Home
last modified time | relevance | path

Searched refs:base (Results 1 – 18 of 18) sorted by relevance

/mbedtls-development/3rdparty/everest/library/
A Dx25519.c66 uint8_t base[MBEDTLS_X25519_KEY_SIZE_BYTES] = {0}; in mbedtls_x25519_make_params() local
80 base[0] = 9; in mbedtls_x25519_make_params()
81 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_params()
83 base[0] = 0; in mbedtls_x25519_make_params()
84 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES) == 0 ) in mbedtls_x25519_make_params()
151 unsigned char base[MBEDTLS_X25519_KEY_SIZE_BYTES] = { 0 }; in mbedtls_x25519_make_public() local
164 base[0] = 9; in mbedtls_x25519_make_public()
165 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_public()
167 base[0] = 0; in mbedtls_x25519_make_public()
168 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES ) == 0 ) in mbedtls_x25519_make_public()
/mbedtls-development/programs/ssl/
A Dssl_mail_client.c364 unsigned char base[1024]; in main() local
369 unsigned char buf[sizeof( base ) + 2]; in main()
738 … ret = mbedtls_base64_encode( base, sizeof( base ), &n, (const unsigned char *) opt.user_name, in main()
745 len = sprintf( (char *) buf, "%s\r\n", base ); in main()
758 ret = mbedtls_base64_encode( base, sizeof( base ), &n, (const unsigned char *) opt.user_pwd, in main()
765 len = sprintf( (char *) buf, "%s\r\n", base ); in main()
/mbedtls-development/library/
A Dcipher.c156 if( def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values()
208 ctx->cipher_info->base->ctx_free_func( ctx->cipher_ctx ); in mbedtls_cipher_free()
222 if( NULL == ( ctx->cipher_ctx = cipher_info->base->ctx_alloc_func() ) ) in mbedtls_cipher_setup()
360 return( ctx->cipher_info->base->setkey_enc_func( ctx->cipher_ctx, key, in mbedtls_cipher_setkey()
365 return( ctx->cipher_info->base->setkey_dec_func( ctx->cipher_ctx, key, in mbedtls_cipher_setkey()
570 if( 0 != ( ret = ctx->cipher_info->base->ecb_func( ctx->cipher_ctx, in mbedtls_cipher_update()
704 if( 0 != ( ret = ctx->cipher_info->base->cfb_func( ctx->cipher_ctx, in mbedtls_cipher_update()
720 if( 0 != ( ret = ctx->cipher_info->base->ofb_func( ctx->cipher_ctx, in mbedtls_cipher_update()
735 if( 0 != ( ret = ctx->cipher_info->base->ctr_func( ctx->cipher_ctx, in mbedtls_cipher_update()
756 ret = ctx->cipher_info->base->xts_func( ctx->cipher_ctx, in mbedtls_cipher_update()
[all …]
/mbedtls-development/tests/suites/
A Dtest_suite_entropy.data16 Entropy write/update seed file: base NV seed file
A Dtest_suite_ecp.function106 * important to test both base point and random point, though, as memory
116 * - Cold base point mult: ~3300M
117 * - Hot base point mult: ~1100M
163 /* Non-base point case */
A Dtest_suite_mpi.data853 Base test mbedtls_mpi_sub_mpi #3 (Test with negative base)
1234 Base test mbedtls_mpi_exp_mod #4 (Negative base)
1240 Base test mbedtls_mpi_exp_mod #6 (Negative base + exponent)
1307 Test mbedtls_mpi_exp_mod (Negative base) [#1]
1310 Test mbedtls_mpi_exp_mod (Negative base) [#2]
A Dtest_suite_entropy.function90 * NV seed read/write helpers that fill the base seedfile
A Dtest_suite_mpi.function79 /* Test whether bytes represents (in big-endian base 256) a number b that
A Dtest_suite_psa_crypto.data727 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg
731 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base)
735 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different algorithm)
839 PSA key policy: AEAD, min-length policy, unmatched base alg
A Dtest_suite_psa_crypto.function6904 /* Create base key */
/mbedtls-development/ChangeLog.d/
A D00README.md22 * Changes to parts of the code base that users don't interact with directly,
/mbedtls-development/include/mbedtls/
A Dcipher.h314 const mbedtls_cipher_base_t *MBEDTLS_PRIVATE(base);
/mbedtls-development/tests/
A DCMakeLists.txt19 # Get base names for generated files (starting at "suites/")
/mbedtls-development/docs/proposed/
A Dpsa-conditional-inclusion-c.md103 …he base mechanism is supported. Parameters must themselves be included through their own `PSA_WANT…
/mbedtls-development/docs/architecture/testing/
A Dpsa-storage-format-testing.md35 Test cases should normally not be removed from the code base: if something has worked before, it sh…
/mbedtls-development/doxygen/
A Dmbedtls.doxyfile53 # base path where the generated documentation will be put.
126 # operators of the base classes will not be shown.
396 # 'anonymous_namespace{file}', where file will be replaced with the base
934 # that these files will be copied to the base HTML output directory. Use the
1694 # generate a inheritance diagram (in HTML, RTF and LaTeX) for classes with base
1725 # base this on the number of processors available in the system. You can set it
/mbedtls-development/docs/architecture/
A Dtls13-experimental.md370 split them to ease their search in the code base.
/mbedtls-development/
A DChangeLog613 * In PSA, allow using a key declared with a base key agreement algorithm
804 enclave) could bypass an existing counter-measure (base blinding) and
2032 * Add the order of the base point as N in the mbedtls_ecp_group structure
2457 * Fix incorrect sign computation in modular exponentiation when the base is
4010 * Added base Galois Counter Mode (GCM) for AES
4051 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
4117 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket
4390 * Added const correctness for main code base

Completed in 47 milliseconds