/mbedtls-3.6.0/scripts/ |
D | bump_version.sh | 8 # Sets the version numbers in the source code to those given. 10 # Usage: bump_version.sh [ --version <version> ] [ --so-crypto <version>] 11 # [ --so-x509 <version> ] [ --so-tls <version> ] 17 VERSION="" 25 --version) 26 # Version to use 28 VERSION=$1 50 echo -e " --version <version>\tVersion to bump to." 51 echo -e " --so-crypto <version>\tSO version to bump libmbedcrypto to." 52 echo -e " --so-x509 <version>\tSO version to bump libmbedx509 to." [all …]
|
D | output_env.sh | 14 # - type and version of the operating system 15 # - version of make and cmake 16 # - version of armcc, clang, gcc-arm and gcc compilers 17 # - version of libc, clang, asan and valgrind if installed 18 # - version of gnuTLS and OpenSSL 49 VERSION_STR="Version could not be determined." 74 print_version "make" "--version" "" "head -n 1" 77 print_version "cmake" "--version" "" "head -n 1" 90 print_version "arm-none-eabi-gcc" "--version" "" "head -n 1" 93 print_version "gcc" "--version" "" "head -n 1" [all …]
|
D | abi_check.py | 27 reports a pass if there is a strict textual match between the old version and 28 the new version, and it reports problems where there is a sufficient semantic 33 **API**: the goal is that if an application works with the old version of the 34 library, it can be recompiled against the new version and will still work. 48 **ABI**: the goal is that if an application was built against the old version 49 of the library, the same binary will work when linked against the new version. 54 * All ABI changes are acceptable if the library version is bumped 59 libmbedx509, libmbedtls). As a counter example, if the old version 60 of libmbedtls calls mbedtls_foo() from libmbedcrypto, and the new version 62 require a version bump for libmbedcrypto. [all …]
|
D | assemble_changelog.py | 78 """Split out the top version section. 80 If the top version is already released, create a new top 81 version section for an unreleased version. 84 where the "top version" is the existing top version section if it's 93 """Return the text of a formatted version section title.""" 98 """Split a changelog version section body into categories. 123 """A version section starts with a line starting with '='.""" 175 more version sections. The version sections are in reverse 176 chronological order. Each version section consists of a title and a body. 178 The body of a version section consists of zero or more category [all …]
|
D | ci.requirements.txt | 5 # Use a known version of Pylint, because new versions tend to add warnings 7 # 2.4.4 is the version in Ubuntu 20.04. It supports Python >=3.5. 10 # Use the earliest version of mypy that works with our code base. 16 # but our CI has Python 3.5. So let pip install the newest version that's
|
/mbedtls-3.6.0/include/mbedtls/ |
D | version.h | 2 * \file version.h 4 * \brief Run-time version information 11 * This set of run-time variables can be used to determine the version number of 12 * the Mbed TLS library used. Compile-time version defines for the same can be 27 * Get the version number. 29 * \return The constructed version number in the format 35 * Get the version string ("x.y.z"). 43 * Get the full version string ("Mbed TLS x.y.z"). 45 * \param string The string that will receive the value. The Mbed TLS version 49 * version string). [all …]
|
D | build_info.h | 18 * This set of compile-time defines can be used to determine the version number 20 * version.h 24 * The version number x.y.z is split into three parts. 32 * The single version number has the following structure: 34 * Major version | Minor version | Patch version 85 #error "Invalid config version, defined value of MBEDTLS_CONFIG_VERSION is unsupported"
|
D | pkcs7.h | 18 * - The only supported PKCS #7 Signed Data syntax version is version 1 53 #define MBEDTLS_ERR_PKCS7_INVALID_VERSION -0x5400 /**< The PKCS #7 version elemen… 66 * \name PKCS #7 Supported Version 110 int MBEDTLS_PRIVATE(version); 125 int MBEDTLS_PRIVATE(version);
|
/mbedtls-3.6.0/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 7 … only validates that it's possible to load a key that was saved with the version of Mbed TLS under… 15 … is: as a user of Mbed TLS, I want to store a key under version V and read it back under version W… 17 … way would be difficult because we'd need to have version V of Mbed TLS available when testing ver… 19 …irect approach consists of generating test data under version V, and reading it back under version… 23 …nsure the stability of the storage format by creating test cases under a version V of Mbed TLS, wh… 27 …passes with version V, this means that the test data is consistent with what the implementation do… 29 …version V and load-and-check passing on version W with the same data that proves that version W ca… 37 …version of Mbed TLS, since there would be no indication that more test cases used to exist. It can… 39 …ide to stop supporting old keys (which should only be done by retiring a version of the storage fo… 56 … the desired test cases for keys created with the current storage format version. When the storage…
