| /mbedtls/tests/suites/ |
| A D | test_suite_md.data | 291 generic multi step HMAC-MD5 Test Vector RFC2202 #1 295 generic multi step HMAC-MD5 Test Vector RFC2202 #2 299 generic multi step HMAC-MD5 Test Vector RFC2202 #3 303 generic multi step HMAC-MD5 Test Vector RFC2202 #4 307 generic multi step HMAC-MD5 Test Vector RFC2202 #5 311 generic multi step HMAC-MD5 Test Vector RFC2202 #6 315 generic multi step HMAC-MD5 Test Vector RFC2202 #7 1023 generic multi step SHA-1 Test Vector NIST CAVS #1 1027 generic multi step SHA-1 Test Vector NIST CAVS #2 1031 generic multi step SHA-1 Test Vector NIST CAVS #3 [all …]
|
| A D | test_suite_mps.data | 1 MPS Reader: Single step, single round, pausing disabled 4 MPS Reader: Single step, single round, pausing enabled but unused 7 MPS Reader: Single step, multiple rounds, pausing disabled 10 MPS Reader: Single step, multiple rounds, pausing enabled but unused
|
| A D | test_suite_psa_crypto_init.function | 36 size_t step; 45 if (state->step >= state->max_steps) { 49 *olen = MIN(len, state->length_sequence[state->step]); 53 ++state->step; 344 fake_entropy_state.step = 0;
|
| A D | test_suite_psa_crypto_pake.data | 77 PSA PAKE: unkown input step 81 PSA PAKE: invalid first input step 97 PSA PAKE: unkown output step 101 PSA PAKE: invalid first output step
|
| A D | test_suite_asn1parse.function | 576 unsigned int step = 0; 592 mbedtls_test_set_step(step); 604 ++step;
|
| /mbedtls/library/ |
| A D | psa_crypto_pake.c | 284 psa_crypto_driver_pake_step_t step, in mbedtls_psa_pake_output_internal() argument 291 (void) step; // Unused parameter in mbedtls_psa_pake_output_internal() 310 if (step == PSA_JPAKE_X1_STEP_KEY_SHARE) { in mbedtls_psa_pake_output_internal() 347 if (step == PSA_JPAKE_X2S_STEP_KEY_SHARE && in mbedtls_psa_pake_output_internal() 373 if ((step == PSA_JPAKE_X2_STEP_ZK_PROOF) || in mbedtls_psa_pake_output_internal() 383 (void) step; in mbedtls_psa_pake_output_internal() 405 psa_crypto_driver_pake_step_t step, in mbedtls_psa_pake_input_internal() argument 410 (void) step; // Unused parameter in mbedtls_psa_pake_input_internal() 476 if (step == PSA_JPAKE_X2_STEP_ZK_PROOF) { in mbedtls_psa_pake_input_internal() 503 (void) step; in mbedtls_psa_pake_input_internal() [all …]
|
| A D | psa_crypto_pake.h | 75 psa_crypto_driver_pake_step_t step, 113 psa_crypto_driver_pake_step_t step,
|
| A D | psa_crypto.c | 6732 switch (step) { in psa_hkdf_input() 6931 switch (step) { in psa_tls12_prf_input() 7042 switch (step) { in psa_tls12_prf_psk_to_ms_input() 7236 switch (step) { in psa_pbkdf2_input() 7260 switch (step) { in psa_key_derivation_check_input_type() 7378 (void) step; in psa_key_derivation_input_integer_internal() 8684 psa_pake_step_t step, in psa_jpake_prologue() argument 8702 if (step != computation_stage->step) { in psa_jpake_prologue() 8751 stage->step++; in psa_jpake_epilogue() 8799 (void) step; in psa_pake_output() [all …]
|
| A D | psa_crypto_driver_wrappers.h | 2784 psa_crypto_driver_pake_step_t step, in psa_driver_wrapper_pake_output() argument 2793 return( mbedtls_psa_pake_output( &operation->data.ctx.mbedtls_ctx, step, in psa_driver_wrapper_pake_output() 2802 step, output, output_size, output_length ) ); in psa_driver_wrapper_pake_output() 2806 (void) step; in psa_driver_wrapper_pake_output() 2816 psa_crypto_driver_pake_step_t step, in psa_driver_wrapper_pake_input() argument 2825 step, input, in psa_driver_wrapper_pake_input() 2834 step, in psa_driver_wrapper_pake_input() 2839 (void) step; in psa_driver_wrapper_pake_input()
|
