/mbedtls-3.5.0/scripts/ |
D | generate_visualc_files.pl | 130 my $content = <$fh>; 133 return $content; 137 my ($content, $filename) = @_; 140 print $fh $content; 169 my $content = $template; 170 $content =~ s/<SOURCES>/$srcs/g; 171 $content =~ s/<APPNAME>/$appname/g; 172 $content =~ s/<GUID>/$guid/g; 173 $content =~ s/INCLUDE_DIRECTORIES\n/$include_directories/g; 175 content_to_file( $content, "$dir/$appname.$ext" );
|
D | generate_errors.pl | 68 my $content = <FILE>; 71 while ($content =~ m[
|
D | code_style.py | 62 content = open(CHECK_GENERATED_FILES, encoding="utf-8").read() 63 checks = re.findall(CHECK_CALL_RE, content)
|
/mbedtls-3.5.0/scripts/mbedtls_dev/ |
D | psa_storage.py | 35 def __init__(self, content: Union[int, str]): 36 if isinstance(content, int): 37 digits = 8 if content > 0xffff else 4 38 self.string = '{0:#0{1}x}'.format(content, digits + 2) 39 self.value_if_known = content #type: Optional[int] 41 self.string = content 42 self.unknown_values.add(self.normalize(content))
|
D | macro_collector.py | 63 for line_number, content in self.generator: 65 yield content
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_platform_util.function | 17 /* Write non-zero content */ 25 /* Check content is non-zero */ 34 /* Check content is zero and sentinels un-changed */ 48 * does not recognize that explicit_bzero() writes well-defined content to
|
D | test_suite_asn1write.function | 202 void mbedtls_asn1_write_string(int tag, data_t *content, data_t *expected) 214 &data.p, data.start, content->x, content->len); 219 (const char *) content->x, content->len); 224 (const char *) content->x, content->len); 229 (const char *) content->x, content->len); 234 (const char *) content->x, content->len); 239 (const char *) content->x, content->len);
|
D | test_suite_asn1parse.data | 433 SEQUENCE of 1 OCTET STRING truncated in content #1 436 SEQUENCE of 1 OCTET STRING truncated in content #2 439 SEQUENCE of 1 OCTET STRING truncated in content #3 460 SEQUENCE of 2 OCTET STRINGs, second truncated in content #1 463 SEQUENCE of 2 OCTET STRINGs, second truncated in content #2 466 SEQUENCE of 2 OCTET STRINGs, second truncated in content #3 565 AlgorithmIdentifier, truncated inside OID content 574 AlgorithmIdentifier, truncated inside params content
|
D | test_suite_bignum_core.misc.data | 440 Fill random core: 1 byte, prior content nonzero 446 Fill random core: 1 byte, 1 extra limb, prior content nonzero 458 Fill random core: 8 bytes, prior content nonzero 464 Fill random core: 8 bytes, 1 extra limb, prior content nonzero 479 Fill random core: 42 bytes, prior content nonzero 485 Fill random core: 42 bytes, 1 extra limb, prior content nonzero
|
D | test_suite_asn1parse.function | 183 unsigned char *content, size_t len) 190 TEST_ASSERT(content > state->input_start); 191 offset = content - state->input_start; 335 /* An INTEGER with no content is not valid. */ 342 * an INTEGER with empty content and gives it the value 0. */ 426 * actual_mpi = 2^n where n is the length of the content 624 * three integers: the offset of the element's content (offset from 625 * the start of input to the content of the element), the element's tag,
|
D | test_suite_psa_crypto_se_driver_hal.function | 239 uint8_t content[RAM_MAX_KEY_SIZE]; 278 if (required_storage > sizeof(ram_slots[slot_number].content)) { 288 * ram_slots[slot_number].content. */ 342 memcpy(ram_slots[slot_number].content, data, data_length); 361 memcpy(data, ram_slots[slot_number].content, actual_size); 382 ram_slots[slot_number].content, 466 slot->content, 499 slot->content, 597 /* Check that the persistent data of a driver has its expected content. */ 1358 memcpy(ram_slots[ram_min_slot].content, key_material->x,
|
D | test_suite_ecdsa.function | 490 void ecdsa_verify(int grp_id, char *x, char *y, char *r, char *s, data_t *content, int expected) 516 int result = mbedtls_ecdsa_verify(&ctx.grp, content->x, content->len, &ctx.Q, &sig_r, &sig_s);
|
D | test_suite_ssl.function | 1208 /* DTLS 1.2 + CID hides the real content type and 1209 * uses a special CID content type in the protected 1217 /* TLS 1.3 hides the real content type and 1218 * always uses Application Data as the content type 1371 /* DTLS 1.2 + CID hides the real content type and 1372 * uses a special CID content type in the protected 1380 /* TLS 1.3 hides the real content type and 1381 * always uses Application Data as the content type 1509 /* Prepare dummy record content */
