/mbedtls-3.7.0/tests/suites/ |
D | test_suite_nist_kw.function | 22 unsigned char plaintext[32]; 27 memset(plaintext, 0, sizeof(plaintext)); 44 plaintext, sizeof(plaintext), 56 plaintext, &output_len, 57 sizeof(plaintext)) == 0); 59 TEST_ASSERT(output_len == sizeof(plaintext)); 60 for (i = 0; i < sizeof(plaintext); i++) { 61 TEST_ASSERT(plaintext[i] == 0); 79 plaintext, sizeof(plaintext), 85 plaintext, sizeof(plaintext), [all …]
|
D | test_suite_ssl_decrypt.misc.data | 17 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad 21 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad 49 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad 53 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad 81 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad 85 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad 113 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad 117 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad 145 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad 149 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad [all …]
|
D | test_suite_ssl_decrypt.function | 64 /* Change any one byte of the plaintext or MAC. The MAC will be wrong. */ 136 * - if it's -1, the plaintext length is 0 and minimal padding is applied 137 * - if it's -2, the plaintext length is 0 and maximal padding is applied 140 * byte that encodes the length. The minimal non-zero plaintext length 167 /* Determine padding/plaintext length */ 254 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */ 274 * in this case. (With larger buffers, ie when the plaintext is long or
|
D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0 [all …]
|
D | test_suite_psa_crypto_op_fail.function | 296 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = { 0 }; 314 plaintext, 1, 323 plaintext, sizeof(plaintext),
|
D | test_suite_nist_kw.data | 27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks) 30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets) 39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks) 42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets) 51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks. 72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
|
D | test_suite_ccm.function | 618 /* Provide unexpected plaintext/ciphertext data */ 731 /* Provide too much plaintext/ciphertext */ 761 /* Provide incomplete plaintext/ciphertext and finish */ 796 /* Provide full plaintext/ciphertext of first update 797 * Provide unexpected plaintext/ciphertext on second update */ 829 /* Provide incomplete plaintext/ciphertext of first update 830 * Provide too much plaintext/ciphertext on second update */ 866 /* Finish without passing any auth data or plaintext/ciphertext input */
|
D | test_suite_aes.function | 15 unsigned char plaintext[16] = { 27 plaintext, ciphertext) == 0); 41 plaintext, output) == 0); 48 TEST_MEMORY_COMPARE(plaintext, 16, output, 16);
|
D | test_suite_constant_time.data | 1 # these are the numbers we'd get with an empty plaintext and truncated HMAC 5 # we could get this with 255-bytes plaintext and untruncated SHA-256 9 # we could get this with 255-bytes plaintext and untruncated SHA-384
|
D | test_suite_cipher.function | 838 /* check plaintext only if everything went fine */ 857 * this results in the expected plaintext, and that 1072 /* check plaintext only if everything went fine */ 1118 /* check plaintext only if everything went fine */
|
D | test_suite_ssl.function | 1363 * in front of the plaintext, and expect the encryption 1367 * at the end of the plaintext, and expect the encryption 1371 * both at the front and end of the plaintext, 1837 data_t *plaintext, 1895 /* Copy plaintext into record structure */ 1899 TEST_ASSERT(plaintext->len <= ciphertext->len); 1900 memcpy(rec.buf + rec.data_offset, plaintext->x, plaintext->len); 1901 rec.data_len = plaintext->len; 1919 plaintext->x, plaintext->len);
|
D | test_suite_psa_crypto.function | 4244 data_t *plaintext, data_t *ciphertext) 4260 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len)); 4261 TEST_LE_U(PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len), 4262 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(plaintext->len)); 4263 TEST_LE_U(plaintext->len, 4277 plaintext->len); 4303 plaintext->x, plaintext->len, 4331 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len, 4336 PSA_ASSERT(psa_cipher_encrypt(key, alg, plaintext->x, plaintext->len, 4347 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len, [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 424 * \param input_data The input plaintext. 455 /* Sanity checks on the padded plaintext */ 1403 /* Allocate input buffer and copy the iv and the plaintext */ 2545 * the original plaintext because of the non-optional random
|
/mbedtls-3.7.0/tests/src/drivers/ |