| A D | ssl_tls.c | 9255 for (psa_pake_step_t step = PSA_PAKE_STEP_KEY_SHARE; in mbedtls_psa_ecjpake_read_round() local 9256 step <= PSA_PAKE_STEP_ZK_PROOF; in mbedtls_psa_ecjpake_read_round() 9257 ++step) { in mbedtls_psa_ecjpake_read_round() 9266 status = psa_pake_input(pake_ctx, step, in mbedtls_psa_ecjpake_read_round() 9299 for (psa_pake_step_t step = PSA_PAKE_STEP_KEY_SHARE; in mbedtls_psa_ecjpake_write_round() local 9300 step <= PSA_PAKE_STEP_ZK_PROOF; in mbedtls_psa_ecjpake_write_round() 9301 ++step) { in mbedtls_psa_ecjpake_write_round() 9306 status = psa_pake_output(pake_ctx, step, in mbedtls_psa_ecjpake_write_round()
|
| /mbedtls/tests/src/drivers/ |
| A D | test_driver_pake.c | 56 psa_crypto_driver_pake_step_t step, in mbedtls_test_transparent_pake_output() argument 85 operation, (libtestdriver1_psa_crypto_driver_pake_step_t) step, in mbedtls_test_transparent_pake_output() 90 operation, step, output, output_size, output_length); in mbedtls_test_transparent_pake_output() 93 (void) step; in mbedtls_test_transparent_pake_output() 106 psa_crypto_driver_pake_step_t step, in mbedtls_test_transparent_pake_input() argument 121 operation, (libtestdriver1_psa_crypto_driver_pake_step_t) step, in mbedtls_test_transparent_pake_input() 126 operation, step, input, input_length); in mbedtls_test_transparent_pake_input() 129 (void) step; in mbedtls_test_transparent_pake_input()
|
| /mbedtls/tests/src/ |
| A D | helpers.c | 135 ++mbedtls_test_info.step; in mbedtls_test_increment_step() 144 unsigned long step; in mbedtls_test_get_step() local 150 step = mbedtls_test_info.step; in mbedtls_test_get_step() 156 return step; in mbedtls_test_get_step() 164 mbedtls_test_info.step = (unsigned long) (-1); in mbedtls_test_reset_step_internal() 167 void mbedtls_test_set_step(unsigned long step) in mbedtls_test_set_step() argument 173 mbedtls_test_info.step = step; in mbedtls_test_set_step()
|
| /mbedtls/tests/include/test/drivers/ |
| A D | pake.h | 56 psa_crypto_driver_pake_step_t step, 63 psa_crypto_driver_pake_step_t step,
|
| /mbedtls/docs/architecture/ |
| A D | psa-storage-resilience.md | 65 … the same between the end of step 1 and the end of step 3, since the core must behave differently … 83 * Between step 3 and step 6: upon restart, the core needs to find out whether the secure element co… 84 * After step 6: the key has been created successfully. 96 * Between step 1 and step 4: upon restart, the core needs to find out whether the secure element co… 97 * After step 4: the key has been destroyed successfully. 276 * Start transaction, restart, recovery step 1, restart, recovery step 1, recovery step 2. 277 * Start transaction, restart, recovery step 1, restart, recovery step 1, restart, recovery step 1, … 278 …saction, restart, recovery step 1, restart, recovery step 1, restart, recovery step 1, restart, re… 283 …step. For example, if we have confidence that recovery step 1 is idempotent (i.e. doing it twice i… 365 In addition, before or after step 2, create or remove the key file in the internal storage. [all …]
|
| A D | psa-crypto-implementation-structure.md | 66 In case of any error occurring at step 3 or 4, psa_fail_key_creation() is called. It wipes and clea… 103 … part of the official PSA Cryptography specification. Therefore the first step before implementing…
|
| /mbedtls/tests/include/test/ |
| A D | helpers.h | 76 unsigned long step; member 241 void mbedtls_test_set_step(unsigned long step);
|
| /mbedtls/include/psa/ |
| A D | crypto.h | 3383 psa_key_derivation_step_t step, 3426 psa_key_derivation_step_t step, 3494 psa_key_derivation_step_t step, 3562 psa_key_derivation_step_t step,
|
| A D | crypto_extra.h | 1462 psa_pake_step_t step, 1517 psa_pake_step_t step, 1827 psa_pake_step_t MBEDTLS_PRIVATE(step);