|
D | test_suite_psa_crypto_slot_management.function | 282 * content. */ 553 /* Test that the target slot has the expected content. */
|
/mbedtls-3.5.0/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 37 …n which the file name is constructed depends on the storage backend. The content of the file is de… 73 * Files 1 through 0xfffeffff: [content](#key-file-format-for-0.1.0) of the [key whose identifier is… 84 * `sprintf(CRYPTO_STORAGE_FILE_LOCATION "psa_key_slot_%lu", key_id)` [content](#key-file-format-for… 112 … constructed from the key identifier depends on the storage backend. The content of the file is de… 137 * Files 0x100000000 through 0xffffffffffff: [content](#key-file-format-for-1.0.0) of the [key whose… 146 * Files 1 through 0xfffeffff: [content](#key-file-format-for-1.0.0) of the [key whose identifier is… 234 * Files 0x100000000 through 0xffffffffffff: [content](#key-file-format-for-1.0.0) of the [key whose… 243 * Files 1 through 0xfffeffff: [content](#key-file-format-for-1.0.0) of the [key whose identifier is… 251 …_SE_DRIVER_ITS_UID_BASE + lifetime`): secure element driver storage. The content of the file is th… 357 …stered drivers (`MBEDTLS_PSA_CRYPTO_DRIVERS`). The driver determines the content of the opaque key… [all …]
|
/mbedtls-3.5.0/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 39 …responding test cases in load-only mode: create a file with the expected content, load it and chec… 43 … the storage is a mapping from file identifier (a 64-bit number) to file content (a byte array). T… 68 Method: Create a key with certain metadata with `psa_import_key`. Read the file content and validat… 85 …nstants and some knowledge of what attributes (sizes, algorithms, …) and content to use for keys o…
|
D | driver-interface-test-strategy.md | 90 …has the expected content (this can be done by e.g. using a key that is supposed to be present) and…
|
D | invasive-testing.md | 302 …ich uses `mbedtls_psa_get_stats()` to get information about the keystore content before calling `m… 348 …rnal interface](#internal-interfaces)): call internal functions to inspect the content of the file. 366 …tipart operation structure, we can do it by looking inside the structure content, but only when ru…
|
/mbedtls-3.5.0/programs/ |
D | README.md | 22 …y_app.c`](pkey/key_app.c): loads a PEM or DER public key or private key file and dumps its content. 75 ….c): a simple SMTP-over-TLS or SMTP-STARTTLS client. This client sends an email with fixed content.
|
/mbedtls-3.5.0/ |
D | README.md | 59 …ncludes some files that are automatically generated by scripts and whose content depends only on t… 107 …tting `WARNING_CFLAGS` is useful when you want to get rid of its default content (for example beca… 186 your value of CFLAGS doesn't override the content provided by cmake (depending
|
D | SECURITY.md | 29 over the network. This includes observing the content and timing of individual
|
D | LICENSE | 142 origin of the Work and reproducing the content of the NOTICE file.
|
/mbedtls-3.5.0/library/ |
D | ssl_msg.c | 342 static int ssl_build_inner_plaintext(unsigned char *content, in ssl_build_inner_plaintext() argument 354 content[len] = rec_type; in ssl_build_inner_plaintext() 361 memset(content + len, 0, pad); in ssl_build_inner_plaintext() 372 static int ssl_parse_inner_plaintext(unsigned char const *content, in ssl_parse_inner_plaintext() argument 384 } while (content[remaining] == 0); in ssl_parse_inner_plaintext() 387 *rec_type = content[remaining]; in ssl_parse_inner_plaintext()
|
/mbedtls-3.5.0/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 57 …plementations of cryptographic algorithms are included based on both the content of the PSA Crypto…
|
D | psa-driver-interface.md | 190 …xport_public_key()` in the PSA Cryptography API. For opaque drivers, the content of the key buffer… 518 * For an opaque driver with an `"allocate_key"` entry point, the content of the key data buffer on … 774 The format of a key for opaque drivers is an opaque blob. The content of this blob is fully up to t…
|