| /mbedtls/tests/suites/ |
| A D | test_suite_timing.function | 22 struct mbedtls_timing_hr_time time; 24 memset(&time, 0, sizeof(time)); 26 (void) mbedtls_timing_get_timer(&time, 1); 28 /* Check that a non-zero time was written back */ 30 for (size_t i = 0; i < sizeof(time); i++) { 31 all_zero &= ((unsigned char *) &time)[i] == 0; 35 (void) mbedtls_timing_get_timer(&time, 0);
|
| A D | test_suite_platform.function | 4 * underlying operating system, the time routines are not always reliable, 17 #include <time.h> 104 * `mbedtls_time()` was defined as c99 function `time()`, returns the number 106 * from automatic drift adjustment or time setting system call. The POSIX.1
|
| A D | test_suite_version.data | 1 Check compile time library version
|
| A D | main_test.function | 156 * DISPATCH_UNSUPPORTED_SUITE if not compile time enabled. 187 * \brief Checks if test function is supported in this build-time 194 * DISPATCH_UNSUPPORTED_SUITE if not compile time enabled.
|
| A D | test_suite_x509parse.function | 1589 mbedtls_x509_time time; 1595 memset(&time, 0x00, sizeof(time)); 1603 TEST_EQUAL(mbedtls_x509_get_time(&start, end, &time), ret); 1605 TEST_EQUAL(year, time.year); 1606 TEST_EQUAL(mon, time.mon); 1607 TEST_EQUAL(day, time.day); 1608 TEST_EQUAL(hour, time.hour); 1609 TEST_EQUAL(min, time.min); 1610 TEST_EQUAL(sec, time.sec);
|
| A D | test_suite_x509parse.data | 3170 X509 Get time (UTC no issues) 3194 X509 Get time (UTC invalid hour) 3198 X509 Get time (UTC invalid min) 3202 X509 Get time (UTC invalid sec) 3206 X509 Get time (UTC without time zone) 3210 X509 Get time (UTC with invalid time zone #1) 3214 X509 Get time (UTC with invalid time zone #2) 3222 X509 Get time (UTC, truncated) 3230 X509 Get time (UTC without seconds) 3234 X509 Get time (UTC without seconds and with invalid time zone #1) [all …]
|
| /mbedtls/include/mbedtls/ |
| A D | platform_time.h | 57 extern mbedtls_time_t (*mbedtls_time)(mbedtls_time_t *time); 66 int mbedtls_platform_set_time(mbedtls_time_t (*time_func)(mbedtls_time_t *time)); 71 #define mbedtls_time time
|
| /mbedtls/docs/architecture/testing/ |
| A D | invasive-testing.md | 36 … depend on `MBEDTLS_TEST_HOOKS` (see [“rules for compile-time options”](#rules-for-compile-time-op… 49 > # and not expected to be raised any time soon) is less than the maximum 53 ### Rules for compile-time options 67 … can be replaced at compile time to support alternative platforms, the test code should be compati… 180 …tation is that the test-only interfaces must not be hidden at link time (but link-time hiding is n… 207 ### Compile-time options 221 #### Guidelines for compile-time options 223 * **Minimize the number of compile-time options.**<br> 225 * **Merely enabling the compile-time option should not change the behavior.**<br> 235 * We can inject external libraries at link time. This can be a way to make system functions fail. [all …]
|
| /mbedtls/docs/architecture/ |
| A D | alternative-implementations.md | 4 This document describes how parts of the Mbed TLS functionality can be replaced at compile time to … 34 You can replace the code of some modules of Mbed TLS at compile time by a custom implementation. Th… 37 * Enable `MBEDTLS_XXX_ALT` in the compile-time configuration where XXX is the module name. For exam… 72 …the function will not be compiled, and you must provide an alternative implementation at link time. 74 For example, enable `MBEDTLS_AES_ENCRYPT_ALT` at compile time and provide your own implementation o… 84 * Define the symbol `MBEDTLS_PLATFORM_XXX_ALT` at compile time. 87 …, to provide a custom `printf` function at run time, enable `MBEDTLS_PLATFORM_PRINTF_ALT` at compi…
|
| /mbedtls/ |
| A D | BRANCHES.md | 3 At any point in time, we have a number of maintained branches, currently consisting of: 12 - One or more long-time support (LTS) branches: these only get bug fixes and 41 compile-time configuration (`mbedtls/mbedtls_config.h`) or the same modified 42 compile-time configuration. Changing compile-time configuration options can 88 ## Long-time support branches
|
| A D | BUGS.md | 11 or a long-time support branch.
