/mbedtls-latest/tests/suites/ |
D | test_suite_timing.function | 22 struct mbedtls_timing_hr_time time; 24 memset(&time, 0, sizeof(time)); 26 (void) mbedtls_timing_get_timer(&time, 1); 28 /* Check that a non-zero time was written back */ 30 for (size_t i = 0; i < sizeof(time); i++) { 31 all_zero &= ((unsigned char *) &time)[i] == 0; 35 (void) mbedtls_timing_get_timer(&time, 0);
|
D | test_suite_platform.function | 4 * underlying operating system, the time routines are not always reliable, 17 #include <time.h> 104 * `mbedtls_time()` was defined as c99 function `time()`, returns the number 106 * from automatic drift adjustment or time setting system call. The POSIX.1
|
D | main_test.function | 156 * DISPATCH_UNSUPPORTED_SUITE if not compile time enabled. 187 * \brief Checks if test function is supported in this build-time 194 * DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
|
D | test_suite_x509parse.function | 1602 mbedtls_x509_time time; 1608 memset(&time, 0x00, sizeof(time)); 1616 TEST_EQUAL(mbedtls_x509_get_time(&start, end, &time), ret); 1618 TEST_EQUAL(year, time.year); 1619 TEST_EQUAL(mon, time.mon); 1620 TEST_EQUAL(day, time.day); 1621 TEST_EQUAL(hour, time.hour); 1622 TEST_EQUAL(min, time.min); 1623 TEST_EQUAL(sec, time.sec);
|
D | test_suite_version.data | 1 Check compile time library version
|
D | test_suite_x509parse.data | 2540 X509 CRL ASN1 (TBSCertList, missing time in entry) 2544 X509 CRL ASN1 (TBSCertList, missing time in entry at end) 2548 X509 CRL ASN1 (TBSCertList, invalid tag for time in entry) 3170 X509 Get time (UTC no issues) 3174 X509 Get time (Generalized Time no issues) 3178 X509 Get time (UTC year without leap day) 3182 X509 Get time (UTC year with leap day) 3186 X509 Get time (UTC invalid day of month #1) 3190 X509 Get time (UTC invalid day of month #2) 3194 X509 Get time (UTC invalid hour) [all …]
|
/mbedtls-latest/include/mbedtls/ |
D | platform_time.h | 57 extern mbedtls_time_t (*mbedtls_time)(mbedtls_time_t *time); 66 int mbedtls_platform_set_time(mbedtls_time_t (*time_func)(mbedtls_time_t *time)); 71 #define mbedtls_time time
|
/mbedtls-latest/docs/architecture/testing/ |
D | invasive-testing.md | 30 …ures with a significant impact on the code size or attack surface should have a compile-time guard. 36 … depend on `MBEDTLS_TEST_HOOKS` (see [“rules for compile-time options”](#rules-for-compile-time-op… 49 > # and not expected to be raised any time soon) is less than the maximum 53 ### Rules for compile-time options 55 …e following rules. For more information, see the [rationale](#guidelines-for-compile-time-options). 67 … can be replaced at compile time to support alternative platforms, the test code should be compati… 180 …tation is that the test-only interfaces must not be hidden at link time (but link-time hiding is n… 207 ### Compile-time options 209 …e in the product for testing, but not in production, we can add a compile-time option to enable it… 221 #### Guidelines for compile-time options [all …]
|
/mbedtls-latest/docs/architecture/ |
D | alternative-implementations.md | 4 This document describes how parts of the Mbed TLS functionality can be replaced at compile time to … 34 You can replace the code of some modules of Mbed TLS at compile time by a custom implementation. Th… 37 * Enable `MBEDTLS_XXX_ALT` in the compile-time configuration where XXX is the module name. For exam… 72 …the function will not be compiled, and you must provide an alternative implementation at link time. 74 For example, enable `MBEDTLS_AES_ENCRYPT_ALT` at compile time and provide your own implementation o… 84 * Define the symbol `MBEDTLS_PLATFORM_XXX_ALT` at compile time. 87 …, to provide a custom `printf` function at run time, enable `MBEDTLS_PLATFORM_PRINTF_ALT` at compi…
|
D | psa-keystore-design.md | 69 …istorical implementation. It remains the default in the Mbed TLS 3.6 long-time support (LTS) branc… 77 We introduced the variants other than the hybrid key store in a patch release of a long-time suppor… 122 * Access to an existing volatile key takes $O(1)$ time. 123 * Access to a persistent key (including creation and destruction) takes time that is linear in `MBE… 124 * Allocating a key takes amortized $O(1)$ time. Usually the time is $O(s)$ where $s$ is the number … 125 * Destroying a volatile key takes $O(1)$ time as of Mbed TLS 3.6.1. Later improvements to memory co… 129 …mically arrays of key slot. The number of slices is determined at compile time. The key store cont… 187 Persistent keys and built-in keys need to be loaded into the in-memory key store each time they are… 202 …tifier is already loaded. If not, it loads the key. This cache walk takes time that is proportiona…
|
/mbedtls-latest/ |
D | BRANCHES.md | 3 At any point in time, we have a number of maintained branches, currently consisting of: 12 - One or more long-time support (LTS) branches: these only get bug fixes and 41 compile-time configuration (`mbedtls/mbedtls_config.h`) or the same modified 42 compile-time configuration. Changing compile-time configuration options can 88 ## Long-time support branches
|
D | BUGS.md | 11 or a long-time support branch.
