2021-02-03 18:55:39 +01:00
|
|
|
Generate random twice with CTR_DRBG
|
|
|
|
random_twice_with_ctr_drbg:
|
|
|
|
|
|
|
|
Generate random twice with HMAC_DRBG(SHA-1)
|
|
|
|
depends_on:MBEDTLS_SHA1_C
|
|
|
|
random_twice_with_hmac_drbg:MBEDTLS_MD_SHA1
|
|
|
|
|
|
|
|
Generate random twice with HMAC_DRBG(SHA-256)
|
|
|
|
depends_on:MBEDTLS_SHA256_C
|
|
|
|
random_twice_with_hmac_drbg:MBEDTLS_MD_SHA256
|
|
|
|
|
|
|
|
Generate random twice with HMAC_DRBG(SHA-512)
|
|
|
|
depends_on:MBEDTLS_SHA512_C
|
|
|
|
random_twice_with_hmac_drbg:MBEDTLS_MD_SHA512
|
|
|
|
|
2021-02-03 20:04:08 +01:00
|
|
|
Generate random twice with PSA classic wrapper
|
|
|
|
random_twice_with_psa_from_classic:
|
|
|
|
|
2021-02-03 18:55:39 +01:00
|
|
|
Generate random twice with PSA API
|
|
|
|
random_twice_with_psa_from_psa:
|
2021-02-03 20:04:08 +01:00
|
|
|
|
|
|
|
# This bad-usage test case currently crashes in the default configuration
|
|
|
|
# because CTR_DRBG crashes when given an unseeded context. This is arguably
|
|
|
|
# a good thing because it prevents misuse of mbedtls_psa_get_random().
|
|
|
|
#PSA classic wrapper: PSA not active
|
|
|
|
#mbedtls_psa_get_random_no_init:
|
|
|
|
|
|
|
|
PSA classic wrapper: 0 bytes
|
|
|
|
mbedtls_psa_get_random_length:0
|
|
|
|
|
|
|
|
PSA classic wrapper: 1 byte
|
|
|
|
mbedtls_psa_get_random_length:1
|
|
|
|
|
|
|
|
PSA classic wrapper: 256 bytes
|
|
|
|
mbedtls_psa_get_random_length:256
|
|
|
|
|
|
|
|
PSA classic wrapper: external RNG large
|
|
|
|
depends_on:MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG
|
|
|
|
mbedtls_psa_get_random_length:1024
|
|
|
|
|
|
|
|
PSA classic wrapper: CTR_DRBG max
|
|
|
|
depends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:MBEDTLS_CTR_DRBG_C
|
|
|
|
mbedtls_psa_get_random_length:MBEDTLS_CTR_DRBG_MAX_REQUEST
|
|
|
|
|
|
|
|
PSA classic wrapper: HMAC_DRBG max
|
|
|
|
depends_on:!MBEDTLS_PSA_CRYPTO_EXTERNAL_RNG:!MBEDTLS_CTR_DRBG_C:MBEDTLS_HMAC_DRBG_C
|
|
|
|
mbedtls_psa_get_random_length:MBEDTLS_HMAC_DRBG_MAX_REQUEST
|
|
|
|
|
|
|
|
PSA classic wrapper: ECDSA signature (SECP256R1)
|
|
|
|
depends_on:MBEDTLS_ECP_DP_SECP256R1_ENABLED
|
|
|
|
mbedtls_psa_get_random_ecdsa_sign:MBEDTLS_ECP_DP_SECP256R1
|