Home
last modified time | relevance | path

Searched refs:order (Results 1 – 25 of 39) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_ecp.data61 ECP check pubkey Curve25519 low-order point #1
66 ECP check pubkey Curve25519 low-order point #2
71 ECP check pubkey Curve25519 low-order point #3 (let's call this u)
76 ECP check pubkey Curve25519 low-order point #4 (let's call this v)
81 ECP check pubkey Curve25519 low-order point #5 p-1
86 ECP check pubkey Curve25519 low-order point #6 p
91 ECP check pubkey Curve25519 low-order point #7 p+1
96 ECP check pubkey Curve25519 low-order point #8 p+u
101 ECP check pubkey Curve25519 low-order point #9 p+v
106 ECP check pubkey Curve25519 low-order point #10 2p-1
[all …]
Dtest_suite_asn1write.data250 ASN.1 Write / Read Length #6 (Len = 258, byte order)
259 ASN.1 Write / Read Length #9 (Len = 66051, byte order)
268 ASN.1 Write / Read Length #12 (Len = 16909060, byte order)
Dtest_suite_chacha20.function55 * in order to test that starts() does the right thing. */
Dtest_suite_poly1305.function46 /* Don't free/init the context, in order to test that starts() does the
Dtest_suite_pem.data64 # with AES-128-CBC in order to test padding validation.
Dtest_suite_psa_crypto_slot_management.function875 * key in creation order (e.g. 0 means the first key that was created).
876 * It can also be a negative value to count in reverse order (e.g.
/mbedtls-latest/library/
Drsa_alt_helpers.c59 uint16_t order; /* Order of 2 in DE - 1 */ in mbedtls_rsa_deduce_primes() local
98 if ((order = (uint16_t) mbedtls_mpi_lsb(&T)) == 0) { in mbedtls_rsa_deduce_primes()
104 MBEDTLS_MPI_CHK(mbedtls_mpi_shift_r(&T, order)); in mbedtls_rsa_deduce_primes()
131 for (iter = 1; iter <= order; ++iter) { in mbedtls_rsa_deduce_primes()
/mbedtls-latest/docs/proposed/
Dpsa-driver-wrappers-codegen-migration-guide.md32 …nd a driverlist.json which specifies the drivers to be considered and the order in which they want…
40 …The order in which the drivers are passed is also essential if/when there are multiple transparent…
/mbedtls-latest/
DREADME.md43 …edcrypto. As a result, some linkers will expect flags to be in a specific order, for example the G…
89 We intentionally only use a minimum of functionality in the makefiles in order to keep them as simp…
91 In order to build from the source code using GNU Make, just enter at the command line:
95 In order to run the tests, enter:
107 In order to build for a Windows platform, you should use `WINDOWS_BUILD=1` if the target is Windows…
119 In order to build the source using CMake in a separate directory (recommended), just enter at the c…
125 In order to run the tests, enter:
173 prevent `git status` from showing them as modified). In order to do so, from
286 …ng alternative implementations at build time or run time, for example, in order to take advantage …
DChangeLog434 individually enabled in order to enable respective support; also the
535 MBEDTLS_ECDH_C in the build in order to save code size. For TLS 1.2
573 * Add support to restrict AES to 128-bit keys in order to save code size.
585 or DH) were introduced in order to have finer accuracy in defining the
782 * The default priority order of TLS 1.3 cipher suites has been modified to
840 MBEDTLS_ECDSA_C in the build in order to save code size. For PK, X.509
855 MBEDTLS_ECJPAKE_C in the build in order to save code size. For the
1314 by side in order to illustrate how the operation is performed in PSA.
1410 * Fix order value of curve x448.
1810 by default. The default order in TLS now favors faster curves over larger
[all …]
DCMakeLists.txt14 # CMake in order to avoid target name clashes, via the use of
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md9 Its design is guided by the following goals in this order:
96 be defined by the user at compile-time to take advantage of it in order to
311 code that p256-m uses in order to minimize code size.
