Home
last modified time | relevance | path

Searched full:version (Results 1 – 25 of 240) sorted by relevance

12345678910

/mbedtls-3.6.0/scripts/
Dbump_version.sh8 # Sets the version numbers in the source code to those given.
10 # Usage: bump_version.sh [ --version <version> ] [ --so-crypto <version>]
11 # [ --so-x509 <version> ] [ --so-tls <version> ]
17 VERSION=""
25 --version)
26 # Version to use
28 VERSION=$1
50 echo -e " --version <version>\tVersion to bump to."
51 echo -e " --so-crypto <version>\tSO version to bump libmbedcrypto to."
52 echo -e " --so-x509 <version>\tSO version to bump libmbedx509 to."
[all …]
Doutput_env.sh14 # - type and version of the operating system
15 # - version of make and cmake
16 # - version of armcc, clang, gcc-arm and gcc compilers
17 # - version of libc, clang, asan and valgrind if installed
18 # - version of gnuTLS and OpenSSL
49 VERSION_STR="Version could not be determined."
74 print_version "make" "--version" "" "head -n 1"
77 print_version "cmake" "--version" "" "head -n 1"
90 print_version "arm-none-eabi-gcc" "--version" "" "head -n 1"
93 print_version "gcc" "--version" "" "head -n 1"
[all …]
Dabi_check.py27 reports a pass if there is a strict textual match between the old version and
28 the new version, and it reports problems where there is a sufficient semantic
33 **API**: the goal is that if an application works with the old version of the
34 library, it can be recompiled against the new version and will still work.
48 **ABI**: the goal is that if an application was built against the old version
49 of the library, the same binary will work when linked against the new version.
54 * All ABI changes are acceptable if the library version is bumped
59 libmbedx509, libmbedtls). As a counter example, if the old version
60 of libmbedtls calls mbedtls_foo() from libmbedcrypto, and the new version
62 require a version bump for libmbedcrypto.
[all …]
Dassemble_changelog.py78 """Split out the top version section.
80 If the top version is already released, create a new top
81 version section for an unreleased version.
84 where the "top version" is the existing top version section if it's
93 """Return the text of a formatted version section title."""
98 """Split a changelog version section body into categories.
123 """A version section starts with a line starting with '='."""
175 more version sections. The version sections are in reverse
176 chronological order. Each version section consists of a title and a body.
178 The body of a version section consists of zero or more category
[all …]
Dci.requirements.txt5 # Use a known version of Pylint, because new versions tend to add warnings
7 # 2.4.4 is the version in Ubuntu 20.04. It supports Python >=3.5.
10 # Use the earliest version of mypy that works with our code base.
16 # but our CI has Python 3.5. So let pip install the newest version that's
/mbedtls-3.6.0/include/mbedtls/
Dversion.h2 * \file version.h
4 * \brief Run-time version information
11 * This set of run-time variables can be used to determine the version number of
12 * the Mbed TLS library used. Compile-time version defines for the same can be
27 * Get the version number.
29 * \return The constructed version number in the format
35 * Get the version string ("x.y.z").
43 * Get the full version string ("Mbed TLS x.y.z").
45 * \param string The string that will receive the value. The Mbed TLS version
49 * version string).
[all …]
Dbuild_info.h18 * This set of compile-time defines can be used to determine the version number
20 * version.h
24 * The version number x.y.z is split into three parts.
