/mbedtls-3.7.0/tests/suites/ |
D | test_suite_pkwrite.data | 1 Public key write check RSA 5 Public key write check RSA (DER) 9 Public key write check RSA 4096 13 Public key write check RSA 4096 (DER) 17 Public key write check EC 192 bits 21 Public key write check EC 192 bits (DER) 25 Public key write check EC 521 bits 29 Public key write check EC 521 bits (DER) 33 Public key write check EC Brainpool 512 bits 37 Public key write check EC Brainpool 512 bits (DER) [all …]
|
D | test_suite_x509write.data | 1 Certificate Request check Server1 SHA1 5 Certificate Request check Server1 SHA224 9 Certificate Request check Server1 SHA256 13 Certificate Request check Server1 SHA384 17 Certificate Request check Server1 SHA512 21 Certificate Request check Server1 MD5 25 Certificate Request check Server1 key_usage 29 Certificate Request check opaque Server1 key_usage 33 Certificate Request check Server1 key_usage empty 37 Certificate Request check Server1 ns_cert_type [all …]
|
D | test_suite_psa_crypto_slot_management.data | 1 Transient slot, check after closing 4 Transient slot, check after closing and restarting 7 Transient slot, check after destroying 10 Transient slot, check after destroying and restarting 13 Transient slot, check after restart with live handles 16 Persistent slot, check after closing, id=min 19 Persistent slot, check after closing and restarting, id=min 22 Persistent slot, check after destroying, id=min 25 Persistent slot, check after destroying and restarting, id=min 28 Persistent slot, check after purging, id=min [all …]
|
D | test_suite_ecp.data | 36 ECP check pubkey Curve25519 #1 (biggest) 40 ECP check pubkey Curve25519 #2 (too big) 44 ECP check pubkey Curve25519 #3 (DoS big) 48 ECP check pubkey Curve25519 y ignored 52 ECP check pubkey Curve25519 z is not 1 56 ECP check pubkey Curve25519 x negative 61 ECP check pubkey Curve25519 low-order point #1 66 ECP check pubkey Curve25519 low-order point #2 71 ECP check pubkey Curve25519 low-order point #3 (let's call this u) 76 ECP check pubkey Curve25519 low-order point #4 (let's call this v) [all …]
|
D | test_suite_ecdh.function | 111 mbedtls_mpi dA, dB, zA, zB, check; 118 mbedtls_mpi_init(&zA); mbedtls_mpi_init(&zB); mbedtls_mpi_init(&check); 163 TEST_ASSERT(mbedtls_test_read_mpi(&check, xA_str) == 0); 164 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qA.X, &check) == 0); 165 TEST_ASSERT(mbedtls_test_read_mpi(&check, yA_str) == 0); 166 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qA.Y, &check) == 0); 172 TEST_ASSERT(mbedtls_test_read_mpi(&check, xB_str) == 0); 173 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qB.X, &check) == 0); 174 TEST_ASSERT(mbedtls_test_read_mpi(&check, yB_str) == 0); 175 TEST_ASSERT(mbedtls_mpi_cmp_mpi(&qB.Y, &check) == 0); [all …]
|
D | test_suite_pk.data | 69 PK can do ext: ECDSA(ANY)/NONE, invalid check STREAM_CIPHER 73 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_SIGN(SHA256) 77 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PKCS1V15_CRYPT 81 PK can do ext: ECDSA(ANY)/NONE, invalid check RSA_PSS(SHA256) 85 PK can do ext: ECDSA(ANY)/NONE, invalid check ECDH 89 PK can do ext: ECDSA(ANY)/NONE, check ECDSA(SHA256) 93 PK can do ext: ECDSA(SHA256)/NONE, check ECDSA(SHA256) 97 PK can do ext: NONE/ECDSA(ANY_HASH), check ECDSA(SHA256) 101 PK can do ext: NONE/ECDSA(SHA256), check ECDSA(SHA256) 105 PK can do ext: ECDSA(SHA256)/NONE, invalid check ECDSA(ANY) [all …]
|
D | test_suite_version.function | 70 int check = mbedtls_version_check_feature(feature); 71 TEST_ASSERT(check == result);
|
D | test_suite_des.data | 1 DES check weak key #1 4 DES check weak key #2 7 DES check weak key #3 10 DES check weak key #4
|
D | test_suite_psa_crypto_se_driver_hal.data | 33 SE key import-export persistent, check after restart (slot 0) 36 SE key import-export persistent, check after restart (slot 3) 45 SE key import-export volatile, check after restart (slot 0) 48 SE key import-export volatile, check after restart (slot 3)
|
D | test_suite_psa_crypto_pake.data | 109 PSA PAKE: check rounds w/o forced errors 113 PSA PAKE: check rounds w/o forced errors, TLS12_PRF 117 PSA PAKE: check rounds, key is destroyed after being passed to set_password_key 121 PSA PAKE: check rounds w/o forced errors, client input first
