Home
last modified time | relevance | path

Searched refs:hashes (Results 1 – 14 of 14) sorted by relevance

/mbedtls-3.5.0/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md1 PSA migration strategy for hashes and ciphers
107 * **Legacy domain**: does not interact with PSA. Implementations of hashes, of cipher primitives, o…
119 * entropy (hashes via low-level)
121 * ECJPAKE (hashes via md; `md.h` exposed through API)
123 * md (hashes and HMAC)
125 * HMAC\_DRBG (hashes and HMAC via `md.h`; `md.h` exposed through API)
127 * PKCS12 (cipher, generically, selected from ASN.1 or function parameters; hashes via md; `cipher.h…
146 …sa_pss_sign()` is called from X.509 code, it should use PSA to calculate hashes. It doesn't, curre…
163 …s encoded (e.g. `mbedtls_md_type_t` vs `const *mbedtls_md_info_t` vs `psa_algorithm_t` for hashes).
190 A natural solution is to double up the encoding of hashes in `mbedtls_md_type_t`. Pass `MBEDTLS_MD_…
[all …]
Dstrategy.md112 - MD for messages digests aka hashes (including HMAC)
342 currently compute hashes using MD (resp. a low-level hash module) will gain
380 we're making some part of the library work with hashes provided only by
425 same context type for hashes and HMACs, while the PSA API (rightfully) has
431 incomplete (for example, for MD covering only hashes, or for Cipher covering
Dpsa-limitations.md187 - all three hashes are equal
/mbedtls-3.5.0/tests/suites/
Dtest_suite_psa_crypto_entropy.data10 # Key types and non-randomized auxiliary algorithms (in practice, hashes) can
Dtest_suite_psa_crypto_init.function19 * and PSA crypto doesn't support other hashes for HMAC_DRBG. */
Dtest_suite_psa_crypto_storage_format.function173 * compound algorithms that use those hashes. Until this is fixed,
/mbedtls-3.5.0/scripts/
Dassemble_changelog.py303 hashes = subprocess.check_output(['git', 'log', '--format=%H',
306 m = re.search('(.+)$', hashes.decode('ascii'))
/mbedtls-3.5.0/tests/data_files/
DReadme-x509.txt10 different hashes.
71 -sha*: hashes
/mbedtls-3.5.0/docs/
D3.0-migration-guide.md784 handshake transcript hashes which can be obtained from the raw data
1016 …following hashes have been removed: SHA-1 (formerly only accepted for key exchanges but not for ce…
1022 … `mbedtls_x509_crt_verify` and pass a profile that allows the curves and hashes you want. For exam…
1028 If you still need to allow hashes and curves in TLS that have been removed from the default configu…
/mbedtls-3.5.0/include/mbedtls/
Dssl.h3744 const int *hashes);
/mbedtls-3.5.0/
DChangeLog47 This helps in saving code size when some of the above hashes are not
251 * Some modules can now use PSA drivers for hashes, including with no
254 hashes from PSA when (and only when) MBEDTLS_MD_C is disabled.
259 Note that some modules are not able to use hashes from PSA yet, including
261 all hashes only provided by drivers (no built-in hash) is to use
264 properly negotiate/accept hashes based on their availability in PSA.
266 implementations of (some) hashes are excluded and those hashes are only
268 though: that module only use hashes from PSA when MBEDTLS_MD_C is off).
1033 changed: curves and hashes weaker than 255 bits are no longer accepted
2851 in configurations that omit certain hashes or public-key algorithms.
[all …]
/mbedtls-3.5.0/docs/proposed/
Dpsa-conditional-inclusion-c.md12 …he interface defines a number of categories of cryptographic algorithms (hashes, MAC, signatures, …
/mbedtls-3.5.0/tests/scripts/
Dall.sh1913 tests/scripts/depends.py hashes --unset-use-psa
1949 tests/scripts/depends.py hashes
/mbedtls-3.5.0/library/
Dssl_tls.c2915 const int *hashes) in mbedtls_ssl_conf_sig_hashes() argument
2917 conf->sig_hashes = hashes; in mbedtls_ssl_conf_sig_hashes()