32 * The single version number has the following structure:
34 * Major version | Minor version | Patch version
85 #error "Invalid config version, defined value of MBEDTLS_CONFIG_VERSION is unsupported"
Dpkcs7.h18 * - The only supported PKCS #7 Signed Data syntax version is version 1
53 #define MBEDTLS_ERR_PKCS7_INVALID_VERSION -0x5400 /**< The PKCS #7 version elemen…
66 * \name PKCS #7 Supported Version
110 int MBEDTLS_PRIVATE(version);
125 int MBEDTLS_PRIVATE(version);
/mbedtls-3.6.0/docs/architecture/testing/
Dpsa-storage-format-testing.md7 … only validates that it's possible to load a key that was saved with the version of Mbed TLS under…
15 … is: as a user of Mbed TLS, I want to store a key under version V and read it back under version W…
17 … way would be difficult because we'd need to have version V of Mbed TLS available when testing ver…
19 …irect approach consists of generating test data under version V, and reading it back under version
23 …nsure the stability of the storage format by creating test cases under a version V of Mbed TLS, wh…
27 …passes with version V, this means that the test data is consistent with what the implementation do…
29version V and load-and-check passing on version W with the same data that proves that version W ca…
37version of Mbed TLS, since there would be no indication that more test cases used to exist. It can…
39 …ide to stop supporting old keys (which should only be done by retiring a version of the storage fo…
56 … the desired test cases for keys created with the current storage format version. When the storage…
/mbedtls-3.6.0/programs/test/cmake_package/
Dcmake_package.c12 #include "mbedtls/version.h"
19 /* This version string is 18 bytes long, as advised by version.h. */ in main()
20 char version[18]; in main() local
22 mbedtls_version_get_string_full(version); in main()
24 mbedtls_printf("Built against %s\n", version); in main()
/mbedtls-3.6.0/programs/test/cmake_package_install/
Dcmake_package_install.c13 #include "mbedtls/version.h"
20 /* This version string is 18 bytes long, as advised by version.h. */ in main()
21 char version[18]; in main() local
23 mbedtls_version_get_string_full(version); in main()
25 mbedtls_printf("Built against %s\n", version); in main()
/mbedtls-3.6.0/programs/test/cmake_subproject/
Dcmake_subproject.c13 #include "mbedtls/version.h"
20 /* This version string is 18 bytes long, as advised by version.h. */ in main()
21 char version[18]; in main() local
23 mbedtls_version_get_string_full(version); in main()
25 mbedtls_printf("Built against %s\n", version); in main()
/mbedtls-3.6.0/
DBRANCHES.md9 this is where the current major version of Mbed TLS (version 3.x) is being
21 API compatibility in the `master` branch across minor version changes (e.g.
23 compatibility on major version changes (e.g. from 3.x to 4.0). We also maintain
26 Every major version will become an LTS branch when the next major version is
36 modification with any later release x.y'.z' with the same major version
73 We intend to maintain this backward compatibility throughout a major version
78 LTS, but future major version upgrades (for example from 2.28.x/3.x to 4.y)
92 minimum version of tools needed to build the code. The only exception, as
111 Users are urged to always use the latest version of a maintained branch.
DLICENSE10 Version 2.0, January 2004
57 the original version of the Work and any modifications or additions
199 Licensed under the Apache License, Version 2.0 (the "License");
216 Version 2, June 1991
453 be similar in spirit to the present version, but may differ in detail to
456 Each version is given a distinguishing version number. If the Program
457 specifies a version number of this License which applies to it and "any
458 later version", you have the option of following the terms and conditions
459 either of that version or of any later version published by the Free
460 Software Foundation. If the Program does not specify a version number of
[all …]
/mbedtls-3.6.0/tests/scripts/
Dcheck-python-files.sh21 import packaging.version
26 if packaging.version.parse(actual) < packaging.version.parse(wanted):
27 sys.stderr.write("$1: version %s is too old (want %s)\n" % (actual, wanted))
43 check_version mypy.version 0.780
47 # with an acceptable version, and exit without running any checks. The exit
Dgenerate_psa_tests.py427 def __init__(self, info: psa_information.Information, version: int, forward: bool) -> None:
431 * `version`: the storage format version to generate test cases for.
438 self.version = version #type: int
531 key = StorageTestData(version=self.version,
562 key1 = StorageTestData(version=self.version,
615 key = StorageTestData(version=self.version,
659 key1 = StorageTestData(version=self.version,
666 key2 = StorageTestData(version=self.version,
705 def __init__(self, info: psa_information.Information, version: int) -> None:
706 super().__init__(info, version, True)
[all …]
/mbedtls-3.6.0/scripts/mbedtls_dev/
Dpsa_storage.py100 """The latest version of the storage format."""
