Home
last modified time | relevance | path

Searched refs:seed (Results 1 – 25 of 41) sorted by relevance

12

/mbedtls-latest/tests/suites/
Dtest_suite_psa_crypto_entropy.function17 /* Check the entropy seed file.
23 * the entropy seed file exists and has exactly this size,
26 * the entropy seed file does not exist or has a different size,
30 * \note We enforce that the seed is in a specific ITS file.
32 * the library is upgraded on a device with an existing seed.
36 /* The value of the random seed UID must not change. Otherwise that would
37 * break upgrades of the library on devices that already contain a seed
58 /* Remove the entropy seed file.
158 uint8_t *seed = NULL;
166 TEST_CALLOC(seed, seed_size);
[all …]
Dtest_suite_hmac_drbg.misc.data37 HMAC_DRBG write/update seed file SHA-1 [#1]
41 HMAC_DRBG write/update seed file SHA-1 [#2]
45 HMAC_DRBG write/update seed file SHA-224 [#1]
49 HMAC_DRBG write/update seed file SHA-224 [#2]
53 HMAC_DRBG write/update seed file SHA-256 [#1]
57 HMAC_DRBG write/update seed file SHA-256 [#2]
61 HMAC_DRBG write/update seed file SHA-384 [#1]
65 HMAC_DRBG write/update seed file SHA-384 [#2]
69 HMAC_DRBG write/update seed file SHA-512 [#1]
73 HMAC_DRBG write/update seed file SHA-512 [#2]
[all …]
Dtest_suite_entropy.data10 Entropy write/update seed file: good
13 Entropy write/update seed file: nonexistent
16 Entropy write/update seed file: base NV seed file
73 Check NV seed standard IO
76 Check NV seed manually #1
79 Check NV seed manually #2
82 Check NV seed manually #3
Dtest_suite_lmots.function32 data_t *seed)
42 key_id->x, leaf_id, seed->x, seed->len), 0);
55 void lmots_sign_verify_null_msg_test(data_t *key_id, int leaf_id, data_t *seed)
65 key_id->x, leaf_id, seed->x, seed->len), 0);
199 void lmots_reuse_test(data_t *msg, data_t *key_id, int leaf_id, data_t *seed)
206 key_id->x, leaf_id, seed->x,
207 seed->len), 0);
225 data_t *seed)
237 key_id->x, leaf_id, seed->x,
238 seed->len), 0);
Dtest_suite_psa_crypto_init.data1 Create NV seed file
31 # MBEDTLS_PSA_INJECT_ENTROPY means that a source of entropy (the seed file)
62 NV seed only: less than minimum
65 NV seed only: less than one block
68 NV seed only: just enough
71 Recreate NV seed file
Dtest_suite_lms.function12 void lms_sign_verify_test(data_t *msg, data_t *seed)
27 seed->x, seed->len), 0);
45 void lms_sign_verify_null_msg_test(data_t *seed)
60 seed->x, seed->len), 0);
Dtest_suite_psa_crypto_init.function118 /* Skip the NV seed even though it's compiled in. */
196 static unsigned char seed[ENTROPY_MIN_NV_SEED_SIZE];
197 TEST_ASSERT(mbedtls_nv_seed_write(seed, sizeof(seed)) >= 0);
410 uint8_t *seed = NULL;
413 TEST_CALLOC(seed, seed_size);
414 TEST_ASSERT(mbedtls_nv_seed_write(seed, seed_size) >= 0);
428 mbedtls_free(seed);
Dtest_suite_entropy.function66 * NV seed read/write functions that use a buffer instead of a file
93 * NV seed read/write helpers that fill the base seedfile
353 /* If the NV seed functionality is enabled, there are two entropy
354 * updates: before and after updating the NV seed. */
401 /* If the NV seed functionality is enabled, there are two entropy
402 * updates: before and after updating the NV seed. */
489 // Make sure we read/write NV seed from our buffers
502 // Set the initial NV seed to read
Dtest_suite_pkcs1_v21.function64 data_t *result_str, char *seed, data_t *message_str,
72 ((void) seed);
Dtest_suite_hmac_drbg.function63 /* Set reseed interval before seed */
93 /* Set reseed interval after seed */
Dtest_suite_psa_crypto_slot_management.data115 Open failure: invalid identifier (random seed UID)
161 Create failure: invalid key id (random seed UID)
Dtest_suite_pkcs1_v15.function69 data_t *result_str, char *seed,
77 ((void) seed);
/mbedtls-latest/docs/architecture/
Dmbed-crypto-storage-specification.md29 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only.
