Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 27) sorted by relevance

12

/net-tools-3.7.0/mbedtls-2.4.0/tests/
DCMakeLists.txt55 add_test_suite(cipher cipher.aes)
56 add_test_suite(cipher cipher.arc4)
57 add_test_suite(cipher cipher.blowfish)
58 add_test_suite(cipher cipher.camellia)
59 add_test_suite(cipher cipher.ccm)
60 add_test_suite(cipher cipher.des)
61 add_test_suite(cipher cipher.gcm)
62 add_test_suite(cipher cipher.null)
63 add_test_suite(cipher cipher.padding)
/net-tools-3.7.0/tinydtls-0.8.2/
Ddtls.c461 static inline int is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(dtls_cipher_t cipher) in is_tls_ecdhe_ecdsa_with_aes_128_ccm_8() argument
464 return cipher == TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8; in is_tls_ecdhe_ecdsa_with_aes_128_ccm_8()
471 static inline int is_tls_psk_with_aes_128_ccm_8(dtls_cipher_t cipher) in is_tls_psk_with_aes_128_ccm_8() argument
474 return cipher == TLS_PSK_WITH_AES_128_CCM_8; in is_tls_psk_with_aes_128_ccm_8()
615 switch (handshake->cipher) { in calculate_key_block()
693 security->cipher = handshake->cipher; in calculate_key_block()
789 if (is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(handshake->cipher)) { in dtls_check_tls_extension()
865 if (is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(handshake->cipher) && client_hello) { in dtls_check_tls_extension()
871 } else if (is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(handshake->cipher) && !client_hello) { in dtls_check_tls_extension()
929 if (!security || security->cipher == TLS_NULL_WITH_NULL_NULL) in dtls_update_parameters()
[all …]
Dcrypto.h102 dtls_cipher_t cipher; /**< cipher type */ member
128 dtls_cipher_t cipher; /**< cipher type */ member
Dcrypto.c168 security->cipher = TLS_NULL_WITH_NULL_NULL; in dtls_security_new()
/net-tools-3.7.0/mbedtls-2.4.0/tests/suites/
Dtest_suite_cipher.function2 #include "mbedtls/cipher.h"
463 unsigned char cipher[200];
479 memset( cipher, 0x00, sizeof( cipher ) );
487 cipher_len = unhexify( cipher, hex_cipher );
515 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher, cipher_len, output, &outlen ) );
544 unsigned char cipher[200];
558 memset( cipher, 0x00, sizeof( cipher ) );
567 cipher_len = unhexify( cipher, hex_cipher );
578 cipher, cipher_len, output, &outlen,
609 TEST_ASSERT( memcmp( output, cipher, clear_len ) == 0 );
Dtest_suite_pk.function330 unsigned char cipher[1000];
342 memset( cipher, 0, sizeof( cipher ) );
345 cipher_len = unhexify( cipher, cipher_hex );
371 TEST_ASSERT( mbedtls_pk_decrypt( &pk, cipher, cipher_len,
Dtest_suite_cmac.data31 CMAC init #7 Camellia: wrong cipher
Dtest_suite_cmac.function2 #include "mbedtls/cipher.h"
29 /* Test NULL cipher info */
/net-tools-3.7.0/mbedtls-2.4.0/library/
Dgcm.c162 mbedtls_cipher_id_t cipher, in mbedtls_gcm_setkey() argument
169 cipher_info = mbedtls_cipher_info_from_values( cipher, keybits, MBEDTLS_MODE_ECB ); in mbedtls_gcm_setkey()
743 mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES; in mbedtls_gcm_self_test() local
757 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test()
784 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test()
811 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test()
878 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test()
Dccm.c69 mbedtls_cipher_id_t cipher, in mbedtls_ccm_setkey() argument
76 cipher_info = mbedtls_cipher_info_from_values( cipher, keybits, MBEDTLS_MODE_ECB ); in mbedtls_ccm_setkey()
Dssl_ticket.c124 mbedtls_cipher_type_t cipher, in mbedtls_ssl_ticket_setup() argument
135 cipher_info = mbedtls_cipher_info_from_type( cipher); in mbedtls_ssl_ticket_setup()
DMakefile50 ccm.o cipher.o cipher_wrap.o \
DCMakeLists.txt16 cipher.c
Dssl_srv.c737 suite_info->cipher == MBEDTLS_CIPHER_ARC4_128 ) in ssl_ciphersuite_match()
1887 const mbedtls_cipher_info_t *cipher = NULL; local
1904 ( cipher = mbedtls_cipher_info_from_type( suite->cipher ) ) == NULL ||
1905 cipher->mode != MBEDTLS_MODE_CBC )
Dcipher.c123 if( def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values()
Dssl_cli.c874 ciphersuite_info->cipher == MBEDTLS_CIPHER_ARC4_128 )
1632 suite_info->cipher == MBEDTLS_CIPHER_ARC4_128 )
Dssl_ciphersuites.c1725 cs_info->cipher != MBEDTLS_CIPHER_ARC4_128 ) in mbedtls_ssl_list_ciphersuites()
/net-tools-3.7.0/mbedtls-2.4.0/include/mbedtls/
Dssl_ticket.h107 mbedtls_cipher_type_t cipher,
Dccm.h63 mbedtls_cipher_id_t cipher,
Dcipher_internal.h46 mbedtls_cipher_id_t cipher; member
Dgcm.h76 mbedtls_cipher_id_t cipher,
Dssl_ciphersuites.h293 mbedtls_cipher_type_t cipher; member
/net-tools-3.7.0/mbedtls-2.4.0/
DChangeLog734 * Add CCM module and cipher mode to Cipher Layer
738 * Blowfish in the cipher layer now supports variable length keys.
1007 * Padding checks in cipher layer are now constant-time
1013 * More stringent checks in cipher layer
1064 (ISO/IEC 7816-4) padding and zero padding in the cipher layer
1302 symmetric cipher and hash algorithms (e.g. POLARSSL_AES_ALT in
1318 * Fixed values for 2-key Triple DES in cipher layer
1419 * Added support for NULL cipher (POLARSSL_CIPHER_NULL_CIPHER) and weak
1439 * Added blowfish algorithm (Generic and cipher layer)
1505 * Fixed values for 2-key Triple DES in cipher layer
[all …]
/net-tools-3.7.0/mbedtls-2.4.0/yotta/data/
DREADME.md41 …p`, if you want to enable the EC J-PAKE key exchange and disable the CBC cipher mode, you can crea…
/net-tools-3.7.0/mbedtls-2.4.0/programs/ssl/
Dssl_client2.c845 if( ciphersuite_info->cipher == MBEDTLS_CIPHER_ARC4_128 ) in main()

12