Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 25 of 25) sorted by relevance

/mbedtls-3.7.0/library/
Dpsa_crypto_aead.c124 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_psa_aead_encrypt() argument
143 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt()
153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
182 ciphertext, in mbedtls_psa_aead_encrypt()
212 const uint8_t *ciphertext, in psa_aead_unpadded_locate_tag() argument
225 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag()
235 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_psa_aead_decrypt() argument
250 ciphertext, ciphertext_length, in mbedtls_psa_aead_decrypt()
264 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
[all …]
Dpsa_crypto_aead.h74 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length);
136 const uint8_t *ciphertext, size_t ciphertext_length,
465 uint8_t *ciphertext,
Dccm.c689 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local
710 memset(ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN); in mbedtls_ccm_self_test()
716 plaintext, ciphertext, in mbedtls_ccm_self_test()
717 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
721 memcmp(ciphertext, res_test_data[i], in mbedtls_ccm_self_test()
734 ciphertext, plaintext, in mbedtls_ccm_self_test()
735 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
Dpsa_crypto_driver_wrappers.h1976 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in psa_driver_wrapper_aead_encrypt() argument
1999 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt()
2011 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt()
2024 ciphertext, ciphertext_size, ciphertext_length ) ); in psa_driver_wrapper_aead_encrypt()
2041 const uint8_t *ciphertext, size_t ciphertext_length, in psa_driver_wrapper_aead_decrypt() argument
2064 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt()
2076 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt()
2089 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt()
2395 uint8_t *ciphertext, in psa_driver_wrapper_aead_finish() argument
2407 ciphertext, in psa_driver_wrapper_aead_finish()
[all …]
Dpsa_crypto.c4759 LOCAL_OUTPUT_DECLARE(ciphertext_external, ciphertext);
4777 LOCAL_OUTPUT_ALLOC(ciphertext_external, ciphertext_size, ciphertext);
4790 ciphertext, ciphertext_size, ciphertext_length);
4793 memset(ciphertext, 0, ciphertext_size);
4800 LOCAL_OUTPUT_FREE(ciphertext_external, ciphertext);
4824 LOCAL_INPUT_DECLARE(ciphertext_external, ciphertext);
4843 LOCAL_INPUT_ALLOC(ciphertext_external, ciphertext_length, ciphertext);
4856 ciphertext, ciphertext_length,
4866 LOCAL_INPUT_FREE(ciphertext_external, ciphertext);
5335 LOCAL_OUTPUT_DECLARE(ciphertext_external, ciphertext);
[all …]
/mbedtls-3.7.0/tests/src/drivers/
Dtest_driver_aead.c32 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_test_transparent_aead_encrypt() argument
50 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt()
59 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt()
71 (void) ciphertext; in mbedtls_test_transparent_aead_encrypt()
87 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt() argument
105 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt()
114 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt()
125 (void) ciphertext; in mbedtls_test_transparent_aead_decrypt()
339 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish() argument
355 libtestdriver1_mbedtls_psa_aead_finish(operation, ciphertext, in mbedtls_test_transparent_aead_finish()
[all …]
/mbedtls-3.7.0/tests/suites/
Dtest_suite_nist_kw.function151 unsigned char *ciphertext = NULL;
164 ciphertext = mbedtls_calloc(1, output_len);
165 TEST_ASSERT(ciphertext != NULL);
172 ciphertext, &output_len,
186 mbedtls_free(ciphertext);
198 unsigned char *ciphertext = NULL;
211 ciphertext = mbedtls_calloc(1, in_len);
212 TEST_ASSERT(ciphertext != NULL);
217 unwrap_ret = mbedtls_nist_kw_unwrap(&ctx, mode, ciphertext, in_len,
230 mbedtls_free(ciphertext);
Dtest_suite_gcm.aes128_de.data673 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 0
677 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 1
681 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 2
685 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 2
697 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 0
701 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 1
705 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 2
709 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 0
[all …]
Dtest_suite_psa_crypto_op_fail.function297 uint8_t ciphertext[PSA_ASYMMETRIC_ENCRYPT_OUTPUT_MAX_SIZE] = { 0 };
316 ciphertext, sizeof(ciphertext),
321 ciphertext, sizeof(ciphertext),
Dtest_suite_nist_kw.data33 NIST KW lengths #3 KW ciphertext OK (3 to 2^54 semiblocks)
