/mbedtls-development/tests/suites/ |
A D | test_suite_mdx.data | 23 mbedtls_ripemd160 Test vector from paper #1 26 mbedtls_ripemd160 Test vector from paper #2 29 mbedtls_ripemd160 Test vector from paper #3 32 mbedtls_ripemd160 Test vector from paper #4 35 mbedtls_ripemd160 Test vector from paper #5 38 mbedtls_ripemd160 Test vector from paper #6 41 mbedtls_ripemd160 Test vector from paper #7 44 mbedtls_ripemd160 Test vector from paper #8
|
A D | test_suite_hmac_drbg.misc.data | 61 HMAC_DRBG from buffer SHA-1 65 HMAC_DRBG from buffer SHA-224 69 HMAC_DRBG from buffer SHA-256 73 HMAC_DRBG from buffer SHA-384 77 HMAC_DRBG from buffer SHA-512
|
A D | test_suite_psa_crypto_hash.data | 189 PSA hash finish: RIPEMD160 Test vector from paper #1 193 PSA hash finish: RIPEMD160 Test vector from paper #2 197 PSA hash finish: RIPEMD160 Test vector from paper #3 201 PSA hash finish: RIPEMD160 Test vector from paper #4 205 PSA hash finish: RIPEMD160 Test vector from paper #5 209 PSA hash finish: RIPEMD160 Test vector from paper #6 213 PSA hash finish: RIPEMD160 Test vector from paper #7 217 PSA hash finish: RIPEMD160 Test vector from paper #8 437 PSA hash multi part: RIPEMD160 Test vector from paper #1 441 PSA hash multi part: RIPEMD160 Test vector from paper #2 [all …]
|
A D | test_suite_dhm.data | 30 ## return status from 0 to MBEDTLS_ERR_DHM_BAD_INPUT_DATA. 112 Diffie-Hellman load parameters from file [#1] 115 Diffie-Hellman load parameters from file [#2]
|
A D | test_suite_md.data | 64 generic mbedtls_ripemd160 Test vector from paper #1 68 generic mbedtls_ripemd160 Test vector from paper #2 72 generic mbedtls_ripemd160 Test vector from paper #3 76 generic mbedtls_ripemd160 Test vector from paper #4 80 generic mbedtls_ripemd160 Test vector from paper #5 84 generic mbedtls_ripemd160 Test vector from paper #6 88 generic mbedtls_ripemd160 Test vector from paper #7 92 generic mbedtls_ripemd160 Test vector from paper #8 196 generic multi step mbedtls_ripemd160 Test vector from paper #1 200 generic multi step mbedtls_ripemd160 Test vector from paper #2 [all …]
|
A D | test_suite_psa_crypto_init.function | 15 /* PSA crypto uses the HMAC_DRBG module. It reads from the entropy source twice: 23 * to read from the entropy source twice: once for the initial entropy 64 /* This is a modified version of mbedtls_entropy_init() from entropy.c
|
A D | test_suite_asn1write.function | 329 data_t *needle, int from, int position ) 354 head = pointers[from]; 367 TEST_ASSERT( head == pointers[from] ); 374 TEST_ASSERT( head->next == pointers[from] ); 380 if( found != NULL && found == head && found != pointers[from] )
|
A D | test_suite_timing.function | 25 /* This goto is added to avoid warnings from the generated code. */
|
A D | test_suite_asn1parse.function | 237 /* full_result: expected result from parsing the given string. */ 238 /* overfull_result: expected_result from parsing the given string plus 299 * the payload is truncated more than one byte away from either end, 446 * Test that we don't change from this behavior. If we 587 * two integers: the offset of the element (offset from the start 649 * three integers: the offset of the element's content (offset from 713 data_t *needle, int from, int position ) 731 found = mbedtls_asn1_find_named_data( (const mbedtls_asn1_named_data*) pointers[from],
|
/mbedtls-development/docs/ |
A D | 3.0-migration-guide.md | 1 # Migrating from Mbed TLS 2.x to Mbed TLS 3.0 140 ### Deprecated functions were removed from bignum 146 ### Deprecated functions were removed from DRBGs 160 removed from the library. Please use parameters from RFC3526 (still in the 257 ### Remove the mode parameter from RSA functions 270 ### Deprecated functions were removed from AES 283 ### Deprecated functions were removed from ECDSA 399 ### Deprecated functions were removed from cipher 517 ### Remove the certs module from the library 545 The migration path from that option is to use the [all …]
|
/mbedtls-development/tests/git-scripts/ |
A D | README.md | 7 …d TLS root>/tests/git-scripts` directory, and one must create a soft link from `<mbed TLS root>/.g… 11 Execute the following command to create a link on linux from the mbed TLS `.git/hooks` directory:
