/mbedtls-latest/programs/ssl/ |
D | ssl_client2.c | 557 } opt; variable 581 if (opt.debug_level == 0) { in my_verify() 611 if (opt.transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM) { in report_cid_usage() 634 if (opt.cid_enabled == MBEDTLS_SSL_CID_ENABLED) { in report_cid_usage() 730 ret = mbedtls_snprintf((char *) buf, buf_size, GET_REQUEST, opt.request_page); in build_http_request() 737 if (opt.request_size != DFL_REQUEST_SIZE) { in build_http_request() 738 request_size = (size_t) opt.request_size; in build_http_request() 748 if (opt.request_size != DFL_REQUEST_SIZE && in build_http_request() 758 if (opt.request_size != DFL_REQUEST_SIZE && in build_http_request() 919 opt.server_name = DFL_SERVER_NAME; in main() [all …]
|
D | ssl_server2.c | 711 } opt; variable 1343 if (opt.transport != MBEDTLS_SSL_TRANSPORT_DATAGRAM) { in report_cid_usage() 1357 if (opt.cid_enabled == MBEDTLS_SSL_CID_ENABLED) { in report_cid_usage() 1424 switch (opt.dummy_ticket % 11) { in dummy_ticket_parse() 1690 opt.buffer_size = DFL_IO_BUF_LEN; in main() 1691 opt.server_addr = DFL_SERVER_ADDR; in main() 1692 opt.server_port = DFL_SERVER_PORT; in main() 1693 opt.debug_level = DFL_DEBUG_LEVEL; in main() 1694 opt.event = DFL_EVENT; in main() 1695 opt.response_size = DFL_RESPONSE_SIZE; in main() [all …]
|
D | ssl_mail_client.c | 137 } opt; variable 384 opt.server_name = DFL_SERVER_NAME; in main() 385 opt.server_port = DFL_SERVER_PORT; in main() 386 opt.debug_level = DFL_DEBUG_LEVEL; in main() 387 opt.authentication = DFL_AUTHENTICATION; in main() 388 opt.mode = DFL_MODE; in main() 389 opt.user_name = DFL_USER_NAME; in main() 390 opt.user_pwd = DFL_USER_PWD; in main() 391 opt.mail_from = DFL_MAIL_FROM; in main() 392 opt.mail_to = DFL_MAIL_TO; in main() [all …]
|
D | ssl_test_common_source.c | 84 if (opt.nss_keylog_file != NULL) { in nss_keylog_export() 87 if ((f = fopen(opt.nss_keylog_file, "a")) == NULL) { in nss_keylog_export() 165 if (opt.debug_level > 1) { in ssl_check_record() 171 if (opt.debug_level > 1) { in ssl_check_record() 177 if (opt.debug_level > 1) { in ssl_check_record() 204 if (opt.nbio == 2) { in recv_cb() 214 if (opt.transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM) { in recv_cb() 239 if (opt.transport == MBEDTLS_SSL_TRANSPORT_DATAGRAM) { in recv_timeout_cb() 255 if (opt.nbio == 2) { in send_cb()
|
/mbedtls-latest/programs/x509/ |
D | cert_write.c | 205 } opt; variable 218 if (opt.format == FORMAT_DER) { in write_certificate() 347 opt.issuer_crt = DFL_ISSUER_CRT; in main() 348 opt.request_file = DFL_REQUEST_FILE; in main() 349 opt.subject_key = DFL_SUBJECT_KEY; in main() 350 opt.issuer_key = DFL_ISSUER_KEY; in main() 351 opt.subject_pwd = DFL_SUBJECT_PWD; in main() 352 opt.issuer_pwd = DFL_ISSUER_PWD; in main() 353 opt.output_file = DFL_OUTPUT_FILENAME; in main() 354 opt.subject_name = DFL_SUBJECT_NAME; in main() [all …]
|
D | cert_req.c | 108 } opt; variable 181 opt.filename = DFL_FILENAME; in main() 182 opt.password = DFL_PASSWORD; in main() 183 opt.debug_level = DFL_DEBUG_LEVEL; in main() 184 opt.output_file = DFL_OUTPUT_FILENAME; in main() 185 opt.subject_name = DFL_SUBJECT_NAME; in main() 186 opt.key_usage = DFL_KEY_USAGE; in main() 187 opt.force_key_usage = DFL_FORCE_KEY_USAGE; in main() 188 opt.ns_cert_type = DFL_NS_CERT_TYPE; in main() 189 opt.force_ns_cert_type = DFL_FORCE_NS_CERT_TYPE; in main() [all …]
|
