Home
last modified time | relevance | path

Searched refs:IV (Results 1 – 24 of 24) sorted by relevance

/mbedtls-latest/programs/aes/
Dcrypt_and_hash.c68 unsigned char IV[16]; in main() local
265 memcpy(IV, digest, 16); in main()
270 if (fwrite(IV, 1, 16, fout) != 16) { in main()
280 memcpy(digest, IV, 16); in main()
313 if (mbedtls_cipher_set_iv(&cipher_ctx, IV, 16) != 0) { in main()
430 memcpy(IV, buffer, 16); in main()
437 memcpy(digest, IV, 16); in main()
466 if (mbedtls_cipher_set_iv(&cipher_ctx, IV, 16) != 0) { in main()
566 mbedtls_platform_zeroize(IV, sizeof(IV)); in main()
/mbedtls-latest/tests/suites/
Dtest_suite_cipher.chacha20.data117 ChaCha20 IV Length 0
121 ChaCha20 IV Length 11
125 ChaCha20 IV Length 12
129 ChaCha20 IV Length 13
133 ChaCha20 IV Length 16
Dtest_suite_cipher.chachapoly.data125 ChaCha20+Poly1305 IV Length 0
129 ChaCha20+Poly1305 IV Length 11
133 ChaCha20+Poly1305 IV Length 12
137 ChaCha20+Poly1305 IV Length 13
141 ChaCha20+Poly1305 IV Length 16
Dtest_suite_psa_crypto.data2978 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=0, TAG=16,
2982 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=16, TAG=16,
2986 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=20, TAG=16,
2990 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=0, AAD=48, TAG=15,
2994 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=0, TAG=16,
2998 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=0, TAG=8,
3002 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=16, TAG=14,
3006 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=16, TAG=4,
3010 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=20, TAG=13,
3014 PSA AEAD encrypt, AES-GCM, CAVS 14.0, KEY=24, IV=12, IN=16, AAD=48, TAG=15,
[all …]
Dtest_suite_gcm.function497 /* NISP SP 800-38D, Section 5.2.1.1 requires that bit length of IV should
498 * satisfy 1 <= bit_len(IV) <= 2^64 - 1. */
507 // Invalid IV length 0
513 // Invalid IV length 2^61
Dtest_suite_gcm.misc.data4 GCM - Invalid IV length
Dtest_suite_cipher.function339 /* IV too big */
343 /* IV too small */
425 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes.
426 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */
708 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes.
709 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */
Dtest_suite_ssl.data2719 # Server handshake traffic secret -> Server traffic IV
2733 # Client handshake traffic secret -> Client traffic IV
2740 # Server handshake traffic secret -> Server traffic IV
2754 # Client handshake traffic secret -> Client traffic IV
2778 # Client/Server handshake traffic secrets -> Client/Server traffic {Key,IV}
2784 # Client/Server handshake traffic secrets -> Client/Server traffic {Key,IV}
2855 # - Server App IV: 1b13dd9f8d8f17091d34b349
2857 # - Client App IV: bc4dd5f7b98acff85466261d
2866 # - Server App IV: 1b13dd9f8d8f17091d34b349
2868 # - Client App IV: bc4dd5f7b98acff85466261d
[all …]
Dtest_suite_pem.data66 # 1. generate the key (password="password"; IV=0x3132333435363738 in hex or "12345678" as string)
Dtest_suite_ssl_decrypt.function213 /* Set dummy IV */
Dtest_suite_psa_crypto.function3981 /* Generate an IV without calling setup beforehand. */
3988 /* Generate an IV twice in a row. */
4002 /* Generate an IV after it's already set. */
4012 /* Set an IV without calling setup beforehand. */
4018 /* Set an IV after it's already set. */
4030 /* Set an IV after it's already generated. */
4048 /* Call update without an IV where an IV is required. */
4079 /* Call finish without an IV where an IV is required. */
Dtest_suite_psa_crypto_driver_wrappers.function1538 /* Test IV setting failure */
1547 /* When setting the IV fails, it should call abort too */
1560 /* Test IV generation failure */
Dtest_suite_gcm.aes128_en.data725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
Dtest_suite_gcm.aes192_de.data673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
Dtest_suite_gcm.aes256_de.data673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
Dtest_suite_gcm.aes256_en.data673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
Dtest_suite_gcm.aes192_en.data673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
Dtest_suite_gcm.aes128_de.data725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
Dtest_suite_ccm.data42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
Dtest_suite_ssl.function1271 * 2) The record counter sometimes determines the IV.
/mbedtls-latest/docs/
D3.0-migration-guide.md238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_…
248 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u…
768 - It no longer exports raw keys and IV.
777 For users which do not rely on raw keys and IV, adjusting to the new
Dpsa-transition.md329 | `mbedtls_cipher_info_get_block_size` | not available (use specific macros for the IV, nonce or ta…
365 3. Set the IV with `mbedtls_cipher_set_iv` (except for ECB which does not use an IV).
371IV of the default size (indicated by [`PSA_CIPHER_IV_LENGTH`](https://mbed-tls.readthedocs.io/proj…
372 …gab3593f5f14d8c0431dd306d80929215e) to perform decryption with a specified IV. You can use the mac…
378IV, use [`psa_cipher_generate_iv`](https://mbed-tls.readthedocs.io/projects/api/en/development/api…
/mbedtls-latest/docs/architecture/
Dpsa-shared-memory.md174 TODO: what about IV/nonce inputs? They are typically small, but don't necessarily have a static siz…
192 …n the PSA API, but likely to come one day) (one full pass to calculate the IV, then another full p…
224 * Cipher/AEAD IV/nonce (to be confirmed).
/mbedtls-latest/
DChangeLog722 * Fix a potential corruption of the passed-in IV when mbedtls_aes_crypt_cbc()
1203 for IV lengths other than 12. The library was silently overwriting this
1513 Currently only 13-byte long IV's are supported.
1517 * Add functions to get the IV and block size from cipher_info structs.
1518 * Add functions to check if a cipher supports variable IV or key size.
2348 * Correct the default IV size for mbedtls_cipher_info_t structures using
3306 * Ignore IV in mbedtls_cipher_set_iv() when the cipher mode is
5306 * Internals for SSL module adapted to have separate IV pointer that is