Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 25 of 26) sorted by relevance

12

/mbedtls-latest/library/
Dpsa_crypto_aead.c121 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_encrypt() argument
150 nonce, nonce_length, in mbedtls_psa_aead_encrypt()
163 nonce, nonce_length, in mbedtls_psa_aead_encrypt()
178 nonce, in mbedtls_psa_aead_encrypt()
188 (void) nonce; in mbedtls_psa_aead_encrypt()
233 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_decrypt() argument
261 nonce, nonce_length, in mbedtls_psa_aead_decrypt()
273 nonce, nonce_length, in mbedtls_psa_aead_decrypt()
289 nonce, in mbedtls_psa_aead_decrypt()
298 (void) nonce; in mbedtls_psa_aead_decrypt()
[all …]
Dchachapoly.c105 const unsigned char nonce[12], in mbedtls_chachapoly_starts()
112 ret = mbedtls_chacha20_starts(&ctx->chacha20_ctx, nonce, 0U); in mbedtls_chachapoly_starts()
247 const unsigned char nonce[12], in chachapoly_crypt_and_tag()
256 ret = mbedtls_chachapoly_starts(ctx, nonce, mode); in chachapoly_crypt_and_tag()
279 const unsigned char nonce[12], in mbedtls_chachapoly_encrypt_and_tag()
287 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag()
293 const unsigned char nonce[12], in mbedtls_chachapoly_auth_decrypt()
305 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce, in mbedtls_chachapoly_auth_decrypt()
Dchacha20.c182 const unsigned char nonce[12], in mbedtls_chacha20_starts()
189 ctx->state[13] = MBEDTLS_GET_UINT32_LE(nonce, 0); in mbedtls_chacha20_starts()
190 ctx->state[14] = MBEDTLS_GET_UINT32_LE(nonce, 4); in mbedtls_chacha20_starts()
191 ctx->state[15] = MBEDTLS_GET_UINT32_LE(nonce, 8); in mbedtls_chacha20_starts()
246 const unsigned char nonce[12], in mbedtls_chacha20_crypt()
262 ret = mbedtls_chacha20_starts(&ctx, nonce, counter); in mbedtls_chacha20_crypt()
Dpsa_crypto_aead.h71 const uint8_t *nonce, size_t nonce_length,
134 const uint8_t *nonce, size_t nonce_length,
255 const uint8_t *nonce,
Dpsa_crypto_driver_wrappers.h1974 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_encrypt() argument
1997 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt()
2009 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt()
2022 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt()
2040 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_decrypt() argument
2063 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt()
2075 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt()
2088 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt()
2227 const uint8_t *nonce, in psa_driver_wrapper_aead_set_nonce() argument
2235 nonce, in psa_driver_wrapper_aead_set_nonce()
[all …]
Dpsa_crypto.c4795 LOCAL_INPUT_DECLARE(nonce_external, nonce);
4813 LOCAL_INPUT_ALLOC(nonce_external, nonce_length, nonce);
4826 nonce, nonce_length,
4836 LOCAL_INPUT_FREE(nonce_external, nonce);
4861 LOCAL_INPUT_DECLARE(nonce_external, nonce);
4879 LOCAL_INPUT_ALLOC(nonce_external, nonce_length, nonce);
4893 nonce, nonce_length,
4903 LOCAL_INPUT_FREE(nonce_external, nonce);
5045 const uint8_t *nonce, argument
5066 status = psa_driver_wrapper_aead_set_nonce(operation, nonce,
[all …]
/mbedtls-latest/tests/src/drivers/
Dtest_driver_aead.c29 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_encrypt() argument
47 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt()
56 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt()
65 (void) nonce; in mbedtls_test_transparent_aead_encrypt()
85 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_decrypt() argument
103 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt()
112 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt()
121 (void) nonce; in mbedtls_test_transparent_aead_decrypt()
212 const uint8_t *nonce, in mbedtls_test_transparent_aead_set_nonce() argument
224 libtestdriver1_mbedtls_psa_aead_set_nonce(operation, nonce, nonce_length); in mbedtls_test_transparent_aead_set_nonce()
[all …]
/mbedtls-latest/tests/suites/
Dtest_suite_chachapoly.function83 unsigned char nonce[12];
93 memset(nonce, 0x00, sizeof(nonce));
121 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
133 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
145 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