|
/mbedtls-development/3rdparty/everest/ |
A D | README.md | 1 The files in this directory stem from [Project Everest](https://project-everest.github.io/) and are… 3 …ation of Curve25519-based handshakes. The C code is automatically derived from the (verified) [ori…
|
/mbedtls-development/programs/test/ |
A D | generate_cpp_dummy_build.sh | 10 Run this program from the root of an Mbed TLS directory tree or from
|
/mbedtls-development/visualc/VS2010/ |
A D | .gitignore | 5 # Files that may be left over from check-generated-files.sh
|
/mbedtls-development/ |
A D | ChangeLog | 17 * Remove certs module from the API. 20 users from using unsafe keys in production. 50 returned from the public SSL API. 525 entropy from the nonce. 924 from psa_crypto.c. Fixes #3300. 1776 CCM test vectors from RAM. 2245 parameters from RFC 3526 or the newly added parameters from RFC 7919. 2500 * Remove macros from compat-1.3.h that correspond to deleted items from most 3015 (use generic functions from md.h) 3043 * Removed r and s from ecdsa_context [all …]
|
A D | CONTRIBUTING.md | 3 We gratefully accept bug reports and contributions from the community. There are some requirements … 13 - The code should be secure, and will be reviewed from a security point of view as well. 23 1. Ensure that each commit has at least one `Signed-off-by:` line from the committer. If anyone els… 34 …oved at some point in the future, notifying users that they should change from the older deprecate… 38 Periodically, the library will remove deprecated functions from the library which will be a breakin… 64 …al test source files (e.g. `test_suite_mpi.c`). These files are generated from a `function file` (…
|
A D | BRANCHES.md | 21 compatibility on major version changes (e.g. from 3.x to 4.0). We also maintain 37 * Removing a field from a structure, unless the field is documented as public. 43 * Changing the behavior of a function from failing to succeeding, when the
|
/mbedtls-development/tests/ |
A D | CMakeLists.txt | 74 # from the generated_data_files list in parent scope. 96 # The output filename of generate_test_code.py is derived from the -d 123 # Include test-specific header files from ./include and private header 124 # files (used by some invasive tests) from ../library. Public header
|
/mbedtls-development/library/ |
A D | pk_wrap.c | 502 static int extract_ecdsa_sig_int( unsigned char **from, const unsigned char *end, in extract_ecdsa_sig_int() argument 508 if( ( ret = mbedtls_asn1_get_tag( from, end, &unpadded_len, in extract_ecdsa_sig_int() 514 while( unpadded_len > 0 && **from == 0x00 ) in extract_ecdsa_sig_int() 516 ( *from )++; in extract_ecdsa_sig_int() 525 memcpy( to + padding_len, *from, unpadded_len ); in extract_ecdsa_sig_int() 526 ( *from ) += unpadded_len; in extract_ecdsa_sig_int()
|
/mbedtls-development/tests/scripts/ |
A D | docker_env.sh | 72 --cache-from=${DOCKER_IMAGE_TAG} \
|
/mbedtls-development/programs/test/cmake_package/ |
A D | CMakeLists.txt | 31 # link to them from our own program.
|
/mbedtls-development/scripts/data_files/ |
A D | error.fmt | 46 /* Extract the high-level part from the error code. */ 69 /* Extract the low-level part from the error code. */
|
/mbedtls-development/programs/test/cmake_package_install/ |
A D | CMakeLists.txt | 34 # link to them from our own program.
|
/mbedtls-development/docs/architecture/ |
A D | tls13-experimental.md | 36 TODO: Add some test vectors from RFC 8448. 46 * The traffic {Key,IV} generation from secret 48 tested in `test_suite_ssl` using test vectors from RFC 8448 and 290 - the macros to extract a byte from a multi-byte integer MBEDTLS_BYTE_{0-8}. 293 - the macros to read from memory a multi-byte integer in big-endian order 297 - the macro to check for data when reading from an input buffer 323 (https://github.com/ARMmbed/mbedtls/pull/4882#discussion_r701704527) from
|
/mbedtls-development/ChangeLog.d/ |
A D | psa_gcm_buffer_limitation.txt | 6 * Move GCM's update output buffer length verification from PSA AEAD to
|