33 … nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later version of M…
35 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on…
64 ### Nonvolatile random seed file format for 0.1.0
66 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit…
68 The file format is just the seed as a byte string with no metadata or encoding of any kind.
76 …ff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-f…
106 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only.
123 ### Nonvolatile random seed file format for 1.0.0
125 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit…
[all …]
/mbedtls-latest/library/
Dctr_drbg.c452 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT]; in mbedtls_ctr_drbg_reseed_internal() local
466 memset(seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT); in mbedtls_ctr_drbg_reseed_internal()
469 if (0 != ctx->f_entropy(ctx->p_entropy, seed, ctx->entropy_len)) { in mbedtls_ctr_drbg_reseed_internal()
476 if (0 != ctx->f_entropy(ctx->p_entropy, seed + seedlen, nonce_len)) { in mbedtls_ctr_drbg_reseed_internal()
484 memcpy(seed + seedlen, additional, len); in mbedtls_ctr_drbg_reseed_internal()
489 if ((ret = block_cipher_df(seed, seed, seedlen)) != 0) { in mbedtls_ctr_drbg_reseed_internal()
494 if ((ret = ctr_drbg_update_internal(ctx, seed)) != 0) { in mbedtls_ctr_drbg_reseed_internal()
500 mbedtls_platform_zeroize(seed, sizeof(seed)); in mbedtls_ctr_drbg_reseed_internal()
Dhmac_drbg.c138 unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; in hmac_drbg_reseed_core() local
158 memset(seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT); in hmac_drbg_reseed_core()
162 seed, ctx->entropy_len)) != 0) { in hmac_drbg_reseed_core()
178 seed + seedlen, in hmac_drbg_reseed_core()
189 memcpy(seed + seedlen, additional, len); in hmac_drbg_reseed_core()
194 if ((ret = mbedtls_hmac_drbg_update(ctx, seed, seedlen)) != 0) { in hmac_drbg_reseed_core()
203 mbedtls_platform_zeroize(seed, seedlen); in hmac_drbg_reseed_core()
Dpsa_crypto_storage.c457 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed, in mbedtls_psa_storage_inject_entropy() argument
466 status = psa_its_set(PSA_CRYPTO_ITS_RANDOM_SEED_UID, seed_size, seed, 0); in mbedtls_psa_storage_inject_entropy()
Dlmots.h229 const unsigned char *seed,
Dpsa_crypto_storage.h384 psa_status_t mbedtls_psa_storage_inject_entropy(const unsigned char *seed,
Dlmots.c575 const unsigned char *seed, in mbedtls_lmots_generate_private_key() argument
634 status = psa_hash_update(&op, seed, seed_size); in mbedtls_lmots_generate_private_key()
Dlms.c566 void *p_rng, const unsigned char *seed, in mbedtls_lms_generate_private_key() argument
623 idx, seed, seed_size); in mbedtls_lms_generate_private_key()
/mbedtls-latest/programs/test/
Dudp_proxy.c161 unsigned int seed; /* seed for "random" events */ member
297 opt.seed = atoi(q); in get_options()
298 if (opt.seed == 0) { in get_options()
790 if (opt.seed == 0) { in main()
792 opt.seed = (unsigned int) mbedtls_time(NULL); in main()
794 opt.seed = 1; in main()
796 mbedtls_printf(" . Pseudo-random seed: %u\n", opt.seed); in main()
799 srand(opt.seed); in main()
/mbedtls-latest/tests/scripts/
Dall.sh304 --random-seed Use a random seed value for randomized tests (default).
305 …-r|--release-test Run this script in release mode. This fixes the seed value to ${RELEASE_SEED…
306 -s|--seed Integer seed value to use for this test run.
496 --random-seed) unset SEED;;
499 --seed|-s) shift; SEED="$1";;
/mbedtls-latest/
D.gitignore1 # Random seed file created by test scripts and sample programs
3 # MBEDTLS_PSA_INJECT_ENTROPY seed file created by the test framework
/mbedtls-latest/include/psa/
Dcrypto_builtin_key_derivation.h80 uint8_t *MBEDTLS_PRIVATE(seed);
/mbedtls-latest/include/mbedtls/
Dlms.h368 void *p_rng, const unsigned char *seed,

12