/mbedtls-3.5.0/library/ |
D | constant_time.c | 808 unsigned ret, cond, done; in mbedtls_mpi_core_lt_ct() local 812 ret = cond = done = 0; in mbedtls_mpi_core_lt_ct() 823 done |= cond; in mbedtls_mpi_core_lt_ct() 832 ret |= cond & (1 - done); in mbedtls_mpi_core_lt_ct() 833 done |= cond; in mbedtls_mpi_core_lt_ct() 853 unsigned cond, done, X_is_negative, Y_is_negative; in mbedtls_mpi_lt_mpi_ct() local 882 done = cond; in mbedtls_mpi_lt_mpi_ct() 893 *ret |= cond & (1 - done) & X_is_negative; in mbedtls_mpi_lt_mpi_ct() 894 done |= cond; in mbedtls_mpi_lt_mpi_ct() 904 *ret |= cond & (1 - done) & (1 - X_is_negative); in mbedtls_mpi_lt_mpi_ct() [all …]
|
D | cipher.c | 812 unsigned char done = 0, prev_done, bad; in get_one_and_zeros_padding() local 821 prev_done = done; in get_one_and_zeros_padding() 822 done |= (input[i - 1] != 0); in get_one_and_zeros_padding() 823 *data_len |= (i - 1) * (done != prev_done); in get_one_and_zeros_padding() 824 bad ^= input[i - 1] * (done != prev_done); in get_one_and_zeros_padding() 893 unsigned char done = 0, prev_done; in get_zeros_padding() local 901 prev_done = done; in get_zeros_padding() 902 done |= (input[i-1] != 0); in get_zeros_padding() 903 *data_len |= i * (done != prev_done); in get_zeros_padding()
|
D | aesni.c | 47 static int done = 0; in mbedtls_aesni_has_support() local 50 if (!done) { in mbedtls_aesni_has_support() 66 done = 1; in mbedtls_aesni_has_support()
|
D | sha256.c | 571 static int done = 0; in mbedtls_a64_crypto_sha256_has_support() local 574 if (!done) { in mbedtls_a64_crypto_sha256_has_support() 576 done = 1; in mbedtls_a64_crypto_sha256_has_support()
|
D | sha512.c | 722 static int done = 0; in mbedtls_a64_crypto_sha512_has_support() local 725 if (!done) { in mbedtls_a64_crypto_sha512_has_support() 727 done = 1; in mbedtls_a64_crypto_sha512_has_support()
|
D | ssl_msg.c | 2710 int ret, done = 0; in mbedtls_ssl_write_record() local 2716 if (!done) { in mbedtls_ssl_write_record() 3739 int ret, done = 0; in ssl_prepare_record_content() local 3753 done = 1; in ssl_prepare_record_content() 3758 if (!done && ssl->transform_in != NULL) { in ssl_prepare_record_content()
|
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | psa-limitations.md | 7 operations done in TLS and X.509 code, but of course it's still possible that 62 done any time.) 65 would still be available in TLS 1.3, just not in 1.2.) (Can only be done in 71 done in 4.0 or another major version.) 78 migration by implementing RFC 7919. (Implementing RFC 7919 could be done any 79 time; making it mandatory can only be done in 4.0 or another major version.) 163 The verification is done using `mbedtls_pk_verify_ext()`.