471 - The number of limbs is again hard-coded to 8. See above, but it order to
498 - This layer assumes that the bit size of the curve's order n is the same as
503 - The bit size of the curve's order is hard-coded in `scalar_mult()`. For
506 significant bit of the curve's order n is set in order to avoid a special
/mbedtls-latest/docs/architecture/psa-migration/
Dtesting.md35 in order to create PK contexts that can then be passed to existing TLS and
99 whether to use the PSA or legacy code paths, specific tests might be in order.
Dstrategy.md336 Note that in order to achieve that goal, even for code that obeys
379 We're currently taking advantage of the existing PK layer in order
/mbedtls-latest/tests/git-scripts/
DREADME.md7 …m `<Mbed TLS root>/.git/hooks` to `<Mbed TLS root>/tests/git-scripts`, in order to make the hook s…
/mbedtls-latest/docs/
D3.0-migration-guide.md6 need to change their own code in order to make it work with Mbed TLS 3.0.
475 in order to match the new signature.
621 If you used to rely on this module in order to store your private keys
662 and relied on that version in order to communicate with peers that are not up
749 … default preference order for curves in TLS now favors resource usage (performance and memory cons…
751 If you prefer a different order, call `mbedtls_ssl_conf_curves()` when configuring a TLS connection.
1007 change the preferred order of ciphersuites on the server to those used on the client,
1010 the server order of suites.
Ddriver-only-builds.md17 In order to have some mechanism provided only by a driver, you'll want
215 automatically be included in the build in order to support it. Therefore
240 In order for a build to be driver-only (no built-in implementation), all the
428 algorithm) in order to work with a driver.
Duse-psa-crypto.md82 using the new API in order to get the benefits; it can then pass the
/mbedtls-latest/docs/architecture/
Dmbed-crypto-storage-specification.md51 All integers are encoded in little-endian order in 8-bit bytes.
201 All integers are encoded in little-endian order in 8-bit bytes.
260 All integers are encoded in little-endian order in 8-bit bytes except where otherwise indicated.
319 All integers are encoded in little-endian order in 8-bit bytes except where otherwise indicated.
410 All integers are encoded in little-endian order in 8-bit bytes except where otherwise indicated.
Dtls13-support.md225 - the macros to write in memory in big-endian order a multi-byte integer
227 - the macros to read from memory a multi-byte integer in big-endian order
236 reduce the risk of writing or reading bytes in the wrong order.
Dpsa-storage-resilience.md77 …wever possible to revert this commitment by giving the secure element the order to destroy the key…
283 In order to limit the possibilities, we need to make some assumptions about the recovery step. For …
305 …the key file. This is because the core needs to know the driver key id in order to access the secu…
318 The invariant imposes constraints on the [order of operations for the two-phase commit](#overview-o…
367 In order to conveniently support multiple transactions at the same time, we pick the simplest possi…
431 …ded in a key slot in memory: the core needs to know the key's location in order to determine wheth…
451 The transaction list file can be processed in any order.
Dpsa-shared-memory.md126 …he implementation carefully accesses non-overlapping buffer parameters in order to prevent any sec…
481 In order to ensure that the careful-access validation works, it is necessary to write tests to chec…
527 In order to keep track of allocated copies on the heap, we can create new structs:
570 In order to abstract the management of the copy state further, to make it simpler to add, we create…
640 In order to implement transparent memory poisoning we require a wrapper around all PSA function cal…
668 Poisoning code is added to these test wrappers where relevant in order to pre-poison and post-unpoi…
Dpsa-keystore-design.md163 …e freshly obtained from `calloc` has all of its slots in the free list in order. The value 1 indic…
214 …ot eviction code picks the first evictable slot it finds in its traversal order. We have not reaso…
/mbedtls-latest/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md55 …consistent with the same set of calls being executed sequentially in some order, provided that the…
235 …atisfying) set of concurrent calls are performed as if they were executed in some sequential order.
237 …t, the set of calls is equivalent to sequentially performing the calls in order of when their line…
257 …` or `mbedtls_test_increment_step` calls within threads can happen in any order, thus may not prod…
267 …h category calling the same internal key management functions in the same order - it is the intern…
/mbedtls-latest/include/mbedtls/
Dssl.h4471 void mbedtls_ssl_conf_preference_order(mbedtls_ssl_config *conf, int order);

12