPT_SSL_VERIFYSTATUS.md CURLOPT_STDERR.md CURLOPT_STREAM_DEPENDS.md CURLOPT_STREAM_DEPENDS_E.md CURLOPT_STREAM_WEIGHT.md CURLOPT_SUPPRESS_CONNECT_HEADERS.md CURLOPT_TCP_FASTOPEN.md CURLOPT_TCP_KEEPALIVE.md CURLOPT_TCP_KEEPCNT.md CURLOPT_TCP_KEEPIDLE.md CURLOPT_TCP_KEEPINTVL.md CURLOPT_TCP_NODELAY.md CURLOPT_TELNETOPTIONS.md CURLOPT_TFTP_BLKSIZE.md CURLOPT_TFTP_NO_OPTIONS.md CURLOPT_TIMECONDITION.md CURLOPT_TIMEOUT.md CURLOPT_TIMEOUT_MS.md CURLOPT_TIMEVALUE.md CURLOPT_TIMEVALUE_LARGE.md CURLOPT_TLS13_CIPHERS.md CURLOPT_TLSAUTH_PASSWORD.md CURLOPT_TLSAUTH_TYPE.md CURLOPT_TLSAUTH_USERNAME.md CURLOPT_TRAILERDATA.md CURLOPT_TRAILERFUNCTION.md CURLOPT_TRANSFERTEXT.md CURLOPT_TRANSFER_ENCODING.md CURLOPT_UNIX_SOCKET_PATH.md CURLOPT_UNRESTRICTED_AUTH.md CURLOPT_UPKEEP_INTERVAL_MS.md CURLOPT_UPLOAD.md CURLOPT_UPLOAD_BUFFERSIZE.md CURLOPT_UPLOAD_FLAGS.md CURLOPT_URL.md CURLOPT_USERAGENT.md CURLOPT_USERNAME.md CURLOPT_USERPWD.md CURLOPT_USE_SSL.md CURLOPT_VERBOSE.md CURLOPT_WILDCARDMATCH.md CURLOPT_WRITEDATA.md CURLOPT_WRITEFUNCTION.md CURLOPT_WS_OPTIONS.md CURLOPT_XFERINFODATA.md CURLOPT_XFERINFOFUNCTION.md CURLOPT_XOAUTH2_BEARER.md CURLSHOPT_LOCKFUNC.md CURLSHOPT_SHARE.md CURLSHOPT_UNLOCKFUNC.md CURLSHOPT_UNSHARE.md CURLSHOPT_USERDATA.md Makefile.am Makefile.inc
.gitignore ABI.md CMakeLists.txt Makefile.am Makefile.inc curl_easy_cleanup.md curl_easy_duphandle.md curl_easy_escape.md curl_easy_getinfo.md curl_easy_header.md curl_easy_init.md curl_easy_nextheader.md curl_easy_option_by_id.md curl_easy_option_by_name.md curl_easy_option_next.md curl_easy_pause.md curl_easy_perform.md curl_easy_recv.md curl_easy_reset.md curl_easy_send.md curl_easy_setopt.md curl_easy_ssls_export.md curl_easy_ssls_import.md curl_easy_strerror.md curl_easy_unescape.md curl_easy_upkeep.md curl_escape.md curl_formadd.md curl_formfree.md curl_formget.md curl_free.md curl_getdate.md curl_getenv.md curl_global_cleanup.md curl_global_init.md curl_global_init_mem.md curl_global_sslset.md curl_global_trace.md curl_mime_addpart.md curl_mime_data.md curl_mime_data_cb.md curl_mime_encoder.md curl_mime_filedata.md curl_mime_filename.md curl_mime_free.md curl_mime_headers.md curl_mime_init.md curl_mime_name.md curl_mime_subparts.md curl_mime_type.md curl_mprintf.md curl_multi_add_handle.md curl_multi_assign.md curl_multi_cleanup.md curl_multi_fdset.md curl_multi_get_handles.md curl_multi_get_offt.md curl_multi_info_read.md curl_multi_init.md curl_multi_notify_disable.md curl_multi_notify_enable.md curl_multi_perform.md curl_multi_poll.md curl_multi_remove_handle.md curl_multi_setopt.md curl_multi_socket.md curl_multi_socket_action.md curl_multi_socket_all.md curl_multi_strerror.md curl_multi_timeout.md curl_multi_wait.md curl_multi_waitfds.md curl_multi_wakeup.md curl_pushheader_byname.md curl_pushheader_bynum.md curl_share_cleanup.md curl_share_init.md curl_share_setopt.md curl_share_strerror.md curl_slist_append.md curl_slist_free_all.md curl_strequal.md curl_strnequal.md curl_unescape.md curl_url.md curl_url_cleanup.md curl_url_dup.md curl_url_get.md curl_url_set.md curl_url_strerror.md curl_version.md curl_version_info.md curl_ws_meta.md curl_ws_recv.md curl_ws_send.md curl_ws_start_frame.md libcurl-easy.md libcurl-env-dbg.md libcurl-env.md libcurl-errors.md libcurl-multi.md libcurl-security.md libcurl-share.md libcurl-thread.md libcurl-tutorial.md libcurl-url.md libcurl-ws.md libcurl.m4 libcurl.md mksymbolsmanpage.pl symbols-in-versions symbols.pl
tests CI.md FILEFORMAT.md HTTP.md TEST-SUITE.md
.gitignore ALTSVC.md BINDINGS.md BUG-BOUNTY.md BUGS.md CIPHERS-TLS12.md CIPHERS.md CMakeLists.txt CODE_OF_CONDUCT.md CODE_REVIEW.md CONTRIBUTE.md CURL-DISABLE.md CURLDOWN.md DEPRECATE.md DISTROS.md EARLY-RELEASE.md ECH.md EXPERIMENTAL.md FAQ.md FEATURES.md GOVERNANCE.md HELP-US.md HISTORY.md HSTS.md HTTP-COOKIES.md HTTP3.md HTTPSRR.md INFRASTRUCTURE.md INSTALL-CMAKE.md INSTALL.md INTERNALS.md IPFS.md KNOWN_BUGS.md KNOWN_RISKS.md MAIL-ETIQUETTE.md MANUAL.md Makefile.am README.md RELEASE-PROCEDURE.md ROADMAP.md RUSTLS.md SECURITY-ADVISORY.md SPONSORS.md SSL-PROBLEMS.md SSLCERTS.md THANKS THANKS-filter TODO.md TheArtOfHttpScripting.md URL-SYNTAX.md VERIFY.md VERSIONS.md VULN-DISCLOSURE-POLICY.md curl-config.md mk-ca-bundle.md options-in-versions runtests.md testcurl.md wcurl.md
include
curl Makefile.am curl.h curlver.h easy.h header.h mprintf.h multi.h options.h stdcheaders.h system.h typecheck-gcc.h urlapi.h websockets.h
Makefile.am README.md
lib
curlx base64.c base64.h basename.c basename.h dynbuf.c dynbuf.h fopen.c fopen.h inet_ntop.c inet_ntop.h inet_pton.c inet_pton.h multibyte.c multibyte.h nonblock.c nonblock.h snprintf.c snprintf.h strcopy.c strcopy.h strdup.c strdup.h strerr.c strerr.h strparse.c strparse.h timediff.c timediff.h timeval.c timeval.h version_win32.c version_win32.h wait.c wait.h warnless.c warnless.h winapi.c winapi.h
vauth cleartext.c cram.c digest.c digest.h digest_sspi.c gsasl.c krb5_gssapi.c krb5_sspi.c ntlm.c ntlm_sspi.c oauth2.c spnego_gssapi.c spnego_sspi.c vauth.c vauth.h
vquic curl_ngtcp2.c curl_ngtcp2.h curl_quiche.c curl_quiche.h vquic-tls.c vquic-tls.h vquic.c vquic.h vquic_int.h
vssh libssh.c libssh2.c ssh.h vssh.c vssh.h
vtls apple.c apple.h cipher_suite.c cipher_suite.h gtls.c gtls.h hostcheck.c hostcheck.h keylog.c keylog.h mbedtls.c mbedtls.h openssl.c openssl.h rustls.c rustls.h schannel.c schannel.h schannel_int.h schannel_verify.c vtls.c vtls.h vtls_int.h vtls_scache.c vtls_scache.h vtls_spack.c vtls_spack.h wolfssl.c wolfssl.h x509asn1.c x509asn1.h
.gitignore CMakeLists.txt Makefile.am Makefile.inc Makefile.soname altsvc.c altsvc.h amigaos.c amigaos.h arpa_telnet.h asyn-ares.c asyn-base.c asyn-thrdd.c asyn.h bufq.c bufq.h bufref.c bufref.h cf-dns.c cf-dns.h cf-h1-proxy.c cf-h1-proxy.h cf-h2-proxy.c cf-h2-proxy.h cf-haproxy.c cf-haproxy.h cf-https-connect.c cf-https-connect.h cf-ip-happy.c cf-ip-happy.h cf-socket.c cf-socket.h cfilters.c cfilters.h config-mac.h config-os400.h config-riscos.h config-win32.h conncache.c conncache.h connect.c connect.h content_encoding.c content_encoding.h cookie.c cookie.h creds.c creds.h cshutdn.c cshutdn.h curl_addrinfo.c curl_addrinfo.h curl_config-cmake.h.in curl_ctype.h curl_endian.c curl_endian.h curl_fnmatch.c curl_fnmatch.h curl_fopen.c curl_fopen.h curl_get_line.c curl_get_line.h curl_gethostname.c curl_gethostname.h curl_gssapi.c curl_gssapi.h curl_hmac.h curl_ldap.h curl_md4.h curl_md5.h curl_memrchr.c curl_memrchr.h curl_ntlm_core.c curl_ntlm_core.h curl_printf.h curl_range.c curl_range.h curl_sasl.c curl_sasl.h curl_setup.h curl_sha256.h curl_sha512_256.c curl_sha512_256.h curl_share.c curl_share.h curl_sspi.c curl_sspi.h curl_threads.c curl_threads.h curl_trc.c curl_trc.h cw-out.c cw-out.h cw-pause.c cw-pause.h dict.c dict.h dllmain.c dnscache.c dnscache.h doh.c doh.h dynhds.c dynhds.h easy.c easy_lock.h easygetopt.c easyif.h easyoptions.c easyoptions.h escape.c escape.h fake_addrinfo.c fake_addrinfo.h file.c file.h fileinfo.c fileinfo.h formdata.c formdata.h ftp-int.h ftp.c ftp.h ftplistparser.c ftplistparser.h functypes.h getenv.c getinfo.c getinfo.h gopher.c gopher.h hash.c hash.h headers.c headers.h hmac.c hostip.c hostip.h hostip4.c hostip6.c hsts.c hsts.h http.c http.h http1.c http1.h http2.c http2.h http_aws_sigv4.c http_aws_sigv4.h http_chunks.c http_chunks.h http_digest.c http_digest.h http_negotiate.c http_negotiate.h http_ntlm.c http_ntlm.h http_proxy.c http_proxy.h httpsrr.c httpsrr.h idn.c idn.h if2ip.c if2ip.h imap.c imap.h ldap.c libcurl.def libcurl.rc libcurl.vers.in llist.c llist.h macos.c macos.h md4.c md5.c memdebug.c mime.c mime.h mprintf.c mqtt.c mqtt.h multi.c multi_ev.c multi_ev.h multi_ntfy.c multi_ntfy.h multihandle.h multiif.h netrc.c netrc.h noproxy.c noproxy.h openldap.c optiontable.pl parsedate.c parsedate.h peer.c peer.h pingpong.c pingpong.h pop3.c pop3.h progress.c progress.h protocol.c protocol.h psl.c psl.h rand.c rand.h ratelimit.c ratelimit.h request.c request.h rtsp.c rtsp.h select.c select.h sendf.c sendf.h setopt.c setopt.h setup-os400.h setup-vms.h setup-win32.h sha256.c sigpipe.h slist.c slist.h smb.c smb.h smtp.c smtp.h sockaddr.h socketpair.c socketpair.h socks.c socks.h socks_gssapi.c socks_sspi.c splay.c splay.h strcase.c strcase.h strequal.c strerror.c strerror.h system_win32.c system_win32.h telnet.c telnet.h tftp.c tftp.h thrdpool.c thrdpool.h thrdqueue.c thrdqueue.h transfer.c transfer.h uint-bset.c uint-bset.h uint-hash.c uint-hash.h uint-spbset.c uint-spbset.h uint-table.c uint-table.h url.c url.h urlapi-int.h urlapi.c urldata.h version.c ws.c ws.h
m4 .gitignore curl-amissl.m4 curl-apple-sectrust.m4 curl-compilers.m4 curl-confopts.m4 curl-functions.m4 curl-gnutls.m4 curl-mbedtls.m4 curl-openssl.m4 curl-override.m4 curl-reentrant.m4 curl-rustls.m4 curl-schannel.m4 curl-sysconfig.m4 curl-wolfssl.m4 xc-am-iface.m4 xc-cc-check.m4 xc-lt-iface.m4 xc-val-flgs.m4 zz40-xc-ovr.m4 zz50-xc-ovr.m4
projects
OS400
rpg-examples HEADERAPI HTTPPOST INMEMORY SIMPLE1 SIMPLE2 SMTPSRCMBR
.checksrc README.OS400 ccsidcurl.c ccsidcurl.h config400.default curl.cmd curl.inc.in curlcl.c curlmain.c initscript.sh make-docs.sh make-include.sh make-lib.sh make-src.sh make-tests.sh makefile.sh os400sys.c os400sys.h
Windows
tmpl .gitattributes README.txt curl-all.sln curl.sln curl.vcxproj curl.vcxproj.filters libcurl.sln libcurl.vcxproj libcurl.vcxproj.filters
.gitignore README.md generate.bat
vms Makefile.am backup_gnv_curl_src.com build_curl-config_script.com build_gnv_curl.com build_gnv_curl_pcsi_desc.com build_gnv_curl_pcsi_text.com build_gnv_curl_release_notes.com build_libcurl_pc.com build_vms.com clean_gnv_curl.com compare_curl_source.com config_h.com curl_crtl_init.c curl_gnv_build_steps.txt curl_release_note_start.txt curl_startup.com curlmsg.h curlmsg.msg curlmsg.sdl curlmsg_vms.h generate_config_vms_h_curl.com generate_vax_transfer.com gnv_conftest.c_first gnv_curl_configure.sh gnv_libcurl_symbols.opt gnv_link_curl.com macro32_exactcase.patch make_gnv_curl_install.sh make_pcsi_curl_kit_name.com pcsi_gnv_curl_file_list.txt pcsi_product_gnv_curl.com readme report_openssl_version.c setup_gnv_curl_build.com stage_curl_install.com vms_eco_level.h
Makefile.am README.md
scripts .checksrc CMakeLists.txt Makefile.am badwords badwords-all badwords.txt cd2cd cd2nroff cdall checksrc-all.pl checksrc.pl cmakelint.sh completion.pl contributors.sh contrithanks.sh coverage.sh delta dmaketgz extract-unit-protos firefox-db2pem.sh installcheck.sh maketgz managen mdlinkcheck mk-ca-bundle.pl mk-unity.pl nroff2cd perlcheck.sh pythonlint.sh randdisable release-notes.pl release-tools.sh schemetable.c singleuse.pl spacecheck.pl top-complexity top-length verify-release wcurl
src
toolx tool_time.c tool_time.h
.checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc config2setopts.c config2setopts.h curl.rc curlinfo.c mk-file-embed.pl mkhelp.pl slist_wc.c slist_wc.h terminal.c terminal.h tool_cb_dbg.c tool_cb_dbg.h tool_cb_hdr.c tool_cb_hdr.h tool_cb_prg.c tool_cb_prg.h tool_cb_rea.c tool_cb_rea.h tool_cb_see.c tool_cb_see.h tool_cb_soc.c tool_cb_soc.h tool_cb_wrt.c tool_cb_wrt.h tool_cfgable.c tool_cfgable.h tool_dirhie.c tool_dirhie.h tool_doswin.c tool_doswin.h tool_easysrc.c tool_easysrc.h tool_filetime.c tool_filetime.h tool_findfile.c tool_findfile.h tool_formparse.c tool_formparse.h tool_getparam.c tool_getparam.h tool_getpass.c tool_getpass.h tool_help.c tool_help.h tool_helpers.c tool_helpers.h tool_hugehelp.h tool_ipfs.c tool_ipfs.h tool_libinfo.c tool_libinfo.h tool_listhelp.c tool_main.c tool_main.h tool_msgs.c tool_msgs.h tool_operate.c tool_operate.h tool_operhlp.c tool_operhlp.h tool_paramhlp.c tool_paramhlp.h tool_parsecfg.c tool_parsecfg.h tool_progress.c tool_progress.h tool_sdecls.h tool_setopt.c tool_setopt.h tool_setup.h tool_ssls.c tool_ssls.h tool_stderr.c tool_stderr.h tool_urlglob.c tool_urlglob.h tool_util.c tool_util.h tool_version.h tool_vms.c tool_vms.h tool_writeout.c tool_writeout.h tool_writeout_json.c tool_writeout_json.h tool_xattr.c tool_xattr.h var.c var.h
tests
certs .gitignore CMakeLists.txt Makefile.am Makefile.inc genserv.pl srp-verifier-conf srp-verifier-db test-ca.cnf test-ca.prm test-client-cert.prm test-client-eku-only.prm test-localhost-san-first.prm test-localhost-san-last.prm test-localhost.nn.prm test-localhost.prm test-localhost0h.prm
cmake CMakeLists.txt test.c test.cpp test.sh
data .gitignore DISABLED Makefile.am data-xml1 data1400.c data1401.c data1402.c data1403.c data1404.c data1405.c data1406.c data1407.c data1420.c data1461.txt data1463.txt data1465.c data1481.c data1705-1.md data1705-2.md data1705-3.md data1705-4.md data1705-stdout.1 data1706-1.md data1706-2.md data1706-3.md data1706-4.md data1706-stdout.txt data320.html test1 test10 test100 test1000 test1001 test1002 test1003 test1004 test1005 test1006 test1007 test1008 test1009 test101 test1010 test1011 test1012 test1013 test1014 test1015 test1016 test1017 test1018 test1019 test102 test1020 test1021 test1022 test1023 test1024 test1025 test1026 test1027 test1028 test1029 test103 test1030 test1031 test1032 test1033 test1034 test1035 test1036 test1037 test1038 test1039 test104 test1040 test1041 test1042 test1043 test1044 test1045 test1046 test1047 test1048 test1049 test105 test1050 test1051 test1052 test1053 test1054 test1055 test1056 test1057 test1058 test1059 test106 test1060 test1061 test1062 test1063 test1064 test1065 test1066 test1067 test1068 test1069 test107 test1070 test1071 test1072 test1073 test1074 test1075 test1076 test1077 test1078 test1079 test108 test1080 test1081 test1082 test1083 test1084 test1085 test1086 test1087 test1088 test1089 test109 test1090 test1091 test1092 test1093 test1094 test1095 test1096 test1097 test1098 test1099 test11 test110 test1100 test1101 test1102 test1103 test1104 test1105 test1106 test1107 test1108 test1109 test111 test1110 test1111 test1112 test1113 test1114 test1115 test1116 test1117 test1118 test1119 test112 test1120 test1121 test1122 test1123 test1124 test1125 test1126 test1127 test1128 test1129 test113 test1130 test1131 test1132 test1133 test1134 test1135 test1136 test1137 test1138 test1139 test114 test1140 test1141 test1142 test1143 test1144 test1145 test1146 test1147 test1148 test1149 test115 test1150 test1151 test1152 test1153 test1154 test1155 test1156 test1157 test1158 test1159 test116 test1160 test1161 test1162 test1163 test1164 test1165 test1166 test1167 test1168 test1169 test117 test1170 test1171 test1172 test1173 test1174 test1175 test1176 test1177 test1178 test1179 test118 test1180 test1181 test1182 test1183 test1184 test1185 test1186 test1187 test1188 test1189 test119 test1190 test1191 test1192 test1193 test1194 test1195 test1196 test1197 test1198 test1199 test12 test120 test1200 test1201 test1202 test1203 test1204 test1205 test1206 test1207 test1208 test1209 test121 test1210 test1211 test1212 test1213 test1214 test1215 test1216 test1217 test1218 test1219 test122 test1220 test1221 test1222 test1223 test1224 test1225 test1226 test1227 test1228 test1229 test123 test1230 test1231 test1232 test1233 test1234 test1235 test1236 test1237 test1238 test1239 test124 test1240 test1241 test1242 test1243 test1244 test1245 test1246 test1247 test1248 test1249 test125 test1250 test1251 test1252 test1253 test1254 test1255 test1256 test1257 test1258 test1259 test126 test1260 test1261 test1262 test1263 test1264 test1265 test1266 test1267 test1268 test1269 test127 test1270 test1271 test1272 test1273 test1274 test1275 test1276 test1277 test1278 test1279 test128 test1280 test1281 test1282 test1283 test1284 test1285 test1286 test1287 test1288 test1289 test129 test1290 test1291 test1292 test1293 test1294 test1295 test1296 test1297 test1298 test1299 test13 test130 test1300 test1301 test1302 test1303 test1304 test1305 test1306 test1307 test1308 test1309 test131 test1310 test1311 test1312 test1313 test1314 test1315 test1316 test1317 test1318 test1319 test132 test1320 test1321 test1322 test1323 test1324 test1325 test1326 test1327 test1328 test1329 test133 test1330 test1331 test1332 test1333 test1334 test1335 test1336 test1337 test1338 test1339 test134 test1340 test1341 test1342 test1343 test1344 test1345 test1346 test1347 test1348 test1349 test135 test1350 test1351 test1352 test1353 test1354 test1355 test1356 test1357 test1358 test1359 test136 test1360 test1361 test1362 test1363 test1364 test1365 test1366 test1367 test1368 test1369 test137 test1370 test1371 test1372 test1373 test1374 test1375 test1376 test1377 test1378 test1379 test138 test1380 test1381 test1382 test1383 test1384 test1385 test1386 test1387 test1388 test1389 test139 test1390 test1391 test1392 test1393 test1394 test1395 test1396 test1397 test1398 test1399 test14 test140 test1400 test1401 test1402 test1403 test1404 test1405 test1406 test1407 test1408 test1409 test141 test1410 test1411 test1412 test1413 test1414 test1415 test1416 test1417 test1418 test1419 test142 test1420 test1421 test1422 test1423 test1424 test1425 test1426 test1427 test1428 test1429 test143 test1430 test1431 test1432 test1433 test1434 test1435 test1436 test1437 test1438 test1439 test144 test1440 test1441 test1442 test1443 test1444 test1445 test1446 test1447 test1448 test1449 test145 test1450 test1451 test1452 test1453 test1454 test1455 test1456 test1457 test1458 test1459 test146 test1460 test1461 test1462 test1463 test1464 test1465 test1466 test1467 test1468 test1469 test147 test1470 test1471 test1472 test1473 test1474 test1475 test1476 test1477 test1478 test1479 test148 test1480 test1481 test1482 test1483 test1484 test1485 test1486 test1487 test1488 test1489 test149 test1490 test1491 test1492 test1493 test1494 test1495 test1496 test1497 test1498 test1499 test15 test150 test1500 test1501 test1502 test1503 test1504 test1505 test1506 test1507 test1508 test1509 test151 test1510 test1511 test1512 test1513 test1514 test1515 test1516 test1517 test1518 test1519 test152 test1520 test1521 test1522 test1523 test1524 test1525 test1526 test1527 test1528 test1529 test153 test1530 test1531 test1532 test1533 test1534 test1535 test1536 test1537 test1538 test1539 test154 test1540 test1541 test1542 test1543 test1544 test1545 test1546 test1547 test1548 test1549 test155 test1550 test1551 test1552 test1553 test1554 test1555 test1556 test1557 test1558 test1559 test156 test1560 test1561 test1562 test1563 test1564 test1565 test1566 test1567 test1568 test1569 test157 test1570 test1571 test1572 test1573 test1574 test1575 test1576 test1577 test1578 test1579 test158 test1580 test1581 test1582 test1583 test1584 test1585 test1586 test1587 test1588 test1589 test159 test1590 test1591 test1592 test1593 test1594 test1595 test1596 test1597 test1598 test1599 test16 test160 test1600 test1601 test1602 test1603 test1604 test1605 test1606 test1607 test1608 test1609 test161 test1610 test1611 test1612 test1613 test1614 test1615 test1616 test1617 test1618 test1619 test162 test1620 test1621 test1622 test1623 test1624 test1625 test1626 test1627 test1628 test1629 test163 test1630 test1631 test1632 test1633 test1634 test1635 test1636 test1637 test1638 test1639 test164 test1640 test1641 test1642 test1643 test1644 test1645 test165 test1650 test1651 test1652 test1653 test1654 test1655 test1656 test1657 test1658 test1659 test166 test1660 test1661 test1662 test1663 test1664 test1665 test1666 test1667 test1668 test1669 test167 test1670 test1671 test1672 test1673 test1674 test1675 test1676 test168 test1680 test1681 test1682 test1683 test1684 test1685 test169 test17 test170 test1700 test1701 test1702 test1703 test1704 test1705 test1706 test1707 test1708 test1709 test171 test1710 test1711 test1712 test1713 test1714 test1715 test172 test1720 test1721 test173 test174 test175 test176 test177 test178 test179 test18 test180 test1800 test1801 test1802 test181 test182 test183 test184 test1847 test1848 test1849 test185 test1850 test1851 test186 test187 test188 test189 test19 test190 test1900 test1901 test1902 test1903 test1904 test1905 test1906 test1907 test1908 test1909 test191 test1910 test1911 test1912 test1913 test1914 test1915 test1916 test1917 test1918 test1919 test192 test1920 test1921 test193 test1933 test1934 test1935 test1936 test1937 test1938 test1939 test194 test1940 test1941 test1942 test1943 test1944 test1945 test1946 test1947 test1948 test195 test1955 test1956 test1957 test1958 test1959 test196 test1960 test1964 test1965 test1966 test197 test1970 test1971 test1972 test1973 test1974 test1975 test1976 test1977 test1978 test1979 test198 test1980 test1981 test1982 test1983 test1984 test199 test2 test20 test200 test2000 test2001 test2002 test2003 test2004 test2005 test2006 test2007 test2008 test2009 test201 test2010 test2011 test2012 test2013 test2014 test202 test2023 test2024 test2025 test2026 test2027 test2028 test2029 test203 test2030 test2031 test2032 test2033 test2034 test2035 test2037 test2038 test2039 test204 test2040 test2041 test2042 test2043 test2044 test2045 test2046 test2047 test2048 test2049 test205 test2050 test2051 test2052 test2053 test2054 test2055 test2056 test2057 test2058 test2059 test206 test2060 test2061 test2062 test2063 test2064 test2065 test2066 test2067 test2068 test2069 test207 test2070 test2071 test2072 test2073 test2074 test2075 test2076 test2077 test2078 test2079 test208 test2080 test2081 test2082 test2083 test2084 test2085 test2086 test2087 test2088 test2089 test209 test2090 test2091 test2092 test21 test210 test2100 test2101 test2102 test2103 test2104 test211 test212 test213 test214 test215 test216 test217 test218 test219 test22 test220 test2200 test2201 test2202 test2203 test2204 test2205 test2206 test2207 test221 test222 test223 test224 test225 test226 test227 test228 test229 test23 test230 test2300 test2301 test2302 test2303 test2304 test2306 test2307 test2308 test2309 test231 test232 test233 test234 test235 test236 test237 test238 test239 test24 test240 test2400 test2401 test2402 test2403 test2404 test2405 test2406 test2407 test2408 test2409 test241 test2410 test2411 test242 test243 test244 test245 test246 test247 test248 test249 test25 test250 test2500 test2501 test2502 test2503 test2504 test2505 test2506 test251 test252 test253 test254 test255 test256 test257 test258 test259 test26 test260 test2600 test2601 test2602 test2603 test2604 test2605 test261 test262 test263 test264 test265 test266 test267 test268 test269 test27 test270 test2700 test2701 test2702 test2703 test2704 test2705 test2706 test2707 test2708 test2709 test271 test2710 test2711 test2712 test2713 test2714 test2715 test2716 test2717 test2718 test2719 test272 test2720 test2721 test2722 test2723 test273 test274 test275 test276 test277 test278 test279 test28 test280 test281 test282 test283 test284 test285 test286 test287 test288 test289 test29 test290 test291 test292 test293 test294 test295 test296 test297 test298 test299 test3 test30 test300 test3000 test3001 test3002 test3003 test3004 test3005 test3006 test3007 test3008 test3009 test301 test3010 test3011 test3012 test3013 test3014 test3015 test3016 test3017 test3018 test3019 test302 test3020 test3021 test3022 test3023 test3024 test3025 test3026 test3027 test3028 test3029 test303 test3030 test3031 test3032 test3033 test3034 test3035 test3036 test304 test305 test306 test307 test308 test309 test31 test310 test3100 test3101 test3102 test3103 test3104 test3105 test3106 test311 test312 test313 test314 test315 test316 test317 test318 test319 test32 test320 test3200 test3201 test3202 test3203 test3204 test3205 test3206 test3207 test3208 test3209 test321 test3210 test3211 test3212 test3213 test3214 test3215 test3216 test3217 test3218 test3219 test322 test3220 test323 test324 test325 test326 test327 test328 test329 test33 test330 test3300 test3301 test3302 test331 test332 test333 test334 test335 test336 test337 test338 test339 test34 test340 test341 test342 test343 test344 test345 test346 test347 test348 test349 test35 test350 test351 test352 test353 test354 test355 test356 test357 test358 test359 test36 test360 test361 test362 test363 test364 test365 test366 test367 test368 test369 test37 test370 test371 test372 test373 test374 test375 test376 test378 test379 test38 test380 test381 test383 test384 test385 test386 test387 test388 test389 test39 test390 test391 test392 test393 test394 test395 test396 test397 test398 test399 test4 test40 test400 test4000 test4001 test401 test402 test403 test404 test405 test406 test407 test408 test409 test41 test410 test411 test412 test413 test414 test415 test416 test417 test418 test419 test42 test420 test421 test422 test423 test424 test425 test426 test427 test428 test429 test43 test430 test431 test432 test433 test434 test435 test436 test437 test438 test439 test44 test440 test441 test442 test443 test444 test445 test446 test447 test448 test449 test45 test450 test451 test452 test453 test454 test455 test456 test457 test458 test459 test46 test460 test461 test462 test463 test467 test468 test469 test47 test470 test471 test472 test473 test474 test475 test476 test477 test478 test479 test48 test480 test481 test482 test483 test484 test485 test486 test487 test488 test489 test49 test490 test491 test492 test493 test494 test495 test496 test497 test498 test499 test5 test50 test500 test501 test502 test503 test504 test505 test506 test507 test508 test509 test51 test510 test511 test512 test513 test514 test515 test516 test517 test518 test519 test52 test520 test521 test522 test523 test524 test525 test526 test527 test528 test529 test53 test530 test531 test532 test533 