Home
last modified time | relevance | path

Searched refs:one (Results 1 – 25 of 86) sorted by relevance

1234

/mbedtls-latest/tests/suites/
Dtest_suite_ecjpake.data10 ECJPAKE round one: client, valid
13 ECJPAKE round one: server, valid
16 ECJPAKE round one: role mismatch
19 ECJPAKE round one: trailing byte
22 ECJPAKE round one: KKP1: no data
25 ECJPAKE round one: KKP1: length of first point too small
28 ECJPAKE round one: KKP1: length of first point too big
31 ECJPAKE round one: KKP1: no point data
34 ECJPAKE round one: KKP1: first point is zero
37 ECJPAKE round one: KKP1: unknown first point format
[all …]
Dtest_suite_pkcs7.data173 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
197 PKCS7 Parse Failure Invalid ASN1: Change contents of tag a0 to contain one unaccounted extra byte #…
213 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
241 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 31 to contain one unaccounted extra byte #…
257 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
293 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
321 PKCS7 Parse Failure Invalid ASN1: Change contents of tag a0 to contain one unaccounted extra byte #…
337 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
353 PKCS7 Parse Failure Invalid ASN1: Change contents of tag 30 to contain one unaccounted extra byte #…
369 PKCS7 Parse Failure Invalid ASN1: Change contents of tag a0 to contain one unaccounted extra byte #…
[all …]
Dtest_suite_cipher.padding.data140 Check one and zeros padding #1 (correct)
144 Check one and zeros padding #2 (correct)
148 Check one and zeros padding #3 (correct)
152 Check one and zeros padding #4 (correct)
156 Check one and zeros padding #5 (correct)
160 Check one and zeros padding #6 (missing one)
164 Check one and zeros padding #7 (overlong)
168 Check one and zeros padding #8 (last byte 0x80 | x)
Dtest_suite_psa_crypto_init.data47 Fake entropy: one block eventually
51 Fake entropy: one block in two steps
55 Fake entropy: more than one block in two steps
65 NV seed only: less than one block
Dtest_suite_cipher.des.data73 DES Encrypt and decrypt 0 bytes with one and zeros padding
77 DES Encrypt and decrypt 1 byte with one and zeros padding
81 DES Encrypt and decrypt 2 bytes with one and zeros padding
85 DES Encrypt and decrypt 7 bytes with one and zeros padding
89 DES Encrypt and decrypt 8 bytes with one and zeros padding
93 DES Encrypt and decrypt 9 bytes with one and zeros padding
97 DES Encrypt and decrypt 15 bytes with one and zeros padding
101 DES Encrypt and decrypt 16 bytes with one and zeros padding
105 DES Encrypt and decrypt 17 bytes with one and zeros padding
109 DES Encrypt and decrypt 31 bytes with one and zeros padding
[all …]
Dtest_suite_cipher.camellia.data69 CAMELLIA Encrypt and decrypt 0 bytes with one and zeros padding
73 CAMELLIA Encrypt and decrypt 1 byte with one and zeros padding
77 CAMELLIA Encrypt and decrypt 2 bytes with one and zeros padding
81 CAMELLIA Encrypt and decrypt 7 bytes with one and zeros padding
85 CAMELLIA Encrypt and decrypt 8 bytes with one and zeros padding
89 CAMELLIA Encrypt and decrypt 9 bytes with one and zeros padding
93 CAMELLIA Encrypt and decrypt 15 bytes with one and zeros padding
97 CAMELLIA Encrypt and decrypt 16 bytes with one and zeros padding
101 CAMELLIA Encrypt and decrypt 17 bytes with one and zeros padding
105 CAMELLIA Encrypt and decrypt 31 bytes with one and zeros padding
[all …]
Dtest_suite_pkwrite.function90 /* Windows' line ending is different from the Linux's one ("\r\n" vs "\n").
134 /* Turn the key PK context into an opaque one.
221 /* Turn the priv_key PK context into an opaque one. */
Dtest_suite_bignum_random.function270 * that iterations is large enough that a one-in-2^iterations chance
294 * to be small enough that the probability of missing one value is
350 /* Assert that each bit has been set in at least one result and
351 * clear in at least one result. Provided that iterations is not
/mbedtls-latest/docs/architecture/testing/
Ddriver-interface-test-strategy.md19 …include/psa/crypto_se_driver.h). This is an interface between Mbed TLS and one or more third-party…
21 The SE interface consists of one function provided by Mbed TLS (`psa_register_se_driver`) and many …
34 * Make at least one failing call to `psa_register_se_driver` followed by a successful call.
