Searched refs:user (Results 1 – 25 of 39) sorted by relevance
12
/mbedtls-latest/library/ |
D | psa_crypto_pake.c | 160 uint8_t *peer = NULL, *user = NULL; in mbedtls_psa_pake_setup() local 190 user = mbedtls_calloc(1, user_len); in mbedtls_psa_pake_setup() 191 if (user == NULL) { in mbedtls_psa_pake_setup() 208 status = psa_crypto_driver_pake_get_user(inputs, user, in mbedtls_psa_pake_setup() 240 if (memcmp(user, jpake_client_id, actual_user_len) == 0 && in mbedtls_psa_pake_setup() 244 if (memcmp(user, jpake_server_id, actual_user_len) == 0 && in mbedtls_psa_pake_setup() 261 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup() 272 mbedtls_free(user); mbedtls_free(peer); in mbedtls_psa_pake_setup()
|
D | psa_crypto.c | 8441 memcpy(user_id, inputs->user, inputs->user_len); 8607 operation->data.inputs.user = mbedtls_calloc(1, user_id_len); 8608 if (operation->data.inputs.user == NULL) { 8615 memcpy(operation->data.inputs.user, user_id, user_id_len); 8758 mbedtls_free(inputs.user); 9068 if (operation->data.inputs.user != NULL) { 9069 mbedtls_free(operation->data.inputs.user);
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-wrappers-codegen-migration-guide.md | 5 It is meant to give the library user migration guidelines while the Mbed TLS project tides over mul… 22 ### What's critical for a migrating user 33 …support is yet to come in, if the library user sees a need to patch psa_crypto_driver_wrappers.h f… 40 The JSON file 'driverlist.json' is meant to be edited by the user to reflect the drivers one wants …
|
D | psa-conditional-inclusion-c.md | 137 `mbedtls/config_psa.h` includes `psa/crypto_config.h`, the user-editable file that defines applicat… 153 * (U) indicates a symbol that is defined by the user (application).
|
/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_pake.data | 41 PSA PAKE: set empty user 49 PSA PAKE: set invalid user 57 PSA PAKE: user already set 65 PSA PAKE: user and peer both servers 69 PSA PAKE: user and peer both clients 239 PSA PAKE: input getters: user
|
D | test_suite_psa_crypto_pake.function | 63 /* The only two JPAKE user/peer identifiers supported for the time being. */ 610 uint8_t *user = (uint8_t *) user_arg; 637 TEST_EQUAL(psa_pake_set_user(&operation, user, user_len), 668 SETUP_ALWAYS_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 674 SETUP_CONDITIONAL_CHECK_STEP(psa_pake_set_user(&operation, user, user_len), 1084 uint8_t user_ret[20] = { 0 }; // max user length is 20 bytes 1099 uint8_t *user = (uint8_t *) users[i]; 1114 PSA_ASSERT(psa_pake_set_user(&operation, user, user_len)); 1133 TEST_MEMORY_COMPARE(user_ret, buffer_len_ret, user, user_len);
|
D | test_suite_lmots.data | 26 # pip3 install --user hsslms==0.1.2 51 # pip3 install --user hsslms==0.1.2 74 # pip3 install --user hsslms==0.1.2
|
D | test_suite_lms.data | 23 # * pip3 install --user pyhsslms 63 # * pip3 install --user pyhsslms 147 # pip3 install --user hsslms==0.1.2 170 # pip3 install --user hsslms==0.1.2
|
/mbedtls-latest/ |
D | SECURITY.md | 33 Mbed TLS aims to fully protect against remote attacks and to enable the user 84 a user application's threat model, they need to be mitigated by the platform. 92 attacks. If local fault injection attacks are present in a use case or a user 102 physical attacks are present in a use case or a user application's threat
|
D | CONTRIBUTING.md | 33 …d not be necessary for a user to make any changes to their own code to work with a newer version o…
|
D | README.md | 70 python3 -m pip install --user -r scripts/basic.requirements.txt 72 …nvoke `python` instead of `python3`. To install the packages system-wide, omit the `--user` option.
|
D | ChangeLog | 241 parsing unsupported certificate extensions via user provided callback. 373 a user configuration file or the compiler command line. Fixes #8165. 656 undefined. Mbed TLS itself was unaffected by this, but user code 686 * Fix the J-PAKE driver interface for user and peer to accept any values 749 a user configuration file or the compiler command line. Fixes #8165. 941 * Allow setting user and peer identifiers for EC J-PAKE operation 1234 a piece of user data which is reserved for the application. The user 2525 parsing unsupported certificate extensions via user provided callback. 3165 through qemu user emulation. Reported and fix suggested by randombit 3545 used by user applications. Found and fixed by Fabio Alessandrelli. [all …]
|
/mbedtls-latest/visualc/VS2017/ |
D | .gitignore | 10 /*.vcxproj.user
|
/mbedtls-latest/tests/scripts/ |
D | docker_env.sh | 82 --user "$(id -u):$(id -g)" \
|
/mbedtls-latest/programs/test/cmake_package/ |
D | CMakeLists.txt | 4 # Simulate configuring and building Mbed TLS as the user might do it. We'll
|
/mbedtls-latest/programs/test/cmake_package_install/ |
D | CMakeLists.txt | 4 # Simulate configuring and building Mbed TLS as the user might do it. We'll
|
/mbedtls-latest/docs/ |
D | use-psa-crypto.md | 2 `MBEDTLS_USE_PSA_CRYPTO` from a user's perspective. 62 `MBEDTLS_USE_PSA_CRYPTO` is that the user promises to call `psa_crypto_init()`
|
D | tls13-early-data.md | 73 specifically by the user of write_early_data(). A fresh SSL context (typically
|
/mbedtls-latest/ChangeLog.d/ |
D | 00README.md | 8 Write a changelog entry if there is a user-visible change. This includes:
|
/mbedtls-latest/include/psa/ |
D | crypto_extra.h | 1800 uint8_t *MBEDTLS_PRIVATE(user);
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 18 #### Backward compatibility user story 24 #### Interface design user story 32 #### Hardware accelerator vendor user stories 42 #### Maintainer user stories 240 * When called from user code, it must call the built-in hash implementation if PSA is not available…
|
D | strategy.md | 56 `MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG` as it requires a user-provided RNG 376 The role of the PK/Cipher/MD APIs in user migration 443 It should be easy to provide the user with a bunch of `#define`s for algorithm
|
/mbedtls-latest/docs/architecture/testing/ |
D | psa-storage-format-testing.md | 15 The goal of storage format stability testing is: as a user of Mbed TLS, I want to store a key under…
|
/mbedtls-latest/3rdparty/p256-m/p256-m/ |
D | README.md | 96 be defined by the user at compile-time to take advantage of it in order to 286 done separately by the user for static ECDH (there are attacks [when users
|
/mbedtls-latest/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 41 …. This limitation on the range is not documented in user-facing documentation: according to the us…
|
12