Home
last modified time | relevance | path

Searched refs:round (Results 1 – 18 of 18) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_ecjpake.data10 ECJPAKE round one: client, valid
13 ECJPAKE round one: server, valid
16 ECJPAKE round one: role mismatch
19 ECJPAKE round one: trailing byte
22 ECJPAKE round one: KKP1: no data
25 ECJPAKE round one: KKP1: length of first point too small
28 ECJPAKE round one: KKP1: length of first point too big
31 ECJPAKE round one: KKP1: no point data
34 ECJPAKE round one: KKP1: first point is zero
37 ECJPAKE round one: KKP1: unknown first point format
[all …]
Dtest_suite_random.function36 /* First round */
47 /* Second round */
83 /* First round */
94 /* Second round */
121 /* First round */
127 /* Second round */
147 /* First round */
152 /* Second round */
Dtest_suite_mps.data1 MPS Reader: Single step, single round, pausing disabled
4 MPS Reader: Single step, single round, pausing enabled but unused
13 MPS Reader: Multiple steps, single round, pausing disabled
16 MPS Reader: Multiple steps, single round, pausing enabled but unused
Dtest_suite_psa_crypto_pake.function108 pake_round_t round,
145 switch (round) {
147 /* Server first round Output */
216 /* Client first round Input */
260 /* Client first round Output */
316 /* Client first round Input */
354 /* Server first round Input */
389 /* Server second round Output */
420 /* Client second round Input */
443 /* Client second round Output */
[all …]
Dtest_suite_psa_crypto_memory.data43 PSA crypto local input round-trip
61 PSA crypto local output round-trip
Dtest_suite_psa_crypto_driver_wrappers.function20 int round)
55 switch (round) {
57 /* Server first round Output */
108 /* Client first round Input */
154 /* Client first round Output */
205 /* Client first round Input */
248 /* Server first round Input */
288 /* Server second round Output */
317 /* Client second round Input */
339 /* Client second round Output */
[all …]
Dtest_suite_psa_crypto.function686 int round, int inject_error)
722 switch (round) {
724 /* Server first round Output */
777 /* Client first round Input */
844 /* Client first round Output */
883 /* Client first round Input */
956 /* Server first round Input */
1020 /* Server second round Output */
1048 /* Client second round Input */
1085 /* Client second round Output */
[all …]
Dtest_suite_mps.function133 /* This test exercises one round of the following:
186 /* This test exercises one round of fetching a buffer in multiple chunks
/mbedtls-latest/include/psa/
Dcrypto_extra.h1837 psa_jpake_round_t MBEDTLS_PRIVATE(round);
1848 #define PSA_JPAKE_EXPECTED_INPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument
1849 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
1850 #define PSA_JPAKE_EXPECTED_OUTPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument
1851 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
/mbedtls-latest/library/
Dsha3.c107 for (int round = 0; round < 24; round++) { in keccak_f1600() local
240 s[0] ^= ((iota_r_packed[round] & 0x40ull) << 57 | in keccak_f1600()
241 (iota_r_packed[round] & 0x20ull) << 26 | in keccak_f1600()
242 (iota_r_packed[round] & 0x10ull) << 11 | in keccak_f1600()
243 (iota_r_packed[round] & 0x8f)); in keccak_f1600()
Dpsa_crypto.c8708 if (stage->round == PSA_JPAKE_FIRST) {
8720 } else if (stage->round == PSA_JPAKE_SECOND) {
8789 if (computation_stage->round != PSA_JPAKE_FIRST &&
8790 computation_stage->round != PSA_JPAKE_SECOND) {
8825 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round)) {
8831 if (stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) {
8835 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round) &&
8836 stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) {
8840 stage->round++;
9023 if (computation_stage->round != PSA_JPAKE_FINISHED) {
Dssl_misc.h2736 size_t len, mbedtls_ecjpake_rounds_t round);
2755 mbedtls_ecjpake_rounds_t round);
Decp_curves_new.c5506 size_t round; in mbedtls_ecp_mod_p448_raw() local
5584 for (round = 0; round < 2; ++round) { in mbedtls_ecp_mod_p448_raw()
Dssl_tls.c9021 size_t len, mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_read_round() argument
9029 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_read_round()
9064 mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_write_round() argument
9073 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_write_round()
/mbedtls-latest/docs/architecture/
Dtls13-support.md166 work to reduce review rounds and the number of comments in each round. They
Dpsa-shared-memory.md338 Specifically, ASan will round the buffer size down to 8 bytes before poisoning due to details of it…
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md857 1. The core makes a first round of calls to `"get_entropy"` on every source with the `BLOCK` flag c…
858 2. The core makes a second round of calls with the `BLOCK` flag set and the `KEEPALIVE` flag clear …
859 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…
/mbedtls-latest/
DChangeLog2742 these variables can be used to recover the last round key. To follow best