Home
last modified time | relevance | path

Searched refs:server (Results 1 – 25 of 55) sorted by relevance

123

/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_psa_crypto_pake.data3 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_INJECT_UNIN…
7 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_SETUP:PS…
11 …RIMITIVE_TYPE_DH, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_OUTPUT:P…
15 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_K1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_OUTPUT:P…
19 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 128):PSA_ALG_SHA_256:"client":"server":0:ERR_IN_OUTPUT:P…
23 …PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_1:"client":"server":0:ERR_IN_OUTPUT:P…
27 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_INJECT_DUPL…
43 …AKE_PRIMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"":"server":0:ERR_IN_SET_USER…
51 …TIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"something":"server":0:ERR_IN_OUTPUT:P…
59 …IMITIVE_TYPE_ECC, PSA_ECC_FAMILY_SECP_R1, 256):PSA_ALG_SHA_256:"client":"server":0:ERR_DUPLICATE_S…
[all …]
A Dtest_suite_ecjpake.data13 ECJPAKE round one: server, valid
184 ECJPAKE round two server: valid
187 ECJPAKE round two server: trailing byte
190 ECJPAKE round two server: no data
199 ECJPAKE round two server: no first point data
202 ECJPAKE round two server: first point is zero
217 ECJPAKE round two server: no second point data
226 ECJPAKE round two server: zero-length r
229 ECJPAKE round two server: no data for r
232 ECJPAKE round two server: corrupted r
[all …]
A Dtest_suite_psa_crypto_pake.function105 psa_pake_operation_t *server,
803 PSA_ASSERT(psa_pake_setup(&server, &cipher_suite));
811 PSA_ASSERT(psa_pake_set_password_key(&server, key));
814 ecjpake_do_round(alg, primitive_arg, &server, &client,
823 ecjpake_do_round(alg, primitive_arg, &server, &client,
829 psa_pake_abort(&server);
881 PSA_ASSERT(psa_pake_setup(&server, &cipher_suite));
889 PSA_ASSERT(psa_pake_set_password_key(&server, key));
905 ecjpake_do_round(alg, primitive_arg, &server, &client,
918 ecjpake_do_round(alg, primitive_arg, &server, &client,
[all …]
A Dtest_suite_ssl.function298 mbedtls_test_mock_socket server;
314 mbedtls_test_mock_socket_init(&server);
327 /* Send the message to the server */
375 mbedtls_test_mock_socket_close(&server);
395 mbedtls_test_mock_socket server;
413 mbedtls_test_mock_socket_init(&server);
731 /* Send the message to the server */
735 /* Read from the server */
987 server.status = 0;
3106 mbedtls_platform_zeroize(&server, sizeof(server));
[all …]
A Dtest_suite_ssl.data103 Test mbedtls_endpoint sanity for the server
231 TLS 1.2:Move server handshake to HELLO_REQUEST
235 TLS 1.2:Move server handshake to CLIENT_HELLO
239 TLS 1.2:Move server handshake to SERVER_HELLO
287 TLS 1.2:Move server handshake to FLUSH_BUFFERS
303 TLS 1.3:Move server handshake to CLIENT_HELLO
307 TLS 1.3:Move server handshake to SERVER_HELLO
3123 Version config: valid server TLS 1.2 only
3127 Version config: valid server DTLS 1.2 only
3155 Version config: valid server TLS 1.3 only
[all …]
A Dtest_suite_psa_crypto_driver_wrappers.function17 psa_pake_operation_t *server,
58 PSA_ASSERT(psa_pake_output(server, PSA_PAKE_STEP_KEY_SHARE,
74 PSA_ASSERT(psa_pake_output(server, PSA_PAKE_STEP_ZK_PROOF,
261 status = psa_pake_input(server, PSA_PAKE_STEP_ZK_PROOF,
279 status = psa_pake_input(server, PSA_PAKE_STEP_ZK_PROOF,
3187 psa_pake_operation_t server = psa_pake_operation_init();
3237 PSA_ASSERT(psa_pake_setup(&server, &cipher_suite));
3249 PSA_ASSERT(psa_pake_set_password_key(&server, key));
3255 ecjpake_do_round(alg, primitive_arg, &server, &client,
3259 ecjpake_do_round(alg, primitive_arg, &server, &client,
[all …]
/lib/mbedtls/external/mbedtls/tests/src/test_helpers/