test534 test535 test536 test537 test538 test539 test54 test540 test541 test542 test543 test544 test545 test546 test547 test548 test549 test55 test550 test551 test552 test553 test554 test555 test556 test557 test558 test559 test56 test560 test561 test562 test563 test564 test565 test566 test567 test568 test569 test57 test570 test571 test572 test573 test574 test575 test576 test577 test578 test579 test58 test580 test581 test582 test583 test584 test585 test586 test587 test588 test589 test59 test590 test591 test592 test593 test594 test595 test596 test597 test598 test599 test6 test60 test600 test601 test602 test603 test604 test605 test606 test607 test608 test609 test61 test610 test611 test612 test613 test614 test615 test616 test617 test618 test619 test62 test620 test621 test622 test623 test624 test625 test626 test627 test628 test629 test63 test630 test631 test632 test633 test634 test635 test636 test637 test638 test639 test64 test640 test641 test642 test643 test644 test645 test646 test647 test648 test649 test65 test650 test651 test652 test653 test654 test655 test656 test658 test659 test66 test660 test661 test662 test663 test664 test665 test666 test667 test668 test669 test67 test670 test671 test672 test673 test674 test675 test676 test677 test678 test679 test68 test680 test681 test682 test683 test684 test685 test686 test687 test688 test689 test69 test690 test691 test692 test693 test694 test695 test696 test697 test698 test699 test7 test70 test700 test701 test702 test703 test704 test705 test706 test707 test708 test709 test71 test710 test711 test712 test713 test714 test715 test716 test717 test718 test719 test72 test720 test721 test722 test723 test724 test725 test726 test727 test728 test729 test73 test730 test731 test732 test733 test734 test735 test736 test737 test738 test739 test74 test740 test741 test742 test743 test744 test745 test746 test747 test748 test749 test75 test750 test751 test752 test753 test754 test755 test756 test757 test758 test759 test76 test760 test761 test762 test763 test764 test765 test766 test767 test768 test769 test77 test770 test771 test772 test773 test774 test775 test776 test777 test778 test779 test78 test780 test781 test782 test783 test784 test785 test786 test787 test788 test789 test79 test790 test791 test792 test793 test794 test795 test796 test797 test798 test799 test8 test80 test800 test801 test802 test803 test804 test805 test806 test807 test808 test809 test81 test810 test811 test812 test813 test814 test815 test816 test817 test818 test819 test82 test820 test821 test822 test823 test824 test825 test826 test827 test828 test829 test83 test830 test831 test832 test833 test834 test835 test836 test837 test838 test839 test84 test840 test841 test842 test843 test844 test845 test846 test847 test848 test849 test85 test850 test851 test852 test853 test854 test855 test856 test857 test858 test859 test86 test860 test861 test862 test863 test864 test865 test866 test867 test868 test869 test87 test870 test871 test872 test873 test874 test875 test876 test877 test878 test879 test88 test880 test881 test882 test883 test884 test885 test886 test887 test888 test889 test89 test890 test891 test892 test893 test894 test895 test896 test897 test898 test899 test9 test90 test900 test901 test902 test903 test904 test905 test906 test907 test908 test909 test91 test910 test911 test912 test913 test914 test915 test916 test917 test918 test919 test92 test920 test921 test922 test923 test924 test925 test926 test927 test928 test929 test93 test930 test931 test932 test933 test934 test935 test936 test937 test938 test939 test94 test940 test941 test942 test943 test944 test945 test946 test947 test948 test949 test95 test950 test951 test952 test953 test954 test955 test956 test957 test958 test959 test96 test960 test961 test962 test963 test964 test965 test966 test967 test968 test969 test97 test970 test971 test972 test973 test974 test975 test976 test977 test978 test979 test98 test980 test981 test982 test983 test984 test985 test986 test987 test988 test989 test99 test990 test991 test992 test993 test994 test995 test996 test997 test998 test999
http
testenv
mod_curltest .gitignore mod_curltest.c
__init__.py caddy.py certs.py client.py curl.py dante.py dnsd.py env.py httpd.py nghttpx.py ports.py sshd.py vsftpd.py ws_echo_server.py
.gitignore CMakeLists.txt Makefile.am config.ini.in conftest.py requirements.txt scorecard.py test_01_basic.py test_02_download.py test_03_goaway.py test_04_stuttered.py test_05_errors.py test_06_eyeballs.py test_07_upload.py test_08_caddy.py test_09_push.py test_10_proxy.py test_11_unix.py test_12_reuse.py test_13_proxy_auth.py test_14_auth.py test_15_tracing.py test_16_info.py test_17_ssl_use.py test_18_methods.py test_19_shutdown.py test_20_websockets.py test_21_resolve.py test_22_httpsrr.py test_30_vsftpd.py test_31_vsftpds.py test_32_ftps_vsftpd.py test_40_socks.py test_50_scp.py test_51_sftp.py
libtest .gitignore CMakeLists.txt Makefile.am Makefile.inc cli_ftp_upload.c cli_h2_pausing.c cli_h2_serverpush.c cli_h2_upgrade_extreme.c cli_hx_download.c cli_hx_upload.c cli_tls_session_reuse.c cli_upload_pausing.c cli_ws_data.c cli_ws_pingpong.c first.c first.h lib1156.c lib1301.c lib1308.c lib1485.c lib1500.c lib1501.c lib1502.c lib1506.c lib1507.c lib1508.c lib1509.c lib1510.c lib1511.c lib1512.c lib1513.c lib1514.c lib1515.c lib1517.c lib1518.c lib1520.c lib1522.c lib1523.c lib1525.c lib1526.c lib1527.c lib1528.c lib1529.c lib1530.c lib1531.c lib1532.c lib1533.c lib1534.c lib1535.c lib1536.c lib1537.c lib1538.c lib1540.c lib1541.c lib1542.c lib1545.c lib1549.c lib1550.c lib1551.c lib1552.c lib1553.c lib1554.c lib1555.c lib1556.c lib1557.c lib1558.c lib1559.c lib1560.c lib1564.c lib1565.c lib1567.c lib1568.c lib1569.c lib1571.c lib1576.c lib1582.c lib1587.c lib1588.c lib1589.c lib1591.c lib1592.c lib1593.c lib1594.c lib1597.c lib1598.c lib1599.c lib1662.c lib1900.c lib1901.c lib1902.c lib1903.c lib1905.c lib1906.c lib1907.c lib1908.c lib1910.c lib1911.c lib1912.c lib1913.c lib1915.c lib1916.c lib1918.c lib1919.c lib1920.c lib1921.c lib1933.c lib1934.c lib1935.c lib1936.c lib1937.c lib1938.c lib1939.c lib1940.c lib1945.c lib1947.c lib1948.c lib1955.c lib1956.c lib1957.c lib1958.c lib1959.c lib1960.c lib1964.c lib1965.c lib1970.c lib1971.c lib1972.c lib1973.c lib1974.c lib1975.c lib1977.c lib1978.c lib2023.c lib2032.c lib2082.c lib2301.c lib2302.c lib2304.c lib2306.c lib2308.c lib2309.c lib2402.c lib2404.c lib2405.c lib2502.c lib2504.c lib2505.c lib2506.c lib2700.c lib3010.c lib3025.c lib3026.c lib3027.c lib3033.c lib3034.c lib3100.c lib3101.c lib3102.c lib3103.c lib3104.c lib3105.c lib3207.c lib3208.c lib500.c lib501.c lib502.c lib503.c lib504.c lib505.c lib506.c lib507.c lib508.c lib509.c lib510.c lib511.c lib512.c lib513.c lib514.c lib515.c lib516.c lib517.c lib518.c lib519.c lib520.c lib521.c lib523.c lib524.c lib525.c lib526.c lib530.c lib533.c lib536.c lib537.c lib539.c lib540.c lib541.c lib542.c lib543.c lib544.c lib547.c lib549.c lib552.c lib553.c lib554.c lib555.c lib556.c lib557.c lib558.c lib559.c lib560.c lib562.c lib564.c lib566.c lib567.c lib568.c lib569.c lib570.c lib571.c lib572.c lib573.c lib574.c lib575.c lib576.c lib578.c lib579.c lib582.c lib583.c lib586.c lib589.c lib590.c lib591.c lib597.c lib598.c lib599.c lib643.c lib650.c lib651.c lib652.c lib653.c lib654.c lib655.c lib658.c lib659.c lib661.c lib666.c lib667.c lib668.c lib670.c lib674.c lib676.c lib677.c lib678.c lib694.c lib695.c lib751.c lib753.c lib757.c lib758.c lib766.c memptr.c mk-lib1521.pl test1013.pl test1022.pl test307.pl test610.pl test613.pl testtrace.c testtrace.h testutil.c testutil.h unitcheck.h
server .checksrc .gitignore CMakeLists.txt Makefile.am Makefile.inc dnsd.c first.c first.h getpart.c mqttd.c resolve.c rtspd.c sockfilt.c socksd.c sws.c tftpd.c util.c
tunit .gitignore CMakeLists.txt Makefile.am Makefile.inc README.md tool1394.c tool1604.c tool1621.c tool1622.c tool1623.c tool1720.c
unit .gitignore CMakeLists.txt Makefile.am Makefile.inc README.md unit1300.c unit1302.c unit1303.c unit1304.c unit1305.c unit1307.c unit1309.c unit1323.c unit1330.c unit1395.c unit1396.c unit1397.c unit1398.c unit1399.c unit1600.c unit1601.c unit1602.c unit1603.c unit1605.c unit1606.c unit1607.c unit1608.c unit1609.c unit1610.c unit1611.c unit1612.c unit1614.c unit1615.c unit1616.c unit1620.c unit1625.c unit1626.c unit1627.c unit1636.c unit1650.c unit1651.c unit1652.c unit1653.c unit1654.c unit1655.c unit1656.c unit1657.c unit1658.c unit1660.c unit1661.c unit1663.c unit1664.c unit1666.c unit1667.c unit1668.c unit1669.c unit1674.c unit1675.c unit1676.c unit1979.c unit1980.c unit2600.c unit2601.c unit2602.c unit2603.c unit2604.c unit2605.c unit3200.c unit3205.c unit3211.c unit3212.c unit3213.c unit3214.c unit3216.c unit3219.c unit3300.c unit3301.c unit3302.c
.gitignore CMakeLists.txt Makefile.am allversions.pm appveyor.pm azure.pm config.in configurehelp.pm.in devtest.pl dictserver.py directories.pm ech_combos.py ech_tests.sh ftpserver.pl getpart.pm globalconfig.pm http-server.pl http2-server.pl http3-server.pl memanalyze.pl memanalyzer.pm negtelnetserver.py nghttpx.conf pathhelp.pm processhelp.pm requirements.txt rtspserver.pl runner.pm runtests.pl secureserver.pl serverhelp.pm servers.pm smbserver.py sshhelp.pm sshserver.pl test1119.pl test1135.pl test1139.pl test1140.pl test1165.pl test1167.pl test1173.pl test1175.pl test1177.pl test1222.pl test1275.pl test1276.pl test1477.pl test1486.pl test1488.pl test1544.pl test1707.pl test745.pl test971.pl testcurl.pl testutil.pm tftpserver.pl util.py valgrind.pm valgrind.supp
.clang-tidy.yml .dir-locals.el .editorconfig .git-blame-ignore-revs .gitattributes .gitignore .mailmap CHANGES.md CMakeLists.txt COPYING Dockerfile GIT-INFO.md Makefile.am README README.md RELEASE-NOTES REUSE.toml SECURITY.md acinclude.m4 appveyor.sh appveyor.yml configure.ac curl-config.in libcurl.pc.in renovate.json
examples .env config.ini crypto_test.lua env_test.lua fs_example.lua http_server.lua https_test.lua ini_example.lua json.lua log.lua path_fs_example.lua process_example.lua request_download.lua request_test.lua run_all.lua sqlite_example.lua sqlite_http_template.lua stash_test.lua template_test.lua timer.lua websocket.lua
iniparser
.github
ISSUE_TEMPLATE config.yml
workflows disable-pull-requests.yml trigger-gitlab-ci.yml
cmake JoinPaths.cmake config.cmake.in pc.in
example iniexample.c iniwrite.c parse.c twisted-errors.ini twisted-genhuge.py twisted-ofkey.ini twisted-ofval.ini twisted.ini
src dictionary.c dictionary.h iniparser.c iniparser.h
test
ressources
bad_ini ends_well.ini twisted-errors.ini twisted-ofkey.ini twisted-ofval.ini
good_ini empty.ini spaced.ini spaced2.ini twisted.ini
gruezi.ini old.ini quotes.ini utf8.ini
CMakeLists.txt test_dictionary.c test_iniparser.c unity-config.yml unity_config.h
.cmake-format.py .gitignore .gitlab-ci.yml .gitmessage .travis.yml AUTHORS CMakeLists.txt FAQ-en.md FAQ-zhcn.md INSTALL LICENSE README.md compile_commands.json
jinjac
example CMakeLists.txt example.c
jinjac_test_app CMakeLists.txt jinjac_test_app.c
libjinjac
include jinjac.h
src CMakeLists.txt ast.c ast.h block_statement.c block_statement.h buffer.c buffer.h buildin.c buildin.h common.h convert.c convert.h flex_decl.h jfunction.c jfunction.h jinja_expression.l jinja_expression.y jinjac_parse.c jinjac_parse.h jinjac_stream.c jinjac_stream.h jlist.c jlist.h jobject.c jobject.h parameter.c parameter.h str_obj.c str_obj.h trace.c trace.h
CMakeLists.txt
test .gitignore CMakeLists.txt autotest.rb test_01.expected test_01.jinja test_01b.expected test_01b.jinja test_01c.expected test_01c.jinja test_01d.expected test_01d.jinja test_02.expected test_02.jinja test_03.expected test_03.jinja test_04.expected test_04.jinja test_05.expected test_05.jinja test_06.expected test_06.jinja test_07.expected test_07.jinja test_08.expected test_08.jinja test_08b.expected test_08b.jinja test_09.expected test_09.jinja test_10.expected test_10.jinja test_11.expected test_11.jinja test_12.expected test_12.jinja test_13.expected test_13.jinja test_14.expected test_14.jinja test_15.expected test_15.jinja test_16.expected test_16.jinja test_17.expected test_17.jinja test_18.expected test_18.jinja test_18b.expected test_18b.jinja test_18c.expected test_18c.jinja test_19.expected test_19.jinja test_19b.expected test_19b.jinja test_19c.expected test_19c.jinja test_19d.expected test_19d.jinja test_19e.expected test_19e.jinja test_19f.expected test_19f.jinja test_20.expected test_20.jinja test_21.expected test_21.jinja test_22.expected test_22.jinja test_22a.expected test_22a.jinja test_22b.expected test_22b.jinja test_23.expected test_23.jinja test_24.expected test_24.jinja
.gitignore CMakeLists.txt LICENSE.txt README.md build_coverage.sh build_debug.sh build_release.sh cppcheck_analysis.sh
libev Changes LICENSE Makefile Makefile.am Makefile.in README Symbols.ev Symbols.event aclocal.m4 autogen.sh compile config.guess config.h config.h.in config.status config.sub configure configure.ac depcomp ev++.h ev.3 ev.c ev.h ev.pod ev_epoll.c ev_kqueue.c ev_poll.c ev_port.c ev_select.c ev_vars.h ev_win32.c ev_wrap.h event.c event.h install-sh libev.m4 libtool ltmain.sh missing mkinstalldirs stamp-h1
luajit
doc
img contact.png
bluequad-print.css bluequad.css contact.html ext_buffer.html ext_c_api.html ext_ffi.html ext_ffi_api.html ext_ffi_semantics.html ext_ffi_tutorial.html ext_jit.html ext_profiler.html extensions.html install.html luajit.html running.html
dynasm dasm_arm.h dasm_arm.lua dasm_arm64.h dasm_arm64.lua dasm_mips.h dasm_mips.lua dasm_mips64.lua dasm_ppc.h dasm_ppc.lua dasm_proto.h dasm_x64.lua dasm_x86.h dasm_x86.lua dynasm.lua
etc luajit.1 luajit.pc
src
host .gitignore README buildvm.c buildvm.h buildvm_asm.c buildvm_fold.c buildvm_lib.c buildvm_libbc.h buildvm_peobj.c genlibbc.lua genminilua.lua genversion.lua minilua.c
jit .gitignore bc.lua bcsave.lua dis_arm.lua dis_arm64.lua dis_arm64be.lua dis_mips.lua dis_mips64.lua dis_mips64el.lua dis_mips64r6.lua dis_mips64r6el.lua dis_mipsel.lua dis_ppc.lua dis_x64.lua dis_x86.lua dump.lua p.lua v.lua zone.lua
.gitignore Makefile Makefile.dep lauxlib.h lib_aux.c lib_base.c lib_bit.c lib_buffer.c lib_debug.c lib_ffi.c lib_init.c lib_io.c lib_jit.c lib_math.c lib_os.c lib_package.c lib_string.c lib_table.c lj_alloc.c lj_alloc.h lj_api.c lj_arch.h lj_asm.c lj_asm.h lj_asm_arm.h lj_asm_arm64.h lj_asm_mips.h lj_asm_ppc.h lj_asm_x86.h lj_assert.c lj_bc.c lj_bc.h lj_bcdump.h lj_bcread.c lj_bcwrite.c lj_buf.c lj_buf.h lj_carith.c lj_carith.h lj_ccall.c lj_ccall.h lj_ccallback.c lj_ccallback.h lj_cconv.c lj_cconv.h lj_cdata.c lj_cdata.h lj_char.c lj_char.h lj_clib.c lj_clib.h lj_cparse.c lj_cparse.h lj_crecord.c lj_crecord.h lj_ctype.c lj_ctype.h lj_debug.c lj_debug.h lj_def.h lj_dispatch.c lj_dispatch.h lj_emit_arm.h lj_emit_arm64.h lj_emit_mips.h lj_emit_ppc.h lj_emit_x86.h lj_err.c lj_err.h lj_errmsg.h lj_ff.h lj_ffrecord.c lj_ffrecord.h lj_frame.h lj_func.c lj_func.h lj_gc.c lj_gc.h lj_gdbjit.c lj_gdbjit.h lj_ir.c lj_ir.h lj_ircall.h lj_iropt.h lj_jit.h lj_lex.c lj_lex.h lj_lib.c lj_lib.h lj_load.c lj_mcode.c lj_mcode.h lj_meta.c lj_meta.h lj_obj.c lj_obj.h lj_opt_dce.c lj_opt_fold.c lj_opt_loop.c lj_opt_mem.c lj_opt_narrow.c lj_opt_sink.c lj_opt_split.c lj_parse.c lj_parse.h lj_prng.c lj_prng.h lj_profile.c lj_profile.h lj_record.c lj_record.h lj_serialize.c lj_serialize.h lj_snap.c lj_snap.h lj_state.c lj_state.h lj_str.c lj_str.h lj_strfmt.c lj_strfmt.h lj_strfmt_num.c lj_strscan.c lj_strscan.h lj_tab.c lj_tab.h lj_target.h lj_target_arm.h lj_target_arm64.h lj_target_mips.h lj_target_ppc.h lj_target_x86.h lj_trace.c lj_trace.h lj_traceerr.h lj_udata.c lj_udata.h lj_vm.h lj_vmevent.c lj_vmevent.h lj_vmmath.c ljamalg.c lua.h lua.hpp luaconf.h luajit.c luajit_rolling.h lualib.h msvcbuild.bat nxbuild.bat ps4build.bat ps5build.bat psvitabuild.bat vm_arm.dasc vm_arm64.dasc vm_mips.dasc vm_mips64.dasc vm_ppc.dasc vm_x64.dasc vm_x86.dasc xb1build.bat xedkbuild.bat
.gitattributes .gitignore .relver COPYRIGHT Makefile README
sqlite shell.c sqlite3.c sqlite3.h sqlite3ext.h
wolfssl
.github
ISSUE_TEMPLATE bug_report.yaml other.yaml
actions
install-apt-deps action.yml
scripts
zephyr-4.x external_libc.conf zephyr-test.sh
openssl-ech.sh tls-anvil-test.sh
workflows
disabled haproxy.yml hitch.yml hostap.yml
hostap-files
configs
07c9f183ea744ac04585fb6dd10220c75a5e2e74 hostapd.config tests wpa_supplicant.config
b607d2723e927a3446d89aed813f1aa6068186bb hostapd.config tests wpa_supplicant.config
hostap_2_10 extra.patch hostapd.config tests wpa_supplicant.config
Makefile README dbus-wpa_supplicant.conf
ada.yml arduino.yml async-examples.yml async.yml atecc608-sim.yml bind.yml cmake-autoconf.yml cmake.yml codespell.yml coverity-scan-fixes.yml cryptocb-only.yml curl.yml cyrus-sasl.yml disable-pk-algs.yml docker-Espressif.yml docker-OpenWrt.yml emnet-nonblock.yml fil-c.yml freertos-mem-track.yml gencertbuf.yml grpc.yml haproxy.yml hostap-vm.yml intelasm-c-fallback.yml ipmitool.yml jwt-cpp.yml krb5.yml libspdm.yml libssh2.yml libvncserver.yml linuxkm.yml macos-apple-native-cert-validation.yml mbedtls.sh mbedtls.yml membrowse-comment.yml membrowse-onboard.yml membrowse-report.yml memcached.sh memcached.yml mono.yml mosquitto.yml msmtp.yml msys2.yml multi-arch.yml multi-compiler.yml net-snmp.yml nginx.yml no-malloc.yml no-tls.yml nss.sh nss.yml ntp.yml ocsp.yml openldap.yml openssh.yml openssl-ech.yml opensslcoexist.yml openvpn.yml os-check.yml packaging.yml pam-ipmi.yml pq-all.yml pr-commit-check.yml psk.yml puf.yml python.yml rng-tools.yml rust-wrapper.yml se050-sim.yml smallStackSize.yml socat.yml softhsm.yml sssd.yml stm32-sim.yml stsafe-a120-sim.yml stunnel.yml symbol-prefixes.yml threadx.yml tls-anvil.yml trackmemory.yml watcomc.yml win-csharp-test.yml wolfCrypt-Wconversion.yml wolfboot-integration.yml wolfsm.yml xcode.yml zephyr-4.x.yml zephyr.yml
PULL_REQUEST_TEMPLATE.md SECURITY.md membrowse-targets.json
Docker
OpenWrt Dockerfile README.md runTests.sh
packaging
debian Dockerfile
fedora Dockerfile
wolfCLU Dockerfile README.md
yocto Dockerfile buildAndPush.sh
Dockerfile Dockerfile.cross-compiler README.md buildAndPush.sh include.am run.sh
IDE
ARDUINO
sketches
wolfssl_client README.md
wolfssl_server README.md
wolfssl_version README.md
README.md
Arduino_README_prepend.md README.md include.am keywords.txt library.properties.template wolfssl-arduino.cpp wolfssl-arduino.sh wolfssl.h
AURIX Cpu0_Main.c README.md include.am user_settings.h wolf_main.c
Android Android.bp README.md include.am user_settings.h
CRYPTOCELL README.md include.am main.c user_settings.h
CSBENCH include.am user_settings.h
ECLIPSE
DEOS
deos_wolfssl .options
README.md deos_malloc.c include.am tls_wolfssl.c tls_wolfssl.h user_settings.h
MICRIUM README.md client_wolfssl.c client_wolfssl.h include.am server_wolfssl.c server_wolfssl.h user_settings.h wolfsslRunTests.c
RTTHREAD README.md include.am user_settings.h wolfssl_test.c
SIFIVE README.md include.am
Espressif
ESP-IDF
examples
template
VisualGDB wolfssl_template_IDF_v5.1_ESP32.vgdbproj
components
wolfssl
include user_settings.h
CMakeLists.txt Kconfig README.md component.mk
main
include main.h
CMakeLists.txt Kconfig.projbuild component.mk main.c
CMakeLists.txt Makefile README.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp8266
wolfssl_benchmark
VisualGDB wolfssl_benchmark_IDF_v4.4_ESP32.sln wolfssl_benchmark_IDF_v4.4_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32.sln wolfssl_benchmark_IDF_v5_ESP32.vgdbproj wolfssl_benchmark_IDF_v5_ESP32C3.sln wolfssl_benchmark_IDF_v5_ESP32C3.vgdbproj wolfssl_benchmark_IDF_v5_ESP32S3.sln wolfssl_benchmark_IDF_v5_ESP32S3.vgdbproj
components
wolfssl
include user_settings.h
CMakeLists.txt Kconfig README.md component.mk
main
include main.h
CMakeLists.txt Kconfig.projbuild component.mk main.c
CMakeLists.txt Makefile README.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp8266
wolfssl_client
VisualGDB README.md wolfssl_client_IDF_v5_ESP32.sln wolfssl_client_IDF_v5_ESP32.vgdbproj
components
wolfssl
include user_settings.h
CMakeLists.txt Kconfig README.md component.mk
main
include client-tls.h main.h time_helper.h wifi_connect.h
CMakeLists.txt Kconfig.projbuild client-tls.c component.mk main.c time_helper.c wifi_connect.c
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_client_ESP8266.vgdbproj
wolfssl_server
VisualGDB README.md wolfssl_server_IDF_v5_ESP32.sln wolfssl_server_IDF_v5_ESP32.vgdbproj
components
wolfssl
include user_settings.h
CMakeLists.txt Kconfig README.md component.mk
main
include main.h server-tls.h time_helper.h wifi_connect.h
CMakeLists.txt Kconfig.projbuild component.mk main.c server-tls.c time_helper.c wifi_connect.c
CMakeLists.txt Makefile README.md README_server_sm.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32c2 sdkconfig.defaults.esp8266 wolfssl_server_ESP8266.vgdbproj
wolfssl_test
VisualGDB wolfssl_test-IDF_v5_ESP32.sln wolfssl_test-IDF_v5_ESP32.vgdbproj wolfssl_test-IDF_v5_ESP32C3.sln wolfssl_test-IDF_v5_ESP32C3.vgdbproj wolfssl_test-IDF_v5_ESP32C6.sln wolfssl_test-IDF_v5_ESP32C6.vgdbproj wolfssl_test_IDF_v5_ESP32S3.sln wolfssl_test_IDF_v5_ESP32S3.vgdbproj
components
wolfssl
include user_settings.h
CMakeLists.txt Kconfig README.md component.mk
main
include main.h
CMakeLists.txt Kconfig.projbuild component.mk main.c
CMakeLists.txt Makefile README.md partitions_singleapp_large.csv sdkconfig.defaults sdkconfig.defaults.esp32 sdkconfig.defaults.esp32c3 sdkconfig.defaults.esp32c6 sdkconfig.defaults.esp32h2 sdkconfig.defaults.esp32s2 sdkconfig.defaults.esp32s3 sdkconfig.defaults.esp8266 testAll.sh testMonitor.sh wolfssl_test_ESP8266.sln wolfssl_test_ESP8266.vgdbproj
wolfssl_test_idf
VisualGDB VisualGDB_wolfssl_test_idf.sln VisualGDB_wolfssl_test_idf.vgdbproj
main CMakeLists.txt Kconfig.projbuild component.mk main.c main_wip.c.ex time_helper.c time_helper.h
CMakeLists.txt Kconfig.projbuild README.md component.mk sdkconfig.defaults
README.md
libs CMakeLists.txt README.md component.mk tigard.cfg
test CMakeLists.txt README.md component.mk test_wolfssl.c
README.md README_32se.md UPDATE.md compileAllExamples.sh dummy_config_h dummy_test_paths.h setup.sh setup_win.bat user_settings.h
README.md include.am
GCC-ARM
Header user_settings.h
Source armtarget.c benchmark_main.c test_main.c tls_client.c tls_server.c wolf_main.c
Makefile Makefile.bench Makefile.client Makefile.common Makefile.server Makefile.static Makefile.test README.md include.am linker.ld linker_fips.ld
Gaisler-BCC README.md include.am
HEXAGON
DSP Makefile wolfssl_dsp.idl
Makefile README.md build.sh ecc-verify-benchmark.c ecc-verify.c include.am user_settings.h
HEXIWEAR
wolfSSL_HW .cwGeneratedFileSetLog user_settings.h
IAR-EWARM
Projects
benchmark benchmark-main.c current_time.c wolfCrypt-benchmark.ewd wolfCrypt-benchmark.ewp
common minimum-startup.c wolfssl.icf
lib wolfSSL-Lib.ewd wolfSSL-Lib.ewp
test test-main.c wolfCrypt-test.ewd wolfCrypt-test.ewp
user_settings.h wolfssl.eww
embOS
SAMV71_XULT
embOS_SAMV71_XULT_Linker_Script samv71q21_wolfssl.icf
embOS_SAMV71_XULT_user_settings user_settings.h user_settings_simple_example.h user_settings_verbose_example.h
embOS_wolfcrypt_benchmark_SAMV71_XULT
Application runBenchmarks.c
README_wolfcrypt_benchmark wolfcrypt_benchmark.ewd wolfcrypt_benchmark.ewp
embOS_wolfcrypt_lib_SAMV71_XULT README_wolfcrypt_lib wolfcrypt_lib.ewd wolfcrypt_lib.ewp
embOS_wolfcrypt_test_SAMV71_XULT
Application runWolfcryptTests.c
README_wolfcrypt_test wolfcrypt_test.ewd wolfcrypt_test.ewp
README_SAMV71
custom_port
custom_port_Linker_Script samv71q21_wolfssl.icf
custom_port_user_settings user_settings.h
wolfcrypt_benchmark_custom_port
Application runBenchmarks.c
wolfcrypt_test_custom_port
Application runWolfcryptTests.c
README_custom_port
extract_trial_here README_extract_trial_here
README
.gitignore README
IAR-MSP430 Makefile README.md include.am main.c user_settings.h
INTIME-RTOS Makefile README.md include.am libwolfssl.c libwolfssl.vcxproj user_settings.h wolfExamples.c wolfExamples.h wolfExamples.sln wolfExamples.vcxproj wolfssl-lib.sln wolfssl-lib.vcxproj
Infineon README.md include.am user_settings.h
KDS
config user_settings.h
include.am
LINUX-SGX README.md build.sh clean.sh include.am sgx_t_static.mk
LPCXPRESSO
lib_wolfssl lpc_18xx_port.c user_settings.h
wolf_example
src lpc_18xx_startup.c wolfssl_example.c
readme.txt
README.md
M68K
benchmark Makefile main.cpp
testwolfcrypt Makefile main.cpp
Makefile README.md include.am user_settings.h
MCUEXPRESSO
RT1170 fsl_caam_c.patch fsl_caam_h.patch user_settings.h
benchmark
source run_benchmark.c
wolfssl liblinks.xml
README.md include.am user_settings.h wolfcrypt_test.c
MDK-ARM
LPC43xx time-LCP43xx.c
MDK-ARM
wolfSSL Retarget.c cert_data.c cert_data.h config-BARE-METAL.h config-FS.h config-RTX-TCP-FS.h config-WOLFLIB.h main.c shell.c time-CortexM3-4.c time-dummy.c wolfssl_MDK_ARM.c wolfssl_MDK_ARM.h
STM32F2xx_StdPeriph_Lib time-STM32F2xx.c
MDK5-ARM
Conf user_settings.h
Inc wolfssl_MDK_ARM.h
Projects
CryptBenchmark Abstract.txt CryptBenchmark.sct CryptBenchmark.uvoptx CryptBenchmark.uvprojx main.c
CryptTest Abstract.txt CryptTest.sct CryptTest.uvoptx CryptTest.uvprojx main.c
EchoClient Abstract.txt EchoClient.uvoptx EchoClient.uvprojx main.c wolfssl-link.sct
EchoServer Abstract.txt EchoServer.uvoptx EchoServer.uvprojx main.c wolfssl-link.sct
SimpleClient Abstract.txt SimpleClient.uvoptx SimpleClient.uvprojx main.c wolfssl-link.sct
SimpleServer Abstract.txt SimpleServer.uvoptx SimpleServer.uvprojx main.c wolfssl-link.sct
