/mbedtls-3.7.0/library/ |
D | psa_crypto_aead.c | 124 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_psa_aead_encrypt() argument 143 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt() 153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 182 ciphertext, in mbedtls_psa_aead_encrypt() 212 const uint8_t *ciphertext, in psa_aead_unpadded_locate_tag() argument 225 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag() 235 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_psa_aead_decrypt() argument 250 ciphertext, ciphertext_length, in mbedtls_psa_aead_decrypt() 264 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() [all …]
|
D | psa_crypto_aead.h | 74 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length); 136 const uint8_t *ciphertext, size_t ciphertext_length, 465 uint8_t *ciphertext,
|
D | ccm.c | 689 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local 710 memset(ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN); in mbedtls_ccm_self_test() 716 plaintext, ciphertext, in mbedtls_ccm_self_test() 717 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test() 721 memcmp(ciphertext, res_test_data[i], in mbedtls_ccm_self_test() 734 ciphertext, plaintext, in mbedtls_ccm_self_test() 735 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
|
D | psa_crypto_driver_wrappers.h | 1976 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in psa_driver_wrapper_aead_encrypt() argument 1999 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt() 2011 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt() 2024 ciphertext, ciphertext_size, ciphertext_length ) ); in psa_driver_wrapper_aead_encrypt() 2041 const uint8_t *ciphertext, size_t ciphertext_length, in psa_driver_wrapper_aead_decrypt() argument 2064 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 2076 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 2089 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 2395 uint8_t *ciphertext, in psa_driver_wrapper_aead_finish() argument 2407 ciphertext, in psa_driver_wrapper_aead_finish() [all …]
|
D | psa_crypto.c | 4759 LOCAL_OUTPUT_DECLARE(ciphertext_external, ciphertext); 4777 LOCAL_OUTPUT_ALLOC(ciphertext_external, ciphertext_size, ciphertext); 4790 ciphertext, ciphertext_size, ciphertext_length); 4793 memset(ciphertext, 0, ciphertext_size); 4800 LOCAL_OUTPUT_FREE(ciphertext_external, ciphertext); 4824 LOCAL_INPUT_DECLARE(ciphertext_external, ciphertext); 4843 LOCAL_INPUT_ALLOC(ciphertext_external, ciphertext_length, ciphertext); 4856 ciphertext, ciphertext_length, 4866 LOCAL_INPUT_FREE(ciphertext_external, ciphertext); 5335 LOCAL_OUTPUT_DECLARE(ciphertext_external, ciphertext); [all …]
|
/mbedtls-3.7.0/tests/src/drivers/ |
D | test_driver_aead.c | 32 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_test_transparent_aead_encrypt() argument 50 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt() 59 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt() 71 (void) ciphertext; in mbedtls_test_transparent_aead_encrypt() 87 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt() argument 105 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 114 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 125 (void) ciphertext; in mbedtls_test_transparent_aead_decrypt() 339 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish() argument 355 libtestdriver1_mbedtls_psa_aead_finish(operation, ciphertext, in mbedtls_test_transparent_aead_finish() [all …]
|
/mbedtls-3.7.0/tests/suites/ |
D | test_suite_nist_kw.function | 151 unsigned char *ciphertext = NULL; 164 ciphertext = mbedtls_calloc(1, output_len); 165 TEST_ASSERT(ciphertext != NULL); 172 ciphertext, &output_len, 186 mbedtls_free(ciphertext); 198 unsigned char *ciphertext = NULL; 211 ciphertext = mbedtls_calloc(1, in_len); 212 TEST_ASSERT(ciphertext != NULL); 217 unwrap_ret = mbedtls_nist_kw_unwrap(&ctx, mode, ciphertext, in_len, 230 mbedtls_free(ciphertext);
|
D | test_suite_gcm.aes128_de.data | 673 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 0 [all …]
|
D | test_suite_psa_crypto_op_fail.function | 297 uint8_t ciphertext[PSA_ASYMMETRIC_ENCRYPT_OUTPUT_MAX_SIZE] = { 0 }; 316 ciphertext, sizeof(ciphertext), 321 ciphertext, sizeof(ciphertext),
|
D | test_suite_nist_kw.data | 33 NIST KW lengths #3 KW ciphertext OK (3 to 2^54 semiblocks) 36 NIST KW lengths #4 KWP ciphertext OK (2 to 2^29 semiblocks) 45 NIST KW lengths #8 KW ciphertext too short (3 to 2^54 semiblocks) 48 NIST KW lengths #9 KWP ciphertext too short (2 to 2^29 semiblocks) 54 NIST KW lengths #11 KW ciphertext not a multiple of semiblocks. 57 NIST KW lengths #12 KWP ciphertext not a multiple of semiblocks. 81 NIST KW lengths #20 KW ciphertext NULL 84 NIST KW lengths #21 KWP ciphertext NULL
|
D | test_suite_ccm.function | 618 /* Provide unexpected plaintext/ciphertext data */ 731 /* Provide too much plaintext/ciphertext */ 761 /* Provide incomplete plaintext/ciphertext and finish */ 796 /* Provide full plaintext/ciphertext of first update 797 * Provide unexpected plaintext/ciphertext on second update */ 829 /* Provide incomplete plaintext/ciphertext of first update 830 * Provide too much plaintext/ciphertext on second update */ 866 /* Finish without passing any auth data or plaintext/ciphertext input */
