Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 26) sorted by relevance

12

/mbedtls-3.5.0/tests/suites/
Dtest_suite_nist_kw.function22 unsigned char plaintext[32];
27 memset(plaintext, 0, sizeof(plaintext));
44 plaintext, sizeof(plaintext),
56 plaintext, &output_len,
57 sizeof(plaintext)) == 0);
59 TEST_ASSERT(output_len == sizeof(plaintext));
60 for (i = 0; i < sizeof(plaintext); i++) {
61 TEST_ASSERT(plaintext[i] == 0);
79 plaintext, sizeof(plaintext),
85 plaintext, sizeof(plaintext),
[all …]
Dtest_suite_constant_time.data1 # these are the numbers we'd get with an empty plaintext and truncated HMAC
5 # we could get this with 255-bytes plaintext and untruncated SHA-256
9 # we could get this with 255-bytes plaintext and untruncated SHA-384
Dtest_suite_gcm.aes128_en.data673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0
677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1
681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2
685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0
701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1
705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2
709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0
[all …]
Dtest_suite_psa_crypto_op_fail.function296 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = { 0 };
314 plaintext, 1,
323 plaintext, sizeof(plaintext),
Dtest_suite_nist_kw.data27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks)
30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets)
39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks)
42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets)
51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks.
72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
Dtest_suite_ccm.function592 /* Provide unexpected plaintext/ciphertext data */
697 /* Provide too much plaintext/ciphertext */
725 /* Provide incomplete plaintext/ciphertext and finish */
758 /* Provide full plaintext/ciphertext of first update
759 * Provide unexpected plaintext/ciphertext on second update */
789 /* Provide incomplete plaintext/ciphertext of first update
790 * Provide too much plaintext/ciphertext on second update */
824 /* Finish without passing any auth data or plaintext/ciphertext input */
Dtest_suite_aes.function14 unsigned char plaintext[16] = {
26 plaintext, ciphertext) == 0);
40 plaintext, output) == 0);
47 ASSERT_COMPARE(plaintext, 16, output, 16);
Dtest_suite_ssl.function1261 * in front of the plaintext, and expect the encryption
1265 * at the end of the plaintext, and expect the encryption
1269 * both at the front and end of the plaintext,
1430 * - if it's -1, the plaintext length is 0 and minimal padding is applied
1431 * - if it's -2, the plaintext length is 0 and maximal padding is applied
1434 * byte that encodes the length. The minimal non-zero plaintext length
1470 /* Determine padding/plaintext length */
1587 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */
1607 * in this case. (With larger buffers, ie when the plaintext is long or
1960 data_t *plaintext,
[all …]
Dtest_suite_ssl.data2583 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad
2587 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad
2615 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad
2619 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad
2647 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad
2651 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad
2679 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad
2683 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad
2711 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad
2715 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad
[all …]
Dtest_suite_cipher.function824 /* check plaintext only if everything went fine */
843 * this results in the expected plaintext, and that
1058 /* check plaintext only if everything went fine */
1104 /* check plaintext only if everything went fine */
Dtest_suite_psa_crypto.function3876 data_t *plaintext, data_t *ciphertext)
3892 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len));
3893 TEST_LE_U(PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len),
3894 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(plaintext->len));
3895 TEST_LE_U(plaintext->len,
3909 plaintext->len);
3935 plaintext->x, plaintext->len,
3963 ASSERT_COMPARE(plaintext->x, plaintext->len,
3968 PSA_ASSERT(psa_cipher_encrypt(key, alg, plaintext->x, plaintext->len,
3979 ASSERT_COMPARE(plaintext->x, plaintext->len,
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function423 * \param input_data The input plaintext.
454 /* Sanity checks on the padded plaintext */
1397 /* Allocate input buffer and copy the iv and the plaintext */
2541 * the original plaintext because of the non-optional random
/mbedtls-3.5.0/tests/src/drivers/
Dtest_driver_aead.c41 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument
59 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
68 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
