/mbedtls-latest/tests/scripts/ |
D | generate_tls13_compat_tests.py | 146 ret += ["-ciphersuites {ciphersuites}".format(ciphersuites=ciphersuites)] 151 ret += ["-sigalgs {signature_algorithms}".format( 157 ret += ["-groups {named_groups}".format(named_groups=named_groups)] 193 ret += ['-cert {cert} -key {key}'.format(cert=cert, key=key)] 204 '-CAfile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] 294 ret += ['--priority={priority_string}'.format( 307 ret += ['--x509certfile {cert} --x509keyfile {key}'.format( 322 '--x509cafile {cafile}'.format(cafile=CERTIFICATES[self._cert_sig_algs[0]].cafile)] 345 ret += ["force_ciphersuite={ciphers}".format(ciphers=ciphers)] 348 ret += ['sig_algs={sig_algs}'.format( [all …]
|
D | check_names.py | 81 gutter = format(self.line_no, "4d") 85 " {0} |\n".format(" " * len(gutter)) + 86 " {0} | {1}".format(gutter, self.line) + 87 " {0} | {1}\n".format(" " * len(gutter), underline) 140 return "{0}".format(self.symbol_name) 146 .format(self.symbol_name)) 166 .format(self.match.filename, self.match.line_no, self.match.name) 172 .format( 196 .format(self.match.filename, self.match.line_no, self.match.name) 204 .format(self.match.filename, self.match.line_no, self.match.name) [all …]
|
D | run_demos.py | 26 print('#### {} ####'.format(demo)) 31 print('{}: FAIL'.format(demo)) 33 print('{}: {}'.format(demo, 'PASS' if success else 'FAIL')) 37 print('{}/{} demos passed'.format(successes, len(demos)))
|
D | audit-validity-dates.py | 39 + "({} is too old)".format(cryptography.__version__)) 89 raise ValueError("Unsupported file_type: {}".format(self.data_type)) 130 wrapper.__name__ = "{}.parser[{}]".format(type(self).__name__, tag) 299 result.locations.append("{}#{}".format(filename, idx)) 306 result.locations.append("{}".format(filename)) 366 audit_data.locations.append("{}:{}:#{}".format(filename, 376 print("{}\t{:20}\t{:20}\t{:3}\t{}".format( 449 logger.info("Total: {} objects found!".format(len(audit_results)))
|
D | generate_server9_bad_saltlen.py | 60 kwargs['ca_password'] = r'-passin "pass:{ca_password}"'.format( 66 kwargs['openssl_extfile'] = '-extfile {openssl_extfile}'.format( 71 cmd = OPENSSL_RSA_PSS_CERT_COMMAND.format(**kwargs) 75 cmd = OPENSSL_RSA_PSS_DGST_COMMAND.format(**kwargs)
|
D | test_psa_constant_names.py | 53 caller='test_psa_constant_names.py for {} values'.format(type_word), 129 sys.stdout.write('{} {}\t{}\n'.format(type_word, value, output)) 150 .format(error.type, error.expression, 152 out.write('{} test cases'.format(self.count)) 154 out.write(', {} FAIL\n'.format(len(self.errors)))
|
D | set_psa_test_dependencies.py | 202 .format(test_case_number, file_name)) 205 .format(test_case_number, file_name)) 227 .format(test_case_number, file_name)) 276 .format(file_name))
|
D | test_psa_compliance.py | 76 extra_includes = (';{}/drivers/builtin/include'.format(root_dir) 86 '-DPSA_CRYPTO_LIB_FILENAME={}/{}'.format(root_dir, 88 ('-DPSA_INCLUDE_PATHS={}/include' + extra_includes).format(root_dir)
|
D | psa_collect_statuses.py | 68 sys.stdout.write('{} {}\n'.format(function, name)) 112 help='Log file location (default: {})'.format( 117 help='Path to psa_constant_names (default: {})'.format(
|
D | check_test_cases.py | 47 format(file_name, line_number, *args)) 53 .format(file_name, line_number, *args)) 237 .format(sys.argv[0], results.errors, results.warnings))
|
D | depends.py | 128 log_line('Symbol {} was not found in {}'.format(option, conf.filename), color=colors.red) 208 log_line('*** [{}] Error {}'.format(' '.join(command), ret)) 491 log_line('{} passed'.format(' '.join(successes)), color=colors.bold_green) 493 log_line('{} FAILED'.format(' '.join(failures)), color=colors.bold_red)
|
/mbedtls-latest/scripts/ |
