Searched refs:random (Results 1 – 25 of 59) sorted by relevance
123
/mbedtls-latest/tests/suites/ |
D | test_suite_bignum_random.data | 1 MPI core random basic: 0..1 4 MPI core random basic: 0..2 7 MPI core random basic: 1..2 10 MPI core random basic: 2^30..2^31 13 MPI core random basic: 0..2^128 16 MPI core random basic: 2^30..2^129 22 MPI core random basic: 2^28-1..2^28+1 (NOT_ACCEPTABLE) 25 MPI random legacy=core: 2^28-1..2^28+1 (NOT_ACCEPTABLE) 28 MPI random mod=core: 2^28-1..2^28+1 (NOT_ACCEPTABLE) (Mont) 31 MPI random mod=core: 2^28-1..2^28+1 (NOT_ACCEPTABLE) (canon) [all …]
|
D | test_suite_bignum_core.misc.data | 428 Fill random core: 0 bytes 431 Fill random core: 1 byte, RNG stops at 0 434 Fill random core: 1 byte, RNG just sufficient 437 Fill random core: 1 byte, RNG not exhausted 440 Fill random core: 1 byte, prior content nonzero 443 Fill random core: 1 byte, 1 extra limb 446 Fill random core: 1 byte, 1 extra limb, prior content nonzero 449 Fill random core: 8 bytes, RNG stops before 452 Fill random core: 8 bytes, RNG just sufficient 455 Fill random core: 8 bytes, RNG not exhausted [all …]
|
D | test_suite_psa_crypto_init.function | 143 uint8_t random[10] = { 0 }; 176 status = psa_generate_random(random, sizeof(random)); 304 uint8_t random[10] = { 0 }; 311 status = psa_generate_random(random, sizeof(random)); 341 uint8_t random[10] = { 0 }; 352 PSA_ASSERT(psa_generate_random(random, sizeof(random))); 368 uint8_t random[10] = { 0 }; 397 PSA_ASSERT(psa_generate_random(random, sizeof(random))); 409 uint8_t random[10] = { 0 }; 425 PSA_ASSERT(psa_generate_random(random, sizeof(random)));
|
D | test_suite_random.data | 1 Generate random twice with CTR_DRBG 4 Generate random twice with HMAC_DRBG(SHA-1) 8 Generate random twice with HMAC_DRBG(SHA-256) 12 Generate random twice with HMAC_DRBG(SHA-512) 16 Generate random twice with PSA classic wrapper 19 Generate random twice with PSA API
|
D | test_suite_random.function | 3 /* Test random generation as a whole. */ 15 * output twice is infinitesimal, but low enough that random generators 58 /* The two rounds must generate different random data. */ 105 /* The two rounds must generate different random data. */ 133 /* The two rounds must generate different random data. */ 157 /* The two rounds must generate different random data. */
|
D | test_suite_ecdh.data | 4 ECDH primitive random #1 8 ECDH primitive random #2 12 ECDH primitive random #3 16 ECDH primitive random #4 20 ECDH primitive random #5
|
D | test_suite_bignum.misc.data | 1733 Fill random: 0 bytes 1736 Fill random: 1 byte, good 1739 Fill random: 2 bytes, good, no leading zero 1742 Fill random: 2 bytes, good, 1 leading zero 1745 Fill random: MAX_SIZE - 7, good 1748 Fill random: MAX_SIZE, good 1751 Fill random: 0 bytes, previously small >0 1754 Fill random: 0 bytes, previously small <0 1757 Fill random: 0 bytes, previously large >0 1760 Fill random: 0 bytes, previously large <0 [all …]
|
D | test_suite_ecdsa.data | 21 ECDSA primitive random #1 25 ECDSA primitive random #2 29 ECDSA primitive random #3 33 ECDSA primitive random #4 37 ECDSA primitive random #5 73 ECDSA write-read random #1 77 ECDSA write-read random #2 81 ECDSA write-read random #3 85 ECDSA write-read random #4 89 ECDSA write-read random #5
|
D | test_suite_ecp.data | 566 ECP generate Montgomery key: Curve25519, random in range 575 ECP generate Montgomery key: Curve25519, random = all-bits-zero 578 ECP generate Montgomery key: Curve25519, random = all-bits-one 584 ECP generate Montgomery key: Curve448, random in range 593 ECP generate Montgomery key: Curve448, random = all-bits-zero 596 ECP generate Montgomery key: Curve448, random = all-bits-one 1006 ECP mod p192 random 1345 # The following data be generated by random.getrandbits() in python must less than the named curves… 1678 # modulus - 1, and four random values, generated with 1679 # random.getrandbits(224) % modulus with a seed(2, 2). [all …]
|
D | test_suite_bignum.function | 45 * chooses a random witness. The witnesses (or non-witnesses as provided by the 53 mbedtls_test_mpi_random *random = (mbedtls_test_mpi_random *) state; 55 if (random == NULL || random->data->x == NULL || buf == NULL) { 59 if (random->pos + random->chunk_len > random->data->len 60 || random->chunk_len > len) { 71 memcpy(buf + len - random->chunk_len, &random->data->x[random->pos], 72 random->chunk_len); 74 random->pos += random->chunk_len;
|
D | test_suite_psa_crypto_init.data | 16 No random without init 22 No random after deinit
|
