/mbedtls-latest/library/ |
D | psa_crypto_aead.c | 124 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_psa_aead_encrypt() argument 143 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt() 153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 182 ciphertext, in mbedtls_psa_aead_encrypt() 212 const uint8_t *ciphertext, in psa_aead_unpadded_locate_tag() argument 225 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag() 235 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_psa_aead_decrypt() argument 250 ciphertext, ciphertext_length, in mbedtls_psa_aead_decrypt() 264 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() [all …]
|
D | psa_crypto_aead.h | 74 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length); 136 const uint8_t *ciphertext, size_t ciphertext_length, 465 uint8_t *ciphertext,
|
D | ccm.c | 689 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local 710 memset(ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN); in mbedtls_ccm_self_test() 716 plaintext, ciphertext, in mbedtls_ccm_self_test() 717 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test() 721 memcmp(ciphertext, res_test_data[i], in mbedtls_ccm_self_test() 734 ciphertext, plaintext, in mbedtls_ccm_self_test() 735 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
|
D | psa_crypto_driver_wrappers.h | 1977 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in psa_driver_wrapper_aead_encrypt() argument 2000 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt() 2012 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt() 2025 ciphertext, ciphertext_size, ciphertext_length ) ); in psa_driver_wrapper_aead_encrypt() 2042 const uint8_t *ciphertext, size_t ciphertext_length, in psa_driver_wrapper_aead_decrypt() argument 2065 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 2077 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 2090 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 2396 uint8_t *ciphertext, in psa_driver_wrapper_aead_finish() argument 2408 ciphertext, in psa_driver_wrapper_aead_finish() [all …]
|
D | psa_crypto.c | 4798 LOCAL_OUTPUT_DECLARE(ciphertext_external, ciphertext); 4816 LOCAL_OUTPUT_ALLOC(ciphertext_external, ciphertext_size, ciphertext); 4829 ciphertext, ciphertext_size, ciphertext_length); 4832 memset(ciphertext, 0, ciphertext_size); 4839 LOCAL_OUTPUT_FREE(ciphertext_external, ciphertext); 4863 LOCAL_INPUT_DECLARE(ciphertext_external, ciphertext); 4882 LOCAL_INPUT_ALLOC(ciphertext_external, ciphertext_length, ciphertext); 4895 ciphertext, ciphertext_length, 4905 LOCAL_INPUT_FREE(ciphertext_external, ciphertext); 5380 LOCAL_OUTPUT_DECLARE(ciphertext_external, ciphertext); [all …]
|
/mbedtls-latest/tests/src/drivers/ |
D | test_driver_aead.c | 32 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_test_transparent_aead_encrypt() argument 50 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt() 59 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt() 71 (void) ciphertext; in mbedtls_test_transparent_aead_encrypt() 87 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt() argument 105 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 114 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 125 (void) ciphertext; in mbedtls_test_transparent_aead_decrypt() 339 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish() argument 355 libtestdriver1_mbedtls_psa_aead_finish(operation, ciphertext, in mbedtls_test_transparent_aead_finish() [all …]
|
/mbedtls-latest/tests/suites/ |
D | test_suite_nist_kw.function | 151 unsigned char *ciphertext = NULL; 164 ciphertext = mbedtls_calloc(1, output_len); 165 TEST_ASSERT(ciphertext != NULL); 172 ciphertext, &output_len, 186 mbedtls_free(ciphertext); 198 unsigned char *ciphertext = NULL; 211 ciphertext = mbedtls_calloc(1, in_len); 212 TEST_ASSERT(ciphertext != NULL); 217 unwrap_ret = mbedtls_nist_kw_unwrap(&ctx, mode, ciphertext, in_len, 230 mbedtls_free(ciphertext);
|
D | test_suite_gcm.aes128_de.data | 673 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 0 [all …]
|
D | test_suite_psa_crypto_op_fail.function | 297 uint8_t ciphertext[PSA_ASYMMETRIC_ENCRYPT_OUTPUT_MAX_SIZE] = { 0 }; 316 ciphertext, sizeof(ciphertext), 321 ciphertext, sizeof(ciphertext),
|
D | test_suite_nist_kw.data | 33 NIST KW lengths #3 KW ciphertext OK (3 to 2^54 semiblocks) 36 NIST KW lengths #4 KWP ciphertext OK (2 to 2^29 semiblocks) 45 NIST KW lengths #8 KW ciphertext too short (3 to 2^54 semiblocks) 48 NIST KW lengths #9 KWP ciphertext too short (2 to 2^29 semiblocks) 54 NIST KW lengths #11 KW ciphertext not a multiple of semiblocks. 57 NIST KW lengths #12 KWP ciphertext not a multiple of semiblocks. 81 NIST KW lengths #20 KW ciphertext NULL 84 NIST KW lengths #21 KWP ciphertext NULL
|
D | test_suite_ccm.function | 618 /* Provide unexpected plaintext/ciphertext data */ 731 /* Provide too much plaintext/ciphertext */ 761 /* Provide incomplete plaintext/ciphertext and finish */ 796 /* Provide full plaintext/ciphertext of first update 797 * Provide unexpected plaintext/ciphertext on second update */ 829 /* Provide incomplete plaintext/ciphertext of first update 830 * Provide too much plaintext/ciphertext on second update */ 866 /* Finish without passing any auth data or plaintext/ciphertext input */
