/mbedtls-3.6.0/3rdparty/everest/library/ |
D | x25519.c | 66 uint8_t base[MBEDTLS_X25519_KEY_SIZE_BYTES] = {0}; in mbedtls_x25519_make_params() local 80 base[0] = 9; in mbedtls_x25519_make_params() 81 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_params() 83 base[0] = 0; in mbedtls_x25519_make_params() 84 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES) == 0 ) in mbedtls_x25519_make_params() 151 unsigned char base[MBEDTLS_X25519_KEY_SIZE_BYTES] = { 0 }; in mbedtls_x25519_make_public() local 164 base[0] = 9; in mbedtls_x25519_make_public() 165 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_public() 167 base[0] = 0; in mbedtls_x25519_make_public() 168 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES ) == 0 ) in mbedtls_x25519_make_public()
|
/mbedtls-3.6.0/tests/scripts/ |
D | run-test-suites.pl | 44 (my $base = $data_file) =~ s/\.datax$//; 45 push @suites, $base if -x $base; 46 push @suites, "$base.exe" if -e "$base.exe";
|
D | audit-validity-dates.py | 166 content_len = int(hex_str[2:4], base=16) 174 content_len = int(hex_str[consumed:consumed+length_len], base=16)
|
/mbedtls-3.6.0/scripts/mbedtls_dev/ |
D | crypto_knowledge.py | 480 def permitted_truncations(cls, base: str) -> FrozenSet[int]: 488 if base in cls.PERMITTED_TAG_LENGTHS: 489 return cls.PERMITTED_TAG_LENGTHS[base] 490 max_length = cls.MAC_LENGTH.get(base, None) 492 m = cls.HMAC_RE.match(base) 496 raise ValueError('Unknown permitted lengths for ' + base) 512 base = m.group('base') 514 permitted_lengths = self.permitted_truncations(base)
|
D | bignum_mod_raw.py | 141 base = super().description() 143 return base.replace('mod', mod_with_rep, 1)
|
/mbedtls-3.6.0/programs/ssl/ |
D | ssl_mail_client.c | 325 unsigned char base[1024]; in main() local 330 unsigned char buf[sizeof(base) + 2]; in main() 690 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_name, in main() 697 len = sprintf((char *) buf, "%s\r\n", base); in main() 709 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_pwd, in main() 716 len = sprintf((char *) buf, "%s\r\n", base); in main()
|
/mbedtls-3.6.0/tests/suites/ |
D | test_suite_bignum_mod.misc.data | 19 mpi_mod_sub base case for negative testing (N, a, b all >= 1 limb) 40 mbedtls_mpi_mod_inv non-Mont. form - base case for negative testing (N, A, A^-1) 52 mbedtls_mpi_mod_inv 32-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-… 68 mbedtls_mpi_mod_inv 64-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-… 84 mpi_mod_add base case for negative testing (N, a, b all >= 1 limb)
|
D | test_suite_entropy.data | 16 Entropy write/update seed file: base NV seed file
|
D | test_suite_bignum.misc.data | 70 Test mpi_read_write_string #9 (Empty MPI hex -> base 2) 79 Test mpi_read_write_string #9 (Empty MPI dec -> base 2) 868 Base test mbedtls_mpi_sub_mpi #3 (Test with negative base) 1311 Base test mbedtls_mpi_exp_mod #4 (Negative base) 1317 Base test mbedtls_mpi_exp_mod #6 (Negative base + exponent) 1384 Test mbedtls_mpi_exp_mod (Negative base) [#1] 1387 Test mbedtls_mpi_exp_mod (Negative base) [#2]
|
D | test_suite_ecp.function | 161 * important to test both base point and random point, though, as memory 171 * - Cold base point mult: ~3300M 172 * - Hot base point mult: ~1100M 218 /* Non-base point case */
|
D | test_suite_entropy.function | 89 * NV seed read/write helpers that fill the base seedfile
|
D | test_suite_bignum_random.function | 62 /* Test whether bytes represents (in big-endian base 256) a number b that
|
D | test_suite_psa_crypto.data | 894 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg 898 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base) 902 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different algorithm) 1006 PSA key policy: AEAD, min-length policy, unmatched base alg
|
/mbedtls-3.6.0/scripts/ |
D | ci.requirements.txt | 10 # Use the earliest version of mypy that works with our code base.
|
/mbedtls-3.6.0/docs/architecture/psa-migration/ |
D | outcome-analysis.sh | 54 git checkout $(git merge-base HEAD development)
|
D | strategy.md | 101 `ENTROPY_C`. This requires going through the PSA code base to adjust
|
/mbedtls-3.6.0/ChangeLog.d/ |
D | 00README.md | 22 * Changes to parts of the code base that users don't interact with directly,
|
/mbedtls-3.6.0/tests/ |
D | CMakeLists.txt | 19 # Get base names for generated files
|
/mbedtls-3.6.0/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 112 …he base mechanism is supported. Parameters must themselves be included through their own `PSA_WANT…
|
/mbedtls-3.6.0/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 35 Test cases should normally not be removed from the code base: if something has worked before, it sh…
|
/mbedtls-3.6.0/3rdparty/p256-m/p256-m/ |
D | README.md | 373 - curve constants: b from the equation, the base point's coordinates; 479 gx, gy (coordinates of the base point) are hard-coded. For another curve,
|
/mbedtls-3.6.0/docs/architecture/ |
D | psa-thread-safety.md | 14 As a consequence, we must not add a new platform requirement beyond mutexes for the base case. It w…
|
D | tls13-support.md | 339 split them to ease their search in the code base.
|
D | psa-storage-resilience.md | 482 Note that the code base already references a “transaction file” (`PSA_CRYPTO_ITS_TRANSACTION_UID` =…
|
/mbedtls-3.6.0/ |
D | ChangeLog | 973 by 2, and mbedtls_mpi_write_string() in base 2). 1804 * In PSA, allow using a key declared with a base key agreement algorithm 1995 enclave) could bypass an existing counter-measure (base blinding) and 3223 * Add the order of the base point as N in the mbedtls_ecp_group structure 3648 * Fix incorrect sign computation in modular exponentiation when the base is 5201 * Added base Galois Counter Mode (GCM) for AES 5242 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket 5308 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket 5581 * Added const correctness for main code base
|