/mbedtls-latest/library/ |
D | md5.c | 259 uint32_t used; in mbedtls_md5_finish() local 265 used = ctx->total[0] & 0x3F; in mbedtls_md5_finish() 267 ctx->buffer[used++] = 0x80; in mbedtls_md5_finish() 269 if (used <= 56) { in mbedtls_md5_finish() 271 memset(ctx->buffer + used, 0, 56 - used); in mbedtls_md5_finish() 274 memset(ctx->buffer + used, 0, 64 - used); in mbedtls_md5_finish()
|
D | ssl_tls.c | 3396 size_t used = 0; in ssl_tls12_session_save() local 3411 used += 8; in ssl_tls12_session_save() 3413 if (used <= buf_len) { in ssl_tls12_session_save() 3424 used += 1 /* id_len */ in ssl_tls12_session_save() 3429 if (used <= buf_len) { in ssl_tls12_session_save() 3452 used += 3 + cert_len; in ssl_tls12_session_save() 3454 if (used <= buf_len) { in ssl_tls12_session_save() 3466 used += 1 /* type */ + 1 /* length */ + session->peer_cert_digest_len; in ssl_tls12_session_save() 3467 if (used <= buf_len) { in ssl_tls12_session_save() 3475 used += 2; in ssl_tls12_session_save() [all …]
|
D | sha1.c | 295 uint32_t used; in mbedtls_sha1_finish() local 301 used = ctx->total[0] & 0x3F; in mbedtls_sha1_finish() 303 ctx->buffer[used++] = 0x80; in mbedtls_sha1_finish() 305 if (used <= 56) { in mbedtls_sha1_finish() 307 memset(ctx->buffer + used, 0, 56 - used); in mbedtls_sha1_finish() 310 memset(ctx->buffer + used, 0, 64 - used); in mbedtls_sha1_finish()
|
D | sha256.c | 704 uint32_t used; in mbedtls_sha256_finish() local 711 used = ctx->total[0] & 0x3F; in mbedtls_sha256_finish() 713 ctx->buffer[used++] = 0x80; in mbedtls_sha256_finish() 715 if (used <= 56) { in mbedtls_sha256_finish() 717 memset(ctx->buffer + used, 0, 56 - used); in mbedtls_sha256_finish() 720 memset(ctx->buffer + used, 0, SHA256_BLOCK_SIZE - used); in mbedtls_sha256_finish()
|
D | sha512.c | 818 unsigned used; in mbedtls_sha512_finish() local 825 used = ctx->total[0] & 0x7F; in mbedtls_sha512_finish() 827 ctx->buffer[used++] = 0x80; in mbedtls_sha512_finish() 829 if (used <= 112) { in mbedtls_sha512_finish() 831 memset(ctx->buffer + used, 0, 112 - used); in mbedtls_sha512_finish() 834 memset(ctx->buffer + used, 0, SHA512_BLOCK_SIZE - used); in mbedtls_sha512_finish()
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | testing.md | 4 This document records the testing strategy used so far in implementing 18 Generally, code review is enough to ensure that PSA APIs are indeed used where 34 For example, `mbedtls_pk_setup_opaque()` is meant to be used by applications 53 new API to be used, and one or more tests in `ssl-opt.sh` using that. 67 For example, `mbedtls_cipher_setup_psa()` (no longer used, soon to be 68 deprecated - #5261) was meant to be used by the TLS layer, but probably not
|
D | psa-limitations.md | 58 coincidentally, all the groups used by RFC 7919 and TLS 1.3 are included 96 the hash algorithm potentially used to hash the message being signed: 97 - a hash algorithm used for the encoding function 102 configurable in the original scheme; 0xBC is used everywhere in practice. 136 - hash alg used for message hashing, encoding and MGF1 143 Note: above, "<= hashlen" means that hashlen is used if possible, but if it 145 used. 152 RFC 4055 Section 3.1 defines the encoding of RSA-PSS that's used in X.509. 153 It allows independently specifying the message hash (also used for encoding 154 hash), the MGF (and its hash if MGF1 is used), and the salt length (plus an [all …]
|
D | strategy.md | 1 This document explains the strategy that was used so far in starting the 48 - When `MBEDTLS_PSA_CRYPTO_C` is enabled and used, applications need to call 132 The are multiple strategies that can be used regarding the place of those 146 This strategy is currently (early 2023) used for all operations in the PK 155 This strategy will probably be used for some time for the PK layer, while we 173 This strategy is currently (early 2023) used for the MD layer and the Cipher 190 This strategy is not useful when no context is used, for example with the 198 This strategy, with support for key isolation, is currently (early 2022) used for 203 This strategy, without key isolation, was also previously used (until 3.1 218 Strategies currently (early 2022) used with each abstraction layer: [all …]
|