D | test_suite_bignum_random.function | 10 * There are three main goals for testing random() functions: 35 * indirectly by testing that these functions consume the random generator 164 /* Call the legacy function and the core function with the same random 219 /* Call the core and mod random() functions with the same random stream. */
|
D | test_suite_lms.data | 16 # signature is to be reproduced. Message data is random. Note that pyhsslms 56 # signature is to be reproduced. Message data is random. Note that hash-sigs 88 # if the signature is to be reproduced. Message data is random. Note that 116 # if the signature is to be reproduced. Message data is random. Note that
|
D | test_suite_lmots.data | 89 LMOTS hash-sigs interop negative test (altered random value) 91 # alters the random value (C) of the signature, and is expected to fail to
|
D | test_suite_psa_crypto_entropy.data | 1 PSA external RNG failure: generate random and key
|
D | helpers.function | 8 #include <test/random.h>
|
D | test_suite_mps.function | 830 * functions in a random fashion. 841 * most of the random calls fail. 843 * NOTE: This test uses rand() for random data, which is not optimal. 844 * Instead, it would be better to get the random data from a 898 /* Feed reader with a random chunk */
|
/mbedtls-latest/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 29 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only. 33 … has a nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later versio… 35 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on… 64 ### Nonvolatile random seed file format for 0.1.0 66 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit… 76 * File 0xffffff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random… 106 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only. 123 ### Nonvolatile random seed file format for 1.0.0 125 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit… 129 This is unchanged since [the feature was introduced in Mbed Crypto 0.1.0](#nonvolatile-random-seed-… [all …]
|
D | alternative-implementations.md | 14 The storage of the non-volatile seed for random generation, enabled with `MBEDTLS_ENTROPY_NV_SEED`,… 20 To configure entropy sources (hardware random generators), see the `MBEDTLS_ENTROPY_XXX` options in… 28 … (keys that are only available inside the cryptographic engine), and for random generation. Calls …
|
/mbedtls-latest/programs/ |
D | Makefile | 64 random/gen_entropy \ 65 random/gen_random_ctr_drbg \ 273 random/gen_entropy$(EXEXT): random/gen_entropy.c $(DEP) 275 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) random/gen_entropy.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@ 277 random/gen_random_ctr_drbg$(EXEXT): random/gen_random_ctr_drbg.c $(DEP) 279 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) random/gen_random_ctr_drbg.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
D | README.md | 56 * [`random/gen_entropy.c`](random/gen_entropy.c): shows how to use the default entropy sources to g… 57 …rator to seed a cryptographic pseudorandom generator, as illustrated by `random/gen_random_ctr_drb… 59 …random/gen_random_ctr_drbg.c`](random/gen_random_ctr_drbg.c): shows how to use the default entropy…
|
D | .gitignore | 42 random/gen_entropy 43 random/gen_random_ctr_drbg
|
D | CMakeLists.txt | 9 add_subdirectory(random)
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 203 …o have entry points related to random generation. A transparent driver can provide a [random gener… 833 …ication in an operating system and `"get_entropy"` returns data from the random generator in the o… 916 …de an operation family that can be used as a cryptographic random number generator. The random gen… 918 …random output must be of cryptographic quality, with a uniform distribution. Therefore, if the ran… 919 …d to be fast. (If a device can provide entropy but is slow at generating random data, declare it a… 920 …random generator should be able to incorporate entropy provided by an outside source. If it isn't,… 921 …random generator may either be deterministic (in the sense that it always returns the same data wh… 923 If no driver implements the random generation entry point family, the core provides an unspecified … 927 * Type `"random_context_t"`: the type of a random generation context. 928 …point, optional): if this function is present, [the core calls it once](#random-generator-initiali… [all …]
|
/mbedtls-latest/tests/scripts/ |
D | all.sh | 304 --random-seed Use a random seed value for randomized tests (default). 496 --random-seed) unset SEED;;
|
123