/net-tools-3.4.0/mbedtls-2.4.0/ |
D | Makefile | 77 find . \( -name \*.gcno -o -name \*.gcda -o -name \*.info \) -exec rm {} + 96 lcov --capture --initial --directory library -o files.info 97 lcov --capture --directory library -o tests.info 98 lcov --add-tracefile files.info --add-tracefile tests.info -o all.info 99 lcov --remove all.info -o final.info '*.h' 101 …cription-file descriptions --keep-descriptions --legend --no-branch-coverage -o Coverage final.info 102 rm -f files.info tests.info all.info final.info descriptions
|
D | CMakeLists.txt | 147 … COMMAND lcov --capture --initial --directory library/CMakeFiles/mbedtls.dir -o files.info 148 COMMAND lcov --capture --directory library/CMakeFiles/mbedtls.dir -o tests.info 149 COMMAND lcov --add-tracefile files.info --add-tracefile tests.info -o all.info 150 COMMAND lcov --remove all.info -o final.info '*.h' 152 …cription-file descriptions --keep-descriptions --legend --no-branch-coverage -o Coverage final.info 153 COMMAND rm -f files.info tests.info all.info final.info descriptions
|
/net-tools-3.4.0/mbedtls-2.4.0/tests/suites/ |
D | helpers.function | 318 rnd_buf_info *info = (rnd_buf_info *) rng_state; 325 if( len > info->length ) 326 use_len = info->length; 330 memcpy( output, info->buf, use_len ); 331 info->buf += use_len; 332 info->length -= use_len; 364 rnd_pseudo_info *info = (rnd_pseudo_info *) rng_state; 371 k = info->key; 380 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) ) 381 + info->v1 ) ^ ( sum + k[sum & 3] ); [all …]
|
D | test_suite_pkcs5.function | 20 const mbedtls_md_info_t *info; 35 info = mbedtls_md_info_from_type( hash ); 36 TEST_ASSERT( info != NULL ); 37 TEST_ASSERT( mbedtls_md_setup( &ctx, info, 1 ) == 0 );
|
D | test_suite_pkcs1_v15.function | 23 rnd_buf_info info; 25 info.length = unhexify( rnd_buf, seed ); 26 info.buf = rnd_buf; 41 …TEST_ASSERT( mbedtls_rsa_pkcs1_encrypt( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PUBLIC, msg_len… 126 rnd_buf_info info; 128 info.length = unhexify( rnd_buf, salt ); 129 info.buf = rnd_buf; 161 …TEST_ASSERT( mbedtls_rsa_pkcs1_sign( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PRIVATE, digest, 0…
|
D | test_suite_pkcs1_v21.function | 23 rnd_buf_info info; 25 info.length = unhexify( rnd_buf, seed ); 26 info.buf = rnd_buf; 41 …TEST_ASSERT( mbedtls_rsa_pkcs1_encrypt( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PUBLIC, msg_len… 126 rnd_buf_info info; 128 info.length = unhexify( rnd_buf, salt ); 129 info.buf = rnd_buf; 161 …TEST_ASSERT( mbedtls_rsa_pkcs1_sign( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PRIVATE, digest, 0…
|
D | test_suite_ecp.data | 1 ECP curve info #1 5 ECP curve info #2 9 ECP curve info #3 13 ECP curve info #4 17 ECP curve info #5 21 ECP curve info #6 25 ECP curve info #7 29 ECP curve info #8
|
D | test_suite_md.function | 14 const mbedtls_md_info_t *info; 30 info = mbedtls_md_info_from_type( *md_type_ptr ); 31 TEST_ASSERT( info != NULL ); 32 TEST_ASSERT( mbedtls_md_setup( &ctx, info, 0 ) == 0 ); 46 const mbedtls_md_info_t *info = mbedtls_md_info_from_type( *( mbedtls_md_list() ) ); 58 TEST_ASSERT( mbedtls_md_setup( NULL, info, 0 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
|
D | test_suite_cipher.function | 28 const mbedtls_cipher_info_t *info = mbedtls_cipher_info_from_type( *( mbedtls_cipher_list() ) ); 47 TEST_ASSERT( mbedtls_cipher_setup( NULL, info ) 109 /* Check and get info structures */ 157 /* Check and get info structures */ 281 /* Check and get info structures */
|
D | test_suite_cmac.function | 29 /* Test NULL cipher info */
|
/net-tools-3.4.0/mbedtls-2.4.0/library/ |