|
D | ChangeLog | 195 in Mbed TLS 3.0, but was not announced in a changelog entry at the time. 314 MBEDTLS_PSA_CRYPTO_CLIENT is enabled at build time and psa_crypto_init() is 328 time by the MBEDTLS_SSL_EARLY_DATA configuration option and at runtime by 362 - If the TLS 1.2 implementation was disabled at build time, a TLS 1.2 385 * Switch to milliseconds as the unit for ticket creation and reception time 496 * Add new millisecond time type `mbedtls_ms_time_t` and `mbedtls_ms_time()` 598 * Reduce syscalls to time() during certificate verification. 600 setting the CMake variable of the same name at configuration time. 619 disables the plain C implementation and the run-time detection for the 647 time code, which could allow a padding oracle attack if the attacker [all …]
|
/mbedtls-latest/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 4 This document is a proposed interface for deciding at build time which cryptographic mechanisms to … 98 …is an error to require an ECC key type but no curve, and Mbed TLS will reject this at compile time. 106 …y particular group, so reducing the number of available groups at compile time only saves a little… 112 …at least one possible parameter, and Mbed TLS will reject this at compile time. For example, `PSA_… 169 #### Compile-time checks 195 At the time of writing, the preferred configuration mechanism for a PSA service is in JSON syntax. … 231 Is it realistic to mandate a compile-time error if a key type is required, but no matching algorith… 247 time-stamp-line-limit: 40 248 time-stamp-start: "Time-stamp: *\"" 249 time-stamp-end: "\"" [all …]
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | testing.md | 23 a decision is made at run-time about whether to use the PSA or legacy code 25 via PSA while some others weren't, with a run-time fallback. In this case, it's 27 right decision was made at run-time, i. e. that we didn't use the fallback for 98 However, if additional logic is involved, or there are run-time decisions about
|
D | strategy.md | 28 Compile-time options 31 We currently have a few compile-time options that are relevant to the migration: 66 At the time of writing (early 2022) it is unclear what could be done about the 70 solutions would probably also solve other problems at the same time.) 155 This strategy will probably be used for some time for the PK layer, while we 196 still stored outside of PSA most of the time, supporting only G1). 256 3. Adapt compile-time guards used to query availability of a given algorithm; 486 combination of both, perhaps evolving gradually over time.
|
/mbedtls-latest/programs/fuzz/ |
D | common.c | 9 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time) in dummy_constant_time() argument 11 (void) time; in dummy_constant_time()
|
D | common.h | 16 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time);
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 77 validating that points lie on the curve every time a point is deserialized. 91 p256-m also avoid instructions (or library functions) whose execution time 94 unsigned multiplication. On cores which have a constant-time 32x32->64 bit 96 be defined by the user at compile-time to take advantage of it in order to 103 2. attackers who can also measure the total computation time of the operation; 289 p256-m is fully constant-time from the ground up so should be more robust 351 constant-time behaviour with respect to the value being inverted. 529 - 32-bit unsigned addition and subtraction with carry are constant time. 530 - 16x16->32-bit unsigned multiplication is available and constant time.
|
/mbedtls-latest/library/ |
D | ssl_cookie.c | 164 const unsigned char time[4], in ssl_cookie_hmac() 173 mbedtls_md_hmac_update(hmac_ctx, time, 4) != 0 || in ssl_cookie_hmac()
|
/mbedtls-latest/programs/ssl/ |
D | ssl_context_info.c | 274 static void print_time(const uint64_t *time) in print_time() argument 278 struct tm *t = gmtime((time_t *) time); in print_time() 287 (void) time; in print_time()
|
D | ssl_test_lib.c | 41 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time) in dummy_constant_time() argument 43 (void) time; in dummy_constant_time()
|
/mbedtls-latest/docs/ |
D | use-psa-crypto.md | 1 This document describes the compile-time configuration option 17 at any time. 52 **Historical note:** This option was introduced at a time when PSA Crypto was
|
/mbedtls-latest/3rdparty/everest/include/everest/kremlin/internal/ |
D | target.h | 53 return (int32_t)time(NULL); in krml_time()
|
/mbedtls-latest/scripts/ |
D | ci.requirements.txt | 14 # At the time of writing, only needed for tests/scripts/audit-validity-dates.py.
|