Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 28) sorted by relevance

12

/mbedtls-3.7.0/tests/suites/
Dtest_suite_nist_kw.function22 unsigned char plaintext[32];
27 memset(plaintext, 0, sizeof(plaintext));
44 plaintext, sizeof(plaintext),
56 plaintext, &output_len,
57 sizeof(plaintext)) == 0);
59 TEST_ASSERT(output_len == sizeof(plaintext));
60 for (i = 0; i < sizeof(plaintext); i++) {
61 TEST_ASSERT(plaintext[i] == 0);
79 plaintext, sizeof(plaintext),
85 plaintext, sizeof(plaintext),
[all …]
Dtest_suite_ssl_decrypt.misc.data17 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad
21 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad
49 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad
53 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad
81 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad
85 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad
113 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad
117 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad
145 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad
149 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad
[all …]
Dtest_suite_ssl_decrypt.function64 /* Change any one byte of the plaintext or MAC. The MAC will be wrong. */
136 * - if it's -1, the plaintext length is 0 and minimal padding is applied
137 * - if it's -2, the plaintext length is 0 and maximal padding is applied
140 * byte that encodes the length. The minimal non-zero plaintext length
167 /* Determine padding/plaintext length */
254 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */
274 * in this case. (With larger buffers, ie when the plaintext is long or
Dtest_suite_gcm.aes128_en.data673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0
677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1
681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2
685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0
701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1
705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2
709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0
[all …]
Dtest_suite_psa_crypto_op_fail.function296 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = { 0 };
314 plaintext, 1,
323 plaintext, sizeof(plaintext),
Dtest_suite_nist_kw.data27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks)
30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets)
39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks)
42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets)
51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks.
72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
Dtest_suite_ccm.function618 /* Provide unexpected plaintext/ciphertext data */
731 /* Provide too much plaintext/ciphertext */
761 /* Provide incomplete plaintext/ciphertext and finish */
796 /* Provide full plaintext/ciphertext of first update
797 * Provide unexpected plaintext/ciphertext on second update */
829 /* Provide incomplete plaintext/ciphertext of first update
830 * Provide too much plaintext/ciphertext on second update */
866 /* Finish without passing any auth data or plaintext/ciphertext input */
Dtest_suite_aes.function15 unsigned char plaintext[16] = {
27 plaintext, ciphertext) == 0);
41 plaintext, output) == 0);
48 TEST_MEMORY_COMPARE(plaintext, 16, output, 16);
Dtest_suite_constant_time.data1 # these are the numbers we'd get with an empty plaintext and truncated HMAC
5 # we could get this with 255-bytes plaintext and untruncated SHA-256
9 # we could get this with 255-bytes plaintext and untruncated SHA-384
Dtest_suite_cipher.function838 /* check plaintext only if everything went fine */
857 * this results in the expected plaintext, and that
1072 /* check plaintext only if everything went fine */
1118 /* check plaintext only if everything went fine */
Dtest_suite_ssl.function1363 * in front of the plaintext, and expect the encryption
1367 * at the end of the plaintext, and expect the encryption
1371 * both at the front and end of the plaintext,
1837 data_t *plaintext,
1895 /* Copy plaintext into record structure */
1899 TEST_ASSERT(plaintext->len <= ciphertext->len);
1900 memcpy(rec.buf + rec.data_offset, plaintext->x, plaintext->len);
1901 rec.data_len = plaintext->len;
1919 plaintext->x, plaintext->len);
Dtest_suite_psa_crypto.function4244 data_t *plaintext, data_t *ciphertext)
4260 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len));
4261 TEST_LE_U(PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len),
4262 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(plaintext->len));
4263 TEST_LE_U(plaintext->len,
4277 plaintext->len);
4303 plaintext->x, plaintext->len,
4331 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len,
4336 PSA_ASSERT(psa_cipher_encrypt(key, alg, plaintext->x, plaintext->len,
4347 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len,
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function424 * \param input_data The input plaintext.
455 /* Sanity checks on the padded plaintext */
1403 /* Allocate input buffer and copy the iv and the plaintext */
2545 * the original plaintext because of the non-optional random
/mbedtls-3.7.0/tests/src/drivers/
