/mbedtls-3.5.0/scripts/ |
D | generate_psa_constants.py | 276 return ''.join([make(k, d[k]) for k in sorted(d.keys())]) 281 return ''.join([make(k, d[k]) for k in sorted(d.keys())]) 304 return ''.join([make(k, d[k]) for k in sorted(d.keys())])
|
/mbedtls-3.5.0/programs/random/ |
D | gen_entropy.c | 42 int i, k, ret = 1; in main() local 59 for (i = 0, k = 768; i < k; i++) { in main() 71 (long) (sizeof(buf) * k / 1024), in main() 73 (100 * (float) (i + 1)) / k); in main()
|
D | gen_random_ctr_drbg.c | 45 int i, k, ret = 1; in main() local 91 for (i = 0, k = 768; i < k; i++) { in main() 102 (long) (sizeof(buf) * k / 1024), in main() 104 (100 * (float) (i + 1)) / k); in main()
|
/mbedtls-3.5.0/tests/suites/ |
D | test_suite_pkcs7.function | 66 size_t buflen, i, k, cnt = 0, n_crts = 1; 90 for (k = i; k < strlen(crt_files); k++) { 91 if (crt_files[k] == ' ') { 95 ASSERT_ALLOC(crt_files_arr[cnt], (k-i)+1); 96 crt_files_arr[cnt][k-i] = '\0'; 97 memcpy(crt_files_arr[cnt++], crt_files + i, k-i); 98 i = k;
|
D | test_suite_psa_crypto.data | 5353 # HKDF-Extract tests: out - output, k - secret provided as key, b - secret provided as bytes 5354 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 32+0 k 5358 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 22+10 k 5362 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 0+32 k 5366 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 1+31 k 5370 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 31+0 k 5374 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #1, out 1+30 k 5378 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #2, out 32+0 k 5382 PSA key derivation: HKDF-Extract SHA-256, RFC5869 #3, out 32+0 k 5386 PSA key derivation: HKDF-Extract SHA-1, RFC5869 #4, out 20+0 k [all …]
|
/mbedtls-3.5.0/library/ |
D | aria.c | 293 const uint32_t k[4], const uint32_t x[4]) in aria_fo_xor() 297 a = p[0] ^ k[0]; in aria_fo_xor() 298 b = p[1] ^ k[1]; in aria_fo_xor() 299 c = p[2] ^ k[2]; in aria_fo_xor() 300 d = p[3] ^ k[3]; in aria_fo_xor() 315 const uint32_t k[4], const uint32_t x[4]) in aria_fe_xor() 319 a = p[0] ^ k[0]; in aria_fe_xor() 320 b = p[1] ^ k[1]; in aria_fe_xor() 321 c = p[2] ^ k[2]; in aria_fe_xor() 322 d = p[3] ^ k[3]; in aria_fe_xor() [all …]
|
D | bignum.c | 543 size_t i, j, k; in mbedtls_mpi_write_string() local 545 for (i = X->n, k = 0; i > 0; i--) { in mbedtls_mpi_write_string() 549 if (c == 0 && k == 0 && (i + j) != 2) { in mbedtls_mpi_write_string() 555 k = 1; in mbedtls_mpi_write_string() 1169 for (size_t k = 0; k < j; k++) { in mbedtls_mpi_mul_mpi() local 1172 (void) mbedtls_mpi_core_mla(X->p + k, i + 1, in mbedtls_mpi_mul_mpi() 1174 B->p[k]); in mbedtls_mpi_mul_mpi() 1344 size_t i, n, t, k; in mbedtls_mpi_div_mpi() local 1385 k = mbedtls_mpi_bitlen(&Y) % biL; in mbedtls_mpi_div_mpi() 1386 if (k < biL - 1) { in mbedtls_mpi_div_mpi() [all …]
|
