| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_pk.data | 133 PK can do ext: ECDH/NONE, check ECDH 137 PK can do ext: ECDH/ECDSA(ANY), check ECDH+SIGN 141 PK can do ext: ECDH/ECDSA(ANY), check ECDH+DERIVE 309 PK can do ext: MBEDTLS_PK_ECKEY, check ECDH 561 Verify ext RSA #12 (PKCS1 v1.5, good) 698 PK sign ext: RSA2048, PK_RSA, MD_SHA256 706 PK sign ext: RSA2048, PK_RSA, MD_SHA384 714 PK sign ext: RSA2048, PK_RSA, MD_SHA512 722 PK sign ext: SECP256R1, PK_ECDSA, MD_SHA256 726 PK sign ext: SECP384R1, PK_ECDSA, MD_SHA384 [all …]
|
| A D | test_suite_ecp.data | 891 ECP write key ext: secp256r1, nominal 899 ECP write key ext: secp256r1, output short by 1 903 ECP write key ext: secp256r1, output_size=0 931 ECP write key ext: secp384r1, nominal 939 ECP write key ext: secp384r1, output short by 1 943 ECP write key ext: Curve25519, nominal 955 ECP write key ext: Curve25519, output_size=0 971 ECP write key ext: Curve448, nominal 975 ECP write key ext: Curve448, output longer by 1 979 ECP write key ext: Curve448, output short by 1 [all …]
|
| A D | test_suite_pkcs1_v21.data | 1057 RSASSA-PSS verify ext, 512-bit key, empty salt, good signature 1061 RSASSA-PSS verify ext, 512-bit key, empty salt, bad signature 1065 RSASSA-PSS verify ext, 522-bit key, SHA-512, empty salt, good signature 1069 RSASSA-PSS verify ext, 522-bit key, SHA-512, saltlen=64, good signature with saltlen=0 1073 RSASSA-PSS verify ext, 528-bit key, SHA-512, empty salt, good signature 1077 RSASSA-PSS verify ext, 528-bit key, SHA-512, saltlen=64, good signature with saltlen=0 1081 RSASSA-PSS verify ext, 512-bit key, SHA-512 (hash too large) 1085 RSASSA-PSS verify ext, 521-bit key, SHA-512, empty salt, bad signature 1089 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, good signature 1093 RSASSA-PSS verify ext, 521-bit key, SHA-256, empty salt, flipped-highest-bit signature [all …]
|
| A D | test_suite_x509parse.data | 1896 X509 CRT ASN1 (TBS, inv v3Ext, first ext inv tag) 1900 X509 CRT ASN1 (TBS, inv v3Ext, first ext length missing) 1904 X509 CRT ASN1 (TBS, inv v3Ext, inv first ext length encoding) 1908 X509 CRT ASN1 (TBS, inv v3Ext, first ext length out of bounds) 1912 X509 CRT ASN1 (TBS, inv v3Ext, first ext empty) 1916 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv tag) 1920 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length missing) 1924 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID inv length encoding) 1928 X509 CRT ASN1 (TBS, inv v3Ext, first ext extnID length out of bounds) 3370 X509 ext types accessor: ext type present [all …]
|
| A D | test_suite_x509write.data | 55 x509_csr_check:"data_files/server1.key":"data_files/server1.req.sha256.ext":MBEDTLS_MD_SHA256:0:0:0…
|
| A D | test_suite_psa_crypto.data | 7507 PSA generate key ext: RSA, params.flags=1 7511 PSA generate key ext: RSA, empty e 7515 PSA generate key ext: RSA, e=3 7531 PSA generate key ext: RSA, e=513 7535 PSA generate key ext: RSA, e=65537 7539 PSA generate key ext: RSA, e=2^31-1 7551 PSA generate key ext: RSA, e=1 7555 PSA generate key ext: RSA, e=0 7559 PSA generate key ext: RSA, e=2 7572 PSA generate key ext: ECC, flags=0 [all …]
