Home
last modified time | relevance | path

Searched refs:time (Results 1 – 25 of 69) sorted by relevance

123

/mbedtls-latest/tests/suites/
Dtest_suite_timing.function22 struct mbedtls_timing_hr_time time;
24 memset(&time, 0, sizeof(time));
26 (void) mbedtls_timing_get_timer(&time, 1);
28 /* Check that a non-zero time was written back */
30 for (size_t i = 0; i < sizeof(time); i++) {
31 all_zero &= ((unsigned char *) &time)[i] == 0;
35 (void) mbedtls_timing_get_timer(&time, 0);
Dtest_suite_platform.function4 * underlying operating system, the time routines are not always reliable,
17 #include <time.h>
104 * `mbedtls_time()` was defined as c99 function `time()`, returns the number
106 * from automatic drift adjustment or time setting system call. The POSIX.1
Dmain_test.function156 * DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
187 * \brief Checks if test function is supported in this build-time
194 * DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
Dtest_suite_x509parse.function1602 mbedtls_x509_time time;
1608 memset(&time, 0x00, sizeof(time));
1616 TEST_EQUAL(mbedtls_x509_get_time(&start, end, &time), ret);
1618 TEST_EQUAL(year, time.year);
1619 TEST_EQUAL(mon, time.mon);
1620 TEST_EQUAL(day, time.day);
1621 TEST_EQUAL(hour, time.hour);
1622 TEST_EQUAL(min, time.min);
1623 TEST_EQUAL(sec, time.sec);
Dtest_suite_version.data1 Check compile time library version
Dtest_suite_x509parse.data2540 X509 CRL ASN1 (TBSCertList, missing time in entry)
2544 X509 CRL ASN1 (TBSCertList, missing time in entry at end)
2548 X509 CRL ASN1 (TBSCertList, invalid tag for time in entry)
3170 X509 Get time (UTC no issues)
3174 X509 Get time (Generalized Time no issues)
3178 X509 Get time (UTC year without leap day)
3182 X509 Get time (UTC year with leap day)
3186 X509 Get time (UTC invalid day of month #1)
3190 X509 Get time (UTC invalid day of month #2)
3194 X509 Get time (UTC invalid hour)
[all …]
/mbedtls-latest/include/mbedtls/
Dplatform_time.h57 extern mbedtls_time_t (*mbedtls_time)(mbedtls_time_t *time);
66 int mbedtls_platform_set_time(mbedtls_time_t (*time_func)(mbedtls_time_t *time));
71 #define mbedtls_time time
/mbedtls-latest/docs/architecture/testing/
Dinvasive-testing.md30 …ures with a significant impact on the code size or attack surface should have a compile-time guard.
36 … depend on `MBEDTLS_TEST_HOOKS` (see [“rules for compile-time options”](#rules-for-compile-time-op…
49 > # and not expected to be raised any time soon) is less than the maximum
53 ### Rules for compile-time options
55 …e following rules. For more information, see the [rationale](#guidelines-for-compile-time-options).
67 … can be replaced at compile time to support alternative platforms, the test code should be compati…
180 …tation is that the test-only interfaces must not be hidden at link time (but link-time hiding is n…
207 ### Compile-time options
209 …e in the product for testing, but not in production, we can add a compile-time option to enable it…
221 #### Guidelines for compile-time options
[all …]
/mbedtls-latest/docs/architecture/
Dalternative-implementations.md4 This document describes how parts of the Mbed TLS functionality can be replaced at compile time to …
34 You can replace the code of some modules of Mbed TLS at compile time by a custom implementation. Th…
37 * Enable `MBEDTLS_XXX_ALT` in the compile-time configuration where XXX is the module name. For exam…
72 …the function will not be compiled, and you must provide an alternative implementation at link time.
74 For example, enable `MBEDTLS_AES_ENCRYPT_ALT` at compile time and provide your own implementation o…
84 * Define the symbol `MBEDTLS_PLATFORM_XXX_ALT` at compile time.
87 …, to provide a custom `printf` function at run time, enable `MBEDTLS_PLATFORM_PRINTF_ALT` at compi…
Dpsa-keystore-design.md69 …istorical implementation. It remains the default in the Mbed TLS 3.6 long-time support (LTS) branc…
77 We introduced the variants other than the hybrid key store in a patch release of a long-time suppor…
122 * Access to an existing volatile key takes $O(1)$ time.
123 * Access to a persistent key (including creation and destruction) takes time that is linear in `MBE…
124 * Allocating a key takes amortized $O(1)$ time. Usually the time is $O(s)$ where $s$ is the number …
125 * Destroying a volatile key takes $O(1)$ time as of Mbed TLS 3.6.1. Later improvements to memory co…
129 …mically arrays of key slot. The number of slices is determined at compile time. The key store cont…
187 Persistent keys and built-in keys need to be loaded into the in-memory key store each time they are…
202 …tifier is already loaded. If not, it loads the key. This cache walk takes time that is proportiona…
/mbedtls-latest/
DBRANCHES.md3 At any point in time, we have a number of maintained branches, currently consisting of:
