/mbedtls-3.5.0/tests/suites/ |
D | test_suite_psa_crypto_entropy.function | 22 /* Remove the entropy seed file. Since the library does not expose a way 130 uint8_t *seed = NULL; 138 ASSERT_ALLOC(seed, seed_size); 139 /* fill seed with some data */ 141 seed[i] = i; 146 status = mbedtls_psa_inject_entropy(seed, seed_length_a); 148 status = mbedtls_psa_inject_entropy(seed, seed_length_b); 155 mbedtls_free(seed); 166 uint8_t seed[MBEDTLS_PSA_INJECT_ENTROPY_MIN_SIZE] = { 0 }; 167 /* fill seed with some data */ [all …]
|
D | test_suite_hmac_drbg.misc.data | 21 HMAC_DRBG write/update seed file SHA-1 [#1] 25 HMAC_DRBG write/update seed file SHA-1 [#2] 29 HMAC_DRBG write/update seed file SHA-224 [#1] 33 HMAC_DRBG write/update seed file SHA-224 [#2] 37 HMAC_DRBG write/update seed file SHA-256 [#1] 41 HMAC_DRBG write/update seed file SHA-256 [#2] 45 HMAC_DRBG write/update seed file SHA-384 [#1] 49 HMAC_DRBG write/update seed file SHA-384 [#2] 53 HMAC_DRBG write/update seed file SHA-512 [#1] 57 HMAC_DRBG write/update seed file SHA-512 [#2]
|
D | test_suite_entropy.data | 10 Entropy write/update seed file: good 13 Entropy write/update seed file: nonexistent 16 Entropy write/update seed file: base NV seed file 73 Check NV seed standard IO 76 Check NV seed manually #1 79 Check NV seed manually #2 82 Check NV seed manually #3
|
D | test_suite_lmots.function | 32 data_t *seed) 42 key_id->x, leaf_id, seed->x, seed->len), 0); 55 void lmots_sign_verify_null_msg_test(data_t *key_id, int leaf_id, data_t *seed) 65 key_id->x, leaf_id, seed->x, seed->len), 0); 199 void lmots_reuse_test(data_t *msg, data_t *key_id, int leaf_id, data_t *seed) 206 key_id->x, leaf_id, seed->x, 207 seed->len), 0); 225 data_t *seed) 237 key_id->x, leaf_id, seed->x, 238 seed->len), 0);
|
D | test_suite_psa_crypto_init.data | 1 Create NV seed file 56 NV seed only: less than minimum 59 NV seed only: less than one block 62 NV seed only: just enough 65 Recreate NV seed file
|
D | test_suite_psa_crypto_init.function | 104 /* Skip the NV seed even though it's compiled in. */ 129 static unsigned char seed[ENTROPY_MIN_NV_SEED_SIZE]; 130 TEST_ASSERT(mbedtls_nv_seed_write(seed, sizeof(seed)) >= 0); 271 uint8_t *seed = NULL; 274 ASSERT_ALLOC(seed, seed_size); 275 TEST_ASSERT(mbedtls_nv_seed_write(seed, seed_size) >= 0); 289 mbedtls_free(seed);
|
D | test_suite_lms.function | 12 void lms_sign_verify_test(data_t *msg, data_t *seed) 27 seed->x, seed->len), 0); 45 void lms_sign_verify_null_msg_test(data_t *seed) 60 seed->x, seed->len), 0);
|
D | test_suite_entropy.function | 64 * NV seed read/write functions that use a buffer instead of a file 89 * NV seed read/write helpers that fill the base seedfile 332 /* If the NV seed functionality is enabled, there are two entropy 333 * updates: before and after updating the NV seed. */ 377 /* If the NV seed functionality is enabled, there are two entropy 378 * updates: before and after updating the NV seed. */ 464 // Make sure we read/write NV seed from our buffers 475 // Set the initial NV seed to read
|
D | test_suite_pkcs1_v21.function | 62 data_t *result_str, char *seed, data_t *message_str, 70 ((void) seed);
|
D | test_suite_hmac_drbg.function | 61 /* Set reseed interval before seed */ 91 /* Set reseed interval after seed */
|
D | test_suite_ctr_drbg.function | 243 /* Set reseed interval before seed */ 276 /* Set reseed interval after seed */
|
D | test_suite_psa_crypto_slot_management.data | 115 Open failure: invalid identifier (random seed UID) 150 Create failure: invalid key id (random seed UID)
|
D | test_suite_pkcs1_v15.function | 71 data_t *result_str, char *seed, 79 ((void) seed);
|
