/mbedtls-latest/tests/suites/ |
D | test_suite_nist_kw.function | 22 unsigned char plaintext[32]; 27 memset(plaintext, 0, sizeof(plaintext)); 44 plaintext, sizeof(plaintext), 56 plaintext, &output_len, 57 sizeof(plaintext)) == 0); 59 TEST_ASSERT(output_len == sizeof(plaintext)); 60 for (i = 0; i < sizeof(plaintext); i++) { 61 TEST_ASSERT(plaintext[i] == 0); 79 plaintext, sizeof(plaintext), 85 plaintext, sizeof(plaintext), [all …]
|
D | test_suite_ssl_decrypt.misc.data | 17 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad 21 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad 49 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad 53 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad 81 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad 85 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad 113 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad 117 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad 145 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad 149 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad [all …]
|
D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0 [all …]
|
D | test_suite_ssl_decrypt.function | 64 /* Change any one byte of the plaintext or MAC. The MAC will be wrong. */ 136 * - if it's -1, the plaintext length is 0 and minimal padding is applied 137 * - if it's -2, the plaintext length is 0 and maximal padding is applied 140 * byte that encodes the length. The minimal non-zero plaintext length 167 /* Determine padding/plaintext length */ 254 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */ 274 * in this case. (With larger buffers, ie when the plaintext is long or
|
D | test_suite_psa_crypto_op_fail.function | 296 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = { 0 }; 314 plaintext, 1, 323 plaintext, sizeof(plaintext),
|
D | test_suite_ccm.function | 618 /* Provide unexpected plaintext/ciphertext data */ 731 /* Provide too much plaintext/ciphertext */ 761 /* Provide incomplete plaintext/ciphertext and finish */ 796 /* Provide full plaintext/ciphertext of first update 797 * Provide unexpected plaintext/ciphertext on second update */ 829 /* Provide incomplete plaintext/ciphertext of first update 830 * Provide too much plaintext/ciphertext on second update */ 866 /* Finish without passing any auth data or plaintext/ciphertext input */
|
D | test_suite_nist_kw.data | 27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks) 30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets) 39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks) 42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets) 51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks. 72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
|
D | test_suite_aes.function | 15 unsigned char plaintext[16] = { 27 plaintext, ciphertext) == 0); 41 plaintext, output) == 0); 48 TEST_MEMORY_COMPARE(plaintext, 16, output, 16);
|
D | test_suite_constant_time.data | 1 # these are the numbers we'd get with an empty plaintext and truncated HMAC 5 # we could get this with 255-bytes plaintext and untruncated SHA-256 9 # we could get this with 255-bytes plaintext and untruncated SHA-384
|
D | test_suite_cipher.function | 846 /* check plaintext only if everything went fine */ 865 * this results in the expected plaintext, and that 1080 /* check plaintext only if everything went fine */ 1126 /* check plaintext only if everything went fine */
|
D | test_suite_ssl.function | 1363 * in front of the plaintext, and expect the encryption 1367 * at the end of the plaintext, and expect the encryption 1371 * both at the front and end of the plaintext, 1837 data_t *plaintext, 1895 /* Copy plaintext into record structure */ 1899 TEST_ASSERT(plaintext->len <= ciphertext->len); 1900 memcpy(rec.buf + rec.data_offset, plaintext->x, plaintext->len); 1901 rec.data_len = plaintext->len; 1919 plaintext->x, plaintext->len);
|
D | test_suite_psa_crypto.function | 4224 data_t *plaintext, data_t *ciphertext) 4240 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len)); 4241 TEST_LE_U(PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len), 4242 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(plaintext->len)); 4243 TEST_LE_U(plaintext->len, 4257 plaintext->len); 4283 plaintext->x, plaintext->len, 4311 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len, 4316 PSA_ASSERT(psa_cipher_encrypt(key, alg, plaintext->x, plaintext->len, 4327 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len, [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 424 * \param input_data The input plaintext. 455 /* Sanity checks on the padded plaintext */ 1419 /* Allocate input buffer and copy the iv and the plaintext */ 2561 * the original plaintext because of the non-optional random
|
/mbedtls-latest/tests/src/drivers/ |
