| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_psa_crypto_pake.data | 3 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_INJECT_UNIN… 7 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_SETUP:PS… 11 …RIMITIVE_TYPE_DH, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_OUTPUT:P… 15 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_K1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_OUTPUT:P… 19 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 128):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_OUTPUT:P… 23 …PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_1:"client":"server":0:ERR_IN_OUTPUT:P… 27 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_INJECT_DUPL… 43 …AKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"":"server":0:ERR_IN_SET_USER… 51 …TIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"something":"server":0:ERR_IN_OUTPUT:P… 59 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_DUPLICATE_S… [all …]
|
| A D | test_suite_ecjpake.data | 13 ECJPAKE round one: server, valid 184 ECJPAKE round two server: valid 187 ECJPAKE round two server: trailing byte 190 ECJPAKE round two server: no data 199 ECJPAKE round two server: no first point data 202 ECJPAKE round two server: first point is zero 217 ECJPAKE round two server: no second point data 226 ECJPAKE round two server: zero-length r 229 ECJPAKE round two server: no data for r 232 ECJPAKE round two server: corrupted r [all …]
|
| A D | test_suite_psa_crypto_pake.function | 105 psa_pake_operation_t *server, 803 PSA_ASSERT(psa_pake_setup(&server, &cipher_suite)); 811 PSA_ASSERT(psa_pake_set_password_key(&server, key)); 814 ecjpake_do_round(alg, primitive_arg, &server, &client, 823 ecjpake_do_round(alg, primitive_arg, &server, &client, 829 psa_pake_abort(&server); 881 PSA_ASSERT(psa_pake_setup(&server, &cipher_suite)); 889 PSA_ASSERT(psa_pake_set_password_key(&server, key)); 905 ecjpake_do_round(alg, primitive_arg, &server, &client, 918 ecjpake_do_round(alg, primitive_arg, &server, &client, [all …]
|
| A D | test_suite_ssl.function | 298 mbedtls_test_mock_socket server; 314 mbedtls_test_mock_socket_init(&server); 327 /* Send the message to the server */ 375 mbedtls_test_mock_socket_close(&server); 395 mbedtls_test_mock_socket server; 413 mbedtls_test_mock_socket_init(&server); 731 /* Send the message to the server */ 735 /* Read from the server */ 987 server.status = 0; 3106 mbedtls_platform_zeroize(&server, sizeof(server)); [all …]
|
| A D | test_suite_ssl.data | 103 Test mbedtls_endpoint sanity for the server 231 TLS 1.2:Move server handshake to HELLO_REQUEST 235 TLS 1.2:Move server handshake to CLIENT_HELLO 239 TLS 1.2:Move server handshake to SERVER_HELLO 287 TLS 1.2:Move server handshake to FLUSH_BUFFERS 303 TLS 1.3:Move server handshake to CLIENT_HELLO 307 TLS 1.3:Move server handshake to SERVER_HELLO 3123 Version config: valid server TLS 1.2 only 3127 Version config: valid server DTLS 1.2 only 3155 Version config: valid server TLS 1.3 only [all …]
|
| A D | test_suite_psa_crypto_driver_wrappers.function | 17 psa_pake_operation_t *server, 58 PSA_ASSERT(psa_pake_output(server, PSA_PAKE_STEP_KEY_SHARE, 74 PSA_ASSERT(psa_pake_output(server, PSA_PAKE_STEP_ZK_PROOF, 261 status = psa_pake_input(server, PSA_PAKE_STEP_ZK_PROOF, 279 status = psa_pake_input(server, PSA_PAKE_STEP_ZK_PROOF, 3187 psa_pake_operation_t server = psa_pake_operation_init(); 3237 PSA_ASSERT(psa_pake_setup(&server, &cipher_suite)); 3249 PSA_ASSERT(psa_pake_set_password_key(&server, key)); 3255 ecjpake_do_round(alg, primitive_arg, &server, &client, 3259 ecjpake_do_round(alg, primitive_arg, &server, &client, [all …]
|
| /lib/mbedtls/external/mbedtls/tests/src/test_helpers/ |