wolfSSL-Full Abstract.txt main.c shell.c time-CortexM3-4.c wolfsslFull.uvoptx wolfsslFull.uvprojx
wolfSSL-Lib Abstract.txt wolfSSL-Lib.uvoptx wolfSSL-Lib.uvprojx
Src ssl-dummy.c
README.md include.am
MPLABX16
wolfcrypt_test.X
nbproject
private configurations.xml private.xml
configurations.xml include.am project.xml
Makefile
wolfssl.X
nbproject configurations.xml include.am project.xml
Makefile
README.md include.am main.c user_settings.h
MQX Makefile README-jp.md README.md client-tls.c include.am server-tls.c user_config.h user_settings.h
MSVS-2019-AZSPHERE
client client.c client.h
server server.c server.h
shared util.h
wolfssl_new_azsphere
HardwareDefinitions
avnet_mt3620_sk
inc
hw template_appliance.h
template_appliance.json
mt3620_rdb
inc
hw template_appliance.h
template_appliance.json
seeed_mt3620_mdb
inc
hw template_appliance.h
template_appliance.json
.gitignore CMakeLists.txt CMakeSettings.json app_manifest.json applibs_versions.h launch.vs.json main.c
README.md include.am user_settings.h
MYSQL CMakeLists_wolfCrypt.txt CMakeLists_wolfSSL.txt do.sh
NDS README.md
NETOS Makefile.wolfcrypt.inc README.md include.am user_settings.h user_settings.h-cert2425 user_settings.h-cert3389 wolfssl_netos_custom.c
OPENSTM32 README.md
PlatformIO
examples
wolfssl_benchmark
include README main.h
lib README
src CMakeLists.txt main.c
test README
CMakeLists.txt README.md platformio.ini sdkconfig.defaults wolfssl_benchmark.code-workspace
wolfssl_test
include README main.h
lib README
src CMakeLists.txt main.c
test README
CMakeLists.txt README.md platformio.ini sdkconfig.defaults wolfssl_test.code-workspace
README.md wolfssl_platformio.code-workspace
README.md include.am
QNX
CAAM-DRIVER Makefile
example-client Makefile client-tls.c
example-cmac Makefile cmac-test.c
example-server Makefile server-tls.c
testwolfcrypt Makefile
wolfssl Makefile user_settings.h
README.md include.am
RISCV
SIFIVE-HIFIVE1 Makefile README.md include.am main.c user_settings.h
SIFIVE-UNLEASHED README.md include.am
include.am
ROWLEY-CROSSWORKS-ARM Kinetis_FlashPlacement.xml README.md arm_startup.c benchmark_main.c hw.h include.am kinetis_hw.c retarget.c test_main.c user_settings.h wolfssl.hzp wolfssl_ltc.hzp
Renesas
cs+
Projects
common strings.h unistd.h user_settings.h wolfssl_dummy.c
t4_demo README_en.txt README_jp.txt t4_demo.mtpj wolf_client.c wolf_demo.h wolf_main.c wolf_server.c
test test.mtpj test_main.c
wolfssl_lib wolfssl_lib.mtpj
README include.am
e2studio
DK-S7G2
benchmark-template
src app_entry.c
example_server-template
src app_entry.c
wolfcrypttest-template
src app_entry.c
wolfssl-template-project configuration.xml
README.md include.am user_settings.h
Projects
common strings.h unistd.h user_settings.h wolfssl_dummy.c
test
src key_data.c key_data.h test_main.c wolf_client.c wolf_server.c wolfssl_demo.h
tools generate_rsa_keypair.sh genhexbuf.pl rsa_pss_sign.sh
wolfssl
src .gitkeep
wolfcrypt
src .gitkeep
README include.am
RA6M3
benchmark-wolfcrypt
common .gitkeep
script .gitkeep
src wolfssl_thread_entry.c
client-wolfssl
common
src .gitkeep
script .gitkeep
src wolfssl_thread_entry.c
wolfssl_thread_entry.h
common
ra6m3g README.md
src freertos_tcp_port.c
user_settings.h util.h
server-wolfssl
common
src .gitkeep
script .gitkeep
src wolfssl_thread_entry.c
wolfssl_thread_entry.h
test-wolfcrypt
common .gitkeep
script .gitkeep
src wolfssl_thread_entry.c
wolfssl
src .gitkeep
wolfcrypt .gitkeep
README.md README_APRA6M_en.md README_APRA6M_jp.md include.am
RA6M3G README.md
RA6M4
common user_settings.h wolfssl_demo.h
test
key_data key_data.h key_data_sce.c
src
SEGGER_RTT myprint.c
common .gitignore
test_main.c wolf_client.c wolfssl_sce_unit_test.c
test_RA6M4Debug.launch
tools
example_keys generate_SignedCA.sh rsa_private.pem rsa_public.pem
README.md
README.md include.am
RX65N
GR-ROSE
common strings.h unistd.h user_settings.h wolfssl_dummy.c
smc smc.scfg
test
src key_data.c key_data.h test_main.c wolf_client.c wolf_server.c wolfssl_demo.h
test.rcpc test_HardwareDebug.launch
tools
example_keys generate_SignedCA.sh rsa_private.pem rsa_public.pem
README.md
wolfssl wolfssl.rcpc
README_EN.md README_JP.md include.am
RSK
resource section.esi
wolfssl wolfssl.rcpc
wolfssl_demo key_data.c key_data.h user_settings.h wolfssl_demo.c wolfssl_demo.h
InstructionManualForExample_RSK+RX65N-2MB_EN.pdf InstructionManualForExample_RSK+RX65N-2MB_JP.pdf README_EN.md README_JP.md include.am
RX72N
EnvisionKit
Simple
common sectioninfo.esi wolfssl_dummy.c
test
src
client simple_tcp_client.c simple_tls_tsip_client.c
server simple_tcp_server.c simple_tls_server.c
test_main.c wolfssl_simple_demo.h
test.rcpc test.scfg test_HardwareDebug.launch
wolfssl wolfssl.rcpc
README_EN.md README_JP.md
resource section.esi
tools
example_keys generate_SignedCA.sh rsa_private.pem rsa_public.pem
README.md
wolfssl wolfssl.rcpc
wolfssl_demo key_data.c key_data.h user_settings.h wolfssl_demo.c wolfssl_demo.h wolfssl_tsip_unit_test.c
InstructionManualForExample_RX72N_EnvisonKit_EN.pdf InstructionManualForExample_RX72N_EnvisonKit_JP.pdf README_EN.md README_JP.md include.am
RZN2L
common user_settings.h wolfssl_demo.h
test
src
serial_io app_print.c
test wolf_client.c wolf_server.c wolfssl_rsip_unit_test.c
wolfCrypt .gitignore
wolfSSL .gitignore
local_system_init.c rzn2l_tst_thread_entry.c wolfssl_dummy.c
README.md include.am
SK-S7G2
common user_settings.h
wolfssl_lib configuration.xml
.gitignore README.md include.am
STARCORE README.txt include.am starcore_test.c user_settings.h
STM32Cube README.md STM32_Benchmarks.md default_conf.ftl include.am main.c wolfssl_example.c wolfssl_example.h
SimplicityStudio README.md include.am test_wolf.c user_settings.h
TRUESTUDIO
wolfssl user_settings.h
README include.am
VS-ARM README.md include.am user_settings.h wolfssl.sln wolfssl.vcxproj
VS-AZURE-SPHERE
client app_manifest.json client.c client.h client.vcxproj
server app_manifest.json server.c server.h server.vcxproj
shared util.h
wolfcrypt_test app_manifest.json wolfcrypt_test.vcxproj
README.md include.am user_settings.h wolfssl.sln wolfssl.vcxproj
VisualDSP include.am user_settings.h wolf_tasks.c
WICED-STUDIO README include.am user_settings.h
WIN README.txt include.am test.vcxproj user_settings.h user_settings_dtls.h wolfssl-fips.sln wolfssl-fips.vcxproj
WIN-SGX ReadMe.txt include.am wolfSSL_SGX.edl wolfSSL_SGX.sln wolfSSL_SGX.vcxproj
WIN-SRTP-KDF-140-3 README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxproj
WIN10 README.txt include.am resource.h test.vcxproj user_settings.h wolfssl-fips.rc wolfssl-fips.sln wolfssl-fips.vcxproj
WINCE README.md include.am user_settings.h user_settings.h.140-2-deprecated
WORKBENCH README.md include.am
XCODE
Benchmark
wolfBench
Assets.xcassets
AppIcon.appiconset Contents.json
Base.lproj LaunchScreen.storyboard Main.storyboard
AppDelegate.h AppDelegate.m Info.plist ViewController.h ViewController.m main.m
wolfBench.xcodeproj project.pbxproj
include.am
wolfssl-FIPS.xcodeproj project.pbxproj
wolfssl.xcodeproj project.pbxproj
wolfssl_testsuite.xcodeproj project.pbxproj
README.md build-for-i386.sh include.am user_settings.h
XCODE-FIPSv2
macOS-C++
Intel user_settings.h
M1 user_settings.h
include.am user_settings.h
XCODE-FIPSv5 README include.am user_settings.h
XCODE-FIPSv6 README include.am user_settings.h
XilinxSDK
2018_2 lscript.ld
2019_2
wolfCrypt_example
src lscript.ld
wolfCrypt_example_system wolfCrypt_example_system.sprj
2022_1
wolfCrypt_FreeRTOS_example wolfCrypt_FreeRTOS_example.prj
wolfCrypt_FreeRTOS_example_system wolfCrypt_FreeRTOS_example_system.sprj
wolfCrypt_example wolfCrypt_example.prj
wolfCrypt_example_system wolfCrypt_example_system.sprj
.gitignore
README.md bench.sh combine.sh eclipse_formatter_profile.xml graph.sh include.am user_settings.h wolfssl_example.c
apple-universal
wolfssl-multiplatform
wolfssl-multiplatform
Assets.xcassets
AccentColor.colorset Contents.json
AppIcon.appiconset Contents.json
Contents.json
ContentView.swift simple_client_example.c simple_client_example.h wolfssl-multiplatform-Bridging-Header.h wolfssl_multiplatform.entitlements wolfssl_multiplatformApp.swift wolfssl_test_driver.c wolfssl_test_driver.h
wolfssl-multiplatform.xcodeproj project.pbxproj
.gitignore README.md build-wolfssl-framework.sh include.am
iotsafe Makefile README.md ca-cert.c devices.c devices.h include.am main.c memory-tls.c startup.c target.ld user_settings.h
iotsafe-raspberrypi Makefile README.md client-tls13.c include.am main.c
mynewt README.md apps.wolfcrypttest.pkg.yml crypto.wolfssl.pkg.yml crypto.wolfssl.syscfg.yml include.am setup.sh
zephyr README.md include.am
include.am
RTOS
nuttx
wolfssl .gitignore Kconfig Make.defs Makefile README.md setup-wolfssl.sh user_settings.h
include.am
bsdkm Makefile README.md bsdkm_wc_port.h include.am wolfkmod.c wolfkmod_aes.c x86_vecreg.c
certs
1024 ca-cert.der ca-cert.pem ca-key.der ca-key.pem client-cert.der client-cert.pem client-key.der client-key.pem client-keyPub.der dh1024.der dh1024.pem dsa-pub-1024.pem dsa1024.der dsa1024.pem include.am rsa1024.der server-cert.der server-cert.pem server-key.der server-key.pem
3072 client-cert.der client-cert.pem client-key.der client-key.pem client-keyPub.der include.am
4096 client-cert.der client-cert.pem client-key.der client-key.pem client-keyPub.der include.am
acert
rsa_pss acert.pem acert_ietf.pem acert_ietf_pubkey.pem acert_pubkey.pem
acert.pem acert_ietf.pem acert_ietf_pubkey.pem acert_pubkey.pem include.am
aia ca-issuers-cert.pem multi-aia-cert.pem overflow-aia-cert.pem
crl
extra-crls ca-int-cert-revoked.pem claim-root.pem crl_critical_entry.pem crlnum_57oct.pem crlnum_64oct.pem general-server-crl.pem large_crlnum.pem large_crlnum2.pem
hash_der 0fdb2da4.r0
hash_pem 0fdb2da4.r0
bad_time_fmt.pem ca-int-ecc.pem ca-int.pem ca-int2-ecc.pem ca-int2.pem caEcc384Crl.pem caEccCrl.der caEccCrl.pem cliCrl.pem client-int-ecc.pem client-int.pem crl.der crl.pem crl.revoked crl2.der crl2.pem crl_reason.pem crl_rsapss.pem eccCliCRL.pem eccSrvCRL.pem gencrls.sh include.am server-goodaltCrl.pem server-goodaltwildCrl.pem server-goodcnCrl.pem server-goodcnwildCrl.pem server-int-ecc.pem server-int.pem wolfssl.cnf
dilithium bench_dilithium_level2_key.der bench_dilithium_level3_key.der bench_dilithium_level5_key.der include.am
ecc bp256r1-key.der bp256r1-key.pem ca-secp256k1-cert.pem ca-secp256k1-key.pem client-bp256r1-cert.der client-bp256r1-cert.pem client-secp256k1-cert.der client-secp256k1-cert.pem genecc.sh include.am secp256k1-key.der secp256k1-key.pem secp256k1-param.pem secp256k1-privkey.der secp256k1-privkey.pem server-bp256r1-cert.der server-bp256r1-cert.pem server-secp256k1-cert.der server-secp256k1-cert.pem server2-secp256k1-cert.der server2-secp256k1-cert.pem wolfssl.cnf wolfssl_384.cnf
ed25519 ca-ed25519-key.der ca-ed25519-key.pem ca-ed25519-priv.der ca-ed25519-priv.pem ca-ed25519.der ca-ed25519.pem client-ed25519-key.der client-ed25519-key.pem client-ed25519-priv.der client-ed25519-priv.pem client-ed25519.der client-ed25519.pem eddsa-ed25519.der eddsa-ed25519.pem gen-ed25519-certs.sh gen-ed25519-keys.sh gen-ed25519.sh include.am root-ed25519-key.der root-ed25519-key.pem root-ed25519-priv.der root-ed25519-priv.pem root-ed25519.der root-ed25519.pem server-ed25519-cert.pem server-ed25519-key.der server-ed25519-key.pem server-ed25519-priv.der server-ed25519-priv.pem server-ed25519.der server-ed25519.pem
ed448 ca-ed448-key.der ca-ed448-key.pem ca-ed448-priv.der ca-ed448-priv.pem ca-ed448.der ca-ed448.pem client-ed448-key.der client-ed448-key.pem client-ed448-priv.der client-ed448-priv.pem client-ed448.der client-ed448.pem gen-ed448-certs.sh gen-ed448-keys.sh include.am root-ed448-key.der root-ed448-key.pem root-ed448-priv.der root-ed448-priv.pem root-ed448.der root-ed448.pem server-ed448-cert.pem server-ed448-key.der server-ed448-key.pem server-ed448-priv.der server-ed448-priv.pem server-ed448.der server-ed448.pem
external DigiCertGlobalRootCA.pem README.txt ca-digicert-ev.pem ca-globalsign-root.pem ca-google-root.pem ca_collection.pem include.am
falcon bench_falcon_level1_key.der bench_falcon_level5_key.der include.am
intermediate
ca_false_intermediate gentestcert.sh int_ca.key server.key test_ca.key test_ca.pem test_int_not_cacert.pem test_sign_bynoca_srv.pem wolfssl_base.conf wolfssl_srv.conf
ca-ecc-bad-aki.der ca-ecc-bad-aki.pem ca-int-cert.der ca-int-cert.pem ca-int-ecc-cert.der ca-int-ecc-cert.pem ca-int-ecc-key.der ca-int-ecc-key.pem ca-int-key.der ca-int-key.pem ca-int2-cert.der ca-int2-cert.pem ca-int2-ecc-cert.der ca-int2-ecc-cert.pem ca-int2-ecc-key.der ca-int2-ecc-key.pem ca-int2-key.der ca-int2-key.pem client-chain-alt-ecc.pem client-chain-alt.pem client-chain-ecc.der client-chain-ecc.pem client-chain.der client-chain.pem client-int-cert.der client-int-cert.pem client-int-ecc-cert.der client-int-ecc-cert.pem genintcerts.sh include.am server-chain-alt-ecc.pem server-chain-alt.pem server-chain-ecc.der server-chain-ecc.pem server-chain-short.pem server-chain.der server-chain.pem server-int-cert.der server-int-cert.pem server-int-ecc-cert.der server-int-ecc-cert.pem
lms bc_hss_L2_H5_W8_root.der bc_hss_L3_H5_W4_root.der bc_lms_chain_ca.der bc_lms_chain_leaf.der bc_lms_native_bc_root.der bc_lms_sha256_h10_w8_root.der bc_lms_sha256_h5_w4_root.der include.am
mldsa README.txt include.am mldsa44-cert.der mldsa44-cert.pem mldsa44-key.pem mldsa44_bare-priv.der mldsa44_bare-seed.der mldsa44_oqskeypair.der mldsa44_priv-only.der mldsa44_pub-spki.der mldsa44_seed-only.der mldsa44_seed-priv.der mldsa65-cert.der mldsa65-cert.pem mldsa65-key.pem mldsa65_bare-priv.der mldsa65_bare-seed.der mldsa65_oqskeypair.der mldsa65_priv-only.der mldsa65_pub-spki.der mldsa65_seed-only.der mldsa65_seed-priv.der mldsa87-cert.der mldsa87-cert.pem mldsa87-key.pem mldsa87_bare-priv.der mldsa87_bare-seed.der mldsa87_oqskeypair.der mldsa87_priv-only.der mldsa87_pub-spki.der mldsa87_seed-only.der mldsa87_seed-priv.der
ocsp imposter-root-ca-cert.der imposter-root-ca-cert.pem imposter-root-ca-key.der imposter-root-ca-key.pem include.am index-ca-and-intermediate-cas.txt index-ca-and-intermediate-cas.txt.attr index-intermediate1-ca-issued-certs.txt index-intermediate1-ca-issued-certs.txt.attr index-intermediate2-ca-issued-certs.txt index-intermediate2-ca-issued-certs.txt.attr index-intermediate3-ca-issued-certs.txt index-intermediate3-ca-issued-certs.txt.attr intermediate1-ca-cert.der intermediate1-ca-cert.pem intermediate1-ca-key.der intermediate1-ca-key.pem intermediate2-ca-cert.der intermediate2-ca-cert.pem intermediate2-ca-key.der intermediate2-ca-key.pem intermediate3-ca-cert.der intermediate3-ca-cert.pem intermediate3-ca-key.der intermediate3-ca-key.pem ocsp-responder-cert.der ocsp-responder-cert.pem ocsp-responder-key.der ocsp-responder-key.pem openssl.cnf renewcerts-for-test.sh renewcerts.sh root-ca-cert.der root-ca-cert.pem root-ca-crl.pem root-ca-key.der root-ca-key.pem server1-cert.der server1-cert.pem server1-chain-noroot.pem server1-key.der server1-key.pem server2-cert.der server2-cert.pem server2-key.der server2-key.pem server3-cert.der server3-cert.pem server3-key.der server3-key.pem server4-cert.der server4-cert.pem server4-key.der server4-key.pem server5-cert.der server5-cert.pem server5-key.der server5-key.pem test-leaf-response.der test-multi-response.der test-response-nointern.der test-response-rsapss.der test-response.der
p521 ca-p521-key.der ca-p521-key.pem ca-p521-priv.der ca-p521-priv.pem ca-p521.der ca-p521.pem client-p521-key.der client-p521-key.pem client-p521-priv.der client-p521-priv.pem client-p521.der client-p521.pem gen-p521-certs.sh gen-p521-keys.sh include.am root-p521-key.der root-p521-key.pem root-p521-priv.der root-p521-priv.pem root-p521.der root-p521.pem server-p521-cert.pem server-p521-key.der server-p521-key.pem server-p521-priv.der server-p521-priv.pem server-p521.der server-p521.pem
renewcerts wolfssl.cnf
rpk client-cert-rpk.der client-ecc-cert-rpk.der include.am server-cert-rpk.der server-ecc-cert-rpk.der
rsapss ca-3072-rsapss-key.der ca-3072-rsapss-key.pem ca-3072-rsapss-priv.der ca-3072-rsapss-priv.pem ca-3072-rsapss.der ca-3072-rsapss.pem ca-rsapss-key.der ca-rsapss-key.pem ca-rsapss-priv.der ca-rsapss-priv.pem ca-rsapss.der ca-rsapss.pem client-3072-rsapss-key.der client-3072-rsapss-key.pem client-3072-rsapss-priv.der client-3072-rsapss-priv.pem client-3072-rsapss.der client-3072-rsapss.pem client-rsapss-key.der client-rsapss-key.pem client-rsapss-priv.der client-rsapss-priv.pem client-rsapss.der client-rsapss.pem gen-rsapss-keys.sh include.am renew-rsapss-certs.sh root-3072-rsapss-key.der root-3072-rsapss-key.pem root-3072-rsapss-priv.der root-3072-rsapss-priv.pem root-3072-rsapss.der root-3072-rsapss.pem root-rsapss-key.der root-rsapss-key.pem root-rsapss-priv.der root-rsapss-priv.pem root-rsapss.der root-rsapss.pem server-3072-rsapss-cert.pem server-3072-rsapss-key.der server-3072-rsapss-key.pem server-3072-rsapss-priv.der server-3072-rsapss-priv.pem server-3072-rsapss.der server-3072-rsapss.pem server-mix-rsapss-cert.pem server-rsapss-cert.pem server-rsapss-key.der server-rsapss-key.pem server-rsapss-priv.der server-rsapss-priv.pem server-rsapss.der server-rsapss.pem
sia timestamping-sia-cert.pem
slhdsa bench_slhdsa_sha2_128f_key.der bench_slhdsa_sha2_128s_key.der bench_slhdsa_sha2_192f_key.der bench_slhdsa_sha2_192s_key.der bench_slhdsa_sha2_256f_key.der bench_slhdsa_sha2_256s_key.der bench_slhdsa_shake128f_key.der bench_slhdsa_shake128s_key.der bench_slhdsa_shake192f_key.der bench_slhdsa_shake192s_key.der bench_slhdsa_shake256f_key.der bench_slhdsa_shake256s_key.der client-mldsa44-priv.pem client-mldsa44-sha2.der client-mldsa44-sha2.pem client-mldsa44-shake.der client-mldsa44-shake.pem gen-slhdsa-mldsa-certs.sh include.am root-slhdsa-sha2-128s-priv.der root-slhdsa-sha2-128s-priv.pem root-slhdsa-sha2-128s.der root-slhdsa-sha2-128s.pem root-slhdsa-shake-128s-priv.der root-slhdsa-shake-128s-priv.pem root-slhdsa-shake-128s.der root-slhdsa-shake-128s.pem server-mldsa44-priv.pem server-mldsa44-sha2.der server-mldsa44-sha2.pem server-mldsa44-shake.der server-mldsa44-shake.pem
sm2 ca-sm2-key.der ca-sm2-key.pem ca-sm2-priv.der ca-sm2-priv.pem ca-sm2.der ca-sm2.pem client-sm2-key.der client-sm2-key.pem client-sm2-priv.der client-sm2-priv.pem client-sm2.der client-sm2.pem fix_sm2_spki.py gen-sm2-certs.sh gen-sm2-keys.sh include.am root-sm2-key.der root-sm2-key.pem root-sm2-priv.der root-sm2-priv.pem root-sm2.der root-sm2.pem self-sm2-cert.pem self-sm2-key.pem self-sm2-priv.pem server-sm2-cert.der server-sm2-cert.pem server-sm2-key.der server-sm2-key.pem server-sm2-priv.der server-sm2-priv.pem server-sm2.der server-sm2.pem
statickeys dh-ffdhe2048-params.pem dh-ffdhe2048-pub.der dh-ffdhe2048-pub.pem dh-ffdhe2048.der dh-ffdhe2048.pem ecc-secp256r1.der ecc-secp256r1.pem gen-static.sh include.am x25519-pub.der x25519-pub.pem x25519.der x25519.pem
test
expired expired-ca.der expired-ca.pem expired-cert.der expired-cert.pem
catalog.txt cert-bad-neg-int.der cert-bad-oid.der cert-bad-utf8.der cert-ext-ia.cfg cert-ext-ia.der cert-ext-ia.pem cert-ext-joi.cfg cert-ext-joi.der cert-ext-joi.pem cert-ext-mnc.der cert-ext-multiple.cfg cert-ext-multiple.der cert-ext-multiple.pem cert-ext-nc-combined.der cert-ext-nc-combined.pem cert-ext-nc.cfg cert-ext-nc.der cert-ext-nc.pem cert-ext-ncdns.der cert-ext-ncdns.pem cert-ext-ncip.der cert-ext-ncip.pem cert-ext-ncmixed.der cert-ext-ncmulti.der cert-ext-ncmulti.pem cert-ext-ncrid.der cert-ext-ncrid.pem cert-ext-nct.cfg cert-ext-nct.der cert-ext-nct.pem cert-ext-ndir-exc.cfg cert-ext-ndir-exc.der cert-ext-ndir-exc.pem cert-ext-ndir.cfg cert-ext-ndir.der cert-ext-ndir.pem cert-ext-ns.der cert-over-max-altnames.cfg cert-over-max-altnames.der cert-over-max-altnames.pem cert-over-max-nc.cfg cert-over-max-nc.der cert-over-max-nc.pem client-ecc-cert-ski.hex cn-ip-literal.der cn-ip-wildcard.der crit-cert.pem crit-key.pem dh1024.der dh1024.pem dh512.der dh512.pem digsigku.pem encrypteddata.msg gen-badsig.sh gen-ext-certs.sh gen-testcerts.sh include.am kari-keyid-cms.msg ktri-keyid-cms.msg ossl-trusted-cert.pem server-badaltname.der server-badaltname.pem server-badaltnull.der server-badaltnull.pem server-badcn.der server-badcn.pem server-badcnnull.der server-badcnnull.pem server-cert-ecc-badsig.der server-cert-ecc-badsig.pem server-cert-rsa-badsig.der server-cert-rsa-badsig.pem server-duplicate-policy.pem server-garbage.der server-garbage.pem server-goodalt.der server-goodalt.pem server-goodaltwild.der server-goodaltwild.pem server-goodcn.der server-goodcn.pem server-goodcnwild.der server-goodcnwild.pem server-localhost.der server-localhost.pem smime-test-canon.p7s smime-test-multipart-badsig.p7s smime-test-multipart.p7s smime-test.p7s
test-pathlen assemble-chains.sh chainA-ICA1-key.pem chainA-ICA1-pathlen0.pem chainA-assembled.pem chainA-entity-key.pem chainA-entity.pem chainB-ICA1-key.pem chainB-ICA1-pathlen0.pem chainB-ICA2-key.pem chainB-ICA2-pathlen1.pem chainB-assembled.pem chainB-entity-key.pem chainB-entity.pem chainC-ICA1-key.pem chainC-ICA1-pathlen1.pem chainC-assembled.pem chainC-entity-key.pem chainC-entity.pem chainD-ICA1-key.pem chainD-ICA1-pathlen127.pem chainD-assembled.pem chainD-entity-key.pem chainD-entity.pem chainE-ICA1-key.pem chainE-ICA1-pathlen128.pem chainE-assembled.pem chainE-entity-key.pem chainE-entity.pem chainF-ICA1-key.pem chainF-ICA1-pathlen1.pem chainF-ICA2-key.pem chainF-ICA2-pathlen0.pem chainF-assembled.pem chainF-entity-key.pem chainF-entity.pem chainG-ICA1-key.pem chainG-ICA1-pathlen0.pem chainG-ICA2-key.pem chainG-ICA2-pathlen1.pem chainG-ICA3-key.pem chainG-ICA3-pathlen99.pem chainG-ICA4-key.pem chainG-ICA4-pathlen5.pem chainG-ICA5-key.pem chainG-ICA5-pathlen20.pem chainG-ICA6-key.pem chainG-ICA6-pathlen10.pem chainG-ICA7-key.pem chainG-ICA7-pathlen100.pem chainG-assembled.pem chainG-entity-key.pem chainG-entity.pem chainH-ICA1-key.pem chainH-ICA1-pathlen0.pem chainH-ICA2-key.pem chainH-ICA2-pathlen2.pem chainH-ICA3-key.pem chainH-ICA3-pathlen2.pem chainH-ICA4-key.pem chainH-ICA4-pathlen2.pem chainH-assembled.pem chainH-entity-key.pem chainH-entity.pem chainI-ICA1-key.pem chainI-ICA1-no_pathlen.pem chainI-ICA2-key.pem chainI-ICA2-no_pathlen.pem chainI-ICA3-key.pem chainI-ICA3-pathlen2.pem chainI-assembled.pem chainI-entity-key.pem chainI-entity.pem chainJ-ICA1-key.pem chainJ-ICA1-no_pathlen.pem chainJ-ICA2-key.pem chainJ-ICA2-no_pathlen.pem chainJ-ICA3-key.pem chainJ-ICA3-no_pathlen.pem chainJ-ICA4-key.pem chainJ-ICA4-pathlen2.pem chainJ-assembled.pem chainJ-entity-key.pem chainJ-entity.pem include.am refreshkeys.sh
test-serial0 ee_normal.pem ee_serial0.pem generate_certs.sh include.am intermediate_serial0.pem root_serial0.pem root_serial0_key.pem selfsigned_nonca_serial0.pem
xmss bc_xmss_chain_ca.der bc_xmss_chain_leaf.der bc_xmss_sha2_10_256_root.der bc_xmss_sha2_16_256_root.der bc_xmssmt_sha2_20_2_256_root.der bc_xmssmt_sha2_20_4_256_root.der bc_xmssmt_sha2_40_8_256_root.der include.am
ca-cert-chain.der ca-cert.der ca-cert.pem ca-ecc-cert.der ca-ecc-cert.pem ca-ecc-key.der ca-ecc-key.pem ca-ecc384-cert.der ca-ecc384-cert.pem ca-ecc384-key.der ca-ecc384-key.pem ca-key-pkcs8-attribute.der ca-key.der ca-key.pem check_dates.sh client-absolute-urn.pem client-ca-cert.der client-ca-cert.pem client-ca.pem client-cert-ext.der client-cert-ext.pem client-cert.der client-cert.pem client-crl-dist.der client-crl-dist.pem client-ecc-ca-cert.der client-ecc-ca-cert.pem client-ecc-cert.der client-ecc-cert.pem client-ecc384-cert.der client-ecc384-cert.pem client-ecc384-key.der client-ecc384-key.pem client-key.der client-key.pem client-keyEnc.pem client-keyPub.der client-keyPub.pem client-relative-uri.pem client-uri-cert.pem csr.attr.der csr.dsa.der csr.dsa.pem csr.ext.der csr.signed.der dh-priv-2048.der dh-priv-2048.pem dh-pub-2048.der dh-pub-2048.pem dh-pubkey-2048.der dh2048.der dh2048.pem dh3072.der dh3072.pem dh4096.der dh4096.pem dsa-pubkey-2048.der dsa2048.der dsa2048.pem dsa3072.der dsaparams.der dsaparams.pem ecc-client-key.der ecc-client-key.pem ecc-client-keyPub.der ecc-client-keyPub.pem ecc-key-comp.pem ecc-keyPkcs8.der ecc-keyPkcs8.pem ecc-keyPkcs8Enc.der ecc-keyPkcs8Enc.pem ecc-keyPub.der ecc-keyPub.pem ecc-params.der ecc-params.pem ecc-privOnlyCert.pem ecc-privOnlyKey.pem ecc-privkey.der ecc-privkey.pem ecc-privkeyPkcs8.der ecc-privkeyPkcs8.pem ecc-rsa-server.p12 empty-issuer-cert.pem entity-no-ca-bool-cert.pem entity-no-ca-bool-key.pem fpki-cert.der fpki-certpol-cert.der gen_revoked.sh include.am renewcerts.sh rid-cert.der rsa-pub-2048.pem rsa2048.der rsa3072.der server-cert-chain.der server-cert.der server-cert.pem server-ecc-comp.der server-ecc-comp.pem server-ecc-rsa.der server-ecc-rsa.pem server-ecc-self.der server-ecc-self.pem server-ecc.der server-ecc.pem server-ecc384-cert.der server-ecc384-cert.pem server-ecc384-key.der server-ecc384-key.pem server-key.der server-key.pem server-keyEnc.pem server-keyPkcs8.der server-keyPkcs8.pem server-keyPkcs8Enc.der server-keyPkcs8Enc.pem server-keyPkcs8Enc12.pem server-keyPkcs8Enc2.pem server-keyPub.der server-keyPub.pem server-revoked-cert.pem server-revoked-key.pem taoCert.txt test-ber-exp02-05-2022.p7b test-degenerate.p7b test-multiple-recipients.p7b test-servercert-rc2.p12 test-servercert.p12 test-stream-dec.p7b test-stream-sign.p7b wolfssl-website-ca.pem x942dh2048.der x942dh2048.pem
cmake
consumer CMakeLists.txt README.md main.c
modules FindARIA.cmake FindOQS.cmake
