Home
last modified time | relevance | path

Searched refs:base (Results 1 – 25 of 27) sorted by relevance

12

/mbedtls-3.6.0/3rdparty/everest/library/
Dx25519.c66 uint8_t base[MBEDTLS_X25519_KEY_SIZE_BYTES] = {0}; in mbedtls_x25519_make_params() local
80 base[0] = 9; in mbedtls_x25519_make_params()
81 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_params()
83 base[0] = 0; in mbedtls_x25519_make_params()
84 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES) == 0 ) in mbedtls_x25519_make_params()
151 unsigned char base[MBEDTLS_X25519_KEY_SIZE_BYTES] = { 0 }; in mbedtls_x25519_make_public() local
164 base[0] = 9; in mbedtls_x25519_make_public()
165 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_public()
167 base[0] = 0; in mbedtls_x25519_make_public()
168 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES ) == 0 ) in mbedtls_x25519_make_public()
/mbedtls-3.6.0/tests/scripts/
Drun-test-suites.pl44 (my $base = $data_file) =~ s/\.datax$//;
45 push @suites, $base if -x $base;
46 push @suites, "$base.exe" if -e "$base.exe";
Daudit-validity-dates.py166 content_len = int(hex_str[2:4], base=16)
174 content_len = int(hex_str[consumed:consumed+length_len], base=16)
/mbedtls-3.6.0/scripts/mbedtls_dev/
Dcrypto_knowledge.py480 def permitted_truncations(cls, base: str) -> FrozenSet[int]:
488 if base in cls.PERMITTED_TAG_LENGTHS:
489 return cls.PERMITTED_TAG_LENGTHS[base]
490 max_length = cls.MAC_LENGTH.get(base, None)
492 m = cls.HMAC_RE.match(base)
496 raise ValueError('Unknown permitted lengths for ' + base)
512 base = m.group('base')
514 permitted_lengths = self.permitted_truncations(base)
Dbignum_mod_raw.py141 base = super().description()
143 return base.replace('mod', mod_with_rep, 1)
/mbedtls-3.6.0/programs/ssl/
Dssl_mail_client.c325 unsigned char base[1024]; in main() local
330 unsigned char buf[sizeof(base) + 2]; in main()
690 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_name, in main()
697 len = sprintf((char *) buf, "%s\r\n", base); in main()
709 ret = mbedtls_base64_encode(base, sizeof(base), &n, (const unsigned char *) opt.user_pwd, in main()
716 len = sprintf((char *) buf, "%s\r\n", base); in main()
/mbedtls-3.6.0/tests/suites/
Dtest_suite_bignum_mod.misc.data19 mpi_mod_sub base case for negative testing (N, a, b all >= 1 limb)
40 mbedtls_mpi_mod_inv non-Mont. form - base case for negative testing (N, A, A^-1)
52 mbedtls_mpi_mod_inv 32-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-…
68 mbedtls_mpi_mod_inv 64-bit Mont. form - base case for negative testing, A = 1 (N, mont(A), mont(A^-…
84 mpi_mod_add base case for negative testing (N, a, b all >= 1 limb)
Dtest_suite_entropy.data16 Entropy write/update seed file: base NV seed file
Dtest_suite_bignum.misc.data70 Test mpi_read_write_string #9 (Empty MPI hex -> base 2)
79 Test mpi_read_write_string #9 (Empty MPI dec -> base 2)
868 Base test mbedtls_mpi_sub_mpi #3 (Test with negative base)
1311 Base test mbedtls_mpi_exp_mod #4 (Negative base)
1317 Base test mbedtls_mpi_exp_mod #6 (Negative base + exponent)
1384 Test mbedtls_mpi_exp_mod (Negative base) [#1]
1387 Test mbedtls_mpi_exp_mod (Negative base) [#2]
Dtest_suite_ecp.function161 * important to test both base point and random point, though, as memory
171 * - Cold base point mult: ~3300M
172 * - Hot base point mult: ~1100M
218 /* Non-base point case */
Dtest_suite_entropy.function89 * NV seed read/write helpers that fill the base seedfile
Dtest_suite_bignum_random.function62 /* Test whether bytes represents (in big-endian base 256) a number b that
Dtest_suite_psa_crypto.data894 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg
898 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base)
902 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different algorithm)
1006 PSA key policy: AEAD, min-length policy, unmatched base alg
/mbedtls-3.6.0/scripts/
Dci.requirements.txt10 # Use the earliest version of mypy that works with our code base.
/mbedtls-3.6.0/docs/architecture/psa-migration/
Doutcome-analysis.sh54 git checkout $(git merge-base HEAD development)
Dstrategy.md101 `ENTROPY_C`. This requires going through the PSA code base to adjust
/mbedtls-3.6.0/ChangeLog.d/
D00README.md22 * Changes to parts of the code base that users don't interact with directly,
/mbedtls-3.6.0/tests/
DCMakeLists.txt19 # Get base names for generated files
/mbedtls-3.6.0/docs/proposed/
Dpsa-conditional-inclusion-c.md112 …he base mechanism is supported. Parameters must themselves be included through their own `PSA_WANT…
/mbedtls-3.6.0/docs/architecture/testing/
Dpsa-storage-format-testing.md35 Test cases should normally not be removed from the code base: if something has worked before, it sh…
/mbedtls-3.6.0/3rdparty/p256-m/p256-m/
DREADME.md373 - curve constants: b from the equation, the base point's coordinates;
479 gx, gy (coordinates of the base point) are hard-coded. For another curve,
/mbedtls-3.6.0/docs/architecture/
Dpsa-thread-safety.md14 As a consequence, we must not add a new platform requirement beyond mutexes for the base case. It w…
Dtls13-support.md339 split them to ease their search in the code base.
Dpsa-storage-resilience.md482 Note that the code base already references a “transaction file” (`PSA_CRYPTO_ITS_TRANSACTION_UID` =…
/mbedtls-3.6.0/
DChangeLog973 by 2, and mbedtls_mpi_write_string() in base 2).
1804 * In PSA, allow using a key declared with a base key agreement algorithm
1995 enclave) could bypass an existing counter-measure (base blinding) and
3223 * Add the order of the base point as N in the mbedtls_ecp_group structure
3648 * Fix incorrect sign computation in modular exponentiation when the base is
5201 * Added base Galois Counter Mode (GCM) for AES
5242 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
5308 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
5581 * Added const correctness for main code base

12