| A D | ssl_helpers.c | 2011 mbedtls_test_ssl_endpoint client, server; in mbedtls_test_ssl_perform_handshake() local 2029 mbedtls_platform_zeroize(&server, sizeof(server)); in mbedtls_test_ssl_perform_handshake() 2174 &server.ssl)) { in mbedtls_test_ssl_perform_handshake() 2195 TEST_ASSERT(server.ssl.in_buf_len == in mbedtls_test_ssl_perform_handshake() 2225 mbedtls_ssl_free(&(server.ssl)); in mbedtls_test_ssl_perform_handshake() 2226 mbedtls_ssl_init(&(server.ssl)); in mbedtls_test_ssl_perform_handshake() 2228 TEST_ASSERT(mbedtls_ssl_setup(&(server.ssl), &(server.conf)) == 0); in mbedtls_test_ssl_perform_handshake() 2235 mbedtls_ssl_set_user_data_p(&server.ssl, &server); in mbedtls_test_ssl_perform_handshake() 2340 TEST_ASSERT(mbedtls_ssl_conf_get_user_data_p(&server.conf) == &server); in mbedtls_test_ssl_perform_handshake() 2341 TEST_ASSERT(mbedtls_ssl_get_user_data_p(&server.ssl) == &server); in mbedtls_test_ssl_perform_handshake() [all …]
|
| /lib/mbedtls/external/mbedtls/tests/scripts/ |
| A D | generate_tls13_compat_tests.py | 483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group) 485 server_object = SERVER_CLASSES[server](ciphersuite=cipher, 506 def generate_hrr_compat_test(client=None, server=None, argument 513 client=client, server=server, c_named_group=client_named_group, 600 for client, server, cipher, named_group, sig_alg in \ 606 if server == 'mbedTLS' or client == 'mbedTLS': 607 yield generate_compat_test(client=client, server=server, 613 for client, server, client_named_group, server_named_group in \ 619 if (client == 'mbedTLS' or server == 'mbedTLS') and \ 621 yield generate_hrr_compat_test(client=client, server=server, [all …]
|
| /lib/lwip/lwip/test/unit/core/ |
| A D | test_dns.c | 26 ip_addr_t server; in START_TEST() local 32 IP_ADDR4(&server, 10, 0, 0, i); in START_TEST() 33 dns_setserver(i, &server); in START_TEST() 36 fail_unless(ip_addr_eq(dns_getserver(i), &server) == 1); in START_TEST()
|
| /lib/mbedtls/external/mbedtls/programs/fuzz/ |
| A D | README.md | 42 * client : simulates a client against (fuzzed) server traffic 43 * server : simulates a server against (fuzzed) client traffic 53 * Run a dummy python script to output either client or server corpus file like `python dummy.py tes… 56 Here is an example of dummy.py for extracting payload from client to server (if we used `tcp.dstpor… 65 # determine client or server based on port
|
| /lib/lwip/lwip/src/netif/ppp/ |
| A D | auth.c | 1819 char *server; 1842 else if (server != NULL && server[0] == 0) 1843 server = NULL; 1867 char *server; 1883 else if (server != NULL && server[0] == 0) 1884 server = NULL; 1908 LWIP_UNUSED_ARG(server); in get_secret() 1940 client, server)); in get_secret() 1993 char *server; 2326 char *server; [all …]
|
| /lib/lwip/lwip/src/apps/sntp/ |
| A D | sntp.c | 802 sntp_setserver(u8_t idx, const ip_addr_t *server) in sntp_setserver() argument 806 if (server != NULL) { in sntp_setserver() 807 sntp_servers[idx].addr = (*server); in sntp_setserver() 828 dhcp_set_ntp_servers(u8_t num, const ip4_addr_t *server) in dhcp_set_ntp_servers() argument 832 … ip4_addr1(server), ip4_addr2(server), ip4_addr3(server), ip4_addr4(server), num)); in dhcp_set_ntp_servers() 837 ip_addr_copy_from_ip4(addr, server[i]); in dhcp_set_ntp_servers() 920 sntp_setservername(u8_t idx, const char *server) in sntp_setservername() argument 924 sntp_servers[idx].name = server; in sntp_setservername()
|
| /lib/lwip/lwip/contrib/examples/example_app/ |
| A D | lwipcfg.h.ci | 47 /* Set this to 1 to use the netconn http server, 48 * otherwise the raw api server will be used. */ 61 /* Set this to 1 to use the netconn tcpecho server, 62 * otherwise the raw api server will be used. */
|
| A D | lwipcfg.h.example | 51 /* Set this to 1 to use the netconn http server, 52 * otherwise the raw api server will be used. */ 65 /* Set this to 1 to use the netconn tcpecho server, 66 * otherwise the raw api server will be used. */
|
| /lib/lwip/lwip/src/apps/lwiperf/ |
