/mbedtls-3.5.0/tests/suites/ |
D | test_suite_nist_kw.function | 22 unsigned char plaintext[32]; 27 memset(plaintext, 0, sizeof(plaintext)); 44 plaintext, sizeof(plaintext), 56 plaintext, &output_len, 57 sizeof(plaintext)) == 0); 59 TEST_ASSERT(output_len == sizeof(plaintext)); 60 for (i = 0; i < sizeof(plaintext); i++) { 61 TEST_ASSERT(plaintext[i] == 0); 79 plaintext, sizeof(plaintext), 85 plaintext, sizeof(plaintext), [all …]
|
D | test_suite_constant_time.data | 1 # these are the numbers we'd get with an empty plaintext and truncated HMAC 5 # we could get this with 255-bytes plaintext and untruncated SHA-256 9 # we could get this with 255-bytes plaintext and untruncated SHA-384
|
D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0 [all …]
|
D | test_suite_psa_crypto_op_fail.function | 296 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = { 0 }; 314 plaintext, 1, 323 plaintext, sizeof(plaintext),
|
D | test_suite_nist_kw.data | 27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks) 30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets) 39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks) 42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets) 51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks. 72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
|
D | test_suite_ccm.function | 592 /* Provide unexpected plaintext/ciphertext data */ 697 /* Provide too much plaintext/ciphertext */ 725 /* Provide incomplete plaintext/ciphertext and finish */ 758 /* Provide full plaintext/ciphertext of first update 759 * Provide unexpected plaintext/ciphertext on second update */ 789 /* Provide incomplete plaintext/ciphertext of first update 790 * Provide too much plaintext/ciphertext on second update */ 824 /* Finish without passing any auth data or plaintext/ciphertext input */
|
D | test_suite_aes.function | 14 unsigned char plaintext[16] = { 26 plaintext, ciphertext) == 0); 40 plaintext, output) == 0); 47 ASSERT_COMPARE(plaintext, 16, output, 16);
|
D | test_suite_ssl.function | 1261 * in front of the plaintext, and expect the encryption 1265 * at the end of the plaintext, and expect the encryption 1269 * both at the front and end of the plaintext, 1430 * - if it's -1, the plaintext length is 0 and minimal padding is applied 1431 * - if it's -2, the plaintext length is 0 and maximal padding is applied 1434 * byte that encodes the length. The minimal non-zero plaintext length 1470 /* Determine padding/plaintext length */ 1587 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */ 1607 * in this case. (With larger buffers, ie when the plaintext is long or 1960 data_t *plaintext, [all …]
|
D | test_suite_ssl.data | 2583 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad 2587 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad 2615 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad 2619 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad 2647 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad 2651 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad 2679 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad 2683 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad 2711 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad 2715 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad [all …]
|
D | test_suite_cipher.function | 824 /* check plaintext only if everything went fine */ 843 * this results in the expected plaintext, and that 1058 /* check plaintext only if everything went fine */ 1104 /* check plaintext only if everything went fine */
|
D | test_suite_psa_crypto.function | 3876 data_t *plaintext, data_t *ciphertext) 3892 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len)); 3893 TEST_LE_U(PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len), 3894 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(plaintext->len)); 3895 TEST_LE_U(plaintext->len, 3909 plaintext->len); 3935 plaintext->x, plaintext->len, 3963 ASSERT_COMPARE(plaintext->x, plaintext->len, 3968 PSA_ASSERT(psa_cipher_encrypt(key, alg, plaintext->x, plaintext->len, 3979 ASSERT_COMPARE(plaintext->x, plaintext->len, [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 423 * \param input_data The input plaintext. 454 /* Sanity checks on the padded plaintext */ 1397 /* Allocate input buffer and copy the iv and the plaintext */ 2541 * the original plaintext because of the non-optional random
|
/mbedtls-3.5.0/tests/src/drivers/ |
D | test_driver_aead.c | 41 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument 59 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 68 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 79 (void) plaintext; in mbedtls_test_transparent_aead_encrypt() 98 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt() argument 116 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 125 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 137 (void) plaintext; in mbedtls_test_transparent_aead_decrypt() 390 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument 409 plaintext, in mbedtls_test_transparent_aead_verify() [all …]
