Home
last modified time | relevance | path

Searched refs:seed (Results 1 – 25 of 35) sorted by relevance

12

/openthread-3.5.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_psa_crypto_entropy.function21 /* Remove the entropy seed file. Since the library does not expose a way
128 uint8_t *seed = NULL;
139 ASSERT_ALLOC( seed, seed_size );
140 /* fill seed with some data */
143 seed[i] = i;
148 status = mbedtls_psa_inject_entropy( seed, seed_length_a );
150 status = mbedtls_psa_inject_entropy( seed, seed_length_b );
157 mbedtls_free( seed );
168 uint8_t seed[MBEDTLS_PSA_INJECT_ENTROPY_MIN_SIZE] = { 0 };
169 /* fill seed with some data */
[all …]
Dtest_suite_hmac_drbg.misc.data21 HMAC_DRBG write/update seed file SHA-1 [#1]
25 HMAC_DRBG write/update seed file SHA-1 [#2]
29 HMAC_DRBG write/update seed file SHA-224 [#1]
33 HMAC_DRBG write/update seed file SHA-224 [#2]
37 HMAC_DRBG write/update seed file SHA-256 [#1]
41 HMAC_DRBG write/update seed file SHA-256 [#2]
45 HMAC_DRBG write/update seed file SHA-384 [#1]
49 HMAC_DRBG write/update seed file SHA-384 [#2]
53 HMAC_DRBG write/update seed file SHA-512 [#1]
57 HMAC_DRBG write/update seed file SHA-512 [#2]
Dtest_suite_entropy.data10 Entropy write/update seed file: good
13 Entropy write/update seed file: nonexistent
16 Entropy write/update seed file: base NV seed file
73 Check NV seed standard IO
76 Check NV seed manually #1
79 Check NV seed manually #2
82 Check NV seed manually #3
Dtest_suite_psa_crypto_init.data1 Create NV seed file
56 NV seed only: less than minimum
59 NV seed only: less than one block
62 NV seed only: just enough
65 Recreate NV seed file
Dtest_suite_psa_crypto_init.function120 /* Skip the NV seed even though it's compiled in. */
144 static unsigned char seed[ENTROPY_MIN_NV_SEED_SIZE];
145 TEST_ASSERT( mbedtls_nv_seed_write( seed, sizeof( seed ) ) >= 0 );
284 uint8_t *seed = NULL;
287 ASSERT_ALLOC( seed, seed_size );
288 TEST_ASSERT( mbedtls_nv_seed_write( seed, seed_size ) >= 0 );
301 mbedtls_free( seed );
Dtest_suite_entropy.function67 * NV seed read/write functions that use a buffer instead of a file
90 * NV seed read/write helpers that fill the base seedfile
323 /* If the NV seed functionality is enabled, there are two entropy
324 * updates: before and after updating the NV seed. */
371 /* If the NV seed functionality is enabled, there are two entropy
372 * updates: before and after updating the NV seed. */
460 // Make sure we read/write NV seed from our buffers
471 // Set the initial NV seed to read
Dtest_suite_pkcs1_v21.function57 data_t * result_str, char * seed, data_t * message_str,
65 ((void) seed);
Dtest_suite_hmac_drbg.function60 /* Set reseed interval before seed */
91 /* Set reseed interval after seed */
Dtest_suite_ctr_drbg.function243 /* Set reseed interval before seed */
276 /* Set reseed interval after seed */
Dtest_suite_psa_crypto_slot_management.data115 Open failure: invalid identifier (random seed UID)
150 Create failure: invalid key id (random seed UID)
Dtest_suite_pkcs1_v15.function62 char * seed, data_t * message_str,
70 ((void) seed);
/openthread-3.5.0/tests/unit/
Dtest_array.cpp53 uint16_t seed; in TestArray() local
65 seed = kStartValue; in TestArray()
77 SuccessOrQuit(array.PushBack(seed + len)); in TestArray()
84 *entry = seed + len; in TestArray()
92 VerifyOrQuit(*array.Front() == seed + 1); in TestArray()
94 VerifyOrQuit(*array.Back() == seed + len); in TestArray()
98 VerifyOrQuit(array[index] == seed + index + 1); in TestArray()
100 VerifyOrQuit(*array.At(index) == seed + index + 1); in TestArray()
102 VerifyOrQuit(array.Contains(seed + index + 1)); in TestArray()
103 VerifyOrQuit(array.Find(seed + index + 1) == &array[index]); in TestArray()
[all …]
Dtest_heap.cpp162 for (unsigned int seed = 0; seed < 10; ++seed) in TestAllocateMultiple() local
164 size_t sizeLimit = (1 << seed); in TestAllocateMultiple()
165 printf("TestAllocateRandomly(%zu, %u)...\n", sizeLimit, seed); in TestAllocateMultiple()
166 TestAllocateRandomly(sizeLimit, seed); in TestAllocateMultiple()
/openthread-3.5.0/src/core/common/
Drandom.cpp49 uint32_t seed; in Manager() local
57 SuccessOrAssert(Random::Crypto::Fill(seed)); in Manager()
59 SuccessOrAssert(otPlatEntropyGet(reinterpret_cast<uint8_t *>(&seed), sizeof(seed))); in Manager()
62 sPrng.Init(seed); in Manager()
/openthread-3.5.0/third_party/mbedtls/repo/library/
