/mbedtls-latest/programs/aes/ |
D | crypt_and_hash.c | 68 unsigned char IV[16]; in main() local 265 memcpy(IV, digest, 16); in main() 270 if (fwrite(IV, 1, 16, fout) != 16) { in main() 280 memcpy(digest, IV, 16); in main() 313 if (mbedtls_cipher_set_iv(&cipher_ctx, IV, 16) != 0) { in main() 430 memcpy(IV, buffer, 16); in main() 437 memcpy(digest, IV, 16); in main() 466 if (mbedtls_cipher_set_iv(&cipher_ctx, IV, 16) != 0) { in main() 566 mbedtls_platform_zeroize(IV, sizeof(IV)); in main()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_cipher.chacha20.data | 117 ChaCha20 IV Length 0 121 ChaCha20 IV Length 11 125 ChaCha20 IV Length 12 129 ChaCha20 IV Length 13 133 ChaCha20 IV Length 16
|
D | test_suite_cipher.chachapoly.data | 125 ChaCha20+Poly1305 IV Length 0 129 ChaCha20+Poly1305 IV Length 11 133 ChaCha20+Poly1305 IV Length 12 137 ChaCha20+Poly1305 IV Length 13 141 ChaCha20+Poly1305 IV Length 16
|
D | test_suite_psa_crypto.data | 2978 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=0, TAG=16, 2982 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=16, TAG=16, 2986 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=20, TAG=16, 2990 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=48, TAG=15, 2994 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=0, TAG=16, 2998 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=0, TAG=8, 3002 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=16, TAG=14, 3006 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=16, TAG=4, 3010 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=20, TAG=13, 3014 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=48, TAG=15, [all …]
|
D | test_suite_gcm.function | 497 /* NISP SP 800-38D, Section 5.2.1.1 requires that bit length of IV should 498 * satisfy 1 <= bit_len(IV) <= 2^64 - 1. */ 507 // Invalid IV length 0 513 // Invalid IV length 2^61
|
D | test_suite_gcm.misc.data | 4 GCM - Invalid IV length
|
D | test_suite_cipher.function | 339 /* IV too big */ 343 /* IV too small */ 425 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes. 426 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */ 708 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes. 709 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */
|
D | test_suite_ssl.data | 2719 # Server handshake traffic secret -> Server traffic IV 2733 # Client handshake traffic secret -> Client traffic IV 2740 # Server handshake traffic secret -> Server traffic IV 2754 # Client handshake traffic secret -> Client traffic IV 2778 # Client/Server handshake traffic secrets -> Client/Server traffic {Key,IV} 2784 # Client/Server handshake traffic secrets -> Client/Server traffic {Key,IV} 2855 # - Server App IV: 1b13dd9f8d8f17091d34b349 2857 # - Client App IV: bc4dd5f7b98acff85466261d 2866 # - Server App IV: 1b13dd9f8d8f17091d34b349 2868 # - Client App IV: bc4dd5f7b98acff85466261d [all …]
|
D | test_suite_pem.data | 66 # 1. generate the key (password="password"; IV=0x3132333435363738 in hex or "12345678" as string)
|
D | test_suite_ssl_decrypt.function | 213 /* Set dummy IV */
|
D | test_suite_psa_crypto.function | 3981 /* Generate an IV without calling setup beforehand. */ 3988 /* Generate an IV twice in a row. */ 4002 /* Generate an IV after it's already set. */ 4012 /* Set an IV without calling setup beforehand. */ 4018 /* Set an IV after it's already set. */ 4030 /* Set an IV after it's already generated. */ 4048 /* Call update without an IV where an IV is required. */ 4079 /* Call finish without an IV where an IV is required. */
|
D | test_suite_psa_crypto_driver_wrappers.function | 1538 /* Test IV setting failure */ 1547 /* When setting the IV fails, it should call abort too */ 1560 /* Test IV generation failure */
|
D | test_suite_gcm.aes128_en.data | 725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
|
D | test_suite_gcm.aes192_de.data | 673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
|
D | test_suite_gcm.aes256_de.data | 673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
|
D | test_suite_gcm.aes256_en.data | 673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
|
D | test_suite_gcm.aes192_en.data | 673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
|
D | test_suite_gcm.aes128_de.data | 725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
|
D | test_suite_ccm.data | 42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
|
D | test_suite_ssl.function | 1271 * 2) The record counter sometimes determines the IV.
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_… 248 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u… 768 - It no longer exports raw keys and IV. 777 For users which do not rely on raw keys and IV, adjusting to the new
|
D | psa-transition.md | 329 | `mbedtls_cipher_info_get_block_size` | not available (use specific macros for the IV, nonce or ta… 365 3. Set the IV with `mbedtls_cipher_set_iv` (except for ECB which does not use an IV). 371 …IV of the default size (indicated by [`PSA_CIPHER_IV_LENGTH`](https://mbed-tls.readthedocs.io/proj… 372 …gab3593f5f14d8c0431dd306d80929215e) to perform decryption with a specified IV. You can use the mac… 378 …IV, use [`psa_cipher_generate_iv`](https://mbed-tls.readthedocs.io/projects/api/en/development/api…
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 174 TODO: what about IV/nonce inputs? They are typically small, but don't necessarily have a static siz… 192 …n the PSA API, but likely to come one day) (one full pass to calculate the IV, then another full p… 224 * Cipher/AEAD IV/nonce (to be confirmed).
|
/mbedtls-latest/ |
D | ChangeLog | 722 * Fix a potential corruption of the passed-in IV when mbedtls_aes_crypt_cbc() 1203 for IV lengths other than 12. The library was silently overwriting this 1513 Currently only 13-byte long IV's are supported. 1517 * Add functions to get the IV and block size from cipher_info structs. 1518 * Add functions to check if a cipher supports variable IV or key size. 2348 * Correct the default IV size for mbedtls_cipher_info_t structures using 3306 * Ignore IV in mbedtls_cipher_set_iv() when the cipher mode is 5306 * Internals for SSL module adapted to have separate IV pointer that is
|