Home
last modified time | relevance | path

Searched refs:uses (Results 1 – 25 of 38) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_lmots.data2 # This test uses a fixed message, and then generates a private key, signs the
7 # This test uses a fixed message, and then generates a private key, signs the
12 # This test uses a NULL zero-length message, and then generates a private key,
17 # This test uses data from https://github.com/pmvr/python-hsslms due to the
21 # This test uses the same OTS key as the LMS hsslms interop test 1 (leaf 0 of
42 # This test uses data from https://github.com/pmvr/python-hsslms due to the
46 # This test uses the same OTS key as the LMS hsslms interop test 2 (leaf 1 of
67 # This test uses data from https://github.com/pmvr/python-hsslms due to the
90 # This test uses the valid signature from hsslms interop test 1, and then
96 # This test uses the valid signature from hsslms interop test 1, and then
[all …]
Dtest_suite_lms.data2 # This test uses a fixed message, and then generates a private key, signs the
7 # This test uses a NULL zero-length message, and then generates a private key,
12 # This test uses data from https://github.com/russhousley/pyhsslms due to the
15 # uses leaf key 0, so must be the first signature generated by the key if the
39 # The signature uses leaf key 1, so must be the second signature generated by
52 # This test uses data from https://github.com/russhousley/pyhsslms due to the limited
55 # uses leaf key 2, so must be the third signature generated by the key if the
83 # This test uses data from https://github.com/cisco/hash-sigs due to the
87 # signature uses leaf key 0, so must be the first signature generated by the key
111 # This test uses data from https://github.com/cisco/hash-sigs due to the
[all …]
Dtest_suite_psa_crypto_entropy.data5 # implementation of the algorithm that uses randomization, whether it's
6 # because the algorithm is randomized or because our implementation uses
Dtest_suite_rsa.function744 /* This test uses an insecure RNG, suitable only for testing.
969 /* This test uses an insecure RNG, suitable only for testing.
980 /* This test uses an insecure RNG, suitable only for testing.
1171 /* This test uses an insecure RNG, suitable only for testing.
1356 /* This test uses an insecure RNG, suitable only for testing.
1367 /* This test uses an insecure RNG, suitable only for testing.
Dtest_suite_psa_crypto_init.function33 /* PSA crypto uses the HMAC_DRBG module. It reads from the entropy source twice:
40 /* PSA crypto uses the CTR_DRBG module. In some configurations, it needs
Dtest_suite_psa_crypto_slot_management.data129 # writing, this happens in builds where AES uses a PSA driver and the
130 # PSA RNG uses AES-CTR_DRBG through the PSA AES.
Dtest_suite_net.function127 /* mbedtls_net_recv_timeout() uses select() and fd_set in the same way. */
Dtest_suite_psa_crypto_entropy.function104 * or because the implementation uses blinding. */
Dtest_suite_pkwrite.function95 * uses "\n" for newlines in both Windows and Linux.
Dtest_suite_psa_crypto_se_driver_hal_mocks.function87 * 0, which file-based storage uses as a temporary file. */
/mbedtls-latest/3rdparty/p256-m/p256-m/
DREADME.md41 - The API uses arrays of octets for all input and output.
56 - Testing also uses dynamic analysis: valgrind, ASan, MemSan, UBSan.
92 depends on the value of operands on cores of interest. Namely, it never uses
93 integer division, and for multiplication by default it only uses 16x16->32 bit
162 that the externally-provided RNG function uses at most 384 bytes of stack).
216 TinyCrypto also uses no heap, only the stack. Here's the RAM used by each
299 - TinyCrypt uses a specialised routine for reduction modulo the curve prime,
303 - TinyCrypt uses Co-Z Jacobian formulas for point operation, which should be
306 - p256-m uses bits of inline assembly for 64-bit multiplication on the
307 platforms used for benchmarking, while TinyCrypt uses only C (and the
[all …]
/mbedtls-latest/programs/
DREADME.md26 …pt.c`](pkey/pk_decrypt.c): loads a PEM or DER public/private key file and uses the key to encrypt/…
28 …ify.c`](pkey/pk_verify.c): loads a PEM or DER private/public key file and uses the key to sign/ver…
34 …/rsa_decrypt.c`](pkey/rsa_decrypt.c): loads an RSA public/private key and uses it to encrypt/decry…
38 …ey/rsa_verify.c`](pkey/rsa_verify.c): loads an RSA private/public key and uses it to sign/verify a…
40 …erify_pss.c`](pkey/rsa_verify_pss.c): loads an RSA private/public key and uses it to sign/verify a…
/mbedtls-latest/tests/src/
Dhelpers.c282 static void mbedtls_test_set_case_uses_negative_0_internal(unsigned uses) in mbedtls_test_set_case_uses_negative_0_internal() argument
287 mbedtls_test_info.case_uses_negative_0 = uses; in mbedtls_test_set_case_uses_negative_0_internal()
/mbedtls-latest/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md20 As a developer of an application that uses Mbed TLS's interfaces (including legacy crypto),
26 As a developer of library code that uses Mbed TLS to perform cryptographic operations,
35 I want to build Mbed TLS in a way that uses my hardware wherever relevant,
64 …`MBEDTLS_AES_C && MBEDTLS_CIPHER_MODE_CBC` for AES-CBC, etc. In code that uses the PSA interfaces,…
97 We can classify code that implements or uses cryptographic mechanisms into several groups:
103 * Code that always uses PSA for crypto: TLS 1.3 (except things common with 1.2), LMS.
