Home
last modified time | relevance | path

Searched refs:strong (Results 1 – 11 of 11) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_entropy.data55 Entropy calls: no strong
58 Entropy calls: 1 strong, 1*BLOCK_SIZE
61 Entropy calls: 1 strong, 2*(BLOCK_SIZE/2)
64 Entropy calls: 1 strong, BLOCK_SIZE*1
67 Entropy calls: 1 strong, 2*BLOCK_SIZE to reach threshold
70 Entropy calls: 2 strong, BLOCK_SIZE/2 each
Dtest_suite_entropy.function328 entropy_dummy_context strong =
339 /* Set strong source that reaches its threshold immediately and
342 &strong, 1,
Dtest_suite_rsa.function745 * In production, always use a cryptographically strong RNG! */
970 * In production, always use a cryptographically strong RNG! */
981 * In production, always use a cryptographically strong RNG! */
1172 * In production, always use a cryptographically strong RNG! */
1357 * In production, always use a cryptographically strong RNG! */
1368 * In production, always use a cryptographically strong RNG! */
Dhelpers.function56 * to initialize some strong entropy source. */
/mbedtls-latest/library/
Dentropy.c88 size_t threshold, int strong) in mbedtls_entropy_add_source() argument
107 ctx->source[idx].strong = strong; in mbedtls_entropy_add_source()
214 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) { in entropy_gather_internal()
318 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) { in mbedtls_entropy_func()
/mbedtls-latest/include/mbedtls/
Dentropy.h99 int MBEDTLS_PRIVATE(strong); /**< Is the source strong? */
163 size_t threshold, int strong);
/mbedtls-latest/
DCONTRIBUTING.md37 …rface which need to be changed are marked as 'deprecated'. If there is a strong reason to replace …
48 …fix should be reworked to avoid the API change. API changes without very strong justification are …
DChangeLog2187 * Guard against strong local side channel attack against base64 tables by
2735 MBEDTLS_ENTROPY_BLOCK_SIZE bytes or more from strong sources. In the
2738 security if the source is genuinely strong, but less than the expected 64
/mbedtls-latest/docs/architecture/psa-migration/
Dpsa-limitations.md330 strong security arguments, so it's unclear whether it would be accepted.
Dmd-cipher-dispatch.md293 There is no strong reason to allow mechanisms available through legacy but not PSA when `MBEDTLS_PS…
/mbedtls-latest/docs/
D3.0-migration-guide.md130 and make sure your device is provisioned with a strong random seed.