A Dssl_helpers.c2011 mbedtls_test_ssl_endpoint client, server; in mbedtls_test_ssl_perform_handshake() local
2029 mbedtls_platform_zeroize(&server, sizeof(server)); in mbedtls_test_ssl_perform_handshake()
2174 &server.ssl)) { in mbedtls_test_ssl_perform_handshake()
2195 TEST_ASSERT(server.ssl.in_buf_len == in mbedtls_test_ssl_perform_handshake()
2225 mbedtls_ssl_free(&(server.ssl)); in mbedtls_test_ssl_perform_handshake()
2226 mbedtls_ssl_init(&(server.ssl)); in mbedtls_test_ssl_perform_handshake()
2228 TEST_ASSERT(mbedtls_ssl_setup(&(server.ssl), &(server.conf)) == 0); in mbedtls_test_ssl_perform_handshake()
2235 mbedtls_ssl_set_user_data_p(&server.ssl, &server); in mbedtls_test_ssl_perform_handshake()
2340 TEST_ASSERT(mbedtls_ssl_conf_get_user_data_p(&server.conf) == &server); in mbedtls_test_ssl_perform_handshake()
2341 TEST_ASSERT(mbedtls_ssl_get_user_data_p(&server.ssl) == &server); in mbedtls_test_ssl_perform_handshake()
[all …]
/lib/mbedtls/external/mbedtls/tests/scripts/
A Dgenerate_tls13_compat_tests.py483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group)
485 server_object = SERVER_CLASSES[server](ciphersuite=cipher,
506 def generate_hrr_compat_test(client=None, server=None, argument
513 client=client, server=server, c_named_group=client_named_group,
600 for client, server, cipher, named_group, sig_alg in \
606 if server == 'mbedTLS' or client == 'mbedTLS':
607 yield generate_compat_test(client=client, server=server,
613 for client, server, client_named_group, server_named_group in \
619 if (client == 'mbedTLS' or server == 'mbedTLS') and \
621 yield generate_hrr_compat_test(client=client, server=server,
[all …]
/lib/lwip/lwip/test/unit/core/
A Dtest_dns.c26 ip_addr_t server; in START_TEST() local
32 IP_ADDR4(&server, 10, 0, 0, i); in START_TEST()
33 dns_setserver(i, &server); in START_TEST()
36 fail_unless(ip_addr_eq(dns_getserver(i), &server) == 1); in START_TEST()
/lib/mbedtls/external/mbedtls/programs/fuzz/
A DREADME.md42 * client : simulates a client against (fuzzed) server traffic
43 * server : simulates a server against (fuzzed) client traffic
53 * Run a dummy python script to output either client or server corpus file like `python dummy.py tes…
56 Here is an example of dummy.py for extracting payload from client to server (if we used `tcp.dstpor…
65 # determine client or server based on port
/lib/lwip/lwip/src/netif/ppp/
A Dauth.c1819 char *server;
1842 else if (server != NULL && server[0] == 0)
1843 server = NULL;
1867 char *server;
1883 else if (server != NULL && server[0] == 0)
1884 server = NULL;
1908 LWIP_UNUSED_ARG(server); in get_secret()
1940 client, server)); in get_secret()
1993 char *server;
2326 char *server;
[all …]
/lib/lwip/lwip/src/apps/sntp/
A Dsntp.c802 sntp_setserver(u8_t idx, const ip_addr_t *server) in sntp_setserver() argument
806 if (server != NULL) { in sntp_setserver()
807 sntp_servers[idx].addr = (*server); in sntp_setserver()
828 dhcp_set_ntp_servers(u8_t num, const ip4_addr_t *server) in dhcp_set_ntp_servers() argument
832 … ip4_addr1(server), ip4_addr2(server), ip4_addr3(server), ip4_addr4(server), num)); in dhcp_set_ntp_servers()
837 ip_addr_copy_from_ip4(addr, server[i]); in dhcp_set_ntp_servers()
920 sntp_setservername(u8_t idx, const char *server) in sntp_setservername() argument
924 sntp_servers[idx].name = server; in sntp_setservername()
/lib/lwip/lwip/contrib/examples/example_app/
A Dlwipcfg.h.ci47 /* Set this to 1 to use the netconn http server,
48 * otherwise the raw api server will be used. */
61 /* Set this to 1 to use the netconn tcpecho server,
62 * otherwise the raw api server will be used. */
A Dlwipcfg.h.example51 /* Set this to 1 to use the netconn http server,
52 * otherwise the raw api server will be used. */
65 /* Set this to 1 to use the netconn tcpecho server,
66 * otherwise the raw api server will be used. */
/lib/lwip/lwip/src/apps/lwiperf/
