/openthread-3.5.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_psa_crypto_entropy.function | 21 /* Remove the entropy seed file. Since the library does not expose a way 128 uint8_t *seed = NULL; 139 ASSERT_ALLOC( seed, seed_size ); 140 /* fill seed with some data */ 143 seed[i] = i; 148 status = mbedtls_psa_inject_entropy( seed, seed_length_a ); 150 status = mbedtls_psa_inject_entropy( seed, seed_length_b ); 157 mbedtls_free( seed ); 168 uint8_t seed[MBEDTLS_PSA_INJECT_ENTROPY_MIN_SIZE] = { 0 }; 169 /* fill seed with some data */ [all …]
|
D | test_suite_hmac_drbg.misc.data | 21 HMAC_DRBG write/update seed file SHA-1 [#1] 25 HMAC_DRBG write/update seed file SHA-1 [#2] 29 HMAC_DRBG write/update seed file SHA-224 [#1] 33 HMAC_DRBG write/update seed file SHA-224 [#2] 37 HMAC_DRBG write/update seed file SHA-256 [#1] 41 HMAC_DRBG write/update seed file SHA-256 [#2] 45 HMAC_DRBG write/update seed file SHA-384 [#1] 49 HMAC_DRBG write/update seed file SHA-384 [#2] 53 HMAC_DRBG write/update seed file SHA-512 [#1] 57 HMAC_DRBG write/update seed file SHA-512 [#2]
|
D | test_suite_entropy.data | 10 Entropy write/update seed file: good 13 Entropy write/update seed file: nonexistent 16 Entropy write/update seed file: base NV seed file 73 Check NV seed standard IO 76 Check NV seed manually #1 79 Check NV seed manually #2 82 Check NV seed manually #3
|
D | test_suite_psa_crypto_init.data | 1 Create NV seed file 56 NV seed only: less than minimum 59 NV seed only: less than one block 62 NV seed only: just enough 65 Recreate NV seed file
|
D | test_suite_psa_crypto_init.function | 120 /* Skip the NV seed even though it's compiled in. */ 144 static unsigned char seed[ENTROPY_MIN_NV_SEED_SIZE]; 145 TEST_ASSERT( mbedtls_nv_seed_write( seed, sizeof( seed ) ) >= 0 ); 284 uint8_t *seed = NULL; 287 ASSERT_ALLOC( seed, seed_size ); 288 TEST_ASSERT( mbedtls_nv_seed_write( seed, seed_size ) >= 0 ); 301 mbedtls_free( seed );
|
D | test_suite_entropy.function | 67 * NV seed read/write functions that use a buffer instead of a file 90 * NV seed read/write helpers that fill the base seedfile 323 /* If the NV seed functionality is enabled, there are two entropy 324 * updates: before and after updating the NV seed. */ 371 /* If the NV seed functionality is enabled, there are two entropy 372 * updates: before and after updating the NV seed. */ 460 // Make sure we read/write NV seed from our buffers 471 // Set the initial NV seed to read
|
D | test_suite_pkcs1_v21.function | 57 data_t * result_str, char * seed, data_t * message_str, 65 ((void) seed);
|
D | test_suite_hmac_drbg.function | 60 /* Set reseed interval before seed */ 91 /* Set reseed interval after seed */
|
D | test_suite_ctr_drbg.function | 243 /* Set reseed interval before seed */ 276 /* Set reseed interval after seed */
|
D | test_suite_psa_crypto_slot_management.data | 115 Open failure: invalid identifier (random seed UID) 150 Create failure: invalid key id (random seed UID)
|
D | test_suite_pkcs1_v15.function | 62 char * seed, data_t * message_str, 70 ((void) seed);
|
/openthread-3.5.0/tests/unit/ |
D | test_array.cpp | 53 uint16_t seed; in TestArray() local 65 seed = kStartValue; in TestArray() 77 SuccessOrQuit(array.PushBack(seed + len)); in TestArray() 84 *entry = seed + len; in TestArray() 92 VerifyOrQuit(*array.Front() == seed + 1); in TestArray() 94 VerifyOrQuit(*array.Back() == seed + len); in TestArray() 98 VerifyOrQuit(array[index] == seed + index + 1); in TestArray() 100 VerifyOrQuit(*array.At(index) == seed + index + 1); in TestArray() 102 VerifyOrQuit(array.Contains(seed + index + 1)); in TestArray() 103 VerifyOrQuit(array.Find(seed + index + 1) == &array[index]); in TestArray() [all …]
|
D | test_heap.cpp | 162 for (unsigned int seed = 0; seed < 10; ++seed) in TestAllocateMultiple() local 164 size_t sizeLimit = (1 << seed); in TestAllocateMultiple() 165 printf("TestAllocateRandomly(%zu, %u)...\n", sizeLimit, seed); in TestAllocateMultiple() 166 TestAllocateRandomly(sizeLimit, seed); in TestAllocateMultiple()
|
/openthread-3.5.0/src/core/common/ |
D | random.cpp | 49 uint32_t seed; in Manager() local 57 SuccessOrAssert(Random::Crypto::Fill(seed)); in Manager() 59 SuccessOrAssert(otPlatEntropyGet(reinterpret_cast<uint8_t *>(&seed), sizeof(seed))); in Manager() 62 sPrng.Init(seed); in Manager()
|
/openthread-3.5.0/third_party/mbedtls/repo/library/ |