36 NIST KW lengths #4 KWP ciphertext OK (2 to 2^29 semiblocks)
45 NIST KW lengths #8 KW ciphertext too short (3 to 2^54 semiblocks)
48 NIST KW lengths #9 KWP ciphertext too short (2 to 2^29 semiblocks)
54 NIST KW lengths #11 KW ciphertext not a multiple of semiblocks.
57 NIST KW lengths #12 KWP ciphertext not a multiple of semiblocks.
81 NIST KW lengths #20 KW ciphertext NULL
84 NIST KW lengths #21 KWP ciphertext NULL
Dtest_suite_ccm.function618 /* Provide unexpected plaintext/ciphertext data */
731 /* Provide too much plaintext/ciphertext */
761 /* Provide incomplete plaintext/ciphertext and finish */
796 /* Provide full plaintext/ciphertext of first update
797 * Provide unexpected plaintext/ciphertext on second update */
829 /* Provide incomplete plaintext/ciphertext of first update
830 * Provide too much plaintext/ciphertext on second update */
866 /* Finish without passing any auth data or plaintext/ciphertext input */
Dtest_suite_gcm.aes128_en.data673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0
677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1
681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2
685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
Dtest_suite_aes.function19 unsigned char ciphertext[16];
27 plaintext, ciphertext) == 0);
42 TEST_MEMORY_COMPARE(ciphertext, 16, output, 16);
47 ciphertext, output) == 0);
Dtest_suite_psa_crypto.function4244 data_t *plaintext, data_t *ciphertext)
4259 TEST_LE_U(ciphertext->len,
4264 PSA_CIPHER_DECRYPT_OUTPUT_SIZE(key_type, alg, ciphertext->len));
4265 TEST_LE_U(PSA_CIPHER_DECRYPT_OUTPUT_SIZE(key_type, alg, ciphertext->len),
4266 PSA_CIPHER_DECRYPT_OUTPUT_MAX_SIZE(ciphertext->len));
4313 TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len,
4321 ciphertext->x, ciphertext->len,
4339 TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len,
4344 PSA_ASSERT(psa_cipher_decrypt(key, alg, ciphertext->x, ciphertext->len,
5477 unsigned char *ciphertext = NULL;
[all …]
Dtest_suite_cipher.function855 * Take an AEAD ciphertext + tag and perform a pair
919 * (we need the tag appended to the ciphertext)
Dtest_suite_ssl.function1838 data_t *ciphertext)
1886 buf_len = ciphertext->len + MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY;
1899 TEST_ASSERT(plaintext->len <= ciphertext->len);
1914 ciphertext->x, ciphertext->len);
Dtest_suite_psa_crypto_driver_wrappers.function425 * \param buf The ciphertext produced by the driver.
2525 /* Determine the maximum ciphertext length */
2552 /* We don't know what ciphertext length to expect, but check that
Dtest_suite_ccm.data1753 CCM encrypt, unexpected ciphertext/plaintext data, NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
/mbedtls-3.7.0/tests/src/
Dpsa_exercise_key.c186 unsigned char ciphertext[32] = "(wabblewebblewibblewobblewubble)"; in exercise_cipher_key() local
187 size_t ciphertext_length = sizeof(ciphertext); in exercise_cipher_key()
188 unsigned char decrypted[sizeof(ciphertext)]; in exercise_cipher_key()
211 ciphertext, sizeof(ciphertext), in exercise_cipher_key()
214 ciphertext + ciphertext_length, in exercise_cipher_key()
215 sizeof(ciphertext) - ciphertext_length, in exercise_cipher_key()
237 ciphertext, ciphertext_length, in exercise_cipher_key()
273 unsigned char ciphertext[48] = "(wabblewebblewibblewobblewubble)"; in exercise_aead_key() local
274 size_t ciphertext_length = sizeof(ciphertext); in exercise_aead_key()
275 size_t plaintext_length = sizeof(ciphertext); in exercise_aead_key()
[all …]
/mbedtls-3.7.0/tests/include/test/drivers/
Daead.h54 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length);
62 const uint8_t *ciphertext, size_t ciphertext_length,
102 uint8_t *ciphertext,
/mbedtls-3.7.0/include/psa/
Dcrypto.h2114 uint8_t *ciphertext,
2185 const uint8_t *ciphertext,
2706 uint8_t *ciphertext,
/mbedtls-3.7.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja1683 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length )
1703 ciphertext, ciphertext_size, ciphertext_length );
1717 ciphertext, ciphertext_size, ciphertext_length ) );
1734 const uint8_t *ciphertext, size_t ciphertext_length,
1754 ciphertext, ciphertext_length,
1768 ciphertext, ciphertext_length,
2024 uint8_t *ciphertext,
2036 ciphertext,
2048 ciphertext, ciphertext_size,
2057 (void)ciphertext;
/mbedtls-3.7.0/docs/architecture/
Dpsa-shared-memory.md47 … The authenticated encryption implementation separately calculates the ciphertext and the MAC from…
50 * If the authenticated encryption calculates the ciphertext before the client changes the output bu…
72 …re): an application encrypts some data, and lets its clients store the ciphertext. Clients may not…
74ciphertext incrementally by simultaneously writing the plaintext to the output buffer and calculat…
84 …he content of a plaintext block after seeing the immediately preceding ciphertext block, this give…
196 …er shall allocate an intermediate buffer for cipher and AEAD plaintext/ciphertext inputs and outpu…
218 * Plaintext/ciphertext inputs and outputs for cipher and AEAD.
/mbedtls-3.7.0/docs/
Dpsa-transition.md369 For a one-shot operation (where the whole plaintext or ciphertext is passed as a single input), the…
392 … Call `mbedtls_cipher_update` as many times as necessary to pass the input plaintext or ciphertext.
396 …th_decrypt_ext` for a one-shot operation (where the whole plaintext or ciphertext is passed as a s…
400 …pt with a specified nonce, or to separate the tag from the rest of the ciphertext, use the multi-p…
401 …f6196a22d50c216c947e0320d3ba) to perform authenticated decryption of a ciphertext with the authent…
411 …ad_1ga759791bbe1763b377c3b5447641f1fc8) to obtain the last part of the ciphertext and the authenti…
/mbedtls-3.7.0/
DChangeLog1339 man-in-the-middle to inject fake ciphertext into a DTLS connection.
1438 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
2056 these new functions always append the tag to the ciphertext, and include
2057 the tag in the ciphertext length.