|
D | test_suite_alignment.function | 337 /* Verify write - check memory is correct */ 347 uint16_t check = 0x1234; 348 uint8_t *p = (uint8_t *) ✓
|
D | test_suite_psa_crypto_storage_format.function | 139 /** Write a key with the given representation to storage, then check 228 * check that it has the expected format so that future versions 273 * and check that this version can use it. */
|
D | test_suite_cipher.function | 14 * check it against mbedtls_cipher_info_from_xxx(). */ 489 /* check result */ 823 /* decode buffer and check tag->x */ 838 /* check plaintext only if everything went fine */ 953 * Authenticate and decrypt, and check result 1010 * Encrypt and check the result 1072 /* check plaintext only if everything went fine */ 1118 /* check plaintext only if everything went fine */
|
/mbedtls-3.7.0/scripts/ |
D | code_style.py | 105 check=False) 121 stderr=subprocess.PIPE, check=False) 131 cp = subprocess.run(diff_cmd, check=False) 152 result = subprocess.run(uncrustify_cmd, check=False)
|
D | ecp_comb_table.py | 172 p = subprocess.run(args=args, check=False) 175 p = subprocess.run(args=[binname], check=False, env={
|
/mbedtls-3.7.0/tests/scripts/ |
D | check-generated-files.sh | 145 check scripts/generate_visualc_files.pl visualc/VS2017 151 check tests/scripts/generate_psa_wrappers.py tests/include/test/psa_test_wrappers.h tests/src/psa_t…
|
D | test_zeroize.gdb | 8 # Run a test using the debugger to check that the mbedtls_platform_zeroize() 16 # seem to be a mechanism to reliably check whether the zeroize calls are being 27 # inserting a test after a call to mbedtls_platform_zeroize() to check whether
|
D | check_names.py | 686 check=True 695 check=True 703 check=True 716 check=True 756 check=True
|
D | list-identifiers.sh | 51 check-names.sh, which used to depend on this script, has been replaced with
|
/mbedtls-3.7.0/ |
D | Makefile | 7 .PHONY: all no_test programs lib tests install uninstall clean test check lcov apidoc apidoc_clean 156 check: lib tests target 157 $(MAKE) -C tests check 159 test: check
|
/mbedtls-3.7.0/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 43 …d pointer is `NULL`) but has the substructure containing that method, and check that the return va… 44 …taining that method (i.e. the pointer to the substructure is `NULL`), and check that the return va… 45 * At least one test should register multiple drivers with a key in each driver and check that the e… 46 …ould register the same driver structure with multiple lifetime values and check that the driver re… 54 * Wherever the specification guarantees parameters that satisfy certain preconditions, check these … 60 …river call, call it with parameters that cause a driver to be invoked and check how Mbed TLS handl… 85 …>), call `mbedtls_psa_crypto_free(); psa_crypto_init()` at that point and check that this either r…
|
D | psa-storage-format-testing.md | 25 … has the expected data and metadata. Import-and-save testing and load-and-check testing can be spl… 29 …check passing on version W with the same data that proves that version W can read back what versio… 37 …implemented in `scripts/abi_check.py`. This tool fails the CI if load-and-check test case disappea… 39 …s in load-only mode: create a file with the expected content, load it and check the data that it c… 94 * For alternative persistence levels: have load-and-check tests for supported persistence levels. W…
|
/mbedtls-3.7.0/tests/ |
D | Makefile | 109 .PHONY: all check test clean 189 check: $(BINARIES) target 192 test: check
|
/mbedtls-3.7.0/visualc/VS2017/ |
D | .gitignore | 1 # Files that may be left over from check-generated-files.sh
|
/mbedtls-3.7.0/docs/architecture/ |
D | tls13-support.md | 229 - the macro to check for space when writing into an output buffer 231 - the macro to check for data when reading from an input buffer 241 check that we do not write or read past the end of a data buffer. The 377 * coordination stage: check if the state should be bypassed. This stage is 378 optional. The check is either purely based on the reading of the value of some 416 * coordination stage: check if the state should be bypassed. This stage is 417 optional. The check is based on the value of some fields of the SSL context.
|