D | ctr_drbg.c | 366 unsigned char seed[MBEDTLS_CTR_DRBG_MAX_SEED_INPUT]; in mbedtls_ctr_drbg_reseed_internal() local 377 memset( seed, 0, MBEDTLS_CTR_DRBG_MAX_SEED_INPUT ); in mbedtls_ctr_drbg_reseed_internal() 380 if( 0 != ctx->f_entropy( ctx->p_entropy, seed, ctx->entropy_len ) ) in mbedtls_ctr_drbg_reseed_internal() 389 if( 0 != ctx->f_entropy( ctx->p_entropy, seed + seedlen, nonce_len ) ) in mbedtls_ctr_drbg_reseed_internal() 399 memcpy( seed + seedlen, additional, len ); in mbedtls_ctr_drbg_reseed_internal() 404 if( ( ret = block_cipher_df( seed, seed, seedlen ) ) != 0 ) in mbedtls_ctr_drbg_reseed_internal() 408 if( ( ret = ctr_drbg_update_internal( ctx, seed ) ) != 0 ) in mbedtls_ctr_drbg_reseed_internal() 413 mbedtls_platform_zeroize( seed, sizeof( seed ) ); in mbedtls_ctr_drbg_reseed_internal()
|
D | hmac_drbg.c | 157 unsigned char seed[MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT]; in hmac_drbg_reseed_core() local 177 memset( seed, 0, MBEDTLS_HMAC_DRBG_MAX_SEED_INPUT ); in hmac_drbg_reseed_core() 181 seed, ctx->entropy_len ) ) != 0 ) in hmac_drbg_reseed_core() 199 seed + seedlen, in hmac_drbg_reseed_core() 212 memcpy( seed + seedlen, additional, len ); in hmac_drbg_reseed_core() 217 if( ( ret = mbedtls_hmac_drbg_update_ret( ctx, seed, seedlen ) ) != 0 ) in hmac_drbg_reseed_core() 225 mbedtls_platform_zeroize( seed, seedlen ); in hmac_drbg_reseed_core()
|
D | psa_crypto_storage.h | 391 psa_status_t mbedtls_psa_storage_inject_entropy( const unsigned char *seed,
|
D | psa_crypto_storage.c | 461 psa_status_t mbedtls_psa_storage_inject_entropy( const unsigned char *seed, in mbedtls_psa_storage_inject_entropy() argument 471 status = psa_its_set( PSA_CRYPTO_ITS_RANDOM_SEED_UID, seed_size, seed, 0 ); in mbedtls_psa_storage_inject_entropy()
|
D | psa_crypto.c | 3878 if( operation->ctx.tls12_prf.seed != NULL ) in psa_key_derivation_abort() 3880 mbedtls_platform_zeroize( operation->ctx.tls12_prf.seed, in psa_key_derivation_abort() 3882 mbedtls_free( operation->ctx.tls12_prf.seed ); in psa_key_derivation_abort() 4067 tls12_prf->seed, in psa_key_derivation_tls12_prf_generate_next_block() 4101 status = psa_mac_update( &hmac, tls12_prf->seed, tls12_prf->seed_length ); in psa_key_derivation_tls12_prf_generate_next_block() 4521 prf->seed = mbedtls_calloc( 1, data_length ); in psa_tls12_prf_set_seed() 4522 if( prf->seed == NULL ) in psa_tls12_prf_set_seed() 4525 memcpy( prf->seed, data, data_length ); in psa_tls12_prf_set_seed() 5138 psa_status_t mbedtls_psa_inject_entropy( const uint8_t *seed, in mbedtls_psa_inject_entropy() argument 5149 return( mbedtls_psa_storage_inject_entropy( seed, seed_size ) ); in mbedtls_psa_inject_entropy()
|
/openthread-3.5.0/third_party/mbedtls/repo/docs/architecture/ |
D | mbed-crypto-storage-specification.md | 27 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-0.1.0) on ITS only. 31 … nonvolatile random seed file produced with Mbed OS 5.11.x and is upgraded to a later version of M… 33 We do not make any promises regarding key storage, or regarding the nonvolatile random seed file on… 62 ### Nonvolatile random seed file format for 0.1.0 64 The nonvolatile random seed file contains a seed for the random generator. If present, it is rewrit… 66 The file format is just the seed as a byte string with no metadata or encoding of any kind. 74 …ff52 (`PSA_CRYPTO_ITS_RANDOM_SEED_UID`): [nonvolatile random seed](#nonvolatile-random-seed-file-f… 104 * [Nonvolatile random seed](#nonvolatile-random-seed-file-format-for-1.0.0) on ITS only. 121 ### Nonvolatile random seed file format for 1.0.0 123 [Identical to 0.1.0](#nonvolatile-random-seed-file-format-for-0.1.0). [all …]
|
/openthread-3.5.0/third_party/mbedtls/repo/programs/test/ |
D | udp_proxy.c | 172 unsigned int seed; /* seed for "random" events */ member 326 opt.seed = atoi( q ); in get_options() 327 if( opt.seed == 0 ) in get_options() 834 if( opt.seed == 0 ) in main() 836 opt.seed = (unsigned int) time( NULL ); in main() 837 mbedtls_printf( " . Pseudo-random seed: %u\n", opt.seed ); in main() 840 srand( opt.seed ); in main()
|
/openthread-3.5.0/third_party/mbedtls/repo/ |
D | .gitignore | 1 # Random seed file created by test scripts and sample programs
|
/openthread-3.5.0/third_party/mbedtls/repo/include/psa/ |
D | crypto_extra.h | 328 psa_status_t mbedtls_psa_inject_entropy(const uint8_t *seed,
|
D | crypto_struct.h | 219 uint8_t *seed; member
|
/openthread-3.5.0/third_party/mbedtls/repo/programs/ |
D | README.md | 57 …Note: most applications should only use the entropy generator to seed a cryptographic pseudorandom… 59 …m/gen_random_ctr_drbg.c): shows how to use the default entropy sources to seed a pseudorandom gene…
|