Home
last modified time | relevance | path

Searched refs:max (Results 1 – 25 of 31) sorted by relevance

12

/mbedtls/scripts/
A Dmassif_max.pl21 my ($max, $max_heap, $max_he, $max_stack) = (0, 0, 0, 0);
31 if( $total > $max ) {
32 ($max, $max_heap, $max_he, $max_stack) = ($total, $heap, $heap_extra, $stack);
36 printf "$max (heap $max_heap+$max_he, stack $max_stack)\n";
/mbedtls/tests/suites/
A Dtest_suite_pkcs1_v15.data55 RSAES-V15 decoding: good, payload=max, tight output buffer
58 RSAES-V15 decoding: good, payload=max, larger output buffer
61 RSAES-V15 decoding: good, payload=max-1, tight output buffer
64 RSAES-V15 decoding: good, payload=max-1, larger output buffer
73 RSAES-V15 decoding: payload=max, output too large
76 RSAES-V15 decoding: payload=max-1, output too large
A Dtest_suite_psa_crypto_se_driver_hal.data54 Key creation in a specific slot (max)
60 Key creation in a specific slot (max, restart)
172 Key registration: key id max vendor except volatile
178 Key registration: key id max volatile
A Dtest_suite_random.data45 PSA classic wrapper: CTR_DRBG max
49 PSA classic wrapper: HMAC_DRBG max
A Dtest_suite_psa_crypto_se_driver_hal_mocks.data16 SE key importing mock test: max key bits
19 SE key importing mock test: more than max key bits
A Dtest_suite_psa_crypto_slot_management.data37 Persistent slot, check after closing, id=max
40 Persistent slot, check after destroying, id=max
43 Persistent slot, check after purging, id=max
46 Persistent slot, check after restart, id=max
A Dtest_suite_psa_crypto_entropy.data31 PSA validate entropy injection: good, max size
A Dtest_suite_pkcs1_v21.data1033 RSASSA-PSS Signature verify options #8 (non-default salt_len: max)
1237 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max
1241 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max+1
1249 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max
1253 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max+1
1261 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max
1265 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max+1
1273 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max
1277 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max + 1
A Dtest_suite_psa_crypto_se_driver_hal.function816 psa_key_location_t max = MIN_DRIVER_LOCATION + count;
821 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
824 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
841 psa_key_location_t max = MIN_DRIVER_LOCATION + PSA_MAX_SE_DRIVERS;
846 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
A Dtest_suite_psa_crypto_pake.function987 uint8_t password_ret[20] = { 0 }; // max key length is 20 bytes
1084 uint8_t user_ret[20] = { 0 }; // max user length is 20 bytes
1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes
A Dtest_suite_ssl.data431 Handshake min/max version check, all -> 1.2
435 Handshake min/max version check, all -> 1.3
3349 TLS 1.3 srv, max early data size, dflt, wsz=96
3352 TLS 1.3 srv, max early data size, dflt, wsz=128
3355 TLS 1.3 srv, max early data size, 3, wsz=2
3358 TLS 1.3 srv, max early data size, 3, wsz=3
3361 TLS 1.3 srv, max early data size, 98, wsz=23
3364 TLS 1.3 srv, max early data size, 98, wsz=49
3376 TLS 1.3 srv, max early data size, HRR, dflt, wsz=128
3379 TLS 1.3 srv, max early data size, HRR, 3, wsz=3
[all …]
A Dtest_suite_oid.data196 OID from numeric string - OID greater than max length (129 components)
A Dtest_suite_x509write.data266 Check max serial length
269 Check max extension length
A Dtest_suite_pk.data525 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK)
565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long)
577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short)
585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short)
593 Verify ext RSA #20 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too long)
A Dtest_suite_x509write.function92 * Unfortunately there's no predefined max size for OIDs which can be used
/mbedtls/library/
A Dssl_cache.c381 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max) in mbedtls_ssl_cache_set_max_entries() argument
383 if (max < 0) { in mbedtls_ssl_cache_set_max_entries()
384 max = 0; in mbedtls_ssl_cache_set_max_entries()
387 cache->max_entries = max; in mbedtls_ssl_cache_set_max_entries()
A Dx509.c53 #define CHECK_RANGE(min, max, val) \ argument
55 if ((val) < (min) || (val) > (max)) { \
/mbedtls/programs/psa/
A Dpsa_constant_names.c195 int process_signed(signed_value_type type, long min, long max, char **argp) in process_signed() argument
209 if (value > max || (errno == ERANGE && value > 0)) { in process_signed()
234 int process_unsigned(unsigned_value_type type, unsigned long max, char **argp) in process_unsigned() argument
244 if (value > max || errno == ERANGE) { in process_unsigned()
/mbedtls/
A D.pylintrc39 max-attributes=15
44 max-module-lines=2000
/mbedtls/include/mbedtls/
A Dssl_cache.h174 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max);
A Dssl.h3158 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
/mbedtls/scripts/mbedtls_dev/
A Dbignum_common.py62 bit_length = max(val.bit_length(), 1)
148 return max(self.int_a, self.int_b)
A Dbignum_core.py256 bound_val = max(self.int_a, self.int_b)
/mbedtls/tests/scripts/
A Daudit-validity-dates.py86 self.not_valid_after = datetime.datetime.max
/mbedtls/tests/data_files/
A DMakefile555 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:max \
569 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:max -sha1 \
585 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:max \

Completed in 54 milliseconds

12