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | strategy.md | 263 Note: the fact that step 1 is not achieved for all of libmbedcrypto (see 271 not possible to achieve good test coverage at the end of step 1 or step 2, it 272 is preferable to group with the next step(s) in the same PR until good test 285 - Step 2 is achieved for most of X.509 and TLS (same gaps as step 1) when 289 **Strategy for step 1:** 302 **Strategy for step 2:** 316 **Strategy for step 3:** 340 Executing step 3 will mostly consist of using the right dependency macros in 353 There is however a risk, especially in step 3 where we change how dependencies 359 the same before and after the PR that implements step 3. This is tested [all …]
|
| /mbedtls/docs/proposed/ |
| A D | psa-driver-interface.md | 366 psa_key_derivation_step_t step); 380 psa_key_derivation_step_t step, 384 psa_key_derivation_step_t step, 388 psa_key_derivation_step_t step, 393 psa_key_derivation_step_t step, 400 * The `step` parameter indicates the input step whose content the driver wants to retrieve. 435 psa_key_derivation_step_t step, 698 * `step` computation step based on which driver should perform an action. 704 `step` can be one of the following values: 718 psa_crypto_driver_pake_step_t step, [all …]
|
| /mbedtls/scripts/data_files/driver_templates/ |
| A D | psa_crypto_driver_wrappers.h.jinja | 2747 psa_crypto_driver_pake_step_t step, 2756 return( mbedtls_psa_pake_output( &operation->data.ctx.mbedtls_ctx, step, 2765 step, output, output_size, output_length ) ); 2769 (void) step; 2779 psa_crypto_driver_pake_step_t step, 2788 step, input, 2797 step, 2802 (void) step;
|
| /mbedtls/docs/architecture/psa-thread-safety/ |
| A D | psa-thread-safety.md | 61 …tion, where the same key identifier was used as a parameter to a previous step in the multi-part o… 207 …_key_slot`, if a slot has been found then the slot id is set. This second step is not done under t… 222 … copying the key into a separate buffer to be used by the operation. This step is not performed un… 237 …nt" for each call, this is a single execution step where the function takes effect (this is usuall… 257 Although the `step` feature used in some tests is thread-safe, it may produce unexpected results fo…
|
| /mbedtls/docs/ |
| A D | psa-transition.md | 352 2. Call one of the key creation functions, passing the attributes defined in the previous step, to … 540 2. Call one of the key creation functions, passing the attributes defined in the previous step, to … 602 …c15a) instead for an input that is a PSA key object.) The input step value for each step is as fol… 603 … for the salt used during the extraction step. Omit this step for HKDF-Expand. For HKDF, you may o… 605 …69233f4b779acb5b7d) for the info string used during the expansion step. Omit this step for HKDF-Ex… 615 3. Call `psa_key_derivation_input_cost` with the step `PSA_KEY_DERIVATION_INPUT_COST` to select the… 616 …c15a) instead for an input that is a PSA key object.) The input step value for each step is as fol… 617 …3562c3947a752470d4a) for the salt used during the extraction step. You may repeat this step to pas… 672 2. Call one of the key creation functions, passing the attributes defined in the previous step, to … 802 You can use the PK module as an intermediate step to create an RSA or ECC key for use with PSA. Thi… [all …]
|
| A D | psa-driver-example-and-guide.md | 16 …step (one function call), such as verifying a signature, are called *Single-Part Operations*. On t…
|
| /mbedtls/3rdparty/p256-m/p256-m/ |
| A D | README.md | 386 addition/subtraction is performed at each step. Again, care is taken to make 483 a standard optimisation to save one multiplication in the first step of
|