/net-tools-2.7.6/python-websocket-server/tests/ |
D | test_text_messages.py | 13 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\ 16 server.send_message_to_all(msg) 17 assert client.recv() == msg 22 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\ 25 server.send_message_to_all(msg) 26 assert client.recv() == msg 31 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\ 34 server.send_message_to_all(msg) 35 assert client.recv() == msg 40 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\ [all …]
|
/net-tools-2.7.6/mbedtls-2.4.0/tests/scripts/ |
D | all.sh | 80 msg() function 189 msg "info: $0 configuration" 225 msg "info: output_env.sh" 230 msg "test: recursion.pl" # < 1s 233 msg "test: freshness of generated source files" # < 1s 236 msg "test: doxygen markup outside doxygen blocks" # < 1s 239 msg "test/build: declared and exported names" # < 3s 243 msg "test: doxygen warnings" # ~ 3s 247 msg "build: create and build yotta module" # ~ 30s 251 msg "build: cmake, gcc, ASan" # ~ 1 min 50s [all …]
|
/net-tools-2.7.6/tinydtls-0.8.2/ |
D | ccm.c | 84 add_auth_data(rijndael_ctx *ctx, const unsigned char *msg, size_t la, in add_auth_data() argument 123 memcpy(B + j, msg, i); in add_auth_data() 125 msg += i; in add_auth_data() 133 B[i] = X[i] ^ *msg++; in add_auth_data() 141 memcpy(B, msg, la); in add_auth_data() 150 unsigned char *msg, size_t len, in encrypt() argument 158 memxor(msg, S, len); in encrypt() 163 unsigned char *msg, size_t len, in mac() argument 169 B[i] = X[i] ^ msg[i]; in mac() 178 unsigned char *msg, size_t lm, in dtls_ccm_encrypt_message() argument [all …]
|
D | ccm.h | 60 unsigned char *msg, size_t lm, 66 unsigned char *msg, size_t lm,
|
D | dtls.c | 261 dtls_get_cookie(uint8 *msg, size_t msglen, uint8 **cookie) { in dtls_get_cookie() argument 267 if (dtls_uint16_to_int(msg + DTLS_HS_LENGTH) != DTLS_VERSION) in dtls_get_cookie() 271 msg += DTLS_HS_LENGTH + DTLS_CH_LENGTH; in dtls_get_cookie() 273 SKIP_VAR_FIELD(msg, msglen, uint8); /* skip session id */ in dtls_get_cookie() 275 if (msglen < (*msg & 0xff) + sizeof(uint8)) in dtls_get_cookie() 278 *cookie = msg + sizeof(uint8); in dtls_get_cookie() 279 return dtls_uint8_to_int(msg); in dtls_get_cookie() 288 uint8 *msg, size_t msglen, in dtls_create_cookie() argument 318 e += (*(msg + DTLS_HS_LENGTH + e) & 0xff) + sizeof(uint8); in dtls_create_cookie() 322 dtls_hmac_update(&hmac_context, msg + DTLS_HS_LENGTH, e); in dtls_create_cookie() [all …]
|
D | dtls.h | 391 int dtls_record_read(dtls_state_t *state, uint8 *msg, int msglen); 404 uint8 *msg, int msglen);
|
D | uthash.h | 67 #define uthash_fatal(msg) exit(-1) /* fatal error (out of memory,etc) */ argument
|
/net-tools-2.7.6/mbedtls-2.4.0/tests/suites/ |
D | test_suite_ccm.function | 42 unsigned char msg[10]; 52 memset( msg, 0, sizeof( msg ) ); 62 msg, out, tag, tag_len ) == res ); 65 msg, out, tag, tag_len ); 84 unsigned char msg[50]; 94 memset( msg, 0x00, sizeof( msg ) ); 100 msg_len = unhexify( msg, msg_hex ); 110 msg, msg, msg + msg_len, tag_len ) == 0 ); 112 TEST_ASSERT( memcmp( msg, result, result_len ) == 0 ); 115 TEST_ASSERT( msg[result_len] == 0 && msg[result_len + 1] == 0 ); [all …]
|
D | test_suite_ecjpake.function | 113 unsigned char *msg; 118 msg = unhexify_alloc( data, &len ); 119 TEST_ASSERT( msg != NULL ); 124 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &ctx, msg, len ) == ref_ret ); 128 mbedtls_free( msg ); 137 unsigned char *msg; 142 msg = unhexify_alloc( data, &len ); 143 TEST_ASSERT( msg != NULL ); 154 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg, len ) == ref_ret ); 158 mbedtls_free( msg ); [all …]
|
D | test_suite_pk.function | 429 unsigned char msg[50], ciph[1000], test[1000]; 438 memset( msg, 0x2a, sizeof msg ); 469 TEST_ASSERT( mbedtls_pk_encrypt( &rsa, msg, sizeof msg, 475 TEST_ASSERT( test_len == sizeof msg ); 476 TEST_ASSERT( memcmp( test, msg, test_len ) == 0 ); 479 TEST_ASSERT( mbedtls_pk_encrypt( &alt, msg, sizeof msg,
