Searched refs:hashes (Results 1 – 14 of 14) sorted by relevance
/mbedtls-3.5.0/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 1 PSA migration strategy for hashes and ciphers 107 * **Legacy domain**: does not interact with PSA. Implementations of hashes, of cipher primitives, o… 119 * entropy (hashes via low-level) 121 * ECJPAKE (hashes via md; `md.h` exposed through API) 123 * md (hashes and HMAC) 125 * HMAC\_DRBG (hashes and HMAC via `md.h`; `md.h` exposed through API) 127 * PKCS12 (cipher, generically, selected from ASN.1 or function parameters; hashes via md; `cipher.h… 146 …sa_pss_sign()` is called from X.509 code, it should use PSA to calculate hashes. It doesn't, curre… 163 …s encoded (e.g. `mbedtls_md_type_t` vs `const *mbedtls_md_info_t` vs `psa_algorithm_t` for hashes). 190 A natural solution is to double up the encoding of hashes in `mbedtls_md_type_t`. Pass `MBEDTLS_MD_… [all …]
|
D | strategy.md | 112 - MD for messages digests aka hashes (including HMAC) 342 currently compute hashes using MD (resp. a low-level hash module) will gain 380 we're making some part of the library work with hashes provided only by 425 same context type for hashes and HMACs, while the PSA API (rightfully) has 431 incomplete (for example, for MD covering only hashes, or for Cipher covering
|
D | psa-limitations.md | 187 - all three hashes are equal
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_psa_crypto_entropy.data | 10 # Key types and non-randomized auxiliary algorithms (in practice, hashes) can
|
D | test_suite_psa_crypto_init.function | 19 * and PSA crypto doesn't support other hashes for HMAC_DRBG. */
|
D | test_suite_psa_crypto_storage_format.function | 173 * compound algorithms that use those hashes. Until this is fixed,
|
/mbedtls-3.5.0/scripts/ |
D | assemble_changelog.py | 303 hashes = subprocess.check_output(['git', 'log', '--format=%H', 306 m = re.search('(.+)$', hashes.decode('ascii'))
|
/mbedtls-3.5.0/tests/data_files/ |
D | Readme-x509.txt | 10 different hashes. 71 -sha*: hashes
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 784 handshake transcript hashes which can be obtained from the raw data 1016 …following hashes have been removed: SHA-1 (formerly only accepted for key exchanges but not for ce… 1022 … `mbedtls_x509_crt_verify` and pass a profile that allows the curves and hashes you want. For exam… 1028 If you still need to allow hashes and curves in TLS that have been removed from the default configu…
|
/mbedtls-3.5.0/include/mbedtls/ |
D | ssl.h | 3744 const int *hashes);
|
/mbedtls-3.5.0/ |
D | ChangeLog | 47 This helps in saving code size when some of the above hashes are not 251 * Some modules can now use PSA drivers for hashes, including with no 254 hashes from PSA when (and only when) MBEDTLS_MD_C is disabled. 259 Note that some modules are not able to use hashes from PSA yet, including 261 all hashes only provided by drivers (no built-in hash) is to use 264 properly negotiate/accept hashes based on their availability in PSA. 266 implementations of (some) hashes are excluded and those hashes are only 268 though: that module only use hashes from PSA when MBEDTLS_MD_C is off). 1033 changed: curves and hashes weaker than 255 bits are no longer accepted 2851 in configurations that omit certain hashes or public-key algorithms. [all …]
|
/mbedtls-3.5.0/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 12 …he interface defines a number of categories of cryptographic algorithms (hashes, MAC, signatures, …
|
/mbedtls-3.5.0/tests/scripts/ |
D | all.sh | 1913 tests/scripts/depends.py hashes --unset-use-psa 1949 tests/scripts/depends.py hashes
|
/mbedtls-3.5.0/library/ |
D | ssl_tls.c | 2915 const int *hashes) in mbedtls_ssl_conf_sig_hashes() argument 2917 conf->sig_hashes = hashes; in mbedtls_ssl_conf_sig_hashes()
|