Config.cmake.in README.md config.in functions.cmake include.am options.h.in wolfssl-config-version.cmake.in wolfssl-targets.cmake.in
debian
source format
changelog.in control.in copyright include.am libwolfssl-dev.install libwolfssl.install rules.in
doc
dox_comments
header_files aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h puf.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wc_she.h wc_slhdsa.h wolfio.h
header_files-ja aes.h arc4.h ascon.h asn.h asn_public.h blake2.h bn.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cryptocb.h curve25519.h curve448.h des3.h dh.h doxygen_groups.h doxygen_pages.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h evp.h hash.h hmac.h iotsafe.h kdf.h logging.h md2.h md4.h md5.h memory.h ocsp.h pem.h pkcs11.h pkcs7.h poly1305.h psa.h pwdbased.h quic.h random.h ripemd.h rsa.h sakke.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h srp.h ssl.h tfm.h types.h wc_encrypt.h wc_port.h wolfio.h
formats
html
html_changes
search search.css search.js
customdoxygen.css doxygen.css menu.js menudata.js tabs.css
Doxyfile footer.html header.html mainpage.dox
pdf Doxyfile header.tex
images wolfssl_logo.png
QUIC.md README.txt README_DOXYGEN check_api.sh generate_documentation.sh include.am
examples
asn1 asn1.c dumpasn1.cfg gen_oid_names.rb include.am oid_names.h
async Makefile README.md async_client.c async_server.c async_tls.c async_tls.h include.am user_settings.h
benchmark include.am tls_bench.c tls_bench.h
client client.c client.h client.sln client.vcproj client.vcxproj include.am
configs README.md include.am user_settings_EBSnet.h user_settings_all.h user_settings_arduino.h user_settings_baremetal.h user_settings_ca.h user_settings_curve25519nonblock.h user_settings_dtls13.h user_settings_eccnonblock.h user_settings_espressif.h user_settings_fipsv2.h user_settings_fipsv5.h user_settings_min_ecc.h user_settings_openssl_compat.h user_settings_pkcs7.h user_settings_platformio.h user_settings_pq.h user_settings_rsa_only.h user_settings_stm32.h user_settings_template.h user_settings_tls12.h user_settings_tls13.h user_settings_wolfboot_keytools.h user_settings_wolfssh.h user_settings_wolftpm.h
crypto_policies
default wolfssl.txt
future wolfssl.txt
legacy wolfssl.txt
echoclient echoclient.c echoclient.h echoclient.sln echoclient.vcproj echoclient.vcxproj include.am quit
echoserver echoserver.c echoserver.h echoserver.sln echoserver.vcproj echoserver.vcxproj include.am
ocsp_responder include.am ocsp_responder.c ocsp_responder.h
pem include.am pem.c
sctp include.am sctp-client-dtls.c sctp-client.c sctp-server-dtls.c sctp-server.c
server include.am server.c server.h server.sln server.vcproj server.vcxproj
README.md include.am
linuxkm
patches
5.10.17 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-5v10v17.patch
5.10.236 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-5v10v236.patch
5.14.0-570.58.1.el9_6 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-5v14-570v58v1-el9_6.patch
5.15 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-5v15.patch
5.17 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-5v17.patch
5.17-ubuntu-jammy-tegra WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-5v17-ubuntu-jammy-tegra.patch
6.1.73 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-6v1v73.patch
6.12 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-6v12.patch
6.15 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-6v15.patch
7.0 WOLFSSL_LINUXKM_HAVE_GET_RANDOM_CALLBACKS-7v0.patch
regen-patches.sh
Kbuild Makefile README.md get_thread_size.c include.am linuxkm-fips-hash-wrapper.sh linuxkm-fips-hash.c linuxkm_memory.c linuxkm_memory.h linuxkm_wc_port.h lkcapi_aes_glue.c lkcapi_dh_glue.c lkcapi_ecdh_glue.c lkcapi_ecdsa_glue.c lkcapi_glue.c lkcapi_rsa_glue.c lkcapi_sha_glue.c module_exports.c.template module_hooks.c pie_redirect_table.c wolfcrypt.lds x86_vector_register_glue.c
m4 ax_add_am_macro.m4 ax_am_jobserver.m4 ax_am_macros.m4 ax_append_compile_flags.m4 ax_append_flag.m4 ax_append_link_flags.m4 ax_append_to_file.m4 ax_atomic.m4 ax_bsdkm.m4 ax_check_compile_flag.m4 ax_check_link_flag.m4 ax_compiler_version.m4 ax_count_cpus.m4 ax_create_generic_config.m4 ax_debug.m4 ax_file_escapes.m4 ax_harden_compiler_flags.m4 ax_linuxkm.m4 ax_print_to_file.m4 ax_pthread.m4 ax_require_defined.m4 ax_tls.m4 ax_vcs_checkout.m4 hexversion.m4 lib_socket_nsl.m4 visibility.m4
mcapi
wolfcrypt_mcapi.X
nbproject configurations.xml include.am project.xml
Makefile
wolfcrypt_test.X
nbproject configurations.xml include.am project.xml
Makefile
wolfssl.X
nbproject configurations.xml include.am project.xml
Makefile
zlib.X
nbproject configurations.xml include.am project.xml
Makefile
PIC32MZ-serial.h README crypto.c crypto.h include.am mcapi_test.c user_settings.h
mplabx
wolfcrypt_benchmark.X
nbproject configurations.xml include.am project.xml
Makefile
wolfcrypt_test.X
nbproject configurations.xml include.am project.xml
Makefile
wolfssl.X
nbproject configurations.xml include.am project.xml
Makefile
PIC32MZ-serial.h README benchmark_main.c include.am test_main.c user_settings.h
mqx
util_lib
Sources include.am util.c util.h
wolfcrypt_benchmark
Debugger K70FN1M0.mem init_kinetis.tcl mass_erase_kinetis.tcl
Sources include.am main.c main.h
ReferencedRSESystems.xml wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_benchmark_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launch
wolfcrypt_test
Debugger K70FN1M0.mem init_kinetis.tcl mass_erase_kinetis.tcl
Sources include.am main.c main.h
ReferencedRSESystems.xml wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfcrypt_test_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launch
wolfssl include.am
wolfssl_client
Debugger K70FN1M0.mem init_kinetis.tcl mass_erase_kinetis.tcl
Sources include.am main.c main.h
ReferencedRSESystems.xml wolfssl_client_twrk70f120m_Int_Flash_DDRData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_DDRData_Release_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.jlink wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_JTrace.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Debug_PnE_U-MultiLink.launch wolfssl_client_twrk70f120m_Int_Flash_SramData_Release_PnE_U-MultiLink.launch
README
rpm include.am spec.in
scripts
bench bench_functions.sh
aria-cmake-build-test.sh asn1_oid_sum.pl benchmark.test benchmark_compare.sh cleanup_testfiles.sh crl-gen-openssl.test crl-revoked.test dertoc.pl dtls.test dtlscid.test external.test google.test include.am makedistsmall.sh memtest.sh ocsp-responder-openssl-interop.test ocsp-stapling-with-ca-as-responder.test ocsp-stapling-with-wolfssl-responder.test ocsp-stapling.test ocsp-stapling2.test ocsp-stapling_tls13multi.test ocsp.test openssl.test openssl_srtp.test pem.test ping.test pkcallbacks.test psk.test resume.test rsapss.test sniffer-gen.sh sniffer-ipv6.pcap sniffer-static-rsa.pcap sniffer-testsuite.test sniffer-tls12-keylog.out sniffer-tls12-keylog.pcap sniffer-tls12-keylog.sslkeylog sniffer-tls13-dh-resume.pcap sniffer-tls13-dh.pcap sniffer-tls13-ecc-resume.pcap sniffer-tls13-ecc.pcap sniffer-tls13-hrr.pcap sniffer-tls13-keylog.out sniffer-tls13-keylog.pcap sniffer-tls13-keylog.sslkeylog sniffer-tls13-x25519-resume.pcap sniffer-tls13-x25519.pcap stm32l4-v4_0_1_build.sh tls13.test trusted_peer.test unit.test.in user_settings_asm.sh
src bio.c conf.c crl.c dtls.c dtls13.c include.am internal.c keys.c ocsp.c pk.c pk_ec.c pk_rsa.c quic.c sniffer.c ssl.c ssl_api_cert.c ssl_api_crl_ocsp.c ssl_api_pk.c ssl_asn1.c ssl_bn.c ssl_certman.c ssl_crypto.c ssl_ech.c ssl_load.c ssl_misc.c ssl_p7p12.c ssl_sess.c ssl_sk.c tls.c tls13.c wolfio.c x509.c x509_str.c
sslSniffer
sslSnifferTest README_WIN.md include.am snifftest.c sslSniffTest.vcproj sslSniffTest.vcxproj
README.md sslSniffer.vcproj sslSniffer.vcxproj
support gen-debug-trace-error-codes.sh include.am wolfssl.pc.in
tests
api api.h api_decl.h create_ocsp_test_blobs.py include.am test_aes.c test_aes.h test_arc4.c test_arc4.h test_ascon.c test_ascon.h test_ascon_kats.h test_asn.c test_asn.h test_blake2.c test_blake2.h test_camellia.c test_camellia.h test_certman.c test_certman.h test_chacha.c test_chacha.h test_chacha20_poly1305.c test_chacha20_poly1305.h test_cmac.c test_cmac.h test_curve25519.c test_curve25519.h test_curve448.c test_curve448.h test_des3.c test_des3.h test_dh.c test_dh.h test_digest.h test_dsa.c test_dsa.h test_dtls.c test_dtls.h test_ecc.c test_ecc.h test_ed25519.c test_ed25519.h test_ed448.c test_ed448.h test_evp.c test_evp.h test_evp_cipher.c test_evp_cipher.h test_evp_digest.c test_evp_digest.h test_evp_pkey.c test_evp_pkey.h test_hash.c test_hash.h test_hmac.c test_hmac.h test_md2.c test_md2.h test_md4.c test_md4.h test_md5.c test_md5.h test_mldsa.c test_mldsa.h test_mlkem.c test_mlkem.h test_ocsp.c test_ocsp.h test_ocsp_test_blobs.h test_ossl_asn1.c test_ossl_asn1.h test_ossl_bio.c test_ossl_bio.h test_ossl_bn.c test_ossl_bn.h test_ossl_cipher.c test_ossl_cipher.h test_ossl_dgst.c test_ossl_dgst.h test_ossl_dh.c test_ossl_dh.h test_ossl_dsa.c test_ossl_dsa.h test_ossl_ec.c test_ossl_ec.h test_ossl_ecx.c test_ossl_ecx.h test_ossl_mac.c test_ossl_mac.h test_ossl_obj.c test_ossl_obj.h test_ossl_p7p12.c test_ossl_p7p12.h test_ossl_pem.c test_ossl_pem.h test_ossl_rand.c test_ossl_rand.h test_ossl_rsa.c test_ossl_rsa.h test_ossl_sk.c test_ossl_sk.h test_ossl_x509.c test_ossl_x509.h test_ossl_x509_acert.c test_ossl_x509_acert.h test_ossl_x509_crypto.c test_ossl_x509_crypto.h test_ossl_x509_ext.c test_ossl_x509_ext.h test_ossl_x509_info.c test_ossl_x509_info.h test_ossl_x509_io.c test_ossl_x509_io.h test_ossl_x509_lu.c test_ossl_x509_lu.h test_ossl_x509_name.c test_ossl_x509_name.h test_ossl_x509_pk.c test_ossl_x509_pk.h test_ossl_x509_str.c test_ossl_x509_str.h test_ossl_x509_vp.c test_ossl_x509_vp.h test_pkcs12.c test_pkcs12.h test_pkcs7.c test_pkcs7.h test_poly1305.c test_poly1305.h test_random.c test_random.h test_rc2.c test_rc2.h test_ripemd.c test_ripemd.h test_rsa.c test_rsa.h test_sha.c test_sha.h test_sha256.c test_sha256.h test_sha3.c test_sha3.h test_sha512.c test_sha512.h test_she.c test_she.h test_signature.c test_signature.h test_slhdsa.c test_slhdsa.h test_sm2.c test_sm2.h test_sm3.c test_sm3.h test_sm4.c test_sm4.h test_tls.c test_tls.h test_tls13.c test_tls13.h test_tls_ext.c test_tls_ext.h test_wc_encrypt.c test_wc_encrypt.h test_wolfmath.c test_wolfmath.h test_x509.c test_x509.h
emnet
IP IP.h
Makefile emnet_nonblock_test.c emnet_shim.c
freertos-mem-track-repro FreeRTOS.h repro.c run.sh semphr.h task.h user_settings.h
swdev .gitignore Makefile README.md swdev.c swdev.h swdev_loader.c swdev_loader.h user_settings.h
CONF_FILES_README.md NCONF_test.cnf README TXT_DB.txt api.c include.am quic.c srp.c suites.c test-altchains.conf test-chains.conf test-dhprime.conf test-dtls-downgrade.conf test-dtls-fails-cipher.conf test-dtls-fails.conf test-dtls-group.conf test-dtls-mtu.conf test-dtls-reneg-client.conf test-dtls-reneg-server.conf test-dtls-resume.conf test-dtls-sha2.conf test-dtls-srtp-fails.conf test-dtls-srtp.conf test-dtls.conf test-dtls13-cid.conf test-dtls13-downgrade-fails.conf test-dtls13-downgrade.conf test-dtls13-pq-hybrid-extra-frag.conf test-dtls13-pq-hybrid-extra.conf test-dtls13-pq-hybrid-frag.conf test-dtls13-pq-standalone-frag.conf test-dtls13-pq-standalone.conf test-dtls13-psk.conf test-dtls13.conf test-ecc-cust-curves.conf test-ed25519.conf test-ed448.conf test-enckeys.conf test-fails.conf test-maxfrag-dtls.conf test-maxfrag.conf test-p521.conf test-psk-no-id-sha2.conf test-psk-no-id.conf test-psk.conf test-rsapss.conf test-sctp-sha2.conf test-sctp.conf test-sha2.conf test-sig.conf test-sm2.conf test-tls-downgrade.conf test-tls13-down.conf test-tls13-ecc.conf test-tls13-pq-hybrid-extra.conf test-tls13-pq-hybrid.conf test-tls13-pq-standalone.conf test-tls13-psk-certs.conf test-tls13-psk.conf test-tls13-slhdsa-fail.conf test-tls13-slhdsa-sha2.conf test-tls13-slhdsa-shake.conf test-tls13.conf test-trustpeer.conf test.conf unit.c unit.h utils.c utils.h w64wrapper.c
testsuite include.am testsuite.c testsuite.sln testsuite.vcproj testsuite.vcxproj utils.c utils.h
tirtos
packages
ti
net
wolfssl
tests
EK_TM4C1294XL
wolfcrypt
benchmark TM4C1294NC.icf benchmark.cfg main.c package.bld.hide package.xdc
test TM4C1294NC.icf main.c package.bld.hide package.xdc test.cfg
package.bld package.xdc package.xs
.gitignore README include.am products.mak wolfssl.bld wolfssl.mak
wolfcrypt
benchmark README.md benchmark-VS2022.sln benchmark-VS2022.vcxproj benchmark-VS2022.vcxproj.user benchmark.c benchmark.h benchmark.sln benchmark.vcproj benchmark.vcxproj include.am
src
port
Espressif
esp_crt_bundle README.md cacrt_all.pem cacrt_deprecated.pem cacrt_local.pem esp_crt_bundle.c gen_crt_bundle.py pio_install_cryptography.py
README.md esp32_aes.c esp32_mp.c esp32_sha.c esp32_util.c esp_sdk_mem_lib.c esp_sdk_time_lib.c esp_sdk_wifi_lib.c
Renesas README.md renesas_common.c renesas_fspsm_aes.c renesas_fspsm_rsa.c renesas_fspsm_sha.c renesas_fspsm_util.c renesas_rx64_hw_sha.c renesas_rx64_hw_util.c renesas_tsip_aes.c renesas_tsip_rsa.c renesas_tsip_sha.c renesas_tsip_util.c
af_alg afalg_aes.c afalg_hash.c wc_afalg.c
aria aria-crypt.c aria-cryptocb.c
arm armv8-32-aes-asm.S armv8-32-aes-asm_c.c armv8-32-chacha-asm.S armv8-32-chacha-asm_c.c armv8-32-curve25519.S armv8-32-curve25519_c.c armv8-32-mlkem-asm.S armv8-32-mlkem-asm_c.c armv8-32-poly1305-asm.S armv8-32-poly1305-asm_c.c armv8-32-sha256-asm.S armv8-32-sha256-asm_c.c armv8-32-sha3-asm.S armv8-32-sha3-asm_c.c armv8-32-sha512-asm.S armv8-32-sha512-asm_c.c armv8-aes-asm.S armv8-aes-asm_c.c armv8-aes.c armv8-chacha-asm.S armv8-chacha-asm_c.c armv8-curve25519.S armv8-curve25519_c.c armv8-mlkem-asm.S armv8-mlkem-asm_c.c armv8-poly1305-asm.S armv8-poly1305-asm_c.c armv8-sha256-asm.S armv8-sha256-asm_c.c armv8-sha256.c armv8-sha3-asm.S armv8-sha3-asm_c.c armv8-sha512-asm.S armv8-sha512-asm_c.c armv8-sha512.c cryptoCell.c cryptoCellHash.c thumb2-aes-asm.S thumb2-aes-asm_c.c thumb2-chacha-asm.S thumb2-chacha-asm_c.c thumb2-curve25519.S thumb2-curve25519_c.c thumb2-mlkem-asm.S thumb2-mlkem-asm_c.c thumb2-poly1305-asm.S thumb2-poly1305-asm_c.c thumb2-sha256-asm.S thumb2-sha256-asm_c.c thumb2-sha3-asm.S thumb2-sha3-asm_c.c thumb2-sha512-asm.S thumb2-sha512-asm_c.c
atmel README.md atmel.c
autosar README.md cryif.c crypto.c csm.c include.am test.c
caam README.md caam_aes.c caam_doc.pdf caam_driver.c caam_error.c caam_integrity.c caam_qnx.c caam_sha.c wolfcaam_aes.c wolfcaam_cmac.c wolfcaam_ecdsa.c wolfcaam_fsl_nxp.c wolfcaam_hash.c wolfcaam_hmac.c wolfcaam_init.c wolfcaam_qnx.c wolfcaam_rsa.c wolfcaam_seco.c wolfcaam_x25519.c
cavium README.md README_Octeon.md cavium_nitrox.c cavium_octeon_sync.c
cuda README.md aes-cuda.cu
cypress README.md psoc6_crypto.c
devcrypto README.md devcrypto_aes.c devcrypto_ecdsa.c devcrypto_hash.c devcrypto_hmac.c devcrypto_rsa.c devcrypto_x25519.c wc_devcrypto.c
intel README.md quickassist.c quickassist_mem.c quickassist_sync.c
iotsafe iotsafe.c
kcapi README.md kcapi_aes.c kcapi_dh.c kcapi_ecc.c kcapi_hash.c kcapi_hmac.c kcapi_rsa.c
liboqs liboqs.c
maxim README.md max3266x.c maxq10xx.c
mynewt mynewt_port.c
nxp README.md README_SE050.md casper_port.c dcp_port.c hashcrypt_port.c ksdk_port.c se050_port.c
pic32 pic32mz-crypt.c
ppc32 ppc32-sha256-asm.S ppc32-sha256-asm_c.c ppc32-sha256-asm_cr.c
psa README.md psa.c psa_aes.c psa_hash.c psa_pkcbs.c
riscv riscv-64-aes.c riscv-64-chacha.c riscv-64-poly1305.c riscv-64-sha256.c riscv-64-sha3.c riscv-64-sha512.c
rpi_pico README.md pico.c
silabs README.md silabs_aes.c silabs_ecc.c silabs_hash.c silabs_random.c
st README.md STM32MP13.md STM32MP25.md stm32.c stsafe.c
ti ti-aes.c ti-ccm.c ti-des3.c ti-hash.c
tropicsquare README.md tropic01.c
xilinx xil-aesgcm.c xil-sha3.c xil-versal-glue.c xil-versal-trng.c
nrf51.c
ASN_TEMPLATE.md aes.c aes_asm.S aes_asm.asm aes_gcm_asm.S aes_gcm_asm.asm aes_gcm_x86_asm.S aes_xts_asm.S aes_xts_asm.asm arc4.c ascon.c asm.c asn.c asn_orig.c async.c blake2b.c blake2s.c camellia.c chacha.c chacha20_poly1305.c chacha_asm.S chacha_asm.asm cmac.c coding.c compress.c cpuid.c cryptocb.c curve25519.c curve448.c des3.c dh.c dilithium.c dsa.c ecc.c ecc_fp.c eccsi.c ed25519.c ed448.c error.c evp.c evp_pk.c falcon.c fe_448.c fe_low_mem.c fe_operations.c fe_x25519_128.h fe_x25519_asm.S fp_mont_small.i fp_mul_comba_12.i fp_mul_comba_17.i fp_mul_comba_20.i fp_mul_comba_24.i fp_mul_comba_28.i fp_mul_comba_3.i fp_mul_comba_32.i fp_mul_comba_4.i fp_mul_comba_48.i fp_mul_comba_6.i fp_mul_comba_64.i fp_mul_comba_7.i fp_mul_comba_8.i fp_mul_comba_9.i fp_mul_comba_small_set.i fp_sqr_comba_12.i fp_sqr_comba_17.i fp_sqr_comba_20.i fp_sqr_comba_24.i fp_sqr_comba_28.i fp_sqr_comba_3.i fp_sqr_comba_32.i fp_sqr_comba_4.i fp_sqr_comba_48.i fp_sqr_comba_6.i fp_sqr_comba_64.i fp_sqr_comba_7.i fp_sqr_comba_8.i fp_sqr_comba_9.i fp_sqr_comba_small_set.i ge_448.c ge_low_mem.c ge_operations.c hash.c hmac.c hpke.c include.am integer.c kdf.c logging.c md2.c md4.c md5.c memory.c misc.c pkcs12.c pkcs7.c poly1305.c poly1305_asm.S poly1305_asm.asm puf.c pwdbased.c random.c rc2.c ripemd.c rng_bank.c rsa.c sakke.c sha.c sha256.c sha256_asm.S sha3.c sha3_asm.S sha512.c sha512_asm.S signature.c siphash.c sm2.c sm3.c sm3_asm.S sm4.c sp_arm32.c sp_arm64.c sp_armthumb.c sp_c32.c sp_c64.c sp_cortexm.c sp_dsp32.c sp_int.c sp_sm2_arm32.c sp_sm2_arm64.c sp_sm2_armthumb.c sp_sm2_c32.c sp_sm2_c64.c sp_sm2_cortexm.c sp_sm2_x86_64.c sp_sm2_x86_64_asm.S sp_x86_64.c sp_x86_64_asm.S sp_x86_64_asm.asm srp.c tfm.c wc_dsp.c wc_encrypt.c wc_lms.c wc_lms_impl.c wc_mldsa_asm.S wc_mlkem.c wc_mlkem_asm.S wc_mlkem_poly.c wc_pkcs11.c wc_port.c wc_she.c wc_slhdsa.c wc_xmss.c wc_xmss_impl.c wolfentropy.c wolfevent.c wolfmath.c
test README.md include.am test-VS2022.sln test-VS2022.vcxproj test-VS2022.vcxproj.user test.c test.h test.sln test.vcproj test_paths.h.in
wolfssl
openssl aes.h asn1.h asn1t.h bio.h bn.h buffer.h camellia.h cmac.h cms.h compat_types.h conf.h crypto.h des.h dh.h dsa.h ec.h ec25519.h ec448.h ecdh.h ecdsa.h ed25519.h ed448.h engine.h err.h evp.h fips_rand.h hmac.h include.am kdf.h lhash.h md4.h md5.h modes.h obj_mac.h objects.h ocsp.h opensslconf.h opensslv.h ossl_typ.h pem.h pkcs12.h pkcs7.h rand.h rc4.h ripemd.h rsa.h safestack.h sha.h sha3.h srp.h ssl.h ssl23.h stack.h tls1.h txt_db.h ui.h x509.h x509_vfy.h x509v3.h
wolfcrypt
port
Espressif esp-sdk-lib.h esp32-crypt.h esp_crt_bundle.h
Renesas renesas-fspsm-crypt.h renesas-fspsm-types.h renesas-rx64-hw-crypt.h renesas-tsip-crypt.h renesas_cmn.h renesas_fspsm_internal.h renesas_sync.h renesas_tsip_internal.h renesas_tsip_types.h
af_alg afalg_hash.h wc_afalg.h
aria aria-crypt.h aria-cryptocb.h
arm cryptoCell.h
atmel atmel.h
autosar CryIf.h Crypto.h Csm.h StandardTypes.h
caam caam_driver.h caam_error.h caam_qnx.h wolfcaam.h wolfcaam_aes.h wolfcaam_cmac.h wolfcaam_ecdsa.h wolfcaam_fsl_nxp.h wolfcaam_hash.h wolfcaam_qnx.h wolfcaam_rsa.h wolfcaam_seco.h wolfcaam_sha.h wolfcaam_x25519.h
cavium cavium_nitrox.h cavium_octeon_sync.h
cypress psoc6_crypto.h
devcrypto wc_devcrypto.h
intel quickassist.h quickassist_mem.h quickassist_sync.h
iotsafe iotsafe.h
kcapi kcapi_dh.h kcapi_ecc.h kcapi_hash.h kcapi_hmac.h kcapi_rsa.h wc_kcapi.h
liboqs liboqs.h
maxim max3266x-cryptocb.h max3266x.h maxq10xx.h
nxp casper_port.h dcp_port.h hashcrypt_port.h ksdk_port.h se050_port.h
pic32 pic32mz-crypt.h
psa psa.h
riscv riscv-64-asm.h
rpi_pico pico.h
silabs silabs_aes.h silabs_ecc.h silabs_hash.h silabs_random.h
st stm32.h stsafe.h
ti ti-ccm.h ti-hash.h
tropicsquare tropic01.h
xilinx xil-sha3.h xil-versal-glue.h xil-versal-trng.h
nrf51.h
aes.h arc4.h ascon.h asn.h asn_public.h async.h blake2-impl.h blake2-int.h blake2.h camellia.h chacha.h chacha20_poly1305.h cmac.h coding.h compress.h cpuid.h cryptocb.h curve25519.h curve448.h des3.h dh.h dilithium.h dsa.h ecc.h eccsi.h ed25519.h ed448.h error-crypt.h falcon.h fe_448.h fe_operations.h fips_test.h ge_448.h ge_operations.h hash.h hmac.h hpke.h include.am integer.h kdf.h libwolfssl_sources.h libwolfssl_sources_asm.h logging.h md2.h md4.h md5.h mem_track.h memory.h misc.h mpi_class.h mpi_superclass.h oid_sum.h pkcs11.h pkcs12.h pkcs7.h poly1305.h puf.h pwdbased.h random.h rc2.h ripemd.h rng_bank.h rsa.h sakke.h selftest.h settings.h sha.h sha256.h sha3.h sha512.h signature.h siphash.h sm2.h sm3.h sm4.h sp.h sp_int.h srp.h tfm.h types.h visibility.h wc_encrypt.h wc_lms.h wc_mlkem.h wc_pkcs11.h wc_port.h wc_she.h wc_slhdsa.h wc_xmss.h wolfentropy.h wolfevent.h wolfmath.h
callbacks.h certs_test.h certs_test_sm.h crl.h error-ssl.h include.am internal.h ocsp.h options.h.in quic.h sniffer.h sniffer_error.h sniffer_error.rc ssl.h test.h version.h version.h.in wolfio.h
wrapper
Ada
examples
src aes_verify_main.adb rsa_verify_main.adb sha256_main.adb spark_sockets.adb spark_sockets.ads spark_terminal.adb spark_terminal.ads tls_client.adb tls_client.ads tls_client_main.adb tls_server.adb tls_server.ads tls_server_main.adb
.gitignore alire.toml examples.gpr
tests
src
support test_support.adb test_support.ads tests_root_suite.adb tests_root_suite.ads
aes_bindings_tests.adb aes_bindings_tests.ads rsa_verify_bindings_tests.adb rsa_verify_bindings_tests.ads sha256_bindings_tests.adb sha256_bindings_tests.ads tests.adb
.gitignore README.md alire.toml tests.gpr valgrind.supp
.gitignore README.md ada_binding.c alire.toml default.gpr include.am restricted.adc user_settings.h wolfssl-full_runtime.adb wolfssl-full_runtime.ads wolfssl.adb wolfssl.ads wolfssl.gpr
CSharp
wolfCrypt-Test
Properties AssemblyInfo.cs
App.config wolfCrypt-Test.cs wolfCrypt-Test.csproj
wolfSSL-DTLS-PSK-Server
Properties AssemblyInfo.cs
App.config wolfSSL-DTLS-PSK-Server.cs wolfSSL-DTLS-PSK-Server.csproj
wolfSSL-DTLS-Server
Properties AssemblyInfo.cs
App.config wolfSSL-DTLS-Server.cs wolfSSL-DTLS-Server.csproj
wolfSSL-Example-IOCallbacks
Properties AssemblyInfo.cs
App.config wolfSSL-Example-IOCallbacks.cs wolfSSL-Example-IOCallbacks.csproj
wolfSSL-TLS-Client
Properties AssemblyInfo.cs
App.config wolfSSL-TLS-Client.cs wolfSSL-TLS-Client.csproj
wolfSSL-TLS-PSK-Client
Properties AssemblyInfo.cs
App.config wolfSSL-TLS-PSK-Client.cs wolfSSL-TLS-PSK-Client.csproj
wolfSSL-TLS-PSK-Server
Properties AssemblyInfo.cs
App.config wolfSSL-TLS-PSK-Server.cs wolfSSL-TLS-PSK-Server.csproj
wolfSSL-TLS-Server
Properties AssemblyInfo.cs
App.config wolfSSL-TLS-Server.cs wolfSSL-TLS-Server.csproj
wolfSSL-TLS-ServerThreaded
Properties AssemblyInfo.cs
App.config wolfSSL-TLS-ServerThreaded.cs wolfSSL-TLS-ServerThreaded.csproj
wolfSSL_CSharp
Properties AssemblyInfo.cs Resources.Designer.cs Resources.resx
X509.cs wolfCrypt.cs wolfSSL.cs wolfSSL_CSharp.csproj
README.md include.am user_settings.h wolfSSL_CSharp.sln wolfssl.vcxproj
python README.md
rust
wolfssl-wolfcrypt
src aes.rs blake2.rs chacha20_poly1305.rs cmac.rs cmac_mac.rs curve25519.rs dh.rs dilithium.rs ecc.rs ecdsa.rs ed25519.rs ed448.rs fips.rs hkdf.rs hmac.rs hmac_mac.rs kdf.rs lib.rs lms.rs mlkem.rs mlkem_kem.rs pbkdf2_password_hash.rs prf.rs random.rs rsa.rs rsa_pkcs1v15.rs sha.rs sha_digest.rs sys.rs
tests
common mod.rs
test_aes.rs test_blake2.rs test_chacha20_poly1305.rs test_cmac.rs test_cmac_mac.rs test_curve25519.rs test_dh.rs test_dilithium.rs test_ecc.rs test_ecdsa.rs test_ed25519.rs test_ed448.rs test_hkdf.rs test_hmac.rs test_hmac_mac.rs test_kdf.rs test_lms.rs test_mlkem.rs test_mlkem_kem.rs test_pbkdf2_password_hash.rs test_prf.rs test_random.rs test_rsa.rs test_rsa_pkcs1v15.rs test_sha.rs test_sha_digest.rs test_wolfcrypt.rs
CHANGELOG.md Cargo.lock Cargo.toml Makefile README.md build.rs headers.h
Makefile README.md include.am
include.am
zephyr
samples
wolfssl_benchmark
boards native_sim.conf nrf5340dk_nrf5340_cpuapp.conf nrf5340dk_nrf5340_cpuapp_ns.conf
CMakeLists.txt README install_test.sh prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
wolfssl_test
boards native_sim.conf nrf5340dk_nrf5340_cpuapp.conf nrf5340dk_nrf5340_cpuapp_ns.conf
CMakeLists.txt README install_test.sh prj-no-malloc.conf prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
wolfssl_tls_sock
boards native_sim.conf
src tls_sock.c
CMakeLists.txt README install_sample.sh prj-no-malloc.conf prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
wolfssl_tls_thread
boards native_sim.conf nrf5340dk_nrf5340_cpuapp.conf nrf5340dk_nrf5340_cpuapp_ns.conf
src tls_threaded.c
CMakeLists.txt README install_sample.sh prj.conf sample.yaml zephyr_legacy.conf zephyr_v4.1.conf
wolfssl options.h
CMakeLists.txt Kconfig Kconfig.tls-generic README.md include.am module.yml user_settings-no-malloc.h user_settings.h zephyr_init.c
.codespellexcludelines .cyignore .editorconfig .gitignore .wolfssl_known_macro_extras AUTHORS CMakeLists.txt CMakePresets.json CMakeSettings.json COPYING ChangeLog.md INSTALL LICENSING LPCExpresso.cproject LPCExpresso.project Makefile.am README README-async.md README.md SCRIPTS-LIST SECURITY-POLICY.md SECURITY-REPORT-TEMPLATE.md Vagrantfile autogen.sh commit-tests.sh configure.ac fips-check.sh fips-hash.sh gencertbuf.pl input pull_to_vagrant.sh quit resource.h stamp-h.in valgrind-bash.supp valgrind-error.sh wnr-example.conf wolfssl-VS2022.vcxproj wolfssl.rc wolfssl.vcproj wolfssl.vcxproj wolfssl64.sln
.clangd .gitignore DOCS.md Makefile README.md assert.c core.c crypto.c env.c fs.c http.c ini.c json.c log.c luna.h main.c makext.mk path.c process.c request.c sqlite.c stash.c template.c util.c
wolfssl/tests/api/test_slhdsa.c raw
   1/* test_slhdsa.c
   2 *
   3 * Copyright (C) 2006-2026 wolfSSL Inc.
