/hal_espressif-3.7.0/components/mbedtls/test_apps/main/ |
D | test_aes.c | 89 uint8_t *plaintext = heap_caps_malloc(SZ, MALLOC_CAP_8BIT|MALLOC_CAP_INTERNAL); variable 93 TEST_ASSERT_NOT_NULL(plaintext); 99 memset(plaintext, 0x3A, SZ); 103 mbedtls_aes_crypt_cbc(&ctx, MBEDTLS_AES_ENCRYPT, SZ, nonce, plaintext, chipertext); 111 TEST_ASSERT_EQUAL_HEX8_ARRAY(plaintext, decryptedtext, SZ); 114 free(plaintext); 138 uint8_t *plaintext = heap_caps_malloc(SZ, MALLOC_CAP_8BIT|MALLOC_CAP_INTERNAL); variable 142 TEST_ASSERT_NOT_NULL(plaintext); 148 memset(plaintext, 0x3A, SZ); 152 mbedtls_aes_crypt_cbc(&ctx, MBEDTLS_AES_ENCRYPT, SZ, nonce, plaintext, chipertext); [all …]
|
D | test_aes_sha_parallel.c | 81 uint8_t *plaintext = heap_caps_malloc(SZ, MALLOC_CAP_8BIT|MALLOC_CAP_INTERNAL); in tskRunAES256Test() local 85 TEST_ASSERT_NOT_NULL(plaintext); in tskRunAES256Test() 91 memset(plaintext, 0x3A, SZ); in tskRunAES256Test() 95 mbedtls_aes_crypt_cbc(&ctx, MBEDTLS_AES_ENCRYPT, SZ, nonce, plaintext, chipertext); in tskRunAES256Test() 103 TEST_ASSERT_EQUAL_HEX8_ARRAY(plaintext, decryptedtext, SZ); in tskRunAES256Test() 106 free(plaintext); in tskRunAES256Test()
|
D | test_aes_gcm.c | 86 … uint8_t *plaintext = heap_caps_malloc(SZ, MALLOC_CAP_DMA | MALLOC_CAP_8BIT | MALLOC_CAP_INTERNAL); variable 90 TEST_ASSERT_NOT_NULL(plaintext); 93 memset(plaintext, 0xAB, SZ); 113 mbedtls_gcm_update(&ctx, plaintext + idx, length, ciphertext + idx, length, &olen); 135 TEST_ASSERT_EQUAL_HEX8_ARRAY(plaintext, decryptedtext, SZ); 138 free(plaintext); 149 uint8_t *plaintext; member 198 …ext_length, iv_buf, cfg->iv_length, cfg->add_buf, cfg->add_length, cfg->plaintext, ciphertext, cfg… in aes_gcm_test() 202 …TEST_ASSERT(mbedtls_gcm_update( &ctx, cfg->plaintext, cfg->plaintext_length, ciphertext, cfg->plai… in aes_gcm_test() 224 TEST_ASSERT_EQUAL_HEX8_ARRAY(cfg->plaintext, output, cfg->plaintext_length); in aes_gcm_test() [all …]
|
/hal_espressif-3.7.0/components/bt/esp_ble_mesh/mesh_core/nimble_host/ |
D | mesh_bearer_adapt.c | 1855 int bt_mesh_encrypt_le(const uint8_t key[16], const uint8_t plaintext[16], in bt_mesh_encrypt_le() 1860 BT_DBG("key %s plaintext %s", bt_hex(key, 16), bt_hex(plaintext, 16)); in bt_mesh_encrypt_le() 1874 sys_memcpy_swap(tmp, plaintext, 16); in bt_mesh_encrypt_le() 1892 sys_memcpy_swap(tmp, plaintext, 16); in bt_mesh_encrypt_le() 1906 int bt_mesh_encrypt_be(const uint8_t key[16], const uint8_t plaintext[16], in bt_mesh_encrypt_be() 1909 BT_DBG("key %s plaintext %s", bt_hex(key, 16), bt_hex(plaintext, 16)); in bt_mesh_encrypt_be() 1922 plaintext, enc_data) != 0) { in bt_mesh_encrypt_be() 1935 if (tc_aes_encrypt(enc_data, plaintext, &s) == TC_CRYPTO_FAIL) { in bt_mesh_encrypt_be()
|
/hal_espressif-3.7.0/components/bt/esp_ble_mesh/mesh_core/include/ |
D | mesh_bearer_adapt.h | 772 int bt_mesh_encrypt_le(const uint8_t key[16], const uint8_t plaintext[16], 775 int bt_mesh_encrypt_be(const uint8_t key[16], const uint8_t plaintext[16],
|
/hal_espressif-3.7.0/components/bt/esp_ble_mesh/mesh_core/bluedroid_host/ |
D | mesh_bearer_adapt.c | 1871 int bt_mesh_encrypt_le(const uint8_t key[16], const uint8_t plaintext[16], in bt_mesh_encrypt_le() 1876 BT_DBG("key %s plaintext %s", bt_hex(key, 16), bt_hex(plaintext, 16)); in bt_mesh_encrypt_le() 1890 sys_memcpy_swap(tmp, plaintext, 16); in bt_mesh_encrypt_le() 1908 sys_memcpy_swap(tmp, plaintext, 16); in bt_mesh_encrypt_le() 1922 int bt_mesh_encrypt_be(const uint8_t key[16], const uint8_t plaintext[16], in bt_mesh_encrypt_be() 1925 BT_DBG("key %s plaintext %s", bt_hex(key, 16), bt_hex(plaintext, 16)); in bt_mesh_encrypt_be() 1938 plaintext, enc_data) != 0) { in bt_mesh_encrypt_be() 1951 if (tc_aes_encrypt(enc_data, plaintext, &s) == TC_CRYPTO_FAIL) { in bt_mesh_encrypt_be()
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/espsecure/ |
D | index.rst | 54 …d also add a ``credentials`` field in the HSM config file to store the (plaintext) User PIN to aut…
|
/hal_espressif-3.7.0/tools/esptool_py/espsecure/ |
D | __init__.py | 120 plaintext = iv + plaintext_image 133 for block in get_chunks(plaintext, 16):
|
/hal_espressif-3.7.0/components/mbedtls/ |
D | Kconfig | 283 int "Record plaintext padding (for DTLS 1.2)" 288 Controls the use of record plaintext padding when 292 padded plaintext is a multiple of the value of this option.
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/advanced-topics/ |
D | boot-mode-selection.rst | 299 …- Flash encryption is enabled but the bootloader is plaintext. Alternatively, flash encryption is…
|
/hal_espressif-3.7.0/tools/esptool_py/docs/en/esptool/ |
D | basic-commands.rst | 87 …asure to prevent accidentally overwriting the encrypted firmware with a plaintext binary, which **…
|
/hal_espressif-3.7.0/components/bootloader/ |
D | Kconfig.projbuild | 820 … operations (plaintext is sent to the device, and it encrypts it internally and writes ciphertext 821 … flash.) This mode is not secure, it's possible for an attacker to write their own chosen plaintext
|