103 version: Optional[int] = None,
111 self.version = self.LATEST_VERSION if version is None else version
153 header = self.MAGIC + self.pack('L', self.version)
154 if self.version == 0:
180 key = Key(version=0,
191 key = Key(version=0,
/mbedtls-3.6.0/tests/suites/
Dtest_suite_x509parse.data3 x509_cert_info:"data_files/parse_input/server1.crt":"cert. version \: 3\nserial number \: 0…
7 x509_cert_info:"data_files/parse_input/server1.crt.der":"cert. version \: 3\nserial number …
11 x509_cert_info:"data_files/parse_input/server2.crt":"cert. version \: 3\nserial number \: 0…
15 x509_cert_info:"data_files/parse_input/server2.crt.der":"cert. version \: 3\nserial number …
19 x509_cert_info:"data_files/parse_input/test-ca.crt":"cert. version \: 3\nserial number \: 0…
23 x509_cert_info:"data_files/parse_input/test-ca.crt.der":"cert. version \: 3\nserial number …
27 x509_cert_info:"data_files/parse_input/cert_md5.crt":"cert. version \: 3\nserial number \: …
31 x509_cert_info:"data_files/parse_input/cert_sha1.crt":"cert. version \: 3\nserial number \:…
35 x509_cert_info:"data_files/parse_input/cert_sha224.crt":"cert. version \: 3\nserial number …
39 x509_cert_info:"data_files/parse_input/cert_sha256.crt":"cert. version \: 3\nserial number …
[all …]
/mbedtls-3.6.0/library/
Dpkcs7.c58 * version Version
59 * Version ::= INTEGER
70 /* If version != 1, return invalid version */ in pkcs7_get_version()
214 * Since in this version we strictly support single certificate, and reaching in pkcs7_get_certificates()
263 * version Version;
293 ret = pkcs7_get_version(p, end_signer, &signer->version); in pkcs7_get_signer_info()
441 * version Version,
472 /* Get version of signed data */ in pkcs7_get_signed_data()
473 ret = pkcs7_get_version(&p, end, &signed_data->version); in pkcs7_get_signed_data()
Dx509_crl.c48 * Version ::= INTEGER { v1(0), v2(1) }
87 * -- if present, version MUST be v2 in x509_get_crl_ext()
305 while (crl->version != 0 && crl->next != NULL) { in mbedtls_x509_crl_parse_der()
309 if (crl->version != 0 && crl->next == NULL) { in mbedtls_x509_crl_parse_der()
373 * Version ::= INTEGER OPTIONAL { v1(0), v2(1) } in mbedtls_x509_crl_parse_der()
378 if ((ret = x509_crl_get_version(&p, end, &crl->version)) != 0 || in mbedtls_x509_crl_parse_der()
384 if (crl->version < 0 || crl->version > 1) { in mbedtls_x509_crl_parse_der()
389 crl->version++; in mbedtls_x509_crl_parse_der()
452 if (crl->version == 2) { in mbedtls_x509_crl_parse_der()
604 ret = mbedtls_snprintf(p, n, "%sCRL version : %d", in mbedtls_x509_crl_info()
[all …]
Dcheck_crypto_config.h102 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_xxx \
106 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_ECC_KEY_PAIR_xxx \
114 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_xxx \
118 future version of Mbed TLS. Please switch to new PSA_WANT_KEY_TYPE_RSA_KEY_PAIR_xxx \
/mbedtls-3.6.0/include/psa/
Dcrypto_compat.h8 * These names may be removed in a future version of Mbed TLS.
66 * specification. It was defined in the 1.0 Beta 3 version of the
67 * specification but was removed in the 1.0.0 released version. This API is
123 * specification. It was defined in the 1.0 Beta 3 version of the
124 * specification but was removed in the 1.0.0 released version. This API is
Dcrypto_types.h68 * format version and providing a translation when reading the old
87 * format version and providing a translation when reading the old
106 * format version and providing a translation when reading the old
124 * format version and providing a translation when reading the old
173 * format version and providing a translation when reading the old
209 * format version and providing a translation when reading the old
250 * format version and providing a translation when reading the old
281 * format version and providing a translation when reading the old
313 * format version and providing a translation when reading the old
342 * However, a future version of the library may report values that are
/mbedtls-3.6.0/tests/data_files/
DMakefile9 ## Note that in addition to depending on the version of the data
53 …est_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@
68 not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@
72 …est_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA1 version=3 output_file=$@
80 …t_ca_pwd_rsa) not_before=20190210144400 not_after=20290210144400 md=SHA256 version=3 output_file=$@
199 md=SHA256 version=3 output_file=$@
214 not_before=20290210144400 not_after=20390210144400 md=SHA256 version=3 output_file=$@
307 # Note: This requests openssl version >= 3.x.xx
319 …_1024_clear.pem not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@
334 …est_ca_pwd_rsa) not_before=20190210144406 not_after=20290210144406 md=SHA1 version=3 output_file=$@
[all …]
/mbedtls-3.6.0/docs/
D3.0-migration-guide.md3 This guide details the steps required to migrate from Mbed TLS version 2.x to
4 Mbed TLS version 3.0 or greater. Unlike normal releases, Mbed TLS 3.0 breaks
28 It's best to use the latest version of Mbed TLS 2.x for this purpose, which is the 2.28 LTS release.
48 * If you had a tool that parsed the library version from `include/mbedtls/version.h`, this has move…
55 A config file version symbol, `MBEDTLS_CONFIG_VERSION` was introduced.
74 …u do so at your own risk, since such code is likely to break in a future minor version of Mbed TLS.
149 This only affects people who've been using Mbed TLS since before version 2.0
196 provide your own version of that function), please use
217 Current version of the library does not support enabling `MBEDTLS_SHA256_C`
513 API were removed from version 1.0 of specification. Please switch to the new
[all …]

12345678910