Searched refs:init (Results 1 – 22 of 22) sorted by relevance
| /mbedtls-latest/tests/suites/ |
| D | test_suite_cmac.data | 8 CMAC init #1 AES-128: OK 12 CMAC init #2 AES-192: OK 16 CMAC init #3 AES-256: OK 20 CMAC init #4 3DES: OK 24 CMAC init #5 AES-224: bad key size 28 CMAC init #6 AES-0: bad key size 32 CMAC init Camellia-128: wrong cipher 36 CMAC init Camellia-192: wrong cipher 40 CMAC init Camellia-256: wrong cipher 44 CMAC init #8 ARIA-128: wrong cipher [all …]
|
| D | test_suite_psa_crypto_init.data | 4 PSA init/deinit 7 PSA deinit without init 13 PSA threaded init checks 16 No random without init 19 No key slot access without init
|
| D | test_suite_net.data | 1 Context init-free-free 4 Context init-free-init-free
|
| D | test_suite_psa_crypto_se_driver_hal_mocks.data | 1 SE init mock test: success 4 SE init mock test: failure 7 SE init mock test: invalid location (0) 10 SE init mock test: location not supported (INT_MAX)
|
| D | test_suite_entropy.data | 1 Entropy init-free-free 4 Entropy init-free-init-free
|
| D | test_suite_block_cipher.function | 102 /* Intentionally no PSA init here! (Will be done later.) */ 106 /* Before PSA crypto init */ 119 /* After PSA Crypto init */
|
| D | test_suite_md.function | 170 /* Note: PSA Crypto init not needed for info functions */ 432 /* Intentionally no PSA init here! (Will be done later.) */ 439 /* Before PSA crypto init */ 455 /* After PSA Crypto init */
|
| D | test_suite_nist_kw.data | 7 NIST KW init #1 wrapping AES-128: OK 11 NIST KW init #2 unwrapping AES-128: OK 15 NIST KW init #3 CAMELLIA-256: unsupported cipher 19 NIST KW init #4 AES-224: bad key size 23 NIST KW init #5 3DES: bad cipher
|
| D | test_suite_chacha20.function | 54 /* Don't free/init the context nor set the key again,
|
| D | test_suite_poly1305.function | 46 /* Don't free/init the context, in order to test that starts() does the
|
| D | test_suite_bignum_mod_raw.function | 55 mbedtls_mpi_uint init[sizeof(X) / sizeof(X[0])]; 56 memset(init, 0xFF, sizeof(init)); 57 int ret = mbedtls_mpi_mod_modulus_setup(&m, init, nx);
|
| D | test_suite_rsa.data | 4 RSA init-free-free 7 RSA init-free-init-free
|
| D | test_suite_psa_crypto.function | 1509 /* We can't test that this is specific to drivers until partial init has 1510 * been implemented, but we can at least test before/after full init. */ 2112 psa_key_attributes_t init = PSA_KEY_ATTRIBUTES_INIT; 2118 TEST_EQUAL(psa_get_key_lifetime(&init), PSA_KEY_LIFETIME_VOLATILE); 2122 TEST_EQUAL(psa_get_key_type(&init), 0); 2126 TEST_EQUAL(psa_get_key_bits(&init), 0); 2130 TEST_EQUAL(psa_get_key_usage_flags(&init), 0); 2134 TEST_EQUAL(psa_get_key_algorithm(&init), 0); 2921 psa_hash_operation_t init = PSA_HASH_OPERATION_INIT; 2929 TEST_EQUAL(psa_hash_update(&init, input, sizeof(input)), [all …]
|
| D | test_suite_pk.function | 1440 /* init pk-rsa context */ 1458 /* init pk-rsa context */ 1517 /* init pk-rsa context */ 1582 /* init pk-rsa context */
|
| D | test_suite_ccm.data | 4 CCM init #1 AES-128: OK 8 CCM init #2 CAMELLIA-256: OK 12 CCM init #3 AES-224: bad key size 16 CCM init #4 DES: bad block size
|
| /mbedtls-latest/tests/src/ |
| D | threading_helpers.c | 139 void (*init)(mbedtls_threading_mutex_t *); member 203 mutex_functions.init(mutex); in mbedtls_test_wrap_mutex_init() 306 mutex_functions.init = mbedtls_mutex_init; in mbedtls_test_mutex_usage_init() 315 mutex_functions.init(&mbedtls_test_mutex_mutex); in mbedtls_test_mutex_usage_init() 344 mbedtls_mutex_init = mutex_functions.init; in mbedtls_test_mutex_usage_end()
|
| /mbedtls-latest/ |
| D | .pylintrc | 2 init-hook='import sys; sys.path.append("scripts")'
|
| D | ChangeLog | 4585 should generally be the first function called on this context after init:
|
| /mbedtls-latest/docs/proposed/ |
| D | psa-driver-interface.md | 865 …init"` entry point in a capability with no algorithm, key type or key size. If so, the core calls … 867 …init entry point, the order in which they are called is unspecified. It is also unspecified whethe… 871 The init entry point does not take any parameter. 1217 The core loads the persistent state in memory before it calls the driver's [init entry point](#driv…
|
| /mbedtls-latest/docs/architecture/testing/ |
| D | invasive-testing.md | 354 #### PSA crypto init failure
|
| /mbedtls-latest/docs/architecture/psa-migration/ |
| D | strategy.md | 91 splitting init between the parts that can fail and the parts that can't (see
|
| /mbedtls-latest/docs/architecture/psa-thread-safety/ |
| D | psa-thread-safety.md | 115 …ing `psa_crypto_init` followed by a call to any PSA key management function (if the init succeeds).
|