Home
last modified time | relevance | path

Searched refs:group (Results 1 – 25 of 39) sorted by relevance

12

/mbedtls/docs/
A Dpsa-transition.md275 [`PSA_KEY_TYPE_ARIA`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__…
459 …[`PSA_KEY_TYPE_ARIA`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group_…
762group)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type…
764group)`](https://mbed-tls.readthedocs.io/projects/api/en/development/api/group/group__crypto__type…
766 …PI only supports Diffie-Hellman with predefined groups. A group is fully determined by a group fam…
768 | Mbed TLS DH group P value | PSA DH group family | Bit-size |
1090 …* [`PSA_KEY_TYPE_DH_KEY_PAIR(group)`](https://mbed-tls.readthedocs.io/projects/api/en/development/…
1155 2. Call `mbedtls_ecdh_setup` or `mbedtls_dhm_set_group` to select the curve or group.
1167 3. Format a ServerKeyExchange message containing the curve/group selection and our public key.
1189 …he selected curve/group and use this to determine a PSA key type (`PSA_KEY_TYPE_ECC_KEY_PAIR(curve…
[all …]
/mbedtls/scripts/mbedtls_dev/
A Dc_parsing_helper.py45 self.type = self.normalize_type(m.group('type')) #type: str
46 self.name = m.group('name') #type: Optional[str]
47 self.suffix = m.group('suffix') if m.group('suffix') else '' #type: str
91 lambda m: re.sub(_NOT_NEWLINES_RE, "", m.group(0)),
120 qualifiers = m.group('qualifiers').split()
121 return_type = m.group('return_type')
122 name = m.group('name')
123 arguments = m.group('arguments').split(',')
A Dcrypto_knowledge.py92 self.name = m.group(1)
93 params = m.group(2).split(',')
109 self.head = re.sub(r'_(?:PUBLIC_KEY|KEY_PAIR)\Z', r'', m.group(1))
313 expr = m.group(1)
326 head = m.group(1)
331 head = m.group(1)
424 kdf_alg = m.group(1)
466 return int(m.group(1)) // 8
494 max_length = cls.hash_length(m.group(1))
512 base = m.group('base')
[all …]
A Dmacro_collector.py470 name = m.group(1)
476 dest = self.table_by_prefix.get(m.group(2))
480 if m.group(3):
481 self.argspecs[name] = self._argument_split(m.group(3))
539 self.add_test_case_line(m.group(1), m.group(2))
/mbedtls/scripts/
A Dconfig.py426 elif m.group('section'):
427 self.current_section = m.group('section')
430 active = not m.group('commented_out')
431 name = m.group('name')
432 value = m.group('value')
434 m.group('indentation'),
435 m.group('define') + name +
436 m.group('arguments') + m.group('separator'))
A Dgenerate_ssl_debug_helpers.py32 return match.group()
153 group=match.groupdict())
155 def __init__(self, source_code, span=None, group=None): argument
156 assert isinstance(group, dict)
157 prefix_name = group.get('prefix_name', None)
158 suffix_name = group.get('suffix_name', None)
159 body = group.get('body', None)
A Dassemble_changelog.py133 top_version_title = m.group(1)
134 top_version_body = m.group(2)
135 name = re.match(cls._name_re, top_version_title).group(1)
165 return [CategoryContent(title_match.group(1), title_line,
309 return m.group(0)
/mbedtls/programs/psa/
A Dpsa_constant_names.c68 static const char *psa_dh_family_name(psa_dh_family_t group);
92 psa_dh_family_t group) in append_with_group() argument
94 const char *group_name = psa_dh_family_name(group); in append_with_group()
102 "0x%02x", group); in append_with_group()