D | cert_app.c | 87 } opt; variable 168 opt.mode = DFL_MODE; in main() 169 opt.filename = DFL_FILENAME; in main() 170 opt.ca_file = DFL_CA_FILE; in main() 171 opt.crl_file = DFL_CRL_FILE; in main() 172 opt.ca_path = DFL_CA_PATH; in main() 173 opt.server_name = DFL_SERVER_NAME; in main() 174 opt.server_port = DFL_SERVER_PORT; in main() 175 opt.debug_level = DFL_DEBUG_LEVEL; in main() 176 opt.permissive = DFL_PERMISSIVE; in main() [all …]
|
D | load_roots.c | 48 } opt; variable 101 opt.filenames = NULL; in main() 102 opt.iterations = DFL_ITERATIONS; in main() 103 opt.prime_cache = DFL_PRIME_CACHE; in main() 124 opt.iterations = atoi(q); in main() 126 opt.iterations = atoi(q) != 0; in main() 134 opt.filenames = (const char **) argv + i; in main() 135 if (*opt.filenames == 0) { in main() 141 if (opt.prime_cache) { in main() 142 if (!read_certificates(opt.filenames)) { in main() [all …]
|
D | crl_app.c | 45 } opt; variable 76 opt.filename = DFL_FILENAME; in main() 86 opt.filename = q; in main() 98 ret = mbedtls_x509_crl_parse_file(&crl, opt.filename); in main()
|
D | req_app.c | 45 } opt; variable 76 opt.filename = DFL_FILENAME; in main() 86 opt.filename = q; in main() 98 ret = mbedtls_x509_csr_parse_file(&csr, opt.filename); in main()
|
/mbedtls-latest/programs/test/ |
D | udp_proxy.c | 162 } opt; variable 181 opt.server_addr = DFL_SERVER_ADDR; in get_options() 182 opt.server_port = DFL_SERVER_PORT; in get_options() 183 opt.listen_addr = DFL_LISTEN_ADDR; in get_options() 184 opt.listen_port = DFL_LISTEN_PORT; in get_options() 185 opt.pack = DFL_PACK; in get_options() 188 opt.delay_cli_cnt = 0; in get_options() 189 opt.delay_srv_cnt = 0; in get_options() 190 memset(opt.delay_cli, 0, sizeof(opt.delay_cli)); in get_options() 191 memset(opt.delay_srv, 0, sizeof(opt.delay_srv)); in get_options() [all …]
|
/mbedtls-latest/programs/pkey/ |
D | key_app_writer.c | 90 } opt; variable 103 if (opt.output_format == OUTPUT_FORMAT_PEM) { in write_public_key() 145 if (opt.output_format == OUTPUT_FORMAT_PEM) { in write_private_key() 292 opt.mode = DFL_MODE; in main() 293 opt.filename = DFL_FILENAME; in main() 294 opt.output_mode = DFL_OUTPUT_MODE; in main() 295 opt.output_file = DFL_OUTPUT_FILENAME; in main() 296 opt.output_format = DFL_OUTPUT_FORMAT; in main() 307 opt.mode = MODE_PRIVATE; in main() 309 opt.mode = MODE_PUBLIC; in main() [all …]
|
D | gen_key.c | 120 } opt; variable 131 if (opt.format == FORMAT_PEM) { in write_private_key() 280 opt.type = DFL_TYPE; in main() 281 opt.rsa_keysize = DFL_RSA_KEYSIZE; in main() 282 opt.ec_curve = DFL_EC_CURVE; in main() 283 opt.filename = DFL_FILENAME; in main() 284 opt.format = DFL_FORMAT; in main() 285 opt.use_dev_random = DFL_USE_DEV_RANDOM; in main() 296 opt.type = MBEDTLS_PK_RSA; in main() 298 opt.type = MBEDTLS_PK_ECKEY; in main() [all …]
|
D | key_app.c | 129 } opt; variable 174 opt.mode = DFL_MODE; in main() 175 opt.filename = DFL_FILENAME; in main() 176 opt.password = DFL_PASSWORD; in main() 177 opt.password_file = DFL_PASSWORD_FILE; in main() 188 opt.mode = MODE_PRIVATE; in main() 190 opt.mode = MODE_PUBLIC; in main() 195 opt.filename = q; in main() 197 opt.password = q; in main() 199 opt.password_file = q; in main() [all …]
|
/mbedtls-latest/tests/scripts/ |
D | components-configuration-tls.sh | 22 tests/ssl-opt.sh 105 tests/ssl-opt.sh -f "TLS 1.2" 134 tests/ssl-opt.sh -f "TLS 1.2" 162 tests/ssl-opt.sh -f "TLS 1.2" 191 tests/ssl-opt.sh -f "TLS 1.2" 216 P_SRV=../s2_no_use_psa tests/ssl-opt.sh -f "ECJPAKE: working, TLS" 218 P_SRV=../s2_no_use_psa tests/ssl-opt.sh -f "ECJPAKE: opaque password client only, working, TLS" 220 P_CLI=../c2_no_use_psa tests/ssl-opt.sh -f "ECJPAKE: working, TLS" 222 P_CLI=../c2_no_use_psa tests/ssl-opt.sh -f "ECJPAKE: opaque password server only, working, TLS" 235 tests/ssl-opt.sh -f "Max fragment\|Large packet" [all …]