D | code_size_compare.py | 84 return '{git_rev}-{arch}-{config}-{compiler}'.format(**self.__dict__) 104 .format(measure_tool=self.measure_cmd.strip().split(' ')[0]) 218 .format(src=TFM_MEDIUM_CONFIG_H, dest=CONFIG_H)) 220 .format(src=TFM_MEDIUM_CRYPTO_CONFIG_H, 246 self.make_cmd.append('CFLAGS=\'{}\''.format(self.infer_make_cflags())) 248 self.make_cmd.append('CC={}'.format(self.compiler)) 253 .format(self.arch, 314 .format(self.git_rev)) 339 .format(self.git_rev)) 369 .format(self.git_rev, [all …]
|
D | generate_ssl_debug_helpers.py | 68 start_line = '#{} {}'.format(d, p) 70 end_line = '#endif /* {} */'.format(p) 72 end_line = '#endif /* defined({}) */'.format(p) 74 end_line = '#endif /* !defined({}) */'.format(p) 110 param = "!( {} )".format(pair_param) 173 return 'Enum({},{})'.format(self._name, self._span) 203 .format(member=member, space=' '*8) 216 body = body.format(translation_table='\n'.join(translation_table), 251 return 'SigAlgs({})'.format(self._definitions[0].span()) 265 ' case {}:\n return "{}";'.format(name, return_val)) [all …]
|
D | abi_check.py | 156 raise Exception("{} not installed, aborting".format(command)) 164 "Checking out git worktree for revision {} from {}".format( 177 self.log.debug("Checking out git worktree for revision {}".format( 193 self.log.debug("Commit is {}".format(version.commit)) 254 return "{} ({})".format(version.revision, version.commit) 262 self.report_dir, "{}-{}-{}.dump".format( 440 self.report_dir, "{}-{}-{}.html".format( 455 "Compatibility issues found for {}".format(mbed_module) 464 "for details see {}".format(mbed_module, output_path) 468 "No compatibility issues for {}".format(mbed_module) [all …]
|
D | assemble_changelog.py | 36 message = '{}:{}: {}'.format(filename, line_number, 37 message.format(*args, **kwargs)) 44 super().__init__('{}: {}'.format(line_offset, error_message)) 48 message = ('Lost content from {}: "{}"'.format(filename, line)) 53 message = ('Changelog filenames do not end with .txt: {}'.format(", ".join(filenames))) 138 top_version_title = cls._unreleased_version_text.format(name) + '\n\n' 206 categories = self.format.split_categories(text) 240 self.format = changelog_format 244 self.trailer) = self.format.extract_top_version(whole_file) 269 out.write(self.format.format_category(title, body))
|
/mbedtls-latest/library/ |
D | platform.c | 89 const char *format, ...) in platform_snprintf_uninit() argument 93 ((void) format); in platform_snprintf_uninit() 101 const char *format, 105 const char *format, in mbedtls_platform_set_snprintf() argument 144 const char *format, va_list arg) in platform_vsnprintf_uninit() argument 148 ((void) format); in platform_vsnprintf_uninit() 157 const char *format, 161 const char *format, in mbedtls_platform_set_vsnprintf() argument 174 static int platform_printf_uninit(const char *format, ...) in platform_printf_uninit() argument 176 ((void) format); in platform_printf_uninit() [all …]
|
D | mps_trace.c | 43 void mbedtls_mps_trace_print_msg(int id, int line, const char *format, ...) in mbedtls_mps_trace_print_msg() argument 48 va_start(argp, format); in mbedtls_mps_trace_print_msg() 49 ret = mbedtls_vsnprintf(str, MPS_TRACE_BUF_SIZE, format, argp); in mbedtls_mps_trace_print_msg()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_platform_printf.function | 3 /* The printf test functions take a format argument from the test data 5 * - For some tests, it makes sense to vary the format. 7 * that parses the format at runtime, and not a compiler optimization. 28 void printf_int(char *format, /* any format expecting one int argument, e.g. "%d" */ 36 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, x)); 47 void printf_long_max(const char *format, /* "%lx" or longer type */ 61 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, value)); 73 void printf_char2(char *format, /* "%c%c" */ 81 TEST_EQUAL(n, mbedtls_snprintf(output, n + 1, format, arg1, arg2));
|