Dctr_drbg.c366 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT]; in mbedtls_ctr_drbg_reseed_internal() local
377 memset( seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ); in mbedtls_ctr_drbg_reseed_internal()
380 if( 0 != ctx->f_entropy( ctx->p_entropy, seed, ctx->entropy_len ) ) in mbedtls_ctr_drbg_reseed_internal()
389 if( 0 != ctx->f_entropy( ctx->p_entropy, seed + seedlen, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal()
399 memcpy( seed + seedlen, additional, len ); in mbedtls_ctr_drbg_reseed_internal()
404 if( ( ret = block_cipher_df( seed, seed, seedlen ) ) != 0 ) in mbedtls_ctr_drbg_reseed_internal()
408 if( ( ret = ctr_drbg_update_internal( ctx, seed ) ) != 0 ) in mbedtls_ctr_drbg_reseed_internal()
413 mbedtls_platform_zeroize( seed, sizeof( seed ) ); in mbedtls_ctr_drbg_reseed_internal()
Dhmac_drbg.c157 unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; in hmac_drbg_reseed_core() local
177 memset( seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT ); in hmac_drbg_reseed_core()
181 seed, ctx->entropy_len ) ) != 0 ) in hmac_drbg_reseed_core()
199 seed + seedlen, in hmac_drbg_reseed_core()
212 memcpy( seed + seedlen, additional, len ); in hmac_drbg_reseed_core()
217 if( ( ret = mbedtls_hmac_drbg_update_ret( ctx, seed, seedlen ) ) != 0 ) in hmac_drbg_reseed_core()
225 mbedtls_platform_zeroize( seed, seedlen ); in hmac_drbg_reseed_core()
Dpsa_crypto_storage.h391 psa_status_t mbedtls_psa_storage_inject_entropy( const unsigned char *seed,
Dpsa_crypto_storage.c461 psa_status_t mbedtls_psa_storage_inject_entropy( const unsigned char *seed, in mbedtls_psa_storage_inject_entropy() argument
471 status = psa_its_set( PSA_CRYPTO_ITS_RANDOM_SEED_UID, seed_size, seed, 0 ); in mbedtls_psa_storage_inject_entropy()
Dpsa_crypto.c3878 if( operation->ctx.tls12_prf.seed != NULL ) in psa_key_derivation_abort()
3880 mbedtls_platform_zeroize( operation->ctx.tls12_prf.seed, in psa_key_derivation_abort()
3882 mbedtls_free( operation->ctx.tls12_prf.seed ); in psa_key_derivation_abort()
4067 tls12_prf->seed, in psa_key_derivation_tls12_prf_generate_next_block()
4101 status = psa_mac_update( &hmac, tls12_prf->seed, tls12_prf->seed_length ); in psa_key_derivation_tls12_prf_generate_next_block()
4521 prf->seed = mbedtls_calloc( 1, data_length ); in psa_tls12_prf_set_seed()
4522 if( prf->seed == NULL ) in psa_tls12_prf_set_seed()
4525 memcpy( prf->seed, data, data_length ); in psa_tls12_prf_set_seed()
5138 psa_status_t mbedtls_psa_inject_entropy( const uint8_t *seed, in mbedtls_psa_inject_entropy() argument
5149 return( mbedtls_psa_storage_inject_entropy( seed, seed_size ) ); in mbedtls_psa_inject_entropy()
/openthread-3.5.0/third_party/mbedtls/repo/docs/architecture/
Dmbed-crypto-storage-specification.md27 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only.
31 … nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later version of M…
33 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on…
62 ### Nonvolatile random seed file format for 0.1.0
64 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit…
66 The file format is just the seed as a byte string with no metadata or encoding of any kind.
74 …ff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-f…
104 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only.
121 ### Nonvolatile random seed file format for 1.0.0
123 [Identical to 0.1.0](#nonvolatile-random-seed-file-format-for-0.1.0).
[all …]
/openthread-3.5.0/third_party/mbedtls/repo/programs/test/
Dudp_proxy.c172 unsigned int seed; /* seed for "random" events */ member
326 opt.seed = atoi( q ); in get_options()
327 if( opt.seed == 0 ) in get_options()
834 if( opt.seed == 0 ) in main()
836 opt.seed = (unsigned int) time( NULL ); in main()
837 mbedtls_printf( " . Pseudo-random seed: %u\n", opt.seed ); in main()
840 srand( opt.seed ); in main()
/openthread-3.5.0/third_party/mbedtls/repo/
D.gitignore1 # Random seed file created by test scripts and sample programs
/openthread-3.5.0/third_party/mbedtls/repo/include/psa/
Dcrypto_extra.h328 psa_status_t mbedtls_psa_inject_entropy(const uint8_t *seed,
Dcrypto_struct.h219 uint8_t *seed; member
/openthread-3.5.0/third_party/mbedtls/repo/programs/
DREADME.md57 …Note: most applications should only use the entropy generator to seed a cryptographic pseudorandom…
59 …m/gen_random_ctr_drbg.c): shows how to use the default entropy sources to seed a pseudorandom gene…

12