|
/mbedtls-3.5.0/library/ |
D | psa_crypto_aead.c | 139 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument 169 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 181 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 197 plaintext, in mbedtls_psa_aead_encrypt() 208 (void) plaintext; in mbedtls_psa_aead_encrypt() 252 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_psa_aead_decrypt() argument 280 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() 293 ciphertext, plaintext)); in mbedtls_psa_aead_decrypt() 310 plaintext)); in mbedtls_psa_aead_decrypt() 318 (void) plaintext; in mbedtls_psa_aead_decrypt()
|
D | ccm.c | 654 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local 675 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test() 677 memcpy(plaintext, msg_test_data, msg_len_test_data[i]); in mbedtls_ccm_self_test() 682 plaintext, ciphertext, in mbedtls_ccm_self_test() 695 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test() 700 ciphertext, plaintext, in mbedtls_ccm_self_test() 705 memcmp(plaintext, msg_test_data, msg_len_test_data[i]) != 0) { in mbedtls_ccm_self_test()
|
D | psa_crypto_aead.h | 85 const uint8_t *plaintext, size_t plaintext_length, 149 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
|
D | psa_crypto_driver_wrappers.c | 2106 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument 2129 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2141 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2154 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2173 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument 2196 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 2208 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 2221 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt() 2583 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument 2599 plaintext, in psa_driver_wrapper_aead_verify() [all …]
|
D | psa_crypto_driver_wrappers.h | 254 const uint8_t *plaintext, size_t plaintext_length, 264 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length); 312 uint8_t *plaintext,
|
D | psa_crypto.c | 4396 const uint8_t *plaintext, argument 4432 plaintext, plaintext_length, 4453 uint8_t *plaintext, argument 4488 plaintext, plaintext_size, plaintext_length); 4491 memset(plaintext, 0, plaintext_size); 4959 uint8_t *plaintext, argument 4979 status = psa_driver_wrapper_aead_verify(operation, plaintext,
|
/mbedtls-3.5.0/tests/src/ |
D | psa_exercise_key.c | 164 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local 182 plaintext, sizeof(plaintext), in exercise_cipher_key() 238 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local 256 plaintext, sizeof(plaintext), in exercise_aead_key() 270 plaintext, sizeof(plaintext), in exercise_aead_key() 376 unsigned char plaintext[256] = "Hello, world..."; in exercise_asymmetric_encryption_key() local 383 plaintext, plaintext_length, in exercise_asymmetric_encryption_key() 394 plaintext, sizeof(plaintext), in exercise_asymmetric_encryption_key()
|
/mbedtls-3.5.0/tests/include/test/drivers/ |
D | aead.h | 65 const uint8_t *plaintext, size_t plaintext_length, 75 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length); 123 uint8_t *plaintext,
|
/mbedtls-3.5.0/include/psa/ |
D | crypto.h | 2117 const uint8_t *plaintext, 2192 uint8_t *plaintext, 2794 uint8_t *plaintext,
|
/mbedtls-3.5.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.c.jinja | 1792 const uint8_t *plaintext, size_t plaintext_length, 1812 plaintext, plaintext_length, 1826 plaintext, plaintext_length, 1845 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) 1865 plaintext, plaintext_size, plaintext_length ); 1879 plaintext, plaintext_size, plaintext_length ) ); 2179 uint8_t *plaintext, 2195 plaintext, 2222 plaintext, plaintext_size, 2231 (void)plaintext;
|
/mbedtls-3.5.0/docs/ |
D | 3.0-migration-guide.md | 793 infer upper bounds on the plaintext size of incoming and 833 set the maximum length of incoming and outgoing plaintext fragments, 838 the maximum incoming and outgoing plaintext fragment lengths, respectively.
|
/mbedtls-3.5.0/ |
D | ChangeLog | 857 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations. 1679 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused 1777 plaintext after repeated timing measurements under some conditions. 2434 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing 2657 partially recover the plaintext of messages under some conditions by 2671 plaintext of messages under some conditions by using a cache attack 2681 to partially recover the plaintext of messages under some conditions (see 2863 * Return the plaintext data more quickly on unpadded CBC decryption, as
|