Home
last modified time | relevance | path

Searched refs:check (Results 1 – 25 of 79) sorted by relevance

1234

/mbedtls-3.6.0/tests/suites/
Dtest_suite_pkwrite.data1 Public key write check RSA
5 Public key write check RSA (DER)
9 Public key write check RSA 4096
13 Public key write check RSA 4096 (DER)
17 Public key write check EC 192 bits
21 Public key write check EC 192 bits (DER)
25 Public key write check EC 521 bits
29 Public key write check EC 521 bits (DER)
33 Public key write check EC Brainpool 512 bits
37 Public key write check EC Brainpool 512 bits (DER)
[all …]
Dtest_suite_pk.data55 PK can do ext: ECDSA(ANY)/NONE, invalid check STREAM_CIPHER
59 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256)
63 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT
67 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PSS(SHA256)
71 PK can do ext: ECDSA(ANY)/NONE, invalid check ECDH
75 PK can do ext: ECDSA(ANY)/NONE, check ECDSA(SHA256)
79 PK can do ext: ECDSA(SHA256)/NONE, check ECDSA(SHA256)
83 PK can do ext: NONE/ECDSA(ANY_HASH), check ECDSA(SHA256)
87 PK can do ext: NONE/ECDSA(SHA256), check ECDSA(SHA256)
91 PK can do ext: ECDSA(SHA256)/NONE, invalid check ECDSA(ANY)
[all …]
Dtest_suite_x509write.data1 Certificate Request check Server1 SHA1
5 Certificate Request check Server1 SHA224
9 Certificate Request check Server1 SHA256
13 Certificate Request check Server1 SHA384
17 Certificate Request check Server1 SHA512
21 Certificate Request check Server1 MD5
25 Certificate Request check Server1 key_usage
29 Certificate Request check opaque Server1 key_usage
33 Certificate Request check Server1 key_usage empty
37 Certificate Request check Server1 ns_cert_type
[all …]
Dtest_suite_psa_crypto_slot_management.data1 Transient slot, check after closing
4 Transient slot, check after closing and restarting
7 Transient slot, check after destroying
10 Transient slot, check after destroying and restarting
13 Transient slot, check after restart with live handles
16 Persistent slot, check after closing, id=min
19 Persistent slot, check after closing and restarting, id=min
22 Persistent slot, check after destroying, id=min
25 Persistent slot, check after destroying and restarting, id=min
28 Persistent slot, check after purging, id=min
[all …]
Dtest_suite_ecp.data36 ECP check pubkey Curve25519 #1 (biggest)
40 ECP check pubkey Curve25519 #2 (too big)
44 ECP check pubkey Curve25519 #3 (DoS big)
48 ECP check pubkey Curve25519 y ignored
52 ECP check pubkey Curve25519 z is not 1
56 ECP check pubkey Curve25519 x negative
61 ECP check pubkey Curve25519 low-order point #1
66 ECP check pubkey Curve25519 low-order point #2
71 ECP check pubkey Curve25519 low-order point #3 (let's call this u)
76 ECP check pubkey Curve25519 low-order point #4 (let's call this v)
[all …]
Dtest_suite_ecdh.function111 mbedtls_mpi dA, dB, zA, zB, check;
118 mbedtls_mpi_init(&zA); mbedtls_mpi_init(&zB); mbedtls_mpi_init(&check);
163 TEST_ASSERT(mbedtls_test_read_mpi(&check, xA_str) == 0);
164 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qA.X, &check) == 0);
165 TEST_ASSERT(mbedtls_test_read_mpi(&check, yA_str) == 0);
166 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qA.Y, &check) == 0);
172 TEST_ASSERT(mbedtls_test_read_mpi(&check, xB_str) == 0);
173 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qB.X, &check) == 0);
174 TEST_ASSERT(mbedtls_test_read_mpi(&check, yB_str) == 0);
175 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qB.Y, &check) == 0);
[all …]
Dtest_suite_version.function70 int check = mbedtls_version_check_feature(feature);
71 TEST_ASSERT(check == result);
Dtest_suite_des.data1 DES check weak key #1
4 DES check weak key #2
7 DES check weak key #3
10 DES check weak key #4
Dtest_suite_psa_crypto_se_driver_hal.data33 SE key import-export persistent, check after restart (slot 0)
36 SE key import-export persistent, check after restart (slot 3)
45 SE key import-export volatile, check after restart (slot 0)
48 SE key import-export volatile, check after restart (slot 3)
Dtest_suite_psa_crypto_pake.data109 PSA PAKE: check rounds w/o forced errors
113 PSA PAKE: check rounds w/o forced errors, TLS12_PRF
117 PSA PAKE: check rounds, key is destroyed after being passed to set_password_key
121 PSA PAKE: check rounds w/o forced errors, client input first
