| /mbedtls/docs/ |
| A D | psa-transition.md | 275 [`PSA_KEY_TYPE_ARIA`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__… 459 …[`PSA_KEY_TYPE_ARIA`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group_… 762 …group)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type… 764 …group)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type… 766 …PI only supports Diffie-Hellman with predefined groups. A group is fully determined by a group fam… 768 | Mbed TLS DH group P value | PSA DH group family | Bit-size | 1090 …* [`PSA_KEY_TYPE_DH_KEY_PAIR(group)`](https://mbed-tls.readthedocs.io/projects/api/en/development/… 1155 2. Call `mbedtls_ecdh_setup` or `mbedtls_dhm_set_group` to select the curve or group. 1167 3. Format a ServerKeyExchange message containing the curve/group selection and our public key. 1189 …he selected curve/group and use this to determine a PSA key type (`PSA_KEY_TYPE_ECC_KEY_PAIR(curve… [all …]
|
| /mbedtls/scripts/mbedtls_dev/ |
| A D | c_parsing_helper.py | 45 self.type = self.normalize_type(m.group('type')) #type: str 46 self.name = m.group('name') #type: Optional[str] 47 self.suffix = m.group('suffix') if m.group('suffix') else '' #type: str 91 lambda m: re.sub(_NOT_NEWLINES_RE, "", m.group(0)), 120 qualifiers = m.group('qualifiers').split() 121 return_type = m.group('return_type') 122 name = m.group('name') 123 arguments = m.group('arguments').split(',')
|
| A D | crypto_knowledge.py | 92 self.name = m.group(1) 93 params = m.group(2).split(',') 109 self.head = re.sub(r'_(?:PUBLIC_KEY|KEY_PAIR)\Z', r'', m.group(1)) 313 expr = m.group(1) 326 head = m.group(1) 331 head = m.group(1) 424 kdf_alg = m.group(1) 466 return int(m.group(1)) // 8 494 max_length = cls.hash_length(m.group(1)) 512 base = m.group('base') [all …]
|
| A D | macro_collector.py | 470 name = m.group(1) 476 dest = self.table_by_prefix.get(m.group(2)) 480 if m.group(3): 481 self.argspecs[name] = self._argument_split(m.group(3)) 539 self.add_test_case_line(m.group(1), m.group(2))
|
| /mbedtls/scripts/ |
| A D | config.py | 426 elif m.group('section'): 427 self.current_section = m.group('section') 430 active = not m.group('commented_out') 431 name = m.group('name') 432 value = m.group('value') 434 m.group('indentation'), 435 m.group('define') + name + 436 m.group('arguments') + m.group('separator'))
|
| A D | generate_ssl_debug_helpers.py | 32 return match.group() 153 group=match.groupdict()) 155 def __init__(self, source_code, span=None, group=None): argument 156 assert isinstance(group, dict) 157 prefix_name = group.get('prefix_name', None) 158 suffix_name = group.get('suffix_name', None) 159 body = group.get('body', None)
|
| A D | assemble_changelog.py | 133 top_version_title = m.group(1) 134 top_version_body = m.group(2) 135 name = re.match(cls._name_re, top_version_title).group(1) 165 return [CategoryContent(title_match.group(1), title_line, 309 return m.group(0)
|
| /mbedtls/programs/psa/ |
| A D | psa_constant_names.c | 68 static const char *psa_dh_family_name(psa_dh_family_t group); 92 psa_dh_family_t group) in append_with_group() argument 94 const char *group_name = psa_dh_family_name(group); in append_with_group() 102 "0x%02x", group); in append_with_group() 161 psa_dh_family_t group) in psa_snprint_dh_group() argument 163 const char *name = psa_dh_family_name(group); in psa_snprint_dh_group() 165 return snprintf(buffer, buffer_size, "0x%02x", (unsigned) group); in psa_snprint_dh_group()
