Home
last modified time | relevance | path

Searched refs:info (Results 1 – 25 of 33) sorted by relevance

12

/net-tools-3.6.0/mbedtls-2.4.0/
DMakefile77 find . \( -name \*.gcno -o -name \*.gcda -o -name \*.info \) -exec rm {} +
96 lcov --capture --initial --directory library -o files.info
97 lcov --capture --directory library -o tests.info
98 lcov --add-tracefile files.info --add-tracefile tests.info -o all.info
99 lcov --remove all.info -o final.info '*.h'
101 …cription-file descriptions --keep-descriptions --legend --no-branch-coverage -o Coverage final.info
102 rm -f files.info tests.info all.info final.info descriptions
DCMakeLists.txt147 … COMMAND lcov --capture --initial --directory library/CMakeFiles/mbedtls.dir -o files.info
148 COMMAND lcov --capture --directory library/CMakeFiles/mbedtls.dir -o tests.info
149 COMMAND lcov --add-tracefile files.info --add-tracefile tests.info -o all.info
150 COMMAND lcov --remove all.info -o final.info '*.h'
152 …cription-file descriptions --keep-descriptions --legend --no-branch-coverage -o Coverage final.info
153 COMMAND rm -f files.info tests.info all.info final.info descriptions
/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/
Dhelpers.function318 rnd_buf_info *info = (rnd_buf_info *) rng_state;
325 if( len > info->length )
326 use_len = info->length;
330 memcpy( output, info->buf, use_len );
331 info->buf += use_len;
332 info->length -= use_len;
364 rnd_pseudo_info *info = (rnd_pseudo_info *) rng_state;
371 k = info->key;
380 info->v0 += ( ( ( info->v1 << 4 ) ^ ( info->v1 >> 5 ) )
381 + info->v1 ) ^ ( sum + k[sum & 3] );
[all …]
Dtest_suite_pkcs5.function20 const mbedtls_md_info_t *info;
35 info = mbedtls_md_info_from_type( hash );
36 TEST_ASSERT( info != NULL );
37 TEST_ASSERT( mbedtls_md_setup( &ctx, info, 1 ) == 0 );
Dtest_suite_pkcs1_v15.function23 rnd_buf_info info;
25 info.length = unhexify( rnd_buf, seed );
26 info.buf = rnd_buf;
41 …TEST_ASSERT( mbedtls_rsa_pkcs1_encrypt( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PUBLIC, msg_len…
126 rnd_buf_info info;
128 info.length = unhexify( rnd_buf, salt );
129 info.buf = rnd_buf;
161 …TEST_ASSERT( mbedtls_rsa_pkcs1_sign( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PRIVATE, digest, 0…
Dtest_suite_pkcs1_v21.function23 rnd_buf_info info;
25 info.length = unhexify( rnd_buf, seed );
26 info.buf = rnd_buf;
41 …TEST_ASSERT( mbedtls_rsa_pkcs1_encrypt( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PUBLIC, msg_len…
126 rnd_buf_info info;
128 info.length = unhexify( rnd_buf, salt );
129 info.buf = rnd_buf;
161 …TEST_ASSERT( mbedtls_rsa_pkcs1_sign( &ctx, &rnd_buffer_rand, &info, MBEDTLS_RSA_PRIVATE, digest, 0…
Dtest_suite_ecp.data1 ECP curve info #1
5 ECP curve info #2
9 ECP curve info #3
13 ECP curve info #4
17 ECP curve info #5
21 ECP curve info #6
25 ECP curve info #7
29 ECP curve info #8
Dtest_suite_md.function14 const mbedtls_md_info_t *info;
30 info = mbedtls_md_info_from_type( *md_type_ptr );
31 TEST_ASSERT( info != NULL );
32 TEST_ASSERT( mbedtls_md_setup( &ctx, info, 0 ) == 0 );
46 const mbedtls_md_info_t *info = mbedtls_md_info_from_type( *( mbedtls_md_list() ) );
58 TEST_ASSERT( mbedtls_md_setup( NULL, info, 0 ) == MBEDTLS_ERR_MD_BAD_INPUT_DATA );
Dtest_suite_cipher.function28 const mbedtls_cipher_info_t *info = mbedtls_cipher_info_from_type( *( mbedtls_cipher_list() ) );
47 TEST_ASSERT( mbedtls_cipher_setup( NULL, info )
109 /* Check and get info structures */
157 /* Check and get info structures */
281 /* Check and get info structures */
Dtest_suite_cmac.function29 /* Test NULL cipher info */
/net-tools-3.6.0/mbedtls-2.4.0/library/
Dpk.c101 int mbedtls_pk_setup( mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info ) in mbedtls_pk_setup() argument