|
D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
|
D | test_suite_aes.function | 19 unsigned char ciphertext[16]; 27 plaintext, ciphertext) == 0); 42 TEST_MEMORY_COMPARE(ciphertext, 16, output, 16); 47 ciphertext, output) == 0);
|
D | test_suite_psa_crypto.function | 4224 data_t *plaintext, data_t *ciphertext) 4239 TEST_LE_U(ciphertext->len, 4244 PSA_CIPHER_DECRYPT_OUTPUT_SIZE(key_type, alg, ciphertext->len)); 4245 TEST_LE_U(PSA_CIPHER_DECRYPT_OUTPUT_SIZE(key_type, alg, ciphertext->len), 4246 PSA_CIPHER_DECRYPT_OUTPUT_MAX_SIZE(ciphertext->len)); 4293 TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len, 4301 ciphertext->x, ciphertext->len, 4319 TEST_MEMORY_COMPARE(ciphertext->x, ciphertext->len, 4324 PSA_ASSERT(psa_cipher_decrypt(key, alg, ciphertext->x, ciphertext->len, 5457 unsigned char *ciphertext = NULL; [all …]
|
D | test_suite_cipher.function | 863 * Take an AEAD ciphertext + tag and perform a pair 927 * (we need the tag appended to the ciphertext)
|
D | test_suite_ssl.function | 1838 data_t *ciphertext) 1886 buf_len = ciphertext->len + MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY; 1899 TEST_ASSERT(plaintext->len <= ciphertext->len); 1914 ciphertext->x, ciphertext->len);
|
D | test_suite_psa_crypto_driver_wrappers.function | 425 * \param buf The ciphertext produced by the driver. 2541 /* Determine the maximum ciphertext length */ 2568 /* We don't know what ciphertext length to expect, but check that
|
D | test_suite_ccm.data | 1753 CCM encrypt, unexpected ciphertext/plaintext data, NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
|
/mbedtls-latest/tests/src/ |
D | psa_exercise_key.c | 186 unsigned char ciphertext[32] = "(wabblewebblewibblewobblewubble)"; in exercise_cipher_key() local 187 size_t ciphertext_length = sizeof(ciphertext); in exercise_cipher_key() 188 unsigned char decrypted[sizeof(ciphertext)]; in exercise_cipher_key() 211 ciphertext, sizeof(ciphertext), in exercise_cipher_key() 214 ciphertext + ciphertext_length, in exercise_cipher_key() 215 sizeof(ciphertext) - ciphertext_length, in exercise_cipher_key() 237 ciphertext, ciphertext_length, in exercise_cipher_key() 273 unsigned char ciphertext[48] = "(wabblewebblewibblewobblewubble)"; in exercise_aead_key() local 274 size_t ciphertext_length = sizeof(ciphertext); in exercise_aead_key() 275 size_t plaintext_length = sizeof(ciphertext); in exercise_aead_key() [all …]
|
/mbedtls-latest/tests/include/test/drivers/ |
D | aead.h | 54 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length); 62 const uint8_t *ciphertext, size_t ciphertext_length, 102 uint8_t *ciphertext,
|
/mbedtls-latest/include/psa/ |
D | crypto.h | 2117 uint8_t *ciphertext, 2188 const uint8_t *ciphertext, 2709 uint8_t *ciphertext,
|
/mbedtls-latest/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 1684 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) 1704 ciphertext, ciphertext_size, ciphertext_length ); 1718 ciphertext, ciphertext_size, ciphertext_length ) ); 1735 const uint8_t *ciphertext, size_t ciphertext_length, 1755 ciphertext, ciphertext_length, 1769 ciphertext, ciphertext_length, 2025 uint8_t *ciphertext, 2037 ciphertext, 2049 ciphertext, ciphertext_size, 2058 (void)ciphertext;
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 47 … The authenticated encryption implementation separately calculates the ciphertext and the MAC from… 50 * If the authenticated encryption calculates the ciphertext before the client changes the output bu… 72 …re): an application encrypts some data, and lets its clients store the ciphertext. Clients may not… 74 …ciphertext incrementally by simultaneously writing the plaintext to the output buffer and calculat… 84 …he content of a plaintext block after seeing the immediately preceding ciphertext block, this give… 196 …er shall allocate an intermediate buffer for cipher and AEAD plaintext/ciphertext inputs and outpu… 218 * Plaintext/ciphertext inputs and outputs for cipher and AEAD.
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 369 For a one-shot operation (where the whole plaintext or ciphertext is passed as a single input), the… 392 … Call `mbedtls_cipher_update` as many times as necessary to pass the input plaintext or ciphertext. 396 …th_decrypt_ext` for a one-shot operation (where the whole plaintext or ciphertext is passed as a s… 400 …pt with a specified nonce, or to separate the tag from the rest of the ciphertext, use the multi-p… 401 …f6196a22d50c216c947e0320d3ba) to perform authenticated decryption of a ciphertext with the authent… 411 …ad_1ga759791bbe1763b377c3b5447641f1fc8) to obtain the last part of the ciphertext and the authenti…
|
/mbedtls-latest/ |
D | ChangeLog | 1534 man-in-the-middle to inject fake ciphertext into a DTLS connection. 1633 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations. 2251 these new functions always append the tag to the ciphertext, and include 2252 the tag in the ciphertext length.
|