Home
last modified time | relevance | path

Searched refs:content (Results 1 – 25 of 27) sorted by relevance

12

/mbedtls-3.5.0/scripts/
Dgenerate_visualc_files.pl130 my $content = <$fh>;
133 return $content;
137 my ($content, $filename) = @_;
140 print $fh $content;
169 my $content = $template;
170 $content =~ s/<SOURCES>/$srcs/g;
171 $content =~ s/<APPNAME>/$appname/g;
172 $content =~ s/<GUID>/$guid/g;
173 $content =~ s/INCLUDE_DIRECTORIES\n/$include_directories/g;
175 content_to_file( $content, "$dir/$appname.$ext" );
Dgenerate_errors.pl68 my $content = <FILE>;
71 while ($content =~ m[
Dcode_style.py62 content = open(CHECK_GENERATED_FILES, encoding="utf-8").read()
63 checks = re.findall(CHECK_CALL_RE, content)
/mbedtls-3.5.0/scripts/mbedtls_dev/
Dpsa_storage.py35 def __init__(self, content: Union[int, str]):
36 if isinstance(content, int):
37 digits = 8 if content > 0xffff else 4
38 self.string = '{0:#0{1}x}'.format(content, digits + 2)
39 self.value_if_known = content #type: Optional[int]
41 self.string = content
42 self.unknown_values.add(self.normalize(content))
Dmacro_collector.py63 for line_number, content in self.generator:
65 yield content
/mbedtls-3.5.0/tests/suites/
Dtest_suite_platform_util.function17 /* Write non-zero content */
25 /* Check content is non-zero */
34 /* Check content is zero and sentinels un-changed */
48 * does not recognize that explicit_bzero() writes well-defined content to
Dtest_suite_asn1write.function202 void mbedtls_asn1_write_string(int tag, data_t *content, data_t *expected)
214 &data.p, data.start, content->x, content->len);
219 (const char *) content->x, content->len);
224 (const char *) content->x, content->len);
229 (const char *) content->x, content->len);
234 (const char *) content->x, content->len);
239 (const char *) content->x, content->len);
Dtest_suite_asn1parse.data433 SEQUENCE of 1 OCTET STRING truncated in content #1
436 SEQUENCE of 1 OCTET STRING truncated in content #2
439 SEQUENCE of 1 OCTET STRING truncated in content #3
460 SEQUENCE of 2 OCTET STRINGs, second truncated in content #1
463 SEQUENCE of 2 OCTET STRINGs, second truncated in content #2
466 SEQUENCE of 2 OCTET STRINGs, second truncated in content #3
565 AlgorithmIdentifier, truncated inside OID content
574 AlgorithmIdentifier, truncated inside params content
Dtest_suite_bignum_core.misc.data440 Fill random core: 1 byte, prior content nonzero
446 Fill random core: 1 byte, 1 extra limb, prior content nonzero
458 Fill random core: 8 bytes, prior content nonzero
464 Fill random core: 8 bytes, 1 extra limb, prior content nonzero
479 Fill random core: 42 bytes, prior content nonzero
485 Fill random core: 42 bytes, 1 extra limb, prior content nonzero
Dtest_suite_asn1parse.function183 unsigned char *content, size_t len)
190 TEST_ASSERT(content > state->input_start);
191 offset = content - state->input_start;
335 /* An INTEGER with no content is not valid. */
342 * an INTEGER with empty content and gives it the value 0. */
426 * actual_mpi = 2^n where n is the length of the content
624 * three integers: the offset of the element's content (offset from
625 * the start of input to the content of the element), the element's tag,
Dtest_suite_psa_crypto_se_driver_hal.function239 uint8_t content[RAM_MAX_KEY_SIZE];
278 if (required_storage > sizeof(ram_slots[slot_number].content)) {
288 * ram_slots[slot_number].content. */
342 memcpy(ram_slots[slot_number].content, data, data_length);
361 memcpy(data, ram_slots[slot_number].content, actual_size);
382 ram_slots[slot_number].content,
466 slot->content,
499 slot->content,
597 /* Check that the persistent data of a driver has its expected content. */
1358 memcpy(ram_slots[ram_min_slot].content, key_material->x,
Dtest_suite_ecdsa.function490 void ecdsa_verify(int grp_id, char *x, char *y, char *r, char *s, data_t *content, int expected)
516 int result = mbedtls_ecdsa_verify(&ctx.grp, content->x, content->len, &ctx.Q, &sig_r, &sig_s);
Dtest_suite_ssl.function1208 /* DTLS 1.2 + CID hides the real content type and
1209 * uses a special CID content type in the protected
1217 /* TLS 1.3 hides the real content type and
1218 * always uses Application Data as the content type