D | test_driver_aead.c | 31 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument 49 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 58 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 69 (void) plaintext; in mbedtls_test_transparent_aead_encrypt() 88 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt() argument 106 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 115 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 127 (void) plaintext; in mbedtls_test_transparent_aead_decrypt() 380 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument 399 plaintext, in mbedtls_test_transparent_aead_verify() [all …]
|
/mbedtls-3.7.0/library/ |
D | psa_crypto_aead.c | 123 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument 153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 181 plaintext, in mbedtls_psa_aead_encrypt() 192 (void) plaintext; in mbedtls_psa_aead_encrypt() 236 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_psa_aead_decrypt() argument 264 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() 277 ciphertext, plaintext)); in mbedtls_psa_aead_decrypt() 294 plaintext)); in mbedtls_psa_aead_decrypt() 302 (void) plaintext; in mbedtls_psa_aead_decrypt()
|
D | ccm.c | 688 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local 709 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test() 711 memcpy(plaintext, msg_test_data, msg_len_test_data[i]); in mbedtls_ccm_self_test() 716 plaintext, ciphertext, in mbedtls_ccm_self_test() 729 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test() 734 ciphertext, plaintext, in mbedtls_ccm_self_test() 739 memcmp(plaintext, msg_test_data, msg_len_test_data[i]) != 0) { in mbedtls_ccm_self_test()
|
D | psa_crypto_aead.h | 73 const uint8_t *plaintext, size_t plaintext_length, 137 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
|
D | psa_crypto_driver_wrappers.h | 1975 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument 1998 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2010 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2023 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2042 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument 2065 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 2077 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 2090 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt() 2447 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument 2463 plaintext, in psa_driver_wrapper_aead_verify() [all …]
|
D | psa_crypto.c | 4758 LOCAL_INPUT_DECLARE(plaintext_external, plaintext); 4776 LOCAL_INPUT_ALLOC(plaintext_external, plaintext_length, plaintext); 4789 plaintext, plaintext_length, 4799 LOCAL_INPUT_FREE(plaintext_external, plaintext); 4825 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext); 4844 LOCAL_OUTPUT_ALLOC(plaintext_external, plaintext_size, plaintext); 4857 plaintext, plaintext_size, plaintext_length); 4860 memset(plaintext, 0, plaintext_size); 4867 LOCAL_OUTPUT_FREE(plaintext_external, plaintext); 5388 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext); [all …]
|
/mbedtls-3.7.0/tests/include/test/drivers/ |
D | aead.h | 53 const uint8_t *plaintext, size_t plaintext_length, 63 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length); 111 uint8_t *plaintext,
|
/mbedtls-3.7.0/tests/src/ |
D | psa_exercise_key.c | 185 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local 210 plaintext, sizeof(plaintext), in exercise_cipher_key() 272 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local 291 plaintext, sizeof(plaintext), in exercise_aead_key() 310 plaintext, sizeof(plaintext), in exercise_aead_key() 444 unsigned char plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = in exercise_asymmetric_encryption_key() local 453 plaintext, plaintext_length, in exercise_asymmetric_encryption_key() 468 plaintext, sizeof(plaintext), in exercise_asymmetric_encryption_key()
|
/mbedtls-3.7.0/include/psa/ |
D | crypto.h | 2112 const uint8_t *plaintext, 2187 uint8_t *plaintext, 2789 uint8_t *plaintext,
|
/mbedtls-3.7.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 1682 const uint8_t *plaintext, size_t plaintext_length, 1702 plaintext, plaintext_length, 1716 plaintext, plaintext_length, 1735 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) 1755 plaintext, plaintext_size, plaintext_length ); 1769 plaintext, plaintext_size, plaintext_length ) ); 2069 uint8_t *plaintext, 2085 plaintext, 2112 plaintext, plaintext_size, 2121 (void)plaintext;
|
/mbedtls-3.7.0/docs/architecture/ |
D | psa-shared-memory.md | 47 …eparately calculates the ciphertext and the MAC from the plaintext. A client sets the plaintext in… 72 …plaintext. To save memory, when it calls the crypto service, it passes an output buffer that is in… 74 …plaintext to the output buffer and calculating the tag. (This is how AEAD decryption usually works… 84 …10.1007/3-540-45708-9_2.pdf): if the client can choose the content of a plaintext block after seei… 196 …ispatch layer shall allocate an intermediate buffer for cipher and AEAD plaintext/ciphertext input…
|
/mbedtls-3.7.0/docs/ |
D | 3.0-migration-guide.md | 793 infer upper bounds on the plaintext size of incoming and 833 set the maximum length of incoming and outgoing plaintext fragments, 838 the maximum incoming and outgoing plaintext fragment lengths, respectively.
|