Home
last modified time | relevance | path

Searched refs:round (Results 1 – 18 of 18) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ecjpake.data10 ECJPAKE round one: client, valid
13 ECJPAKE round one: server, valid
16 ECJPAKE round one: role mismatch
19 ECJPAKE round one: trailing byte
22 ECJPAKE round one: KKP1: no data
25 ECJPAKE round one: KKP1: length of first point too small
28 ECJPAKE round one: KKP1: length of first point too big
31 ECJPAKE round one: KKP1: no point data
34 ECJPAKE round one: KKP1: first point is zero
37 ECJPAKE round one: KKP1: unknown first point format
[all …]
Dtest_suite_random.function36 /* First round */
47 /* Second round */
83 /* First round */
94 /* Second round */
121 /* First round */
127 /* Second round */
147 /* First round */
152 /* Second round */
Dtest_suite_mps.data1 MPS Reader: Single step, single round, pausing disabled
4 MPS Reader: Single step, single round, pausing enabled but unused
13 MPS Reader: Multiple steps, single round, pausing disabled
16 MPS Reader: Multiple steps, single round, pausing enabled but unused
Dtest_suite_psa_crypto_memory.data43 PSA crypto local input round-trip
61 PSA crypto local output round-trip
Dtest_suite_psa_crypto_pake.function108 pake_round_t round,
145 switch (round) {
147 /* Server first round Output */
216 /* Client first round Input */
260 /* Client first round Output */
316 /* Client first round Input */
354 /* Server first round Input */
389 /* Server second round Output */
420 /* Client second round Input */
443 /* Client second round Output */
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function20 int round)
55 switch (round) {
57 /* Server first round Output */
108 /* Client first round Input */
154 /* Client first round Output */
205 /* Client first round Input */
248 /* Server first round Input */
288 /* Server second round Output */
317 /* Client second round Input */
339 /* Client second round Output */
[all …]
Dtest_suite_psa_crypto.function708 int round, int inject_error)
744 switch (round) {
746 /* Server first round Output */
799 /* Client first round Input */
866 /* Client first round Output */
905 /* Client first round Input */
978 /* Server first round Input */
1042 /* Server second round Output */
1070 /* Client second round Input */
1107 /* Client second round Output */
[all …]
Dtest_suite_mps.function133 /* This test exercises one round of the following:
186 /* This test exercises one round of fetching a buffer in multiple chunks
/openthread-latest/third_party/mbedtls/repo/include/psa/
Dcrypto_extra.h1819 psa_jpake_round_t MBEDTLS_PRIVATE(round);
1830 #define PSA_JPAKE_EXPECTED_INPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument
1831 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
1832 #define PSA_JPAKE_EXPECTED_OUTPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument
1833 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
/openthread-latest/third_party/mbedtls/repo/library/
Dsha3.c107 for (int round = 0; round < 24; round++) { in keccak_f1600() local
240 s[0] ^= ((iota_r_packed[round] & 0x40ull) << 57 | in keccak_f1600()
241 (iota_r_packed[round] & 0x20ull) << 26 | in keccak_f1600()
242 (iota_r_packed[round] & 0x10ull) << 11 | in keccak_f1600()
243 (iota_r_packed[round] & 0x8f)); in keccak_f1600()
Dpsa_crypto.c8615 if (stage->round == PSA_JPAKE_FIRST) { in convert_jpake_computation_stage_to_driver_step()
8627 } else if (stage->round == PSA_JPAKE_SECOND) { in convert_jpake_computation_stage_to_driver_step()
8696 if (computation_stage->round != PSA_JPAKE_FIRST && in psa_jpake_prologue()
8697 computation_stage->round != PSA_JPAKE_SECOND) { in psa_jpake_prologue()
8732 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round)) { in psa_jpake_epilogue()
8738 if (stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { in psa_jpake_epilogue()
8742 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round) && in psa_jpake_epilogue()
8743 stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { in psa_jpake_epilogue()
8747 stage->round++; in psa_jpake_epilogue()
8930 if (computation_stage->round != PSA_JPAKE_FINISHED) { in psa_pake_get_implicit_key()
Dssl_misc.h2681 size_t len, mbedtls_ecjpake_rounds_t round);
2700 mbedtls_ecjpake_rounds_t round);
Decp_curves_new.c5506 size_t round; in mbedtls_ecp_mod_p448_raw() local
5584 for (round = 0; round < 2; ++round) { in mbedtls_ecp_mod_p448_raw()
Dssl_tls.c9244 size_t len, mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_read_round() argument
9252 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_read_round()
9287 mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_write_round() argument
9296 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_write_round()
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dtls13-support.md166 work to reduce review rounds and the number of comments in each round. They
Dpsa-shared-memory.md338 Specifically, ASan will round the buffer size down to 8 bytes before poisoning due to details of it…
/openthread-latest/third_party/mbedtls/repo/docs/proposed/
Dpsa-driver-interface.md857 1. The core makes a first round of calls to `"get_entropy"` on every source with the `BLOCK` flag c…
858 2. The core makes a second round of calls with the `BLOCK` flag set and the `KEEPALIVE` flag clear …
859 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…
/openthread-latest/third_party/mbedtls/repo/
DChangeLog2547 these variables can be used to recover the last round key. To follow best