Lines Matching +full:time +full:- +full:slot

5 # SPDX-License-Identifier: Apache-2.0
8 depends on MBEDTLS_BUILTIN && MBEDTLS_CFG_FILE = "config-tls-generic.h"
65 bool "DHE-PSK based ciphersuite modes"
68 bool "ECDHE-PSK based ciphersuite modes"
72 bool "RSA-PSK based ciphersuite modes"
75 int "Max size of TLS pre-shared keys"
78 Max size of TLS pre-shared keys, in bytes. It has no effect if no
82 bool "RSA-only based ciphersuite modes"
91 bool "DHE-RSA based ciphersuite modes"
94 bool "ECDHE-RSA based ciphersuite modes"
98 bool "ECDHE-ECDSA based ciphersuite modes"
102 bool "ECDH-ECDSA based ciphersuite modes"
109 bool "ECDH-RSA based ciphersuite modes"
130 bool "HMAC-based Extract-and-Expand Key Derivation Function"
135 bool "Elliptic curve Diffie-Hellman library"
143 bool "Elliptic curve J-PAKE library"
267 bool "Xor-encrypt-xor with ciphertext stealing mode (XTS) for AES"
283 bool "Counter with CBC-MAC (CCM) mode for 128-bit block cipher"
303 bool "ChaCha20-Poly1305 AEAD algorithm"
307 bool "CMAC (Cipher-based Message Authentication Code) mode for block ciphers."
326 bool "SHA-1 hash algorithm"
329 bool "SHA-224 hash algorithm"
332 bool "SHA-256 hash algorithm"
336 bool "Smaller SHA-256 implementation"
340 Enable an implementation of SHA-256 that has a
344 bool "SHA-384 hash algorithm"
347 bool "SHA-512 hash algorithm"
357 bool "CTR_DRBG AES-256-based random generator"
375 bool "prime-number generation code."
408 end up using weaker/test-only sources (ex: random number generator
445 bool "Date/time validation in mbed TLS"
447 System has time.h, time(), and an implementation for gmtime_r().
448 There also need to be a valid time source in the system, as mbedTLS
449 expects a valid date/time for certificate validation."
452 bool "Password-based encryption functions"
483 prompt "Select random source for built-in PSA crypto"
502 - there is no fallback to weak entropy random generators.
503 - the initialization of PSA crypto will fail and none of its API
570 bool "P256-M driver"
577 bool "Access p256-m driver directly (without PSA interface)"
580 Allow direct access to the p256-m driver interface.
582 …case of very memory-constrained devices, but be aware that the p256-m interface is absolutely not …
589 key material for each key slot. This might impose an undesired
591 RAM and ROM footprints at the same time.
592 Enabling this symbol causes Mbed TLS to pre-allocate all the key slot
593 buffers that are used to store the key material at build time, thus
603 Be aware that each slot, even if unused, increases RAM consumption
607 is set. (This is all defined statically at build time).
608 * the heap-allocated memory to store the key material of a given slot,
626 Key Wrapping mode for 128-bit block ciphers,
627 as defined in NIST SP 800-38F.
630 bool "Diffie-Hellman-Merkle mode"
633 DHE-RSA, DHE-PSK