|
D | test_suite_debug.data | 1 Debug print msg (threshold 1, level 0) 4 Debug print msg (threshold 1, level 1) 7 Debug print msg (threshold 1, level 2) 10 Debug print msg (threshold 0, level 1) 13 Debug print msg (threshold 0, level 5)
|
D | test_suite_ecdsa.function | 100 char *msg, char *r_str, char *s_str ) 121 mbedtls_md( md_info, (const unsigned char *) msg, strlen( msg ), hash );
|
D | test_suite_ccm.data | 41 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
|
/net-tools-2.7.6/tinydtls-0.8.2/tests/ |
D | ccm-test.c | 67 data[n].msg + data[n].la, 69 data[n].msg, data[n].la); 73 if (len != data[n].r_lm || memcmp(data[n].msg, data[n].result, len)) 79 dump(data[n].msg, len); 82 data[n].msg + data[n].la, len - data[n].la, 83 data[n].msg, data[n].la);
|
D | ccm-testdata.c | 34 unsigned char msg[200]; member
|
/net-tools-2.7.6/python-websocket-server/websocket_server/ |
D | websocket_server.py | 84 def send_message(self, client, msg): argument 85 self._unicast_(client, msg) 87 def send_message_to_all(self, msg): argument 88 self._multicast_(msg) 126 def _message_received_(self, handler, msg): argument 127 self.message_received(self.handler_to_client(handler), self, msg) 129 def _ping_received_(self, handler, msg): argument 130 handler.send_pong(msg) 132 def _pong_received_(self, handler, msg): argument 151 def _unicast_(self, to_client, msg): argument [all …]
|
/net-tools-2.7.6/mbedtls-2.4.0/programs/test/ |
D | udp_proxy.c | 231 static const char *msg_type( unsigned char *msg, size_t len ) in msg_type() argument 234 switch( msg[0] ) in msg_type() 250 if( msg[14] || msg[19] || msg[22] ) return( "Encrypted handshake" ); in msg_type() 252 switch( msg[13] ) in msg_type()
|
/net-tools-2.7.6/tinydtls-0.8.2/sha2/ |
D | sha2prog.c | 43 void usage(char *prog, char *msg) { in usage() argument 44 …all three hashes\n\t-q\tQuiet mode - only output hexadecimal hashes, one per line\n\n", msg, prog); in usage()
|
/net-tools-2.7.6/ |
D | tcptest.py | 31 def log(msg): argument 32 print("%s: %s" % (time.asctime(), msg))
|
/net-tools-2.7.6/mbedtls-2.4.0/library/ |
D | ccm.c | 378 static const unsigned char msg[] = { variable 424 msg, out, in mbedtls_ccm_self_test() 442 memcmp( out, msg, msg_len[i] ) != 0 ) in mbedtls_ccm_self_test()
|
D | ssl_cli.c | 3178 const unsigned char *msg; local 3211 msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl ); 3213 lifetime = ( msg[0] << 24 ) | ( msg[1] << 16 ) | 3214 ( msg[2] << 8 ) | ( msg[3] ); 3216 ticket_len = ( msg[4] << 8 ) | ( msg[5] ); 3249 memcpy( ticket, msg + 6, ticket_len );
|
D | ssl_tls.c | 2474 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local 2477 if( ( msg = mbedtls_calloc( 1, sizeof( mbedtls_ssl_flight_item ) ) ) == NULL ) in ssl_flight_append() 2484 if( ( msg->p = mbedtls_calloc( 1, ssl->out_msglen ) ) == NULL ) in ssl_flight_append() 2487 mbedtls_free( msg ); in ssl_flight_append() 2492 memcpy( msg->p, ssl->out_msg, ssl->out_msglen ); in ssl_flight_append() 2493 msg->len = ssl->out_msglen; in ssl_flight_append() 2494 msg->type = ssl->out_msgtype; in ssl_flight_append() 2495 msg->next = NULL; in ssl_flight_append() 2499 ssl->handshake->flight = msg; in ssl_flight_append() 2505 cur->next = msg; in ssl_flight_append() [all …]
|
/net-tools-2.7.6/libcoap/src/ |
D | net.c | 853 unsigned char *msg; in coap_handle_message() local 861 coap_packet_get_memmapped(packet, &msg, &msg_len); in coap_handle_message() 869 if (((*msg >> 6) & 0x03) != COAP_DEFAULT_VERSION) { in coap_handle_message() 870 debug("coap_handle_message: unknown protocol version %d\n", (*msg >> 6) & 0x03); in coap_handle_message() 891 if (!coap_pdu_parse(msg, msg_len, node->pdu)) { in coap_handle_message()
|
/net-tools-2.7.6/libcoap/include/coap/ |
D | uthash.h | 79 #define uthash_fatal(msg) exit(-1) /* fatal error (out of memory,etc) */ argument
|