/mbedtls-3.5.0/library/ |
D | ctr_drbg.c | 347 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT]; in mbedtls_ctr_drbg_reseed_internal() local 361 memset(seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT); in mbedtls_ctr_drbg_reseed_internal() 364 if (0 != ctx->f_entropy(ctx->p_entropy, seed, ctx->entropy_len)) { in mbedtls_ctr_drbg_reseed_internal() 371 if (0 != ctx->f_entropy(ctx->p_entropy, seed + seedlen, nonce_len)) { in mbedtls_ctr_drbg_reseed_internal() 379 memcpy(seed + seedlen, additional, len); in mbedtls_ctr_drbg_reseed_internal() 384 if ((ret = block_cipher_df(seed, seed, seedlen)) != 0) { in mbedtls_ctr_drbg_reseed_internal() 389 if ((ret = ctr_drbg_update_internal(ctx, seed)) != 0) { in mbedtls_ctr_drbg_reseed_internal() 395 mbedtls_platform_zeroize(seed, sizeof(seed)); in mbedtls_ctr_drbg_reseed_internal()
|
D | hmac_drbg.c | 150 unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; in hmac_drbg_reseed_core() local 170 memset(seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT); in hmac_drbg_reseed_core() 174 seed, ctx->entropy_len)) != 0) { in hmac_drbg_reseed_core() 190 seed + seedlen, in hmac_drbg_reseed_core() 201 memcpy(seed + seedlen, additional, len); in hmac_drbg_reseed_core() 206 if ((ret = mbedtls_hmac_drbg_update(ctx, seed, seedlen)) != 0) { in hmac_drbg_reseed_core() 215 mbedtls_platform_zeroize(seed, seedlen); in hmac_drbg_reseed_core()
|
D | lmots.h | 264 const unsigned char *seed,
|
D | psa_crypto_storage.h | 388 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed,
|
D | psa_crypto_storage.c | 474 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed, in mbedtls_psa_storage_inject_entropy() argument 483 status = psa_its_set(PSA_CRYPTO_ITS_RANDOM_SEED_UID, seed_size, seed, 0); in mbedtls_psa_storage_inject_entropy()
|
D | lmots.c | 606 const unsigned char *seed, in mbedtls_lmots_generate_private_key() argument 671 status = psa_hash_update(&op, seed, seed_size); in mbedtls_lmots_generate_private_key()
|
D | lms.c | 575 void *p_rng, const unsigned char *seed, in mbedtls_lms_generate_private_key() argument 632 idx, seed, seed_size); in mbedtls_lms_generate_private_key()
|
/mbedtls-3.5.0/scripts/mbedtls_dev/ |
D | bignum_data.py | 131 def __gen_safe_prime(bits, seed): argument 143 rng.seed(seed, version=2)
|
/mbedtls-3.5.0/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 27 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only. 31 … nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later version of M… 33 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on… 62 ### Nonvolatile random seed file format for 0.1.0 64 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit… 66 The file format is just the seed as a byte string with no metadata or encoding of any kind. 74 …ff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-f… 104 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only. 121 ### Nonvolatile random seed file format for 1.0.0 123 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit… [all …]
|
/mbedtls-3.5.0/programs/test/ |
D | udp_proxy.c | 174 unsigned int seed; /* seed for "random" events */ member 310 opt.seed = atoi(q); in get_options() 311 if (opt.seed == 0) { in get_options() 803 if (opt.seed == 0) { in main() 805 opt.seed = (unsigned int) mbedtls_time(NULL); in main() 807 opt.seed = 1; in main() 809 mbedtls_printf(" . Pseudo-random seed: %u\n", opt.seed); in main() 812 srand(opt.seed); in main()
|
/mbedtls-3.5.0/ |
D | .gitignore | 1 # Random seed file created by test scripts and sample programs
|
/mbedtls-3.5.0/include/mbedtls/ |
D | lms.h | 380 void *p_rng, const unsigned char *seed,
|