Searched refs:steps (Results 1 – 20 of 20) sorted by relevance
/mbedtls-latest/tests/suites/ |
D | test_suite_mps.data | 13 MPS Reader: Multiple steps, single round, pausing disabled 16 MPS Reader: Multiple steps, single round, pausing enabled but unused 19 MPS Reader: Multiple steps, multiple rounds, pausing disabled 22 MPS Reader: Multiple steps, multiple rounds, pausing enabled but unused
|
D | test_suite_psa_crypto_init.data | 51 Fake entropy: one block in two steps 55 Fake entropy: more than one block in two steps
|
D | test_suite_aes.function | 176 // encrypt in multiple steps of varying size 193 // finally, validate that multiple steps produced same result as single-pass
|
D | test_suite_pem.data | 65 # Since PBKDF1 isn't supported in OpenSSL, here's the steps:
|
D | test_suite_psa_crypto.function | 8820 psa_key_derivation_step_t steps[] = { step_arg1, step_arg2, step_arg3 }; 8844 for (i = 0; i < ARRAY_LENGTH(steps); i++) { 8846 if (steps[i] == 0) { 8855 steps[i] == PSA_KEY_DERIVATION_INPUT_SECRET) { 8862 TEST_EQUAL(psa_key_derivation_input_key(&operation, steps[i], 8869 &operation, steps[i], 8874 &operation, steps[i], 9022 psa_key_derivation_step_t steps[] = { step1_arg, step2_arg, step3_arg, step4_arg }; 9063 for (i = 0; i < ARRAY_LENGTH(steps); i++) { 9064 switch (steps[i]) { [all …]
|
D | test_suite_ssl.data | 22 Callback buffer test: Filling up the buffer in two steps 25 Callback buffer test: Reading out the buffer in two steps
|
/mbedtls-latest/ |
D | BUGS.md | 7 If you think you've found a bug in Mbed TLS, please follow these steps:
|
D | LICENSE | 253 We protect your rights with two steps: (1) copyright the software, and
|
D | ChangeLog | 3131 steps you have to take when enabling it.
|
/mbedtls-latest/programs/fuzz/ |
D | README.md | 49 To generate corpus for these targets, you can do the following, not fully automated steps :
|
/mbedtls-latest/docs/ |
D | psa-driver-example-and-guide.md | 16 …-Part Operations*. On the other hand, operations that consist of multiple steps implemented by dif… 50 …ere the developer manually edits the driver dispatch layer. The following steps describe this proc… 149 (You need extra steps if you want to disable the built-in implementation of ECC algorithms, which i…
|
D | driver-only-builds.md | 337 to the `PSA_WANT_KEY_TYPE_xxx` and `PSA_WANT_ALG_yyy` of the previous steps.
|
D | 3.0-migration-guide.md | 3 This guide details the steps required to migrate from Mbed TLS version 2.x to 26 upgrade steps required will be explained later in this guide.
|
D | psa-transition.md | 1136 * `psa_key_attributes_t attributes`: key attributes used in steps 2–3;;
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | strategy.md | 247 We can roughly divide the work needed to get there in the following steps: 260 Note: the first two steps enable use of drivers, but not by themselves removal 300 linked issues for a summary of intermediate steps and open points. 341 the right places (once the previous steps are done).
|
/mbedtls-latest/library/ |
D | x509_crt.c | 2758 int steps = 4; in x509_inet_pton_ipv6() local 2761 steps--; in x509_inet_pton_ipv6() 2762 } while (*p != ':' && steps > 0); in x509_inet_pton_ipv6()
|
/mbedtls-latest/docs/architecture/ |
D | psa-storage-resilience.md | 63 …steps 1 and 2, the key does not exist yet. This is fine from an application's perspective since th… 262 Non-atomic processes consist of a series of atomic, committing steps. 274 If, for example, recovery consists of two atomic steps, the tree of possibilities expands and may b…
|
D | psa-crypto-implementation-structure.md | 174 * For key derivation algorithms: variation on the sequence of input steps, variation on the output …
|
/mbedtls-latest/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 47 …ing in our implementation, every API call completes in a finite number of steps regardless of the … 247 …e final unlock of the mutex within `psa_get_and_lock_key_slot`. All other steps have no non resour…
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 252 This family corresponds to the calculation of a hash in multiple steps. 480 … the derivation operation is handled by that secure element, the core performs the following steps: 484 …t entry point returns `PSA_ERROR_NOT_SUPPORTED`, continue with the following steps, otherwise stop. 703 For `PSA_ALG_JPAKE` the following steps are available for output operation: 728 For `PSA_ALG_JPAKE` the following steps are available for input operation:
|