/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_not_supported.generated.data | 3 PSA import AES 128-bit not supported 7 PSA generate AES 128-bit not supported 11 PSA import AES 192-bit not supported 15 PSA generate AES 192-bit not supported 19 PSA import AES 256-bit not supported 23 PSA generate AES 256-bit not supported 27 PSA import ARIA 128-bit not supported 31 PSA generate ARIA 128-bit not supported 35 PSA import ARIA 192-bit not supported 39 PSA generate ARIA 192-bit not supported [all …]
|
D | test_suite_psa_crypto_not_supported.misc.data | 1 PSA import PSA_KEY_TYPE_NONE never supported 4 PSA generate PSA_KEY_TYPE_NONE never supported 7 PSA import PSA_KEY_TYPE_CATEGORY_SYMMETRIC never supported 10 PSA generate PSA_KEY_TYPE_CATEGORY_SYMMETRIC never supported
|
D | helpers.function | 35 #define DEPENDENCY_SUPPORTED 0 /* Dependency supported by build */ 40 #define DEPENDENCY_NOT_SUPPORTED -2 /* Dependency not supported */ 46 #define DISPATCH_UNSUPPORTED_SUITE -5 /* Test suite not supported by the
|
D | test_suite_pkparse.function | 55 * only byte-aligned sizes are supported. 57 * For now, for such keys, treat not-supported from PSA as a success. 85 /* Whether a pk key can do ECDSA. Opaque keys are not supported since this
|
D | test_suite_psa_crypto_util.data | 9 # Check coordinates one byte larger than the largest supported curve. 71 # Check coordinates one byte larger than the largest supported curve.
|
D | test_suite_psa_crypto_se_driver_hal.data | 135 Generate key: not supported 172 Key registration: not supported
|
D | test_suite_psa_crypto_se_driver_hal_mocks.data | 10 SE init mock test: location not supported (INT_MAX)
|
D | test_suite_psa_crypto_slot_management.data | 173 Open not supported 177 Create not supported
|
D | test_suite_pk.function | 49 /* Pick an elliptic curve that's supported by PSA. Note that the curve is 50 * not guaranteed to be supported by the ECP module. 54 * where the only legacy curve is secp224k1, which is not supported in PSA, 121 /* Pick a second curve, for tests that need two supported curves of the 139 /* Pick a second bit-size, for tests that need two supported curves of the 273 TEST_FAIL("RSA keys not supported."); 297 TEST_FAIL("EC keys not supported."); 356 TEST_FAIL("EC keys are not supported"); 2072 /* verify_ext() is not supported when using an opaque context. */
|
D | main_test.function | 187 * \brief Checks if test function is supported in this build-time
|
/mbedtls-latest/3rdparty/everest/ |
D | README.md | 5 …supported, although the version in `everest/library/legacy` should work on most systems. The main …
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | testing.md | 24 path. (For example, for record protection, previously (until 3.1), some ciphers were supported 28 ciphers that are supposed to be supported.)
