/mbedtls-latest/tests/suites/ |
D | test_suite_cipher.camellia.data | 9 CAMELLIA Encrypt and decrypt 0 bytes [#1] 13 CAMELLIA Encrypt and decrypt 1 byte [#1] 17 CAMELLIA Encrypt and decrypt 2 bytes [#1] 21 CAMELLIA Encrypt and decrypt 7 bytes [#1] 25 CAMELLIA Encrypt and decrypt 8 bytes [#1] 29 CAMELLIA Encrypt and decrypt 9 bytes [#1] 33 CAMELLIA Encrypt and decrypt 15 bytes [#1] 37 CAMELLIA Encrypt and decrypt 16 bytes [#1] 41 CAMELLIA Encrypt and decrypt 17 bytes [#1] 45 CAMELLIA Encrypt and decrypt 31 bytes [#1] [all …]
|
D | test_suite_cipher.des.data | 13 DES Encrypt and decrypt 0 bytes [#1] 17 DES Encrypt and decrypt 1 byte 21 DES Encrypt and decrypt 2 bytes 25 DES Encrypt and decrypt 7 bytes 29 DES Encrypt and decrypt 8 bytes 33 DES Encrypt and decrypt 9 bytes 37 DES Encrypt and decrypt 15 bytes 41 DES Encrypt and decrypt 16 bytes 45 DES Encrypt and decrypt 17 bytes 49 DES Encrypt and decrypt 31 bytes [all …]
|
D | test_suite_cipher.aria.data | 5 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 0 bytes 9 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 1 byte 13 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 2 bytes 17 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 7 bytes 21 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 8 bytes 25 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 9 bytes 29 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 15 bytes 33 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 16 bytes 37 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 17 bytes 41 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 31 bytes [all …]
|
D | test_suite_cipher.aes.data | 9 AES-128 CBC - Encrypt and decrypt 0 bytes with PKCS7 padding 13 AES-128 CBC - Encrypt and decrypt 1 byte with PKCS7 padding 17 AES-128 CBC - Encrypt and decrypt 2 bytes with PKCS7 padding 21 AES-128 CBC - Encrypt and decrypt 7 bytes with PKCS7 padding 25 AES-128 CBC - Encrypt and decrypt 8 bytes with PKCS7 padding 29 AES-128 CBC - Encrypt and decrypt 9 bytes with PKCS7 padding 33 AES-128 CBC - Encrypt and decrypt 15 bytes with PKCS7 padding 37 AES-128 CBC - Encrypt and decrypt 16 bytes with PKCS7 padding 41 AES-128 CBC - Encrypt and decrypt 17 bytes with PKCS7 padding 45 AES-128 CBC - Encrypt and decrypt 31 bytes with PKCS7 padding [all …]
|
D | test_suite_cipher.null.data | 1 NULL Encrypt and decrypt 0 bytes 5 NULL Encrypt and decrypt 1 bytes 9 NULL Encrypt and decrypt 2 bytes 13 NULL Encrypt and decrypt 7 bytes 17 NULL Encrypt and decrypt 8 bytes 21 NULL Encrypt and decrypt 9 bytes 25 NULL Encrypt and decrypt 15 bytes 29 NULL Encrypt and decrypt 16 bytes 33 NULL Encrypt and decrypt 31 bytes 37 NULL Encrypt and decrypt 32 bytes [all …]
|
D | test_suite_cipher.chacha20.data | 9 ChaCha20 Encrypt and decrypt 0 bytes 13 ChaCha20 Encrypt and decrypt 1 bytes 17 ChaCha20 Encrypt and decrypt 2 bytes 21 ChaCha20 Encrypt and decrypt 7 bytes 25 ChaCha20 Encrypt and decrypt 8 bytes 29 ChaCha20 Encrypt and decrypt 9 bytes 33 ChaCha20 Encrypt and decrypt 15 bytes 37 ChaCha20 Encrypt and decrypt 16 bytes 41 ChaCha20 Encrypt and decrypt 17 bytes 45 ChaCha20 Encrypt and decrypt 31 bytes [all …]
|
D | test_suite_cipher.chachapoly.data | 5 ChaCha20+Poly1305 Encrypt and decrypt 0 bytes 9 ChaCha20+Poly1305 Encrypt and decrypt 1 bytes 13 ChaCha20+Poly1305 Encrypt and decrypt 2 bytes 17 ChaCha20+Poly1305 Encrypt and decrypt 7 bytes 21 ChaCha20+Poly1305 Encrypt and decrypt 8 bytes 25 ChaCha20+Poly1305 Encrypt and decrypt 9 bytes 29 ChaCha20+Poly1305 Encrypt and decrypt 15 bytes 33 ChaCha20+Poly1305 Encrypt and decrypt 16 bytes 37 ChaCha20+Poly1305 Encrypt and decrypt 17 bytes 41 ChaCha20+Poly1305 Encrypt and decrypt 31 bytes [all …]
