| /mbedtls/scripts/ |
| A D | massif_max.pl | 21 my ($max, $max_heap, $max_he, $max_stack) = (0, 0, 0, 0); 31 if( $total > $max ) { 32 ($max, $max_heap, $max_he, $max_stack) = ($total, $heap, $heap_extra, $stack); 36 printf "$max (heap $max_heap+$max_he, stack $max_stack)\n";
|
| /mbedtls/tests/suites/ |
| A D | test_suite_pkcs1_v15.data | 55 RSAES-V15 decoding: good, payload=max, tight output buffer 58 RSAES-V15 decoding: good, payload=max, larger output buffer 61 RSAES-V15 decoding: good, payload=max-1, tight output buffer 64 RSAES-V15 decoding: good, payload=max-1, larger output buffer 73 RSAES-V15 decoding: payload=max, output too large 76 RSAES-V15 decoding: payload=max-1, output too large
|
| A D | test_suite_psa_crypto_se_driver_hal.data | 54 Key creation in a specific slot (max) 60 Key creation in a specific slot (max, restart) 172 Key registration: key id max vendor except volatile 178 Key registration: key id max volatile
|
| A D | test_suite_random.data | 45 PSA classic wrapper: CTR_DRBG max 49 PSA classic wrapper: HMAC_DRBG max
|
| A D | test_suite_psa_crypto_se_driver_hal_mocks.data | 16 SE key importing mock test: max key bits 19 SE key importing mock test: more than max key bits
|
| A D | test_suite_psa_crypto_slot_management.data | 37 Persistent slot, check after closing, id=max 40 Persistent slot, check after destroying, id=max 43 Persistent slot, check after purging, id=max 46 Persistent slot, check after restart, id=max
|
| A D | test_suite_psa_crypto_entropy.data | 31 PSA validate entropy injection: good, max size
|
| A D | test_suite_pkcs1_v21.data | 1033 RSASSA-PSS Signature verify options #8 (non-default salt_len: max) 1237 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max 1241 RSASSA-PSS Signature RSA-1024, SHA-256, Salt Length = max+1 1249 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max 1253 RSASSA-PSS Signature RSA-2048, SHA-256, Salt Length = max+1 1261 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max 1265 RSASSA-PSS Signature RSA-1024, SHA-512, Salt Length max+1 1273 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max 1277 RSASSA-PSS Signature RSA-3072, SHA-384, Salt Length max + 1
|
| A D | test_suite_psa_crypto_se_driver_hal.function | 816 psa_key_location_t max = MIN_DRIVER_LOCATION + count; 821 for (location = MIN_DRIVER_LOCATION; location < max; location++) { 824 for (location = MIN_DRIVER_LOCATION; location < max; location++) { 841 psa_key_location_t max = MIN_DRIVER_LOCATION + PSA_MAX_SE_DRIVERS; 846 for (location = MIN_DRIVER_LOCATION; location < max; location++) {
|
| A D | test_suite_psa_crypto_pake.function | 987 uint8_t password_ret[20] = { 0 }; // max key length is 20 bytes 1084 uint8_t user_ret[20] = { 0 }; // max user length is 20 bytes 1147 uint8_t peer_ret[20] = { 0 }; // max peer length is 20 bytes
|
| A D | test_suite_ssl.data | 431 Handshake min/max version check, all -> 1.2 435 Handshake min/max version check, all -> 1.3 3349 TLS 1.3 srv, max early data size, dflt, wsz=96 3352 TLS 1.3 srv, max early data size, dflt, wsz=128 3355 TLS 1.3 srv, max early data size, 3, wsz=2 3358 TLS 1.3 srv, max early data size, 3, wsz=3 3361 TLS 1.3 srv, max early data size, 98, wsz=23 3364 TLS 1.3 srv, max early data size, 98, wsz=49 3376 TLS 1.3 srv, max early data size, HRR, dflt, wsz=128 3379 TLS 1.3 srv, max early data size, HRR, 3, wsz=3 [all …]
|
| A D | test_suite_oid.data | 196 OID from numeric string - OID greater than max length (129 components)
|
| A D | test_suite_x509write.data | 266 Check max serial length 269 Check max extension length
|
| A D | test_suite_pk.data | 525 Verify ext RSA #4 (PKCS1 v2.1, salt_len = max, OK) 565 Verify ext RSA #13 (PKCS1 v2.1, salt_len = max, sig_len too long) 577 Verify ext RSA #16 (PKCS1 v2.1, salt_len = max, sig_len too short) 585 Verify ext RSA #18 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too short) 593 Verify ext RSA #20 (PKCS1 v2.1, salt_len = max, wrong message, sig_len too long)
|
| A D | test_suite_x509write.function | 92 * Unfortunately there's no predefined max size for OIDs which can be used
|
| /mbedtls/library/ |
| A D | ssl_cache.c | 381 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max) in mbedtls_ssl_cache_set_max_entries() argument 383 if (max < 0) { in mbedtls_ssl_cache_set_max_entries() 384 max = 0; in mbedtls_ssl_cache_set_max_entries() 387 cache->max_entries = max; in mbedtls_ssl_cache_set_max_entries()
|
| A D | x509.c | 53 #define CHECK_RANGE(min, max, val) \ argument 55 if ((val) < (min) || (val) > (max)) { \
|
| /mbedtls/programs/psa/ |
| A D | psa_constant_names.c | 195 int process_signed(signed_value_type type, long min, long max, char **argp) in process_signed() argument 209 if (value > max || (errno == ERANGE && value > 0)) { in process_signed() 234 int process_unsigned(unsigned_value_type type, unsigned long max, char **argp) in process_unsigned() argument 244 if (value > max || errno == ERANGE) { in process_unsigned()
|
| /mbedtls/ |
| A D | .pylintrc | 39 max-attributes=15 44 max-module-lines=2000
|
| /mbedtls/include/mbedtls/ |
| A D | ssl_cache.h | 174 void mbedtls_ssl_cache_set_max_entries(mbedtls_ssl_cache_context *cache, int max);
|
| A D | ssl.h | 3158 void mbedtls_ssl_conf_handshake_timeout(mbedtls_ssl_config *conf, uint32_t min, uint32_t max);
|
| /mbedtls/scripts/mbedtls_dev/ |
| A D | bignum_common.py | 62 bit_length = max(val.bit_length(), 1) 148 return max(self.int_a, self.int_b)
|
| A D | bignum_core.py | 256 bound_val = max(self.int_a, self.int_b)
|
| /mbedtls/tests/scripts/ |
| A D | audit-validity-dates.py | 86 self.not_valid_after = datetime.datetime.max
|
| /mbedtls/tests/data_files/ |
| A D | Makefile | 555 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:max \ 569 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:max -sha1 \ 585 -sigopt rsa_padding_mode:pss -sigopt rsa_pss_saltlen:max \
|