Home
last modified time | relevance | path

Searched refs:seed (Results 1 – 25 of 40) sorted by relevance

12

/mbedtls-3.5.0/tests/suites/
Dtest_suite_psa_crypto_entropy.function22 /* Remove the entropy seed file. Since the library does not expose a way
130 uint8_t *seed = NULL;
138 ASSERT_ALLOC(seed, seed_size);
139 /* fill seed with some data */
141 seed[i] = i;
146 status = mbedtls_psa_inject_entropy(seed, seed_length_a);
148 status = mbedtls_psa_inject_entropy(seed, seed_length_b);
155 mbedtls_free(seed);
166 uint8_t seed[MBEDTLS_PSA_INJECT_ENTROPY_MIN_SIZE] = { 0 };
167 /* fill seed with some data */
[all …]
Dtest_suite_hmac_drbg.misc.data21 HMAC_DRBG write/update seed file SHA-1 [#1]
25 HMAC_DRBG write/update seed file SHA-1 [#2]
29 HMAC_DRBG write/update seed file SHA-224 [#1]
33 HMAC_DRBG write/update seed file SHA-224 [#2]
37 HMAC_DRBG write/update seed file SHA-256 [#1]
41 HMAC_DRBG write/update seed file SHA-256 [#2]
45 HMAC_DRBG write/update seed file SHA-384 [#1]
49 HMAC_DRBG write/update seed file SHA-384 [#2]
53 HMAC_DRBG write/update seed file SHA-512 [#1]
57 HMAC_DRBG write/update seed file SHA-512 [#2]
Dtest_suite_entropy.data10 Entropy write/update seed file: good
13 Entropy write/update seed file: nonexistent
16 Entropy write/update seed file: base NV seed file
73 Check NV seed standard IO
76 Check NV seed manually #1
79 Check NV seed manually #2
82 Check NV seed manually #3
Dtest_suite_lmots.function32 data_t *seed)
42 key_id->x, leaf_id, seed->x, seed->len), 0);
55 void lmots_sign_verify_null_msg_test(data_t *key_id, int leaf_id, data_t *seed)
65 key_id->x, leaf_id, seed->x, seed->len), 0);
199 void lmots_reuse_test(data_t *msg, data_t *key_id, int leaf_id, data_t *seed)
206 key_id->x, leaf_id, seed->x,
207 seed->len), 0);
225 data_t *seed)
237 key_id->x, leaf_id, seed->x,
238 seed->len), 0);
Dtest_suite_psa_crypto_init.data1 Create NV seed file
56 NV seed only: less than minimum
59 NV seed only: less than one block
62 NV seed only: just enough
65 Recreate NV seed file
Dtest_suite_psa_crypto_init.function104 /* Skip the NV seed even though it's compiled in. */
129 static unsigned char seed[ENTROPY_MIN_NV_SEED_SIZE];
130 TEST_ASSERT(mbedtls_nv_seed_write(seed, sizeof(seed)) >= 0);
271 uint8_t *seed = NULL;
274 ASSERT_ALLOC(seed, seed_size);
275 TEST_ASSERT(mbedtls_nv_seed_write(seed, seed_size) >= 0);
289 mbedtls_free(seed);
Dtest_suite_lms.function12 void lms_sign_verify_test(data_t *msg, data_t *seed)
27 seed->x, seed->len), 0);
45 void lms_sign_verify_null_msg_test(data_t *seed)
60 seed->x, seed->len), 0);
Dtest_suite_entropy.function64 * NV seed read/write functions that use a buffer instead of a file
89 * NV seed read/write helpers that fill the base seedfile
332 /* If the NV seed functionality is enabled, there are two entropy
333 * updates: before and after updating the NV seed. */
377 /* If the NV seed functionality is enabled, there are two entropy
378 * updates: before and after updating the NV seed. */
464 // Make sure we read/write NV seed from our buffers
475 // Set the initial NV seed to read
Dtest_suite_pkcs1_v21.function62 data_t *result_str, char *seed, data_t *message_str,
70 ((void) seed);
Dtest_suite_hmac_drbg.function61 /* Set reseed interval before seed */
91 /* Set reseed interval after seed */
Dtest_suite_ctr_drbg.function243 /* Set reseed interval before seed */
276 /* Set reseed interval after seed */
Dtest_suite_psa_crypto_slot_management.data115 Open failure: invalid identifier (random seed UID)
150 Create failure: invalid key id (random seed UID)
Dtest_suite_pkcs1_v15.function71 data_t *result_str, char *seed,
