Searched refs:been (Results 1 – 25 of 64) sorted by relevance
123
| /openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
| D | list-identifiers.sh | 51 check-names.sh, which used to depend on this script, has been replaced with
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
| D | psa-storage-resilience.md | 17 …been written to the persistent storage. As a consequence, if the system restarts during a sequence… 19 …orts to the application that a key has been created, and the application reports to a server that … 60 3. The secure element reports to the core that the key has been created. 61 4. The core reports to the application that the key has been created. 84 * After step 6: the key has been created successfully. 91 4. The core updates the storage to indicate that the key has been destroyed. 97 * After step 4: the key has been destroyed successfully. 143 …he update of the core's persistent state, as would have been done if the transaction had not been … 146 …he update of the core's persistent state, as would have been done if the transaction had not been … 149 …he update of the core's persistent state, as would have been done if the transaction had not been … [all …]
|
| D | tls13-support.md | 168 (https://mbed-tls.readthedocs.io/en/latest/kb/development/mbedtls-coding-standards). They have been 257 name `p` has been chosen as it was already widely used in TLS code. 384 next handshake message has not been received yet. 389 handshake message may not have been received yet, the handler returns with
|
| /openthread-latest/third_party/mbedtls/repo/programs/test/cmake_subproject/ |
| D | CMakeLists.txt | 14 # Link against all the Mbed TLS libraries. Verifies that the targets have been
|
| /openthread-latest/third_party/mbedtls/repo/docs/ |
| D | 3.0-migration-guide.md | 35 of these variants have been renamed without the suffix. The section 36 …_*_ret...](#rename-mbedtls__ret-cryptography-functions-whose-deprecated-variants-have-been-removed) 114 This feature has been removed. The library no longer checks for NULL pointers; 149 This only affects people who've been using Mbed TLS since before version 2.0 239 …ng of whole 16-byte blocks except for the last block (this limitation has been lifted). In this ca… 318 ### Rename `mbedtls_*_ret()` cryptography functions whose deprecated variants have been removed 526 implementations, and note that `ecp_internal.h` and `rsa_internal.h` have been 536 multi-part operations. Five new API functions have been defined: 633 These versions have been deprecated by RFC 8996. 722 This feature had been broken for a while so we doubt anyone still used it. [all …]
|
| D | psa-driver-example-and-guide.md | 3 As of Mbed TLS 3.4.0, the PSA Driver Interface has only been partially implemented. As a result, th… 25 For some cryptographic operations, this auto-generation logic has already been implemented. When ac… 77 … that have driver wrapper auto-generation implemented, the functions have been replaced with `jinj… 79 **5. If a driver entry point function has been provided then ensure it has the same signature as th… 80 If one has not been provided then write one. Its name should begin with the driver prefix, followed… 141 …ned 32-bit environments. It started out as an independent project and has been integrated in Mbed … 156 … `psa_crypto_driver_wrappers.h.jinja` for all four entry points have also been modified. The code …
|
| /openthread-latest/third_party/mbedtls/repo/programs/test/cmake_package/ |
| D | CMakeLists.txt | 32 # At this point, the Mbed TLS targets should have been imported, and we can now
|
| /openthread-latest/third_party/mbedtls/repo/programs/test/cmake_package_install/ |
| D | CMakeLists.txt | 35 # At this point, the Mbed TLS targets should have been imported, and we can now
|
| /openthread-latest/third_party/mbedtls/repo/ |
| D | BUGS.md | 13 your issue has already been reported. If not, …
|
| D | ChangeLog | 13 PEM) accepted by the pkparse module has been removed. Applications that 331 been called. Previously (in 3.3), this was restricted to a few modules, 335 feature macros, MBEDTLS_MD_CAN_xxx, has been introduced that can be used 412 * Support for "opaque" (PSA-held) ECC keys in the PK module has been 456 timing. (Clang has been seen to do this.) Also introduce assembly 569 the file library/psa_crypto_driver_wrappers.c has been renamed 587 * The default priority order of TLS 1.3 cipher suites has been modified to 870 corresponding new public API call has been added in the library, 891 interface, but had not yet been implemented. 987 * Move some SSL-specific code out of libmbedcrypto where it had been placed [all …]
|
| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_psa_crypto_slot_management.function | 83 /* All keys must have been closed. */ 182 * Key attributes may have been returned by psa_get_key_attributes() 335 * Key attributes may have been returned by psa_get_key_attributes() 411 * Key attributes may have been returned by psa_get_key_attributes() 594 * Source and target key attributes may have been returned by 705 * Key attributes may have been returned by psa_get_key_attributes() 788 * Key attributes may have been returned by psa_get_key_attributes() 1032 * Key attributes may have been returned by psa_get_key_attributes()
|