103 if( ctx == NULL || info == NULL || ctx->pk_info != NULL ) in mbedtls_pk_setup()
106 if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) in mbedtls_pk_setup()
109 ctx->pk_info = info; in mbedtls_pk_setup()
124 const mbedtls_pk_info_t *info = &mbedtls_rsa_alt_info; in mbedtls_pk_setup_rsa_alt() local
129 if( ( ctx->pk_ctx = info->ctx_alloc_func() ) == NULL ) in mbedtls_pk_setup_rsa_alt()
132 ctx->pk_info = info; in mbedtls_pk_setup_rsa_alt()
Dcipher.c95 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_type()
97 return( def->info ); in mbedtls_cipher_info_from_type()
109 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_string()
110 if( ! strcmp( def->info->name, cipher_name ) ) in mbedtls_cipher_info_from_string()
111 return( def->info ); in mbedtls_cipher_info_from_string()
122 for( def = mbedtls_cipher_definitions; def->info != NULL; def++ ) in mbedtls_cipher_info_from_values()
123 if( def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values()
124 def->info->key_bitlen == (unsigned) key_bitlen && in mbedtls_cipher_info_from_values()
125 def->info->mode == mode ) in mbedtls_cipher_info_from_values()
126 return( def->info ); in mbedtls_cipher_info_from_values()
Dssl_cli.c254 const mbedtls_ecp_curve_info *info; local
268 info = mbedtls_ecp_curve_info_from_grp_id( *grp_id );
270 for( info = mbedtls_ecp_curve_list(); info->grp_id != MBEDTLS_ECP_DP_NONE; info++ )
273 if( info == NULL )
293 info = mbedtls_ecp_curve_info_from_grp_id( *grp_id );
295 for( info = mbedtls_ecp_curve_list(); info->grp_id != MBEDTLS_ECP_DP_NONE; info++ )
298 elliptic_curve_list[elliptic_curve_len++] = info->tls_id >> 8;
299 elliptic_curve_list[elliptic_curve_len++] = info->tls_id & 0xFF;
Dssl_ciphersuites.c1799 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_get_ciphersuite_sig_pk_alg() argument
1801 switch( info->key_exchange ) in mbedtls_ssl_get_ciphersuite_sig_pk_alg()
1823 int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_ciphersuite_uses_ec() argument
1825 switch( info->key_exchange ) in mbedtls_ssl_ciphersuite_uses_ec()
1841 int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info ) in mbedtls_ssl_ciphersuite_uses_psk() argument
1843 switch( info->key_exchange ) in mbedtls_ssl_ciphersuite_uses_psk()
Dpem.c389 mbedtls_free( ctx->info ); in mbedtls_pem_free()
/net-tools-3.6.0/libcoap/include/coap/
Ddebug.h63 #define info(...) coap_log(LOG_INFO, __VA_ARGS__) macro
76 #define info(...) macro
/net-tools-3.6.0/mbedtls-2.4.0/include/mbedtls/
Dssl_ciphersuites.h311 mbedtls_pk_type_t mbedtls_ssl_get_ciphersuite_sig_pk_alg( const mbedtls_ssl_ciphersuite_t *info );
314 int mbedtls_ssl_ciphersuite_uses_ec( const mbedtls_ssl_ciphersuite_t *info );
315 int mbedtls_ssl_ciphersuite_uses_psk( const mbedtls_ssl_ciphersuite_t *info );
Dpem.h57 unsigned char *info; /*!< buffer for extra header information */ member
Dcipher_internal.h98 const mbedtls_cipher_info_t *info; member
Dssl.h1300 const unsigned char *info, size_t ilen );
1317 const unsigned char *info, size_t ilen );
1373 const unsigned char *info,
Dpk.h205 int mbedtls_pk_setup( mbedtls_pk_context *ctx, const mbedtls_pk_info_t *info );
/net-tools-3.6.0/python-websocket-server/
D.gitignore6 *.egg-info
/net-tools-3.6.0/python-websocket-server/websocket_server/
Dwebsocket_server.py57 logger.info("Listening on port %d for clients.." % self.port)
61 logger.info("Server terminated.")
196 logger.info("Client closed connection.")
209 logger.info("Client asked to close connection.")
/net-tools-3.6.0/libcoap/
DMakefile.am108 -version-info $(LT_LIBCOAP_CURRENT):$(LT_LIBCOAP_REVISION):$(LT_LIBCOAP_AGE) \
/net-tools-3.6.0/libcoap/examples/
Dclient.c349 info("got RST\n"); in message_handler()
1248 info("timeout\n"); in main()

12