D | psa-legacy-bridges.md | 76 * To convert between data representations used by legacy APIs and data representations used by PSA … 94 Hashes are often used as building blocks for other mechanisms (HMAC, signatures, key derivation, et… 120 An RSA or ECC key can potentially be used for different algorithms in the scope of the pk module: 127 Since there is no algorithm that can be used with multiple types, and PSA keys have a policy that (… 164 …possibly in a secure element and non-exportable), and the key needs to be used in an interface tha… 341 …ons convert between the signature format used by `mbedtls_pk_{sign,verify}{,_ext}` and the signatu…
|
/mbedtls-latest/programs/fuzz/ |
D | README.md | 6 They are used with a so-called fuzz driver, which will generate inputs, try to process them with th… 8 These targets were meant to be used with oss-fuzz but can be used in other contexts. 56 Here is an example of dummy.py for extracting payload from client to server (if we used `tcp.dstpor…
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 47 - In addition, crafted inputs are used for negative testing and to reach 51 and reaching more error cases by exploiting knowledge of how the RNG is used). 75 carefully checking the validity domain of formulas used throughout the code; 98 Clang this is not necessary, since inline assembly is used instead.) 152 how much stack is used by each of its 4 public functions on selected cores: 202 The scripts used for TinyCrypt measurements are available in [this 216 TinyCrypto also uses no heap, only the stack. Here's the RAM used by each 301 generic Montgomery reduction used by p256-m, but other factors appear to 305 used by p256-m, but again other factors appear to compensate for that. 307 platforms used for benchmarking, while TinyCrypt uses only C (and the [all …]
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 58 used by the Mbed TLS release whose `MBEDTLS_VERSION_NUMBER` has the same 110 This feature was only used in some classic (non-PSA) cryptography modules. It was 111 not used in X.509, TLS or in PSA crypto, and it was not implemented in all 140 recommended), or users who used it through the entropy module but had it as the 273 were removed; `MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED` is now used 276 `MBEDTLS_ERR_PLATFORM_FEATURE_UNSUPPORTED` is now used instead. 278 were removed; `MBEDTLS_ERR_PLATFORM_HW_ACCEL_FAILED` is now used instead. 283 modules were removed; `MBEDTLS_ERR_xxx_BAD_INPUT_DATA` is now used instead. 448 All the functions in the RSA module that accept a `hashlen` parameter used to 452 the hash algorithm used when signing a hash. (The requirements when signing [all …]
|
D | psa-transition.md | 88 …_key_id_t), which is an identifier for the key. This allows the API to be used with keys that are … 219 …because it is a dependency of another configuration option, because it is used internally, or beca… 350 …ection](#cipher-mechanism-selection)”). By design, the same key cannot be used with multiple algor… 356 …ing sections to perform operations on the key. The same key object can be used in multiple operati… 357 4. To free the resources used by the key object, call [`psa_destroy_key`](https://mbed-tls.readthed… 446 The following helper functions can be used to convert between the 2 types: 538 …ection](#cipher-mechanism-selection)”). By design, the same key cannot be used with multiple algor… 544 …ing sections to perform operations on the key. The same key object can be used in multiple operati… 545 4. To free the resources used by the key object, call [`psa_destroy_key`](https://mbed-tls.readthed… 603 …tion/#group__derivation_1gab62757fb125243562c3947a752470d4a) for the salt used during the extracti… [all …]
|
D | psa-driver-example-and-guide.md | 5 … types, operation types, and entry points. As many key terms and concepts used in the examples in … 6 …ide.md) Guide describes the deliverables for writing a driver that can be used with Mbed TLS, and … 19 …used for hardware **accelerators**. When a transparent driver is available for a particular combin… 20 * **Opaque** drivers implement cryptographic operations on keys that can only be used inside a prot… 53 … follow the form `DRIVER_PREFIX_ENABLED` or something similar; it will be used to indicate the dri… 180 … config, p256-m's implementations of key generation, ECDH, and ECDSA will be used where applicable.