Dtest_suite_alignment.function337 /* Verify write - check memory is correct */
347 uint16_t check = 0x1234;
348 uint8_t *p = (uint8_t *) ✓
Dtest_suite_cipher.function14 * check it against mbedtls_cipher_info_from_xxx(). */
485 /* check result */
819 /* decode buffer and check tag->x */
834 /* check plaintext only if everything went fine */
949 * Authenticate and decrypt, and check result
1006 * Encrypt and check the result
1068 /* check plaintext only if everything went fine */
1114 /* check plaintext only if everything went fine */
Dtest_suite_psa_crypto_storage_format.function223 /** Write a key with the given representation to storage, then check
312 * check that it has the expected format so that future versions
357 * and check that this version can use it. */
/mbedtls-3.6.0/tests/scripts/
Dcheck-generated-files.sh125 check scripts/generate_visualc_files.pl visualc/VS2013
126 check scripts/generate_psa_constants.py programs/psa/psa_constant_names_generated.c
127 check tests/scripts/generate_bignum_tests.py $(tests/scripts/generate_bignum_tests.py --list)
128 check tests/scripts/generate_ecp_tests.py $(tests/scripts/generate_ecp_tests.py --list)
129 check tests/scripts/generate_psa_tests.py $(tests/scripts/generate_psa_tests.py --list)
Dtest_zeroize.gdb8 # Run a test using the debugger to check that the mbedtls_platform_zeroize()
16 # seem to be a mechanism to reliably check whether the zeroize calls are being
27 # inserting a test after a call to mbedtls_platform_zeroize() to check whether
Dcheck_names.py686 check=True
695 check=True
703 check=True
716 check=True
756 check=True
Dlist-identifiers.sh51 check-names.sh, which used to depend on this script, has been replaced with
/mbedtls-3.6.0/scripts/
Dcode_style.py97 check=False)
113 stderr=subprocess.PIPE, check=False)
123 cp = subprocess.run(diff_cmd, check=False)
144 result = subprocess.run(uncrustify_cmd, check=False)
Decp_comb_table.py172 p = subprocess.run(args=args, check=False)
175 p = subprocess.run(args=[binname], check=False, env={
/mbedtls-3.6.0/
DMakefile7 .PHONY: all no_test programs lib tests install uninstall clean test check lcov apidoc apidoc_clean
156 check: lib tests target
157 $(MAKE) -C tests check
159 test: check
/mbedtls-3.6.0/docs/architecture/testing/
Ddriver-interface-test-strategy.md43 …d pointer is `NULL`) but has the substructure containing that method, and check that the return va…
44 …taining that method (i.e. the pointer to the substructure is `NULL`), and check that the return va…
45 * At least one test should register multiple drivers with a key in each driver and check that the e…
46 …ould register the same driver structure with multiple lifetime values and check that the driver re…
54 * Wherever the specification guarantees parameters that satisfy certain preconditions, check these …
60 …river call, call it with parameters that cause a driver to be invoked and check how Mbed TLS handl…
85 …>), call `mbedtls_psa_crypto_free(); psa_crypto_init()` at that point and check that this either r…
Dpsa-storage-format-testing.md25 … has the expected data and metadata. Import-and-save testing and load-and-check testing can be spl…
29check passing on version W with the same data that proves that version W can read back what versio…
37 …implemented in `scripts/abi_check.py`. This tool fails the CI if load-and-check test case disappea…
39 …s in load-only mode: create a file with the expected content, load it and check the data that it c…
94 * For alternative persistence levels: have load-and-check tests for supported persistence levels. W…
/mbedtls-3.6.0/tests/
DMakefile166 .PHONY: all check test clean
258 check: $(BINARIES) target
261 test: check
/mbedtls-3.6.0/visualc/VS2013/
D.gitignore1 # Files that may be left over from check-generated-files.sh
/mbedtls-3.6.0/docs/architecture/
Dtls13-support.md264 - the macro to check for space when writing into an output buffer
266 - the macro to check for data when reading from an input buffer
280 check that we do not write or read past the end of a data buffer. The
416 * coordination stage: check if the state should be bypassed. This stage is
417 optional. The check is either purely based on the reading of the value of some
455 * coordination stage: check if the state should be bypassed. This stage is
456 optional. The check is based on the value of some fields of the SSL context.

1234