|
| A D | psa_constant_names_generated.c | 49 static const char *psa_dh_family_name(psa_dh_family_t group) in psa_dh_family_name() argument 51 switch (group) { in psa_dh_family_name()
|
| /mbedtls/tests/scripts/ |
| A D | check_names.py | 390 if macro.group("macro").startswith(exclusions): 398 macro.group("macro"))) 436 name.group(0))) 492 enum_const.group("enum_const"))) 531 lambda s: '""' if s.group('string') else ' ', 618 for group in identifier.groups(): 619 if not group: 627 group)) 763 symbols.append(symbol.group("symbol")) 796 for group, check_pattern in pattern_checks: [all …]
|
| A D | generate_test_code.py | 433 dependencies = parse_dependencies(match.group('dependencies')) 458 dep_str = match.group('depends_on') 462 dependencies += parse_dependencies(match.group('dependencies')) 526 arg_list = m.group(1).strip() 639 name = match.group('func_name') 744 lambda m: m.group(1) or '\n', inp_str, 794 match.group('dependencies')) 833 _defined = '' if dependency.group(2) else 'defined' 834 _cond = dependency.group(2) if dependency.group(2) else '' 835 _value = dependency.group(3) if dependency.group(3) else '' [all …]
|
| A D | check_files.py | 182 interpreter = m.group(1) or m.group(2) 425 if m and m.group(1) != self.COPYRIGHT_HOLDER: 431 if m.group(1) != self.SPDX_HEADER_KEY: 434 if not m.group(3): 437 if m.group(3) != self.LICENSE_IDENTIFIER:
|
| A D | audit-validity-dates.py | 37 if match is None or int(match.group(0)) < 35: 151 return m.group('type').decode('UTF-8') 361 if not X509Parser.check_hex_string(match.group('data')): 363 audit_data = self.parse_bytes(bytes.fromhex(match.group('data')))
|
| A D | set_psa_test_dependencies.py | 206 arguments = content_matches[-1].group(0).split(':') 222 old_dependencies = dependencies_match.group(0).split(':')
|
| A D | depends.py | 375 if m and m.group(1) not in ['NONE', 'NULL', '3DES']: 376 self.base_symbols.add('MBEDTLS_' + m.group(1) + '_C')
|
| A D | check_test_cases.py | 201 re.search(br'[\t;]', description).group(0).decode('ascii'))
|
| /mbedtls/library/ |
| A D | ssl_tls13_server.c | 934 uint16_t group; in ssl_tls13_parse_key_shares_ext() local 945 group = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_key_shares_ext() 956 !mbedtls_ssl_named_group_is_supported(group) || in ssl_tls13_parse_key_shares_ext() 964 if (mbedtls_ssl_tls13_named_group_is_ecdhe(group) || in ssl_tls13_parse_key_shares_ext() 965 mbedtls_ssl_tls13_named_group_is_ffdh(group)) { in ssl_tls13_parse_key_shares_ext() 968 group)); in ssl_tls13_parse_key_shares_ext() 977 (unsigned) group)); in ssl_tls13_parse_key_shares_ext() 981 ssl->handshake->offered_group_id = group; in ssl_tls13_parse_key_shares_ext() 2129 uint16_t group = ssl->handshake->offered_group_id; in ssl_tls13_write_key_share_ext() local 2139 group)); in ssl_tls13_write_key_share_ext() [all …]
|