|
| /lib/mbedtls/external/mbedtls/library/ |
| A D | x509_crl.c | 78 mbedtls_x509_buf *ext) in x509_get_crl_ext() argument 90 if ((ret = mbedtls_x509_get_ext(p, end, ext, 0)) != 0) { in x509_get_crl_ext() 94 end = ext->p + ext->len; in x509_get_crl_ext() 162 mbedtls_x509_buf *ext) in x509_get_crl_entry_ext() argument 172 ext->tag = **p; in x509_get_crl_entry_ext() 173 ext->p = *p; in x509_get_crl_entry_ext() 179 if ((ret = mbedtls_asn1_get_tag(p, end, &ext->len, in x509_get_crl_entry_ext() 182 ext->p = NULL; in x509_get_crl_entry_ext() 188 end = *p + ext->len; in x509_get_crl_entry_ext() 190 if (end != *p + ext->len) { in x509_get_crl_entry_ext()
|
| A D | x509write_crt.c | 330 const mbedtls_asn1_sequence *ext; in mbedtls_x509write_crt_set_ext_key_usage() local 341 for (ext = exts; ext->next != last_ext; ext = ext->next) { in mbedtls_x509write_crt_set_ext_key_usage() 343 if (ext->buf.tag != MBEDTLS_ASN1_OID) { in mbedtls_x509write_crt_set_ext_key_usage() 346 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_raw_buffer(&c, buf, ext->buf.p, ext->buf.len)); in mbedtls_x509write_crt_set_ext_key_usage() 347 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(&c, buf, ext->buf.len)); in mbedtls_x509write_crt_set_ext_key_usage() 349 last_ext = ext; in mbedtls_x509write_crt_set_ext_key_usage()
|
| A D | x509_create.c | 512 mbedtls_asn1_named_data *ext) in x509_write_extension() argument 517 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_raw_buffer(p, start, ext->val.p + 1, in x509_write_extension() 518 ext->val.len - 1)); in x509_write_extension() 519 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, start, ext->val.len - 1)); in x509_write_extension() 522 if (ext->val.p[0] != 0) { in x509_write_extension() 526 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_raw_buffer(p, start, ext->oid.p, in x509_write_extension() 527 ext->oid.len)); in x509_write_extension() 528 MBEDTLS_ASN1_CHK_ADD(len, mbedtls_asn1_write_len(p, start, ext->oid.len)); in x509_write_extension()
|
| A D | ssl_tls12_server.c | 896 unsigned char *buf, *p, *ext; in ssl_parse_client_hello() local 1315 ext = buf + ext_offset + 2; in ssl_parse_client_hello() 1327 ext_id = MBEDTLS_GET_UINT16_BE(ext, 0); in ssl_parse_client_hello() 1328 ext_size = MBEDTLS_GET_UINT16_BE(ext, 2); in ssl_parse_client_hello() 1340 ret = mbedtls_ssl_parse_server_name_ext(ssl, ext + 4, in ssl_parse_client_hello() 1364 ret = mbedtls_ssl_parse_sig_alg_ext(ssl, ext + 4, ext + 4 + ext_size); in ssl_parse_client_hello() 1402 ret = ssl_parse_ecjpake_kkpp(ssl, ext + 4, ext_size); in ssl_parse_client_hello() 1424 ret = ssl_parse_cid_ext(ssl, ext + 4, ext_size); in ssl_parse_client_hello() 1468 ret = mbedtls_ssl_parse_alpn_ext(ssl, ext + 4, in ssl_parse_client_hello() 1469 ext + 4 + ext_size); in ssl_parse_client_hello() [all …]
|
