Home
last modified time | relevance | path

Searched refs:setup (Results 1 – 24 of 24) sorted by relevance

/mbedtls-latest/tests/suites/
Dtest_suite_block_cipher.function35 /* Bad parameters to setup */
41 /* setkey() before successful setup() */
45 /* encrypt() before successful setup() */
49 /* free() before successful setup()
53 /* Now properly setup the context */
Dtest_suite_psa_crypto_driver_wrappers.data637 Hash multi-part setup: SHA-256, computed by the driver
641 Hash multi-part setup: SHA-256, fallback
645 Hash multi-part setup: SHA-256, no fallback
649 Hash multi-part setup: SHA-256, INSUFFICIENT_MEMORY
804 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1
808 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1, fallback
812 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1, INSUFFICIENT_MEMORY
816 PSA AEAD decrypt setup, AES-GCM, 144 bytes #1
820 PSA AEAD decrypt setup, AES-GCM, 144 bytes #1, fallback
824 PSA AEAD decrypt setup, AES-GCM, 144 bytes #1, insufficient memory
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function151 /* Adjust for indirect client driver setup in first pake_output call. */
1517 /* Test setup call, encrypt */
1520 /* When setup fails, it shouldn't call any further entry points */
1528 /* Test setup call failure, decrypt */
1530 /* When setup fails, it shouldn't call any further entry points */
3074 case 0: /* setup (via input) */
3075 /* --- psa_pake_input (driver: setup, input) --- */
3082 TEST_EQUAL(mbedtls_test_driver_pake_hooks.hits.setup, 1);
3085 case 1: /* setup (via output) */
3086 /* --- psa_pake_output (driver: setup, output) --- */
[all …]
Dtest_suite_psa_crypto_low_hash.function73 mbedtls_psa_hash_operation_t clone_start; // cloned after setup
101 /* Nominal case with an operation cloned after setup */
Dtest_suite_psa_crypto.data1604 PSA hash setup: good, SHA-1
1608 PSA hash setup: good, SHA-224
1612 PSA hash setup: good, SHA-256
1616 PSA hash setup: good, SHA-384
1620 PSA hash setup: good, SHA-512
1624 PSA hash setup: good, MD5
1628 PSA hash setup: good, RIPEMD160
1632 PSA hash setup: bad (unknown hash algorithm)
1636 PSA hash setup: bad (wildcard instead of hash algorithm)
1640 PSA hash setup: bad (not a hash algorithm)
[all …]
Dtest_suite_psa_crypto_pake.data25 PSA PAKE: duplicate a valid setup
29 PSA PAKE: ecjpake setup role
Dtest_suite_psa_crypto.function172 /* Whether setup succeeded or failed, abort must succeed. */
174 /* If setup failed, reproduce the failure, so that the caller can
204 /* Whether setup succeeded or failed, abort must succeed. */
206 /* If setup failed, reproduce the failure, so that the caller can
2967 /* Whether setup succeeded or failed, abort must succeed. */
2970 /* If setup failed, reproduce the failure, so as to
3195 /* Call setup twice in a row. */
3204 /* Call update without calling setup beforehand. */
3227 /* Call verify without calling setup beforehand. */
3254 /* Call finish without calling setup beforehand. */
[all …]
Dmain_test.function246 * Note that we do this before the platform setup (which may access
Dtest_suite_psa_crypto_init.function168 /* Bad state due to entropy sources already being setup in
Dtest_suite_rsa.function1083 /* If we were providing enough information to setup a complete private context,
1235 /* If we were providing enough information to setup a complete private context,
Dtest_suite_pk.function246 * Predefined keys used for the setup are taken from "test/src/test_keys.h"
250 * (mbedtls_pk_init()), but not setup (mbedtls_pk_setup()).
2057 * The PSA key was setup to use PKCS1 v1.5 signature algorithm, but here we try
Dtest_suite_psa_crypto_pake.function570 * the pake's context structure is compromised and the setup function cannot
Dtest_suite_pk.data61 PK PSA utilities: ECDSA setup/free, info functions, unsupported operations
65 PK PSA utilities: RSA setup/free, info functions, unsupported operations
/mbedtls-latest/tests/include/test/drivers/
Dpake.h26 unsigned long setup; member
/mbedtls-latest/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md146 * Functions called: `setup`, `setkey`, `set_iv`, `reset`, `update`, `finish` (in sequence, once).
151 * Functions called: `setup`, `setkey`, `crypt`.
162 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish)
168 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish)
174 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish)
181 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish)
375 … check if the cipher is supported, (2) to check its block size, (3) because `setup()` requires it).
594 an `mbedtls_cipher_id_t` in the `setup()` function, because that's how they're
612 …SA or legacy. All functions consult the context's `engine` field, except `setup()` which will set …
Dstrategy.md193 There are two variants of this strategy: one where using the new setup
/mbedtls-latest/tests/src/drivers/
Dtest_driver_pake.c29 mbedtls_test_driver_pake_hooks.hits.setup++; in mbedtls_test_transparent_pake_setup()
/mbedtls-latest/docs/architecture/
Dalternative-implementations.md12 …_XXX_ALT` and [register an alternative implementation during the platform setup](#alternative-impl…
Dpsa-shared-memory.md178 Key derivation typically emits its output as a stream, with no error condition detected after setup
440 …heck that each location was accessed exactly twice: once by the program's setup and once by the PS…
475 Most of the test methods discussed above need extra setup. Some require leaking of buffer bounds, p…
/mbedtls-latest/docs/proposed/
Dpsa-driver-interface.md258 …ain any embedded pointers (except pointers to global data that do not change after the setup step).
330 …rivation-driver-initial-inputs). See [“Key derivation driver setup”](#key-derivation-driver-setup).
399 … `inputs` must be a pointer passed by the core to a key derivation driver setup entry point which …
414 #### Key derivation driver setup
665 The first parameter `inputs` must be a pointer passed by the core to a PAKE driver setup entry poin…
673 #### PAKE driver setup
683 The setup driver function should preserve the inputs using get-data functions.
/mbedtls-latest/docs/
Dpsa-transition.md382 If you need to interrupt the operation after calling the setup function without calling the finish …
414 If you need to interrupt the operation after calling the setup function without calling the finish …
418 …93d92318c8f592ee9fbb9d36ba0). Note that you must set the key again with a setup function: the PSA …
521 If you need to interrupt the operation after calling the setup function without calling the finish …
579 If you need to interrupt the operation after calling the setup function without calling the finish …
590 …p___m_a_c_1gacd8dd54855ba1bc0a03f104f252884fd). Note that you must call a setup function to specif…
1283 …A-ALT interface (`MBEDTLS_PK_RSA_ALT` pk type, `mbedtls_pk_setup_rsa_alt` setup function) should m…
/mbedtls-latest/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md225 Multi-part and restartable operations each have a "setup" function where the key is passed in, thes…
/mbedtls-latest/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja1554 /* Try setup on accelerators first */
/mbedtls-latest/
DChangeLog3705 * Add platform setup and teardown calls in test suites.
3863 independent setup and export of RSA contexts. Most notably,
3866 needs of the implementation automatically. This allows to setup private RSA
4007 platform-specific setup and teardown operations. The macro
6182 serial number, setup correct server port in the ssl client example