/mbedtls-development/3rdparty/everest/library/ |
A D | x25519.c | 66 uint8_t base[MBEDTLS_X25519_KEY_SIZE_BYTES] = {0}; in mbedtls_x25519_make_params() local 80 base[0] = 9; in mbedtls_x25519_make_params() 81 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_params() 83 base[0] = 0; in mbedtls_x25519_make_params() 84 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES) == 0 ) in mbedtls_x25519_make_params() 151 unsigned char base[MBEDTLS_X25519_KEY_SIZE_BYTES] = { 0 }; in mbedtls_x25519_make_public() local 164 base[0] = 9; in mbedtls_x25519_make_public() 165 Hacl_Curve25519_crypto_scalarmult( buf, ctx->our_secret, base ); in mbedtls_x25519_make_public() 167 base[0] = 0; in mbedtls_x25519_make_public() 168 if( memcmp( buf, base, MBEDTLS_X25519_KEY_SIZE_BYTES ) == 0 ) in mbedtls_x25519_make_public()
|
/mbedtls-development/programs/ssl/ |
A D | ssl_mail_client.c | 364 unsigned char base[1024]; in main() local 369 unsigned char buf[sizeof( base ) + 2]; in main() 738 … ret = mbedtls_base64_encode( base, sizeof( base ), &n, (const unsigned char *) opt.user_name, in main() 745 len = sprintf( (char *) buf, "%s\r\n", base ); in main() 758 ret = mbedtls_base64_encode( base, sizeof( base ), &n, (const unsigned char *) opt.user_pwd, in main() 765 len = sprintf( (char *) buf, "%s\r\n", base ); in main()
|
/mbedtls-development/library/ |
A D | cipher.c | 156 if( def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values() 208 ctx->cipher_info->base->ctx_free_func( ctx->cipher_ctx ); in mbedtls_cipher_free() 222 if( NULL == ( ctx->cipher_ctx = cipher_info->base->ctx_alloc_func() ) ) in mbedtls_cipher_setup() 360 return( ctx->cipher_info->base->setkey_enc_func( ctx->cipher_ctx, key, in mbedtls_cipher_setkey() 365 return( ctx->cipher_info->base->setkey_dec_func( ctx->cipher_ctx, key, in mbedtls_cipher_setkey() 570 if( 0 != ( ret = ctx->cipher_info->base->ecb_func( ctx->cipher_ctx, in mbedtls_cipher_update() 704 if( 0 != ( ret = ctx->cipher_info->base->cfb_func( ctx->cipher_ctx, in mbedtls_cipher_update() 720 if( 0 != ( ret = ctx->cipher_info->base->ofb_func( ctx->cipher_ctx, in mbedtls_cipher_update() 735 if( 0 != ( ret = ctx->cipher_info->base->ctr_func( ctx->cipher_ctx, in mbedtls_cipher_update() 756 ret = ctx->cipher_info->base->xts_func( ctx->cipher_ctx, in mbedtls_cipher_update() [all …]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_entropy.data | 16 Entropy write/update seed file: base NV seed file
|
A D | test_suite_ecp.function | 106 * important to test both base point and random point, though, as memory 116 * - Cold base point mult: ~3300M 117 * - Hot base point mult: ~1100M 163 /* Non-base point case */
|
A D | test_suite_mpi.data | 853 Base test mbedtls_mpi_sub_mpi #3 (Test with negative base) 1234 Base test mbedtls_mpi_exp_mod #4 (Negative base) 1240 Base test mbedtls_mpi_exp_mod #6 (Negative base + exponent) 1307 Test mbedtls_mpi_exp_mod (Negative base) [#1] 1310 Test mbedtls_mpi_exp_mod (Negative base) [#2]
|
A D | test_suite_entropy.function | 90 * NV seed read/write helpers that fill the base seedfile
|
A D | test_suite_mpi.function | 79 /* Test whether bytes represents (in big-endian base 256) a number b that
|
A D | test_suite_psa_crypto.data | 727 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg 731 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different hash base) 735 PSA key policy: HMAC, sign-verify, min-length policy, unmatched base alg (different algorithm) 839 PSA key policy: AEAD, min-length policy, unmatched base alg
|
A D | test_suite_psa_crypto.function | 6904 /* Create base key */
|
/mbedtls-development/ChangeLog.d/ |
A D | 00README.md | 22 * Changes to parts of the code base that users don't interact with directly,
|
/mbedtls-development/include/mbedtls/ |
A D | cipher.h | 314 const mbedtls_cipher_base_t *MBEDTLS_PRIVATE(base);
|
/mbedtls-development/tests/ |
A D | CMakeLists.txt | 19 # Get base names for generated files (starting at "suites/")
|
/mbedtls-development/docs/proposed/ |
A D | psa-conditional-inclusion-c.md | 103 …he base mechanism is supported. Parameters must themselves be included through their own `PSA_WANT…
|
/mbedtls-development/docs/architecture/testing/ |
A D | psa-storage-format-testing.md | 35 Test cases should normally not be removed from the code base: if something has worked before, it sh…
|
/mbedtls-development/doxygen/ |
A D | mbedtls.doxyfile | 53 # base path where the generated documentation will be put. 126 # operators of the base classes will not be shown. 396 # 'anonymous_namespace{file}', where file will be replaced with the base 934 # that these files will be copied to the base HTML output directory. Use the 1694 # generate a inheritance diagram (in HTML, RTF and LaTeX) for classes with base 1725 # base this on the number of processors available in the system. You can set it
|
/mbedtls-development/docs/architecture/ |
A D | tls13-experimental.md | 370 split them to ease their search in the code base.
|
/mbedtls-development/ |
A D | ChangeLog | 613 * In PSA, allow using a key declared with a base key agreement algorithm 804 enclave) could bypass an existing counter-measure (base blinding) and 2032 * Add the order of the base point as N in the mbedtls_ecp_group structure 2457 * Fix incorrect sign computation in modular exponentiation when the base is 4010 * Added base Galois Counter Mode (GCM) for AES 4051 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket 4117 * mpi_exp_mod() now correctly handles negative base numbers (Closes ticket 4390 * Added const correctness for main code base
|