Home
last modified time | relevance | path

Searched refs:block (Results 1 – 21 of 21) sorted by relevance

/mbedtls-3.5.0/library/
Daesce.c92 static uint8x16_t aesce_encrypt_block(uint8x16_t block, in aesce_encrypt_block() argument
99 block = vaeseq_u8(block, vld1q_u8(keys + i * 16)); in aesce_encrypt_block()
101 block = vaesmcq_u8(block); in aesce_encrypt_block()
106 block = vaeseq_u8(block, vld1q_u8(keys + (rounds -1) * 16)); in aesce_encrypt_block()
111 block = veorq_u8(block, vld1q_u8(keys + rounds * 16)); in aesce_encrypt_block()
113 return block; in aesce_encrypt_block()
116 static uint8x16_t aesce_decrypt_block(uint8x16_t block, in aesce_decrypt_block() argument
123 block = vaesdq_u8(block, vld1q_u8(keys + i * 16)); in aesce_decrypt_block()
136 block = vaesimcq_u8(block); in aesce_decrypt_block()
141 block = vaesdq_u8(block, vld1q_u8(keys + (rounds - 1) * 16)); in aesce_decrypt_block()
[all …]
/mbedtls-3.5.0/tests/suites/
Dtest_suite_psa_crypto_init.data34 Fake entropy: less than the block size
41 Fake entropy: one block eventually
45 Fake entropy: one block in two steps
49 Fake entropy: more than one block in two steps
59 NV seed only: less than one block
Dtest_suite_cmac.data36 CMAC Single Blocks #1 - Empty block, no updates
40 CMAC Single Blocks #2 - Single 16 byte block
44 CMAC Single Blocks #3 - Single 64 byte block
68 CMAC Multiple Operations, same key #2 - Empty, 64 byte block
Dtest_suite_ctr_drbg.data993 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 1 #0
997 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 1 #0
1001 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 2 #0
1005 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 2 #0
1009 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 3 #0
1013 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 3 #0
1017 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 4 #0
1021 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 4 #0
1025 CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,0) block 1 #0
1029 CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,128) block 1 #0
[all …]
Dtest_suite_aes.ofb.data4 OFB-AES128.Encrypt - Single block
Dtest_suite_constant_time_hmac.function83 * by at least one block size.
Dtest_suite_memory_buffer_alloc.function134 /* Once blocks are reallocated, the block allocated to the memory request
Dtest_suite_aes.xts.data13 AES-128-XTS Encrypt Fail Sector Too Large (by 1 block)
Dtest_suite_cipher.function348 /* Update ECB with partial block */
620 * On the other hand, CBC and ECB ciphers need a full block of input.
Dtest_suite_psa_crypto_metadata.function666 /* Check that the block size is a power of 2. This is required, at least,
Dtest_suite_ccm.data16 CCM init #4 DES: bad block size
Dtest_suite_psa_crypto.data2323 # Keystream from RFC 7539 §2.4.2, with an extra 64-byte output block prepended
2329 # Test vector from RFC 7539 §2.4.2, with an extra 64-byte block prepended
2631 # Test vector from RFC 7539 §2.4.2, with an extra 64-byte block prepended
/mbedtls-3.5.0/
DSECURITY.md42 and workarounds see the [Block Ciphers](#block-ciphers) section.
73 details and workarounds see the [Block Ciphers](#block-ciphers) section.
120 Currently there are four block ciphers in Mbed TLS: AES, CAMELLIA, ARIA and
135 - Use cryptographic mechanisms that are not based on block ciphers. In
137 block cipher modes. For random generation, use HMAC\_DRBG instead of CTR\_DRBG.
DChangeLog741 * Add functions to get the IV and block size from cipher_info structs.
789 * Failures of alternative implementations of AES or DES single-block
930 now takes extra output parameters for the last partial output block.
1030 They are: ARIA block cipher, CMAC mode, elliptic curve J-PAKE library and
1295 CMAC block cipher, and still pass the CMAC self test.
2479 block other operations until they complete. This is disabled by default,
2754 * Add additional block mode, OFB (Output Feedback), to the AES module and
2758 * Add support for the CCM* block cipher mode as defined in IEEE Std. 802.15.4.
2759 * Add support for the XTS block cipher mode with AES (AES-XTS).
3488 * Fix incorrect handling of block lengths in crypt_and_hash.c sample program,
[all …]
/mbedtls-3.5.0/tests/scripts/
Dtest_zeroize.gdb36 # intelligent compiler could determine that this function clears a block of
40 # the block of memory was correctly zeroed would force the compiler to not
/mbedtls-3.5.0/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md115 * CCM (block cipher in ECB mode; interdependent with cipher)
117 * CMAC (AES-ECB and DES-ECB, but could be extended to the other block ciphers; interdependent with …
118 * CTR\_DRBG (AES-ECB, but could be extended to the other block ciphers)
122 * GCM (block cipher in ECB mode; interdependent with cipher)
250 * Obtain some metadata about it (size, block size).
445 In `mbedtls_md_get_size` and in modules that want a hash's block size, instead of looking up hash m…
/mbedtls-3.5.0/docs/
D3.0-migration-guide.md239 …had to pass inputs consisting of whole 16-byte blocks except for the last block (this limitation h…
240 …* As long as the input remains block-aligned, the output length is exactly the input length, as be…
241 …a multiple of 16, alternative implementations may return the last partial block in the call to `mb…
242 …put buffer for the last partial block. This is needed for alternative implementations that can onl…
251 …* Buffer the data for the last partial block, to be returned in the next call to `mbedtls_gcm_upda…
252 * `mbedtls_gcm_finish()` now takes an extra output buffer for the last partial block if needed.
/mbedtls-3.5.0/docs/proposed/
Dpsa-conditional-inclusion-c.md40 …bination of algorithms and key types, for example a block cipher mode (CBC, CTR, CFB, …) and a blo…
Dpsa-driver-interface.md584 * `PSA_DRIVER_GET_ENTROPY_BLOCK`: If this flag is set, the driver should block until it has at leas…
1114 …hat performs a block cipher operation only for a single block, or only in ECB mode, or only in CTR…
/mbedtls-3.5.0/docs/architecture/testing/
Dpsa-storage-format-testing.md103 * HMAC keys longer than the block size: pre-hashed or not?
/mbedtls-3.5.0/docs/architecture/
Dtls13-support.md353 function to a longer name, or indenting a block more), avoid rewrapping