|
/mbedtls-3.6.0/programs/test/cmake_package/ |
D | cmake_package.c | 12 #include "mbedtls/version.h" 19 /* This version string is 18 bytes long, as advised by version.h. */ in main() 20 char version[18]; in main() local 22 mbedtls_version_get_string_full(version); in main() 24 mbedtls_printf("Built against %s\n", version); in main()
|
/mbedtls-3.6.0/programs/test/cmake_package_install/ |
D | cmake_package_install.c | 13 #include "mbedtls/version.h" 20 /* This version string is 18 bytes long, as advised by version.h. */ in main() 21 char version[18]; in main() local 23 mbedtls_version_get_string_full(version); in main() 25 mbedtls_printf("Built against %s\n", version); in main()
|
/mbedtls-3.6.0/programs/test/cmake_subproject/ |
D | cmake_subproject.c | 13 #include "mbedtls/version.h" 20 /* This version string is 18 bytes long, as advised by version.h. */ in main() 21 char version[18]; in main() local 23 mbedtls_version_get_string_full(version); in main() 25 mbedtls_printf("Built against %s\n", version); in main()
|
/mbedtls-3.6.0/ |
D | BRANCHES.md | 9 this is where the current major version of Mbed TLS (version 3.x) is being 21 API compatibility in the `master` branch across minor version changes (e.g. 23 compatibility on major version changes (e.g. from 3.x to 4.0). We also maintain 26 Every major version will become an LTS branch when the next major version is 36 modification with any later release x.y'.z' with the same major version 73 We intend to maintain this backward compatibility throughout a major version 78 LTS, but future major version upgrades (for example from 2.28.x/3.x to 4.y) 92 minimum version of tools needed to build the code. The only exception, as 111 Users are urged to always use the latest version of a maintained branch.
|
D | LICENSE | 10 Version 2.0, January 2004 57 the original version of the Work and any modifications or additions 199 Licensed under the Apache License, Version 2.0 (the "License"); 216 Version 2, June 1991 453 be similar in spirit to the present version, but may differ in detail to 456 Each version is given a distinguishing version number. If the Program 457 specifies a version number of this License which applies to it and "any 458 later version", you have the option of following the terms and conditions 459 either of that version or of any later version published by the Free 460 Software Foundation. If the Program does not specify a version number of [all …]
|
/mbedtls-3.6.0/tests/scripts/ |
D | check-python-files.sh | 21 import packaging.version 26 if packaging.version.parse(actual) < packaging.version.parse(wanted): 27 sys.stderr.write("$1: version %s is too old (want %s)\n" % (actual, wanted)) 43 check_version mypy.version 0.780 47 # with an acceptable version, and exit without running any checks. The exit
|
D | generate_psa_tests.py | 427 def __init__(self, info: psa_information.Information, version: int, forward: bool) -> None: 431 * `version`: the storage format version to generate test cases for. 438 self.version = version #type: int 531 key = StorageTestData(version=self.version, 562 key1 = StorageTestData(version=self.version, 615 key = StorageTestData(version=self.version, 659 key1 = StorageTestData(version=self.version, 666 key2 = StorageTestData(version=self.version, 705 def __init__(self, info: psa_information.Information, version: int) -> None: 706 super().__init__(info, version, True) [all …]
|
/mbedtls-3.6.0/scripts/mbedtls_dev/ |
D | psa_storage.py | 100 """The latest version of the storage format.""" 103 version: Optional[int] = None, 111 self.version = self.LATEST_VERSION if version is None else version 153 header = self.MAGIC + self.pack('L', self.version) 154 if self.version == 0: 180 key = Key(version=0, 191 key = Key(version=0,
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_x509parse.data | 3 x509_cert_info:"data_files/parse_input/server1.crt":"cert. version \: 3\nserial number \: 0… 7 x509_cert_info:"data_files/parse_input/server1.crt.der":"cert. version \: 3\nserial number … 11 x509_cert_info:"data_files/parse_input/server2.crt":"cert. version \: 3\nserial number \: 0… 15 x509_cert_info:"data_files/parse_input/server2.crt.der":"cert. version \: 3\nserial number … 19 x509_cert_info:"data_files/parse_input/test-ca.crt":"cert. version \: 3\nserial number \: 0… 23 x509_cert_info:"data_files/parse_input/test-ca.crt.der":"cert. version \: 3\nserial number … 27 x509_cert_info:"data_files/parse_input/cert_md5.crt":"cert. version \: 3\nserial number \: … 31 x509_cert_info:"data_files/parse_input/cert_sha1.crt":"cert. version \: 3\nserial number \:… 35 x509_cert_info:"data_files/parse_input/cert_sha224.crt":"cert. version \: 3\nserial number … 39 x509_cert_info:"data_files/parse_input/cert_sha256.crt":"cert. version \: 3\nserial number … [all …]
