/mbedtls-latest/scripts/ |
D | massif_max.pl | 21 my ($max, $max_heap, $max_he, $max_stack) = (0, 0, 0, 0); 31 if( $total > $max ) { 32 ($max, $max_heap, $max_he, $max_stack) = ($total, $heap, $heap_extra, $stack); 36 printf "$max (heap $max_heap+$max_he, stack $max_stack)\n";
|
/mbedtls-latest/tests/suites/ |
D | test_suite_pkcs1_v15.data | 55 RSAES-V15 decoding: good, payload=max, tight output buffer 58 RSAES-V15 decoding: good, payload=max, larger output buffer 61 RSAES-V15 decoding: good, payload=max-1, tight output buffer 64 RSAES-V15 decoding: good, payload=max-1, larger output buffer 73 RSAES-V15 decoding: payload=max, output too large 76 RSAES-V15 decoding: payload=max-1, output too large
|
D | test_suite_psa_crypto_se_driver_hal.data | 54 Key creation in a specific slot (max) 60 Key creation in a specific slot (max, restart) 181 Key registration: key id max vendor 187 Key registration: key id max volatile
|
D | test_suite_random.data | 45 PSA classic wrapper: CTR_DRBG max 49 PSA classic wrapper: HMAC_DRBG max
|
D | test_suite_psa_crypto_se_driver_hal_mocks.data | 16 SE key importing mock test: max key bits 19 SE key importing mock test: more than max key bits
|
D | test_suite_psa_crypto_slot_management.data | 37 Persistent slot, check after closing, id=max 40 Persistent slot, check after destroying, id=max 43 Persistent slot, check after purging, id=max 46 Persistent slot, check after restart, id=max
|
D | test_suite_pkcs1_v21.data | 1033 RSASSA-PSS Signature verify options #8 (non-default salt_len: max) 1237 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max 1241 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max+1 1249 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max 1253 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max+1 1261 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max 1265 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max+1 1273 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max 1277 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max + 1
|
D | test_suite_psa_crypto_entropy.data | 31 PSA validate entropy injection: good, max size
|
D | test_suite_psa_crypto_se_driver_hal.function | 831 psa_key_location_t max = MIN_DRIVER_LOCATION + count; 836 for (location = MIN_DRIVER_LOCATION; location < max; location++) { 839 for (location = MIN_DRIVER_LOCATION; location < max; location++) { 856 psa_key_location_t max = MIN_DRIVER_LOCATION + PSA_MAX_SE_DRIVERS; 861 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
|
D | test_suite_psa_crypto_pake.function | 987 uint8_t password_ret[20] = { 0 }; // max key length is 20 bytes 1084 uint8_t user_ret[20] = { 0 }; // max user length is 20 bytes 1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes
|
D | test_suite_ssl.data | 431 Handshake min/max version check, all -> 1.2 435 Handshake min/max version check, all -> 1.3 3349 TLS 1.3 srv, max early data size, dflt, wsz=96 3352 TLS 1.3 srv, max early data size, dflt, wsz=128 3355 TLS 1.3 srv, max early data size, 3, wsz=2 3358 TLS 1.3 srv, max early data size, 3, wsz=3 3361 TLS 1.3 srv, max early data size, 98, wsz=23 3364 TLS 1.3 srv, max early data size, 98, wsz=49 3367 TLS 1.3 srv, max early data size, server rejects, dflt, wsz=128 3370 TLS 1.3 srv, max early data size, server rejects, 3, wsz=3 [all …]
|
D | test_suite_oid.data | 196 OID from numeric string - OID greater than max length (129 components)
|
D | test_suite_x509write.data | 266 Check max serial length 269 Check max extension length
|
D | test_suite_pk.data | 525 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK) 565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long) 577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short) 585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short) 593 Verify ext RSA #20 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too long)
|
D | test_suite_x509write.function | 96 * Unfortunately there's no predefined max size for OIDs which can be used
|
D | test_suite_x509parse.function | 18 adapt the script framework/data_files/dir-max/long.sh."
|
D | test_suite_bignum_core.function | 753 /* Get the (max) number of limbs we will need */
|
D | test_suite_psa_crypto.function | 8020 * 1. Test that setting max ops is reflected in both interruptible sign and 8067 /* Check that default max ops gets set if we don't set it. */ 8085 /* Check that max ops gets set properly. */ 8091 /* --- Ensure changing the max ops mid operation works (operation should 8092 * complete successfully after setting max ops to unlimited --- */
|
/mbedtls-latest/library/ |
D | ssl_cache.c | 381 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max) in mbedtls_ssl_cache_set_max_entries() argument 383 if (max < 0) { in mbedtls_ssl_cache_set_max_entries() 384 max = 0; in mbedtls_ssl_cache_set_max_entries() 387 cache->max_entries = max; in mbedtls_ssl_cache_set_max_entries()
|
D | x509.c | 53 #define CHECK_RANGE(min, max, val) \ argument 55 if ((val) < (min) || (val) > (max)) { \
|
/mbedtls-latest/programs/psa/ |
D | psa_constant_names.c | 195 static int process_signed(signed_value_type type, long min, long max, char **argp) in process_signed() argument 209 if (value > max || (errno == ERANGE && value > 0)) { in process_signed() 234 static int process_unsigned(unsigned_value_type type, unsigned long max, char **argp) in process_unsigned() argument 244 if (value > max || errno == ERANGE) { in process_unsigned()
|
/mbedtls-latest/ |
D | .pylintrc | 39 max-attributes=15 44 max-module-lines=2000
|
/mbedtls-latest/include/mbedtls/ |
D | ssl_cache.h | 174 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max);
|
D | ssl.h | 3164 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
|
/mbedtls-latest/tests/scripts/ |
D | audit-validity-dates.py | 86 self.not_valid_after = datetime.datetime.max
|