Searched refs:round (Results 1 – 18 of 18) sorted by relevance
/mbedtls-latest/tests/suites/ |
D | test_suite_ecjpake.data | 10 ECJPAKE round one: client, valid 13 ECJPAKE round one: server, valid 16 ECJPAKE round one: role mismatch 19 ECJPAKE round one: trailing byte 22 ECJPAKE round one: KKP1: no data 25 ECJPAKE round one: KKP1: length of first point too small 28 ECJPAKE round one: KKP1: length of first point too big 31 ECJPAKE round one: KKP1: no point data 34 ECJPAKE round one: KKP1: first point is zero 37 ECJPAKE round one: KKP1: unknown first point format [all …]
|
D | test_suite_random.function | 36 /* First round */ 47 /* Second round */ 83 /* First round */ 94 /* Second round */ 121 /* First round */ 127 /* Second round */ 147 /* First round */ 152 /* Second round */
|
D | test_suite_mps.data | 1 MPS Reader: Single step, single round, pausing disabled 4 MPS Reader: Single step, single round, pausing enabled but unused 13 MPS Reader: Multiple steps, single round, pausing disabled 16 MPS Reader: Multiple steps, single round, pausing enabled but unused
|
D | test_suite_psa_crypto_pake.function | 108 pake_round_t round, 145 switch (round) { 147 /* Server first round Output */ 216 /* Client first round Input */ 260 /* Client first round Output */ 316 /* Client first round Input */ 354 /* Server first round Input */ 389 /* Server second round Output */ 420 /* Client second round Input */ 443 /* Client second round Output */ [all …]
|
D | test_suite_psa_crypto_memory.data | 43 PSA crypto local input round-trip 61 PSA crypto local output round-trip
|
D | test_suite_psa_crypto_driver_wrappers.function | 20 int round) 55 switch (round) { 57 /* Server first round Output */ 108 /* Client first round Input */ 154 /* Client first round Output */ 205 /* Client first round Input */ 248 /* Server first round Input */ 288 /* Server second round Output */ 317 /* Client second round Input */ 339 /* Client second round Output */ [all …]
|
D | test_suite_psa_crypto.function | 686 int round, int inject_error) 722 switch (round) { 724 /* Server first round Output */ 777 /* Client first round Input */ 844 /* Client first round Output */ 883 /* Client first round Input */ 956 /* Server first round Input */ 1020 /* Server second round Output */ 1048 /* Client second round Input */ 1085 /* Client second round Output */ [all …]
|
D | test_suite_mps.function | 133 /* This test exercises one round of the following: 186 /* This test exercises one round of fetching a buffer in multiple chunks
|
/mbedtls-latest/include/psa/ |
D | crypto_extra.h | 1837 psa_jpake_round_t MBEDTLS_PRIVATE(round); 1848 #define PSA_JPAKE_EXPECTED_INPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument 1849 ((round) == PSA_JPAKE_FIRST ? 2 : 1)) 1850 #define PSA_JPAKE_EXPECTED_OUTPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument 1851 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
|
/mbedtls-latest/library/ |
D | sha3.c | 107 for (int round = 0; round < 24; round++) { in keccak_f1600() local 240 s[0] ^= ((iota_r_packed[round] & 0x40ull) << 57 | in keccak_f1600() 241 (iota_r_packed[round] & 0x20ull) << 26 | in keccak_f1600() 242 (iota_r_packed[round] & 0x10ull) << 11 | in keccak_f1600() 243 (iota_r_packed[round] & 0x8f)); in keccak_f1600()
|
D | psa_crypto.c | 8708 if (stage->round == PSA_JPAKE_FIRST) { 8720 } else if (stage->round == PSA_JPAKE_SECOND) { 8789 if (computation_stage->round != PSA_JPAKE_FIRST && 8790 computation_stage->round != PSA_JPAKE_SECOND) { 8825 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round)) { 8831 if (stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { 8835 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round) && 8836 stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { 8840 stage->round++; 9023 if (computation_stage->round != PSA_JPAKE_FINISHED) {
|
D | ssl_misc.h | 2736 size_t len, mbedtls_ecjpake_rounds_t round); 2755 mbedtls_ecjpake_rounds_t round);
|
D | ecp_curves_new.c | 5506 size_t round; in mbedtls_ecp_mod_p448_raw() local 5584 for (round = 0; round < 2; ++round) { in mbedtls_ecp_mod_p448_raw()
|
D | ssl_tls.c | 9021 size_t len, mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_read_round() argument 9029 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_read_round() 9064 mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_write_round() argument 9073 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_write_round()
|
/mbedtls-latest/docs/architecture/ |
D | tls13-support.md | 166 work to reduce review rounds and the number of comments in each round. They
|
D | psa-shared-memory.md | 338 Specifically, ASan will round the buffer size down to 8 bytes before poisoning due to details of it…
|
/mbedtls-latest/docs/proposed/ |
D | psa-driver-interface.md | 857 1. The core makes a first round of calls to `"get_entropy"` on every source with the `BLOCK` flag c… 858 2. The core makes a second round of calls with the `BLOCK` flag set and the `KEEPALIVE` flag clear … 859 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…
|
/mbedtls-latest/ |
D | ChangeLog | 2742 these variables can be used to recover the last round key. To follow best
|