A Dlwiperf.c109 u8_t server; member
286 LWIP_ASSERT("conn invalid", (conn != NULL) && conn->base.tcp && (conn->base.server == 0)); in lwiperf_tcp_client_send_more()
589 if (!conn->base.server) { in lwiperf_tcp_poll()
606 LWIP_ASSERT("invalid session", s->base.server); in lwiperf_tcp_accept()
625 conn->base.server = 1; in lwiperf_tcp_accept()
712 s->base.server = 1; in lwiperf_start_tcp_server_impl()
799 lwiperf_state_tcp_t *server = NULL; in lwiperf_start_tcp_client() local
801 report_fn, report_arg, (lwiperf_state_base_t *)state, &server); in lwiperf_start_tcp_client()
808 server->specific_remote = 1; in lwiperf_start_tcp_client()
809 server->remote_addr = state->conn_pcb->remote_ip; in lwiperf_start_tcp_client()
[all …]
/lib/lwip/lwip/doc/
A Dmqtt_client.txt9 1. Initial steps, reserve memory and make connection to server:
25 1.2: Establish Connection with server
38 /* Initiate client and connect to server, if this fails immediately an error code is returned
40 to establish a connection with the server.
51 Connection to server can also be probed by calling mqtt_client_is_connected(client)
84 notifying user, retry subscribe or disconnect from server */
/lib/mbedtls/external/mbedtls/programs/
A DREADME.md44 …y/dh_server.c`](pkey/dh_server.c): secure channel demonstrators (client, server). This pair of pro…
65 …client.c): a simple DTLS client program, which sends one datagram to the server and reads one data…
67 * [`ssl/dtls_server.c`](ssl/dtls_server.c): a simple DTLS server program, which expects one datagra…
73 * [`ssl/ssl_fork_server.c`](ssl/ssl_fork_server.c): a simple HTTPS server using one process per cli…
77 * [`ssl/ssl_pthread_server.c`](ssl/ssl_pthread_server.c): a simple HTTPS server using one thread pe…
79 * [`ssl/ssl_server.c`](ssl/ssl_server.c): a simple HTTPS server that sends a fixed response. It ser…
87 * [`ssl/ssl_server2.c`](ssl/ssl_server2.c): an HTTPS server that sends a fixed response, with optio…
89server. For example, there are options to select ciphersuites, or to force a renegotiation. These …
109 * [`x509/cert_app.c`](x509/cert_app.c): connects to a TLS server and verifies its certificate chain.
/lib/lwip/lwip/contrib/apps/LwipMibCompiler/Mibs/IANA/
A DIANATn3270eTC-MIB141 between a server and its client:
182 server to reflect to the client any and
185 bindImage Allows the server to send the SNA Bind
188 sysreq Allows the client and server to emulate
189 some (or all, depending on the server) of
261 TimeTicks since the TN3270E server was last
262 activated. The server's last activation time
/lib/mbedtls/external/mbedtls/docs/
A Dtls13-early-data.md5 An application function to write and send a buffer of data to a server through
37 completing the handshake before to write and send data to the server. The
102 Finally, taking into account that the server may reject early data, application
150 that a TLS 1.3 server might receive during the TLS 1.3 handshake.
/lib/lwip/lwip/
A DFEATURES11server (HTTPS via altcp), HTTP(S) client (since v2.1.0), SNTP client, SMTP client (SMTPS via altcp…
A DREADME41 * HTTP server with SSI and CGI (HTTPS via altcp)
46 * iPerf server implementation
71 See doc/savannah.txt for details on Git server access for users and
/lib/lwip/lwip/src/
A DFilelists.cmake174 # HTTP server + client
182 # MAKEFSDATA HTTP server host utility
187 # IPERF server
209 # NetBIOS name server
214 # TFTP server files
/lib/mbedtls/external/mbedtls/tests/data_files/
A Dserver1.cert_type.crt.openssl.v3_ext5 nsCertType=server
/lib/lwip/lwip/contrib/apps/chargen/
A DREADME5 server environment. Just call chargen_init() from your application after
20 Once the chargen server is running in your application, go to another system
/lib/lwip/lwip/src/include/lwip/apps/
A Dsntp.h67 void sntp_setservername(u8_t idx, const char *server);

Completed in 57 milliseconds

123