Home
last modified time | relevance | path

Searched refs:random (Results 1 – 25 of 59) sorted by relevance

123

/mbedtls-latest/tests/suites/
Dtest_suite_bignum_random.data1 MPI core random basic: 0..1
4 MPI core random basic: 0..2
7 MPI core random basic: 1..2
10 MPI core random basic: 2^30..2^31
13 MPI core random basic: 0..2^128
16 MPI core random basic: 2^30..2^129
22 MPI core random basic: 2^28-1..2^28+1 (NOT_ACCEPTABLE)
25 MPI random legacy=core: 2^28-1..2^28+1 (NOT_ACCEPTABLE)
28 MPI random mod=core: 2^28-1..2^28+1 (NOT_ACCEPTABLE) (Mont)
31 MPI random mod=core: 2^28-1..2^28+1 (NOT_ACCEPTABLE) (canon)
[all …]
Dtest_suite_bignum_core.misc.data428 Fill random core: 0 bytes
431 Fill random core: 1 byte, RNG stops at 0
434 Fill random core: 1 byte, RNG just sufficient
437 Fill random core: 1 byte, RNG not exhausted
440 Fill random core: 1 byte, prior content nonzero
443 Fill random core: 1 byte, 1 extra limb
446 Fill random core: 1 byte, 1 extra limb, prior content nonzero
449 Fill random core: 8 bytes, RNG stops before
452 Fill random core: 8 bytes, RNG just sufficient
455 Fill random core: 8 bytes, RNG not exhausted
[all …]
Dtest_suite_psa_crypto_init.function143 uint8_t random[10] = { 0 };
176 status = psa_generate_random(random, sizeof(random));
304 uint8_t random[10] = { 0 };
311 status = psa_generate_random(random, sizeof(random));
341 uint8_t random[10] = { 0 };
352 PSA_ASSERT(psa_generate_random(random, sizeof(random)));
368 uint8_t random[10] = { 0 };
397 PSA_ASSERT(psa_generate_random(random, sizeof(random)));
409 uint8_t random[10] = { 0 };
425 PSA_ASSERT(psa_generate_random(random, sizeof(random)));
Dtest_suite_random.data1 Generate random twice with CTR_DRBG
4 Generate random twice with HMAC_DRBG(SHA-1)
8 Generate random twice with HMAC_DRBG(SHA-256)
12 Generate random twice with HMAC_DRBG(SHA-512)
16 Generate random twice with PSA classic wrapper
19 Generate random twice with PSA API
Dtest_suite_random.function3 /* Test random generation as a whole. */
15 * output twice is infinitesimal, but low enough that random generators
58 /* The two rounds must generate different random data. */
105 /* The two rounds must generate different random data. */
133 /* The two rounds must generate different random data. */
157 /* The two rounds must generate different random data. */
Dtest_suite_ecdh.data4 ECDH primitive random #1
8 ECDH primitive random #2
12 ECDH primitive random #3
16 ECDH primitive random #4
20 ECDH primitive random #5
Dtest_suite_bignum.misc.data1733 Fill random: 0 bytes
1736 Fill random: 1 byte, good
1739 Fill random: 2 bytes, good, no leading zero
1742 Fill random: 2 bytes, good, 1 leading zero
1745 Fill random: MAX_SIZE - 7, good
1748 Fill random: MAX_SIZE, good
1751 Fill random: 0 bytes, previously small >0
1754 Fill random: 0 bytes, previously small <0
1757 Fill random: 0 bytes, previously large >0
1760 Fill random: 0 bytes, previously large <0
[all …]
Dtest_suite_ecdsa.data21 ECDSA primitive random #1
25 ECDSA primitive random #2
29 ECDSA primitive random #3
33 ECDSA primitive random #4
37 ECDSA primitive random #5
73 ECDSA write-read random #1
77 ECDSA write-read random #2
81 ECDSA write-read random #3
85 ECDSA write-read random #4
89 ECDSA write-read random #5
Dtest_suite_ecp.data566 ECP generate Montgomery key: Curve25519, random in range
575 ECP generate Montgomery key: Curve25519, random = all-bits-zero
578 ECP generate Montgomery key: Curve25519, random = all-bits-one
584 ECP generate Montgomery key: Curve448, random in range
593 ECP generate Montgomery key: Curve448, random = all-bits-zero
596 ECP generate Montgomery key: Curve448, random = all-bits-one
1006 ECP mod p192 random
1345 # The following data be generated by random.getrandbits() in python must less than the named curves…
1678 # modulus - 1, and four random values, generated with
1679 # random.getrandbits(224) % modulus with a seed(2, 2).
[all …]
Dtest_suite_bignum.function45 * chooses a random witness. The witnesses (or non-witnesses as provided by the
53 mbedtls_test_mpi_random *random = (mbedtls_test_mpi_random *) state;
55 if (random == NULL || random->data->x == NULL || buf == NULL) {
59 if (random->pos + random->chunk_len > random->data->len
60 || random->chunk_len > len) {
71 memcpy(buf + len - random->chunk_len, &random->data->x[random->pos],
72 random->chunk_len);
74 random->pos += random->chunk_len;
Dtest_suite_psa_crypto_init.data16 No random without init
22 No random after deinit