|
D | components-build-system.sh | 78 ./tests/ssl-opt.sh -f 'Default' >ssl-opt.out 2>ssl-opt.err 79 grep PASS ssl-opt.out 80 cat ssl-opt.err >&2 82 [ ! -s ssl-opt.err ] 83 rm ssl-opt.out ssl-opt.err
|
D | components-configuration.sh | 46 tests/ssl-opt.sh 68 tests/ssl-opt.sh 90 tests/ssl-opt.sh 118 tests/ssl-opt.sh 169 tests/ssl-opt.sh -f 'Default\|ECJPAKE\|SSL async private' 270 tests/ssl-opt.sh 341 tests/ssl-opt.sh -e '^DTLS proxy' 363 tests/ssl-opt.sh -e 'proxy'
|
D | test-ref-configs.pl | 120 my $opt = $data->{'opt'}; 121 if( $opt ) 134 print "\nrunning ssl-opt.sh $opt ($conf_name)\n"; 135 system( "tests/ssl-opt.sh $opt" )
|
D | components-basic-checks.sh | 67 opt='--quiet' 69 opt='' 71 tests/scripts/check_test_cases.py -q $opt 72 unset opt
|
D | components-platform.sh | 237 … for opt in MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_ONLY MBEDTLS_SHA256_USE_ARMV8_A_CRYPTO_IF_PRESENT; do 238 scripts/config.py set ${opt} 239 msg "${opt} clang, test A32 crypto instructions built" 243 msg "${opt} clang, test T32 crypto instructions built" 247 msg "${opt} clang, test aarch64 crypto instructions built" 250 scripts/config.py unset ${opt} 304 tests/ssl-opt.sh 321 tests/ssl-opt.sh -f ECDH
|
D | components-configuration-crypto.sh | 143 tests/ssl-opt.sh 156 tests/ssl-opt.sh -f RSA 182 tests/ssl-opt.sh -f 'Default\|SSL async private.*delay=\|tickets enabled on server' 204 tests/ssl-opt.sh -f 'Default\|SSL async private.*delay=\|tickets enabled on server' 230 tests/ssl-opt.sh -f 'Default\|SSL async private: sign' 257 tests/ssl-opt.sh -f 'Default\|SSL async private: sign' 286 tests/ssl-opt.sh -f 'Default' 305 tests/ssl-opt.sh -f 'Default\|opaque' 320 tests/ssl-opt.sh -f 'Default\|opaque' 597 tests/ssl-opt.sh -f ECDH [all …]
|
D | components-compiler.sh | 27 for opt in "$@"; do 28 msg "build/test: $cc $opt, $info" # ~ 30s 29 make CC="$cc" CFLAGS="$opt -std=c99 -pedantic -Wall -Wextra -Werror"
|
/mbedtls-latest/programs/util/ |
D | pem2der.c | 46 } opt; variable 186 opt.filename = DFL_FILENAME; in main() 187 opt.output_file = DFL_OUTPUT_FILENAME; in main() 198 opt.filename = q; in main() 200 opt.output_file = q; in main() 212 ret = load_file(opt.filename, &pem_buffer, &pem_size); in main() 246 ret = write_file(opt.output_file, der_buffer, der_size); in main()
|
/mbedtls-latest/docs/architecture/testing/ |
D | test-framework.md | 33 Each test case in `ssl-opt.sh` has a description which succinctly describes for a human audience wh… 41 …ions). In addition, failure cause in `compat.sh` is not classified as `ssl-opt.sh`, so the informa… 49 Unit tests, `ssl-opt.sh` and `compat.sh` record the outcome of each test case in a **test outcome f… 61 * **Test suite**: `test_suite_xxx`, `ssl-opt` or `compat`.
|
/mbedtls-latest/docs/ |
D | use-psa-crypto.md | 54 opt-in: by default, these modules would keep using the stable, 58 its use in other modules opt-in. However, PSA Crypto functions require that 81 **Use in X.509 and TLS:** opt-in. The application needs to construct the PK context 101 **Use in TLS:** opt-in. The application needs to register the key using one of 114 **Use in TLS:** opt-in. The application needs to register the key using one of
|