Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 59) sorted by relevance

123

/mbedtls-latest/tests/scripts/
Dgenerate_tls13_compat_tests.py87 [cipher for cipher in ciphersuites if cipher not in self._ciphers])
344 map(lambda cipher: self.CIPHER_SUITE[cipher], self._ciphers))
478 def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): argument
483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group)
485 server_object = SERVER_CLASSES[server](ciphersuite=cipher,
489 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
603 for client, server, cipher, named_group, sig_alg in \
611 cipher=cipher, named_group=named_group,
656 cipher=args.cipher, named_group=args.named_group))
/mbedtls-latest/library/
Dpsa_crypto_cipher.c296 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup()
306 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup()
317 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, in psa_cipher_setup()
323 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, key_buffer, in psa_cipher_setup()
334 ret = mbedtls_cipher_set_padding_mode(&operation->ctx.cipher, in psa_cipher_setup()
338 ret = mbedtls_cipher_set_padding_mode(&operation->ctx.cipher, in psa_cipher_setup()
391 mbedtls_cipher_set_iv(&operation->ctx.cipher, in mbedtls_psa_cipher_set_iv()
513 (operation->ctx.cipher.unprocessed_len + input_length) in mbedtls_psa_cipher_update()
528 status = psa_cipher_update_ecb(&operation->ctx.cipher, in mbedtls_psa_cipher_update()
541 mbedtls_cipher_update(&operation->ctx.cipher, input, in mbedtls_psa_cipher_update()
[all …]
Dgcm.c163 mbedtls_cipher_id_t cipher, in mbedtls_gcm_setkey() argument
176 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_gcm_setkey()
186 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_gcm_setkey()
1023 mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES; in mbedtls_gcm_self_test() local
1060 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
1115 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
1154 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
1236 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
Dssl_ticket.c216 mbedtls_cipher_type_t cipher, in mbedtls_ssl_ticket_setup() argument
230 if (mbedtls_ssl_cipher_to_psa(cipher, TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_setup()
239 cipher_info = mbedtls_cipher_info_from_type(cipher); in mbedtls_ssl_ticket_setup()
Dnist_kw.c52 mbedtls_cipher_id_t cipher, in mbedtls_nist_kw_setkey() argument
60 cipher_info = mbedtls_cipher_info_from_values(cipher, in mbedtls_nist_kw_setkey()
80 if (cipher != MBEDTLS_CIPHER_ID_AES) { in mbedtls_nist_kw_setkey()
Dccm.c53 mbedtls_cipher_id_t cipher, in mbedtls_ccm_setkey() argument
62 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_ccm_setkey()
72 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_ccm_setkey()
Dcipher_wrap.h76 mbedtls_cipher_id_t cipher; member
Dssl_tls13_keys.c961 cipher_info = mbedtls_cipher_info_from_type(ciphersuite_info->cipher); in mbedtls_ssl_tls13_populate_transform()
964 ciphersuite_info->cipher)); in mbedtls_ssl_tls13_populate_transform()
1050 if ((status = mbedtls_ssl_cipher_to_psa((mbedtls_cipher_type_t) ciphersuite_info->cipher, in mbedtls_ssl_tls13_populate_transform()
1109 status = mbedtls_ssl_cipher_to_psa((mbedtls_cipher_type_t) ciphersuite_info->cipher, taglen, in ssl_tls13_get_cipher_key_info()
/mbedtls-latest/tests/suites/
Dtest_suite_cmac.data32 CMAC init Camellia-128: wrong cipher
36 CMAC init Camellia-192: wrong cipher
40 CMAC init Camellia-256: wrong cipher
44 CMAC init #8 ARIA-128: wrong cipher
48 CMAC init #8 ARIA-192: wrong cipher
52 CMAC init #8 ARIA-256: wrong cipher
Dtest_suite_cipher.function2 #include "mbedtls/cipher.h"
13 /* Check the internal consistency of a cipher info structure, and
185 /* Ensure that there is at least 1 supported cipher, otherwise exit gracefully */
564 void dec_empty_buf(int cipher,
589 cipher_info = mbedtls_cipher_info_from_type(cipher);
789 data_t *iv, data_t *cipher,
829 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx, cipher->x, cipher->len, output, &outlen));
859 data_t *ad, data_t *cipher, data_t *tag,
884 * key, cipher and tag can't be empty. */