   4 *
   5 * This file is part of wolfSSL.
   6 *
   7 * wolfSSL is free software; you can redistribute it and/or modify
   8 * it under the terms of the GNU General Public License as published by
   9 * the Free Software Foundation; either version 3 of the License, or
  10 * (at your option) any later version.
  11 *
  12 * wolfSSL is distributed in the hope that it will be useful,
  13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
  14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
  15 * GNU General Public License for more details.
  16 *
  17 * You should have received a copy of the GNU General Public License
  18 * along with this program; if not, write to the Free Software
  19 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1335, USA
  20 */
  21
  22#include <tests/unit.h>
  23
  24#ifdef NO_INLINE
  25    #include <wolfssl/wolfcrypt/misc.h>
  26#else
  27    #define WOLFSSL_MISC_INCLUDED
  28    #include <wolfcrypt/src/misc.c>
  29#endif
  30
  31#ifdef WOLFSSL_HAVE_SLHDSA
  32    #include <wolfssl/wolfcrypt/wc_slhdsa.h>
  33#endif
  34#include <wolfssl/wolfcrypt/types.h>
  35#include <wolfssl/wolfcrypt/asn.h>
  36#include <wolfssl/wolfcrypt/asn_public.h>
  37#include <tests/api/api.h>
  38#include <tests/api/test_slhdsa.h>
  39
  40
  41#ifdef WOLFSSL_HAVE_SLHDSA
  42/* Pick the first available parameter set so tests that just need any one valid
  43 * SLH-DSA configuration compile and run in SHAKE-only, SHA-2-only, or mixed
  44 * builds. Preference order: SHAKE 128s/f, 192s/f, 256s/f, then the SHA-2
  45 * variants in the same order. */
  46#if defined(WOLFSSL_SLHDSA_PARAM_128S)
  47    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHAKE128S
  48    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHAKE128S_SIG_LEN
  49    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHAKE128S_PRIV_LEN
  50    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHAKE128S_PUB_LEN
  51    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHAKE128S_SEED_LEN
  52#elif defined(WOLFSSL_SLHDSA_PARAM_128F)
  53    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHAKE128F
  54    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHAKE128F_SIG_LEN
  55    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHAKE128F_PRIV_LEN
  56    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHAKE128F_PUB_LEN
  57    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHAKE128F_SEED_LEN
  58#elif defined(WOLFSSL_SLHDSA_PARAM_192S)
  59    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHAKE192S
  60    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHAKE192S_SIG_LEN
  61    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHAKE192S_PRIV_LEN
  62    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHAKE192S_PUB_LEN
  63    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHAKE192S_SEED_LEN
  64#elif defined(WOLFSSL_SLHDSA_PARAM_192F)
  65    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHAKE192F
  66    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHAKE192F_SIG_LEN
  67    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHAKE192F_PRIV_LEN
  68    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHAKE192F_PUB_LEN
  69    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHAKE192F_SEED_LEN
  70#elif defined(WOLFSSL_SLHDSA_PARAM_256S)
  71    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHAKE256S
  72    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHAKE256S_SIG_LEN
  73    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHAKE256S_PRIV_LEN
  74    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHAKE256S_PUB_LEN
  75    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHAKE256S_SEED_LEN
  76#elif defined(WOLFSSL_SLHDSA_PARAM_256F)
  77    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHAKE256F
  78    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHAKE256F_SIG_LEN
  79    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHAKE256F_PRIV_LEN
  80    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHAKE256F_PUB_LEN
  81    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHAKE256F_SEED_LEN
  82#elif defined(WOLFSSL_SLHDSA_PARAM_SHA2_128S)
  83    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHA2_128S
  84    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHA2_128S_SIG_LEN
  85    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHA2_128S_PRIV_LEN
  86    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHA2_128S_PUB_LEN
  87    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHA2_128S_SEED_LEN
  88#elif defined(WOLFSSL_SLHDSA_PARAM_SHA2_128F)
  89    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHA2_128F
  90    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHA2_128F_SIG_LEN
  91    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHA2_128F_PRIV_LEN
  92    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHA2_128F_PUB_LEN
  93    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHA2_128F_SEED_LEN
  94#elif defined(WOLFSSL_SLHDSA_PARAM_SHA2_192S)
  95    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHA2_192S
  96    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHA2_192S_SIG_LEN
  97    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHA2_192S_PRIV_LEN
  98    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHA2_192S_PUB_LEN
  99    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHA2_192S_SEED_LEN
 100#elif defined(WOLFSSL_SLHDSA_PARAM_SHA2_192F)
 101    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHA2_192F
 102    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHA2_192F_SIG_LEN
 103    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHA2_192F_PRIV_LEN
 104    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHA2_192F_PUB_LEN
 105    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHA2_192F_SEED_LEN
 106#elif defined(WOLFSSL_SLHDSA_PARAM_SHA2_256S)
 107    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHA2_256S
 108    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHA2_256S_SIG_LEN
 109    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHA2_256S_PRIV_LEN
 110    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHA2_256S_PUB_LEN
 111    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHA2_256S_SEED_LEN
 112#elif defined(WOLFSSL_SLHDSA_PARAM_SHA2_256F)
 113    #define TEST_SLHDSA_DEFAULT_PARAM     SLHDSA_SHA2_256F
 114    #define TEST_SLHDSA_DEFAULT_SIG_LEN   WC_SLHDSA_SHA2_256F_SIG_LEN
 115    #define TEST_SLHDSA_DEFAULT_PRIV_LEN  WC_SLHDSA_SHA2_256F_PRIV_LEN
 116    #define TEST_SLHDSA_DEFAULT_PUB_LEN   WC_SLHDSA_SHA2_256F_PUB_LEN
 117    #define TEST_SLHDSA_DEFAULT_SEED_LEN  WC_SLHDSA_SHA2_256F_SEED_LEN
 118#endif
 119#endif /* WOLFSSL_HAVE_SLHDSA */
 120
 121
 122/*
 123 * Test basic init/free and NULL parameter handling for SLH-DSA key operations.
 124 */
 125int test_wc_slhdsa(void)
 126{
 127    EXPECT_DECLS;
 128#ifdef WOLFSSL_HAVE_SLHDSA
 129    /* `key` is only used by the per-variant Init/Free blocks below, so
 130     * gate its declaration on the same precondition (at least one
 131     * parameter set compiled in) to avoid -Wunused-variable when SLH-DSA
 132     * is enabled but no params are. */
 133#ifdef TEST_SLHDSA_DEFAULT_PARAM
 134    SlhDsaKey key;
 135
 136    /* Test NULL parameter handling for init. Use whichever variant the
 137     * build actually has so a SHA-2-only build doesn't pass a SHAKE param
 138     * id and conflate BAD_FUNC_ARG (NULL key) with NOT_COMPILED_IN
 139     * (variant disabled). */
 140    ExpectIntEQ(wc_SlhDsaKey_Init(NULL, TEST_SLHDSA_DEFAULT_PARAM, NULL,
 141        INVALID_DEVID), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 142#endif
 143
 144    /* Test wc_SlhDsaKey_Free with NULL - should not crash. */
 145    wc_SlhDsaKey_Free(NULL);
 146
 147    /* Test valid init for each supported parameter set. Each block zeros
 148     * `key` first so a future regression where wc_SlhDsaKey_Free leaves
 149     * a residual field set cannot be papered over by the next Init's
 150     * partial reinitialisation. */
 151#ifdef WOLFSSL_SLHDSA_PARAM_128S
 152    XMEMSET(&key, 0, sizeof(key));
 153    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128S, NULL, INVALID_DEVID),
 154        0);
 155    wc_SlhDsaKey_Free(&key);
 156#endif
 157#ifdef WOLFSSL_SLHDSA_PARAM_128F
 158    XMEMSET(&key, 0, sizeof(key));
 159    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128F, NULL, INVALID_DEVID),
 160        0);
 161    wc_SlhDsaKey_Free(&key);
 162#endif
 163#ifdef WOLFSSL_SLHDSA_PARAM_192S
 164    XMEMSET(&key, 0, sizeof(key));
 165    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192S, NULL, INVALID_DEVID),
 166        0);
 167    wc_SlhDsaKey_Free(&key);
 168#endif
 169#ifdef WOLFSSL_SLHDSA_PARAM_192F
 170    XMEMSET(&key, 0, sizeof(key));
 171    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192F, NULL, INVALID_DEVID),
 172        0);
 173    wc_SlhDsaKey_Free(&key);
 174#endif
 175#ifdef WOLFSSL_SLHDSA_PARAM_256S
 176    XMEMSET(&key, 0, sizeof(key));
 177    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256S, NULL, INVALID_DEVID),
 178        0);
 179    wc_SlhDsaKey_Free(&key);
 180#endif
 181#ifdef WOLFSSL_SLHDSA_PARAM_256F
 182    XMEMSET(&key, 0, sizeof(key));
 183    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256F, NULL, INVALID_DEVID),
 184        0);
 185    wc_SlhDsaKey_Free(&key);
 186#endif
 187#ifdef WOLFSSL_SLHDSA_SHA2
 188#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128S
 189    XMEMSET(&key, 0, sizeof(key));
 190    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128S, NULL, INVALID_DEVID),
 191        0);
 192    wc_SlhDsaKey_Free(&key);
 193#endif
 194#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128F
 195    XMEMSET(&key, 0, sizeof(key));
 196    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128F, NULL, INVALID_DEVID),
 197        0);
 198    wc_SlhDsaKey_Free(&key);
 199#endif
 200#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192S
 201    XMEMSET(&key, 0, sizeof(key));
 202    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192S, NULL, INVALID_DEVID),
 203        0);
 204    wc_SlhDsaKey_Free(&key);
 205#endif
 206#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192F
 207    XMEMSET(&key, 0, sizeof(key));
 208    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192F, NULL, INVALID_DEVID),
 209        0);
 210    wc_SlhDsaKey_Free(&key);
 211#endif
 212#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256S
 213    XMEMSET(&key, 0, sizeof(key));
 214    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256S, NULL, INVALID_DEVID),
 215        0);
 216    wc_SlhDsaKey_Free(&key);
 217#endif
 218#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256F
 219    XMEMSET(&key, 0, sizeof(key));
 220    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256F, NULL, INVALID_DEVID),
 221        0);
 222    wc_SlhDsaKey_Free(&key);
 223#endif
 224#endif /* WOLFSSL_SLHDSA_SHA2 */
 225
 226#endif /* WOLFSSL_HAVE_SLHDSA */
 227    return EXPECT_RESULT();
 228}
 229
 230/*
 231 * Test size functions for SLH-DSA.
 232 */
 233int test_wc_slhdsa_sizes(void)
 234{
 235    EXPECT_DECLS;
 236#ifdef WOLFSSL_HAVE_SLHDSA
 237    /* See test_wc_slhdsa() for the rationale on this guard. */
 238#ifdef TEST_SLHDSA_DEFAULT_PARAM
 239    SlhDsaKey key;
 240#endif
 241
 242    /* Test NULL parameter handling for size functions. */
 243#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 244    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(NULL), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 245#endif
 246    ExpectIntEQ(wc_SlhDsaKey_PublicSize(NULL), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 247    ExpectIntEQ(wc_SlhDsaKey_SigSize(NULL), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 248
 249    /* Test sizes for each parameter set. */
 250#ifdef WOLFSSL_SLHDSA_PARAM_128S
 251    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128S, NULL, INVALID_DEVID),
 252        0);
 253#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 254    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHAKE128S_PRIV_LEN);
 255#endif
 256    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHAKE128S_PUB_LEN);
 257    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHAKE128S_SIG_LEN);
 258    wc_SlhDsaKey_Free(&key);
 259
 260#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 261    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHAKE128S),
 262        WC_SLHDSA_SHAKE128S_PRIV_LEN);
 263#endif
 264    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHAKE128S),
 265        WC_SLHDSA_SHAKE128S_PUB_LEN);
 266    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHAKE128S),
 267        WC_SLHDSA_SHAKE128S_SIG_LEN);
 268#endif
 269
 270#ifdef WOLFSSL_SLHDSA_PARAM_128F
 271    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128F, NULL, INVALID_DEVID),
 272        0);
 273#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 274    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHAKE128F_PRIV_LEN);
 275#endif
 276    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHAKE128F_PUB_LEN);
 277    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHAKE128F_SIG_LEN);
 278    wc_SlhDsaKey_Free(&key);
 279
 280#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 281    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHAKE128F),
 282        WC_SLHDSA_SHAKE128F_PRIV_LEN);
 283#endif
 284    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHAKE128F),
 285        WC_SLHDSA_SHAKE128F_PUB_LEN);
 286    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHAKE128F),
 287        WC_SLHDSA_SHAKE128F_SIG_LEN);
 288#endif
 289
 290#ifdef WOLFSSL_SLHDSA_PARAM_192S
 291    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192S, NULL, INVALID_DEVID),
 292        0);
 293#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 294    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHAKE192S_PRIV_LEN);
 295#endif
 296    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHAKE192S_PUB_LEN);
 297    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHAKE192S_SIG_LEN);
 298    wc_SlhDsaKey_Free(&key);
 299
 300#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 301    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHAKE192S),
 302        WC_SLHDSA_SHAKE192S_PRIV_LEN);
 303#endif
 304    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHAKE192S),
 305        WC_SLHDSA_SHAKE192S_PUB_LEN);
 306    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHAKE192S),
 307        WC_SLHDSA_SHAKE192S_SIG_LEN);
 308#endif
 309
 310#ifdef WOLFSSL_SLHDSA_PARAM_192F
 311    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192F, NULL, INVALID_DEVID),
 312        0);
 313#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 314    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHAKE192F_PRIV_LEN);
 315#endif
 316    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHAKE192F_PUB_LEN);
 317    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHAKE192F_SIG_LEN);
 318    wc_SlhDsaKey_Free(&key);
 319
 320#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 321    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHAKE192F),
 322        WC_SLHDSA_SHAKE192F_PRIV_LEN);
 323#endif
 324    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHAKE192F),
 325        WC_SLHDSA_SHAKE192F_PUB_LEN);
 326    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHAKE192F),
 327        WC_SLHDSA_SHAKE192F_SIG_LEN);
 328#endif
 329
 330#ifdef WOLFSSL_SLHDSA_PARAM_256S
 331    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256S, NULL, INVALID_DEVID),
 332        0);
 333#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 334    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHAKE256S_PRIV_LEN);
 335#endif
 336    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHAKE256S_PUB_LEN);
 337    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHAKE256S_SIG_LEN);
 338    wc_SlhDsaKey_Free(&key);
 339
 340#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 341    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHAKE256S),
 342        WC_SLHDSA_SHAKE256S_PRIV_LEN);
 343#endif
 344    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHAKE256S),
 345        WC_SLHDSA_SHAKE256S_PUB_LEN);
 346    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHAKE256S),
 347        WC_SLHDSA_SHAKE256S_SIG_LEN);
 348#endif
 349
 350#ifdef WOLFSSL_SLHDSA_PARAM_256F
 351    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256F, NULL, INVALID_DEVID),
 352        0);
 353#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 354    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHAKE256F_PRIV_LEN);
 355#endif
 356    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHAKE256F_PUB_LEN);
 357    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHAKE256F_SIG_LEN);
 358    wc_SlhDsaKey_Free(&key);
 359
 360#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 361    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHAKE256F),
 362        WC_SLHDSA_SHAKE256F_PRIV_LEN);
 363#endif
 364    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHAKE256F),
 365        WC_SLHDSA_SHAKE256F_PUB_LEN);
 366    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHAKE256F),
 367        WC_SLHDSA_SHAKE256F_SIG_LEN);
 368#endif
 369
 370#ifdef WOLFSSL_SLHDSA_SHA2
 371#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128S
 372    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128S, NULL, INVALID_DEVID),
 373        0);
 374#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 375    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHA2_128S_PRIV_LEN);
 376#endif
 377    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHA2_128S_PUB_LEN);
 378    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHA2_128S_SIG_LEN);
 379    wc_SlhDsaKey_Free(&key);
 380
 381#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 382    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHA2_128S),
 383        WC_SLHDSA_SHA2_128S_PRIV_LEN);
 384#endif
 385    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHA2_128S),
 386        WC_SLHDSA_SHA2_128S_PUB_LEN);
 387    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHA2_128S),
 388        WC_SLHDSA_SHA2_128S_SIG_LEN);
 389#endif
 390
 391#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128F
 392    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128F, NULL, INVALID_DEVID),
 393        0);
 394#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 395    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHA2_128F_PRIV_LEN);
 396#endif
 397    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHA2_128F_PUB_LEN);
 398    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHA2_128F_SIG_LEN);
 399    wc_SlhDsaKey_Free(&key);
 400
 401#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 402    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHA2_128F),
 403        WC_SLHDSA_SHA2_128F_PRIV_LEN);
 404#endif
 405    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHA2_128F),
 406        WC_SLHDSA_SHA2_128F_PUB_LEN);
 407    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHA2_128F),
 408        WC_SLHDSA_SHA2_128F_SIG_LEN);
 409#endif
 410
 411#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192S
 412    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192S, NULL, INVALID_DEVID),
 413        0);
 414#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 415    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHA2_192S_PRIV_LEN);
 416#endif
 417    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHA2_192S_PUB_LEN);
 418    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHA2_192S_SIG_LEN);
 419    wc_SlhDsaKey_Free(&key);
 420
 421#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 422    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHA2_192S),
 423        WC_SLHDSA_SHA2_192S_PRIV_LEN);
 424#endif
 425    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHA2_192S),
 426        WC_SLHDSA_SHA2_192S_PUB_LEN);
 427    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHA2_192S),
 428        WC_SLHDSA_SHA2_192S_SIG_LEN);
 429#endif
 430
 431#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192F
 432    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192F, NULL, INVALID_DEVID),
 433        0);
 434#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 435    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHA2_192F_PRIV_LEN);
 436#endif
 437    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHA2_192F_PUB_LEN);
 438    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHA2_192F_SIG_LEN);
 439    wc_SlhDsaKey_Free(&key);
 440
 441#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 442    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHA2_192F),
 443        WC_SLHDSA_SHA2_192F_PRIV_LEN);
 444#endif
 445    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHA2_192F),
 446        WC_SLHDSA_SHA2_192F_PUB_LEN);
 447    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHA2_192F),
 448        WC_SLHDSA_SHA2_192F_SIG_LEN);
 449#endif
 450
 451#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256S
 452    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256S, NULL, INVALID_DEVID),
 453        0);
 454#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 455    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHA2_256S_PRIV_LEN);
 456#endif
 457    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHA2_256S_PUB_LEN);
 458    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHA2_256S_SIG_LEN);
 459    wc_SlhDsaKey_Free(&key);
 460
 461#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 462    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHA2_256S),
 463        WC_SLHDSA_SHA2_256S_PRIV_LEN);
 464#endif
 465    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHA2_256S),
 466        WC_SLHDSA_SHA2_256S_PUB_LEN);
 467    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHA2_256S),
 468        WC_SLHDSA_SHA2_256S_SIG_LEN);
 469#endif
 470
 471#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256F
 472    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256F, NULL, INVALID_DEVID),
 473        0);
 474#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 475    ExpectIntEQ(wc_SlhDsaKey_PrivateSize(&key), WC_SLHDSA_SHA2_256F_PRIV_LEN);
 476#endif
 477    ExpectIntEQ(wc_SlhDsaKey_PublicSize(&key), WC_SLHDSA_SHA2_256F_PUB_LEN);
 478    ExpectIntEQ(wc_SlhDsaKey_SigSize(&key), WC_SLHDSA_SHA2_256F_SIG_LEN);
 479    wc_SlhDsaKey_Free(&key);
 480
 481#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
 482    ExpectIntEQ(wc_SlhDsaKey_PrivateSizeFromParam(SLHDSA_SHA2_256F),
 483        WC_SLHDSA_SHA2_256F_PRIV_LEN);
 484#endif
 485    ExpectIntEQ(wc_SlhDsaKey_PublicSizeFromParam(SLHDSA_SHA2_256F),
 486        WC_SLHDSA_SHA2_256F_PUB_LEN);
 487    ExpectIntEQ(wc_SlhDsaKey_SigSizeFromParam(SLHDSA_SHA2_256F),
 488        WC_SLHDSA_SHA2_256F_SIG_LEN);
 489#endif
 490#endif /* WOLFSSL_SLHDSA_SHA2 */
 491
 492#endif /* WOLFSSL_HAVE_SLHDSA */
 493    return EXPECT_RESULT();
 494}
 495
 496/*
 497 * Test key generation for SLH-DSA.
 498 */
 499int test_wc_slhdsa_make_key(void)
 500{
 501    EXPECT_DECLS;
 502#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
 503    SlhDsaKey key;
 504    WC_RNG rng;
 505
 506    XMEMSET(&rng, 0, sizeof(WC_RNG));
 507    ExpectIntEQ(wc_InitRng(&rng), 0);
 508
 509    /* Test NULL parameter handling. */
 510    ExpectIntEQ(wc_SlhDsaKey_MakeKey(NULL, &rng),
 511        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 512
 513#ifdef WOLFSSL_SLHDSA_PARAM_128S
 514    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128S, NULL, INVALID_DEVID),
 515        0);
 516    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, NULL),
 517        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 518    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 519    wc_SlhDsaKey_Free(&key);
 520#endif
 521
 522#ifdef WOLFSSL_SLHDSA_PARAM_128F
 523    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128F, NULL, INVALID_DEVID),
 524        0);
 525    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 526    wc_SlhDsaKey_Free(&key);
 527#endif
 528
 529#ifdef WOLFSSL_SLHDSA_PARAM_192S
 530    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192S, NULL, INVALID_DEVID),
 531        0);
 532    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 533    wc_SlhDsaKey_Free(&key);
 534#endif
 535
 536#ifdef WOLFSSL_SLHDSA_PARAM_192F
 537    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192F, NULL, INVALID_DEVID),
 538        0);
 539    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 540    wc_SlhDsaKey_Free(&key);
 541#endif
 542
 543#ifdef WOLFSSL_SLHDSA_PARAM_256S
 544    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256S, NULL, INVALID_DEVID),
 545        0);
 546    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 547    wc_SlhDsaKey_Free(&key);
 548#endif
 549
 550#ifdef WOLFSSL_SLHDSA_PARAM_256F
 551    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256F, NULL, INVALID_DEVID),
 552        0);
 553    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 554    wc_SlhDsaKey_Free(&key);
 555#endif
 556
 557#ifdef WOLFSSL_SLHDSA_SHA2
 558#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128S
 559    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128S, NULL, INVALID_DEVID),
 560        0);
 561    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 562    wc_SlhDsaKey_Free(&key);
 563#endif
 564#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128F
 565    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128F, NULL, INVALID_DEVID),
 566        0);
 567    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 568    wc_SlhDsaKey_Free(&key);
 569#endif
 570#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192S
 571    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192S, NULL, INVALID_DEVID),
 572        0);
 573    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 574    wc_SlhDsaKey_Free(&key);
 575#endif
 576#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192F
 577    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192F, NULL, INVALID_DEVID),
 578        0);
 579    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 580    wc_SlhDsaKey_Free(&key);
 581#endif
 582#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256S
 583    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256S, NULL, INVALID_DEVID),
 584        0);
 585    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 586    wc_SlhDsaKey_Free(&key);
 587#endif
 588#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256F
 589    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256F, NULL, INVALID_DEVID),
 590        0);
 591    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 592    wc_SlhDsaKey_Free(&key);
 593#endif
 594#endif /* WOLFSSL_SLHDSA_SHA2 */
 595
 596    /* Test MakeKeyWithRandom. */
 597#ifdef TEST_SLHDSA_DEFAULT_PARAM
 598    {
 599        byte sk_seed[TEST_SLHDSA_DEFAULT_SEED_LEN];
 600        byte sk_prf[TEST_SLHDSA_DEFAULT_SEED_LEN];
 601        byte pk_seed[TEST_SLHDSA_DEFAULT_SEED_LEN];
 602
 603        XMEMSET(sk_seed, 0x01, sizeof(sk_seed));
 604        XMEMSET(sk_prf, 0x02, sizeof(sk_prf));
 605        XMEMSET(pk_seed, 0x03, sizeof(pk_seed));
 606
 607        /* Test NULL parameter handling. */
 608        ExpectIntEQ(wc_SlhDsaKey_MakeKeyWithRandom(NULL, sk_seed,
 609            sizeof(sk_seed), sk_prf, sizeof(sk_prf), pk_seed, sizeof(pk_seed)),
 610            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 611
 612        ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
 613            INVALID_DEVID), 0);
 614        ExpectIntEQ(wc_SlhDsaKey_MakeKeyWithRandom(&key, NULL, sizeof(sk_seed),
 615            sk_prf, sizeof(sk_prf), pk_seed, sizeof(pk_seed)),
 616            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 617        ExpectIntEQ(wc_SlhDsaKey_MakeKeyWithRandom(&key, sk_seed,
 618            sizeof(sk_seed), NULL, sizeof(sk_prf), pk_seed, sizeof(pk_seed)),
 619            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 620        ExpectIntEQ(wc_SlhDsaKey_MakeKeyWithRandom(&key, sk_seed,
 621            sizeof(sk_seed), sk_prf, sizeof(sk_prf), NULL, sizeof(pk_seed)),
 622            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 623        /* Test wrong size. */
 624        ExpectIntEQ(wc_SlhDsaKey_MakeKeyWithRandom(&key, sk_seed, 8,
 625            sk_prf, sizeof(sk_prf), pk_seed, sizeof(pk_seed)),
 626            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 627
 628        ExpectIntEQ(wc_SlhDsaKey_MakeKeyWithRandom(&key, sk_seed,
 629            sizeof(sk_seed), sk_prf, sizeof(sk_prf), pk_seed, sizeof(pk_seed)),
 630            0);
 631        wc_SlhDsaKey_Free(&key);
 632    }
 633#endif
 634
 635    wc_FreeRng(&rng);
 636#endif /* WOLFSSL_HAVE_SLHDSA && !WOLFSSL_SLHDSA_VERIFY_ONLY */
 637    return EXPECT_RESULT();
 638}
 639
 640/*
 641 * Test signing for SLH-DSA.
 642 */
 643int test_wc_slhdsa_sign(void)
 644{
 645    EXPECT_DECLS;
 646#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
 647    SlhDsaKey key;
 648    WC_RNG rng;
 649    byte msg[64];
 650    byte* sig = NULL;
 651    word32 sigLen;
 652    word32 expSigLen;
 653    byte ctx[10];
 654
 655    sig = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 656    ExpectNotNull(sig);
 657
 658    XMEMSET(&rng, 0, sizeof(WC_RNG));
 659    XMEMSET(msg, 0xAA, sizeof(msg));
 660    XMEMSET(ctx, 0x01, sizeof(ctx));
 661
 662    ExpectIntEQ(wc_InitRng(&rng), 0);
 663
 664    /* Test NULL parameter handling. */
 665    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 666    ExpectIntEQ(wc_SlhDsaKey_Sign(NULL, ctx, sizeof(ctx), msg, sizeof(msg),
 667        sig, &sigLen, &rng), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 668
 669    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
 670        INVALID_DEVID), 0);
 671    expSigLen = TEST_SLHDSA_DEFAULT_SIG_LEN;
 672    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 673
 674    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 675    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), NULL, sizeof(msg),
 676        sig, &sigLen, &rng), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 677    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 678        NULL, &sigLen, &rng), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 679    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 680        sig, NULL, &rng), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 681    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 682        sig, &sigLen, NULL), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 683
 684    /* Test buffer too small. */
 685    sigLen = 10;
 686    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 687        sig, &sigLen, &rng), WC_NO_ERR_TRACE(BAD_LENGTH_E));
 688
 689    /* Test successful signing. */
 690    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 691    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 692        sig, &sigLen, &rng), 0);
 693    ExpectIntEQ(sigLen, expSigLen);
 694
 695    /* Test signing with NULL context (allowed). */
 696    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 697    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, NULL, 0, msg, sizeof(msg),
 698        sig, &sigLen, &rng), 0);
 699
 700    wc_SlhDsaKey_Free(&key);
 701
 702    /* Test SignDeterministic. */
 703    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
 704        INVALID_DEVID), 0);
 705    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 706
 707    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 708    ExpectIntEQ(wc_SlhDsaKey_SignDeterministic(NULL, ctx, sizeof(ctx),
 709        msg, sizeof(msg), sig, &sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 710    ExpectIntEQ(wc_SlhDsaKey_SignDeterministic(&key, ctx, sizeof(ctx),
 711        msg, sizeof(msg), sig, &sigLen), 0);
 712    ExpectIntEQ(sigLen, expSigLen);
 713
 714    wc_SlhDsaKey_Free(&key);
 715
 716    /* Test SignWithRandom. */
 717    {
 718        byte addRnd[WC_SLHDSA_MAX_SEED];
 719        XMEMSET(addRnd, 0x55, sizeof(addRnd));
 720
 721        ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
 722            INVALID_DEVID), 0);
 723        ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 724
 725        sigLen = WC_SLHDSA_MAX_SIG_LEN;
 726        ExpectIntEQ(wc_SlhDsaKey_SignWithRandom(NULL, ctx, sizeof(ctx),
 727            msg, sizeof(msg), sig, &sigLen, addRnd),
 728            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 729        ExpectIntEQ(wc_SlhDsaKey_SignWithRandom(&key, ctx, sizeof(ctx),
 730            msg, sizeof(msg), sig, &sigLen, NULL),
 731            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 732        ExpectIntEQ(wc_SlhDsaKey_SignWithRandom(&key, ctx, sizeof(ctx),
 733            msg, sizeof(msg), sig, &sigLen, addRnd), 0);
 734        ExpectIntEQ(sigLen, expSigLen);
 735
 736        wc_SlhDsaKey_Free(&key);
 737    }
 738
 739    wc_FreeRng(&rng);
 740    XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 741#endif /* WOLFSSL_HAVE_SLHDSA && !WOLFSSL_SLHDSA_VERIFY_ONLY */
 742    return EXPECT_RESULT();
 743}
 744
 745/*
 746 * Test verification for SLH-DSA.
 747 */
 748int test_wc_slhdsa_verify(void)
 749{
 750    EXPECT_DECLS;
 751#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
 752    SlhDsaKey key;
 753    WC_RNG rng;
 754    byte msg[64];
 755    byte* sig = NULL;
 756    word32 sigLen;
 757    byte ctx[10];
 758
 759    sig = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 760    ExpectNotNull(sig);
 761
 762    XMEMSET(&rng, 0, sizeof(WC_RNG));
 763    XMEMSET(msg, 0xAA, sizeof(msg));
 764    XMEMSET(ctx, 0x01, sizeof(ctx));
 765
 766    ExpectIntEQ(wc_InitRng(&rng), 0);
 767
 768    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
 769        INVALID_DEVID), 0);
 770    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 771
 772    /* Generate a signature. */
 773    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 774    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 775        sig, &sigLen, &rng), 0);
 776
 777    /* Test NULL parameter handling. */
 778    ExpectIntEQ(wc_SlhDsaKey_Verify(NULL, ctx, sizeof(ctx), msg, sizeof(msg),
 779        sig, sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 780    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), NULL, sizeof(msg),
 781        sig, sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 782    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 783        NULL, sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
 784
 785    /* Test successful verification. */
 786    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 787        sig, sigLen), 0);
 788
 789    /* Test verification with wrong message. */
 790    msg[0] ^= 0xFF;
 791    ExpectIntNE(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 792        sig, sigLen), 0);
 793    msg[0] ^= 0xFF;
 794
 795    /* Test verification with wrong context. */
 796    ctx[0] ^= 0xFF;
 797    ExpectIntNE(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 798        sig, sigLen), 0);
 799    ctx[0] ^= 0xFF;
 800
 801    /* Test verification with corrupted signature. */
 802    sig[0] ^= 0xFF;
 803    ExpectIntNE(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 804        sig, sigLen), 0);
 805    sig[0] ^= 0xFF;
 806
 807    /* Test verification with NULL context (allowed, but must match signing). */
 808    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 809    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, NULL, 0, msg, sizeof(msg),
 810        sig, &sigLen, &rng), 0);
 811    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, NULL, 0, msg, sizeof(msg),
 812        sig, sigLen), 0);
 813
 814    wc_SlhDsaKey_Free(&key);
 815
 816    wc_FreeRng(&rng);
 817    XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 818#endif /* WOLFSSL_HAVE_SLHDSA */
 819    return EXPECT_RESULT();
 820}
 821
 822/*
 823 * Test combined sign and verify for all parameter sets.
