/mbedtls-3.4.0/tests/suites/ |
D | test_suite_pkwrite.data | 1 Public key write check RSA 5 Public key write check RSA 4096 9 Public key write check EC 192 bits 13 Public key write check EC 521 bits 17 Public key write check EC Brainpool 512 bits 21 Private key write check RSA 25 Private key write check RSA 4096 29 Private key write check EC 192 bits 33 Private key write check EC 256 bits (top bit set) 37 Private key write check EC 521 bits [all …]
|
D | test_suite_ecp.data | 36 ECP check pubkey Curve25519 #1 (biggest) 40 ECP check pubkey Curve25519 #2 (too big) 44 ECP check pubkey Curve25519 #3 (DoS big) 48 ECP check pubkey Curve25519 y ignored 52 ECP check pubkey Curve25519 z is not 1 56 ECP check pubkey Curve25519 x negative 61 ECP check pubkey Curve25519 low-order point #1 66 ECP check pubkey Curve25519 low-order point #2 71 ECP check pubkey Curve25519 low-order point #3 (let's call this u) 76 ECP check pubkey Curve25519 low-order point #4 (let's call this v) [all …]
|
D | test_suite_x509write.data | 1 Certificate Request check Server1 SHA1 5 Certificate Request check Server1 SHA224 9 Certificate Request check Server1 SHA256 13 Certificate Request check Server1 SHA384 17 Certificate Request check Server1 SHA512 21 Certificate Request check Server1 MD5 25 Certificate Request check Server1 key_usage 29 Certificate Request check opaque Server1 key_usage 33 Certificate Request check Server1 key_usage empty 37 Certificate Request check Server1 ns_cert_type [all …]
|
D | test_suite_pk.data | 55 PK can do ext: ECDSA(ANY)/NONE, invalid check STREAM_CIPHER 59 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256) 63 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT 67 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PSS(SHA256) 71 PK can do ext: ECDSA(ANY)/NONE, invalid check ECDH 75 PK can do ext: ECDSA(ANY)/NONE, check ECDSA(SHA256) 79 PK can do ext: ECDSA(SHA256)/NONE, check ECDSA(SHA256) 83 PK can do ext: NONE/ECDSA(ANY_HASH), check ECDSA(SHA256) 87 PK can do ext: NONE/ECDSA(SHA256), check ECDSA(SHA256) 91 PK can do ext: ECDSA(SHA256)/NONE, invalid check ECDSA(ANY) [all …]
|
D | test_suite_psa_crypto_slot_management.data | 1 Transient slot, check after closing 4 Transient slot, check after closing and restarting 7 Transient slot, check after destroying 10 Transient slot, check after destroying and restarting 13 Transient slot, check after restart with live handles 16 Persistent slot, check after closing, id=min 19 Persistent slot, check after closing and restarting, id=min 22 Persistent slot, check after destroying, id=min 25 Persistent slot, check after destroying and restarting, id=min 28 Persistent slot, check after purging, id=min [all …]
|
D | test_suite_ecdh.function | 111 mbedtls_mpi dA, dB, zA, zB, check; 118 mbedtls_mpi_init( &zA ); mbedtls_mpi_init( &zB ); mbedtls_mpi_init( &check ); 163 TEST_ASSERT( mbedtls_test_read_mpi( &check, xA_str ) == 0 ); 164 TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qA.X, &check ) == 0 ); 165 TEST_ASSERT( mbedtls_test_read_mpi( &check, yA_str ) == 0 ); 166 TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qA.Y, &check ) == 0 ); 172 TEST_ASSERT( mbedtls_test_read_mpi( &check, xB_str ) == 0 ); 173 TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qB.X, &check ) == 0 ); 174 TEST_ASSERT( mbedtls_test_read_mpi( &check, yB_str ) == 0 ); 175 TEST_ASSERT( mbedtls_mpi_cmp_mpi( &qB.Y, &check ) == 0 ); [all …]
|
D | test_suite_version.function | 70 int check = mbedtls_version_check_feature( feature ); 71 TEST_ASSERT( check == result );
|
D | test_suite_des.data | 1 DES check weak key #1 4 DES check weak key #2 7 DES check weak key #3 10 DES check weak key #4
|
D | test_suite_psa_crypto_se_driver_hal.data | 33 SE key import-export persistent, check after restart (slot 0) 36 SE key import-export persistent, check after restart (slot 3) 45 SE key import-export volatile, check after restart (slot 0) 48 SE key import-export volatile, check after restart (slot 3)