|
D | test_suite_ccm.data | 69 CCM* auth decrypt tag #1 73 CCM* auth decrypt tag #2 77 CCM* auth decrypt tag #3 1045 CCM auth decrypt tag NIST DVPT AES-128 #1 (P=0, N=7, A=0, T=4) 1049 CCM auth decrypt tag NIST DVPT AES-128 #2 (P=0, N=7, A=0, T=4) 1053 CCM auth decrypt tag NIST DVPT AES-128 #3 (P=0, N=7, A=0, T=16) 1057 CCM auth decrypt tag NIST DVPT AES-128 #4 (P=0, N=7, A=0, T=16) 1061 CCM auth decrypt tag NIST DVPT AES-128 #5 (P=0, N=13, A=0, T=4) 1065 CCM auth decrypt tag NIST DVPT AES-128 #6 (P=0, N=13, A=0, T=4) 1069 CCM auth decrypt tag NIST DVPT AES-128 #7 (P=0, N=13, A=0, T=16) [all …]
|
D | test_suite_psa_crypto_driver_wrappers.data | 362 PSA symmetric decrypt: AES-CTR, 16 bytes, good 366 PSA symmetric decrypt: AES-CTR, 16 bytes, fallback 370 PSA symmetric decrypt: AES-CTR, 16 bytes, fake 374 PSA symmetric decrypt multipart: AES-CTR, 16 bytes, good 378 PSA symmetric decrypt multipart: AES-CTR, 16 bytes, fallback 382 PSA symmetric decrypt multipart: AES-CTR, 16 bytes, fake 486 PSA AEAD decrypt: AES-CCM, 39 bytes 490 PSA AEAD decrypt: AES-CCM, 39 bytes, fallback 494 PSA AEAD decrypt: AES-CCM, 39 bytes, INSUFFICIENT_MEMORY 498 PSA AEAD decrypt, AES-GCM, 144 bytes #1 [all …]
|
D | test_suite_cipher.gcm.data | 13 AES 128 GCM Encrypt and decrypt 0 bytes 17 AES 128 GCM Encrypt and decrypt 1 byte 21 AES 128 GCM Encrypt and decrypt 2 bytes 25 AES 128 GCM Encrypt and decrypt 7 bytes 29 AES 128 GCM Encrypt and decrypt 8 bytes 33 AES 128 GCM Encrypt and decrypt 9 bytes 37 AES 128 GCM Encrypt and decrypt 15 bytes 41 AES 128 GCM Encrypt and decrypt 16 bytes 45 AES 128 GCM Encrypt and decrypt 17 bytes 49 AES 128 GCM Encrypt and decrypt 31 bytes [all …]
|
D | test_suite_psa_crypto.data | 912 PSA key policy: cipher, encrypt | decrypt 920 PSA key policy: cipher, encrypt but not decrypt 924 PSA key policy: cipher, decrypt but not encrypt 928 PSA key policy: cipher, neither encrypt nor decrypt 936 PSA key policy: AEAD, encrypt | decrypt 948 PSA key policy: AEAD, encrypt but not decrypt 952 PSA key policy: AEAD, decrypt but not encrypt 956 PSA key policy: AEAD, neither encrypt nor decrypt 1016 PSA key policy: asymmetric encryption, encrypt | decrypt 1036 PSA key policy: asymmetric encryption, encrypt but not decrypt [all …]
|
D | test_suite_pk.data | 453 RSA encrypt-decrypt test PKCS1 v1.5 457 RSA encrypt-decrypt test PKCS1 v2.1 461 RSA decrypt test vector - PKCS1v1.5 465 RSA decrypt test vector - PKCS1v1.5, corrupted encrypted data 469 RSA decrypt test vector - PKCS1v2.1 473 RSA decrypt test vector - PKCS1v2.1, corrupted encrypted data 477 RSA decrypt test vector - PKCS1v1.5, but data is PKCS1v2.1 encrypted 481 RSA decrypt test vector - PKCS1v2.1, but data is PKCS1v1.5 encrypted 485 RSA Opaque PCKS1 v1.5 - decrypt test vector #1 489 RSA Opaque PCKS1 v2.1 - decrypt test vector #1 [all …]
|
D | test_suite_ssl_decrypt.function | 232 * Encrypt and decrypt the correct record, expecting success
|
D | test_suite_aes.function | 123 // decrypt
|
D | test_suite_pk.function | 705 /* unsupported operations: verify, decrypt, encrypt */ 1715 * An rsa_alt context can only do private operations (decrypt, sign). 1782 /* Test decrypt */
|
D | test_suite_cipher.function | 961 * Authenticate and decrypt, and check result
