Home
last modified time | relevance | path

Searched refs:msg (Results 1 – 24 of 24) sorted by relevance

/net-tools-3.6.0/python-websocket-server/tests/
Dtest_text_messages.py13 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\
16 server.send_message_to_all(msg)
17 assert client.recv() == msg
22 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\
25 server.send_message_to_all(msg)
26 assert client.recv() == msg
31 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\
34 server.send_message_to_all(msg)
35 assert client.recv() == msg
40 msg = 'abcdefghijklmnopqrstuvwxyzabcdefghijklmnopqrstuvwxyz'\
[all …]
/net-tools-3.6.0/mbedtls-2.4.0/tests/scripts/
Dall.sh80 msg() function
189 msg "info: $0 configuration"
225 msg "info: output_env.sh"
230 msg "test: recursion.pl" # < 1s
233 msg "test: freshness of generated source files" # < 1s
236 msg "test: doxygen markup outside doxygen blocks" # < 1s
239 msg "test/build: declared and exported names" # < 3s
243 msg "test: doxygen warnings" # ~ 3s
247 msg "build: create and build yotta module" # ~ 30s
251 msg "build: cmake, gcc, ASan" # ~ 1 min 50s
[all …]
/net-tools-3.6.0/tinydtls-0.8.2/
Dccm.c84 add_auth_data(rijndael_ctx *ctx, const unsigned char *msg, size_t la, in add_auth_data() argument
123 memcpy(B + j, msg, i); in add_auth_data()
125 msg += i; in add_auth_data()
133 B[i] = X[i] ^ *msg++; in add_auth_data()
141 memcpy(B, msg, la); in add_auth_data()
150 unsigned char *msg, size_t len, in encrypt() argument
158 memxor(msg, S, len); in encrypt()
163 unsigned char *msg, size_t len, in mac() argument
169 B[i] = X[i] ^ msg[i]; in mac()
178 unsigned char *msg, size_t lm, in dtls_ccm_encrypt_message() argument
[all …]
Dccm.h60 unsigned char *msg, size_t lm,
66 unsigned char *msg, size_t lm,
Ddtls.c261 dtls_get_cookie(uint8 *msg, size_t msglen, uint8 **cookie) { in dtls_get_cookie() argument
267 if (dtls_uint16_to_int(msg + DTLS_HS_LENGTH) != DTLS_VERSION) in dtls_get_cookie()
271 msg += DTLS_HS_LENGTH + DTLS_CH_LENGTH; in dtls_get_cookie()
273 SKIP_VAR_FIELD(msg, msglen, uint8); /* skip session id */ in dtls_get_cookie()
275 if (msglen < (*msg & 0xff) + sizeof(uint8)) in dtls_get_cookie()
278 *cookie = msg + sizeof(uint8); in dtls_get_cookie()
279 return dtls_uint8_to_int(msg); in dtls_get_cookie()
288 uint8 *msg, size_t msglen, in dtls_create_cookie() argument
318 e += (*(msg + DTLS_HS_LENGTH + e) & 0xff) + sizeof(uint8); in dtls_create_cookie()
322 dtls_hmac_update(&hmac_context, msg + DTLS_HS_LENGTH, e); in dtls_create_cookie()
[all …]
Ddtls.h391 int dtls_record_read(dtls_state_t *state, uint8 *msg, int msglen);
404 uint8 *msg, int msglen);
Duthash.h67 #define uthash_fatal(msg) exit(-1) /* fatal error (out of memory,etc) */ argument
/net-tools-3.6.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_ccm.function42 unsigned char msg[10];
52 memset( msg, 0, sizeof( msg ) );
62 msg, out, tag, tag_len ) == res );
65 msg, out, tag, tag_len );
84 unsigned char msg[50];
94 memset( msg, 0x00, sizeof( msg ) );
100 msg_len = unhexify( msg, msg_hex );
110 msg, msg, msg + msg_len, tag_len ) == 0 );
112 TEST_ASSERT( memcmp( msg, result, result_len ) == 0 );
115 TEST_ASSERT( msg[result_len] == 0 && msg[result_len + 1] == 0 );
[all …]
Dtest_suite_ecjpake.function113 unsigned char *msg;
118 msg = unhexify_alloc( data, &len );
119 TEST_ASSERT( msg != NULL );
124 TEST_ASSERT( mbedtls_ecjpake_read_round_one( &ctx, msg, len ) == ref_ret );
128 mbedtls_free( msg );
137 unsigned char *msg;
142 msg = unhexify_alloc( data, &len );
143 TEST_ASSERT( msg != NULL );
154 TEST_ASSERT( mbedtls_ecjpake_read_round_two( &ctx, msg, len ) == ref_ret );
158 mbedtls_free( msg );
[all …]
Dtest_suite_pk.function429 unsigned char msg[50], ciph[1000], test[1000];
438 memset( msg, 0x2a, sizeof msg );
469 TEST_ASSERT( mbedtls_pk_encrypt( &rsa, msg, sizeof msg,