D | test_driver_aead.c | 31 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument 49 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 58 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 69 (void) plaintext; in mbedtls_test_transparent_aead_encrypt() 88 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt() argument 106 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 115 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 127 (void) plaintext; in mbedtls_test_transparent_aead_decrypt() 380 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument 399 plaintext, in mbedtls_test_transparent_aead_verify() [all …]
|
/mbedtls-latest/library/ |
D | psa_crypto_aead.c | 123 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument 153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 181 plaintext, in mbedtls_psa_aead_encrypt() 192 (void) plaintext; in mbedtls_psa_aead_encrypt() 236 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_psa_aead_decrypt() argument 264 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() 277 ciphertext, plaintext)); in mbedtls_psa_aead_decrypt() 294 plaintext)); in mbedtls_psa_aead_decrypt() 302 (void) plaintext; in mbedtls_psa_aead_decrypt()
|
D | ccm.c | 688 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local 709 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test() 711 memcpy(plaintext, msg_test_data, msg_len_test_data[i]); in mbedtls_ccm_self_test() 716 plaintext, ciphertext, in mbedtls_ccm_self_test() 729 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test() 734 ciphertext, plaintext, in mbedtls_ccm_self_test() 739 memcmp(plaintext, msg_test_data, msg_len_test_data[i]) != 0) { in mbedtls_ccm_self_test()
|
D | psa_crypto_driver_wrappers.h | 1976 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument 1999 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2011 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2024 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 2043 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument 2066 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 2078 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 2091 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt() 2448 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument 2464 plaintext, in psa_driver_wrapper_aead_verify() [all …]
|
D | psa_crypto_aead.h | 73 const uint8_t *plaintext, size_t plaintext_length, 137 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
|
D | psa_crypto.c | 4797 LOCAL_INPUT_DECLARE(plaintext_external, plaintext); 4815 LOCAL_INPUT_ALLOC(plaintext_external, plaintext_length, plaintext); 4828 plaintext, plaintext_length, 4838 LOCAL_INPUT_FREE(plaintext_external, plaintext); 4864 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext); 4883 LOCAL_OUTPUT_ALLOC(plaintext_external, plaintext_size, plaintext); 4896 plaintext, plaintext_size, plaintext_length); 4899 memset(plaintext, 0, plaintext_size); 4906 LOCAL_OUTPUT_FREE(plaintext_external, plaintext); 5433 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext); [all …]
|
/mbedtls-latest/tests/src/ |
D | psa_exercise_key.c | 185 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local 210 plaintext, sizeof(plaintext), in exercise_cipher_key() 272 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local 291 plaintext, sizeof(plaintext), in exercise_aead_key() 310 plaintext, sizeof(plaintext), in exercise_aead_key() 444 unsigned char plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = in exercise_asymmetric_encryption_key() local 453 plaintext, plaintext_length, in exercise_asymmetric_encryption_key() 468 plaintext, sizeof(plaintext), in exercise_asymmetric_encryption_key()
|
/mbedtls-latest/tests/include/test/drivers/ |
D | aead.h | 53 const uint8_t *plaintext, size_t plaintext_length, 63 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length); 111 uint8_t *plaintext,
|
/mbedtls-latest/include/psa/ |
D | crypto.h | 2115 const uint8_t *plaintext, 2190 uint8_t *plaintext, 2792 uint8_t *plaintext,
|
/mbedtls-latest/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.h.jinja | 1683 const uint8_t *plaintext, size_t plaintext_length, 1703 plaintext, plaintext_length, 1717 plaintext, plaintext_length, 1736 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) 1756 plaintext, plaintext_size, plaintext_length ); 1770 plaintext, plaintext_size, plaintext_length ) ); 2070 uint8_t *plaintext, 2086 plaintext, 2113 plaintext, plaintext_size, 2122 (void)plaintext;
|
/mbedtls-latest/docs/architecture/ |
D | psa-shared-memory.md | 47 …eparately calculates the ciphertext and the MAC from the plaintext. A client sets the plaintext in… 72 …plaintext. To save memory, when it calls the crypto service, it passes an output buffer that is in… 74 …plaintext to the output buffer and calculating the tag. (This is how AEAD decryption usually works… 84 …10.1007/3-540-45708-9_2.pdf): if the client can choose the content of a plaintext block after seei… 196 …ispatch layer shall allocate an intermediate buffer for cipher and AEAD plaintext/ciphertext input…
|
/mbedtls-latest/docs/ |
D | 3.0-migration-guide.md | 793 infer upper bounds on the plaintext size of incoming and 833 set the maximum length of incoming and outgoing plaintext fragments, 838 the maximum incoming and outgoing plaintext fragment lengths, respectively.
|