 824 */
 825int test_wc_slhdsa_sign_vfy(void)
 826{
 827    EXPECT_DECLS;
 828#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
 829    SlhDsaKey key;
 830    WC_RNG rng;
 831    byte msg[64];
 832    byte* sig = NULL;
 833    word32 sigLen;
 834    byte ctx[10];
 835
 836    sig = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
 837    ExpectNotNull(sig);
 838
 839    XMEMSET(&rng, 0, sizeof(WC_RNG));
 840    XMEMSET(msg, 0xAA, sizeof(msg));
 841    XMEMSET(ctx, 0x01, sizeof(ctx));
 842
 843    ExpectIntEQ(wc_InitRng(&rng), 0);
 844
 845#ifdef WOLFSSL_SLHDSA_PARAM_128S
 846    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128S, NULL, INVALID_DEVID),
 847        0);
 848    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 849
 850    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 851    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 852        sig, &sigLen, &rng), 0);
 853    ExpectIntEQ(sigLen, WC_SLHDSA_SHAKE128S_SIG_LEN);
 854    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 855        sig, sigLen), 0);
 856
 857    wc_SlhDsaKey_Free(&key);
 858#endif
 859
 860#ifdef WOLFSSL_SLHDSA_PARAM_128F
 861    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128F, NULL, INVALID_DEVID),
 862        0);
 863    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 864
 865    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 866    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 867        sig, &sigLen, &rng), 0);
 868    ExpectIntEQ(sigLen, WC_SLHDSA_SHAKE128F_SIG_LEN);
 869    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 870        sig, sigLen), 0);
 871
 872    wc_SlhDsaKey_Free(&key);
 873#endif
 874
 875#ifdef WOLFSSL_SLHDSA_PARAM_192S
 876    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192S, NULL, INVALID_DEVID),
 877        0);
 878    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 879
 880    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 881    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 882        sig, &sigLen, &rng), 0);
 883    ExpectIntEQ(sigLen, (word32)wc_SlhDsaKey_SigSize(&key));
 884    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 885        sig, sigLen), 0);
 886
 887    wc_SlhDsaKey_Free(&key);
 888#endif
 889
 890#ifdef WOLFSSL_SLHDSA_PARAM_192F
 891    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192F, NULL, INVALID_DEVID),
 892        0);
 893    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 894
 895    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 896    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 897        sig, &sigLen, &rng), 0);
 898    ExpectIntEQ(sigLen, WC_SLHDSA_SHAKE192F_SIG_LEN);
 899    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 900        sig, sigLen), 0);
 901
 902    wc_SlhDsaKey_Free(&key);
 903#endif
 904
 905#ifdef WOLFSSL_SLHDSA_PARAM_256S
 906    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256S, NULL, INVALID_DEVID),
 907        0);
 908    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 909
 910    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 911    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 912        sig, &sigLen, &rng), 0);
 913    ExpectIntEQ(sigLen, WC_SLHDSA_SHAKE256S_SIG_LEN);
 914    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 915        sig, sigLen), 0);
 916
 917    wc_SlhDsaKey_Free(&key);
 918#endif
 919
 920#ifdef WOLFSSL_SLHDSA_PARAM_256F
 921    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256F, NULL, INVALID_DEVID),
 922        0);
 923    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 924
 925    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 926    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 927        sig, &sigLen, &rng), 0);
 928    ExpectIntEQ(sigLen, WC_SLHDSA_SHAKE256F_SIG_LEN);
 929    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 930        sig, sigLen), 0);
 931
 932    wc_SlhDsaKey_Free(&key);
 933#endif
 934
 935#ifdef WOLFSSL_SLHDSA_SHA2
 936#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128S
 937    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128S, NULL, INVALID_DEVID),
 938        0);
 939    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 940    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 941    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 942        sig, &sigLen, &rng), 0);
 943    ExpectIntEQ(sigLen, WC_SLHDSA_SHA2_128S_SIG_LEN);
 944    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 945        sig, sigLen), 0);
 946    wc_SlhDsaKey_Free(&key);
 947#endif
 948#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128F
 949    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128F, NULL, INVALID_DEVID),
 950        0);
 951    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 952    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 953    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 954        sig, &sigLen, &rng), 0);
 955    ExpectIntEQ(sigLen, WC_SLHDSA_SHA2_128F_SIG_LEN);
 956    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 957        sig, sigLen), 0);
 958    wc_SlhDsaKey_Free(&key);
 959#endif
 960#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192S
 961    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192S, NULL, INVALID_DEVID),
 962        0);
 963    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 964    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 965    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 966        sig, &sigLen, &rng), 0);
 967    ExpectIntEQ(sigLen, WC_SLHDSA_SHA2_192S_SIG_LEN);
 968    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 969        sig, sigLen), 0);
 970    wc_SlhDsaKey_Free(&key);
 971#endif
 972#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192F
 973    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192F, NULL, INVALID_DEVID),
 974        0);
 975    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 976    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 977    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 978        sig, &sigLen, &rng), 0);
 979    ExpectIntEQ(sigLen, WC_SLHDSA_SHA2_192F_SIG_LEN);
 980    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 981        sig, sigLen), 0);
 982    wc_SlhDsaKey_Free(&key);
 983#endif
 984#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256S
 985    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256S, NULL, INVALID_DEVID),
 986        0);
 987    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
 988    sigLen = WC_SLHDSA_MAX_SIG_LEN;
 989    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 990        sig, &sigLen, &rng), 0);
 991    ExpectIntEQ(sigLen, WC_SLHDSA_SHA2_256S_SIG_LEN);
 992    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
 993        sig, sigLen), 0);
 994    wc_SlhDsaKey_Free(&key);
 995#endif
 996#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256F
 997    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256F, NULL, INVALID_DEVID),
 998        0);
 999    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
1000    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1001    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
1002        sig, &sigLen, &rng), 0);
1003    ExpectIntEQ(sigLen, WC_SLHDSA_SHA2_256F_SIG_LEN);
1004    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
1005        sig, sigLen), 0);
1006    wc_SlhDsaKey_Free(&key);
1007#endif
1008#endif /* WOLFSSL_SLHDSA_SHA2 */
1009
1010    wc_FreeRng(&rng);
1011    XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1012#endif /* WOLFSSL_HAVE_SLHDSA */
1013    return EXPECT_RESULT();
1014}
1015
1016/*
1017 * Test hash signing and verification for SLH-DSA.
1018 */
1019int test_wc_slhdsa_sign_hash(void)
1020{
1021    EXPECT_DECLS;
1022#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
1023    SlhDsaKey key;
1024    WC_RNG rng;
1025    byte hash[64];
1026    byte* sig = NULL;
1027    word32 sigLen;
1028    word32 expSigLen;
1029    byte ctx[10];
1030
1031    sig = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1032    ExpectNotNull(sig);
1033
1034    XMEMSET(&rng, 0, sizeof(WC_RNG));
1035    XMEMSET(hash, 0xBB, sizeof(hash));
1036    XMEMSET(ctx, 0x01, sizeof(ctx));
1037
1038    ExpectIntEQ(wc_InitRng(&rng), 0);
1039
1040    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1041        INVALID_DEVID), 0);
1042    expSigLen = TEST_SLHDSA_DEFAULT_SIG_LEN;
1043    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
1044
1045    /* Test SignHash NULL parameter handling. Use 32-byte hash length so the
1046     * NULL check trips before the digest-length check (HashSLH-DSA expects
1047     * SHA-256 digest = 32 bytes). */
1048    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1049    ExpectIntEQ(wc_SlhDsaKey_SignHash(NULL, ctx, sizeof(ctx), hash,
1050        32, WC_HASH_TYPE_SHA256, sig, &sigLen, &rng),
1051        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1052    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), NULL,
1053        32, WC_HASH_TYPE_SHA256, sig, &sigLen, &rng),
1054        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1055    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash,
1056        32, WC_HASH_TYPE_SHA256, NULL, &sigLen, &rng),
1057        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1058    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash,
1059        32, WC_HASH_TYPE_SHA256, sig, NULL, &rng),
1060        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1061    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash,
1062        32, WC_HASH_TYPE_SHA256, sig, &sigLen, NULL),
1063        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1064
1065    /* HashSLH-DSA must reject digest lengths that don't match hashType. */
1066    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1067    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 31,
1068        WC_HASH_TYPE_SHA256, sig, &sigLen, &rng),
1069        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1070    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 33,
1071        WC_HASH_TYPE_SHA256, sig, &sigLen, &rng),
1072        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1073    /* Generate a real signature first so VerifyHash gets to its length check
1074     * rather than failing on signature size. */
1075    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 32,
1076        WC_HASH_TYPE_SHA256, sig, &sigLen, &rng), 0);
1077    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 31,
1078        WC_HASH_TYPE_SHA256, sig, sigLen),
1079        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1080    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 33,
1081        WC_HASH_TYPE_SHA256, sig, sigLen),
1082        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1083
1084    /* Unsupported hashType (FIPS 205 doesn't list WC_HASH_TYPE_NONE) hits
1085     * the default branch of slhdsakey_validate_prehash. */
1086    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1087    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 32,
1088        WC_HASH_TYPE_NONE, sig, &sigLen, &rng),
1089        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
1090
1091    /* Test SignHash with SHA-256. */
1092    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1093    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 32,
1094        WC_HASH_TYPE_SHA256, sig, &sigLen, &rng), 0);
1095    ExpectIntEQ(sigLen, expSigLen);
1096    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 32,
1097        WC_HASH_TYPE_SHA256, sig, sigLen), 0);
1098
1099    /* Test VerifyHash NULL parameter handling. */
1100    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(NULL, ctx, sizeof(ctx), hash, 32,
1101        WC_HASH_TYPE_SHA256, sig, sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1102    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), NULL, 32,
1103        WC_HASH_TYPE_SHA256, sig, sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1104    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 32,
1105        WC_HASH_TYPE_SHA256, NULL, sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1106
1107    /* Test VerifyHash with wrong hash. */
1108    hash[0] ^= 0xFF;
1109    ExpectIntNE(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 32,
1110        WC_HASH_TYPE_SHA256, sig, sigLen), 0);
1111    hash[0] ^= 0xFF;
1112
1113    /* Test SignHashDeterministic. */
1114    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1115    ExpectIntEQ(wc_SlhDsaKey_SignHashDeterministic(NULL, ctx, sizeof(ctx),
1116        hash, 32, WC_HASH_TYPE_SHA256, sig, &sigLen),
1117        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1118    ExpectIntEQ(wc_SlhDsaKey_SignHashDeterministic(&key, ctx, sizeof(ctx),
1119        hash, 32, WC_HASH_TYPE_SHA256, sig, &sigLen), 0);
1120    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 32,
1121        WC_HASH_TYPE_SHA256, sig, sigLen), 0);
1122
1123    /* Test SignHashWithRandom. */
1124    {
1125        byte addRnd[WC_SLHDSA_MAX_SEED];
1126        XMEMSET(addRnd, 0x55, sizeof(addRnd));
1127
1128        sigLen = WC_SLHDSA_MAX_SIG_LEN;
1129        ExpectIntEQ(wc_SlhDsaKey_SignHashWithRandom(NULL, ctx, sizeof(ctx),
1130            hash, 32, WC_HASH_TYPE_SHA256, sig, &sigLen, addRnd),
1131            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1132        ExpectIntEQ(wc_SlhDsaKey_SignHashWithRandom(&key, ctx, sizeof(ctx),
1133            hash, 32, WC_HASH_TYPE_SHA256, sig, &sigLen, NULL),
1134            WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1135        ExpectIntEQ(wc_SlhDsaKey_SignHashWithRandom(&key, ctx, sizeof(ctx),
1136            hash, 32, WC_HASH_TYPE_SHA256, sig, &sigLen, addRnd), 0);
1137        ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 32,
1138            WC_HASH_TYPE_SHA256, sig, sigLen), 0);
1139    }
1140
1141#ifdef WOLFSSL_SHA512
1142    /* SHA-512 round-trip exercises a 64-byte digest path. */
1143    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1144    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 64,
1145        WC_HASH_TYPE_SHA512, sig, &sigLen, &rng), 0);
1146    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 64,
1147        WC_HASH_TYPE_SHA512, sig, sigLen), 0);
1148    /* SHA-512 must also reject the wrong digest length. */
1149    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 32,
1150        WC_HASH_TYPE_SHA512, sig, &sigLen, &rng),
1151        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1152#endif
1153
1154#ifdef WOLFSSL_SHAKE128
1155    /* SHAKE128 PHM is fixed at 256 bits per FIPS 205 Section 10.2.2. */
1156    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1157    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 32,
1158        WC_HASH_TYPE_SHAKE128, sig, &sigLen, &rng), 0);
1159    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 32,
1160        WC_HASH_TYPE_SHAKE128, sig, sigLen), 0);
1161    /* SignHash and VerifyHash both reject mismatched digest length. */
1162    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 64,
1163        WC_HASH_TYPE_SHAKE128, sig, &sigLen, &rng),
1164        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1165    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 64,
1166        WC_HASH_TYPE_SHAKE128, sig, sigLen),
1167        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1168#endif
1169
1170#ifdef WOLFSSL_SHAKE256
1171    /* SHAKE256 PHM is fixed at 512 bits per FIPS 205 Section 10.2.2. */
1172    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1173    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 64,
1174        WC_HASH_TYPE_SHAKE256, sig, &sigLen, &rng), 0);
1175    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 64,
1176        WC_HASH_TYPE_SHAKE256, sig, sigLen), 0);
1177    /* SignHash and VerifyHash both reject mismatched digest length. */
1178    ExpectIntEQ(wc_SlhDsaKey_SignHash(&key, ctx, sizeof(ctx), hash, 32,
1179        WC_HASH_TYPE_SHAKE256, sig, &sigLen, &rng),
1180        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1181    ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, ctx, sizeof(ctx), hash, 32,
1182        WC_HASH_TYPE_SHAKE256, sig, sigLen),
1183        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1184#endif
1185
1186    wc_SlhDsaKey_Free(&key);
1187
1188    wc_FreeRng(&rng);
1189    XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1190#endif /* WOLFSSL_HAVE_SLHDSA */
1191    return EXPECT_RESULT();
1192}
1193
1194/*
1195 * Test the FIPS 205 internal interface (M' supplied directly) for SLH-DSA.
1196 * Covers wc_SlhDsaKey_SignMsgDeterministic, wc_SlhDsaKey_SignMsgWithRandom,
1197 * and wc_SlhDsaKey_VerifyMsg, plus a HashSLH-DSA equivalence cross-check
1198 * that proves an externally-built M' matches the SignHash/VerifyHash path.
1199 */
1200int test_wc_slhdsa_sign_msg(void)
1201{
1202    EXPECT_DECLS;
1203#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
1204    !defined(NO_SHA256)
1205    SlhDsaKey key;
1206    WC_RNG rng;
1207    byte mprime[64];
1208    byte* sig = NULL;
1209    word32 sigLen;
1210    byte addRnd[WC_SLHDSA_MAX_SEED];
1211
1212    sig = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1213    ExpectNotNull(sig);
1214
1215    XMEMSET(&rng, 0, sizeof(WC_RNG));
1216    XMEMSET(mprime, 0xAA, sizeof(mprime));
1217    XMEMSET(addRnd, 0x55, sizeof(addRnd));
1218
1219    ExpectIntEQ(wc_InitRng(&rng), 0);
1220
1221    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1222        INVALID_DEVID), 0);
1223    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
1224
1225    /* SignMsgDeterministic NULL-arg checks. */
1226    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1227    ExpectIntEQ(wc_SlhDsaKey_SignMsgDeterministic(NULL, mprime, sizeof(mprime),
1228        sig, &sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1229    ExpectIntEQ(wc_SlhDsaKey_SignMsgDeterministic(&key, NULL, sizeof(mprime),
1230        sig, &sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1231    ExpectIntEQ(wc_SlhDsaKey_SignMsgDeterministic(&key, mprime, sizeof(mprime),
1232        NULL, &sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1233    ExpectIntEQ(wc_SlhDsaKey_SignMsgDeterministic(&key, mprime, sizeof(mprime),
1234        sig, NULL), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1235
1236    /* SignMsgDeterministic must reject sigSz smaller than params->sigLen. */
1237    sigLen = 1;
1238    ExpectIntEQ(wc_SlhDsaKey_SignMsgDeterministic(&key, mprime,
1239        sizeof(mprime), sig, &sigLen), WC_NO_ERR_TRACE(BAD_LENGTH_E));
1240
1241    /* Round-trip: Deterministic. */
1242    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1243    ExpectIntEQ(wc_SlhDsaKey_SignMsgDeterministic(&key, mprime,
1244        sizeof(mprime), sig, &sigLen), 0);
1245    ExpectIntEQ(wc_SlhDsaKey_VerifyMsg(&key, mprime, sizeof(mprime), sig,
1246        sigLen), 0);
1247
1248    /* SignMsgWithRandom NULL-arg checks. */
1249    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1250    ExpectIntEQ(wc_SlhDsaKey_SignMsgWithRandom(NULL, mprime, sizeof(mprime),
1251        sig, &sigLen, addRnd), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1252    ExpectIntEQ(wc_SlhDsaKey_SignMsgWithRandom(&key, mprime, sizeof(mprime),
1253        sig, &sigLen, NULL), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1254
1255    /* SignMsgWithRandom must reject sigSz smaller than params->sigLen. */
1256    sigLen = 1;
1257    ExpectIntEQ(wc_SlhDsaKey_SignMsgWithRandom(&key, mprime, sizeof(mprime),
1258        sig, &sigLen, addRnd), WC_NO_ERR_TRACE(BAD_LENGTH_E));
1259
1260    /* Round-trip: WithRandom. Reset sigLen explicitly so the test doesn't
1261     * silently rely on the previous call having set it to params->sigLen. */
1262    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1263    ExpectIntEQ(wc_SlhDsaKey_SignMsgWithRandom(&key, mprime, sizeof(mprime),
1264        sig, &sigLen, addRnd), 0);
1265    ExpectIntEQ(wc_SlhDsaKey_VerifyMsg(&key, mprime, sizeof(mprime), sig,
1266        sigLen), 0);
1267
1268    /* VerifyMsg NULL-arg checks. */
1269    ExpectIntEQ(wc_SlhDsaKey_VerifyMsg(NULL, mprime, sizeof(mprime), sig,
1270        sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1271    ExpectIntEQ(wc_SlhDsaKey_VerifyMsg(&key, NULL, sizeof(mprime), sig,
1272        sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1273    ExpectIntEQ(wc_SlhDsaKey_VerifyMsg(&key, mprime, sizeof(mprime), NULL,
1274        sigLen), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1275
1276    /* Equivalence cross-check: build M' = 0x01 || ctxSz || OID(SHA-256) ||
1277     * SHA256(orig) externally, sign it via SignMsgDeterministic, and verify
1278     * via VerifyHash with the same SHA-256 digest. Both paths must agree. */
1279    {
1280        static const byte sha256_oid[] = {
1281            0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03,
1282            0x04, 0x02, 0x01
1283        };
1284        static const byte orig[] = "Hello World!";
1285        byte digest[WC_SHA256_DIGEST_SIZE];
1286        byte built_mprime[2 + sizeof(sha256_oid) + WC_SHA256_DIGEST_SIZE];
1287        word32 idx = 0;
1288        word32 sigLen2;
1289
1290        ExpectIntEQ(wc_Sha256Hash(orig, (word32)sizeof(orig) - 1, digest), 0);
1291
1292        built_mprime[idx++] = 0x01;        /* HashSLH-DSA domain separator */
1293        built_mprime[idx++] = 0;           /* ctxSz = 0 */
1294        XMEMCPY(built_mprime + idx, sha256_oid, sizeof(sha256_oid));
1295        idx += (word32)sizeof(sha256_oid);
1296        XMEMCPY(built_mprime + idx, digest, sizeof(digest));
1297        idx += (word32)sizeof(digest);
1298
1299        sigLen = WC_SLHDSA_MAX_SIG_LEN;
1300        ExpectIntEQ(wc_SlhDsaKey_SignMsgDeterministic(&key, built_mprime,
1301            idx, sig, &sigLen), 0);
1302
1303        /* The same signature must verify via the HashSLH-DSA external API. */
1304        ExpectIntEQ(wc_SlhDsaKey_VerifyHash(&key, NULL, 0, digest,
1305            sizeof(digest), WC_HASH_TYPE_SHA256, sig, sigLen), 0);
1306
1307        /* And the deterministic HashSLH-DSA path must produce the SAME
1308         * signature bytes (this is the strongest interop check). */
1309        sigLen2 = WC_SLHDSA_MAX_SIG_LEN;
1310        {
1311            byte* sig2 = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL,
1312                DYNAMIC_TYPE_TMP_BUFFER);
1313            ExpectNotNull(sig2);
1314            ExpectIntEQ(wc_SlhDsaKey_SignHashDeterministic(&key, NULL, 0,
1315                digest, sizeof(digest), WC_HASH_TYPE_SHA256, sig2,
1316                &sigLen2), 0);
1317            ExpectIntEQ(sigLen2, sigLen);
1318            ExpectIntEQ(XMEMCMP(sig2, sig, sigLen), 0);
1319            XFREE(sig2, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1320        }
1321    }
1322
1323    wc_SlhDsaKey_Free(&key);
1324    wc_FreeRng(&rng);
1325    XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1326#endif
1327    return EXPECT_RESULT();
1328}
1329
1330/*
1331 * Test export and import for SLH-DSA keys.
1332 */
1333int test_wc_slhdsa_export_import(void)
1334{
1335    EXPECT_DECLS;
1336#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
1337    SlhDsaKey key;
1338    SlhDsaKey key2;
1339    WC_RNG rng;
1340    byte* privKey = NULL;
1341    byte* pubKey = NULL;
1342    word32 privKeyLen;
1343    word32 expPrivKeyLen;
1344    word32 pubKeyLen;
1345    word32 expPubKeyLen;
1346    byte msg[64];
1347    byte* sig = NULL;
1348    word32 sigLen;
1349    byte ctx[10];
1350
1351    privKey = (byte*)XMALLOC(WC_SLHDSA_MAX_PRIV_LEN, NULL,
1352        DYNAMIC_TYPE_TMP_BUFFER);
1353    ExpectNotNull(privKey);
1354    pubKey = (byte*)XMALLOC(WC_SLHDSA_MAX_PUB_LEN, NULL,
1355        DYNAMIC_TYPE_TMP_BUFFER);
1356    ExpectNotNull(pubKey);
1357    sig = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1358    ExpectNotNull(sig);
1359
1360    XMEMSET(&rng, 0, sizeof(WC_RNG));
1361    XMEMSET(msg, 0xAA, sizeof(msg));
1362    XMEMSET(ctx, 0x01, sizeof(ctx));
1363
1364    ExpectIntEQ(wc_InitRng(&rng), 0);
1365
1366    /* Test NULL parameter handling for export functions. */
1367    privKeyLen = WC_SLHDSA_MAX_PRIV_LEN;
1368    pubKeyLen = WC_SLHDSA_MAX_PUB_LEN;
1369    ExpectIntEQ(wc_SlhDsaKey_ExportPrivate(NULL, privKey, &privKeyLen),
1370        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1371    ExpectIntEQ(wc_SlhDsaKey_ExportPublic(NULL, pubKey, &pubKeyLen),
1372        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1373
1374    /* Test NULL parameter handling for import functions. */
1375    ExpectIntEQ(wc_SlhDsaKey_ImportPrivate(NULL, privKey, privKeyLen),
1376        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1377    ExpectIntEQ(wc_SlhDsaKey_ImportPublic(NULL, pubKey, pubKeyLen),
1378        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1379
1380    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1381        INVALID_DEVID), 0);
1382    expPrivKeyLen = TEST_SLHDSA_DEFAULT_PRIV_LEN;
1383    expPubKeyLen = TEST_SLHDSA_DEFAULT_PUB_LEN;
1384    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
1385
1386    /* Test export with NULL buffer. */
1387    ExpectIntEQ(wc_SlhDsaKey_ExportPrivate(&key, NULL, &privKeyLen),
1388        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1389    ExpectIntEQ(wc_SlhDsaKey_ExportPrivate(&key, privKey, NULL),
1390        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1391    ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&key, NULL, &pubKeyLen),
1392        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1393    ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&key, pubKey, NULL),
1394        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1395
1396    /* Test export with buffer too small. */
1397    privKeyLen = 10;
1398    ExpectIntEQ(wc_SlhDsaKey_ExportPrivate(&key, privKey, &privKeyLen),
1399        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1400    pubKeyLen = 10;
1401    ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&key, pubKey, &pubKeyLen),
1402        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1403
1404    /* Test successful export. */
1405    privKeyLen = WC_SLHDSA_MAX_PRIV_LEN;
1406    ExpectIntEQ(wc_SlhDsaKey_ExportPrivate(&key, privKey, &privKeyLen), 0);
1407    ExpectIntEQ(privKeyLen, expPrivKeyLen);
1408
1409    pubKeyLen = WC_SLHDSA_MAX_PUB_LEN;
1410    ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&key, pubKey, &pubKeyLen), 0);
1411    ExpectIntEQ(pubKeyLen, expPubKeyLen);
1412
1413    /* Sign with original key. */
1414    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1415    ExpectIntEQ(wc_SlhDsaKey_Sign(&key, ctx, sizeof(ctx), msg, sizeof(msg),
1416        sig, &sigLen, &rng), 0);
1417
1418    /* Test import into new key and verify. */
1419    ExpectIntEQ(wc_SlhDsaKey_Init(&key2, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1420        INVALID_DEVID), 0);
1421
1422    /* Test import with NULL data. */
1423    ExpectIntEQ(wc_SlhDsaKey_ImportPrivate(&key2, NULL, privKeyLen),
1424        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1425    ExpectIntEQ(wc_SlhDsaKey_ImportPublic(&key2, NULL, pubKeyLen),
1426        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1427
1428    /* Test import with wrong size. */
1429    ExpectIntEQ(wc_SlhDsaKey_ImportPrivate(&key2, privKey, 10),
1430        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1431    ExpectIntEQ(wc_SlhDsaKey_ImportPublic(&key2, pubKey, 10),
1432        WC_NO_ERR_TRACE(BAD_LENGTH_E));
1433
1434    /* Test successful import of public key only. */
1435    ExpectIntEQ(wc_SlhDsaKey_ImportPublic(&key2, pubKey, pubKeyLen), 0);
1436    /* Verify with imported public key. */
1437    ExpectIntEQ(wc_SlhDsaKey_Verify(&key2, ctx, sizeof(ctx), msg, sizeof(msg),
1438        sig, sigLen), 0);
1439    wc_SlhDsaKey_Free(&key2);
1440
1441    /* Test import of private key. */
1442    ExpectIntEQ(wc_SlhDsaKey_Init(&key2, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1443        INVALID_DEVID), 0);
1444    ExpectIntEQ(wc_SlhDsaKey_ImportPrivate(&key2, privKey, privKeyLen), 0);
1445    /* Sign with imported key. */
1446    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1447    ExpectIntEQ(wc_SlhDsaKey_Sign(&key2, ctx, sizeof(ctx), msg, sizeof(msg),
1448        sig, &sigLen, &rng), 0);
1449    /* Verify with original key. */
1450    ExpectIntEQ(wc_SlhDsaKey_Verify(&key, ctx, sizeof(ctx), msg, sizeof(msg),
1451        sig, sigLen), 0);
1452
1453    wc_SlhDsaKey_Free(&key2);
1454    wc_SlhDsaKey_Free(&key);
1455
1456    wc_FreeRng(&rng);
1457    XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1458    XFREE(pubKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1459    XFREE(privKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1460#endif /* WOLFSSL_HAVE_SLHDSA */
1461    return EXPECT_RESULT();
1462}
1463
1464/*
1465 * Test key check for SLH-DSA.
1466 */
1467int test_wc_slhdsa_check_key(void)
1468{
1469    EXPECT_DECLS;
1470#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
1471    SlhDsaKey key;
1472    WC_RNG rng;
1473    byte* privKey = NULL;
1474    byte* pubKey = NULL;
1475    word32 privKeyLen;
1476    word32 pubKeyLen;
1477
1478    privKey = (byte*)XMALLOC(WC_SLHDSA_MAX_PRIV_LEN, NULL,
1479        DYNAMIC_TYPE_TMP_BUFFER);
1480    ExpectNotNull(privKey);
1481    pubKey = (byte*)XMALLOC(WC_SLHDSA_MAX_PUB_LEN, NULL,
1482        DYNAMIC_TYPE_TMP_BUFFER);
1483    ExpectNotNull(pubKey);
1484
1485    XMEMSET(&rng, 0, sizeof(WC_RNG));
1486    ExpectIntEQ(wc_InitRng(&rng), 0);
1487
1488    /* Test NULL parameter handling. */
1489    ExpectIntEQ(wc_SlhDsaKey_CheckKey(NULL), WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1490
1491    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1492        INVALID_DEVID), 0);
1493    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&key, &rng), 0);
1494
1495    /* Test check of valid key. */
1496    ExpectIntEQ(wc_SlhDsaKey_CheckKey(&key), 0);
1497
1498    /* Export keys. */
1499    privKeyLen = WC_SLHDSA_MAX_PRIV_LEN;
1500    ExpectIntEQ(wc_SlhDsaKey_ExportPrivate(&key, privKey, &privKeyLen), 0);
1501    pubKeyLen = WC_SLHDSA_MAX_PUB_LEN;
1502    ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&key, pubKey, &pubKeyLen), 0);
1503
1504    wc_SlhDsaKey_Free(&key);
1505
1506    /* Test check with only public key imported - requires private key. */
1507    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1508        INVALID_DEVID), 0);
1509    ExpectIntEQ(wc_SlhDsaKey_ImportPublic(&key, pubKey, pubKeyLen), 0);
1510    /* CheckKey requires a private key to validate. */
1511    ExpectIntEQ(wc_SlhDsaKey_CheckKey(&key), WC_NO_ERR_TRACE(MISSING_KEY));
1512    wc_SlhDsaKey_Free(&key);
1513
1514    /* Test check with only private key imported. */
1515    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1516        INVALID_DEVID), 0);
1517    ExpectIntEQ(wc_SlhDsaKey_ImportPrivate(&key, privKey, privKeyLen), 0);
1518    ExpectIntEQ(wc_SlhDsaKey_CheckKey(&key), 0);
1519    wc_SlhDsaKey_Free(&key);
1520
1521    /* Test check with both keys imported. */
1522    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1523        INVALID_DEVID), 0);
1524    ExpectIntEQ(wc_SlhDsaKey_ImportPublic(&key, pubKey, pubKeyLen), 0);
1525    ExpectIntEQ(wc_SlhDsaKey_ImportPrivate(&key, privKey, privKeyLen), 0);
1526    ExpectIntEQ(wc_SlhDsaKey_CheckKey(&key), 0);
1527
1528    key.sk[0] ^= 0x01;
1529    ExpectIntEQ(wc_SlhDsaKey_CheckKey(&key),
1530        WC_NO_ERR_TRACE(WC_KEY_MISMATCH_E));
1531    wc_SlhDsaKey_Free(&key);
1532
1533    /* Regression: Private-then-Public order. ImportPrivate sets
1534     * flags = WC_SLHDSA_FLAG_BOTH_KEYS; if ImportPublic clobbered flags
1535     * with `=` instead of `|=`, the FLAG_PRIVATE bit would be dropped and
1536     * CheckKey would return MISSING_KEY. */
1537    ExpectIntEQ(wc_SlhDsaKey_Init(&key, TEST_SLHDSA_DEFAULT_PARAM, NULL,
1538        INVALID_DEVID), 0);
1539    ExpectIntEQ(wc_SlhDsaKey_ImportPrivate(&key, privKey, privKeyLen), 0);
1540    ExpectIntEQ(wc_SlhDsaKey_ImportPublic(&key, pubKey, pubKeyLen), 0);
1541    ExpectIntEQ(wc_SlhDsaKey_CheckKey(&key), 0);
1542    wc_SlhDsaKey_Free(&key);
1543
1544    wc_FreeRng(&rng);
1545    XFREE(pubKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1546    XFREE(privKey, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1547#endif /* WOLFSSL_HAVE_SLHDSA */
1548    return EXPECT_RESULT();
1549}
1550
1551#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
1552    defined(WC_ENABLE_ASYM_KEY_EXPORT)
1553/* Round-trip a single SLH-DSA parameter set through the DER codec:
1554 * generate -> KeyToDer -> PrivateKeyDecode -> sign/verify round-trip.