D | ecdsa.c | 88 mbedtls_mpi k; /* per-signature random */ member 104 mbedtls_mpi_init(&ctx->k); in ecdsa_restart_sig_init() 118 mbedtls_mpi_free(&ctx->k); in ecdsa_restart_sig_free() 253 mbedtls_mpi k, e, t; in mbedtls_ecdsa_sign_restartable() local 254 mbedtls_mpi *pk = &k, *pr = r; in mbedtls_ecdsa_sign_restartable() 267 mbedtls_mpi_init(&k); mbedtls_mpi_init(&e); mbedtls_mpi_init(&t); in mbedtls_ecdsa_sign_restartable() 276 pk = &rs_ctx->sig->k; in mbedtls_ecdsa_sign_restartable() 369 mbedtls_mpi_free(&k); mbedtls_mpi_free(&e); mbedtls_mpi_free(&t); in mbedtls_ecdsa_sign_restartable()
|
D | ssl_ticket.c | 157 const unsigned char *k, size_t klength, in mbedtls_ssl_ticket_rotate() argument 188 if ((status = psa_import_key(&attributes, k, in mbedtls_ssl_ticket_rotate() 195 ret = mbedtls_cipher_setkey(&key->ctx, k, bitlen, MBEDTLS_ENCRYPT); in mbedtls_ssl_ticket_rotate()
|
D | pem.c | 72 size_t i, j, k; in pem_get_iv() local 89 k = ((i & 1) != 0) ? j : j << 4; in pem_get_iv() 91 iv[i >> 1] = (unsigned char) (iv[i >> 1] | k); in pem_get_iv()
|
D | camellia.c | 261 static void camellia_feistel(const uint32_t x[2], const uint32_t k[2], in camellia_feistel() 265 I0 = x[0] ^ k[0]; in camellia_feistel() 266 I1 = x[1] ^ k[1]; in camellia_feistel()
|
D | md5.c | 103 #define P(a, b, c, d, k, s, t) \ in mbedtls_internal_md5_process() argument 106 (a) += F((b), (c), (d)) + local.X[(k)] + (t); \ in mbedtls_internal_md5_process()
|
D | ripemd160.c | 119 #define P(a, b, c, d, e, r, s, f, k) \ in mbedtls_internal_ripemd160_process() argument 122 (a) += f((b), (c), (d)) + local.X[r] + (k); \ in mbedtls_internal_ripemd160_process()
|
/mbedtls-3.5.0/tests/src/ |
D | random.c | 120 uint32_t i, *k, sum, delta = 0x9E3779B9; in mbedtls_test_rnd_pseudo_rand() local 127 k = info->key; in mbedtls_test_rnd_pseudo_rand() 135 + info->v1) ^ (sum + k[sum & 3]); in mbedtls_test_rnd_pseudo_rand() 138 + info->v0) ^ (sum + k[(sum>>11) & 3]); in mbedtls_test_rnd_pseudo_rand()
|
/mbedtls-3.5.0/tests/data_files/ |
D | crl-rsa-pss-sha384.pem | 13 y9o/ghYF/shKU4mewK3DeM9gQiTcH5A4ISXR87hBQ08AKJRAG1CLvTyzqWiUUY+k
|
D | server2-v1.crt | 16 53k/U98FTvFkVisEDFzLXyKX0fAZxfMk4qnEoBflH4fEXfkuuaBUVdoGGIMRLNAW
|
D | cert_md5.crt | 14 AQEAF4QcMshVtVbYgvvU7f2lWakubbAISM/k+FW/f7u63m0MSSoSFeYflBOC1Wf4
|
D | rsa_pkcs8_pbes2_pbkdf2_1024_des_sha384.pem | 10 k+yChpETztRzdcJM5MRfhJOkDfU+8oD0QUHqi+0pEdqw6MPsFQewHQ801pZuWX5m
|
D | pkcs7-rsa-sha256-3.key | 5 EqBcpCtmwpRE4G+V61ff+Nv6gq0/lE7rkRWnUS7Tu5XLOGaFQlCf4QTdgHeua1+k
|
D | server2-v1-chain.crt | 16 53k/U98FTvFkVisEDFzLXyKX0fAZxfMk4qnEoBflH4fEXfkuuaBUVdoGGIMRLNAW
|
D | pkcs7-rsa-sha256-3.pem | 25 EqBcpCtmwpRE4G+V61ff+Nv6gq0/lE7rkRWnUS7Tu5XLOGaFQlCf4QTdgHeua1+k
|
D | rsa_pkcs8_pbes2_pbkdf2_4096_3des_sha224.pem | 9 5duWTxAVYPt01+k+rM8hO8oILZgwIqfTOB1/kf4HWpV/Zn/87jC8jqj6xlO7O9wm
|
D | rsa_pkcs8_pbes2_pbkdf2_4096_des.pem | 35 P+NuaMuEPB1B7ST69JZfe/puGPnqpj33cZYejxwkdmK4MnqCUfe77rac/bxllp/k
|
/mbedtls-3.5.0/include/mbedtls/ |
D | ssl_ticket.h | 165 const unsigned char *k, size_t klength,
|
/mbedtls-3.5.0/tests/scripts/ |
D | generate_test_code.py | 1036 snippets = {k.upper():v for (k, v) in snippets.items()}
|