|
| /mbedtls/programs/fuzz/ |
| A D | common.c | 9 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time) in dummy_constant_time() argument 11 (void) time; in dummy_constant_time()
|
| A D | common.h | 16 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time);
|
| /mbedtls/docs/proposed/ |
| A D | psa-conditional-inclusion-c.md | 4 This document is a proposed interface for deciding at build time which cryptographic mechanisms to … 98 …is an error to require an ECC key type but no curve, and Mbed TLS will reject this at compile time. 106 …y particular group, so reducing the number of available groups at compile time only saves a little… 169 #### Compile-time checks 195 At the time of writing, the preferred configuration mechanism for a PSA service is in JSON syntax. … 231 Is it realistic to mandate a compile-time error if a key type is required, but no matching algorith… 247 time-stamp-line-limit: 40 248 time-stamp-start: "Time-stamp: *\"" 249 time-stamp-end: "\"" 250 time-stamp-format: "%04Y/%02m/%02d %02H:%02M:%02S %Z" [all …]
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | testing.md | 23 a decision is made at run-time about whether to use the PSA or legacy code 25 via PSA while some others weren't, with a run-time fallback. In this case, it's 27 right decision was made at run-time, i. e. that we didn't use the fallback for 98 However, if additional logic is involved, or there are run-time decisions about
|
| A D | strategy.md | 28 Compile-time options 31 We currently have a few compile-time options that are relevant to the migration: 66 At the time of writing (early 2022) it is unclear what could be done about the 70 solutions would probably also solve other problems at the same time.) 155 This strategy will probably be used for some time for the PK layer, while we 196 still stored outside of PSA most of the time, supporting only G1). 256 3. Adapt compile-time guards used to query availability of a given algorithm; 486 combination of both, perhaps evolving gradually over time.
|
| /mbedtls/library/ |
| A D | ssl_cookie.c | 160 const unsigned char time[4], in ssl_cookie_hmac() 169 mbedtls_md_hmac_update(hmac_ctx, time, 4) != 0 || in ssl_cookie_hmac()
|
| A D | platform_util.c | 240 return time(NULL) * 1000; in mbedtls_ms_time()
|
| /mbedtls/3rdparty/everest/include/everest/kremlin/internal/ |
| A D | target.h | 53 return (int32_t)time(NULL); in krml_time()
|
| /mbedtls/3rdparty/p256-m/p256-m/ |
| A D | README.md | 77 validating that points lie on the curve every time a point is deserialized. 91 p256-m also avoid instructions (or library functions) whose execution time 94 unsigned multiplication. On cores which have a constant-time 32x32->64 bit 96 be defined by the user at compile-time to take advantage of it in order to 103 2. attackers who can also measure the total computation time of the operation; 289 p256-m is fully constant-time from the ground up so should be more robust 351 constant-time behaviour with respect to the value being inverted. 529 - 32-bit unsigned addition and subtraction with carry are constant time. 530 - 16x16->32-bit unsigned multiplication is available and constant time.
|
| /mbedtls/programs/ssl/ |
| A D | ssl_context_info.c | 274 void print_time(const uint64_t *time) in print_time() argument 278 struct tm *t = gmtime((time_t *) time); in print_time() 287 (void) time; in print_time()
|
| A D | ssl_test_lib.h | 108 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time);
|
| A D | ssl_test_lib.c | 41 mbedtls_time_t dummy_constant_time(mbedtls_time_t *time) in dummy_constant_time() argument 43 (void) time; in dummy_constant_time()
|
| /mbedtls/docs/ |
| A D | use-psa-crypto.md | 1 This document describes the compile-time configuration option 17 at any time. 52 **Historical note:** This option was introduced at a time when PSA Crypto was
|
| /mbedtls/scripts/ |
| A D | ci.requirements.txt | 14 # At the time of writing, only needed for tests/scripts/audit-validity-dates.py.
|