1555 * Also tests PublicKeyToDer -> PublicKeyDecode, and that the decode
1556 * correctly auto-detects the parameter set from the OID. */
1557static int slhdsa_der_roundtrip_one(enum SlhDsaParam param)
1558{
1559    EXPECT_DECLS;
1560    SlhDsaKey keyGen;
1561    SlhDsaKey keyPriv;
1562    SlhDsaKey keyPub;
1563    WC_RNG rng;
1564    byte* derBuf = NULL;
1565    byte* sig = NULL;
1566    const word32 derBufSz = 16 * 1024;
1567    word32 derLen = 0; /* initialize to suppress false -Wmaybe-uninitialized */
1568    word32 idx;
1569    word32 sigLen;
1570    enum SlhDsaParam placeholder = param;
1571    static const byte msg[] = "SLH-DSA DER round-trip";
1572    static const enum SlhDsaParam candidates[] = {
1573        SLHDSA_SHAKE256S, SLHDSA_SHAKE128F, SLHDSA_SHAKE192S,
1574        SLHDSA_SHAKE192F, SLHDSA_SHAKE256F, SLHDSA_SHAKE128S,
1575    #ifdef WOLFSSL_SLHDSA_SHA2
1576        SLHDSA_SHA2_128S, SLHDSA_SHA2_128F, SLHDSA_SHA2_192S,
1577        SLHDSA_SHA2_192F, SLHDSA_SHA2_256S, SLHDSA_SHA2_256F,
1578    #endif
1579    };
1580    size_t cIdx;
1581
1582    /* Pick a placeholder different from the encoded param so a regression
1583     * that disables OID auto-detection would fail the post-decode equality
1584     * check. Walk the candidate list and probe each via wc_SlhDsaKey_Init;
1585     * the first one that initialises successfully (i.e. is compiled in) is
1586     * used. Falls back to the encoded param if no other variant is
1587     * available, in which case the test reduces to a smoke check. */
1588    for (cIdx = 0; cIdx < sizeof(candidates)/sizeof(candidates[0]); cIdx++) {
1589        SlhDsaKey probe;
1590        if (candidates[cIdx] == param) {
1591            continue;
1592        }
1593        XMEMSET(&probe, 0, sizeof(probe));
1594        if (wc_SlhDsaKey_Init(&probe, candidates[cIdx], NULL,
1595                              INVALID_DEVID) == 0) {
1596            placeholder = candidates[cIdx];
1597            wc_SlhDsaKey_Free(&probe);
1598            break;
1599        }
1600    }
1601
1602    XMEMSET(&rng, 0, sizeof(rng));
1603    XMEMSET(&keyGen, 0, sizeof(keyGen));
1604    XMEMSET(&keyPriv, 0, sizeof(keyPriv));
1605    XMEMSET(&keyPub, 0, sizeof(keyPub));
1606
1607    derBuf = (byte*)XMALLOC(derBufSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1608    ExpectNotNull(derBuf);
1609    sig = (byte*)XMALLOC(WC_SLHDSA_MAX_SIG_LEN, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1610    ExpectNotNull(sig);
1611
1612    ExpectIntEQ(wc_InitRng(&rng), 0);
1613    ExpectIntEQ(wc_SlhDsaKey_Init(&keyGen, param, NULL, INVALID_DEVID), 0);
1614    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&keyGen, &rng), 0);
1615
1616    /* Size-query contract: passing output=NULL returns the encoded size
1617     * without touching the buffer. The real encode below must produce
1618     * exactly this many bytes -- a size-query regression (e.g. forgetting
1619     * to add verSz) would surface here as a mismatch. */
1620    {
1621        int querySize;
1622        ExpectIntGT(querySize = wc_SlhDsaKey_KeyToDer(&keyGen, NULL, 0), 0);
1623        ExpectIntGT(derLen = (word32)wc_SlhDsaKey_KeyToDer(&keyGen, derBuf,
1624            derBufSz), 0);
1625        ExpectIntEQ((int)derLen, querySize);
1626
1627        /* BUFFER_E contract: too-small buffer is rejected without writing
1628         * anything past the limit. Pass inLen = querySize - 1 so the
1629         * length check fails for any encoding. */
1630        ExpectIntEQ(wc_SlhDsaKey_KeyToDer(&keyGen, derBuf,
1631            (word32)(querySize - 1)), WC_NO_ERR_TRACE(BUFFER_E));
1632
1633        /* PrivateKeyToDer is an RFC 9909 alias of KeyToDer; sizes must
1634         * match and BUFFER_E must propagate. */
1635        ExpectIntEQ(wc_SlhDsaKey_PrivateKeyToDer(&keyGen, NULL, 0), querySize);
1636        ExpectIntEQ(wc_SlhDsaKey_PrivateKeyToDer(&keyGen, derBuf,
1637            (word32)(querySize - 1)), WC_NO_ERR_TRACE(BUFFER_E));
1638    }
1639
1640    /* Decode into a fresh key.  The decode must auto-detect the real
1641     * parameter set from the OID embedded in the DER encoding. */
1642    ExpectIntEQ(wc_SlhDsaKey_Init(&keyPriv, placeholder, NULL, INVALID_DEVID),
1643        0);
1644    idx = 0;
1645    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(derBuf, &idx, &keyPriv, derLen),
1646        0);
1647    /* Verify the decoded key reports the ORIGINAL parameter set. */
1648    if (keyPriv.params != NULL) {
1649        ExpectIntEQ((int)keyPriv.params->param, (int)param);
1650    }
1651    /* Byte-level equivalence check: re-encode the decoded private key
1652     * and compare against the original DER. This catches a regression
1653     * even in single-variant builds where placeholder == param made the
1654     * params equality test above tautological -- if the decoder ignored
1655     * the OID and kept stale state, the bytes won't match. */
1656    {
1657        byte* roundBuf = (byte*)XMALLOC(derBufSz, NULL,
1658            DYNAMIC_TYPE_TMP_BUFFER);
1659        word32 roundLen;
1660        ExpectNotNull(roundBuf);
1661        ExpectIntGT(roundLen = (word32)wc_SlhDsaKey_KeyToDer(&keyPriv,
1662            roundBuf, derBufSz), 0);
1663        ExpectIntEQ((int)roundLen, (int)derLen);
1664        if (roundBuf != NULL) {
1665            ExpectIntEQ(XMEMCMP(roundBuf, derBuf, roundLen), 0);
1666        }
1667        XFREE(roundBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1668    }
1669
1670    /* Sign with the decoded private key and verify with the originally
1671     * generated key. This proves the decoded key material is correct. */
1672    sigLen = WC_SLHDSA_MAX_SIG_LEN;
1673    ExpectIntEQ(wc_SlhDsaKey_Sign(&keyPriv, NULL, 0, msg, (word32)sizeof(msg),
1674        sig, &sigLen, &rng), 0);
1675    ExpectIntEQ(wc_SlhDsaKey_Verify(&keyGen, NULL, 0, msg, (word32)sizeof(msg),
1676        sig, sigLen), 0);
1677
1678    /* Also test PrivateKeyToDer -> PrivateKeyDecode round-trip. */
1679    {
1680        SlhDsaKey keyPriv2;
1681        word32 derLen2;
1682        word32 idx2 = 0;
1683        XMEMSET(&keyPriv2, 0, sizeof(keyPriv2));
1684        ExpectIntGT(derLen2 = (word32)wc_SlhDsaKey_PrivateKeyToDer(&keyGen,
1685            derBuf, derBufSz), 0);
1686        ExpectIntEQ(wc_SlhDsaKey_Init(&keyPriv2, placeholder, NULL,
1687            INVALID_DEVID), 0);
1688        ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(derBuf, &idx2, &keyPriv2,
1689            derLen2), 0);
1690        /* Verify the PrivateKeyToDer output matches KeyToDer. */
1691        sigLen = WC_SLHDSA_MAX_SIG_LEN;
1692        ExpectIntEQ(wc_SlhDsaKey_Sign(&keyPriv2, NULL, 0, msg,
1693            (word32)sizeof(msg), sig, &sigLen, &rng), 0);
1694        ExpectIntEQ(wc_SlhDsaKey_Verify(&keyGen, NULL, 0, msg,
1695            (word32)sizeof(msg), sig, sigLen), 0);
1696        wc_SlhDsaKey_Free(&keyPriv2);
1697    }
1698
1699    /* PKCS#8 v2 (RFC 5958) acceptance: the decoder explicitly allows
1700     * version=0 or version=1. The encoder only ever writes version=0,
1701     * so without a targeted check the v=1 branch would never fire and a
1702     * regression that rejected v2 wrappers (legal RFC 5958 OneAsymmetricKey
1703     * input from external tools) would slip through. Walk past the outer
1704     * SEQUENCE header (which uses short or long-form length depending on
1705     * the parameter set's encoded size) to land on the INTEGER version
1706     * field, then flip its value from 0 to 1. */
1707    {
1708        SlhDsaKey keyPrivV2;
1709        word32 idxV2 = 0;
1710        word32 verPos;
1711        byte saved;
1712
1713        XMEMSET(&keyPrivV2, 0, sizeof(keyPrivV2));
1714        ExpectIntGT((int)derLen, 5);
1715        ExpectIntEQ((int)derBuf[0], 0x30); /* outer SEQUENCE tag */
1716        if ((derBuf[1] & 0x80) == 0) {
1717            verPos = 2;                       /* short-form length */
1718        }
1719        else {
1720            verPos = 2 + (derBuf[1] & 0x7F);  /* long-form length */
1721        }
1722        ExpectIntLT((int)verPos + 3, (int)derLen);
1723        ExpectIntEQ((int)derBuf[verPos], 0x02);     /* INTEGER tag */
1724        ExpectIntEQ((int)derBuf[verPos + 1], 0x01); /* INTEGER length */
1725        ExpectIntEQ((int)derBuf[verPos + 2], 0x00); /* v0 baseline */
1726        saved = derBuf[verPos + 2];
1727        derBuf[verPos + 2] = 0x01;
1728
1729        ExpectIntEQ(wc_SlhDsaKey_Init(&keyPrivV2, placeholder, NULL,
1730            INVALID_DEVID), 0);
1731        ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(derBuf, &idxV2, &keyPrivV2,
1732            derLen), 0);
1733        if (keyPrivV2.params != NULL) {
1734            ExpectIntEQ((int)keyPrivV2.params->param, (int)param);
1735        }
1736        /* Confirm the v2-decoded private material is functionally
1737         * identical: a signature it produces verifies under keyGen. */
1738        sigLen = WC_SLHDSA_MAX_SIG_LEN;
1739        ExpectIntEQ(wc_SlhDsaKey_Sign(&keyPrivV2, NULL, 0, msg,
1740            (word32)sizeof(msg), sig, &sigLen, &rng), 0);
1741        ExpectIntEQ(wc_SlhDsaKey_Verify(&keyGen, NULL, 0, msg,
1742            (word32)sizeof(msg), sig, sigLen), 0);
1743        derBuf[verPos + 2] = saved;
1744        wc_SlhDsaKey_Free(&keyPrivV2);
1745    }
1746
1747    /* Now round-trip the public key alone, with size-query and BUFFER_E
1748     * contract checks for both withAlg modes. */
1749    {
1750        int querySpki, queryRaw;
1751        byte rawPub[WC_SLHDSA_MAX_PUB_LEN];
1752        word32 rawPubLen = (word32)sizeof(rawPub);
1753
1754        /* withAlg=1: full SubjectPublicKeyInfo (used by certificate code). */
1755        ExpectIntGT(querySpki = wc_SlhDsaKey_PublicKeyToDer(&keyGen, NULL, 0,
1756            1), 0);
1757        ExpectIntGT(derLen = (word32)wc_SlhDsaKey_PublicKeyToDer(&keyGen,
1758            derBuf, derBufSz, 1), 0);
1759        ExpectIntEQ((int)derLen, querySpki);
1760        ExpectIntEQ(wc_SlhDsaKey_PublicKeyToDer(&keyGen, derBuf,
1761            (word32)(querySpki - 1), 1), WC_NO_ERR_TRACE(BUFFER_E));
1762
1763        /* withAlg=0: raw 2*n public-key bytes only -- this is the path
1764         * SetKeyIdFromPublicKey in asn.c walks when computing SKID/AKID
1765         * for SLH-DSA certificates. Verify the bytes match what
1766         * ExportPublic produces so a regression in this branch (e.g.
1767         * accidentally emitting the SPKI envelope, or returning the
1768         * wrong length) breaks the test rather than silently corrupting
1769         * key identifiers in issued certs. */
1770        ExpectIntGT(queryRaw = wc_SlhDsaKey_PublicKeyToDer(&keyGen, NULL, 0,
1771            0), 0);
1772        ExpectIntEQ(queryRaw, (int)(2 * keyGen.params->n));
1773        ExpectIntGT(wc_SlhDsaKey_PublicKeyToDer(&keyGen, derBuf, derBufSz, 0),
1774            0);
1775        ExpectIntEQ(wc_SlhDsaKey_PublicKeyToDer(&keyGen, derBuf,
1776            (word32)(queryRaw - 1), 0), WC_NO_ERR_TRACE(BUFFER_E));
1777
1778        ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&keyGen, rawPub, &rawPubLen), 0);
1779        ExpectIntEQ((int)rawPubLen, queryRaw);
1780        ExpectIntEQ(XMEMCMP(derBuf, rawPub, rawPubLen), 0);
1781
1782        /* Re-encode the SPKI so the decode test below sees the
1783         * withAlg=1 buffer (raw output above is not decodable as SPKI). */
1784        ExpectIntGT(derLen = (word32)wc_SlhDsaKey_PublicKeyToDer(&keyGen,
1785            derBuf, derBufSz, 1), 0);
1786    }
1787
1788    ExpectIntEQ(wc_SlhDsaKey_Init(&keyPub, placeholder, NULL, INVALID_DEVID),
1789        0);
1790    idx = 0;
1791    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(derBuf, &idx, &keyPub, derLen), 0);
1792    if (keyPub.params != NULL) {
1793        ExpectIntEQ((int)keyPub.params->param, (int)param);
1794    }
1795    /* The decoded public key should verify the signature we just produced. */
1796    ExpectIntEQ(wc_SlhDsaKey_Verify(&keyPub, NULL, 0, msg, (word32)sizeof(msg),
1797        sig, sigLen), 0);
1798
1799    wc_SlhDsaKey_Free(&keyPub);
1800    wc_SlhDsaKey_Free(&keyPriv);
1801    wc_SlhDsaKey_Free(&keyGen);
1802    wc_FreeRng(&rng);
1803    XFREE(sig, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1804    XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
1805
1806    return EXPECT_RESULT();
1807}
1808#endif
1809
1810/*
1811 * DER codec round-trip test: encode each compiled-in SLH-DSA parameter set
1812 * to DER, decode it (without telling the decoder which parameter set it is),
1813 * confirm auto-detect produces the right parameter, and verify a signature
1814 * produced with the decoded key. This test would fail if PrivateKeyDecode
1815 * / PublicKeyDecode did not auto-detect the parameter set from the OID.
1816 */
1817int test_wc_slhdsa_der_roundtrip(void)
1818{
1819    EXPECT_DECLS;
1820#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
1821    defined(WC_ENABLE_ASYM_KEY_EXPORT)
1822#ifdef WOLFSSL_SLHDSA_PARAM_128S
1823    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHAKE128S), TEST_SUCCESS);
1824#endif
1825#ifdef WOLFSSL_SLHDSA_PARAM_128F
1826    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHAKE128F), TEST_SUCCESS);
1827#endif
1828#ifdef WOLFSSL_SLHDSA_PARAM_192S
1829    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHAKE192S), TEST_SUCCESS);
1830#endif
1831#ifdef WOLFSSL_SLHDSA_PARAM_192F
1832    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHAKE192F), TEST_SUCCESS);
1833#endif
1834#ifdef WOLFSSL_SLHDSA_PARAM_256S
1835    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHAKE256S), TEST_SUCCESS);
1836#endif
1837#ifdef WOLFSSL_SLHDSA_PARAM_256F
1838    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHAKE256F), TEST_SUCCESS);
1839#endif
1840#ifdef WOLFSSL_SLHDSA_SHA2
1841#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128S
1842    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHA2_128S), TEST_SUCCESS);
1843#endif
1844#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128F
1845    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHA2_128F), TEST_SUCCESS);
1846#endif
1847#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192S
1848    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHA2_192S), TEST_SUCCESS);
1849#endif
1850#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192F
1851    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHA2_192F), TEST_SUCCESS);
1852#endif
1853#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256S
1854    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHA2_256S), TEST_SUCCESS);
1855#endif
1856#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256F
1857    ExpectIntEQ(slhdsa_der_roundtrip_one(SLHDSA_SHA2_256F), TEST_SUCCESS);
1858#endif
1859#endif /* WOLFSSL_SLHDSA_SHA2 */
1860#endif /* WOLFSSL_HAVE_SLHDSA && !VERIFY_ONLY && WC_ENABLE_ASYM_KEY_EXPORT */
1861    return EXPECT_RESULT();
1862}
1863
1864/*
1865 * Negative / error-path tests for the DER encode/decode functions.
1866 */
1867int test_wc_slhdsa_der_negative(void)
1868{
1869    EXPECT_DECLS;
1870#ifdef WOLFSSL_HAVE_SLHDSA
1871    SlhDsaKey key;
1872    word32 idx;
1873    byte buf[16];
1874
1875    XMEMSET(&key, 0, sizeof(key));
1876
1877    /* PrivateKeyDecode: NULL parameters */
1878#ifndef WOLFSSL_SLHDSA_VERIFY_ONLY
1879    idx = 0;
1880    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(NULL, &idx, &key, 10),
1881        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1882    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(buf, NULL, &key, 10),
1883        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1884    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(buf, &idx, NULL, 10),
1885        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1886    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(buf, &idx, &key, 0),
1887        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1888    /* PrivateKeyDecode: truncated data */
1889    idx = 0;
1890    XMEMSET(buf, 0, sizeof(buf));
1891    ExpectIntNE(wc_SlhDsaKey_PrivateKeyDecode(buf, &idx, &key, sizeof(buf)), 0);
1892#endif
1893
1894    /* PublicKeyDecode: NULL parameters */
1895    idx = 0;
1896    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(NULL, &idx, &key, 10),
1897        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1898    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(buf, NULL, &key, 10),
1899        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1900    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(buf, &idx, NULL, 10),
1901        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1902    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(buf, &idx, &key, 0),
1903        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1904
1905#if defined(WC_ENABLE_ASYM_KEY_EXPORT) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
1906    /* KeyToDer / PrivateKeyToDer: NULL key */
1907    ExpectIntEQ(wc_SlhDsaKey_KeyToDer(NULL, buf, sizeof(buf)),
1908        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1909    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyToDer(NULL, buf, sizeof(buf)),
1910        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1911
1912    /* KeyToDer: public-only key should return MISSING_KEY. Build the
1913     * public-only state through the public API (generate a key, export
1914     * the public part, import it into a fresh key) rather than poking
1915     * key->flags directly. */
1916#ifdef WOLFSSL_SLHDSA_PARAM_128S
1917    {
1918        SlhDsaKey srcKey;
1919        SlhDsaKey pubOnly;
1920        WC_RNG rng;
1921        byte pub[WC_SLHDSA_MAX_PUB_LEN];
1922        word32 pubLen = (word32)sizeof(pub);
1923
1924        XMEMSET(&srcKey, 0, sizeof(srcKey));
1925        XMEMSET(&pubOnly, 0, sizeof(pubOnly));
1926        XMEMSET(&rng, 0, sizeof(rng));
1927
1928        ExpectIntEQ(wc_InitRng(&rng), 0);
1929        ExpectIntEQ(wc_SlhDsaKey_Init(&srcKey, SLHDSA_SHAKE128S, NULL,
1930            INVALID_DEVID), 0);
1931        ExpectIntEQ(wc_SlhDsaKey_MakeKey(&srcKey, &rng), 0);
1932        ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&srcKey, pub, &pubLen), 0);
1933
1934        ExpectIntEQ(wc_SlhDsaKey_Init(&pubOnly, SLHDSA_SHAKE128S, NULL,
1935            INVALID_DEVID), 0);
1936        ExpectIntEQ(wc_SlhDsaKey_ImportPublic(&pubOnly, pub, pubLen), 0);
1937        ExpectIntEQ(wc_SlhDsaKey_KeyToDer(&pubOnly, NULL, 0),
1938            WC_NO_ERR_TRACE(MISSING_KEY));
1939        ExpectIntEQ(wc_SlhDsaKey_PrivateKeyToDer(&pubOnly, NULL, 0),
1940            WC_NO_ERR_TRACE(MISSING_KEY));
1941        wc_SlhDsaKey_Free(&pubOnly);
1942        wc_SlhDsaKey_Free(&srcKey);
1943        wc_FreeRng(&rng);
1944    }
1945#endif
1946#endif /* WC_ENABLE_ASYM_KEY_EXPORT && !VERIFY_ONLY */
1947
1948    /* PublicKeyToDer: NULL key */
1949#ifdef WC_ENABLE_ASYM_KEY_EXPORT
1950    ExpectIntEQ(wc_SlhDsaKey_PublicKeyToDer(NULL, buf, sizeof(buf), 1),
1951        WC_NO_ERR_TRACE(BAD_FUNC_ARG));
1952#endif
1953
1954    /* RFC 5958 OneAsymmetricKey trailing-field validation:
1955     *   [0] IMPLICIT Attributes  OPTIONAL  -- at most once
1956     *   [1] IMPLICIT PublicKey   OPTIONAL  -- at most once, after [0]
1957     * The decoder must reject duplicates, out-of-order tags, and
1958     * unrecognised tags. Build a valid SHAKE128S DER then mutate it. */
1959#if defined(WC_ENABLE_ASYM_KEY_EXPORT) && \
1960    !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
1961    defined(WOLFSSL_SLHDSA_PARAM_128S)
1962    {
1963        SlhDsaKey srcKey;
1964        WC_RNG rng;
1965        byte goodDer[256];
1966        int goodLen = 0;
1967        size_t i;
1968        struct {
1969            const byte* trailing;
1970            word32      trailingLen;
1971            int         expectAccept; /* 0 = expect ASN_PARSE_E */
1972            const char* desc;
1973        } cases[5];
1974        const byte tDupAttr[]   = { 0xA0, 0x00, 0xA0, 0x00 };
1975        const byte tDupPub[]    = { 0xA1, 0x00, 0xA1, 0x00 };
1976        const byte tOutOfOrder[]= { 0xA1, 0x00, 0xA0, 0x00 };
1977        const byte tUnknown[]   = { 0xA2, 0x00 };
1978        const byte tValidAttr[] = { 0xA0, 0x00 };
1979
1980        cases[0].trailing = tDupAttr;
1981        cases[0].trailingLen = (word32)sizeof(tDupAttr);
1982        cases[0].expectAccept = 0;
1983        cases[0].desc = "duplicate [0] attributes";
1984        cases[1].trailing = tDupPub;
1985        cases[1].trailingLen = (word32)sizeof(tDupPub);
1986        cases[1].expectAccept = 0;
1987        cases[1].desc = "duplicate [1] publicKey";
1988        cases[2].trailing = tOutOfOrder;
1989        cases[2].trailingLen = (word32)sizeof(tOutOfOrder);
1990        cases[2].expectAccept = 0;
1991        cases[2].desc = "[1] before [0]";
1992        cases[3].trailing = tUnknown;
1993        cases[3].trailingLen = (word32)sizeof(tUnknown);
1994        cases[3].expectAccept = 0;
1995        cases[3].desc = "unknown context tag [2]";
1996        /* Sanity: a single [0] is permitted -- if this rejects, the
1997         * tightening above is overzealous and the four rejection cases
1998         * are testing nothing useful. */
1999        cases[4].trailing = tValidAttr;
2000        cases[4].trailingLen = (word32)sizeof(tValidAttr);
2001        cases[4].expectAccept = 1;
2002        cases[4].desc = "single [0] attributes (accepted)";
2003
2004        XMEMSET(&srcKey, 0, sizeof(srcKey));
2005        XMEMSET(&rng, 0, sizeof(rng));
2006        ExpectIntEQ(wc_InitRng(&rng), 0);
2007        ExpectIntEQ(wc_SlhDsaKey_Init(&srcKey, SLHDSA_SHAKE128S, NULL,
2008            INVALID_DEVID), 0);
2009        ExpectIntEQ(wc_SlhDsaKey_MakeKey(&srcKey, &rng), 0);
2010        ExpectIntGT(goodLen = wc_SlhDsaKey_KeyToDer(&srcKey, goodDer,
2011            sizeof(goodDer)), 0);
2012
2013        /* The mutator below tweaks goodDer[1] (length byte) in place,
2014         * which only works if the encoder used short-form SEQUENCE
2015         * length. SHAKE128S body is ~82 bytes so this holds, but assert
2016         * it so a future encoder change surfaces here rather than
2017         * silently producing buffers that decode despite the mutation. */
2018        ExpectIntEQ((int)goodDer[0], 0x30);
2019        ExpectIntLT((int)goodDer[1], 0x80);
2020        ExpectIntLT((int)goodDer[1] + 4, 0x80);
2021
2022        for (i = 0; i < sizeof(cases)/sizeof(cases[0]); i++) {
2023            byte mut[260];
2024            word32 mutLen;
2025            word32 idx2 = 0;
2026            SlhDsaKey k;
2027            int decRet;
2028            XMEMSET(&k, 0, sizeof(k));
2029            XMEMCPY(mut, goodDer, (size_t)goodLen);
2030            XMEMCPY(mut + goodLen, cases[i].trailing, cases[i].trailingLen);
2031            mutLen = (word32)goodLen + cases[i].trailingLen;
2032            mut[1] = (byte)(goodDer[1] + cases[i].trailingLen);
2033            ExpectIntEQ(wc_SlhDsaKey_Init(&k, SLHDSA_SHAKE128S, NULL,
2034                INVALID_DEVID), 0);
2035            decRet = wc_SlhDsaKey_PrivateKeyDecode(mut, &idx2, &k, mutLen);
2036            if (cases[i].expectAccept) {
2037                ExpectIntEQ(decRet, 0);
2038            }
2039            else {
2040                ExpectIntEQ(decRet, WC_NO_ERR_TRACE(ASN_PARSE_E));
2041            }
2042            (void)cases[i].desc;
2043            wc_SlhDsaKey_Free(&k);
2044        }
2045
2046        wc_SlhDsaKey_Free(&srcKey);
2047        wc_FreeRng(&rng);
2048    }
2049#endif /* WC_ENABLE_ASYM_KEY_EXPORT && !VERIFY_ONLY && PARAM_128S */
2050
2051#endif /* WOLFSSL_HAVE_SLHDSA */
2052    return EXPECT_RESULT();
2053}
2054
2055#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
2056    !defined(NO_FILESYSTEM)
2057/* Load an RFC 9909 compliant DER file from disk and confirm that
2058 * wc_SlhDsaKey_PrivateKeyDecode accepts it, auto-detects the parameter
2059 * set from the OID, and produces a usable signing key. This test
2060 * exercises the on-disk certs/slhdsa/ fixtures - any future file-format
2061 * drift (nested wrapper, seed-only, wrong length) will be caught here. */
2062/* doSign=0 skips the sign/verify smoke check; the 192s and 256s parameter
2063 * sets are slow enough (multi-second per Sign) that running them on every
2064 * make-check would balloon test time. The decoder is still exercised. */
2065static int slhdsa_decode_file_one(const char *path, enum SlhDsaParam expected,
2066    int doSign)
2067{
2068    EXPECT_DECLS;
2069    XFILE f = XBADFILE;
2070    byte der[256];
2071    int derSz = 0;
2072    SlhDsaKey key;
2073    WC_RNG rng;
2074    word32 idx = 0;
2075    byte sig[WC_SLHDSA_MAX_SIG_LEN];
2076    word32 sigLen = (word32)sizeof(sig);
2077    static const byte msg[] = "slhdsa decode-file test";
2078
2079    XMEMSET(&key, 0, sizeof(key));
2080    XMEMSET(&rng, 0, sizeof(rng));
2081
2082    ExpectTrue((f = XFOPEN(path, "rb")) != XBADFILE);
2083    if (f != XBADFILE) {
2084        ExpectIntGT(derSz = (int)XFREAD(der, 1, sizeof(der), f), 0);
2085        XFCLOSE(f);
2086    }
2087
2088    /* Pick a seed param different from `expected` when more than one
2089     * variant is built. The decoder always overwrites this from the OID
2090     * in the DER, so a different placeholder actually tests the auto-
2091     * detect contract on disk-loaded fixtures (mirroring the helper
2092     * logic in slhdsa_der_roundtrip_one). Falls back to `expected` when
2093     * no alternative variant is available. */
2094    {
2095        static const enum SlhDsaParam candidates[] = {
2096            SLHDSA_SHAKE128S, SLHDSA_SHAKE128F, SLHDSA_SHAKE192S,
2097            SLHDSA_SHAKE192F, SLHDSA_SHAKE256S, SLHDSA_SHAKE256F,
2098        #ifdef WOLFSSL_SLHDSA_SHA2
2099            SLHDSA_SHA2_128S, SLHDSA_SHA2_128F, SLHDSA_SHA2_192S,
2100            SLHDSA_SHA2_192F, SLHDSA_SHA2_256S, SLHDSA_SHA2_256F,
2101        #endif
2102        };
2103        enum SlhDsaParam placeholder = expected;
2104        size_t cIdx;
2105        for (cIdx = 0; cIdx < sizeof(candidates)/sizeof(candidates[0]);
2106             cIdx++) {
2107            SlhDsaKey probe;
2108            if (candidates[cIdx] == expected) continue;
2109            XMEMSET(&probe, 0, sizeof(probe));
2110            if (wc_SlhDsaKey_Init(&probe, candidates[cIdx], NULL,
2111                                  INVALID_DEVID) == 0) {
2112                placeholder = candidates[cIdx];
2113                wc_SlhDsaKey_Free(&probe);
2114                break;
2115            }
2116        }
2117        ExpectIntEQ(wc_SlhDsaKey_Init(&key, placeholder, NULL, INVALID_DEVID),
2118            0);
2119    }
2120
2121    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(der, &idx, &key, (word32)derSz),
2122        0);
2123    ExpectNotNull(key.params);
2124    if (key.params != NULL) {
2125        ExpectIntEQ((int)key.params->param, (int)expected);
2126    }
2127
2128    if (doSign) {
2129        /* Sanity: signing works with the decoded key. */
2130        ExpectIntEQ(wc_InitRng(&rng), 0);
2131        ExpectIntEQ(wc_SlhDsaKey_Sign(&key, NULL, 0, msg, (word32)sizeof(msg),
2132            sig, &sigLen, &rng), 0);
2133        ExpectIntEQ(wc_SlhDsaKey_Verify(&key, NULL, 0, msg,
2134            (word32)sizeof(msg), sig, sigLen), 0);
2135        wc_FreeRng(&rng);
2136    }
2137    else {
2138        /* Cheap structural validation when the full sign/verify is
2139         * skipped (slow 192s/256s variants): catches an uninitialised SK
2140         * half or a botched SHA-2 precompute without paying the
2141         * multi-second cost of an actual Sign. */
2142        ExpectIntEQ(wc_SlhDsaKey_CheckKey(&key), 0);
2143    }
2144
2145    wc_SlhDsaKey_Free(&key);
2146    return EXPECT_RESULT();
2147}
2148#endif
2149
2150/* Load each checked-in bench_slhdsa_shake*_key.der fixture and confirm it
2151 * decodes via wc_SlhDsaKey_PrivateKeyDecode with correct auto-detection.
