Home
last modified time | relevance | path

Searched refs:init (Results 1 – 22 of 22) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_cmac.data8 CMAC init #1 AES-128: OK
12 CMAC init #2 AES-192: OK
16 CMAC init #3 AES-256: OK
20 CMAC init #4 3DES: OK
24 CMAC init #5 AES-224: bad key size
28 CMAC init #6 AES-0: bad key size
32 CMAC init Camellia-128: wrong cipher
36 CMAC init Camellia-192: wrong cipher
40 CMAC init Camellia-256: wrong cipher
44 CMAC init #8 ARIA-128: wrong cipher
[all …]
Dtest_suite_psa_crypto_init.data4 PSA init/deinit
7 PSA deinit without init
13 PSA threaded init checks
16 No random without init
19 No key slot access without init
Dtest_suite_net.data1 Context init-free-free
4 Context init-free-init-free
Dtest_suite_psa_crypto_se_driver_hal_mocks.data1 SE init mock test: success
4 SE init mock test: failure
7 SE init mock test: invalid location (0)
10 SE init mock test: location not supported (INT_MAX)
Dtest_suite_entropy.data1 Entropy init-free-free
4 Entropy init-free-init-free
Dtest_suite_block_cipher.function102 /* Intentionally no PSA init here! (Will be done later.) */
106 /* Before PSA crypto init */
119 /* After PSA Crypto init */
Dtest_suite_md.function170 /* Note: PSA Crypto init not needed for info functions */
432 /* Intentionally no PSA init here! (Will be done later.) */
439 /* Before PSA crypto init */
455 /* After PSA Crypto init */
Dtest_suite_nist_kw.data7 NIST KW init #1 wrapping AES-128: OK
11 NIST KW init #2 unwrapping AES-128: OK
15 NIST KW init #3 CAMELLIA-256: unsupported cipher
19 NIST KW init #4 AES-224: bad key size
23 NIST KW init #5 3DES: bad cipher
Dtest_suite_chacha20.function54 /* Don't free/init the context nor set the key again,
Dtest_suite_poly1305.function46 /* Don't free/init the context, in order to test that starts() does the
Dtest_suite_bignum_mod_raw.function55 mbedtls_mpi_uint init[sizeof(X) / sizeof(X[0])];
56 memset(init, 0xFF, sizeof(init));
57 int ret = mbedtls_mpi_mod_modulus_setup(&m, init, nx);
Dtest_suite_rsa.data4 RSA init-free-free
7 RSA init-free-init-free
Dtest_suite_psa_crypto.function1509 /* We can't test that this is specific to drivers until partial init has
1510 * been implemented, but we can at least test before/after full init. */
2112 psa_key_attributes_t init = PSA_KEY_ATTRIBUTES_INIT;
2118 TEST_EQUAL(psa_get_key_lifetime(&init), PSA_KEY_LIFETIME_VOLATILE);
2122 TEST_EQUAL(psa_get_key_type(&init), 0);
2126 TEST_EQUAL(psa_get_key_bits(&init), 0);
2130 TEST_EQUAL(psa_get_key_usage_flags(&init), 0);
2134 TEST_EQUAL(psa_get_key_algorithm(&init), 0);
2921 psa_hash_operation_t init = PSA_HASH_OPERATION_INIT;
2929 TEST_EQUAL(psa_hash_update(&init, input, sizeof(input)),
[all …]
Dtest_suite_pk.function1440 /* init pk-rsa context */
1458 /* init pk-rsa context */
1517 /* init pk-rsa context */
1582 /* init pk-rsa context */
Dtest_suite_ccm.data4 CCM init #1 AES-128: OK
8 CCM init #2 CAMELLIA-256: OK
12 CCM init #3 AES-224: bad key size
16 CCM init #4 DES: bad block size
/mbedtls-latest/tests/src/
Dthreading_helpers.c139 void (*init)(mbedtls_threading_mutex_t *); member
203 mutex_functions.init(mutex); in mbedtls_test_wrap_mutex_init()
306 mutex_functions.init = mbedtls_mutex_init; in mbedtls_test_mutex_usage_init()
315 mutex_functions.init(&mbedtls_test_mutex_mutex); in mbedtls_test_mutex_usage_init()
344 mbedtls_mutex_init = mutex_functions.init; in mbedtls_test_mutex_usage_end()
/mbedtls-latest/
D.pylintrc2 init-hook='import sys; sys.path.append("scripts")'
DChangeLog4585 should generally be the first function called on this context after init:
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md865init"` entry point in a capability with no algorithm, key type or key size. If so, the core calls …
867init entry point, the order in which they are called is unspecified. It is also unspecified whethe…
871 The init entry point does not take any parameter.
1217 The core loads the persistent state in memory before it calls the driver's [init entry point](#driv…
/mbedtls-latest/docs/architecture/testing/
Dinvasive-testing.md354 #### PSA crypto init failure
/mbedtls-latest/docs/architecture/psa-migration/
Dstrategy.md91 splitting init between the parts that can fail and the parts that can't (see
/mbedtls-latest/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md115 …ing `psa_crypto_init` followed by a call to any PSA key management function (if the init succeeds).