1371 /* DTLS 1.2 + CID hides the real content type and
1372 * uses a special CID content type in the protected
1380 /* TLS 1.3 hides the real content type and
1381 * always uses Application Data as the content type
1509 /* Prepare dummy record content */
Dtest_suite_psa_crypto_slot_management.function282 * content. */
553 /* Test that the target slot has the expected content. */
/mbedtls-3.5.0/docs/architecture/
Dmbed-crypto-storage-specification.md37 …n which the file name is constructed depends on the storage backend. The content of the file is de…
73 * Files 1 through 0xfffeffff: [content](#key-file-format-for-0.1.0) of the [key whose identifier is…
84 * `sprintf(CRYPTO_STORAGE_FILE_LOCATION "psa_key_slot_%lu", key_id)` [content](#key-file-format-for…
112 … constructed from the key identifier depends on the storage backend. The content of the file is de…
137 * Files 0x100000000 through 0xffffffffffff: [content](#key-file-format-for-1.0.0) of the [key whose…
146 * Files 1 through 0xfffeffff: [content](#key-file-format-for-1.0.0) of the [key whose identifier is…
234 * Files 0x100000000 through 0xffffffffffff: [content](#key-file-format-for-1.0.0) of the [key whose…
243 * Files 1 through 0xfffeffff: [content](#key-file-format-for-1.0.0) of the [key whose identifier is…
251 …_SE_DRIVER_ITS_UID_BASE + lifetime`): secure element driver storage. The content of the file is th…
357 …stered drivers (`MBEDTLS_PSA_CRYPTO_DRIVERS`). The driver determines the content of the opaque key…
[all …]
/mbedtls-3.5.0/docs/architecture/testing/
Dpsa-storage-format-testing.md39 …responding test cases in load-only mode: create a file with the expected content, load it and chec…
43 … the storage is a mapping from file identifier (a 64-bit number) to file content (a byte array). T…
68 Method: Create a key with certain metadata with `psa_import_key`. Read the file content and validat…
85 …nstants and some knowledge of what attributes (sizes, algorithms, …) and content to use for keys o…
Ddriver-interface-test-strategy.md90 …has the expected content (this can be done by e.g. using a key that is supposed to be present) and…
Dinvasive-testing.md302 …ich uses `mbedtls_psa_get_stats()` to get information about the keystore content before calling `m…
348 …rnal interface](#internal-interfaces)): call internal functions to inspect the content of the file.
366 …tipart operation structure, we can do it by looking inside the structure content, but only when ru…
/mbedtls-3.5.0/programs/
DREADME.md22 …y_app.c`](pkey/key_app.c): loads a PEM or DER public key or private key file and dumps its content.
75 ….c): a simple SMTP-over-TLS or SMTP-STARTTLS client. This client sends an email with fixed content.
/mbedtls-3.5.0/
DREADME.md59 …ncludes some files that are automatically generated by scripts and whose content depends only on t…
107 …tting `WARNING_CFLAGS` is useful when you want to get rid of its default content (for example beca…
186 your value of CFLAGS doesn't override the content provided by cmake (depending
DSECURITY.md29 over the network. This includes observing the content and timing of individual
DLICENSE142 origin of the Work and reproducing the content of the NOTICE file.
/mbedtls-3.5.0/library/
Dssl_msg.c342 static int ssl_build_inner_plaintext(unsigned char *content, in ssl_build_inner_plaintext() argument
354 content[len] = rec_type; in ssl_build_inner_plaintext()
361 memset(content + len, 0, pad); in ssl_build_inner_plaintext()
372 static int ssl_parse_inner_plaintext(unsigned char const *content, in ssl_parse_inner_plaintext() argument
384 } while (content[remaining] == 0); in ssl_parse_inner_plaintext()
387 *rec_type = content[remaining]; in ssl_parse_inner_plaintext()
/mbedtls-3.5.0/docs/proposed/
Dpsa-conditional-inclusion-c.md57 …plementations of cryptographic algorithms are included based on both the content of the PSA Crypto…
Dpsa-driver-interface.md190 …xport_public_key()` in the PSA Cryptography API. For opaque drivers, the content of the key buffer…
518 * For an opaque driver with an `"allocate_key"` entry point, the content of the key data buffer on …
774 The format of a key for opaque drivers is an opaque blob. The content of this blob is fully up to t…

12