/Zephyr-latest/tests/crypto/tinycrypt/src/ |
D | aes.c | 127 uint8_t ciphertext[NUM_OF_NIST_KEYS]; in test_aes_vectors() local 134 zassert_true(tc_aes_encrypt(ciphertext, nist_input, &s), in test_aes_vectors() 138 ciphertext, sizeof(ciphertext), 1); in test_aes_vectors() 148 uint8_t ciphertext[NUM_OF_NIST_KEYS]; in var_text_test() local 152 (void)tc_aes_encrypt(ciphertext, in, s); in var_text_test() 154 ciphertext, sizeof(ciphertext), 0); in var_text_test() 156 if (tc_aes_decrypt(decrypted, ciphertext, s) == 0) { in var_text_test() 1102 uint8_t ciphertext[NUM_OF_NIST_KEYS]; in var_key_test() local 1107 (void)tc_aes_encrypt(ciphertext, plaintext, &s); in var_key_test() 1109 ciphertext, sizeof(ciphertext), 0); in var_key_test()
|
D | ccm_mode.c | 79 uint8_t ciphertext[CIPHERTEXT_LEN]; in do_test() local 91 result = tc_ccm_generation_encryption(ciphertext, sizeof(ciphertext), in do_test() 98 if (memcmp(expected, ciphertext, elen) != 0) { in do_test() 100 show_str("\t\tComputed", ciphertext, elen); in do_test() 107 hdr, hlen, ciphertext, in do_test() 380 uint8_t ciphertext[CIPHERTEXT_LEN]; in ZTEST() local 392 result = tc_ccm_generation_encryption(ciphertext, sizeof(ciphertext), in ZTEST() 398 hdr, 0, ciphertext, in ZTEST() 437 uint8_t ciphertext[CIPHERTEXT_LEN]; in ZTEST() local 448 result = tc_ccm_generation_encryption(ciphertext, sizeof(ciphertext), in ZTEST() [all …]
|
D | ctr_mode.c | 80 const uint8_t ciphertext[80] = { in test_ctr_sp_800_38a_encrypt_decrypt() local 111 result = check_result(1, ciphertext, sizeof(out), out, sizeof(out), 1); in test_ctr_sp_800_38a_encrypt_decrypt()
|
D | cbc_mode.c | 91 const uint8_t ciphertext[80] = { variable 129 result = check_result(1, ciphertext, sizeof(encrypted), in ZTEST()
|
/Zephyr-latest/samples/psa/persistent_key/src/ |
D | main.c | 56 static uint8_t ciphertext[PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(SAMPLE_KEY_TYPE, SAMPLE_ALG, in use_persistent_key() local 61 ciphertext, sizeof(ciphertext), &ciphertext_len); in use_persistent_key() 67 ret = psa_cipher_decrypt(SAMPLE_KEY_ID, SAMPLE_ALG, ciphertext, ciphertext_len, in use_persistent_key() 78 LOG_HEXDUMP_INF(ciphertext, ciphertext_len, "Ciphertext:"); in use_persistent_key()
|
/Zephyr-latest/tests/subsys/secure_storage/psa/crypto/src/ |
D | main.c | 113 static uint8_t ciphertext[PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(KEY_TYPE, ALG, sizeof(plaintext))]; in ZTEST() local 119 ciphertext, sizeof(ciphertext), &output_length); in ZTEST() 121 zassert_equal(output_length, sizeof(ciphertext)); in ZTEST() 125 ret = psa_cipher_decrypt(ID, ALG, ciphertext, output_length, in ZTEST()
|
/Zephyr-latest/subsys/secure_storage/src/its/transform/ |
D | aead.c | 70 uint8_t ciphertext[CIPHERTEXT_MAX_SIZE]; /* Keep last as this is variable in size. */ member 101 &add_data, data_len, data, sizeof(stored_entry->ciphertext), in secure_storage_its_transform_to_store() 102 &stored_entry->ciphertext, &ciphertext_len); in secure_storage_its_transform_to_store() 126 &add_data, ciphertext_len, stored_entry->ciphertext, data_size, data, in secure_storage_its_transform_from_store()
|
/Zephyr-latest/drivers/crypto/ |
D | crypto_nrf_ecb.c | 22 uint8_t ciphertext[ECB_AES_BLOCK_SIZE]; member 60 if (pkt->out_buf != drv_state.data.ciphertext) { in do_ecb_encrypt() 61 memcpy(pkt->out_buf, drv_state.data.ciphertext, in do_ecb_encrypt()
|
/Zephyr-latest/modules/uoscore-uedhoc/ |
D | CMakeLists.txt | 86 ${UOSCORE_UEDHOC_SRC_DIR}/edhoc/ciphertext.c
|
/Zephyr-latest/modules/mbedtls/ |
D | Kconfig.tls-generic | 268 bool "Xor-encrypt-xor with ciphertext stealing mode (XTS) for AES"
|
/Zephyr-latest/doc/security/ |
D | vulnerabilities.rst | 75 and inject arbitrary ciphertext without the victim noticing.
|
/Zephyr-latest/doc/releases/ |
D | release-notes-2.2.rst | 1082 * :github:`20561` - Crypto API: Separate IV from ciphertext based on struct cipher_ctx::flags
|
D | release-notes-2.0.rst | 36 that can decrypt traffic and inject arbitrary ciphertext without the
|
D | release-notes-1.14.rst | 264 that can decrypt traffic and inject arbitrary ciphertext without the
|