/mbedtls-latest/scripts/data_files/ |
D | version_features.fmt | 2 * Version feature information 23 int mbedtls_version_check_feature(const char *feature) 31 if (feature == NULL) { 35 if (strncmp(feature, "MBEDTLS_", 8)) { 39 feature += 8; 42 if (!strcmp(*idx, feature)) {
|
D | query_config.fmt | 98 * Visual Studio throws the warning 4003 because many Mbed TLS feature macros
|
/mbedtls-latest/library/ |
D | version_features.c | 817 int mbedtls_version_check_feature(const char *feature) in mbedtls_version_check_feature() argument 825 if (feature == NULL) { in mbedtls_version_check_feature() 829 if (strncmp(feature, "MBEDTLS_", 8)) { in mbedtls_version_check_feature() 833 feature += 8; in mbedtls_version_check_feature() 836 if (!strcmp(*idx, feature)) { in mbedtls_version_check_feature()
|
D | padlock.c | 27 int mbedtls_padlock_has_support(int feature) in mbedtls_padlock_has_support() argument 51 return flags & feature; in mbedtls_padlock_has_support()
|
D | padlock.h | 63 int mbedtls_padlock_has_support(int feature);
|
/mbedtls-latest/tests/suites/ |
D | test_suite_version.function | 68 void check_feature(char *feature, int result) 70 int check = mbedtls_version_check_feature(feature);
|
/mbedtls-latest/ |
D | CONTRIBUTING.md | 24 …stedfirmware.org/mailman3/lists/mbed-tls.lists.trustedfirmware.org) around a feature idea or a bug. 26 1. Write a test which shows that the bug was fixed or that the feature works as expected. 28 1. For quick merging, the contribution should be short, and concentrated on a single feature or top… 35 …d, need to be justifiable by either being a significant enhancement, new feature or bug fix which … 49 1. If a contribution is a new feature or enhancement, no backporting is required. Exceptions to thi… 58 As mentioned, tests that show the correctness of the feature or bug fix should be added to the pull…
|
D | BRANCHES.md | 61 addition of a new feature. 83 are an experimental feature. We intend to maintain compatibility with the
|
D | ChangeLog | 20 support flexible array members (a C99 feature not adopted by C++). 124 (feature enabled by MBEDTLS_PSA_CRYPTO_SE_C). In a low memory condition, 202 feature may not be TLS 1.3 specific in the future. Fixes #6909. 347 This feature increases code size and memory usage. If buffers passed to 530 feature macros, MBEDTLS_MD_CAN_xxx, has been introduced that can be used 575 used to enable this feature. 620 CPU feature, which reduces code size and avoids the vulnerability of the 810 contributing this feature, and to Demi-Marie Obenour for contributing 852 be used to enable this feature. Run-time detection is supported 1220 This was intended as an experimental feature, but had not been explicitly [all …]
|
D | README.md | 332 * To report a bug or request a feature in Mbed TLS, please [file an issue on GitHub](https://github…
|
/mbedtls-latest/ChangeLog.d/ |
D | 00README.md | 16 on the extent of the change and how widely we expect the feature to be used. 81 consequences of the bug, not how the bug was fixed. For a new feature, explain 82 why one might be interested in the feature. For an API change or a deprecation,
|
/mbedtls-latest/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 52 …a series of symbols of the form `PSA_WANT_xxx` where `xxx` describes the feature that the symbol e… 65 * If the symbol is not defined, the corresponding feature is not included. 66 … is defined to a preprocessor expression with the value `1`, the corresponding feature is included. 71 The presence of a symbol `PSA_WANT_xxx` in the Mbed TLS configuration determines whether a feature … 79 …feature is not requested for inclusion in the PSA Crypto configuration file, it may still be inclu… 85 …KEY_PAIR` types (that is, private keys for asymmetric cryptography), the feature selection is more… 203 …he boolean symbol mechanism proposed here. The approximation considers a feature to be enabled if …
|
/mbedtls-latest/include/mbedtls/ |
D | version.h | 70 int mbedtls_version_check_feature(const char *feature);
|
/mbedtls-latest/.github/ |
D | pull_request_template.md | 9 …ck as appropriate and edit the reasons (e.g.: "backport: not needed because this is a new feature")
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 99 that the pointer is non-null. With the feature disabled, a null pointer is not 101 runtime crash. 90% of the uses of the feature are of this kind. 103 checks that the value is a valid one. With the feature disabled, an invalid 110 This feature was only used in some classic (non-PSA) cryptography modules. It was 114 This feature has been removed. The library no longer checks for NULL pointers; 642 version. There is no migration path since the feature is no longer relevant. 722 This feature had been broken for a while so we doubt anyone still used it. 869 users who didn't need that feature to avoid paying the cost in code size, by
|
D | driver-only-builds.md | 427 ChaChaPoly has no such feature, so it requires full acceleration (key type +
|
/mbedtls-latest/docs/architecture/ |
D | psa-crypto-implementation-structure.md | 125 …m is optional and can be selected by the application at build time. For each feature `PSA_ttt_xxx`: 127 * The feature is available to applications when the preprocessor symbol `PSA_WANT_ttt_xxx` is defin… 130 * For transparent keys (keys that are not in a secure element), the feature is implemented by Mbed…
|
D | psa-storage-resilience.md | 482 …elements (feature enabled with `MBEDTLS_PSA_CRYPTO_SE_C`). This is a deprecated feature that has n…
|
D | mbed-crypto-storage-specification.md | 129 This is unchanged since [the feature was introduced in Mbed Crypto 0.1.0](#nonvolatile-random-seed-…
|
/mbedtls-latest/docs/architecture/testing/ |
D | test-framework.md | 49 …h` record the outcome of each test case in a **test outcome file**. This feature is enabled if the…
|
D | invasive-testing.md | 180 …acing some modules; this is a secondary concern since we do not officially offer this as a feature. 302 …ut the keystore content before calling `mbedtls_psa_crypto_free()`. This feature is mostly but not…
|
/mbedtls-latest/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 5 …tions which only ever call PSA functions from a single thread are not affected by this new feature. 78 … which protect all PSA calls using a mutex, are not affected by this new feature. If an applicatio… 257 Although the `step` feature used in some tests is thread-safe, it may produce unexpected results fo… 357 …table API, and would likely increase the code size for a relatively rare feature. We are choosing …
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 27 I want to know which functions to call and which feature macros to check, 76 …feature is still experimental and is not ready for production since it is not completed.” We may w… 211 Generally speaking, just because some feature is not enabled in `mbedtls_config.h` or `psa_config.h…
|
D | strategy.md | 245 at feature parity with software-based builds.
|
/mbedtls-latest/programs/ |
D | README.md | 81 ### SSL/TLS feature demonstrators
|