|
D | test_suite_psa_crypto.function | 317 * \param input_data Data to encrypt / decrypt 400 /* Do not want to attempt to decrypt tag. */ 580 * \param input_data Data to encrypt / decrypt 3972 /* Call decrypt setup twice in a row. */ 4367 * Encrypt or decrypt will end up in the same place. */ 6399 /* Test for generating nonce in decrypt setup. */ 6586 * lengths for them. (decrypt) */ 8567 /* We test encryption by checking that encrypt-then-decrypt gives back
|
/mbedtls-latest/programs/psa/ |
D | crypto_examples.c | 162 uint8_t decrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local 183 decrypt, sizeof(decrypt), &output_len); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 186 status = memcmp(input, decrypt, sizeof(input)); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 210 encrypt[input_size + block_size], decrypt[input_size + block_size]; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local 231 decrypt, sizeof(decrypt), &output_len); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 234 status = memcmp(input, decrypt, sizeof(input)); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 257 decrypt[input_size]; in cipher_example_encrypt_decrypt_aes_ctr_multi() local 278 decrypt, sizeof(decrypt), &output_len); in cipher_example_encrypt_decrypt_aes_ctr_multi() 281 status = memcmp(input, decrypt, sizeof(input)); in cipher_example_encrypt_decrypt_aes_ctr_multi()
|
/mbedtls-latest/programs/ |
D | README.md | 26 …: loads a PEM or DER public/private key file and uses the key to encrypt/decrypt a short string th… 34 …y/rsa_decrypt.c): loads an RSA public/private key and uses it to encrypt/decrypt a short string th…
|
/mbedtls-latest/docs/architecture/psa-migration/ |
D | psa-legacy-bridges.md | 284 …_ANY_HASH)` for a sign/verify usage, and `PSA_ALG_RSA_PKCS1V15_CRYPT` for an encrypt/decrypt usage. 285 …H)` for a sign/verify usage, and `PSA_ALG_RSA_OAEP(hash)` for an encrypt/decrypt usage where `hash… 311 …y_algorithm`) if that is a matching operation type (sign/verify, encrypt/decrypt), but with no res… 313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the…
|
D | md-cipher-dispatch.md | 132 * AES, DES or 3DES in CBC mode without padding, decrypt only (!). 137 * In practice: 2DES or 3DES in CBC mode with PKCS7 padding, decrypt only 143 en/decrypt, look at standards and tests) 148 * 3DES or DES in CBC mode with PKCS7 padding, both encrypt and decrypt. 176 * AES in ECB mode, both encryt and decrypt.
|
/mbedtls-latest/programs/ssl/ |
D | ssl_server2.c | 3121 mbedtls_ssl_async_decrypt_t *decrypt = NULL; in main() local 3126 decrypt = ssl_async_decrypt; in main() 3140 decrypt, in main()
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 287 This affects all users who use the RSA encrypt, decrypt, sign and 365 This affects all users who use the RSA encrypt, decrypt, sign and 484 RSA sign and decrypt functions; `mbedtls_rsa_private()`; the functions in DHM
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 74 …ng the ciphertext to the provisioning application, which will attempt to decrypt it with associate… 84 … This is a security violation if the key policy only allowed the client to encrypt, not to decrypt. 191 * when decrypting with an encrypt-then-authenticate structure (one read to decrypt and one read to …
|
/mbedtls-latest/docs/proposed/ |
D | psa-conditional-inclusion-c.md | 42 [Limitation.direction] For mechanisms that have multiple directions (for example encrypt/decrypt, s…
|