Dtest_suite_bignum_random.function10 * There are three main goals for testing random() functions:
35 * indirectly by testing that these functions consume the random generator
164 /* Call the legacy function and the core function with the same random
219 /* Call the core and mod random() functions with the same random stream. */
Dtest_suite_lms.data16 # signature is to be reproduced. Message data is random. Note that pyhsslms
56 # signature is to be reproduced. Message data is random. Note that hash-sigs
88 # if the signature is to be reproduced. Message data is random. Note that
116 # if the signature is to be reproduced. Message data is random. Note that
Dtest_suite_lmots.data89 LMOTS hash-sigs interop negative test (altered random value)
91 # alters the random value (C) of the signature, and is expected to fail to
Dtest_suite_psa_crypto_entropy.data1 PSA external RNG failure: generate random and key
Dhelpers.function8 #include <test/random.h>
Dtest_suite_mps.function830 * functions in a random fashion.
841 * most of the random calls fail.
843 * NOTE: This test uses rand() for random data, which is not optimal.
844 * Instead, it would be better to get the random data from a
898 /* Feed reader with a random chunk */
/mbedtls-latest/docs/architecture/
Dmbed-crypto-storage-specification.md29 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only.
33 … has a nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later versio…
35 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on…
64 ### Nonvolatile random seed file format for 0.1.0
66 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit…
76 * File 0xffffff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random
106 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only.
123 ### Nonvolatile random seed file format for 1.0.0
125 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit…
129 This is unchanged since [the feature was introduced in Mbed Crypto 0.1.0](#nonvolatile-random-seed-…
[all …]
Dalternative-implementations.md14 The storage of the non-volatile seed for random generation, enabled with `MBEDTLS_ENTROPY_NV_SEED`,…
20 To configure entropy sources (hardware random generators), see the `MBEDTLS_ENTROPY_XXX` options in…
28 … (keys that are only available inside the cryptographic engine), and for random generation. Calls …
/mbedtls-latest/programs/
DMakefile64 random/gen_entropy \
65 random/gen_random_ctr_drbg \
273 random/gen_entropy$(EXEXT): random/gen_entropy.c $(DEP)
275 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) random/gen_entropy.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
277 random/gen_random_ctr_drbg$(EXEXT): random/gen_random_ctr_drbg.c $(DEP)
279 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) random/gen_random_ctr_drbg.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
DREADME.md56 * [`random/gen_entropy.c`](random/gen_entropy.c): shows how to use the default entropy sources to g…
57 …rator to seed a cryptographic pseudorandom generator, as illustrated by `random/gen_random_ctr_drb…
59random/gen_random_ctr_drbg.c`](random/gen_random_ctr_drbg.c): shows how to use the default entropy…
D.gitignore42 random/gen_entropy
43 random/gen_random_ctr_drbg
DCMakeLists.txt9 add_subdirectory(random)
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md203 …o have entry points related to random generation. A transparent driver can provide a [random gener…
833 …ication in an operating system and `"get_entropy"` returns data from the random generator in the o…
916 …de an operation family that can be used as a cryptographic random number generator. The random gen…
918random output must be of cryptographic quality, with a uniform distribution. Therefore, if the ran…
919 …d to be fast. (If a device can provide entropy but is slow at generating random data, declare it a…
920random generator should be able to incorporate entropy provided by an outside source. If it isn't,…
921random generator may either be deterministic (in the sense that it always returns the same data wh…
923 If no driver implements the random generation entry point family, the core provides an unspecified
927 * Type `"random_context_t"`: the type of a random generation context.
928 …point, optional): if this function is present, [the core calls it once](#random-generator-initiali…
[all …]
/mbedtls-latest/tests/scripts/
Dall.sh304 --random-seed Use a random seed value for randomized tests (default).
496 --random-seed) unset SEED;;

123