Dtest_driver_aead.c31 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument
49 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
58 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
69 (void) plaintext; in mbedtls_test_transparent_aead_encrypt()
88 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt() argument
106 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
115 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
127 (void) plaintext; in mbedtls_test_transparent_aead_decrypt()
380 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument
399 plaintext, in mbedtls_test_transparent_aead_verify()
[all …]
/mbedtls-3.7.0/library/
Dpsa_crypto_aead.c123 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument
153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
181 plaintext, in mbedtls_psa_aead_encrypt()
192 (void) plaintext; in mbedtls_psa_aead_encrypt()
236 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_psa_aead_decrypt() argument
264 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
277 ciphertext, plaintext)); in mbedtls_psa_aead_decrypt()
294 plaintext)); in mbedtls_psa_aead_decrypt()
302 (void) plaintext; in mbedtls_psa_aead_decrypt()
Dccm.c688 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local
709 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test()
711 memcpy(plaintext, msg_test_data, msg_len_test_data[i]); in mbedtls_ccm_self_test()
716 plaintext, ciphertext, in mbedtls_ccm_self_test()
729 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test()
734 ciphertext, plaintext, in mbedtls_ccm_self_test()
739 memcmp(plaintext, msg_test_data, msg_len_test_data[i]) != 0) { in mbedtls_ccm_self_test()
Dpsa_crypto_aead.h73 const uint8_t *plaintext, size_t plaintext_length,
137 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
Dpsa_crypto_driver_wrappers.h1975 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument
1998 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
2010 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
2023 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
2042 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument
2065 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
2077 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
2090 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt()
2447 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument
2463 plaintext, in psa_driver_wrapper_aead_verify()
[all …]
Dpsa_crypto.c4758 LOCAL_INPUT_DECLARE(plaintext_external, plaintext);
4776 LOCAL_INPUT_ALLOC(plaintext_external, plaintext_length, plaintext);
4789 plaintext, plaintext_length,
4799 LOCAL_INPUT_FREE(plaintext_external, plaintext);
4825 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext);
4844 LOCAL_OUTPUT_ALLOC(plaintext_external, plaintext_size, plaintext);
4857 plaintext, plaintext_size, plaintext_length);
4860 memset(plaintext, 0, plaintext_size);
4867 LOCAL_OUTPUT_FREE(plaintext_external, plaintext);
5388 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext);
[all …]
/mbedtls-3.7.0/tests/include/test/drivers/
Daead.h53 const uint8_t *plaintext, size_t plaintext_length,
63 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
111 uint8_t *plaintext,
/mbedtls-3.7.0/tests/src/
Dpsa_exercise_key.c185 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local
210 plaintext, sizeof(plaintext), in exercise_cipher_key()
272 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local
291 plaintext, sizeof(plaintext), in exercise_aead_key()
310 plaintext, sizeof(plaintext), in exercise_aead_key()
444 unsigned char plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = in exercise_asymmetric_encryption_key() local
453 plaintext, plaintext_length, in exercise_asymmetric_encryption_key()
468 plaintext, sizeof(plaintext), in exercise_asymmetric_encryption_key()
/mbedtls-3.7.0/include/psa/
Dcrypto.h2112 const uint8_t *plaintext,
2187 uint8_t *plaintext,
2789 uint8_t *plaintext,
/mbedtls-3.7.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja1682 const uint8_t *plaintext, size_t plaintext_length,
1702 plaintext, plaintext_length,
1716 plaintext, plaintext_length,
1735 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length )
1755 plaintext, plaintext_size, plaintext_length );
1769 plaintext, plaintext_size, plaintext_length ) );
2069 uint8_t *plaintext,
2085 plaintext,
2112 plaintext, plaintext_size,
2121 (void)plaintext;
/mbedtls-3.7.0/docs/architecture/
Dpsa-shared-memory.md47 …eparately calculates the ciphertext and the MAC from the plaintext. A client sets the plaintext in…
72plaintext. To save memory, when it calls the crypto service, it passes an output buffer that is in…
74plaintext to the output buffer and calculating the tag. (This is how AEAD decryption usually works…
84 …10.1007/3-540-45708-9_2.pdf): if the client can choose the content of a plaintext block after seei…
196 …ispatch layer shall allocate an intermediate buffer for cipher and AEAD plaintext/ciphertext input…
/mbedtls-3.7.0/docs/
D3.0-migration-guide.md793 infer upper bounds on the plaintext size of incoming and
833 set the maximum length of incoming and outgoing plaintext fragments,
838 the maximum incoming and outgoing plaintext fragment lengths, respectively.

12