D | test_suite_ecjpake.data | 37 ECJPAKE round one: KKP1: unknown first point format 52 ECJPAKE round one: KKP1: unknown second point format 85 ECJPAKE round one: KKP2: unknown first point format 100 ECJPAKE round one: KKP2: unknown second point format 151 ECJPAKE round two client: unknown first point format 166 ECJPAKE round two client: unknown second point format 205 ECJPAKE round two server: unknown first point format 220 ECJPAKE round two server: unknown second point format
|
D | test_suite_lms.data | 34 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message1.hex(), sig1.hex(), public_key.serialize(… 48 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message2.hex(), sig2.hex(), public_key.serialize(… 74 # * <Save signature in binary format> 98 # * <Save message in binary format> 103 # * Save message and signature in binary format 126 # * <Save message in binary format> 133 # * Save message and signature in binary format 160 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message.hex(), sig.hex(), public_key.get_pubkey()… 186 # print('lms_verify_test:"{}":"{}":"{}":0'.format(message.hex(), sig.hex(), public_key.get_pubkey()…
|
/mbedtls-latest/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 28 * [Persistent transparent keys](#key-file-format-for-0.1.0) designated by a [slot number](#key-name… 29 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only. 39 …s on the storage backend. The content of the file is described [below](#key-file-format-for-0.1.0). 49 ### Key file format for 0.1.0 64 ### Nonvolatile random seed file format for 0.1.0 68 The file format is just the seed as a byte string with no metadata or encoding of any kind. 75 * Files 1 through 0xfffeffff: [content](#key-file-format-for-0.1.0) of the [key whose identifier is… 76 …O_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0). 86 * `sprintf(CRYPTO_STORAGE_FILE_LOCATION "psa_key_slot_%lu", key_id)` [content](#key-file-format-for… 105 * [Persistent transparent keys](#key-file-format-for-1.0.0) designated by a [key identifier and own… [all …]
|
/mbedtls-latest/include/mbedtls/ |
D | platform.h | 176 extern int (*mbedtls_fprintf)(FILE *stream, const char *format, ...); 202 extern int (*mbedtls_printf)(const char *format, ...); 238 extern int (*mbedtls_snprintf)(char *s, size_t n, const char *format, ...); 249 const char *format, ...)); 276 extern int (*mbedtls_vsnprintf)(char *s, size_t n, const char *format, va_list arg); 286 const char *format, va_list arg));
|
/mbedtls-latest/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 1 # Mbed TLS PSA keystore format stability testing strategy 15 The goal of storage format stability testing is: as a user of Mbed TLS, I want to store a key under… 23 …y is deterministic. Therefore we can ensure the stability of the storage format by creating test c… 33 ### Keeping up with storage format evolution 39 …old keys (which should only be done by retiring a version of the storage format), then we should k… 56 …format version. When the storage format changes, if backward compatibility is desired, old test da… 64 ### General key format 66 Objective: test the format of the key file: which field goes where and how big it is.
|
/mbedtls-latest/ |
D | .pylintrc | 50 # * logging-format-interpolation: Pylint warns about things like 51 # ``log.info('...'.format(...))``. It insists on ``log.info('...', ...)``. 55 # Ubuntu 18.04) only recognize old-style format strings using '%', 67 disable=locally-disabled,locally-enabled,logging-format-interpolation,no-else-return,unnecessary-pa…
|
/mbedtls-latest/programs/pkey/ |
D | gen_key.c | 118 int format; /* the output format to use */ member 131 if (opt.format == FORMAT_PEM) { in write_private_key() 284 opt.format = DFL_FORMAT; in main() 304 opt.format = FORMAT_PEM; in main() 306 opt.format = FORMAT_DER; in main()
|