Home
last modified time | relevance | path

Searched refs:max (Results 1 – 25 of 28) sorted by relevance

12

/mbedtls-latest/scripts/
Dmassif_max.pl21 my ($max, $max_heap, $max_he, $max_stack) = (0, 0, 0, 0);
31 if( $total > $max ) {
32 ($max, $max_heap, $max_he, $max_stack) = ($total, $heap, $heap_extra, $stack);
36 printf "$max (heap $max_heap+$max_he, stack $max_stack)\n";
/mbedtls-latest/tests/suites/
Dtest_suite_pkcs1_v15.data55 RSAES-V15 decoding: good, payload=max, tight output buffer
58 RSAES-V15 decoding: good, payload=max, larger output buffer
61 RSAES-V15 decoding: good, payload=max-1, tight output buffer
64 RSAES-V15 decoding: good, payload=max-1, larger output buffer
73 RSAES-V15 decoding: payload=max, output too large
76 RSAES-V15 decoding: payload=max-1, output too large
Dtest_suite_psa_crypto_se_driver_hal.data54 Key creation in a specific slot (max)
60 Key creation in a specific slot (max, restart)
181 Key registration: key id max vendor
187 Key registration: key id max volatile
Dtest_suite_random.data45 PSA classic wrapper: CTR_DRBG max
49 PSA classic wrapper: HMAC_DRBG max
Dtest_suite_psa_crypto_se_driver_hal_mocks.data16 SE key importing mock test: max key bits
19 SE key importing mock test: more than max key bits
Dtest_suite_psa_crypto_slot_management.data37 Persistent slot, check after closing, id=max
40 Persistent slot, check after destroying, id=max
43 Persistent slot, check after purging, id=max
46 Persistent slot, check after restart, id=max
Dtest_suite_pkcs1_v21.data1033 RSASSA-PSS Signature verify options #8 (non-default salt_len: max)
1237 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max
1241 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max+1
1249 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max
1253 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max+1
1261 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max
1265 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max+1
1273 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max
1277 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max + 1
Dtest_suite_psa_crypto_entropy.data31 PSA validate entropy injection: good, max size
Dtest_suite_psa_crypto_se_driver_hal.function831 psa_key_location_t max = MIN_DRIVER_LOCATION + count;
836 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
839 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
856 psa_key_location_t max = MIN_DRIVER_LOCATION + PSA_MAX_SE_DRIVERS;
861 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
Dtest_suite_psa_crypto_pake.function987 uint8_t password_ret[20] = { 0 }; // max key length is 20 bytes
1084 uint8_t user_ret[20] = { 0 }; // max user length is 20 bytes
1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes
Dtest_suite_ssl.data431 Handshake min/max version check, all -> 1.2
435 Handshake min/max version check, all -> 1.3
3349 TLS 1.3 srv, max early data size, dflt, wsz=96
3352 TLS 1.3 srv, max early data size, dflt, wsz=128
3355 TLS 1.3 srv, max early data size, 3, wsz=2
3358 TLS 1.3 srv, max early data size, 3, wsz=3
3361 TLS 1.3 srv, max early data size, 98, wsz=23
3364 TLS 1.3 srv, max early data size, 98, wsz=49
3367 TLS 1.3 srv, max early data size, server rejects, dflt, wsz=128
3370 TLS 1.3 srv, max early data size, server rejects, 3, wsz=3
[all …]
Dtest_suite_oid.data196 OID from numeric string - OID greater than max length (129 components)
Dtest_suite_x509write.data266 Check max serial length
269 Check max extension length
Dtest_suite_pk.data525 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK)
565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long)
577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short)
585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short)
593 Verify ext RSA #20 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too long)
Dtest_suite_x509write.function96 * Unfortunately there's no predefined max size for OIDs which can be used
Dtest_suite_x509parse.function18 adapt the script framework/data_files/dir-max/long.sh."
Dtest_suite_bignum_core.function753 /* Get the (max) number of limbs we will need */
Dtest_suite_psa_crypto.function8020 * 1. Test that setting max ops is reflected in both interruptible sign and
8067 /* Check that default max ops gets set if we don't set it. */
8085 /* Check that max ops gets set properly. */
8091 /* --- Ensure changing the max ops mid operation works (operation should
8092 * complete successfully after setting max ops to unlimited --- */
/mbedtls-latest/library/
Dssl_cache.c381 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max) in mbedtls_ssl_cache_set_max_entries() argument
383 if (max < 0) { in mbedtls_ssl_cache_set_max_entries()
384 max = 0; in mbedtls_ssl_cache_set_max_entries()
387 cache->max_entries = max; in mbedtls_ssl_cache_set_max_entries()
Dx509.c53 #define CHECK_RANGE(min, max, val) \ argument
55 if ((val) < (min) || (val) > (max)) { \
/mbedtls-latest/programs/psa/
Dpsa_constant_names.c195 static int process_signed(signed_value_type type, long min, long max, char **argp) in process_signed() argument
209 if (value > max || (errno == ERANGE && value > 0)) { in process_signed()
234 static int process_unsigned(unsigned_value_type type, unsigned long max, char **argp) in process_unsigned() argument
244 if (value > max || errno == ERANGE) { in process_unsigned()
/mbedtls-latest/
D.pylintrc39 max-attributes=15
44 max-module-lines=2000
/mbedtls-latest/include/mbedtls/
Dssl_cache.h174 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max);
Dssl.h3164 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
/mbedtls-latest/tests/scripts/
Daudit-validity-dates.py86 self.not_valid_after = datetime.datetime.max

12