|
D | test_suite_pkwrite.function | 33 // check that the rest of the buffer remains clear 74 // check that the rest of the buffer remains clear
|
D | test_suite_psa_crypto_pake.data | 97 PSA PAKE: check rounds w/o forced errors 101 PSA PAKE: check rounds w/o forced errors, TLS12_PRF 105 PSA PAKE: check rounds, key is destroyed after being passed to set_password_key 109 PSA PAKE: check rounds w/o forced errors, client input first
|
D | test_suite_cipher.function | 14 * check it against mbedtls_cipher_info_from_xxx(). */ 501 /* check result */ 821 /* decode buffer and check tag->x */ 836 /* check plaintext only if everything went fine */ 947 * Authenticate and decrypt, and check result 1009 * Encrypt and check the result 1070 /* check plaintext only if everything went fine */ 1116 /* check plaintext only if everything went fine */
|
/mbedtls-3.4.0/tests/scripts/ |
D | check-generated-files.sh | 127 check scripts/generate_visualc_files.pl visualc/VS2010 128 check scripts/generate_psa_constants.py programs/psa/psa_constant_names_generated.c 129 check tests/scripts/generate_bignum_tests.py $(tests/scripts/generate_bignum_tests.py --list) 130 check tests/scripts/generate_psa_tests.py $(tests/scripts/generate_psa_tests.py --list)
|
D | test_zeroize.gdb | 20 # Run a test using the debugger to check that the mbedtls_platform_zeroize() 28 # seem to be a mechanism to reliably check whether the zeroize calls are being 39 # inserting a test after a call to mbedtls_platform_zeroize() to check whether
|
D | check_names.py | 643 check=True 652 check=True 660 check=True 673 check=True 713 check=True
|
D | list-identifiers.sh | 63 check-names.sh, which used to depend on this script, has been replaced with
|
/mbedtls-3.4.0/ |
D | Makefile | 7 .PHONY: all no_test programs lib tests install uninstall clean test check covtest lcov apidoc apido… 133 check: lib tests target 134 $(MAKE) -C tests check 136 test: check 142 $(MAKE) check
|
/mbedtls-3.4.0/scripts/ |
D | ecp_comb_table.py | 184 p = subprocess.run(args=args, check=False) 187 p = subprocess.run(args=[binname], check=False, env={
|
/mbedtls-3.4.0/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 43 …d pointer is `NULL`) but has the substructure containing that method, and check that the return va… 44 …taining that method (i.e. the pointer to the substructure is `NULL`), and check that the return va… 45 * At least one test should register multiple drivers with a key in each driver and check that the e… 46 …ould register the same driver structure with multiple lifetime values and check that the driver re… 54 * Wherever the specification guarantees parameters that satisfy certain preconditions, check these … 60 …river call, call it with parameters that cause a driver to be invoked and check how Mbed Crypto ha… 85 …>), call `mbedtls_psa_crypto_free(); psa_crypto_init()` at that point and check that this either r…
|
D | psa-storage-format-testing.md | 25 … has the expected data and metadata. Import-and-save testing and load-and-check testing can be spl… 29 …check passing on version W with the same data that proves that version W can read back what versio… 37 …implemented in `scripts/abi_check.py`. This tool fails the CI if load-and-check test case disappea… 39 …s in load-only mode: create a file with the expected content, load it and check the data that it c… 94 * For alternative persistence levels: have load-and-check tests for supported persistence levels. W…
|
/mbedtls-3.4.0/tests/ |
D | Makefile | 139 .PHONY: all check test clean 224 check: $(BINARIES) target 227 test: check
|
D | Descriptions.txt | 3 using 'make check' (Unix make) or 'make test' (Cmake), include test cases
|
/mbedtls-3.4.0/visualc/VS2010/ |
D | .gitignore | 5 # Files that may be left over from check-generated-files.sh
|
/mbedtls-3.4.0/programs/fuzz/ |
D | Makefile | 38 .PHONY: all check test clean
|
/mbedtls-3.4.0/docs/architecture/psa-migration/ |
D | outcome-analysis.sh | 48 make check
|