Home
last modified time | relevance | path

Searched refs:MESSAGE (Results 1 – 4 of 4) sorted by relevance

/mbedtls-3.5.0/scripts/data_files/
Dvs6-main-template.dsp8 !MESSAGE This is not a valid makefile. To build this project using NMAKE,
9 !MESSAGE use the Export Makefile command and run
10 !MESSAGE
11 !MESSAGE NMAKE /f "mbedtls.mak".
12 !MESSAGE
13 !MESSAGE You can specify a configuration when running NMAKE
14 !MESSAGE by defining the macro CFG on the command line. For example:
15 !MESSAGE
16 !MESSAGE NMAKE /f "mbedtls.mak" CFG="mbedtls - Win32 Debug"
17 !MESSAGE
[all …]
Dvs6-app-template.dsp8 !MESSAGE This is not a valid makefile. To build this project using NMAKE,
9 !MESSAGE use the Export Makefile command and run
10 !MESSAGE
11 !MESSAGE NMAKE /f "<APPNAME>.mak".
12 !MESSAGE
13 !MESSAGE You can specify a configuration when running NMAKE
14 !MESSAGE by defining the macro CFG on the command line. For example:
15 !MESSAGE
16 !MESSAGE NMAKE /f "<APPNAME>.mak" CFG="<APPNAME> - Win32 Debug"
17 !MESSAGE
[all …]
/mbedtls-3.5.0/programs/ssl/
Ddtls_client.c63 #define MESSAGE "Echo this" macro
247 len = sizeof(MESSAGE) - 1; in main()
250 ret = mbedtls_ssl_write(&ssl, (unsigned char *) MESSAGE, len); in main()
260 mbedtls_printf(" %d bytes written\n\n%s\n\n", len, MESSAGE); in main()
/mbedtls-3.5.0/tests/suites/
Dtest_suite_psa_crypto.data619 PSA key policy: ECC SECP256R1, SIGN_HASH -> SIGN_HASH+MESSAGE
623 PSA key policy: ECC SECP256R1, VERIFY_HASH -> VERIFY_HASH+MESSAGE
627 PSA key policy: ECC SECP256R1, SIGN+VERIFY_HASH -> {SIGN,VERIFY}_{HASH,MESSAGE}
631 PSA key policy: ECC SECP256R1, {SIGN,VERIFY}_{HASH,MESSAGE}
650 PSA key policy: MAC, SIGN_HASH -> SIGN_HASH+MESSAGE
654 PSA key policy: MAC, VERIFY_HASH -> VERIFY_HASH+MESSAGE
658 PSA key policy: MAC, SIGN+VERIFY_HASH -> {SIGN,VERIFY}_{HASH,MESSAGE}
662 PSA key policy: MAC, {SIGN,VERIFY}_{HASH,MESSAGE}
1082 PSA key policy algorithm2: ECDH, ECDSA, HASH+MESSAGE usage
1086 PSA key policy algorithm2: ECDH, ECDSA, MESSAGE usage