/mbedtls-3.5.0/3rdparty/everest/library/ |
D | x25519.c | 66 uint8_t base[MBEDTLS_X25519_KEY_SIZE_BYTES] = {0}; in mbedtls_x25519_make_params() local 80 base[0] = 9; in mbedtls_x25519_make_params() 81 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_params() 83 base[0] = 0; in mbedtls_x25519_make_params() 84 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES) == 0 ) in mbedtls_x25519_make_params() 151 unsigned char base[MBEDTLS_X25519_KEY_SIZE_BYTES] = { 0 }; in mbedtls_x25519_make_public() local 164 base[0] = 9; in mbedtls_x25519_make_public() 165 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_public() 167 base[0] = 0; in mbedtls_x25519_make_public() 168 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES ) == 0 ) in mbedtls_x25519_make_public()
|
/mbedtls-3.5.0/tests/scripts/ |
D | run-test-suites.pl | 56 (my $base = $data_file) =~ s/\.datax$//; 57 push @suites, $base if -x $base; 58 push @suites, "$base.exe" if -e "$base.exe";
|
/mbedtls-3.5.0/scripts/mbedtls_dev/ |
D | crypto_knowledge.py | 483 def permitted_truncations(cls, base: str) -> FrozenSet[int]: 491 if base in cls.PERMITTED_TAG_LENGTHS: 492 return cls.PERMITTED_TAG_LENGTHS[base] 493 max_length = cls.MAC_LENGTH.get(base, None) 495 m = cls.HMAC_RE.match(base) 499 raise ValueError('Unknown permitted lengths for ' + base) 515 base = m.group('base') 517 permitted_lengths = self.permitted_truncations(base)
|
D | bignum_mod_raw.py | 170 base = super().description() 172 return base.replace('mod', mod_with_rep, 1)
|
/mbedtls-3.5.0/programs/ssl/ |
D | ssl_mail_client.c | 337 unsigned char base[1024]; in main() local 342 unsigned char buf[sizeof(base) + 2]; in main() 693 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_name, in main() 700 len = sprintf((char *) buf, "%s\r\n", base); in main() 712 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_pwd, in main() 719 len = sprintf((char *) buf, "%s\r\n", base); in main()
|
/mbedtls-3.5.0/library/ |
D | cipher.c | 131 if (def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values() 181 ctx->cipher_info->base->ctx_free_func(ctx->cipher_ctx); in mbedtls_cipher_free() 196 if (NULL == (ctx->cipher_ctx = cipher_info->base->ctx_alloc_func())) { in mbedtls_cipher_setup() 340 return ctx->cipher_info->base->setkey_enc_func(ctx->cipher_ctx, key, in mbedtls_cipher_setkey() 345 return ctx->cipher_info->base->setkey_dec_func(ctx->cipher_ctx, key, in mbedtls_cipher_setkey() 551 if (0 != (ret = ctx->cipher_info->base->ecb_func(ctx->cipher_ctx, in mbedtls_cipher_update() 617 if (0 != (ret = ctx->cipher_info->base->cbc_func(ctx->cipher_ctx, in mbedtls_cipher_update() 657 if (0 != (ret = ctx->cipher_info->base->cbc_func(ctx->cipher_ctx, in mbedtls_cipher_update() 672 if (0 != (ret = ctx->cipher_info->base->cfb_func(ctx->cipher_ctx, in mbedtls_cipher_update() 687 if (0 != (ret = ctx->cipher_info->base->ofb_func(ctx->cipher_ctx, in mbedtls_cipher_update() [all …]
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_bignum_mod.misc.data | 27 mpi_mod_sub base case for negative testing (N, a, b all >= 1 limb) 48 mbedtls_mpi_mod_inv non-Mont. form - base case for negative testing (N, A, A^-1) 60 mbedtls_mpi_mod_inv 32-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-… 76 mbedtls_mpi_mod_inv 64-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-… 99 mpi_mod_add base case for negative testing (N, a, b all >= 1 limb)
|
D | test_suite_entropy.data | 16 Entropy write/update seed file: base NV seed file
|
D | test_suite_bignum.misc.data | 70 Test mpi_read_write_string #9 (Empty MPI hex -> base 2) 79 Test mpi_read_write_string #9 (Empty MPI dec -> base 2) 868 Base test mbedtls_mpi_sub_mpi #3 (Test with negative base) 1311 Base test mbedtls_mpi_exp_mod #4 (Negative base) 1317 Base test mbedtls_mpi_exp_mod #6 (Negative base + exponent) 1384 Test mbedtls_mpi_exp_mod (Negative base) [#1] 1387 Test mbedtls_mpi_exp_mod (Negative base) [#2]
|
D | test_suite_ecp.function | 165 * important to test both base point and random point, though, as memory 175 * - Cold base point mult: ~3300M 176 * - Hot base point mult: ~1100M 222 /* Non-base point case */
|
D | test_suite_entropy.function | 89 * NV seed read/write helpers that fill the base seedfile
|
D | test_suite_bignum_random.function | 62 /* Test whether bytes represents (in big-endian base 256) a number b that
|
D | test_suite_psa_crypto.data | 730 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg 734 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base) 738 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different algorithm) 842 PSA key policy: AEAD, min-length policy, unmatched base alg
|
D | test_suite_x509parse.data | 2843 # Used test_csr_v3_all.csr.der as a base for malforming CSR extenstions/attributes
|
D | test_suite_psa_crypto.function | 9722 /* Create base key */
|
/mbedtls-3.5.0/scripts/ |
D | ci.requirements.txt | 10 # Use the earliest version of mypy that works with our code base.
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | outcome-analysis.sh | 51 git checkout $(git merge-base HEAD development)
|
D | strategy.md | 95 `ENTROPY_C`. This requires going through the PSA code base to adjust
|
/mbedtls-3.5.0/ChangeLog.d/ |
D | 00README.md | 22 * Changes to parts of the code base that users don't interact with directly,
|
/mbedtls-3.5.0/include/mbedtls/ |
D | cipher.h | 308 const mbedtls_cipher_base_t *MBEDTLS_PRIVATE(base);
|
/mbedtls-3.5.0/tests/ |
D | CMakeLists.txt | 19 # Get base names for generated files
|
/mbedtls-3.5.0/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 103 …he base mechanism is supported. Parameters must themselves be included through their own `PSA_WANT…
|
/mbedtls-3.5.0/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 35 Test cases should normally not be removed from the code base: if something has worked before, it sh…
|
/mbedtls-3.5.0/docs/architecture/ |
D | tls13-support.md | 345 split them to ease their search in the code base.
|
/mbedtls-3.5.0/ |
D | ChangeLog | 652 by 2, and mbedtls_mpi_write_string() in base 2). 1483 * In PSA, allow using a key declared with a base key agreement algorithm 1674 enclave) could bypass an existing counter-measure (base blinding) and 2902 * Add the order of the base point as N in the mbedtls_ecp_group structure 3327 * Fix incorrect sign computation in modular exponentiation when the base is 4880 * Added base Galois Counter Mode (GCM) for AES 4921 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket 4987 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket 5260 * Added const correctness for main code base
|