| A D | ssl_tls12_client.c | 1185 unsigned char *buf, *ext; in ssl_parse_server_hello() local 1443 ext = buf + 40 + n; in ssl_parse_server_hello() 1450 unsigned int ext_id = MBEDTLS_GET_UINT16_BE(ext, 0); in ssl_parse_server_hello() 1451 unsigned int ext_size = MBEDTLS_GET_UINT16_BE(ext, 2); in ssl_parse_server_hello() 1468 if ((ret = ssl_parse_renegotiation_info(ssl, ext + 4, in ssl_parse_server_hello() 1493 ext + 4, in ssl_parse_server_hello() 1519 ext + 4, ext_size)) != 0) { in ssl_parse_server_hello() 1560 ext + 4, ext_size)) != 0) { in ssl_parse_server_hello() 1571 if ((ret = ssl_parse_alpn_ext(ssl, ext + 4, ext_size)) != 0) { in ssl_parse_server_hello() 1582 if ((ret = ssl_parse_use_srtp_ext(ssl, ext + 4, ext_size)) != 0) { in ssl_parse_server_hello() [all …]
|
| A D | x509_internal.h | 44 mbedtls_x509_buf *ext, int tag);
|
| A D | x509.c | 769 mbedtls_x509_buf *ext, int tag) in mbedtls_x509_get_ext() argument 777 ret = mbedtls_asn1_get_tag(p, end, &ext->len, in mbedtls_x509_get_ext() 783 ext->tag = MBEDTLS_ASN1_CONTEXT_SPECIFIC | MBEDTLS_ASN1_CONSTRUCTED | tag; in mbedtls_x509_get_ext() 784 ext->p = *p; in mbedtls_x509_get_ext() 785 end = *p + ext->len; in mbedtls_x509_get_ext()
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/LwipSnmpCodeGeneration/ |
| A D | MibCFile.cs | 109 string ext = System.IO.Path.GetExtension(file); in Save() 111 …string headerFile = !String.IsNullOrEmpty(ext) ? file.Substring(0, file.Length - ext.Length) : fil… in Save()
|
| /lib/mbedtls/external/mbedtls/scripts/ |
| A D | generate_visualc_files.pl | 142 my ($path, $template, $dir, $ext) = @_; 166 content_to_file( $content, "$dir/$appname.$ext" );
|
| /lib/lwip/lwip/src/apps/http/ |
| A D | httpd.c | 846 char *ext; local 896 ext = NULL; 899 ext = tmp + 1; 900 tmp = strchr(ext, '.'); 902 if (ext != NULL) { 923 if (!ext) { 934 } else if (!ext) { 2164 const char *ext = NULL, *sub; local 2171 ext = uri; 2173 ext = sub; [all …]
|
| /lib/lwip/lwip/src/apps/http/makefsdata/ |
| A D | makefsdata.c | 928 const char *ext = ext_list; in ext_in_list() local 932 while(*ext != '\0') { in ext_in_list() 933 const char *comma = strchr(ext, ','); in ext_in_list() 937 comma = strchr(ext, '\0'); in ext_in_list() 939 ext_size = comma - ext; in ext_in_list() 941 !strncmp(&filename[filename_size - ext_size], ext, ext_size)) { in ext_in_list() 945 ext = comma + 1; in ext_in_list()
|
| /lib/mbedtls/external/mbedtls/configs/ext/ |
| A D | README.md | 18 https://git.trustedfirmware.org/TF-M/trusted-firmware-m.git/tree/lib/ext/mbedcrypto/mbedcrypto_conf…
|
| /lib/mbedtls/external/mbedtls/tests/scripts/ |
| A D | check_files.py | 151 _root, ext = os.path.splitext(filepath) 152 return ext in ('.bat', '.dsp', '.dsw', '.sln', '.vcxproj')
|
| A D | all.sh | 3395 cp configs/ext/crypto_config_profile_medium.h "$CRYPTO_CONFIG_H"
|
| /lib/lwip/lwip/doc/doxygen/ |
| A D | lwip.Doxyfile | 280 # using this tag. The format is ext=language, where ext is a file extension, and 955 # *.ext= (so without naming a filter).
|
| A D | lwip.Doxyfile.cmake.in | 280 # using this tag. The format is ext=language, where ext is a file extension, and 955 # *.ext= (so without naming a filter).
|
| /lib/mbedtls/external/mbedtls/tests/data_files/ |
| A D | Makefile | 1440 server1.req.sha256.ext: server1.key
|
| /lib/mbedtls/external/mbedtls/ |
| A D | ChangeLog | 1083 * Add the function mbedtls_x509_crt_has_ext_type() to access the ext types
|