/mbedtls-latest/library/ |
D | psa_crypto_aead.c | 121 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_encrypt() argument 150 nonce, nonce_length, in mbedtls_psa_aead_encrypt() 163 nonce, nonce_length, in mbedtls_psa_aead_encrypt() 178 nonce, in mbedtls_psa_aead_encrypt() 188 (void) nonce; in mbedtls_psa_aead_encrypt() 233 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_decrypt() argument 261 nonce, nonce_length, in mbedtls_psa_aead_decrypt() 273 nonce, nonce_length, in mbedtls_psa_aead_decrypt() 289 nonce, in mbedtls_psa_aead_decrypt() 298 (void) nonce; in mbedtls_psa_aead_decrypt() [all …]
|
D | chachapoly.c | 105 const unsigned char nonce[12], in mbedtls_chachapoly_starts() 112 ret = mbedtls_chacha20_starts(&ctx->chacha20_ctx, nonce, 0U); in mbedtls_chachapoly_starts() 247 const unsigned char nonce[12], in chachapoly_crypt_and_tag() 256 ret = mbedtls_chachapoly_starts(ctx, nonce, mode); in chachapoly_crypt_and_tag() 279 const unsigned char nonce[12], in mbedtls_chachapoly_encrypt_and_tag() 287 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag() 293 const unsigned char nonce[12], in mbedtls_chachapoly_auth_decrypt() 305 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce, in mbedtls_chachapoly_auth_decrypt()
|
D | chacha20.c | 182 const unsigned char nonce[12], in mbedtls_chacha20_starts() 189 ctx->state[13] = MBEDTLS_GET_UINT32_LE(nonce, 0); in mbedtls_chacha20_starts() 190 ctx->state[14] = MBEDTLS_GET_UINT32_LE(nonce, 4); in mbedtls_chacha20_starts() 191 ctx->state[15] = MBEDTLS_GET_UINT32_LE(nonce, 8); in mbedtls_chacha20_starts() 246 const unsigned char nonce[12], in mbedtls_chacha20_crypt() 262 ret = mbedtls_chacha20_starts(&ctx, nonce, counter); in mbedtls_chacha20_crypt()
|
D | psa_crypto_aead.h | 71 const uint8_t *nonce, size_t nonce_length, 134 const uint8_t *nonce, size_t nonce_length, 255 const uint8_t *nonce,
|
D | psa_crypto_driver_wrappers.h | 1974 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_encrypt() argument 1997 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt() 2009 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt() 2022 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt() 2040 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_decrypt() argument 2063 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt() 2075 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt() 2088 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt() 2227 const uint8_t *nonce, in psa_driver_wrapper_aead_set_nonce() argument 2235 nonce, in psa_driver_wrapper_aead_set_nonce() [all …]
|
D | psa_crypto.c | 4795 LOCAL_INPUT_DECLARE(nonce_external, nonce); 4813 LOCAL_INPUT_ALLOC(nonce_external, nonce_length, nonce); 4826 nonce, nonce_length, 4836 LOCAL_INPUT_FREE(nonce_external, nonce); 4861 LOCAL_INPUT_DECLARE(nonce_external, nonce); 4879 LOCAL_INPUT_ALLOC(nonce_external, nonce_length, nonce); 4893 nonce, nonce_length, 4903 LOCAL_INPUT_FREE(nonce_external, nonce); 5045 const uint8_t *nonce, argument 5066 status = psa_driver_wrapper_aead_set_nonce(operation, nonce, [all …]
|
/mbedtls-latest/tests/src/drivers/ |
D | test_driver_aead.c | 29 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_encrypt() argument 47 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt() 56 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt() 65 (void) nonce; in mbedtls_test_transparent_aead_encrypt() 85 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_decrypt() argument 103 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt() 112 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt() 121 (void) nonce; in mbedtls_test_transparent_aead_decrypt() 212 const uint8_t *nonce, in mbedtls_test_transparent_aead_set_nonce() argument 224 libtestdriver1_mbedtls_psa_aead_set_nonce(operation, nonce, nonce_length); in mbedtls_test_transparent_aead_set_nonce() [all …]
|
/mbedtls-latest/tests/suites/ |
D | test_suite_chachapoly.function | 83 unsigned char nonce[12]; 93 memset(nonce, 0x00, sizeof(nonce)); 121 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT) 133 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT) 145 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
|