79 (void) plaintext; in mbedtls_test_transparent_aead_encrypt()
98 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt() argument
116 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
125 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
137 (void) plaintext; in mbedtls_test_transparent_aead_decrypt()
390 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument
409 plaintext, in mbedtls_test_transparent_aead_verify()
[all …]
/mbedtls-3.5.0/library/
Dpsa_crypto_aead.c139 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument
169 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
181 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
197 plaintext, in mbedtls_psa_aead_encrypt()
208 (void) plaintext; in mbedtls_psa_aead_encrypt()
252 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_psa_aead_decrypt() argument
280 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
293 ciphertext, plaintext)); in mbedtls_psa_aead_decrypt()
310 plaintext)); in mbedtls_psa_aead_decrypt()
318 (void) plaintext; in mbedtls_psa_aead_decrypt()
Dccm.c654 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local
675 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test()
677 memcpy(plaintext, msg_test_data, msg_len_test_data[i]); in mbedtls_ccm_self_test()
682 plaintext, ciphertext, in mbedtls_ccm_self_test()
695 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test()
700 ciphertext, plaintext, in mbedtls_ccm_self_test()
705 memcmp(plaintext, msg_test_data, msg_len_test_data[i]) != 0) { in mbedtls_ccm_self_test()
Dpsa_crypto_aead.h85 const uint8_t *plaintext, size_t plaintext_length,
149 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
Dpsa_crypto_driver_wrappers.c2106 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument
2129 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
2141 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
2154 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
2173 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument
2196 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
2208 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
2221 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt()
2583 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument
2599 plaintext, in psa_driver_wrapper_aead_verify()
[all …]
Dpsa_crypto_driver_wrappers.h254 const uint8_t *plaintext, size_t plaintext_length,
264 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
312 uint8_t *plaintext,
Dpsa_crypto.c4396 const uint8_t *plaintext, argument
4432 plaintext, plaintext_length,
4453 uint8_t *plaintext, argument
4488 plaintext, plaintext_size, plaintext_length);
4491 memset(plaintext, 0, plaintext_size);
4959 uint8_t *plaintext, argument
4979 status = psa_driver_wrapper_aead_verify(operation, plaintext,
/mbedtls-3.5.0/tests/src/
Dpsa_exercise_key.c164 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local
182 plaintext, sizeof(plaintext), in exercise_cipher_key()
238 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local
256 plaintext, sizeof(plaintext), in exercise_aead_key()
270 plaintext, sizeof(plaintext), in exercise_aead_key()
376 unsigned char plaintext[256] = "Hello, world..."; in exercise_asymmetric_encryption_key() local
383 plaintext, plaintext_length, in exercise_asymmetric_encryption_key()
394 plaintext, sizeof(plaintext), in exercise_asymmetric_encryption_key()
/mbedtls-3.5.0/tests/include/test/drivers/
Daead.h65 const uint8_t *plaintext, size_t plaintext_length,
75 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
123 uint8_t *plaintext,
/mbedtls-3.5.0/include/psa/
Dcrypto.h2117 const uint8_t *plaintext,
2192 uint8_t *plaintext,
2794 uint8_t *plaintext,
/mbedtls-3.5.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.c.jinja1792 const uint8_t *plaintext, size_t plaintext_length,
1812 plaintext, plaintext_length,
1826 plaintext, plaintext_length,
1845 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length )
1865 plaintext, plaintext_size, plaintext_length );
1879 plaintext, plaintext_size, plaintext_length ) );
2179 uint8_t *plaintext,
2195 plaintext,
2222 plaintext, plaintext_size,
2231 (void)plaintext;
/mbedtls-3.5.0/docs/
D3.0-migration-guide.md793 infer upper bounds on the plaintext size of incoming and
833 set the maximum length of incoming and outgoing plaintext fragments,
838 the maximum incoming and outgoing plaintext fragment lengths, respectively.
/mbedtls-3.5.0/
DChangeLog857 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
1679 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused
1777 plaintext after repeated timing measurements under some conditions.
2434 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
2657 partially recover the plaintext of messages under some conditions by
2671 plaintext of messages under some conditions by using a cache attack
2681 to partially recover the plaintext of messages under some conditions (see
2863 * Return the plaintext data more quickly on unpadded CBC decryption, as

12