|
/mbedtls-3.6.0/library/ |
D | pkcs7.c | 58 * version Version 59 * Version ::= INTEGER 70 /* If version != 1, return invalid version */ in pkcs7_get_version() 214 * Since in this version we strictly support single certificate, and reaching in pkcs7_get_certificates() 263 * version Version; 293 ret = pkcs7_get_version(p, end_signer, &signer->version); in pkcs7_get_signer_info() 441 * version Version, 472 /* Get version of signed data */ in pkcs7_get_signed_data() 473 ret = pkcs7_get_version(&p, end, &signed_data->version); in pkcs7_get_signed_data()
|
D | x509_crl.c | 48 * Version ::= INTEGER { v1(0), v2(1) } 87 * -- if present, version MUST be v2 in x509_get_crl_ext() 305 while (crl->version != 0 && crl->next != NULL) { in mbedtls_x509_crl_parse_der() 309 if (crl->version != 0 && crl->next == NULL) { in mbedtls_x509_crl_parse_der() 373 * Version ::= INTEGER OPTIONAL { v1(0), v2(1) } in mbedtls_x509_crl_parse_der() 378 if ((ret = x509_crl_get_version(&p, end, &crl->version)) != 0 || in mbedtls_x509_crl_parse_der() 384 if (crl->version < 0 || crl->version > 1) { in mbedtls_x509_crl_parse_der() 389 crl->version++; in mbedtls_x509_crl_parse_der() 452 if (crl->version == 2) { in mbedtls_x509_crl_parse_der() 604 ret = mbedtls_snprintf(p, n, "%sCRL version : %d", in mbedtls_x509_crl_info() [all …]
|
D | check_crypto_config.h | 102 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_xxx \ 106 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_xxx \ 114 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_xxx \ 118 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_xxx \
|
/mbedtls-3.6.0/include/psa/ |
D | crypto_compat.h | 8 * These names may be removed in a future version of Mbed TLS. 66 * specification. It was defined in the 1.0 Beta 3 version of the 67 * specification but was removed in the 1.0.0 released version. This API is 123 * specification. It was defined in the 1.0 Beta 3 version of the 124 * specification but was removed in the 1.0.0 released version. This API is
|
D | crypto_types.h | 68 * format version and providing a translation when reading the old 87 * format version and providing a translation when reading the old 106 * format version and providing a translation when reading the old 124 * format version and providing a translation when reading the old 173 * format version and providing a translation when reading the old 209 * format version and providing a translation when reading the old 250 * format version and providing a translation when reading the old 281 * format version and providing a translation when reading the old 313 * format version and providing a translation when reading the old 342 * However, a future version of the library may report values that are
|
/mbedtls-3.6.0/tests/data_files/ |
D | Makefile | 9 ## Note that in addition to depending on the version of the data 53 …est_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 68 not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 72 …est_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@ 80 …t_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA256 version=3 output_file=$@ 199 md=SHA256 version=3 output_file=$@ 214 not_before=20290210144400 not_after=20390210144400 md=SHA256 version=3 output_file=$@ 307 # Note: This requests openssl version >= 3.x.xx 319 …_1024_clear.pem not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@ 334 …est_ca_pwd_rsa) not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@ [all …]
|
/mbedtls-3.6.0/docs/ |
D | 3.0-migration-guide.md | 3 This guide details the steps required to migrate from Mbed TLS version 2.x to 4 Mbed TLS version 3.0 or greater. Unlike normal releases, Mbed TLS 3.0 breaks 28 It's best to use the latest version of Mbed TLS 2.x for this purpose, which is the 2.28 LTS release. 48 * If you had a tool that parsed the library version from `include/mbedtls/version.h`, this has move… 55 A config file version symbol, `MBEDTLS_CONFIG_VERSION` was introduced. 74 …u do so at your own risk, since such code is likely to break in a future minor version of Mbed TLS. 149 This only affects people who've been using Mbed TLS since before version 2.0 196 provide your own version of that function), please use 217 Current version of the library does not support enabling `MBEDTLS_SHA256_C` 513 API were removed from version 1.0 of specification. Please switch to the new [all …]
|