/mbedtls-latest/tests/suites/ |
D | test_suite_psa_crypto_entropy.function | 17 /* Check the entropy seed file. 23 * the entropy seed file exists and has exactly this size, 26 * the entropy seed file does not exist or has a different size, 30 * \note We enforce that the seed is in a specific ITS file. 32 * the library is upgraded on a device with an existing seed. 36 /* The value of the random seed UID must not change. Otherwise that would 37 * break upgrades of the library on devices that already contain a seed 58 /* Remove the entropy seed file. 158 uint8_t *seed = NULL; 166 TEST_CALLOC(seed, seed_size); [all …]
|
D | test_suite_hmac_drbg.misc.data | 37 HMAC_DRBG write/update seed file SHA-1 [#1] 41 HMAC_DRBG write/update seed file SHA-1 [#2] 45 HMAC_DRBG write/update seed file SHA-224 [#1] 49 HMAC_DRBG write/update seed file SHA-224 [#2] 53 HMAC_DRBG write/update seed file SHA-256 [#1] 57 HMAC_DRBG write/update seed file SHA-256 [#2] 61 HMAC_DRBG write/update seed file SHA-384 [#1] 65 HMAC_DRBG write/update seed file SHA-384 [#2] 69 HMAC_DRBG write/update seed file SHA-512 [#1] 73 HMAC_DRBG write/update seed file SHA-512 [#2] [all …]
|
D | test_suite_entropy.data | 10 Entropy write/update seed file: good 13 Entropy write/update seed file: nonexistent 16 Entropy write/update seed file: base NV seed file 73 Check NV seed standard IO 76 Check NV seed manually #1 79 Check NV seed manually #2 82 Check NV seed manually #3
|
D | test_suite_lmots.function | 32 data_t *seed) 42 key_id->x, leaf_id, seed->x, seed->len), 0); 55 void lmots_sign_verify_null_msg_test(data_t *key_id, int leaf_id, data_t *seed) 65 key_id->x, leaf_id, seed->x, seed->len), 0); 199 void lmots_reuse_test(data_t *msg, data_t *key_id, int leaf_id, data_t *seed) 206 key_id->x, leaf_id, seed->x, 207 seed->len), 0); 225 data_t *seed) 237 key_id->x, leaf_id, seed->x, 238 seed->len), 0);
|
D | test_suite_psa_crypto_init.data | 1 Create NV seed file 31 # MBEDTLS_PSA_INJECT_ENTROPY means that a source of entropy (the seed file) 62 NV seed only: less than minimum 65 NV seed only: less than one block 68 NV seed only: just enough 71 Recreate NV seed file
|
D | test_suite_lms.function | 12 void lms_sign_verify_test(data_t *msg, data_t *seed) 27 seed->x, seed->len), 0); 45 void lms_sign_verify_null_msg_test(data_t *seed) 60 seed->x, seed->len), 0);
|
D | test_suite_psa_crypto_init.function | 118 /* Skip the NV seed even though it's compiled in. */ 196 static unsigned char seed[ENTROPY_MIN_NV_SEED_SIZE]; 197 TEST_ASSERT(mbedtls_nv_seed_write(seed, sizeof(seed)) >= 0); 410 uint8_t *seed = NULL; 413 TEST_CALLOC(seed, seed_size); 414 TEST_ASSERT(mbedtls_nv_seed_write(seed, seed_size) >= 0); 428 mbedtls_free(seed);
|
D | test_suite_entropy.function | 66 * NV seed read/write functions that use a buffer instead of a file 93 * NV seed read/write helpers that fill the base seedfile 353 /* If the NV seed functionality is enabled, there are two entropy 354 * updates: before and after updating the NV seed. */ 401 /* If the NV seed functionality is enabled, there are two entropy 402 * updates: before and after updating the NV seed. */ 489 // Make sure we read/write NV seed from our buffers 502 // Set the initial NV seed to read
|
D | test_suite_pkcs1_v21.function | 64 data_t *result_str, char *seed, data_t *message_str, 72 ((void) seed);
|
D | test_suite_hmac_drbg.function | 63 /* Set reseed interval before seed */ 93 /* Set reseed interval after seed */
|
D | test_suite_psa_crypto_slot_management.data | 115 Open failure: invalid identifier (random seed UID) 161 Create failure: invalid key id (random seed UID)
|
D | test_suite_pkcs1_v15.function | 69 data_t *result_str, char *seed, 77 ((void) seed);
|