161 psa_dh_family_t group) in psa_snprint_dh_group() argument
163 const char *name = psa_dh_family_name(group); in psa_snprint_dh_group()
165 return snprintf(buffer, buffer_size, "0x%02x", (unsigned) group); in psa_snprint_dh_group()
A Dpsa_constant_names_generated.c49 static const char *psa_dh_family_name(psa_dh_family_t group) in psa_dh_family_name() argument
51 switch (group) { in psa_dh_family_name()
/mbedtls/tests/scripts/
A Dcheck_names.py390 if macro.group("macro").startswith(exclusions):
398 macro.group("macro")))
436 name.group(0)))
492 enum_const.group("enum_const")))
531 lambda s: '""' if s.group('string') else ' ',
618 for group in identifier.groups():
619 if not group:
627 group))
763 symbols.append(symbol.group("symbol"))
796 for group, check_pattern in pattern_checks:
[all …]
A Dgenerate_test_code.py433 dependencies = parse_dependencies(match.group('dependencies'))
458 dep_str = match.group('depends_on')
462 dependencies += parse_dependencies(match.group('dependencies'))
526 arg_list = m.group(1).strip()
639 name = match.group('func_name')
744 lambda m: m.group(1) or '\n', inp_str,
794 match.group('dependencies'))
833 _defined = '' if dependency.group(2) else 'defined'
834 _cond = dependency.group(2) if dependency.group(2) else ''
835 _value = dependency.group(3) if dependency.group(3) else ''
[all …]
A Dcheck_files.py182 interpreter = m.group(1) or m.group(2)
425 if m and m.group(1) != self.COPYRIGHT_HOLDER:
431 if m.group(1) != self.SPDX_HEADER_KEY:
434 if not m.group(3):
437 if m.group(3) != self.LICENSE_IDENTIFIER:
A Daudit-validity-dates.py37 if match is None or int(match.group(0)) < 35:
151 return m.group('type').decode('UTF-8')
361 if not X509Parser.check_hex_string(match.group('data')):
363 audit_data = self.parse_bytes(bytes.fromhex(match.group('data')))
A Dset_psa_test_dependencies.py206 arguments = content_matches[-1].group(0).split(':')
222 old_dependencies = dependencies_match.group(0).split(':')
A Ddepends.py375 if m and m.group(1) not in ['NONE', 'NULL', '3DES']:
376 self.base_symbols.add('MBEDTLS_' + m.group(1) + '_C')
A Dcheck_test_cases.py201 re.search(br'[\t;]', description).group(0).decode('ascii'))
/mbedtls/library/
A Dssl_tls13_server.c934 uint16_t group; in ssl_tls13_parse_key_shares_ext() local
945 group = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_key_shares_ext()
956 !mbedtls_ssl_named_group_is_supported(group) || in ssl_tls13_parse_key_shares_ext()
964 if (mbedtls_ssl_tls13_named_group_is_ecdhe(group) || in ssl_tls13_parse_key_shares_ext()
965 mbedtls_ssl_tls13_named_group_is_ffdh(group)) { in ssl_tls13_parse_key_shares_ext()
968 group)); in ssl_tls13_parse_key_shares_ext()
977 (unsigned) group)); in ssl_tls13_parse_key_shares_ext()
981 ssl->handshake->offered_group_id = group; in ssl_tls13_parse_key_shares_ext()
2129 uint16_t group = ssl->handshake->offered_group_id; in ssl_tls13_write_key_share_ext() local
2139 group)); in ssl_tls13_write_key_share_ext()
[all …]
A Dssl_tls13_client.c308 unsigned char *group = p; in ssl_tls13_write_key_share_ext() local
326 MBEDTLS_PUT_UINT16_BE(group_id, group, 0); in ssl_tls13_write_key_share_ext()
328 MBEDTLS_PUT_UINT16_BE(key_exchange_len, group, 2); in ssl_tls13_write_key_share_ext()
471 uint16_t group, offered_group; in ssl_tls13_parse_key_share_ext() local
