Home
last modified time | relevance | path

Searched refs:get (Results 1 – 25 of 50) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_oid.data1 OID get Any Policy certificate policy
4 OID get certificate policy invalid oid
7 OID get certificate policy wrong oid - id-ce-authorityKeyIdentifier
10 OID get Ext Key Usage - id-kp-serverAuth
13 OID get Ext Key Usage - id-kp-clientAuth
16 OID get Ext Key Usage - id-kp-codeSigning
19 OID get Ext Key Usage - id-kp-emailProtection
22 OID get Ext Key Usage - id-kp-timeStamping
25 OID get Ext Key Usage - id-kp-OCSPSigning
28 OID get Ext Key Usage - id-kp-wisun-fan-device
[all …]
Dtest_suite_psa_its.data1 Set/get/remove 0 bytes
4 Set/get/remove 42 bytes
7 Set/get/remove 1000 bytes
10 Set/get/remove with flags
Dtest_suite_mps.data82 MPS Reader: Random usage, 20 rds, feed 100, get 200, acc 50
85 MPS Reader: Random usage, 1000 rds, feed 10, get 100, acc 80
88 MPS Reader: Random usage, 10000 rds, feed 1, get 100, acc 80
91 MPS Reader: Random usage, 100 rds, feed 100, get 1000, acc 500
Dtest_suite_ecdh.data104 Context get ECP Group #1
108 Context get ECP Group #2
112 Context get ECP Group #3
116 Context get ECP Group #4
Dtest_suite_platform.data2 Time: get milliseconds
5 Time: get seconds
Dtest_suite_bignum_core.function647 /* Now let's get arrays of mbedtls_mpi_uints, rather than MPI structures */
649 /* TEST_CALLOC() uses calloc() under the hood, so these do get zeroed */
663 /* 1a) r = a - b => we should get the correct carry */
666 /* 1b) r = a - b => we should get the correct result */
670 /* 2a) r = a; r -= b => we should get the correct carry (use r to avoid clobbering a) */
674 /* 2b) r -= b => we should get the correct result */
677 /* 3a) r = b; r = a - r => we should get the correct carry (use r to avoid clobbering b) */
681 /* 3b) r = a - b => we should get the correct result */
760 /* Now let's get arrays of mbedtls_mpi_uints, rather than MPI structures */
762 /* TEST_CALLOC() uses calloc() under the hood, so these do get zeroed */
[all …]
Dtest_suite_timing.data1 Timing: get timer
Dtest_suite_ssl.function85 /* Make sure calling put and get on NULL buffer results in error. */
96 /* Make sure calling put and get on a buffer that hasn't been set up results
108 /* Make sure calling put and get on NULL input only results in
144 * - Afterwards if we try to get \p get1 bytes then we can get \get1_ret bytes.
147 * - Afterwards if we try to get \p get1 bytes then we can get \get1_ret bytes.
159 size_t get[ROUNDS];
174 * expecting more to put or get than we actually asked for. */
185 get[0] = get1;
189 get[1] = get2;
233 output + read, get[j]));
[all …]
Dtest_suite_constant_time.data1 # these are the numbers we'd get with an empty plaintext and truncated HMAC
5 # we could get this with 255-bytes plaintext and untruncated SHA-256
9 # we could get this with 255-bytes plaintext and untruncated SHA-384
Dtest_suite_mps.function150 * through multiple `get` calls. */
836 * obtained from successful get calls.
844 * Instead, it would be better to get the random data from a
933 /* Choose randomly between get tolerating fewer data,
934 * get not tolerating fewer data, and commit. */
Dtest_suite_cipher.function333 /* Check and get info structures */
389 /* Check and get info structures */
527 /* Check and get info structures */
1201 /* Check and get info structures */
Dtest_suite_dhm.data11 ## changes, so we get to exercise the code with a few different values.
Dtest_suite_platform.function110 * If discontinuous changes occur during `nanosleep()`, we will get
/mbedtls-latest/tests/scripts/
Dgenerate_server9_bad_saltlen.py58 ca_password = kwargs.get('ca_password', '')
64 extfile = kwargs.get('openssl_extfile', '')
81 with open(kwargs.get('output'), 'wb') as f:
Danalyze_outcomes.py139 ref_outcomes = outcomes.get("component_" + component_ref)
140 driver_outcomes = outcomes.get("component_" + component_driver)
163 for str_or_re in (ignored_tests.get(full_test_suite, []) +
164 ignored_tests.get(test_suite, [])):
Ddepends.py296 for dep in EXCLUSIVE_GROUPS.get(symbol, []):
307 for dep in REVERSE_DEPENDENCIES.get(key, []):
Dall.sh919 if scripts/config.py get MBEDTLS_THREADING_C; then
923 if scripts/config.py get MBEDTLS_THREADING_PTHREAD; then
/mbedtls-latest/tests/docker/bionic/
DDockerfile22 RUN apt-get update \
23 && apt-get -y install software-properties-common \
28 RUN apt-get update \
29 && apt-get -y install \
/mbedtls-latest/scripts/
Dci.requirements.txt17 # compatible with the running Python: this way we get something good enough
18 # for mypy and pylint under Python 3.5, and we also get something good enough
Dgenerate_ssl_debug_helpers.py159 prefix_name = group.get('prefix_name', None)
160 suffix_name = group.get('suffix_name', None)
161 body = group.get('body', None)
Dlcov.sh21 5. After rework, run "$0 -r", then re-test and run "$0" to get a fresh report.
24 -r Reset traces. Run this before re-testing to get fresh measurements.
/mbedtls-latest/docs/
Duse-psa-crypto.md82 using the new API in order to get the benefits; it can then pass the
102 the new APIs to get the benefits.
115 the new APIs to get the benefits.
/mbedtls-latest/doxygen/
Dmbedtls.doxyfile34 # constant to get the generic documentation of that error code. If we don't
/mbedtls-latest/docs/architecture/psa-migration/
Dstrategy.md44 both, but then you won't get the full effect of RESTARTBLE (see the
77 TLS and X.509 layers can't both use only PSA APIs and get restartable
212 application code, while the other requires no application change to get
247 We can roughly divide the work needed to get there in the following steps:
354 are expressed (sometimes in bulk), to get things wrong in a way that would
/mbedtls-latest/
DMakefile130 -scripts/config.py get MBEDTLS_CTR_DRBG_USE_128_BIT_KEY && ([ $$? -eq 0 ]) && \

12