| /mbedtls/tests/suites/ |
| A D | test_suite_block_cipher.function | 35 /* Bad parameters to setup */ 41 /* setkey() before successful setup() */ 45 /* encrypt() before successful setup() */ 49 /* free() before successful setup() 53 /* Now properly setup the context */
|
| A D | test_suite_psa_crypto_driver_wrappers.data | 633 Hash multi-part setup: SHA-256, computed by the driver 637 Hash multi-part setup: SHA-256, fallback 641 Hash multi-part setup: SHA-256, no fallback 645 Hash multi-part setup: SHA-256, INSUFFICIENT_MEMORY 800 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1 804 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1, fallback 808 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1, INSUFFICIENT_MEMORY 812 PSA AEAD decrypt setup, AES-GCM, 144 bytes #1 816 PSA AEAD decrypt setup, AES-GCM, 144 bytes #1, fallback 820 PSA AEAD decrypt setup, AES-GCM, 144 bytes #1, insufficient memory [all …]
|
| A D | test_suite_psa_crypto_driver_wrappers.function | 1501 /* Test setup call, encrypt */ 1512 /* Test setup call failure, decrypt */ 3058 case 0: /* setup (via input) */ 3059 /* --- psa_pake_input (driver: setup, input) --- */ 3066 TEST_EQUAL(mbedtls_test_driver_pake_hooks.hits.setup, 1); 3069 case 1: /* setup (via output) */ 3070 /* --- psa_pake_output (driver: setup, output) --- */ 3077 TEST_EQUAL(mbedtls_test_driver_pake_hooks.hits.setup, 1); 3088 TEST_EQUAL(mbedtls_test_driver_pake_hooks.hits.setup, 1); 3120 /* Call driver setup indirectly */ [all …]
|
| A D | test_suite_psa_crypto_low_hash.function | 73 mbedtls_psa_hash_operation_t clone_start; // cloned after setup 101 /* Nominal case with an operation cloned after setup */
|
| A D | test_suite_psa_crypto.data | 1604 PSA hash setup: good, SHA-1 1608 PSA hash setup: good, SHA-224 1612 PSA hash setup: good, SHA-256 1616 PSA hash setup: good, SHA-384 1620 PSA hash setup: good, SHA-512 1624 PSA hash setup: good, MD5 1628 PSA hash setup: good, RIPEMD160 1742 PSA MAC setup: good, HMAC-SHA-256 1746 PSA MAC setup: good, AES-CMAC 2197 PSA cipher setup: good, AES-CTR [all …]
|
| A D | test_suite_psa_crypto_pake.data | 25 PSA PAKE: duplicate a valid setup 29 PSA PAKE: ecjpake setup role
|
| A D | main_test.function | 246 * Note that we do this before the platform setup (which may access
|
| A D | test_suite_psa_crypto.function | 2990 /* If setup failed, reproduce the failure, so as to 3215 /* Call setup twice in a row. */ 3224 /* Call update without calling setup beforehand. */ 3247 /* Call verify without calling setup beforehand. */ 3274 /* Call finish without calling setup beforehand. */ 3554 /* Call update without calling setup beforehand. */ 3571 /* Call setup twice in a row. */ 3983 /* Call encrypt setup twice in a row. */ 3992 /* Call decrypt setup twice in a row. */ 4032 /* Set an IV without calling setup beforehand. */ [all …]
|
| A D | test_suite_psa_crypto_init.function | 151 /* Bad state due to entropy sources already being setup in
|
| A D | test_suite_rsa.function | 1083 /* If we were providing enough information to setup a complete private context, 1235 /* If we were providing enough information to setup a complete private context,
|
| A D | test_suite_psa_crypto_pake.function | 570 * the pake's context structure is compromised and the setup function cannot
|
| A D | test_suite_pk.data | 61 PK PSA utilities: ECDSA setup/free, info functions, unsupported operations 65 PK PSA utilities: RSA setup/free, info functions, unsupported operations
|
| /mbedtls/tests/include/test/drivers/ |
| A D | pake.h | 26 unsigned long setup; member
|
| /mbedtls/tests/src/drivers/ |
| A D | test_driver_pake.c | 29 mbedtls_test_driver_pake_hooks.hits.setup++; in mbedtls_test_transparent_pake_setup()
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | md-cipher-dispatch.md | 146 * Functions called: `setup`, `setkey`, `set_iv`, `reset`, `update`, `finish` (in sequence, once). 151 * Functions called: `setup`, `setkey`, `crypt`. 162 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish) 168 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish) 174 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish) 181 * Functions called: `info`, `setup`, `setkey`, `update` (several times) - (never finish) 375 … check if the cipher is supported, (2) to check its block size, (3) because `setup()` requires it). 594 an `mbedtls_cipher_id_t` in the `setup()` function, because that's how they're 612 …SA or legacy. All functions consult the context's `engine` field, except `setup()` which will set …
|
| A D | strategy.md | 193 There are two variants of this strategy: one where using the new setup
|
| /mbedtls/docs/architecture/ |
| A D | alternative-implementations.md | 12 …_XXX_ALT` and [register an alternative implementation during the platform setup](#alternative-impl…
|
| A D | psa-shared-memory.md | 178 Key derivation typically emits its output as a stream, with no error condition detected after setup… 440 …heck that each location was accessed exactly twice: once by the program's setup and once by the PS… 475 Most of the test methods discussed above need extra setup. Some require leaking of buffer bounds, p…
|
| /mbedtls/docs/proposed/ |
| A D | psa-driver-interface.md | 258 …ain any embedded pointers (except pointers to global data that do not change after the setup step). 330 …rivation-driver-initial-inputs). See [“Key derivation driver setup”](#key-derivation-driver-setup). 399 … `inputs` must be a pointer passed by the core to a key derivation driver setup entry point which … 414 #### Key derivation driver setup 665 The first parameter `inputs` must be a pointer passed by the core to a PAKE driver setup entry poin… 673 #### PAKE driver setup 683 The setup driver function should preserve the inputs using get-data functions.
|
| /mbedtls/docs/ |
| A D | psa-transition.md | 382 If you need to interrupt the operation after calling the setup function without calling the finish … 414 If you need to interrupt the operation after calling the setup function without calling the finish … 418 …93d92318c8f592ee9fbb9d36ba0). Note that you must set the key again with a setup function: the PSA … 521 If you need to interrupt the operation after calling the setup function without calling the finish … 579 If you need to interrupt the operation after calling the setup function without calling the finish … 590 …p___m_a_c_1gacd8dd54855ba1bc0a03f104f252884fd). Note that you must call a setup function to specif… 1283 …A-ALT interface (`MBEDTLS_PK_RSA_ALT` pk type, `mbedtls_pk_setup_rsa_alt` setup function) should m…
|
| /mbedtls/docs/architecture/psa-thread-safety/ |
| A D | psa-thread-safety.md | 225 Multi-part and restartable operations each have a "setup" function where the key is passed in, thes…
|
| /mbedtls/scripts/data_files/driver_templates/ |
| A D | psa_crypto_driver_wrappers.h.jinja | 1553 /* Try setup on accelerators first */
|
| /mbedtls/ |
| A D | ChangeLog | 3510 * Add platform setup and teardown calls in test suites. 3668 independent setup and export of RSA contexts. Most notably, 3671 needs of the implementation automatically. This allows to setup private RSA 3812 platform-specific setup and teardown operations. The macro 5987 serial number, setup correct server port in the ssl client example
|