D | test_suite_ctr_drbg.function | 32 static void ctr_drbg_validate_internal(int reseed_mode, data_t *nonce, 48 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>) 49 * where nonce||perso = nonce[nonce->len] */ 55 nonce->x, nonce->len) == 0); 219 /*nonce*/ MBEDTLS_CTR_DRBG_ENTROPY_NONCE_LEN + 233 * for the entropy input and byte_strength/2 bytes for a nonce. */
|
D | test_suite_psa_crypto.function | 312 * \param nonce Nonce data 324 * respect to set nonce. 333 data_t *nonce, 427 MBEDTLS_TEST_PSA_SKIP_IF_ALT_GCM_NOT_12BYTES_NONCE(alg, nonce->len); 433 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 437 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 439 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 2345 unsigned char nonce[16] = { 0 }; 2351 TEST_LE_U(nonce_length, sizeof(nonce)); 2369 nonce, nonce_length, [all …]
|
D | test_suite_psa_crypto_init.function | 34 * once for the initial entropy and once for a nonce. The nonce length is 42 * and once for a nonce. */
|
D | test_suite_psa_crypto_driver_wrappers.function | 1668 data_t *nonce, 1709 nonce->x, nonce->len, 1736 data_t *nonce, 1771 nonce->x, nonce->len, 2789 data_t *nonce, 2846 /* Set the nonce. */ 2847 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 2906 data_t *nonce, 2953 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
|
D | test_suite_psa_crypto_init.data | 43 Fake entropy: not enough for a nonce
|
D | test_suite_psa_crypto.data | 2926 PSA AEAD decrypt: AES-CCM, invalid nonce length 6 2930 PSA AEAD decrypt: AES-CCM, invalid nonce length 14 2934 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 6 2938 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 14 2950 PSA AEAD encrypt/decrypt, AES-GCM, 19 bytes, 12 byte nonce , 1 2954 PSA AEAD encrypt/decrypt, AES GCM, 19 bytes, 12 byte nonce , 2 3094 PSA AEAD decrypt: AES-GCM, nonce=0 (bad) 3098 PSA AEAD decrypt: AES-GCM, nonce=0 (bad), TAG=12 3206 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=8, not supported) 3210 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=11, too short) [all …]
|
D | test_suite_hmac_drbg.function | 69 /* default_entropy_len of entropy, plus half as much for the nonce */
|
D | test_suite_ccm.data | 23 CCM lengths #2 nonce too short 26 CCM lengths #3 nonce too long
|
/mbedtls-latest/include/mbedtls/ |
D | chachapoly.h | 155 const unsigned char nonce[12], 287 const unsigned char nonce[12], 321 const unsigned char nonce[12],
|
D | chacha20.h | 116 const unsigned char nonce[12], 182 const unsigned char nonce[12],
|
/mbedtls-latest/tests/include/test/drivers/ |
D | aead.h | 51 const uint8_t *nonce, size_t nonce_length, 60 const uint8_t *nonce, size_t nonce_length, 79 const uint8_t *nonce,
|
/mbedtls-latest/include/psa/ |
D | crypto.h | 2111 const uint8_t *nonce, 2184 const uint8_t *nonce, 2406 uint8_t *nonce, 2446 const uint8_t *nonce,
|
/mbedtls-latest/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 1681 const uint8_t *nonce, size_t nonce_length, 1701 nonce, nonce_length, 1715 nonce, nonce_length, 1733 const uint8_t *nonce, size_t nonce_length, 1753 nonce, nonce_length, 1767 nonce, nonce_length, 1881 const uint8_t *nonce, 1889 nonce, 1899 nonce, nonce_length ) ); 1907 (void)nonce;
|
/mbedtls-latest/tests/src/ |
D | psa_exercise_key.c | 268 unsigned char nonce[PSA_AEAD_NONCE_MAX_SIZE] = { 0 }; in exercise_aead_key() local 289 nonce, nonce_length, in exercise_aead_key() 307 nonce, nonce_length, in exercise_aead_key()
|
/mbedtls-latest/docs/ |
D | psa-transition.md | 329 | `mbedtls_cipher_info_get_block_size` | not available (use specific macros for the IV, nonce or ta… 390 3. Set the nonce with `mbedtls_cipher_set_iv` (or the `starts` function for low-level modules). For… 400 …nonce of the default size (indicated by [`PSA_AEAD_NONCE_LENGTH`](https://mbed-tls.readthedocs.io/… 407 …nonce, use [`psa_aead_generate_nonce`](https://mbed-tls.readthedocs.io/projects/api/en/development…
|
D | 3.0-migration-guide.md | 238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_… 248 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u…
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 174 … what about IV/nonce inputs? They are typically small, but don't necessarily have a static size li… 224 * Cipher/AEAD IV/nonce (to be confirmed).
|