|
D | strategy.md | 60 At the time of writing (early 2022) it is unclear what could be done about the 137 - Downside: tricky to implement if the PSA implementation is currently done on 144 implementation is currently done on top of that layer. 156 - For every operation that's done through this layer in TLS or X.509, just 158 - Upside: conceptually simple, and if the PSA implementation is currently done 162 - Downside: TLS/X.509 code has to be done for each operation. 171 to be done via PSA. 243 `MBEDTLS_USE_PSA_CRYPTO`.) This needs to be done in the library and tests. 247 this needs to be done in the library (for crypto operations and data) and 281 #5797. It is being done in PK and RSA PKCS#1 v1.5 by PR #6065. [all …]
|
D | md-cipher-dispatch.md | 54 …acy interfaces (less code size, less maintenance). However, this can't be done without breaking [b… 80 … the goal is to make more code call PSA drivers where available. How dispatch is done is secondary. 199 …ed then `psa_verify_hash` must reject `PSA_WANT_ALG_SHA_256`. This can be done at the level of PSA… 394 * Otherwise dispatch to the legacy module based on the type as currently done. (Skip this is `MBEDT… 476 …an overview of the task breakdown, which should be fleshed up after we've done the first [migratio…
|
/mbedtls-3.5.0/.github/ |
D | pull_request_template.md | 10 - [ ] **backport** done, or not required
|
/mbedtls-3.5.0/docs/architecture/testing/ |
D | driver-interface-test-strategy.md | 45 …er and check that the expected driver is called. This does not need to be done for all operations … 86 * This must be done for each key creation method and for key destruction. 87 * This must be done for each possible flow, including error cases (e.g. a key creation that fails m… 90 … (this can be done by e.g. using a key that is supposed to be present) and does not have any unexp…
|
D | psa-storage-format-testing.md | 39 …n't deliberately decide to stop supporting old keys (which should only be done by retiring a versi…
|
D | invasive-testing.md | 14 …nts”](#requirements) explores the reasons why invasive testing is needed and how it should be done. 215 | Effacement | ++ No impact on the product when built normally or on the documentation, if done rig…
|
/mbedtls-3.5.0/docs/architecture/ |
D | tls13-support.md | 397 result in too many checks of whether something needs to be done or not in a 439 stage is optional. Any processing that must be done before the parsing of the 440 message or that can be done to simplify the parsing code. Some simple and 454 * state change: the state change is done in the main state handler to ease the 465 Any processing that must be done before the writing of the message or that can 466 be done to simplify the writing code. 479 * state change: the state change is done in the main state handler to ease 651 with again calls to read_early_data() expected to be done with a fresh SSL
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_bignum.function | 482 /* mbedtls_mpi_safe_cond_assign(), assignment done */ 489 /* mbedtls_mpi_safe_cond_assign(), assignment not done */ 542 /* mbedtls_mpi_safe_cond_swap(), swap done */ 553 /* mbedtls_mpi_safe_cond_swap(), swap not done */
|
D | test_suite_x509parse.function | 174 goto done; 181 goto done; 186 done:
|
D | test_suite_md.function | 394 /* Intentionally no PSA init here! (Will be done later.) */
|
D | test_suite_bignum_random.function | 36 * in the same way as mbedtls_mpi_core_random(). This is done in
|
D | test_suite_psa_crypto_se_driver_hal.function | 1146 /* We're done. */ 1263 /* We're done. */
|
D | test_suite_psa_crypto.function | 1933 /* Check if no key usage flag implication is done */ 2021 /* Check if no key usage implication is done */ 2103 /* Check if no key usage implication is done */ 6502 * 3. Test that the number of ops done prior to start and after abort is zero 6677 * 3. Test that the number of ops done prior to start and after abort is zero 6898 * 4. Test that the number of ops done prior to starting signing and after abort 7099 * 3. Test that the number of ops done prior to start and after abort is zero 7265 * 3. Test that the number of ops done prior to start and after abort is zero
|
D | test_suite_cipher.function | 546 /* done */
|
D | test_suite_pk.function | 358 * is expected because that's what the library has done forever.
|
/mbedtls-3.5.0/ |
D | CONTRIBUTING.md | 91 …rt of the project, and be subject to the same Apache 2.0 license. This is done by including the st…
|
D | README.md | 176 CMake cache. This can be done with the following command using GNU find:
|
/mbedtls-3.5.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.c.jinja | 442 /* If uninitialised, return 0, as no work can have been done. */ 465 /* If uninitialised, return 0, as no work can have been done. */
|