| D | test_suite_bignum_random.function | 281 * has been generated. Otherwise stats[b] is the number of times a 282 * value with bit b set has been generated. */ 335 /* Assert that each value has been reached at least once. 350 /* Assert that each bit has been set in at least one result and
|
| D | test_suite_bignum_mod.function | 68 /* Only test if the constants have been set-up */ 70 /* Test that the consts have been calculated */ 82 /* Only test if the constants have been set-up */ 84 /* Verify the data and pointers allocated have been properly wiped */ 587 /* modulus->p == NULL || residue->p == NULL ( m has not been set-up ) */
|
| D | test_suite_psa_crypto_persistent_key.function | 245 * Key attributes may have been returned by psa_get_key_attributes() 316 * Key attributes may have been returned by psa_get_key_attributes()
|
| D | test_suite_lmots.data | 148 # message, and then uses a test hook to check that the signature has not been 149 # modifier before the private key has been deleted (which could cause signature
|
| D | test_suite_psa_crypto_se_driver_hal.function | 563 /* The key is in a secure element. If it had been created 577 * Actual key attributes may have been returned by psa_get_key_attributes() 762 * Key attributes may have been returned by psa_get_key_attributes() 980 /* Test that the key has been erased from the designated slot. */ 1072 * Key attributes may have been returned by psa_get_key_attributes() 1435 * Driver key attributes may have been returned by psa_get_key_attributes()
|
| D | test_suite_memory_buffer_alloc.function | 137 * we don't check the size after blocks have been reallocated. */
|
| /openthread-latest/third_party/mbedtls/repo/3rdparty/p256-m/ |
| D | README.md | 3 The files `p256-m.c`, `p256-m.h` and `README.md` have been taken from the `p256-m` repository.
|
| /openthread-latest/src/cli/ |
| D | README_SRP.md | 107 Check if the host and service has been successfully registered on the client node: 154 Confirm on the server node that the service has been removed:
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-thread-safety/ |
| D | psa-thread-safety.md | 5 …pi/crypto/1.1/api/library/library.html#c.psa_crypto_init) thread-safe has been implemented. Implem… 14 - The testing system has now been made thread-safe. Tests can now spin up multiple threads, see [Th… 15 - Some multithreaded testing of the key management API has been added, this is outlined in [Testing… 43 …alling any set of PSA key management functions once `psa_crypto_init` has been called (see the [In… 93 2. The resources from the key have been freed. This allows threads to create similar keys immediate… 166 * `PSA_SLOT_PENDING_DELETION`: the key within the slot has been destroyed or marked for destruction… 198 …ILURE`. If a lock or unlock operation fails after a different failure has been identified, the sta… 207 …` - This function wraps around `psa_reserve_free_key_slot`, if a slot has been found then the slot… 208 * `psa_finish_key_creation` - After the contents of the key have been loaded (again this loading is… 213 …gistered_readers == 0`). When attempting to use a persistent key that has been kicked out of a slo… [all …]
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/ |
| D | md-cipher-dispatch.md | 194 * There is a PSA driver which has not been initialized (this happens in `psa_crypto_init()`). 229 * Possibly additional runtime state (for example, we might check whether `psa_crypto_init` has been… 240 …abled for this hash, or because there is an accelerator driver which has not been initialized yet). 255 …been called. In some limited cases, such as `test_suite_psa_crypto_not_supported` when PSA impleme… 258 …rom an accelerator driver), then SHA-256 only needs to work if `psa_crypto_init()` has been called. 264 …SA only works if the connection to the server has been established, meaning `psa_crypto_init` has … 297 * Mixed-domain code can call PSA code if it knows that `psa_crypto_init()` has been called, without… 350 - Support for CBC ciphersuites in TLS. (They've been recommended against for a while now.) 497 As a starting point, return 1 if PSA crypto's driver subsystem has been initialized. 513 Note that this assumes that an operation that has been started via PSA can be completed. This impli… [all …]
|
| D | psa-limitations.md | 8 subtle-but-important issues have been missed. The only way to be really sure 19 TLS have not yet been adapted to take advantage of the new PSA APIs. See: 49 parameters (P and G) in its ServerKeyExchange message. This has been found to 86 been announced on the mailing-list and got no push-back, see
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/testing/ |
| D | psa-storage-format-testing.md | 5 …ersistent key and read it back later. This must work even if Mbed TLS has been upgraded in the mea… 105 * RSA keys: can invalid DER encodings (e.g. leading zeros, ignored sign bit) have been stored? 106 * RSA private keys: can invalid CRT parameters have been stored?
|
| /openthread-latest/third_party/mbedtls/repo/tests/data_files/ |
| D | Readme-x509.txt | 130 Newer test files have been generated through commands in the Makefile. The 135 The origin of older certificates has not been recorded.
|
| /openthread-latest/third_party/mbedtls/repo/ChangeLog.d/ |
| D | 00README.md | 3 This directory contains changelog entries that have not yet been merged
|
123