Home
last modified time | relevance | path

Searched refs:base (Results 1 – 25 of 25) sorted by relevance

/mbedtls-3.5.0/3rdparty/everest/library/
Dx25519.c66 uint8_t base[MBEDTLS_X25519_KEY_SIZE_BYTES] = {0}; in mbedtls_x25519_make_params() local
80 base[0] = 9; in mbedtls_x25519_make_params()
81 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_params()
83 base[0] = 0; in mbedtls_x25519_make_params()
84 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES) == 0 ) in mbedtls_x25519_make_params()
151 unsigned char base[MBEDTLS_X25519_KEY_SIZE_BYTES] = { 0 }; in mbedtls_x25519_make_public() local
164 base[0] = 9; in mbedtls_x25519_make_public()
165 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_public()
167 base[0] = 0; in mbedtls_x25519_make_public()
168 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES ) == 0 ) in mbedtls_x25519_make_public()
/mbedtls-3.5.0/tests/scripts/
Drun-test-suites.pl56 (my $base = $data_file) =~ s/\.datax$//;
57 push @suites, $base if -x $base;
58 push @suites, "$base.exe" if -e "$base.exe";
/mbedtls-3.5.0/scripts/mbedtls_dev/
Dcrypto_knowledge.py483 def permitted_truncations(cls, base: str) -> FrozenSet[int]:
491 if base in cls.PERMITTED_TAG_LENGTHS:
492 return cls.PERMITTED_TAG_LENGTHS[base]
493 max_length = cls.MAC_LENGTH.get(base, None)
495 m = cls.HMAC_RE.match(base)
499 raise ValueError('Unknown permitted lengths for ' + base)
515 base = m.group('base')
517 permitted_lengths = self.permitted_truncations(base)
Dbignum_mod_raw.py170 base = super().description()
172 return base.replace('mod', mod_with_rep, 1)
/mbedtls-3.5.0/programs/ssl/
Dssl_mail_client.c337 unsigned char base[1024]; in main() local
342 unsigned char buf[sizeof(base) + 2]; in main()
693 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_name, in main()
700 len = sprintf((char *) buf, "%s\r\n", base); in main()
712 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_pwd, in main()
719 len = sprintf((char *) buf, "%s\r\n", base); in main()
/mbedtls-3.5.0/library/
Dcipher.c131 if (def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values()
181 ctx->cipher_info->base->ctx_free_func(ctx->cipher_ctx); in mbedtls_cipher_free()
196 if (NULL == (ctx->cipher_ctx = cipher_info->base->ctx_alloc_func())) { in mbedtls_cipher_setup()
340 return ctx->cipher_info->base->setkey_enc_func(ctx->cipher_ctx, key, in mbedtls_cipher_setkey()
345 return ctx->cipher_info->base->setkey_dec_func(ctx->cipher_ctx, key, in mbedtls_cipher_setkey()
551 if (0 != (ret = ctx->cipher_info->base->ecb_func(ctx->cipher_ctx, in mbedtls_cipher_update()
617 if (0 != (ret = ctx->cipher_info->base->cbc_func(ctx->cipher_ctx, in mbedtls_cipher_update()
657 if (0 != (ret = ctx->cipher_info->base->cbc_func(ctx->cipher_ctx, in mbedtls_cipher_update()
672 if (0 != (ret = ctx->cipher_info->base->cfb_func(ctx->cipher_ctx, in mbedtls_cipher_update()
687 if (0 != (ret = ctx->cipher_info->base->ofb_func(ctx->cipher_ctx, in mbedtls_cipher_update()
[all …]
/mbedtls-3.5.0/tests/suites/
Dtest_suite_bignum_mod.misc.data27 mpi_mod_sub base case for negative testing (N, a, b all >= 1 limb)
48 mbedtls_mpi_mod_inv non-Mont. form - base case for negative testing (N, A, A^-1)
60 mbedtls_mpi_mod_inv 32-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-…
76 mbedtls_mpi_mod_inv 64-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-…
99 mpi_mod_add base case for negative testing (N, a, b all >= 1 limb)
Dtest_suite_entropy.data16 Entropy write/update seed file: base NV seed file
Dtest_suite_bignum.misc.data70 Test mpi_read_write_string #9 (Empty MPI hex -> base 2)
79 Test mpi_read_write_string #9 (Empty MPI dec -> base 2)
868 Base test mbedtls_mpi_sub_mpi #3 (Test with negative base)
1311 Base test mbedtls_mpi_exp_mod #4 (Negative base)
1317 Base test mbedtls_mpi_exp_mod #6 (Negative base + exponent)
1384 Test mbedtls_mpi_exp_mod (Negative base) [#1]
1387 Test mbedtls_mpi_exp_mod (Negative base) [#2]
Dtest_suite_ecp.function165 * important to test both base point and random point, though, as memory
175 * - Cold base point mult: ~3300M
176 * - Hot base point mult: ~1100M
222 /* Non-base point case */
Dtest_suite_entropy.function89 * NV seed read/write helpers that fill the base seedfile
Dtest_suite_bignum_random.function62 /* Test whether bytes represents (in big-endian base 256) a number b that
Dtest_suite_psa_crypto.data730 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg
734 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base)
738 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different algorithm)
842 PSA key policy: AEAD, min-length policy, unmatched base alg
Dtest_suite_x509parse.data2843 # Used test_csr_v3_all.csr.der as a base for malforming CSR extenstions/attributes
Dtest_suite_psa_crypto.function9722 /* Create base key */
/mbedtls-3.5.0/scripts/
Dci.requirements.txt10 # Use the earliest version of mypy that works with our code base.
/mbedtls-3.5.0/docs/architecture/psa-migration/
Doutcome-analysis.sh51 git checkout $(git merge-base HEAD development)
Dstrategy.md95 `ENTROPY_C`. This requires going through the PSA code base to adjust
/mbedtls-3.5.0/ChangeLog.d/
D00README.md22 * Changes to parts of the code base that users don't interact with directly,
/mbedtls-3.5.0/include/mbedtls/
Dcipher.h308 const mbedtls_cipher_base_t *MBEDTLS_PRIVATE(base);
/mbedtls-3.5.0/tests/
DCMakeLists.txt19 # Get base names for generated files
/mbedtls-3.5.0/docs/proposed/
Dpsa-conditional-inclusion-c.md103 …he base mechanism is supported. Parameters must themselves be included through their own `PSA_WANT…
/mbedtls-3.5.0/docs/architecture/testing/
Dpsa-storage-format-testing.md35 Test cases should normally not be removed from the code base: if something has worked before, it sh…
/mbedtls-3.5.0/docs/architecture/
Dtls13-support.md345 split them to ease their search in the code base.
/mbedtls-3.5.0/
DChangeLog652 by 2, and mbedtls_mpi_write_string() in base 2).
1483 * In PSA, allow using a key declared with a base key agreement algorithm
1674 enclave) could bypass an existing counter-measure (base blinding) and
2902 * Add the order of the base point as N in the mbedtls_ecp_group structure
3327 * Fix incorrect sign computation in modular exponentiation when the base is
4880 * Added base Galois Counter Mode (GCM) for AES
4921 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
4987 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
5260 * Added const correctness for main code base