|
D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
|
D | test_suite_aes.function | 19 unsigned char ciphertext[16]; 27 plaintext, ciphertext) == 0); 42 TEST_MEMORY_COMPARE(ciphertext, 16, output, 16); 47 ciphertext, output) == 0);
|
D | test_suite_psa_crypto.function | 4244 data_t *plaintext, data_t *ciphertext) 4259 TEST_LE_U(ciphertext->len, 4264 PSA_CIPHER_DECRYPT_OUTPUT_SIZE(key_type, alg, ciphertext->len)); 4265 TEST_LE_U(PSA_CIPHER_DECRYPT_OUTPUT_SIZE(key_type, alg, ciphertext->len), 4266 PSA_CIPHER_DECRYPT_OUTPUT_MAX_SIZE(ciphertext->len)); 4313 TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len, 4321 ciphertext->x, ciphertext->len, 4339 TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len, 4344 PSA_ASSERT(psa_cipher_decrypt(key, alg, ciphertext->x, ciphertext->len, 5477 unsigned char *ciphertext = NULL; [all …]
|
D | test_suite_cipher.function | 855 * Take an AEAD ciphertext + tag and perform a pair 919 * (we need the tag appended to the ciphertext)
|
D | test_suite_ssl.function | 1838 data_t *ciphertext) 1886 buf_len = ciphertext->len + MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY; 1899 TEST_ASSERT(plaintext->len <= ciphertext->len); 1914 ciphertext->x, ciphertext->len);
|
D | test_suite_psa_crypto_driver_wrappers.function | 425 * \param buf The ciphertext produced by the driver. 2525 /* Determine the maximum ciphertext length */ 2552 /* We don't know what ciphertext length to expect, but check that
|
D | test_suite_ccm.data | 1753 CCM encrypt, unexpected ciphertext/plaintext data, NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
|
/mbedtls-3.7.0/tests/src/ |
D | psa_exercise_key.c | 186 unsigned char ciphertext[32] = "(wabblewebblewibblewobblewubble)"; in exercise_cipher_key() local 187 size_t ciphertext_length = sizeof(ciphertext); in exercise_cipher_key() 188 unsigned char decrypted[sizeof(ciphertext)]; in exercise_cipher_key() 211 ciphertext, sizeof(ciphertext), in exercise_cipher_key() 214 ciphertext + ciphertext_length, in exercise_cipher_key() 215 sizeof(ciphertext) - ciphertext_length, in exercise_cipher_key() 237 ciphertext, ciphertext_length, in exercise_cipher_key() 273 unsigned char ciphertext[48] = "(wabblewebblewibblewobblewubble)"; in exercise_aead_key() local 274 size_t ciphertext_length = sizeof(ciphertext); in exercise_aead_key() 275 size_t plaintext_length = sizeof(ciphertext); in exercise_aead_key() [all …]
|
/mbedtls-3.7.0/tests/include/test/drivers/ |
D | aead.h | 54 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length); 62 const uint8_t *ciphertext, size_t ciphertext_length, 102 uint8_t *ciphertext,
|
/mbedtls-3.7.0/include/psa/ |
D | crypto.h | 2114 uint8_t *ciphertext, 2185 const uint8_t *ciphertext, 2706 uint8_t *ciphertext,
|
/mbedtls-3.7.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 1683 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) 1703 ciphertext, ciphertext_size, ciphertext_length ); 1717 ciphertext, ciphertext_size, ciphertext_length ) ); 1734 const uint8_t *ciphertext, size_t ciphertext_length, 1754 ciphertext, ciphertext_length, 1768 ciphertext, ciphertext_length, 2024 uint8_t *ciphertext, 2036 ciphertext, 2048 ciphertext, ciphertext_size, 2057 (void)ciphertext;
|
/mbedtls-3.7.0/docs/architecture/ |
D | psa-shared-memory.md | 47 … The authenticated encryption implementation separately calculates the ciphertext and the MAC from… 50 * If the authenticated encryption calculates the ciphertext before the client changes the output bu… 72 …re): an application encrypts some data, and lets its clients store the ciphertext. Clients may not… 74 …ciphertext incrementally by simultaneously writing the plaintext to the output buffer and calculat… 84 …he content of a plaintext block after seeing the immediately preceding ciphertext block, this give… 196 …er shall allocate an intermediate buffer for cipher and AEAD plaintext/ciphertext inputs and outpu… 218 * Plaintext/ciphertext inputs and outputs for cipher and AEAD.
|
/mbedtls-3.7.0/docs/ |
D | psa-transition.md | 369 For a one-shot operation (where the whole plaintext or ciphertext is passed as a single input), the… 392 … Call `mbedtls_cipher_update` as many times as necessary to pass the input plaintext or ciphertext. 396 …th_decrypt_ext` for a one-shot operation (where the whole plaintext or ciphertext is passed as a s… 400 …pt with a specified nonce, or to separate the tag from the rest of the ciphertext, use the multi-p… 401 …f6196a22d50c216c947e0320d3ba) to perform authenticated decryption of a ciphertext with the authent… 411 …ad_1ga759791bbe1763b377c3b5447641f1fc8) to obtain the last part of the ciphertext and the authenti…
|
/mbedtls-3.7.0/ |
D | ChangeLog | 1339 man-in-the-middle to inject fake ciphertext into a DTLS connection. 1438 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations. 2056 these new functions always append the tag to the ciphertext, and include 2057 the tag in the ciphertext length.
|