35 * Make at least one test that successfully registers the maximum number of drivers and fails to reg…
41 * Make at least one test with a key in a secure element that checks that the driver method is calle…
42 * Make at least one test with a key that is not in a secure element that checks that the driver met…
43 * Make at least one test with a key in a secure element with a driver that does not have the requis…
44 * Make at least one test with a key in a secure element with a driver that does not have the substr…
45 * At least one test should register multiple drivers with a key in each driver and check that the e…
46 * At least one test should register the same driver structure with multiple lifetime values and che…
[all …]
/mbedtls-latest/library/
Decjpake.c549 mbedtls_mpi one; in ecjpake_ecp_add3() local
551 mbedtls_mpi_init(&one); in ecjpake_ecp_add3()
553 MBEDTLS_MPI_CHK(mbedtls_mpi_lset(&one, 1)); in ecjpake_ecp_add3()
554 MBEDTLS_MPI_CHK(mbedtls_ecp_muladd(grp, R, &one, A, &one, B)); in ecjpake_ecp_add3()
555 MBEDTLS_MPI_CHK(mbedtls_ecp_muladd(grp, R, &one, R, &one, C)); in ecjpake_ecp_add3()
558 mbedtls_mpi_free(&one); in ecjpake_ecp_add3()
732 mbedtls_mpi m_xm2_s, one; in mbedtls_ecjpake_derive_k() local
735 mbedtls_mpi_init(&one); in mbedtls_ecjpake_derive_k()
737 MBEDTLS_MPI_CHK(mbedtls_mpi_lset(&one, 1)); in mbedtls_ecjpake_derive_k()
747 &one, &ctx->Xp, in mbedtls_ecjpake_derive_k()
[all …]
Dnet_sockets.c375 int one = 1; in mbedtls_net_accept() local
390 (const char *) &one, sizeof(one)) != 0) { in mbedtls_net_accept()
/mbedtls-latest/configs/
DREADME.txt7 These files are complete replacements for the default mbedtls_config.h. To use one of
8 them, you can pick one of the following methods:
10 1. Replace the default file include/mbedtls/mbedtls_config.h with the chosen one.
/mbedtls-latest/programs/
DREADME.md65 …ls_client.c): a simple DTLS client program, which sends one datagram to the server and reads one d…
67 …server.c): a simple DTLS server program, which expects one datagram from the client and writes one
73 * [`ssl/ssl_fork_server.c`](ssl/ssl_fork_server.c): a simple HTTPS server using one process per cli…
77 * [`ssl/ssl_pthread_server.c`](ssl/ssl_pthread_server.c): a simple HTTPS server using one thread pe…
/mbedtls-latest/docs/
Dpsa-driver-example-and-guide.md16one step (one function call), such as verifying a signature, are called *Single-Part Operations*. …
55 **2. Include the following in one of the driver header files:**
80 If one has not been provided then write one. Its name should begin with the driver prefix, followed…
92 …unction which can dispatch to two transparent drivers `Foo` and `Bar`, and one opaque driver `Baz`.
D3.0-migration-guide.md103 checks that the value is a valid one. With the feature disabled, an invalid
104 value causes a silent default to one of the valid values.
236 Applications using one-shot GCM or using GCM via the `mbedtls_cipher_xxx` or `psa_aead_xxx` interfa…
266 This makes no difference to a vast majority of applications. If your code takes a pointer to one of…
477 ### The RNG parameter is now mandatory for all functions that accept one
495 `f_rng` argument but must allow users to pass one anyway.
644 As a consequence of currently supporting only one version of (D)TLS (and in the
649 As a consequence of currently supporting only one version of (D)TLS (and in the
663 to date. If one of your peers is in that case, please try contacting them and
736 settings, i.e. enabled at least one of the options.
[all …]
/mbedtls-latest/docs/architecture/psa-migration/
Dtesting.md11 There needs to be at least one build in `all.sh` that enables
14 `MBEDTLS_USE_PSA_CRYPTO`. There needs to be at least one build with
53 new API to be used, and one or more tests in `ssl-opt.sh` using that.
Dpsa-legacy-bridges.md37 There is functionality that is tied to one API and is not directly available in the other API:
45 …itself will have taken more than 6 years to transition.) Projects that use one or more library in …
55 …y crypto APIs are trivial (ciphertexts, hashes, MACs, shared secrets). The one exception is ECDSA …
86 Mbed TLS needs these conversions because it has many functions that expose one API (legacy/API) but…
125 …n EC-JPAKE, but this happens internally: the EC-JPAKE interface only needs one piece of metadata, …
127 … types, and PSA keys have a policy that (for the most part) limits them to one algorithm, there do…
251 …e nature, there is no way to distinguish a key intended for PKCS#1v1.5 and one intended for PKCS#1…
256 …annot be fully deduced from the `mbedtls_pk_context` object. Just choosing one algorithm is proble…
282 …* It is an error if `usage` has more than one flag set, or has a usage that is incompatible with t…
314 …at consumes the key. For RSA keys, the PSA primary algorithm policy is how one conveys the same in…
Dstrategy.md61 two versions of some parts of the code: one using PSA, the other using the
107 to have one version using it, for entropy-less builds, and one version using
182 - Upside: changes mostly contained in one place, TLS/X.509 code only needs to
191 one-shot function `mbedtls_md()`.