|
D | md-cipher-dispatch.md | 196 …decoding with PBKDF1 but don't want `PSA_ALG_WANT_MD5` because it isn't supported for `PSA_ALG_RSA… 220 * How to decide whether a specific algorithm or key type is supported (eventually based on `MBEDTLS… 255 …ed, what matters is that `PSA_WANT_ALG_SHA_256` implies that SHA-256 is supported after `psa_crypt… 288 …through accelerators but not through legacy, but this is not officially supported (users are not s… 375 … the info structure is used for 3 things: (1) to check if the cipher is supported, (2) to check it… 450 …t this means that an MD context would always be as large as the largest supported hash context. So… 558 …PSA driver (eliminating the need to a HMAC interface in software if all supported hashes have an a… 593 The only supported ciphers are AES, ARIA and Camellia. They are identified by
|
/mbedtls-latest/pkgconfig/ |
D | JoinPaths.cmake | 14 # Windows not supported
|
/mbedtls-latest/docs/architecture/ |
D | alternative-implementations.md | 24 …ve implementation mechanism, but alternative implementation will remain supported in at least all … 28 …an implement a driver for this engine in the PSA interface. Drivers are supported for cryptographi… 47 …ry: the field can be `const`, and modifications to it do not need to be supported. For example, if…
|
/mbedtls-latest/library/ |
D | sha256.c | 609 static int supported = 0; in mbedtls_a64_crypto_sha256_has_support() local 612 supported = mbedtls_a64_crypto_sha256_determine_support(); in mbedtls_a64_crypto_sha256_has_support() 616 return supported; in mbedtls_a64_crypto_sha256_has_support()
|
D | sha512.c | 725 static int supported = 0; in mbedtls_a64_crypto_sha512_has_support() local 728 supported = mbedtls_a64_crypto_sha512_determine_support(); in mbedtls_a64_crypto_sha512_has_support() 732 return supported; in mbedtls_a64_crypto_sha512_has_support()
|
/mbedtls-latest/docs/ |
D | driver-only-builds.md | 56 For now, only the following (families of) mechanisms are supported: 88 - and similarly for all supported hash algorithms: `MD5`, `RIPEMD160`, 228 consequence these are not supported in builds without `MBEDTLS_ECDSA_C`. 231 are not supported without `ECDH_C`. See also limitations regarding 436 - AES is supported on the PSA side together with ECB mode, i.e.
|
D | use-psa-crypto.md | 36 supported by PSA Crypto, see "Internal Changes" below for a complete list of 79 for a full list of supported operations and limitations.
|
D | psa-transition.md | 84 …orithm, or `PSA_HASH_MAX_SIZE` for a buffer that is long enough for any supported hash. See the re… 231 … of the affected function or module. Alternative implementations remain supported in Mbed TLS 3.x … 300 … algorithm. Note that for a mechanism to be supported, both the key type and the algorithm must be… 302 For example, to test if AES-CBC-PKCS7 is supported, in the legacy API, you could write: 316 The following table lists corresponding PSA macros for maximum-size macros that take all supported … 465 …support for that algorithm. For a compound mechanism, all parts must be supported. In particular, … 467 For example, to test if HMAC-SHA-256 is supported, in the legacy API, you could write: 476 To test if AES-CMAC is supported, in the legacy API, you could write: 750 | `MBEDTLS_ECP_DP_SECP224K1` | not supported | N/A | 782 …nt. As of Mbed TLS 3.6.1, selecting a different public exponent is only supported with the built-i… [all …]
|
/mbedtls-latest/ |
D | BRANCHES.md | 13 security fixes. Currently, the supported LTS branches are: 29 supported until March 2027. The next LTS release will be a 4.x release, which is
|
D | ChangeLog | 50 (RFC 7919 groups remain supported.) 96 largest supported curve. In some configurations with PSA disabled, 226 an RSA key as a domain parameter is no longer supported. Use 238 * AES-NI is now supported in Windows builds with clang and clang-cl. 352 be only partially supported (#3266). 425 functions. Note that overlap is still only partially supported when 489 that it failed to check if all the relevant curves were supported by the 514 maximum size of any supported block cipher) or the new name 516 maximum size of a block cipher supported by the CMAC module). 538 TLS 1.2 (ECDHE-ECDSA key exchange) are not supported in those builds yet, [all …]
|
/mbedtls-latest/programs/ |
D | README.md | 20 * [`pkey/gen_key.c`](pkey/gen_key.c): generates a key for any of the supported public-key algorithm… 83 …s a basis for writing an application. They combine most of the features supported by the library, …
|
/mbedtls-latest/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 94 …d-and-check tests for supported persistence levels. We may also want to have negative tests ensuri…
|
/mbedtls-latest/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers_no_static.c.jinja | 83 * the two is not supported.
|