195 * For ciphers, the keystore is not initialized yet, and Mbed TLS uses a custom implementation of PS…
330 Note that this applies to TLS 1.3 as well, as some uses of hashes and all uses of ciphers there are…
354 …ded by the standards due to its smaller block size) and CTR-DRBG directly uses the low-level API f…
357 - CTR-DRBG only uses AES (and there is no plan to extend it to other block ciphers at the moment), …
Dstrategy.md49 `psa_crypto_init()` before TLS/X.509 uses PSA functions. (This prevents us
147 layer; the MD layer uses a variant where it dispatches to PSA if a driver is
281 - Step 1 is achieved for the crypto library regarding hashes: everything uses
296 - for ECC, we have no internal uses of the top-level algorithms (ECDSA, ECDH,
393 Unfortunately that's unlikely to fully work. For example, the MD layer uses the
395 distinct operation types. Similarly, the Cipher layer uses the same context
Dpsa-legacy-bridges.md69 …gh-level legacy crypto modules (md, cipher, pk) and need to combine that with uses of the PSA APIs.
183 The pk module uses signature formats intended for X.509. The PSA module uses the simplest sensible …
186 * For ECDSA, PSA uses a fixed-size concatenation of (r,s), whereas X.509 and pk use an ASN.1 DER en…
/mbedtls-latest/3rdparty/p256-m/
DREADME.md1 …ained 32-bit environments. Mbed TLS documentation for integrating drivers uses p256-m as an exampl…
/mbedtls-latest/docs/
Ddriver-only-builds.md47 make sure you call `psa_crypto_init()` before any function that uses the
97 You need to call `psa_crypto_init()` before any crypto operation that uses
105 - for code that uses only the PSA Crypto API: `PSA_WANT_ALG_xxx` from
107 - for code that uses non-PSA crypto APIs: `MBEDTLS_MD_CAN_xxx` from
191 - for code that uses only the PSA Crypto API: `PSA_WANT_ECC_xxx` from
Dpsa-transition.md231 …ementations remain supported in Mbed TLS 3.x even if the application code uses the PSA API. Howeve…
233 …development/docs/psa-driver-example-and-guide.md). In an application that uses both the legacy int…
342 * The legacy API uses the same interface for authenticated and non-authenticated ciphers, while the…
343 * The legacy API uses the same functions for encryption and decryption, while the PSA API has separ…
530 * The legacy API uses the same interface for authenticated and non-authenticated ciphers, while the…
531 * The legacy API uses the same functions for encryption and decryption, while the PSA API has separ…
636 The PSA API uses its internal random generator to generate keys (`psa_generate_key`), nonces for en…
638 If your application mixes uses of the PSA crypto API and the mbedtls API and you need to pass an RN…
647 Unless explicitly configured otherwise, the PSA random generator uses the default entropy sources c…
709 The PSA API uses policies and algorithm parameters rather than key types to distinguish between RSA…
[all …]
Duse-psa-crypto.md43 uses PSA crypto. The parts of the TLS 1.3 code that will use PSA Crypto or not
/mbedtls-latest/
DSECURITY.md121 DES. The pure software implementation in Mbed TLS implementation uses lookup
DREADME.md237 We've included example programs for a lot of different features and uses in [`programs/`](programs/…
298 … option `MBEDTLS_USE_PSA_CRYPTO` in `mbedtls_config.h`. Note that TLS 1.3 uses PSA cryptography fo…
/mbedtls-latest/docs/architecture/
Dpsa-shared-memory.md45 …h of an embedded field) Later, the crypto code reads the length again and uses it without validati…
81 2. The client reads the early output and uses that to calculate the next part of the input.
242 * Write a small program that uses a PSA function which copies inputs or outputs.
455 1. Take 1-2 days to create a basic prototype of a test that uses the approach.
683 Then, we could write a test that uses this function with memory poisoning and ensure that it fails.…
Dalternative-implementations.md47 … For example, if an alternative implementation of asymmetric cryptography uses a different represe…
Dmbed-crypto-storage-specification.md4 This document specifies how Mbed TLS uses storage.
43 The code uses the following constant in an internal header (note that despite the name, this value …

12