| /openthread-latest/third_party/mbedtls/repo/tests/suites/ |
| D | test_suite_ecjpake.data | 10 ECJPAKE round one: client, valid 13 ECJPAKE round one: server, valid 16 ECJPAKE round one: role mismatch 19 ECJPAKE round one: trailing byte 22 ECJPAKE round one: KKP1: no data 25 ECJPAKE round one: KKP1: length of first point too small 28 ECJPAKE round one: KKP1: length of first point too big 31 ECJPAKE round one: KKP1: no point data 34 ECJPAKE round one: KKP1: first point is zero 37 ECJPAKE round one: KKP1: unknown first point format [all …]
|
| D | test_suite_random.function | 36 /* First round */ 47 /* Second round */ 83 /* First round */ 94 /* Second round */ 121 /* First round */ 127 /* Second round */ 147 /* First round */ 152 /* Second round */
|
| D | test_suite_mps.data | 1 MPS Reader: Single step, single round, pausing disabled 4 MPS Reader: Single step, single round, pausing enabled but unused 13 MPS Reader: Multiple steps, single round, pausing disabled 16 MPS Reader: Multiple steps, single round, pausing enabled but unused
|
| D | test_suite_psa_crypto_memory.data | 43 PSA crypto local input round-trip 61 PSA crypto local output round-trip
|
| D | test_suite_psa_crypto_pake.function | 108 pake_round_t round, 145 switch (round) { 147 /* Server first round Output */ 216 /* Client first round Input */ 260 /* Client first round Output */ 316 /* Client first round Input */ 354 /* Server first round Input */ 389 /* Server second round Output */ 420 /* Client second round Input */ 443 /* Client second round Output */ [all …]
|
| D | test_suite_psa_crypto_driver_wrappers.function | 20 int round) 55 switch (round) { 57 /* Server first round Output */ 108 /* Client first round Input */ 154 /* Client first round Output */ 205 /* Client first round Input */ 248 /* Server first round Input */ 288 /* Server second round Output */ 317 /* Client second round Input */ 339 /* Client second round Output */ [all …]
|
| D | test_suite_psa_crypto.function | 708 int round, int inject_error) 744 switch (round) { 746 /* Server first round Output */ 799 /* Client first round Input */ 866 /* Client first round Output */ 905 /* Client first round Input */ 978 /* Server first round Input */ 1042 /* Server second round Output */ 1070 /* Client second round Input */ 1107 /* Client second round Output */ [all …]
|
| D | test_suite_mps.function | 133 /* This test exercises one round of the following: 186 /* This test exercises one round of fetching a buffer in multiple chunks
|
| /openthread-latest/third_party/mbedtls/repo/include/psa/ |
| D | crypto_extra.h | 1819 psa_jpake_round_t MBEDTLS_PRIVATE(round); 1830 #define PSA_JPAKE_EXPECTED_INPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument 1831 ((round) == PSA_JPAKE_FIRST ? 2 : 1)) 1832 #define PSA_JPAKE_EXPECTED_OUTPUTS(round) ((round) == PSA_JPAKE_FINISHED ? 0 : \ argument 1833 ((round) == PSA_JPAKE_FIRST ? 2 : 1))
|
| /openthread-latest/third_party/mbedtls/repo/library/ |
| D | sha3.c | 107 for (int round = 0; round < 24; round++) { in keccak_f1600() local 240 s[0] ^= ((iota_r_packed[round] & 0x40ull) << 57 | in keccak_f1600() 241 (iota_r_packed[round] & 0x20ull) << 26 | in keccak_f1600() 242 (iota_r_packed[round] & 0x10ull) << 11 | in keccak_f1600() 243 (iota_r_packed[round] & 0x8f)); in keccak_f1600()
|
| D | psa_crypto.c | 8615 if (stage->round == PSA_JPAKE_FIRST) { in convert_jpake_computation_stage_to_driver_step() 8627 } else if (stage->round == PSA_JPAKE_SECOND) { in convert_jpake_computation_stage_to_driver_step() 8696 if (computation_stage->round != PSA_JPAKE_FIRST && in psa_jpake_prologue() 8697 computation_stage->round != PSA_JPAKE_SECOND) { in psa_jpake_prologue() 8732 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round)) { in psa_jpake_epilogue() 8738 if (stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { in psa_jpake_epilogue() 8742 if (stage->inputs == PSA_JPAKE_EXPECTED_INPUTS(stage->round) && in psa_jpake_epilogue() 8743 stage->outputs == PSA_JPAKE_EXPECTED_OUTPUTS(stage->round)) { in psa_jpake_epilogue() 8747 stage->round++; in psa_jpake_epilogue() 8930 if (computation_stage->round != PSA_JPAKE_FINISHED) { in psa_pake_get_implicit_key()
|
| D | ssl_misc.h | 2681 size_t len, mbedtls_ecjpake_rounds_t round); 2700 mbedtls_ecjpake_rounds_t round);
|
| D | ecp_curves_new.c | 5506 size_t round; in mbedtls_ecp_mod_p448_raw() local 5584 for (round = 0; round < 2; ++round) { in mbedtls_ecp_mod_p448_raw()
|
| D | ssl_tls.c | 9244 size_t len, mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_read_round() argument 9252 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_read_round() 9287 mbedtls_ecjpake_rounds_t round) in mbedtls_psa_ecjpake_write_round() argument 9296 unsigned int remaining_steps = (round == MBEDTLS_ECJPAKE_ROUND_ONE) ? 2 : 1; in mbedtls_psa_ecjpake_write_round()
|
| /openthread-latest/third_party/mbedtls/repo/docs/architecture/ |
| D | tls13-support.md | 166 work to reduce review rounds and the number of comments in each round. They
|
| D | psa-shared-memory.md | 338 Specifically, ASan will round the buffer size down to 8 bytes before poisoning due to details of it…
|
| /openthread-latest/third_party/mbedtls/repo/docs/proposed/ |
| D | psa-driver-interface.md | 857 1. The core makes a first round of calls to `"get_entropy"` on every source with the `BLOCK` flag c… 858 2. The core makes a second round of calls with the `BLOCK` flag set and the `KEEPALIVE` flag clear … 859 3. If the second round does not collect enough entropy, the core makes more similar rounds, until t…
|
| /openthread-latest/third_party/mbedtls/repo/ |
| D | ChangeLog | 2547 these variables can be used to recover the last round key. To follow best
|