2152 * These fixtures are RFC 9909 compliant (bare OCTET STRING, 4*n bytes) -
2153 * this test would fail if the files drift to a non-compliant encoding
2154 * (e.g. nested OCTET STRING, seed-only). */
2155int test_wc_slhdsa_der_decode_files(void)
2156{
2157    EXPECT_DECLS;
2158#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
2159    !defined(NO_FILESYSTEM)
2160#ifdef WOLFSSL_SLHDSA_PARAM_128S
2161    ExpectIntEQ(slhdsa_decode_file_one(
2162        "./certs/slhdsa/bench_slhdsa_shake128s_key.der", SLHDSA_SHAKE128S, 1),
2163        TEST_SUCCESS);
2164#endif
2165#ifdef WOLFSSL_SLHDSA_PARAM_128F
2166    ExpectIntEQ(slhdsa_decode_file_one(
2167        "./certs/slhdsa/bench_slhdsa_shake128f_key.der", SLHDSA_SHAKE128F, 1),
2168        TEST_SUCCESS);
2169#endif
2170#ifdef WOLFSSL_SLHDSA_PARAM_192S
2171    ExpectIntEQ(slhdsa_decode_file_one(
2172        "./certs/slhdsa/bench_slhdsa_shake192s_key.der", SLHDSA_SHAKE192S, 0),
2173        TEST_SUCCESS);
2174#endif
2175#ifdef WOLFSSL_SLHDSA_PARAM_192F
2176    ExpectIntEQ(slhdsa_decode_file_one(
2177        "./certs/slhdsa/bench_slhdsa_shake192f_key.der", SLHDSA_SHAKE192F, 1),
2178        TEST_SUCCESS);
2179#endif
2180#ifdef WOLFSSL_SLHDSA_PARAM_256S
2181    ExpectIntEQ(slhdsa_decode_file_one(
2182        "./certs/slhdsa/bench_slhdsa_shake256s_key.der", SLHDSA_SHAKE256S, 0),
2183        TEST_SUCCESS);
2184#endif
2185#ifdef WOLFSSL_SLHDSA_PARAM_256F
2186    ExpectIntEQ(slhdsa_decode_file_one(
2187        "./certs/slhdsa/bench_slhdsa_shake256f_key.der", SLHDSA_SHAKE256F, 1),
2188        TEST_SUCCESS);
2189#endif
2190#ifdef WOLFSSL_SLHDSA_SHA2
2191#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128S
2192    ExpectIntEQ(slhdsa_decode_file_one(
2193        "./certs/slhdsa/bench_slhdsa_sha2_128s_key.der", SLHDSA_SHA2_128S, 1),
2194        TEST_SUCCESS);
2195#endif
2196#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128F
2197    ExpectIntEQ(slhdsa_decode_file_one(
2198        "./certs/slhdsa/bench_slhdsa_sha2_128f_key.der", SLHDSA_SHA2_128F, 1),
2199        TEST_SUCCESS);
2200#endif
2201#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192S
2202    ExpectIntEQ(slhdsa_decode_file_one(
2203        "./certs/slhdsa/bench_slhdsa_sha2_192s_key.der", SLHDSA_SHA2_192S, 0),
2204        TEST_SUCCESS);
2205#endif
2206#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192F
2207    ExpectIntEQ(slhdsa_decode_file_one(
2208        "./certs/slhdsa/bench_slhdsa_sha2_192f_key.der", SLHDSA_SHA2_192F, 1),
2209        TEST_SUCCESS);
2210#endif
2211#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256S
2212    ExpectIntEQ(slhdsa_decode_file_one(
2213        "./certs/slhdsa/bench_slhdsa_sha2_256s_key.der", SLHDSA_SHA2_256S, 0),
2214        TEST_SUCCESS);
2215#endif
2216#ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256F
2217    ExpectIntEQ(slhdsa_decode_file_one(
2218        "./certs/slhdsa/bench_slhdsa_sha2_256f_key.der", SLHDSA_SHA2_256F, 1),
2219        TEST_SUCCESS);
2220#endif
2221#endif /* WOLFSSL_SLHDSA_SHA2 */
2222#endif
2223    return EXPECT_RESULT();
2224}
2225
2226#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
2227/* Regression: wolfssl_x509_make_der and ConfirmSignature both pass the
2228 * raw 2*n public-key bytes (the BIT STRING contents stashed by StoreKey
2229 * into cert->publicKey) to wc_SlhDsaKey_PublicKeyDecode. Before the
2230 * raw-first fast path landed, that call returned ASN_PARSE_E because
2231 * DecodeAsymKeyPublic_Assign requires an SPKI SEQUENCE. This test pins
2232 * the new contract: when key->params is already set, raw bytes decode
2233 * directly, mirroring wc_Falcon_PublicKeyDecode and
2234 * wc_Dilithium_PublicKeyDecode. */
2235static int slhdsa_raw_public_decode_one(enum SlhDsaParam param)
2236{
2237    EXPECT_DECLS;
2238    SlhDsaKey src;
2239    SlhDsaKey dst;
2240    byte pub[WC_SLHDSA_MAX_PUB_LEN];
2241    word32 pubLen = (word32)sizeof(pub);
2242    word32 idx = 0;
2243    WC_RNG rng;
2244
2245    XMEMSET(&src, 0, sizeof(src));
2246    XMEMSET(&dst, 0, sizeof(dst));
2247    XMEMSET(&rng, 0, sizeof(rng));
2248
2249    ExpectIntEQ(wc_InitRng(&rng), 0);
2250    ExpectIntEQ(wc_SlhDsaKey_Init(&src, param, NULL, INVALID_DEVID), 0);
2251    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&src, &rng), 0);
2252    ExpectIntEQ(wc_SlhDsaKey_ExportPublic(&src, pub, &pubLen), 0);
2253
2254    /* Decode the raw public-key bytes via PublicKeyDecode. The fast
2255     * path triggers because key->params is set by Init. */
2256    ExpectIntEQ(wc_SlhDsaKey_Init(&dst, param, NULL, INVALID_DEVID), 0);
2257    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(pub, &idx, &dst, pubLen), 0);
2258    ExpectIntEQ((int)idx, (int)pubLen);
2259    ExpectNotNull(dst.params);
2260    if (dst.params != NULL) {
2261        ExpectIntEQ((int)dst.params->param, (int)param);
2262    }
2263
2264    wc_SlhDsaKey_Free(&dst);
2265    wc_SlhDsaKey_Free(&src);
2266    wc_FreeRng(&rng);
2267    return EXPECT_RESULT();
2268}
2269#endif /* WOLFSSL_HAVE_SLHDSA && !WOLFSSL_SLHDSA_VERIFY_ONLY */
2270
2271int test_wc_slhdsa_x509_i2d_roundtrip(void)
2272{
2273    EXPECT_DECLS;
2274#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY)
2275    /* Exercise the raw public-key fast path for every compiled-in variant
2276     * so a regression in n-dependent buffer math (32/48/64-byte keys)
2277     * fails the test even in restricted builds where SHAKE128S /
2278     * SHA2_128S happen to be excluded. */
2279#ifdef WOLFSSL_SLHDSA_PARAM_128S
2280    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHAKE128S), TEST_SUCCESS);
2281#endif
2282#ifdef WOLFSSL_SLHDSA_PARAM_128F
2283    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHAKE128F), TEST_SUCCESS);
2284#endif
2285#ifdef WOLFSSL_SLHDSA_PARAM_192S
2286    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHAKE192S), TEST_SUCCESS);
2287#endif
2288#ifdef WOLFSSL_SLHDSA_PARAM_192F
2289    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHAKE192F), TEST_SUCCESS);
2290#endif
2291#ifdef WOLFSSL_SLHDSA_PARAM_256S
2292    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHAKE256S), TEST_SUCCESS);
2293#endif
2294#ifdef WOLFSSL_SLHDSA_PARAM_256F
2295    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHAKE256F), TEST_SUCCESS);
2296#endif
2297#ifdef WOLFSSL_SLHDSA_SHA2
2298    #ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128S
2299    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHA2_128S), TEST_SUCCESS);
2300    #endif
2301    #ifdef WOLFSSL_SLHDSA_PARAM_SHA2_128F
2302    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHA2_128F), TEST_SUCCESS);
2303    #endif
2304    #ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192S
2305    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHA2_192S), TEST_SUCCESS);
2306    #endif
2307    #ifdef WOLFSSL_SLHDSA_PARAM_SHA2_192F
2308    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHA2_192F), TEST_SUCCESS);
2309    #endif
2310    #ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256S
2311    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHA2_256S), TEST_SUCCESS);
2312    #endif
2313    #ifdef WOLFSSL_SLHDSA_PARAM_SHA2_256F
2314    ExpectIntEQ(slhdsa_raw_public_decode_one(SLHDSA_SHA2_256F), TEST_SUCCESS);
2315    #endif
2316#endif /* WOLFSSL_SLHDSA_SHA2 */
2317#endif
2318    return EXPECT_RESULT();
2319}
2320
2321#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
2322    defined(WC_ENABLE_ASYM_KEY_EXPORT)
2323/* Build a DER blob using an enabled SLH-DSA variant and patch the
2324 * AlgorithmIdentifier OID's trailing byte to point at a *disabled*
2325 * variant, then push it through the decoders. The contract being
2326 * pinned is that wc_SlhDsaKey_PrivateKeyDecode / PublicKeyDecode pass
2327 * the wc_SlhDsaOidToParam NOT_COMPILED_IN result through verbatim
2328 * rather than collapsing it to ASN_PARSE_E -- if that breaks, x509 /
2329 * TLS lose the precise "variant unavailable" diagnostic and silently
2330 * report malformed-DER instead.
2331 *
2332 * All SLH-DSA OIDs share the prefix 2.16.840.1.101.3.4.3.X with X<128,
2333 * so DER encoding lengths match exactly and the trailing byte is the
2334 * sole discriminator -- patching it in place produces a structurally
2335 * valid SPKI/PKCS#8 buffer that only fails at the OID-lookup step.
2336 *
2337 * @param src             Enabled parameter set used to generate real DER.
2338 * @param targetOidByte   Trailing OID byte of the disabled variant.
2339 */
2340/* Marked WC_MAYBE_UNUSED because every call site below is gated on a
2341 * per-variant disable macro -- builds that leave every variant enabled
2342 * (e.g. --enable-fips=ready) preprocess all callers away. */
2343static WC_MAYBE_UNUSED int slhdsa_decode_disabled_oid_one(enum SlhDsaParam src,
2344    byte targetOidByte)
2345{
2346    EXPECT_DECLS;
2347    /* OID prefix common to every SLH-DSA variant. */
2348    static const byte oidPrefix[] = {
2349        0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03
2350    };
2351    SlhDsaKey srcKey;
2352    SlhDsaKey dstKey;
2353    WC_RNG rng;
2354    byte* derBuf = NULL;
2355    const word32 derBufSz = 16 * 1024;
2356    int derLen = 0;
2357    word32 idx;
2358    word32 j;
2359    int patched;
2360
2361    XMEMSET(&srcKey, 0, sizeof(srcKey));
2362    XMEMSET(&dstKey, 0, sizeof(dstKey));
2363    XMEMSET(&rng, 0, sizeof(rng));
2364
2365    derBuf = (byte*)XMALLOC(derBufSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
2366    ExpectNotNull(derBuf);
2367    ExpectIntEQ(wc_InitRng(&rng), 0);
2368    ExpectIntEQ(wc_SlhDsaKey_Init(&srcKey, src, NULL, INVALID_DEVID), 0);
2369    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&srcKey, &rng), 0);
2370
2371    /* Public-key path: build SPKI, patch the variant byte, decode. */
2372    ExpectIntGT(derLen = wc_SlhDsaKey_PublicKeyToDer(&srcKey, derBuf, derBufSz,
2373        1), 0);
2374    patched = 0;
2375    for (j = 0; derLen > (int)sizeof(oidPrefix) &&
2376            j + sizeof(oidPrefix) < (word32)derLen; j++) {
2377        if (XMEMCMP(derBuf + j, oidPrefix, sizeof(oidPrefix)) == 0) {
2378            derBuf[j + sizeof(oidPrefix)] = targetOidByte;
2379            patched = 1;
2380            break;
2381        }
2382    }
2383    ExpectIntEQ(patched, 1);
2384    /* dstKey is zeroed (no params) so the raw fast path is skipped and
2385     * SPKI parsing surfaces the OID-lookup result. */
2386    idx = 0;
2387    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(derBuf, &idx, &dstKey,
2388        (word32)derLen), WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2389
2390    /* Private-key path: same scheme using the PKCS#8 wrapper. */
2391    ExpectIntGT(derLen = wc_SlhDsaKey_KeyToDer(&srcKey, derBuf, derBufSz), 0);
2392    patched = 0;
2393    for (j = 0; derLen > (int)sizeof(oidPrefix) &&
2394            j + sizeof(oidPrefix) < (word32)derLen; j++) {
2395        if (XMEMCMP(derBuf + j, oidPrefix, sizeof(oidPrefix)) == 0) {
2396            derBuf[j + sizeof(oidPrefix)] = targetOidByte;
2397            patched = 1;
2398            break;
2399        }
2400    }
2401    ExpectIntEQ(patched, 1);
2402    /* Free any state PublicKeyDecode may have established before the
2403     * second decode call reuses the key slot. */
2404    wc_SlhDsaKey_Free(&dstKey);
2405    XMEMSET(&dstKey, 0, sizeof(dstKey));
2406    idx = 0;
2407    ExpectIntEQ(wc_SlhDsaKey_PrivateKeyDecode(derBuf, &idx, &dstKey,
2408        (word32)derLen), WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2409
2410    wc_SlhDsaKey_Free(&dstKey);
2411    wc_SlhDsaKey_Free(&srcKey);
2412    wc_FreeRng(&rng);
2413    XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
2414    return EXPECT_RESULT();
2415}
2416
2417/* Round-trip variant: same patcher path but the targetOidByte must equal
2418 * the source's own OID byte, so the decode is expected to succeed. Used
2419 * as an unconditional smoke check so test_wc_slhdsa_decoder_disabled_oid
2420 * exercises the patcher infrastructure even on builds with no per-variant
2421 * disable, where every disabled-branch in the caller is #if'd out. */
2422static int slhdsa_decode_disabled_oid_one_roundtrip(enum SlhDsaParam src,
2423    byte targetOidByte)
2424{
2425    EXPECT_DECLS;
2426    static const byte oidPrefix[] = {
2427        0x06, 0x09, 0x60, 0x86, 0x48, 0x01, 0x65, 0x03, 0x04, 0x03
2428    };
2429    SlhDsaKey srcKey;
2430    SlhDsaKey dstKey;
2431    WC_RNG rng;
2432    byte* derBuf = NULL;
2433    const word32 derBufSz = 16 * 1024;
2434    int derLen = 0;
2435    word32 idx;
2436    word32 j;
2437    int patched;
2438
2439    XMEMSET(&srcKey, 0, sizeof(srcKey));
2440    XMEMSET(&dstKey, 0, sizeof(dstKey));
2441    XMEMSET(&rng, 0, sizeof(rng));
2442
2443    derBuf = (byte*)XMALLOC(derBufSz, NULL, DYNAMIC_TYPE_TMP_BUFFER);
2444    ExpectNotNull(derBuf);
2445    ExpectIntEQ(wc_InitRng(&rng), 0);
2446    ExpectIntEQ(wc_SlhDsaKey_Init(&srcKey, src, NULL, INVALID_DEVID), 0);
2447    ExpectIntEQ(wc_SlhDsaKey_MakeKey(&srcKey, &rng), 0);
2448
2449    ExpectIntGT(derLen = wc_SlhDsaKey_PublicKeyToDer(&srcKey, derBuf, derBufSz,
2450        1), 0);
2451    patched = 0;
2452    for (j = 0; derLen > (int)sizeof(oidPrefix) &&
2453            j + sizeof(oidPrefix) < (word32)derLen; j++) {
2454        if (XMEMCMP(derBuf + j, oidPrefix, sizeof(oidPrefix)) == 0) {
2455            derBuf[j + sizeof(oidPrefix)] = targetOidByte;
2456            patched = 1;
2457            break;
2458        }
2459    }
2460    ExpectIntEQ(patched, 1);
2461    idx = 0;
2462    ExpectIntEQ(wc_SlhDsaKey_PublicKeyDecode(derBuf, &idx, &dstKey,
2463        (word32)derLen), 0);
2464
2465    wc_SlhDsaKey_Free(&dstKey);
2466    wc_SlhDsaKey_Free(&srcKey);
2467    wc_FreeRng(&rng);
2468    XFREE(derBuf, NULL, DYNAMIC_TYPE_TMP_BUFFER);
2469    return EXPECT_RESULT();
2470}
2471
2472/* Probe candidate parameter sets in priority order and return the first
2473 * one whose backend is built in. Used to source a real DER buffer for
2474 * slhdsa_decode_disabled_oid_one regardless of which variants the
2475 * current build excluded. Returns 1 on success, 0 if no variant is
2476 * available (which the build's #error guard makes impossible in
2477 * practice but the test handles defensively). */
2478static int slhdsa_pick_enabled_param(enum SlhDsaParam* out)
2479{
2480    static const enum SlhDsaParam candidates[] = {
2481        SLHDSA_SHAKE128S, SLHDSA_SHAKE128F, SLHDSA_SHAKE192S,
2482        SLHDSA_SHAKE192F, SLHDSA_SHAKE256S, SLHDSA_SHAKE256F,
2483    #ifdef WOLFSSL_SLHDSA_SHA2
2484        SLHDSA_SHA2_128S, SLHDSA_SHA2_128F, SLHDSA_SHA2_192S,
2485        SLHDSA_SHA2_192F, SLHDSA_SHA2_256S, SLHDSA_SHA2_256F,
2486    #endif
2487    };
2488    size_t i;
2489
2490    for (i = 0; i < sizeof(candidates)/sizeof(candidates[0]); i++) {
2491        SlhDsaKey probe;
2492        XMEMSET(&probe, 0, sizeof(probe));
2493        if (wc_SlhDsaKey_Init(&probe, candidates[i], NULL,
2494                              INVALID_DEVID) == 0) {
2495            wc_SlhDsaKey_Free(&probe);
2496            *out = candidates[i];
2497            return 1;
2498        }
2499    }
2500    return 0;
2501}
2502#endif /* WOLFSSL_HAVE_SLHDSA && !VERIFY_ONLY && WC_ENABLE_ASYM_KEY_EXPORT */
2503
2504/* Pin the per-variant disable contract: every parameter set whose enum
2505 * value is visible (so the test compiles) but whose backend is excluded
2506 * by a WOLFSSL_SLHDSA_PARAM_NO_* / WOLFSSL_SLHDSA_NO_* macro must surface
2507 * NOT_COMPILED_IN from wc_SlhDsaKey_Init instead of silently succeeding
2508 * or returning a generic error.
2509 *
2510 * This is the only API-level test for the granular disable surface and
2511 * also locks in the contract that wc_SlhDsaOidToParam/CertType in asn.c
2512 * piggyback on -- if Init drifts away from NOT_COMPILED_IN here, the
2513 * mapping helpers will likewise diverge and certificate handling will
2514 * lose its "variant unavailable" diagnostic. */
2515int test_wc_slhdsa_param_disabled(void)
2516{
2517    EXPECT_DECLS;
2518#ifdef WOLFSSL_HAVE_SLHDSA
2519    SlhDsaKey key;
2520    enum SlhDsaParam enabledProbe = SLHDSA_SHAKE128S;
2521    int haveEnabled;
2522
2523    XMEMSET(&key, 0, sizeof(key));
2524
2525    /* Positive smoke check: at least one variant must initialise. Without
2526     * this the disabled-variant branches below can all be #if'd out and
2527     * the test would silently pass on default builds, defeating its
2528     * documented purpose. The probe also validates the contract from the
2529     * other side -- Init must succeed for an enabled param. */
2530    haveEnabled = 0;
2531#if defined(WOLFSSL_SLHDSA_PARAM_128S)
2532    enabledProbe = SLHDSA_SHAKE128S; haveEnabled = 1;
2533#elif defined(WOLFSSL_SLHDSA_PARAM_128F)
2534    enabledProbe = SLHDSA_SHAKE128F; haveEnabled = 1;
2535#elif defined(WOLFSSL_SLHDSA_PARAM_192S)
2536    enabledProbe = SLHDSA_SHAKE192S; haveEnabled = 1;
2537#elif defined(WOLFSSL_SLHDSA_PARAM_192F)
2538    enabledProbe = SLHDSA_SHAKE192F; haveEnabled = 1;
2539#elif defined(WOLFSSL_SLHDSA_PARAM_256S)
2540    enabledProbe = SLHDSA_SHAKE256S; haveEnabled = 1;
2541#elif defined(WOLFSSL_SLHDSA_PARAM_256F)
2542    enabledProbe = SLHDSA_SHAKE256F; haveEnabled = 1;
2543#elif defined(WOLFSSL_SLHDSA_SHA2) && defined(WOLFSSL_SLHDSA_PARAM_SHA2_128S)
2544    enabledProbe = SLHDSA_SHA2_128S; haveEnabled = 1;
2545#endif
2546    ExpectIntEQ(haveEnabled, 1);
2547    if (haveEnabled) {
2548        ExpectIntEQ(wc_SlhDsaKey_Init(&key, enabledProbe, NULL,
2549            INVALID_DEVID), 0);
2550        wc_SlhDsaKey_Free(&key);
2551        XMEMSET(&key, 0, sizeof(key));
2552    }
2553
2554#if defined(WOLFSSL_SLHDSA_PARAM_NO_128S) || \
2555    defined(WOLFSSL_SLHDSA_NO_128) || \
2556    defined(WOLFSSL_SLHDSA_PARAM_NO_SMALL)
2557    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128S, NULL, INVALID_DEVID),
2558        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2559#endif
2560#if defined(WOLFSSL_SLHDSA_PARAM_NO_128F) || \
2561    defined(WOLFSSL_SLHDSA_NO_128) || \
2562    defined(WOLFSSL_SLHDSA_PARAM_NO_FAST)
2563    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE128F, NULL, INVALID_DEVID),
2564        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2565#endif
2566#if defined(WOLFSSL_SLHDSA_PARAM_NO_192S) || \
2567    defined(WOLFSSL_SLHDSA_NO_192) || \
2568    defined(WOLFSSL_SLHDSA_PARAM_NO_SMALL)
2569    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192S, NULL, INVALID_DEVID),
2570        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2571#endif
2572#if defined(WOLFSSL_SLHDSA_PARAM_NO_192F) || \
2573    defined(WOLFSSL_SLHDSA_NO_192) || \
2574    defined(WOLFSSL_SLHDSA_PARAM_NO_FAST)
2575    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE192F, NULL, INVALID_DEVID),
2576        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2577#endif
2578#if defined(WOLFSSL_SLHDSA_PARAM_NO_256S) || \
2579    defined(WOLFSSL_SLHDSA_NO_256) || \
2580    defined(WOLFSSL_SLHDSA_PARAM_NO_SMALL)
2581    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256S, NULL, INVALID_DEVID),
2582        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2583#endif
2584#if defined(WOLFSSL_SLHDSA_PARAM_NO_256F) || \
2585    defined(WOLFSSL_SLHDSA_NO_256) || \
2586    defined(WOLFSSL_SLHDSA_PARAM_NO_FAST)
2587    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHAKE256F, NULL, INVALID_DEVID),
2588        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2589#endif
2590
2591#ifdef WOLFSSL_SLHDSA_SHA2
2592    /* SHA-2 enum values are only declared when WOLFSSL_SLHDSA_SHA2 is set;
2593     * each per-variant disable below is checked under that gate. */
2594    #ifdef WOLFSSL_SLHDSA_PARAM_NO_SHA2_128S
2595    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128S, NULL, INVALID_DEVID),
2596        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2597    #endif
2598    #ifdef WOLFSSL_SLHDSA_PARAM_NO_SHA2_128F
2599    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_128F, NULL, INVALID_DEVID),
2600        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2601    #endif
2602    #ifdef WOLFSSL_SLHDSA_PARAM_NO_SHA2_192S
2603    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192S, NULL, INVALID_DEVID),
2604        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2605    #endif
2606    #ifdef WOLFSSL_SLHDSA_PARAM_NO_SHA2_192F
2607    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_192F, NULL, INVALID_DEVID),
2608        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2609    #endif
2610    #ifdef WOLFSSL_SLHDSA_PARAM_NO_SHA2_256S
2611    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256S, NULL, INVALID_DEVID),
2612        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2613    #endif
2614    #ifdef WOLFSSL_SLHDSA_PARAM_NO_SHA2_256F
2615    ExpectIntEQ(wc_SlhDsaKey_Init(&key, SLHDSA_SHA2_256F, NULL, INVALID_DEVID),
2616        WC_NO_ERR_TRACE(NOT_COMPILED_IN));
2617    #endif
2618#endif /* WOLFSSL_SLHDSA_SHA2 */
2619
2620    (void)key;
2621#endif /* WOLFSSL_HAVE_SLHDSA */
2622    return EXPECT_RESULT();
2623}
2624
2625/* Decoder-level companion to test_wc_slhdsa_param_disabled: feed DER for
2626 * each disabled SLH-DSA OID into PrivateKeyDecode/PublicKeyDecode and
2627 * confirm they pass NOT_COMPILED_IN through verbatim. The Init-level
2628 * test above proves the mapping helper is correct; this one proves the
2629 * decoders honour it instead of collapsing the result to ASN_PARSE_E. */
2630int test_wc_slhdsa_decoder_disabled_oid(void)
2631{
2632    EXPECT_DECLS;
2633#if defined(WOLFSSL_HAVE_SLHDSA) && !defined(WOLFSSL_SLHDSA_VERIFY_ONLY) && \
2634    defined(WC_ENABLE_ASYM_KEY_EXPORT)
2635    enum SlhDsaParam src = SLHDSA_SHAKE128S;
2636    int haveSrc = slhdsa_pick_enabled_param(&src);
2637    ExpectIntEQ(haveSrc, 1);
2638
2639    if (haveSrc) {
2640        /* Positive smoke check: feed src's own OID through the patcher
2641         * (round-trip) and expect a clean decode, so the decoder path
2642         * actually exercises here even when no per-variant disable is
2643         * active. The trailing OID byte for SHAKE128S is 0x1A; we look
2644         * up the byte for `src` from a small table because src may not
2645         * be SHAKE128S in restricted builds. */
2646        {
2647            byte srcOidByte = 0;
2648            switch (src) {
2649                case SLHDSA_SHAKE128S: srcOidByte = 0x1A; break;
2650                case SLHDSA_SHAKE128F: srcOidByte = 0x1B; break;
2651                case SLHDSA_SHAKE192S: srcOidByte = 0x1C; break;
2652                case SLHDSA_SHAKE192F: srcOidByte = 0x1D; break;
2653                case SLHDSA_SHAKE256S: srcOidByte = 0x1E; break;
2654                case SLHDSA_SHAKE256F: srcOidByte = 0x1F; break;
2655            #ifdef WOLFSSL_SLHDSA_SHA2
2656                case SLHDSA_SHA2_128S: srcOidByte = 0x14; break;
2657                case SLHDSA_SHA2_128F: srcOidByte = 0x15; break;
2658                case SLHDSA_SHA2_192S: srcOidByte = 0x16; break;
2659                case SLHDSA_SHA2_192F: srcOidByte = 0x17; break;
2660                case SLHDSA_SHA2_256S: srcOidByte = 0x18; break;
2661                case SLHDSA_SHA2_256F: srcOidByte = 0x19; break;
2662            #endif
2663                default: break;
2664            }
2665            ExpectIntGT((int)srcOidByte, 0);
2666            /* Round-trip: patching src's OID to itself must still decode
2667             * successfully -- this fires unconditionally and validates
2668             * the patcher infrastructure even when no disable branch
2669             * below applies. */
2670            ExpectIntEQ(slhdsa_decode_disabled_oid_one_roundtrip(src,
2671                srcOidByte), TEST_SUCCESS);
2672        }
2673
2674        /* SHAKE family: trailing OID byte = 0x1A..0x1F. */
2675        #if defined(WOLFSSL_SLHDSA_PARAM_NO_128S) || \
2676            defined(WOLFSSL_SLHDSA_NO_128) || \
2677            defined(WOLFSSL_SLHDSA_PARAM_NO_SMALL)
2678        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x1A), TEST_SUCCESS);
2679        #endif
2680        #if defined(WOLFSSL_SLHDSA_PARAM_NO_128F) || \
2681            defined(WOLFSSL_SLHDSA_NO_128) || \
2682            defined(WOLFSSL_SLHDSA_PARAM_NO_FAST)
2683        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x1B), TEST_SUCCESS);
2684        #endif
2685        #if defined(WOLFSSL_SLHDSA_PARAM_NO_192S) || \
2686            defined(WOLFSSL_SLHDSA_NO_192) || \
2687            defined(WOLFSSL_SLHDSA_PARAM_NO_SMALL)
2688        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x1C), TEST_SUCCESS);
2689        #endif
2690        #if defined(WOLFSSL_SLHDSA_PARAM_NO_192F) || \
2691            defined(WOLFSSL_SLHDSA_NO_192) || \
2692            defined(WOLFSSL_SLHDSA_PARAM_NO_FAST)
2693        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x1D), TEST_SUCCESS);
2694        #endif
2695        #if defined(WOLFSSL_SLHDSA_PARAM_NO_256S) || \
2696            defined(WOLFSSL_SLHDSA_NO_256) || \
2697            defined(WOLFSSL_SLHDSA_PARAM_NO_SMALL)
2698        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x1E), TEST_SUCCESS);
2699        #endif
2700        #if defined(WOLFSSL_SLHDSA_PARAM_NO_256F) || \
2701            defined(WOLFSSL_SLHDSA_NO_256) || \
2702            defined(WOLFSSL_SLHDSA_PARAM_NO_FAST)
2703        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x1F), TEST_SUCCESS);
2704        #endif
2705
2706        /* SHA-2 family: trailing OID byte = 0x14..0x19. The whole
2707         * family is also disabled when WOLFSSL_SLHDSA_SHA2 is unset. */
2708        #if !defined(WOLFSSL_SLHDSA_SHA2) || \
2709            defined(WOLFSSL_SLHDSA_PARAM_NO_SHA2_128S)
2710        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x14), TEST_SUCCESS);
2711        #endif
2712        #if !defined(WOLFSSL_SLHDSA_SHA2) || \
2713            defined(WOLFSSL_SLHDSA_PARAM_NO_SHA2_128F)
2714        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x15), TEST_SUCCESS);
2715        #endif
2716        #if !defined(WOLFSSL_SLHDSA_SHA2) || \
2717            defined(WOLFSSL_SLHDSA_PARAM_NO_SHA2_192S)
2718        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x16), TEST_SUCCESS);
2719        #endif
2720        #if !defined(WOLFSSL_SLHDSA_SHA2) || \
2721            defined(WOLFSSL_SLHDSA_PARAM_NO_SHA2_192F)
2722        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x17), TEST_SUCCESS);
2723        #endif
2724        #if !defined(WOLFSSL_SLHDSA_SHA2) || \
2725            defined(WOLFSSL_SLHDSA_PARAM_NO_SHA2_256S)
2726        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x18), TEST_SUCCESS);
2727        #endif
2728        #if !defined(WOLFSSL_SLHDSA_SHA2) || \
2729            defined(WOLFSSL_SLHDSA_PARAM_NO_SHA2_256F)
2730        ExpectIntEQ(slhdsa_decode_disabled_oid_one(src, 0x19), TEST_SUCCESS);
2731        #endif
2732    }
2733#endif
2734    return EXPECT_RESULT();
2735}
2736
2737#ifdef TEST_SLHDSA_DEFAULT_PARAM
2738    #undef TEST_SLHDSA_DEFAULT_PARAM
2739    #undef TEST_SLHDSA_DEFAULT_SIG_LEN
2740    #undef TEST_SLHDSA_DEFAULT_PRIV_LEN
2741    #undef TEST_SLHDSA_DEFAULT_PUB_LEN
2742    #undef TEST_SLHDSA_DEFAULT_SEED_LEN
2743#endif