475 TEST_ASSERT( test_len == sizeof msg );
476 TEST_ASSERT( memcmp( test, msg, test_len ) == 0 );
479 TEST_ASSERT( mbedtls_pk_encrypt( &alt, msg, sizeof msg,
Dtest_suite_debug.data1 Debug print msg (threshold 1, level 0)
4 Debug print msg (threshold 1, level 1)
7 Debug print msg (threshold 1, level 2)
10 Debug print msg (threshold 0, level 1)
13 Debug print msg (threshold 0, level 5)
Dtest_suite_ecdsa.function100 char *msg, char *r_str, char *s_str )
121 mbedtls_md( md_info, (const unsigned char *) msg, strlen( msg ), hash );
Dtest_suite_ccm.data41 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
/net-tools-3.6.0/tinydtls-0.8.2/tests/
Dccm-test.c67 data[n].msg + data[n].la,
69 data[n].msg, data[n].la);
73 if (len != data[n].r_lm || memcmp(data[n].msg, data[n].result, len))
79 dump(data[n].msg, len);
82 data[n].msg + data[n].la, len - data[n].la,
83 data[n].msg, data[n].la);
Dccm-testdata.c34 unsigned char msg[200]; member
/net-tools-3.6.0/python-websocket-server/websocket_server/
Dwebsocket_server.py84 def send_message(self, client, msg): argument
85 self._unicast_(client, msg)
87 def send_message_to_all(self, msg): argument
88 self._multicast_(msg)
126 def _message_received_(self, handler, msg): argument
127 self.message_received(self.handler_to_client(handler), self, msg)
129 def _ping_received_(self, handler, msg): argument
130 handler.send_pong(msg)
132 def _pong_received_(self, handler, msg): argument
151 def _unicast_(self, to_client, msg): argument
[all …]
/net-tools-3.6.0/mbedtls-2.4.0/programs/test/
Dudp_proxy.c231 static const char *msg_type( unsigned char *msg, size_t len ) in msg_type() argument
234 switch( msg[0] ) in msg_type()
250 if( msg[14] || msg[19] || msg[22] ) return( "Encrypted handshake" ); in msg_type()
252 switch( msg[13] ) in msg_type()
/net-tools-3.6.0/tinydtls-0.8.2/sha2/
Dsha2prog.c43 void usage(char *prog, char *msg) { in usage() argument
44 …all three hashes\n\t-q\tQuiet mode - only output hexadecimal hashes, one per line\n\n", msg, prog); in usage()
/net-tools-3.6.0/
Dtcptest.py31 def log(msg): argument
32 print("%s: %s" % (time.asctime(), msg))
/net-tools-3.6.0/mbedtls-2.4.0/library/
Dccm.c378 static const unsigned char msg[] = { variable
424 msg, out, in mbedtls_ccm_self_test()
442 memcmp( out, msg, msg_len[i] ) != 0 ) in mbedtls_ccm_self_test()
Dssl_cli.c3178 const unsigned char *msg; local
3211 msg = ssl->in_msg + mbedtls_ssl_hs_hdr_len( ssl );
3213 lifetime = ( msg[0] << 24 ) | ( msg[1] << 16 ) |
3214 ( msg[2] << 8 ) | ( msg[3] );
3216 ticket_len = ( msg[4] << 8 ) | ( msg[5] );
3249 memcpy( ticket, msg + 6, ticket_len );
Dssl_tls.c2474 mbedtls_ssl_flight_item *msg; in ssl_flight_append() local
2477 if( ( msg = mbedtls_calloc( 1, sizeof( mbedtls_ssl_flight_item ) ) ) == NULL ) in ssl_flight_append()
2484 if( ( msg->p = mbedtls_calloc( 1, ssl->out_msglen ) ) == NULL ) in ssl_flight_append()
2487 mbedtls_free( msg ); in ssl_flight_append()
2492 memcpy( msg->p, ssl->out_msg, ssl->out_msglen ); in ssl_flight_append()
2493 msg->len = ssl->out_msglen; in ssl_flight_append()
2494 msg->type = ssl->out_msgtype; in ssl_flight_append()
2495 msg->next = NULL; in ssl_flight_append()
2499 ssl->handshake->flight = msg; in ssl_flight_append()
2505 cur->next = msg; in ssl_flight_append()
[all …]
/net-tools-3.6.0/libcoap/src/
Dnet.c853 unsigned char *msg; in coap_handle_message() local
861 coap_packet_get_memmapped(packet, &msg, &msg_len); in coap_handle_message()
869 if (((*msg >> 6) & 0x03) != COAP_DEFAULT_VERSION) { in coap_handle_message()
870 debug("coap_handle_message: unknown protocol version %d\n", (*msg >> 6) & 0x03); in coap_handle_message()
891 if (!coap_pdu_parse(msg, msg_len, node->pdu)) { in coap_handle_message()
/net-tools-3.6.0/libcoap/include/coap/
Duthash.h79 #define uthash_fatal(msg) exit(-1) /* fatal error (out of memory,etc) */ argument