| A D | ssl_tls13_client.c | 308 unsigned char *group = p; in ssl_tls13_write_key_share_ext() local 326 MBEDTLS_PUT_UINT16_BE(group_id, group, 0); in ssl_tls13_write_key_share_ext() 328 MBEDTLS_PUT_UINT16_BE(key_exchange_len, group, 2); in ssl_tls13_write_key_share_ext() 471 uint16_t group, offered_group; in ssl_tls13_parse_key_share_ext() local 478 group = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_key_share_ext() 483 if (offered_group != group) { in ssl_tls13_parse_key_share_ext() 486 (unsigned) offered_group, (unsigned) group)); in ssl_tls13_parse_key_share_ext() 493 if (mbedtls_ssl_tls13_named_group_is_ecdhe(group) || in ssl_tls13_parse_key_share_ext() 494 mbedtls_ssl_tls13_named_group_is_ffdh(group)) { in ssl_tls13_parse_key_share_ext() 496 ("DHE group name: %s", mbedtls_ssl_named_group_to_str(group))); in ssl_tls13_parse_key_share_ext()
|
| A D | x509_crt.c | 2735 uint16_t group = num_digits = 0; in x509_inet_pton_ipv6() local 2740 group = (group << 4) | digit; in x509_inet_pton_ipv6() 2744 MBEDTLS_PUT_UINT16_BE(group, addr, nonzero_groups); in x509_inet_pton_ipv6()
|
| /mbedtls/tests/suites/ |
| A D | test_suite_ecp.data | 404 ECP tls read group #1 (record too short) 407 ECP tls read group #2 (bad curve_type) 410 ECP tls read group #3 (unknown curve) 413 ECP tls read group #4 (OK, buffer just fits) 421 ECP tls write-read group #1 425 ECP tls write-read group #2 509 ECP check public-private #2 (group none) 602 ECP set public key: invalid group (0) 605 ECP set public key: valid group (secp256r1) 613 ECP set public key: bad group (not in enum) [all …]
|
| A D | test_suite_psa_crypto_not_supported.generated.data | 931 PSA import DH_KEY_PAIR(RFC7919) 2048-bit group not supported 935 PSA generate DH_KEY_PAIR(RFC7919) 2048-bit group not supported 939 PSA import DH_KEY_PAIR(RFC7919) 3072-bit group not supported 943 PSA generate DH_KEY_PAIR(RFC7919) 3072-bit group not supported 947 PSA import DH_KEY_PAIR(RFC7919) 4096-bit group not supported 951 PSA generate DH_KEY_PAIR(RFC7919) 4096-bit group not supported 955 PSA import DH_KEY_PAIR(RFC7919) 6144-bit group not supported 959 PSA generate DH_KEY_PAIR(RFC7919) 6144-bit group not supported 963 PSA import DH_KEY_PAIR(RFC7919) 8192-bit group not supported 967 PSA generate DH_KEY_PAIR(RFC7919) 8192-bit group not supported [all …]
|
| A D | test_suite_psa_crypto_metadata.function | 705 psa_dh_family_t group = group_arg; 706 psa_key_type_t public_type = PSA_KEY_TYPE_DH_PUBLIC_KEY(group); 707 psa_key_type_t pair_type = PSA_KEY_TYPE_DH_KEY_PAIR(group); 709 TEST_PARITY(group); 714 TEST_EQUAL(PSA_KEY_TYPE_DH_GET_FAMILY(public_type), group); 715 TEST_EQUAL(PSA_KEY_TYPE_DH_GET_FAMILY(pair_type), group);
|
| A D | test_suite_ecp.function | 865 // Load group 868 // Compare group with expected parameters 904 // Read group from buffer and compare with expected ID 923 // Copy group and compare with original 927 // Check curve is in curve list and group ID list 1499 /* Check consistency with the group id */
|
| /mbedtls/include/psa/ |
| A D | crypto_values.h | 707 #define PSA_KEY_TYPE_DH_KEY_PAIR(group) \ argument 708 (PSA_KEY_TYPE_DH_KEY_PAIR_BASE | (group)) 714 #define PSA_KEY_TYPE_DH_PUBLIC_KEY(group) \ argument 715 (PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE | (group))
|
| /mbedtls/docs/architecture/ |
| A D | psa-crypto-implementation-structure.md | 103 …enting a new mechanism should be to approach the PSA Cryptography working group in Arm for standar… 107 …he feasibility of the upcoming PSA standard. The PSA Cryptography working group and the Mbed TLS d… 119 …group families (`PSA_DH_FAMILY_xxx`). If Mbed TLS defines an algorithm or a key type that is not p…
|