/mbedtls-latest/tests/scripts/ |
D | generate_tls13_compat_tests.py | 87 [cipher for cipher in ciphersuites if cipher not in self._ciphers]) 344 map(lambda cipher: self.CIPHER_SUITE[cipher], self._ciphers)) 478 def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): argument 483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group) 485 server_object = SERVER_CLASSES[server](ciphersuite=cipher, 489 client_object = CLIENT_CLASSES[client](ciphersuite=cipher, 603 for client, server, cipher, named_group, sig_alg in \ 611 cipher=cipher, named_group=named_group, 656 cipher=args.cipher, named_group=args.named_group))
|
/mbedtls-latest/library/ |
D | psa_crypto_cipher.c | 296 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup() 306 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup() 317 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, in psa_cipher_setup() 323 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, key_buffer, in psa_cipher_setup() 334 ret = mbedtls_cipher_set_padding_mode(&operation->ctx.cipher, in psa_cipher_setup() 338 ret = mbedtls_cipher_set_padding_mode(&operation->ctx.cipher, in psa_cipher_setup() 391 mbedtls_cipher_set_iv(&operation->ctx.cipher, in mbedtls_psa_cipher_set_iv() 513 (operation->ctx.cipher.unprocessed_len + input_length) in mbedtls_psa_cipher_update() 528 status = psa_cipher_update_ecb(&operation->ctx.cipher, in mbedtls_psa_cipher_update() 541 mbedtls_cipher_update(&operation->ctx.cipher, input, in mbedtls_psa_cipher_update() [all …]
|
D | gcm.c | 163 mbedtls_cipher_id_t cipher, in mbedtls_gcm_setkey() argument 176 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_gcm_setkey() 186 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_gcm_setkey() 1023 mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES; in mbedtls_gcm_self_test() local 1060 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test() 1115 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test() 1154 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test() 1236 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
|
D | ssl_ticket.c | 216 mbedtls_cipher_type_t cipher, in mbedtls_ssl_ticket_setup() argument 230 if (mbedtls_ssl_cipher_to_psa(cipher, TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_setup() 239 cipher_info = mbedtls_cipher_info_from_type(cipher); in mbedtls_ssl_ticket_setup()
|
D | nist_kw.c | 52 mbedtls_cipher_id_t cipher, in mbedtls_nist_kw_setkey() argument 60 cipher_info = mbedtls_cipher_info_from_values(cipher, in mbedtls_nist_kw_setkey() 80 if (cipher != MBEDTLS_CIPHER_ID_AES) { in mbedtls_nist_kw_setkey()
|
D | ccm.c | 53 mbedtls_cipher_id_t cipher, in mbedtls_ccm_setkey() argument 62 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_ccm_setkey() 72 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_ccm_setkey()
|
D | cipher_wrap.h | 76 mbedtls_cipher_id_t cipher; member
|
D | ssl_tls13_keys.c | 961 cipher_info = mbedtls_cipher_info_from_type(ciphersuite_info->cipher); in mbedtls_ssl_tls13_populate_transform() 964 ciphersuite_info->cipher)); in mbedtls_ssl_tls13_populate_transform() 1050 if ((status = mbedtls_ssl_cipher_to_psa((mbedtls_cipher_type_t) ciphersuite_info->cipher, in mbedtls_ssl_tls13_populate_transform() 1109 status = mbedtls_ssl_cipher_to_psa((mbedtls_cipher_type_t) ciphersuite_info->cipher, taglen, in ssl_tls13_get_cipher_key_info()
|
/mbedtls-latest/tests/suites/ |
D | test_suite_cmac.data | 32 CMAC init Camellia-128: wrong cipher 36 CMAC init Camellia-192: wrong cipher 40 CMAC init Camellia-256: wrong cipher 44 CMAC init #8 ARIA-128: wrong cipher 48 CMAC init #8 ARIA-192: wrong cipher 52 CMAC init #8 ARIA-256: wrong cipher
|
D | test_suite_cipher.function | 2 #include "mbedtls/cipher.h" 13 /* Check the internal consistency of a cipher info structure, and 185 /* Ensure that there is at least 1 supported cipher, otherwise exit gracefully */ 564 void dec_empty_buf(int cipher, 589 cipher_info = mbedtls_cipher_info_from_type(cipher); 789 data_t *iv, data_t *cipher, 829 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx, cipher->x, cipher->len, output, &outlen)); 859 data_t *ad, data_t *cipher, data_t *tag, 884 * key, cipher and tag can't be empty. */ 929 cipher_plus_tag_len = cipher->len + tag->len; [all …]