79 ((void) seed);
/mbedtls-3.5.0/library/
Dctr_drbg.c347 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT]; in mbedtls_ctr_drbg_reseed_internal() local
361 memset(seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT); in mbedtls_ctr_drbg_reseed_internal()
364 if (0 != ctx->f_entropy(ctx->p_entropy, seed, ctx->entropy_len)) { in mbedtls_ctr_drbg_reseed_internal()
371 if (0 != ctx->f_entropy(ctx->p_entropy, seed + seedlen, nonce_len)) { in mbedtls_ctr_drbg_reseed_internal()
379 memcpy(seed + seedlen, additional, len); in mbedtls_ctr_drbg_reseed_internal()
384 if ((ret = block_cipher_df(seed, seed, seedlen)) != 0) { in mbedtls_ctr_drbg_reseed_internal()
389 if ((ret = ctr_drbg_update_internal(ctx, seed)) != 0) { in mbedtls_ctr_drbg_reseed_internal()
395 mbedtls_platform_zeroize(seed, sizeof(seed)); in mbedtls_ctr_drbg_reseed_internal()
Dhmac_drbg.c150 unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; in hmac_drbg_reseed_core() local
170 memset(seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT); in hmac_drbg_reseed_core()
174 seed, ctx->entropy_len)) != 0) { in hmac_drbg_reseed_core()
190 seed + seedlen, in hmac_drbg_reseed_core()
201 memcpy(seed + seedlen, additional, len); in hmac_drbg_reseed_core()
206 if ((ret = mbedtls_hmac_drbg_update(ctx, seed, seedlen)) != 0) { in hmac_drbg_reseed_core()
215 mbedtls_platform_zeroize(seed, seedlen); in hmac_drbg_reseed_core()
Dlmots.h264 const unsigned char *seed,
Dpsa_crypto_storage.h388 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed,
Dpsa_crypto_storage.c474 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed, in mbedtls_psa_storage_inject_entropy() argument
483 status = psa_its_set(PSA_CRYPTO_ITS_RANDOM_SEED_UID, seed_size, seed, 0); in mbedtls_psa_storage_inject_entropy()
Dlmots.c606 const unsigned char *seed, in mbedtls_lmots_generate_private_key() argument
671 status = psa_hash_update(&op, seed, seed_size); in mbedtls_lmots_generate_private_key()
Dlms.c575 void *p_rng, const unsigned char *seed, in mbedtls_lms_generate_private_key() argument
632 idx, seed, seed_size); in mbedtls_lms_generate_private_key()
/mbedtls-3.5.0/scripts/mbedtls_dev/
Dbignum_data.py131 def __gen_safe_prime(bits, seed): argument
143 rng.seed(seed, version=2)
/mbedtls-3.5.0/docs/architecture/
Dmbed-crypto-storage-specification.md27 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only.
31 … nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later version of M…
33 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on…
62 ### Nonvolatile random seed file format for 0.1.0
64 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit…
66 The file format is just the seed as a byte string with no metadata or encoding of any kind.
74 …ff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-f…
104 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only.
121 ### Nonvolatile random seed file format for 1.0.0
123 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit…
[all …]
/mbedtls-3.5.0/programs/test/
Dudp_proxy.c174 unsigned int seed; /* seed for "random" events */ member
310 opt.seed = atoi(q); in get_options()
311 if (opt.seed == 0) { in get_options()
803 if (opt.seed == 0) { in main()
805 opt.seed = (unsigned int) mbedtls_time(NULL); in main()
807 opt.seed = 1; in main()
809 mbedtls_printf(" . Pseudo-random seed: %u\n", opt.seed); in main()
812 srand(opt.seed); in main()
/mbedtls-3.5.0/
D.gitignore1 # Random seed file created by test scripts and sample programs
/mbedtls-3.5.0/include/mbedtls/
Dlms.h380 void *p_rng, const unsigned char *seed,

12