| A D | lwiperf.c | 109 u8_t server; member 286 LWIP_ASSERT("conn invalid", (conn != NULL) && conn->base.tcp && (conn->base.server == 0)); in lwiperf_tcp_client_send_more() 589 if (!conn->base.server) { in lwiperf_tcp_poll() 606 LWIP_ASSERT("invalid session", s->base.server); in lwiperf_tcp_accept() 625 conn->base.server = 1; in lwiperf_tcp_accept() 712 s->base.server = 1; in lwiperf_start_tcp_server_impl() 799 lwiperf_state_tcp_t *server = NULL; in lwiperf_start_tcp_client() local 801 report_fn, report_arg, (lwiperf_state_base_t *)state, &server); in lwiperf_start_tcp_client() 808 server->specific_remote = 1; in lwiperf_start_tcp_client() 809 server->remote_addr = state->conn_pcb->remote_ip; in lwiperf_start_tcp_client() [all …]
|
| /lib/lwip/lwip/doc/ |
| A D | mqtt_client.txt | 9 1. Initial steps, reserve memory and make connection to server: 25 1.2: Establish Connection with server 38 /* Initiate client and connect to server, if this fails immediately an error code is returned 40 to establish a connection with the server. 51 Connection to server can also be probed by calling mqtt_client_is_connected(client) 84 notifying user, retry subscribe or disconnect from server */
|
| /lib/mbedtls/external/mbedtls/programs/ |
| A D | README.md | 44 …y/dh_server.c`](pkey/dh_server.c): secure channel demonstrators (client, server). This pair of pro… 65 …client.c): a simple DTLS client program, which sends one datagram to the server and reads one data… 67 * [`ssl/dtls_server.c`](ssl/dtls_server.c): a simple DTLS server program, which expects one datagra… 73 * [`ssl/ssl_fork_server.c`](ssl/ssl_fork_server.c): a simple HTTPS server using one process per cli… 77 * [`ssl/ssl_pthread_server.c`](ssl/ssl_pthread_server.c): a simple HTTPS server using one thread pe… 79 * [`ssl/ssl_server.c`](ssl/ssl_server.c): a simple HTTPS server that sends a fixed response. It ser… 87 * [`ssl/ssl_server2.c`](ssl/ssl_server2.c): an HTTPS server that sends a fixed response, with optio… 89 …server. For example, there are options to select ciphersuites, or to force a renegotiation. These … 109 * [`x509/cert_app.c`](x509/cert_app.c): connects to a TLS server and verifies its certificate chain.
|
| /lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/IANA/ |
| A D | IANATn3270eTC-MIB | 141 between a server and its client: 182 server to reflect to the client any and 185 bindImage Allows the server to send the SNA Bind 188 sysreq Allows the client and server to emulate 189 some (or all, depending on the server) of 261 TimeTicks since the TN3270E server was last 262 activated. The server's last activation time
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | tls13-early-data.md | 5 An application function to write and send a buffer of data to a server through 37 completing the handshake before to write and send data to the server. The 102 Finally, taking into account that the server may reject early data, application 150 that a TLS 1.3 server might receive during the TLS 1.3 handshake.
|
| /lib/lwip/lwip/ |
| A D | FEATURES | 11 …server (HTTPS via altcp), HTTP(S) client (since v2.1.0), SNTP client, SMTP client (SMTPS via altcp…
|
| A D | README | 41 * HTTP server with SSI and CGI (HTTPS via altcp) 46 * iPerf server implementation 71 See doc/savannah.txt for details on Git server access for users and
|
| /lib/lwip/lwip/src/ |
| A D | Filelists.cmake | 174 # HTTP server + client 182 # MAKEFSDATA HTTP server host utility 187 # IPERF server 209 # NetBIOS name server 214 # TFTP server files
|
| /lib/mbedtls/external/mbedtls/tests/data_files/ |
| A D | server1.cert_type.crt.openssl.v3_ext | 5 nsCertType=server
|
| /lib/lwip/lwip/contrib/apps/chargen/ |
| A D | README | 5 server environment. Just call chargen_init() from your application after 20 Once the chargen server is running in your application, go to another system
|
| /lib/lwip/lwip/src/include/lwip/apps/ |
| A D | sntp.h | 67 void sntp_setservername(u8_t idx, const char *server);
|