/mbedtls-latest/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 29 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only. 33 … nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later version of M… 35 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on… 64 ### Nonvolatile random seed file format for 0.1.0 66 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit… 68 The file format is just the seed as a byte string with no metadata or encoding of any kind. 76 …ff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-f… 106 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only. 123 ### Nonvolatile random seed file format for 1.0.0 125 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit… [all …]
|
/mbedtls-latest/library/ |
D | ctr_drbg.c | 452 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT]; in mbedtls_ctr_drbg_reseed_internal() local 466 memset(seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT); in mbedtls_ctr_drbg_reseed_internal() 469 if (0 != ctx->f_entropy(ctx->p_entropy, seed, ctx->entropy_len)) { in mbedtls_ctr_drbg_reseed_internal() 476 if (0 != ctx->f_entropy(ctx->p_entropy, seed + seedlen, nonce_len)) { in mbedtls_ctr_drbg_reseed_internal() 484 memcpy(seed + seedlen, additional, len); in mbedtls_ctr_drbg_reseed_internal() 489 if ((ret = block_cipher_df(seed, seed, seedlen)) != 0) { in mbedtls_ctr_drbg_reseed_internal() 494 if ((ret = ctr_drbg_update_internal(ctx, seed)) != 0) { in mbedtls_ctr_drbg_reseed_internal() 500 mbedtls_platform_zeroize(seed, sizeof(seed)); in mbedtls_ctr_drbg_reseed_internal()
|
D | hmac_drbg.c | 138 unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; in hmac_drbg_reseed_core() local 158 memset(seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT); in hmac_drbg_reseed_core() 162 seed, ctx->entropy_len)) != 0) { in hmac_drbg_reseed_core() 178 seed + seedlen, in hmac_drbg_reseed_core() 189 memcpy(seed + seedlen, additional, len); in hmac_drbg_reseed_core() 194 if ((ret = mbedtls_hmac_drbg_update(ctx, seed, seedlen)) != 0) { in hmac_drbg_reseed_core() 203 mbedtls_platform_zeroize(seed, seedlen); in hmac_drbg_reseed_core()
|
D | psa_crypto_storage.c | 457 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed, in mbedtls_psa_storage_inject_entropy() argument 466 status = psa_its_set(PSA_CRYPTO_ITS_RANDOM_SEED_UID, seed_size, seed, 0); in mbedtls_psa_storage_inject_entropy()
|
D | lmots.h | 229 const unsigned char *seed,
|
D | psa_crypto_storage.h | 384 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed,
|
D | lmots.c | 575 const unsigned char *seed, in mbedtls_lmots_generate_private_key() argument 634 status = psa_hash_update(&op, seed, seed_size); in mbedtls_lmots_generate_private_key()
|
D | lms.c | 566 void *p_rng, const unsigned char *seed, in mbedtls_lms_generate_private_key() argument 623 idx, seed, seed_size); in mbedtls_lms_generate_private_key()
|
/mbedtls-latest/programs/test/ |
D | udp_proxy.c | 161 unsigned int seed; /* seed for "random" events */ member 297 opt.seed = atoi(q); in get_options() 298 if (opt.seed == 0) { in get_options() 790 if (opt.seed == 0) { in main() 792 opt.seed = (unsigned int) mbedtls_time(NULL); in main() 794 opt.seed = 1; in main() 796 mbedtls_printf(" . Pseudo-random seed: %u\n", opt.seed); in main() 799 srand(opt.seed); in main()
|
/mbedtls-latest/tests/scripts/ |
D | all.sh | 304 --random-seed Use a random seed value for randomized tests (default). 305 …-r|--release-test Run this script in release mode. This fixes the seed value to ${RELEASE_SEED… 306 -s|--seed Integer seed value to use for this test run. 496 --random-seed) unset SEED;; 499 --seed|-s) shift; SEED="$1";;
|
/mbedtls-latest/ |
D | .gitignore | 1 # Random seed file created by test scripts and sample programs 3 # MBEDTLS_PSA_INJECT_ENTROPY seed file created by the test framework
|
/mbedtls-latest/include/psa/ |
D | crypto_builtin_key_derivation.h | 80 uint8_t *MBEDTLS_PRIVATE(seed);
|
/mbedtls-latest/include/mbedtls/ |
D | lms.h | 368 void *p_rng, const unsigned char *seed,
|