Dtest_suite_ctr_drbg.function32 static void ctr_drbg_validate_internal(int reseed_mode, data_t *nonce,
48 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>)
49 * where nonce||perso = nonce[nonce->len] */
55 nonce->x, nonce->len) == 0);
219 /*nonce*/ MBEDTLS_CTR_DRBG_ENTROPY_NONCE_LEN +
233 * for the entropy input and byte_strength/2 bytes for a nonce. */
Dtest_suite_psa_crypto.function312 * \param nonce Nonce data
324 * respect to set nonce.
333 data_t *nonce,
427 MBEDTLS_TEST_PSA_SKIP_IF_ALT_GCM_NOT_12BYTES_NONCE(alg, nonce->len);
433 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
437 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
439 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
2345 unsigned char nonce[16] = { 0 };
2351 TEST_LE_U(nonce_length, sizeof(nonce));
2369 nonce, nonce_length,
[all …]
Dtest_suite_psa_crypto_init.function34 * once for the initial entropy and once for a nonce. The nonce length is
42 * and once for a nonce. */
Dtest_suite_psa_crypto_driver_wrappers.function1668 data_t *nonce,
1709 nonce->x, nonce->len,
1736 data_t *nonce,
1771 nonce->x, nonce->len,
2789 data_t *nonce,
2846 /* Set the nonce. */
2847 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
2906 data_t *nonce,
2953 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
Dtest_suite_psa_crypto_init.data43 Fake entropy: not enough for a nonce
Dtest_suite_psa_crypto.data2926 PSA AEAD decrypt: AES-CCM, invalid nonce length 6
2930 PSA AEAD decrypt: AES-CCM, invalid nonce length 14
2934 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 6
2938 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 14
2950 PSA AEAD encrypt/decrypt, AES-GCM, 19 bytes, 12 byte nonce , 1
2954 PSA AEAD encrypt/decrypt, AES GCM, 19 bytes, 12 byte nonce , 2
3094 PSA AEAD decrypt: AES-GCM, nonce=0 (bad)
3098 PSA AEAD decrypt: AES-GCM, nonce=0 (bad), TAG=12
3206 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=8, not supported)
3210 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=11, too short)
[all …]
Dtest_suite_hmac_drbg.function69 /* default_entropy_len of entropy, plus half as much for the nonce */
Dtest_suite_ccm.data23 CCM lengths #2 nonce too short
26 CCM lengths #3 nonce too long
/mbedtls-latest/include/mbedtls/
Dchachapoly.h155 const unsigned char nonce[12],
287 const unsigned char nonce[12],
321 const unsigned char nonce[12],
Dchacha20.h116 const unsigned char nonce[12],
182 const unsigned char nonce[12],
/mbedtls-latest/tests/include/test/drivers/
Daead.h51 const uint8_t *nonce, size_t nonce_length,
60 const uint8_t *nonce, size_t nonce_length,
79 const uint8_t *nonce,
/mbedtls-latest/include/psa/
Dcrypto.h2111 const uint8_t *nonce,
2184 const uint8_t *nonce,
2406 uint8_t *nonce,
2446 const uint8_t *nonce,
/mbedtls-latest/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja1681 const uint8_t *nonce, size_t nonce_length,
1701 nonce, nonce_length,
1715 nonce, nonce_length,
1733 const uint8_t *nonce, size_t nonce_length,
1753 nonce, nonce_length,
1767 nonce, nonce_length,
1881 const uint8_t *nonce,
1889 nonce,
1899 nonce, nonce_length ) );
1907 (void)nonce;
/mbedtls-latest/tests/src/
Dpsa_exercise_key.c268 unsigned char nonce[PSA_AEAD_NONCE_MAX_SIZE] = { 0 }; in exercise_aead_key() local
289 nonce, nonce_length, in exercise_aead_key()
307 nonce, nonce_length, in exercise_aead_key()
/mbedtls-latest/docs/
Dpsa-transition.md329 | `mbedtls_cipher_info_get_block_size` | not available (use specific macros for the IV, nonce or ta…
390 3. Set the nonce with `mbedtls_cipher_set_iv` (or the `starts` function for low-level modules). For…
400nonce of the default size (indicated by [`PSA_AEAD_NONCE_LENGTH`](https://mbed-tls.readthedocs.io/…
407nonce, use [`psa_aead_generate_nonce`](https://mbed-tls.readthedocs.io/projects/api/en/development…
D3.0-migration-guide.md238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_…
248 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u…
/mbedtls-latest/docs/architecture/
Dpsa-shared-memory.md174 … what about IV/nonce inputs? They are typically small, but don't necessarily have a static size li…
224 * Cipher/AEAD IV/nonce (to be confirmed).

12