929 cipher_plus_tag_len = cipher->len + tag->len;
[all …]
Dtest_suite_pkcs12.function73 void pkcs12_pbe_encrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw,
79 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher;
128 void pkcs12_pbe_decrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw,
134 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher;
Dtest_suite_psa_crypto_op_fail.generated.data1559 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with AES
1563 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with ARIA
1567 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,4): invalid with CAMELLIA
1899 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with AES
1903 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with ARIA
1907 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,14): invalid with CAMELLIA
2099 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with AES
2103 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with ARIA
2107 PSA cipher AEAD_WITH_SHORTENED_TAG(CCM,16): invalid with CAMELLIA
4522 PSA cipher CBC_MAC: invalid with AES
[all …]
Dtest_suite_psa_crypto_metadata.data372 Block cipher key type: AES
376 Block cipher key type: ARIA
380 Block cipher key type: DES
384 Block cipher key type: Camellia
388 Stream cipher key type: ChaCha20
Dtest_suite_ssl_decrypt.misc.data1 Decrypt null cipher, MD5
5 Decrypt null cipher, SHA-1
9 Decrypt null cipher, SHA-256
13 Decrypt null cipher, SHA-384
Dtest_suite_cmac.function2 #include "mbedtls/cipher.h"
29 /* Test NULL cipher info */
/mbedtls-latest/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md107 * **Legacy domain**: does not interact with PSA. Implementations of hashes, of cipher primitives, o…
129 Symmetric ciphers and AEADs (before work on driver-only cipher):
139 * In principle: any cipher-mode (default padding), passed an
145 * Note: `cipher.h` exposed through API.
161 * Note: also called by `cipher.c` if enabled.
167 * Note: also called by `cipher.c` if enabled.
173 * Note: also called by `cipher.c` if enabled.
179 * Note: also called by `cipher.c` if enabled.
180 * Note: `cipher.h` exposed through API.
183 * potentially any cipher/AEAD in any mode and any direction
[all …]
/mbedtls-latest/programs/
DMakefile34 cipher/cipher_aead_demo \
153 cipher/cipher_aead_demo$(EXEXT): cipher/cipher_aead_demo.c $(DEP)
155 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) cipher/cipher_aead_demo.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
DCMakeLists.txt2 add_subdirectory(cipher)
/mbedtls-latest/docs/
Dpsa-transition.md96 See “[Cipher key management](#cipher-key-management)”, “[MAC key management](#mac-key-management)”,…
114 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o…
116 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o…
118 | `cipher.h` | `mbedtls_cipher_` | [Symmetric encryption](#symmetric-encryption) |
133 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o…
263 …ons take care of verifying the tag. See “[Authenticated cipher operations](#authenticated-cipher-o…
267cipher (`aes.h`, `aria.h`, `camellia.h`, `des.h`), a particular block cipher mode (`ccm.h`, `gcm.h…
273 For modes that are based on a block cipher, the key type encodes the choice of block cipher:
280 * Unauthenticated cipher modes:
295 For the ChaCha20 unauthenticated cipher, use [`PSA_KEY_TYPE_CHACHA20`](https://mbed-tls.readthedocs…
[all …]
Ddriver-only-builds.md282 of Mbed TLS only supports DHE cipher suites if built-in FFDH
377 is enabled, then only the corresponding cipher will be available at runtime
382 ciphers that are built-in - that is, both the underlying cipher
401 - In the legacy API, `MBEDTLS_CHACHA20_C` enables the ChaCha20 stream cipher, and
405 - The legacy symbol `MBEDTLS_CCM_C` adds support for both cipher and AEAD,
414 from PSA acceleration of the underlying block cipher by enabling support for
/mbedtls-latest/include/mbedtls/
Dnist_kw.h86 mbedtls_cipher_id_t cipher,
Dssl_ticket.h126 mbedtls_cipher_type_t cipher,
Dgcm.h111 mbedtls_cipher_id_t cipher,
Dccm.h124 mbedtls_cipher_id_t cipher,
/mbedtls-latest/include/psa/
Dcrypto_builtin_primitives.h108 mbedtls_cipher_context_t MBEDTLS_PRIVATE(cipher);

123