Home
last modified time | relevance | path

Searched refs:strong (Results 1 – 11 of 11) sorted by relevance

/mbedtls/tests/suites/
A Dtest_suite_entropy.data55 Entropy calls: no strong
58 Entropy calls: 1 strong, 1*BLOCK_SIZE
61 Entropy calls: 1 strong, 2*(BLOCK_SIZE/2)
64 Entropy calls: 1 strong, BLOCK_SIZE*1
67 Entropy calls: 1 strong, 2*BLOCK_SIZE to reach threshold
70 Entropy calls: 2 strong, BLOCK_SIZE/2 each
A Dtest_suite_entropy.function321 entropy_dummy_context strong =
332 /* Set strong source that reaches its threshold immediately and
335 &strong, 1,
A Dhelpers.function56 * to initialize some strong entropy source. */
A Dtest_suite_rsa.function745 * In production, always use a cryptographically strong RNG! */
970 * In production, always use a cryptographically strong RNG! */
981 * In production, always use a cryptographically strong RNG! */
1172 * In production, always use a cryptographically strong RNG! */
1357 * In production, always use a cryptographically strong RNG! */
1368 * In production, always use a cryptographically strong RNG! */
/mbedtls/library/
A Dentropy.c84 size_t threshold, int strong) in mbedtls_entropy_add_source() argument
103 ctx->source[idx].strong = strong; in mbedtls_entropy_add_source()
210 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) { in entropy_gather_internal()
314 if (ctx->source[i].strong == MBEDTLS_ENTROPY_SOURCE_STRONG) { in mbedtls_entropy_func()
/mbedtls/include/mbedtls/
A Dentropy.h98 int MBEDTLS_PRIVATE(strong); /**< Is the source strong? */
162 size_t threshold, int strong);
/mbedtls/
A DCONTRIBUTING.md37 …rface which need to be changed are marked as 'deprecated'. If there is a strong reason to replace …
48 …fix should be reworked to avoid the API change. API changes without very strong justification are …
A DChangeLog1992 * Guard against strong local side channel attack against base64 tables by
2540 MBEDTLS_ENTROPY_BLOCK_SIZE bytes or more from strong sources. In the
2543 security if the source is genuinely strong, but less than the expected 64
/mbedtls/docs/architecture/psa-migration/
A Dpsa-limitations.md330 strong security arguments, so it's unclear whether it would be accepted.
A Dmd-cipher-dispatch.md293 There is no strong reason to allow mechanisms available through legacy but not PSA when `MBEDTLS_PS…
/mbedtls/docs/
A D3.0-migration-guide.md130 and make sure your device is provisioned with a strong random seed.

Completed in 31 milliseconds