D | pk.c | 101 int mbedtls_pk_setup( mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info ) in mbedtls_pk_setup() argument 103 if( ctx == NULL || info == NULL || ctx->pk_info != NULL ) in mbedtls_pk_setup() 106 if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) in mbedtls_pk_setup() 109 ctx->pk_info = info; in mbedtls_pk_setup() 124 const mbedtls_pk_info_t *info = &mbedtls_rsa_alt_info; in mbedtls_pk_setup_rsa_alt() local 129 if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) in mbedtls_pk_setup_rsa_alt() 132 ctx->pk_info = info; in mbedtls_pk_setup_rsa_alt()
|
D | cipher.c | 95 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_type() 97 return( def->info ); in mbedtls_cipher_info_from_type() 109 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_string() 110 if( ! strcmp( def->info->name, cipher_name ) ) in mbedtls_cipher_info_from_string() 111 return( def->info ); in mbedtls_cipher_info_from_string() 122 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_values() 123 if( def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values() 124 def->info->key_bitlen == (unsigned) key_bitlen && in mbedtls_cipher_info_from_values() 125 def->info->mode == mode ) in mbedtls_cipher_info_from_values() 126 return( def->info ); in mbedtls_cipher_info_from_values()
|
D | ssl_cli.c | 254 const mbedtls_ecp_curve_info *info; local 268 info = mbedtls_ecp_curve_info_from_grp_id( *grp_id ); 270 for( info = mbedtls_ecp_curve_list(); info->grp_id != MBEDTLS_ECP_DP_NONE; info++ ) 273 if( info == NULL ) 293 info = mbedtls_ecp_curve_info_from_grp_id( *grp_id ); 295 for( info = mbedtls_ecp_curve_list(); info->grp_id != MBEDTLS_ECP_DP_NONE; info++ ) 298 elliptic_curve_list[elliptic_curve_len++] = info->tls_id >> 8; 299 elliptic_curve_list[elliptic_curve_len++] = info->tls_id & 0xFF;
|
D | ssl_ciphersuites.c | 1799 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_get_ciphersuite_sig_pk_alg() argument 1801 switch( info->key_exchange ) in mbedtls_ssl_get_ciphersuite_sig_pk_alg() 1823 int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_ciphersuite_uses_ec() argument 1825 switch( info->key_exchange ) in mbedtls_ssl_ciphersuite_uses_ec() 1841 int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_ciphersuite_uses_psk() argument 1843 switch( info->key_exchange ) in mbedtls_ssl_ciphersuite_uses_psk()
|
D | pem.c | 389 mbedtls_free( ctx->info ); in mbedtls_pem_free()
|
/net-tools-3.4.0/libcoap/include/coap/ |
D | debug.h | 63 #define info(...) coap_log(LOG_INFO, __VA_ARGS__) macro 76 #define info(...) macro
|
/net-tools-3.4.0/mbedtls-2.4.0/include/mbedtls/ |
D | ssl_ciphersuites.h | 311 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info ); 314 int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info ); 315 int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info );
|
D | pem.h | 57 unsigned char *info; /*!< buffer for extra header information */ member
|
D | cipher_internal.h | 98 const mbedtls_cipher_info_t *info; member
|
D | ssl.h | 1300 const unsigned char *info, size_t ilen ); 1317 const unsigned char *info, size_t ilen ); 1373 const unsigned char *info,
|
D | pk.h | 205 int mbedtls_pk_setup( mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info );
|
/net-tools-3.4.0/python-websocket-server/ |
D | .gitignore | 6 *.egg-info
|
/net-tools-3.4.0/python-websocket-server/websocket_server/ |
D | websocket_server.py | 57 logger.info("Listening on port %d for clients.." % self.port) 61 logger.info("Server terminated.") 196 logger.info("Client closed connection.") 209 logger.info("Client asked to close connection.")
|
/net-tools-3.4.0/libcoap/ |
D | Makefile.am | 108 -version-info $(LT_LIBCOAP_CURRENT):$(LT_LIBCOAP_REVISION):$(LT_LIBCOAP_AGE) \
|
/net-tools-3.4.0/libcoap/examples/ |
D | client.c | 349 info("got RST\n"); in message_handler() 1248 info("timeout\n"); in main()
|