193 There are two variants of this strategy: one where using the new setup
195 supporting both G1 and G2 in that area), and one without isolation (the key is
210 "opt-in" strategy can apply, and can complement each other, as one provides
325 Code that obeys `MBEDTLS_USE_PSA_CRYPTO` will want to use one of the two
Dpsa-limitations.md81 the one that requires the most work, but it would deliver value beyond PSA
198 When signing, the salt length picked by PSA is the one required by TLS 1.3
201 When verifying signatures, PSA will by default enforce the salt len is the one
222 server9-badsign.crt (one bit flipped in the signature)
328 4. Request an extension to the PSA Crypto API and use one of the above options
/mbedtls-latest/docs/architecture/
Dpsa-keystore-design.md16 … of a collection of **key slots**. Each key slot contains the metadata for one key, as well as the…
75 In the future, we may reduce the number of key store variants to just two, perhaps even one.
106 To create a key, `psa_reserve_free_key_slot()` searches the key slot array until it finds one that …
153 …ponentially increasing length: each slice is twice as long as the previous one. Thus if the length…
163 …f its slots in the free list in order. The value 1 indicates that there is one element between thi…
181 …ns and deallocations if there are slices full of long-lived keys, and then one slice keeps being a…
183 Note that currently, the slice array contains one sequence of allocated slices followed by one sequ…
Dtls13-support.md149 one of the key exchange protocol allowed by the TLS 1.3 specification, the
150 parsing and validation of x509 certificates and at least one signature
158 mode requires at least one of the key exchange protocol allowed by the
212 Those idioms should lower the risk of mis-using one of the address in place
213 of another one which could potentially lead to some nasty issues.
309 lines in the same commit: it makes the review harder. Make one commit with
Dpsa-shared-memory.md21 More precisely, we consider such a system where our PSA Crypto implementation is running inside one
86 … to take into account? Although this extends the possible behaviors of the one-shot interface, the…
142 …ed TLS: almost all API functions have multiple underlying implementations, one for each algorithm.…
157one with a size limit that is known at compile time, and small enough that copying the data is not…
170 …tted data, and for all specified algorithms, it is natural to process the input one byte at a time.
190 * when encrypting with an encrypt-and-authenticate or authenticate-then-encrypt structure (one read…
191 * when decrypting with an encrypt-then-authenticate structure (one read to decrypt and one read to …
192 * with SIV modes (not yet present in the PSA API, but likely to come one day) (one full pass to cal…
256 * Any test hooks need only be added in one place.
257 * Copying code must only be reviewed for correctness in one place, rather than in all functions whe…
[all …]
/mbedtls-latest/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md57 > * There is no overlap between an output parameter of one call and an input or output parameter of…
70 > * If one call returns `PSA_ERROR_ALREADY_EXISTS`, then the other call must succeed.
71 > * If one of the calls succeeds, then the other must fail: either with `PSA_ERROR_ALREADY_EXISTS` …
119one thread returns from creating/loading a key via a key management API call the key can be used b…
164 * `PSA_SLOT_FILLING`: one thread is currently loading or creating material to fill the slot, this t…
166 …within the slot has been destroyed or marked for destruction, but at least one thread is still reg…
176 …`expected_state` to `new_state`, when `new_state` is not `PSA_SLOT_EMPTY`, one must call `psa_key_…
206 …stent keys loaded which do not have any readers, if there are it will kick one such key out of the…
221 * They call one of the `psa_get_and_lock_key_slot_X` functions, which then finds the key and regist…
231 …he slot's registered reader counter is equal to 1. This implements a "last one out closes the door…
[all …]
/mbedtls-latest/programs/fuzz/
DREADME.md26 To run the fuzz targets without oss-fuzz, you first need to install one libFuzzingEngine (libFuzzer…
51 * Run them one against the other with `reproducible` option turned on while capturing traffic into …
/mbedtls-latest/ChangeLog.d/
D00README.md30 changelog entry, but not for deciding whether to write one.
82 why one might be interested in the feature. For an API change or a deprecation,

1234