478 group = MBEDTLS_GET_UINT16_BE(p, 0); in ssl_tls13_parse_key_share_ext()
483 if (offered_group != group) { in ssl_tls13_parse_key_share_ext()
486 (unsigned) offered_group, (unsigned) group)); in ssl_tls13_parse_key_share_ext()
493 if (mbedtls_ssl_tls13_named_group_is_ecdhe(group) || in ssl_tls13_parse_key_share_ext()
494 mbedtls_ssl_tls13_named_group_is_ffdh(group)) { in ssl_tls13_parse_key_share_ext()
496 ("DHE group name: %s", mbedtls_ssl_named_group_to_str(group))); in ssl_tls13_parse_key_share_ext()
A Dx509_crt.c2735 uint16_t group = num_digits = 0; in x509_inet_pton_ipv6() local
2740 group = (group << 4) | digit; in x509_inet_pton_ipv6()
2744 MBEDTLS_PUT_UINT16_BE(group, addr, nonzero_groups); in x509_inet_pton_ipv6()
/mbedtls/tests/suites/
A Dtest_suite_ecp.data404 ECP tls read group #1 (record too short)
407 ECP tls read group #2 (bad curve_type)
410 ECP tls read group #3 (unknown curve)
413 ECP tls read group #4 (OK, buffer just fits)
421 ECP tls write-read group #1
425 ECP tls write-read group #2
509 ECP check public-private #2 (group none)
602 ECP set public key: invalid group (0)
605 ECP set public key: valid group (secp256r1)
613 ECP set public key: bad group (not in enum)
[all …]
A Dtest_suite_psa_crypto_not_supported.generated.data931 PSA import DH_KEY_PAIR(RFC7919) 2048-bit group not supported
935 PSA generate DH_KEY_PAIR(RFC7919) 2048-bit group not supported
939 PSA import DH_KEY_PAIR(RFC7919) 3072-bit group not supported
943 PSA generate DH_KEY_PAIR(RFC7919) 3072-bit group not supported
947 PSA import DH_KEY_PAIR(RFC7919) 4096-bit group not supported
951 PSA generate DH_KEY_PAIR(RFC7919) 4096-bit group not supported
955 PSA import DH_KEY_PAIR(RFC7919) 6144-bit group not supported
959 PSA generate DH_KEY_PAIR(RFC7919) 6144-bit group not supported
963 PSA import DH_KEY_PAIR(RFC7919) 8192-bit group not supported
967 PSA generate DH_KEY_PAIR(RFC7919) 8192-bit group not supported
[all …]
A Dtest_suite_psa_crypto_metadata.function705 psa_dh_family_t group = group_arg;
706 psa_key_type_t public_type = PSA_KEY_TYPE_DH_PUBLIC_KEY(group);
707 psa_key_type_t pair_type = PSA_KEY_TYPE_DH_KEY_PAIR(group);
709 TEST_PARITY(group);
714 TEST_EQUAL(PSA_KEY_TYPE_DH_GET_FAMILY(public_type), group);
715 TEST_EQUAL(PSA_KEY_TYPE_DH_GET_FAMILY(pair_type), group);
A Dtest_suite_ecp.function865 // Load group
868 // Compare group with expected parameters
904 // Read group from buffer and compare with expected ID
923 // Copy group and compare with original
927 // Check curve is in curve list and group ID list
1499 /* Check consistency with the group id */
/mbedtls/include/psa/
A Dcrypto_values.h707 #define PSA_KEY_TYPE_DH_KEY_PAIR(group) \ argument
708 (PSA_KEY_TYPE_DH_KEY_PAIR_BASE | (group))
714 #define PSA_KEY_TYPE_DH_PUBLIC_KEY(group) \ argument
715 (PSA_KEY_TYPE_DH_PUBLIC_KEY_BASE | (group))
/mbedtls/docs/architecture/
A Dpsa-crypto-implementation-structure.md103 …enting a new mechanism should be to approach the PSA Cryptography working group in Arm for standar…
107 …he feasibility of the upcoming PSA standard. The PSA Cryptography working group and the Mbed TLS d…
119group families (`PSA_DH_FAMILY_xxx`). If Mbed TLS defines an algorithm or a key type that is not p…

Completed in 100 milliseconds

12