|
D | use-psa-crypto.md | 72 **New API function:** `mbedtls_pk_setup_opaque()` - can be used to 73 wrap a PSA key pair into a PK context. The key can be used for private-key 140 - Finite-field (non-EC) Diffie-Hellman (used in key exchanges: DHE-RSA,
|
/mbedtls-latest/ |
D | .gitignore | 15 # CMake generates *.dir/ folders for in-tree builds (used by MSVC projects), ignore all of those: 48 # CMake generates *.dir/ folders for in-tree builds (used by MSVC projects), ignore all of those:
|
D | ChangeLog | 217 be used, but are deprecated. 218 * In the PSA API, domain parameters are no longer used for anything. 230 mbedtls_pk_import_into_psa() can be used to import a PK key into PSA, 231 while mbedtls_pk_setup_opaque() can be used to wrap a PSA key into a opaque 305 mbedtls_ecp_write_key(), but can be used without separately calculating 316 used as random number generator function (f_rng) and context (p_rng) in 530 feature macros, MBEDTLS_MD_CAN_xxx, has been introduced that can be used 575 used to enable this feature. 636 only used in relation with CMAC which does not support these ciphers. 657 which used MBEDTLS_MD_MAX_BLOCK_SIZE could be affected. The only [all …]
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-developer-guide.md | 21 …used for hardware **accelerators**. When a transparent driver is available for a particular combin… 22 * **Opaque** drivers implement cryptographic operations on keys that can only be used inside a prot…
|
/mbedtls-latest/programs/ |
D | README.md | 20 …ed public-key algorithms (RSA or ECC) and writes it to a file that can be used by the other pk sam… 36 …y/rsa_genkey.c): generates an RSA key and writes it to a file that can be used with the other RSA … 99 * [`test/zeroize.c`](test/zeroize.c): a test program for `mbedtls_platform_zeroize`, used by [`test…
|
/mbedtls-latest/.github/ISSUE_TEMPLATE/ |
D | bug_report.md | 19 Compiler and options (if you used a pre-built binary, please indicate how you obtained it):
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 90 there is rarely any need to modify the configuration from that used for 199 - Use `<vector name>_len` for the name of a variable used to compute the 257 name `p` has been chosen as it was already widely used in TLS code. 283 - Use macros for constants that are used in different functions, different 284 places in the code. When a constant is used only locally in a function
|
/mbedtls-latest/tests/scripts/ |
D | list-identifiers.sh | 51 check-names.sh, which used to depend on this script, has been replaced with
|
/mbedtls-latest/tests/suites/ |
D | main_test.function | 10 * The following files were used to create this file. 243 * the .datax file as well as data files used by test cases
|
/mbedtls-latest/docs/architecture/psa-thread-safety/ |
D | psa-thread-safety.md | 61 > - Any call in a multi-part operation, where the same key identifier was used as a parameter t… 119 … from creating/loading a key via a key management API call the key can be used by any thread. If m… 139 …_psa_globaldata_mutex` defined in `include/mbedtls/threading.h`, which is used to make `psa_crypto… 159 …two variables dictate whether an operation can access a slot, and in what way the slot can be used. 204 To load a new key into a slot, the following internal utility functions are used: 213 …be kicked out of the key slot array provided they are not currently being used (`registered_reader… 222 * They operate on the key slot, usually copying the key into a separate buffer to be used by the op… 255 …ests to spin up multiple threads. This work has made the global variables used in tests thread-saf… 257 Although the `step` feature used in some tests is thread-safe, it may produce unexpected results fo…
|
/mbedtls-latest/configs/ |
D | README.txt | 5 this target. They can be used as a basis for custom configurations.
|