12 - One or more long-time support (LTS) branches: these only get bug fixes and
41 compile-time configuration (`mbedtls/mbedtls_config.h`) or the same modified
42 compile-time configuration. Changing compile-time configuration options can
88 ## Long-time support branches
DBUGS.md11 or a long-time support branch.
DChangeLog195 in Mbed TLS 3.0, but was not announced in a changelog entry at the time.
314 MBEDTLS_PSA_CRYPTO_CLIENT is enabled at build time and psa_crypto_init() is
328 time by the MBEDTLS_SSL_EARLY_DATA configuration option and at runtime by
362 - If the TLS 1.2 implementation was disabled at build time, a TLS 1.2
385 * Switch to milliseconds as the unit for ticket creation and reception time
496 * Add new millisecond time type `mbedtls_ms_time_t` and `mbedtls_ms_time()`
598 * Reduce syscalls to time() during certificate verification.
600 setting the CMake variable of the same name at configuration time.
619 disables the plain C implementation and the run-time detection for the
647 time code, which could allow a padding oracle attack if the attacker
[all …]
/mbedtls-latest/docs/proposed/
Dpsa-conditional-inclusion-c.md4 This document is a proposed interface for deciding at build time which cryptographic mechanisms to …
98 …is an error to require an ECC key type but no curve, and Mbed TLS will reject this at compile time.
106 …y particular group, so reducing the number of available groups at compile time only saves a little…
112 …at least one possible parameter, and Mbed TLS will reject this at compile time. For example, `PSA_…
169 #### Compile-time checks
195 At the time of writing, the preferred configuration mechanism for a PSA service is in JSON syntax. …
231 Is it realistic to mandate a compile-time error if a key type is required, but no matching algorith…
247 time-stamp-line-limit: 40
248 time-stamp-start: "Time-stamp: *\""
249 time-stamp-end: "\""
[all …]
/mbedtls-latest/docs/architecture/psa-migration/
Dtesting.md23 a decision is made at run-time about whether to use the PSA or legacy code
25 via PSA while some others weren't, with a run-time fallback. In this case, it's
27 right decision was made at run-time, i. e. that we didn't use the fallback for
98 However, if additional logic is involved, or there are run-time decisions about
Dstrategy.md28 Compile-time options
31 We currently have a few compile-time options that are relevant to the migration:
66 At the time of writing (early 2022) it is unclear what could be done about the
70 solutions would probably also solve other problems at the same time.)
155 This strategy will probably be used for some time for the PK layer, while we
196 still stored outside of PSA most of the time, supporting only G1).
256 3. Adapt compile-time guards used to query availability of a given algorithm;
486 combination of both, perhaps evolving gradually over time.
/mbedtls-latest/programs/fuzz/
Dcommon.c9 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time) in dummy_constant_time() argument
11 (void) time; in dummy_constant_time()
Dcommon.h16 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time);
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md77 validating that points lie on the curve every time a point is deserialized.
91 p256-m also avoid instructions (or library functions) whose execution time
94 unsigned multiplication. On cores which have a constant-time 32x32->64 bit
96 be defined by the user at compile-time to take advantage of it in order to
103 2. attackers who can also measure the total computation time of the operation;
289 p256-m is fully constant-time from the ground up so should be more robust
351 constant-time behaviour with respect to the value being inverted.
529 - 32-bit unsigned addition and subtraction with carry are constant time.
530 - 16x16->32-bit unsigned multiplication is available and constant time.
/mbedtls-latest/library/
Dssl_cookie.c164 const unsigned char time[4], in ssl_cookie_hmac()
173 mbedtls_md_hmac_update(hmac_ctx, time, 4) != 0 || in ssl_cookie_hmac()
/mbedtls-latest/programs/ssl/
Dssl_context_info.c274 static void print_time(const uint64_t *time) in print_time() argument
278 struct tm *t = gmtime((time_t *) time); in print_time()
287 (void) time; in print_time()
Dssl_test_lib.c41 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time) in dummy_constant_time() argument
43 (void) time; in dummy_constant_time()
/mbedtls-latest/docs/
Duse-psa-crypto.md1 This document describes the compile-time configuration option
17 at any time.
52 **Historical note:** This option was introduced at a time when PSA Crypto was
/mbedtls-latest/3rdparty/everest/include/everest/kremlin/internal/
Dtarget.h53 return (int32_t)time(NULL); in krml_time()
/mbedtls-latest/scripts/
Dci.requirements.txt14 # At the time of writing, only needed for tests/scripts/audit-validity-dates.py.

123