Searched refs:strong (Results 1 – 11 of 11) sorted by relevance
/mbedtls-latest/tests/suites/ |
D | test_suite_entropy.data | 55 Entropy calls: no strong 58 Entropy calls: 1 strong, 1*BLOCK_SIZE 61 Entropy calls: 1 strong, 2*(BLOCK_SIZE/2) 64 Entropy calls: 1 strong, BLOCK_SIZE*1 67 Entropy calls: 1 strong, 2*BLOCK_SIZE to reach threshold 70 Entropy calls: 2 strong, BLOCK_SIZE/2 each
|
D | test_suite_entropy.function | 328 entropy_dummy_context strong = 339 /* Set strong source that reaches its threshold immediately and 342 &strong, 1,
|
D | test_suite_rsa.function | 745 * In production, always use a cryptographically strong RNG! */ 970 * In production, always use a cryptographically strong RNG! */ 981 * In production, always use a cryptographically strong RNG! */ 1172 * In production, always use a cryptographically strong RNG! */ 1357 * In production, always use a cryptographically strong RNG! */ 1368 * In production, always use a cryptographically strong RNG! */
|
D | helpers.function | 56 * to initialize some strong entropy source. */
|
/mbedtls-latest/library/ |
D | entropy.c | 88 size_t threshold, int strong) in mbedtls_entropy_add_source() argument 107 ctx->source[idx].strong = strong; in mbedtls_entropy_add_source() 214 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) { in entropy_gather_internal() 318 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) { in mbedtls_entropy_func()
|
/mbedtls-latest/include/mbedtls/ |
D | entropy.h | 99 int MBEDTLS_PRIVATE(strong); /**< Is the source strong? */ 163 size_t threshold, int strong);
|
/mbedtls-latest/ |
D | CONTRIBUTING.md | 37 …rface which need to be changed are marked as 'deprecated'. If there is a strong reason to replace … 48 …fix should be reworked to avoid the API change. API changes without very strong justification are …
|
D | ChangeLog | 2187 * Guard against strong local side channel attack against base64 tables by 2735 MBEDTLS_ENTROPY_BLOCK_SIZE bytes or more from strong sources. In the 2738 security if the source is genuinely strong, but less than the expected 64
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-limitations.md | 330 strong security arguments, so it's unclear whether it would be accepted.
|
D | md-cipher-dispatch.md | 293 There is no strong reason to allow mechanisms available through legacy but not PSA when `MBEDTLS_PS…
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 130 and make sure your device is provisioned with a strong random seed.
|