|
D | test_suite_pkcs12.function | 73 void pkcs12_pbe_encrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw, 79 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher; 128 void pkcs12_pbe_decrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw, 134 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher;
|
D | test_suite_psa_crypto_op_fail.generated.data | 1559 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with AES 1563 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with ARIA 1567 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with CAMELLIA 1899 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with AES 1903 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with ARIA 1907 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with CAMELLIA 2099 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with AES 2103 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with ARIA 2107 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with CAMELLIA 4522 PSA cipher CBC_MAC: invalid with AES [all …]
|
D | test_suite_psa_crypto_metadata.data | 372 Block cipher key type: AES 376 Block cipher key type: ARIA 380 Block cipher key type: DES 384 Block cipher key type: Camellia 388 Stream cipher key type: ChaCha20
|
D | test_suite_ssl_decrypt.misc.data | 1 Decrypt null cipher, MD5 5 Decrypt null cipher, SHA-1 9 Decrypt null cipher, SHA-256 13 Decrypt null cipher, SHA-384
|
D | test_suite_cmac.function | 2 #include "mbedtls/cipher.h" 29 /* Test NULL cipher info */
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | md-cipher-dispatch.md | 107 * **Legacy domain**: does not interact with PSA. Implementations of hashes, of cipher primitives, o… 129 Symmetric ciphers and AEADs (before work on driver-only cipher): 139 * In principle: any cipher-mode (default padding), passed an 145 * Note: `cipher.h` exposed through API. 161 * Note: also called by `cipher.c` if enabled. 167 * Note: also called by `cipher.c` if enabled. 173 * Note: also called by `cipher.c` if enabled. 179 * Note: also called by `cipher.c` if enabled. 180 * Note: `cipher.h` exposed through API. 183 * potentially any cipher/AEAD in any mode and any direction [all …]
|
/mbedtls-latest/programs/ |
D | Makefile | 34 cipher/cipher_aead_demo \ 153 cipher/cipher_aead_demo$(EXEXT): cipher/cipher_aead_demo.c $(DEP) 155 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) cipher/cipher_aead_demo.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
D | CMakeLists.txt | 2 add_subdirectory(cipher)
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 96 See “[Cipher key management](#cipher-key-management)”, “[MAC key management](#mac-key-management)”,… 114 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o… 116 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o… 118 | `cipher.h` | `mbedtls_cipher_` | [Symmetric encryption](#symmetric-encryption) | 133 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o… 263 …ons take care of verifying the tag. See “[Authenticated cipher operations](#authenticated-cipher-o… 267 …cipher (`aes.h`, `aria.h`, `camellia.h`, `des.h`), a particular block cipher mode (`ccm.h`, `gcm.h… 273 For modes that are based on a block cipher, the key type encodes the choice of block cipher: 280 * Unauthenticated cipher modes: 295 For the ChaCha20 unauthenticated cipher, use [`PSA_KEY_TYPE_CHACHA20`](https://mbed-tls.readthedocs… [all …]
|
D | driver-only-builds.md | 282 of Mbed TLS only supports DHE cipher suites if built-in FFDH 377 is enabled, then only the corresponding cipher will be available at runtime 382 ciphers that are built-in - that is, both the underlying cipher 401 - In the legacy API, `MBEDTLS_CHACHA20_C` enables the ChaCha20 stream cipher, and 405 - The legacy symbol `MBEDTLS_CCM_C` adds support for both cipher and AEAD, 414 from PSA acceleration of the underlying block cipher by enabling support for
|
/mbedtls-latest/include/mbedtls/ |
D | nist_kw.h | 86 mbedtls_cipher_id_t cipher,
|
D | ssl_ticket.h | 126 mbedtls_cipher_type_t cipher,
|
D | gcm.h | 111 mbedtls_cipher_id_t cipher,
|
D | ccm.h | 124 mbedtls_cipher_id_t cipher,
|
/mbedtls-latest/include/psa/ |
D | crypto_builtin_primitives.h | 108 mbedtls_cipher_context_t MBEDTLS_PRIVATE(cipher);
|