/net-tools-3.7.0/mbedtls-2.4.0/tests/ |
D | CMakeLists.txt | 55 add_test_suite(cipher cipher.aes) 56 add_test_suite(cipher cipher.arc4) 57 add_test_suite(cipher cipher.blowfish) 58 add_test_suite(cipher cipher.camellia) 59 add_test_suite(cipher cipher.ccm) 60 add_test_suite(cipher cipher.des) 61 add_test_suite(cipher cipher.gcm) 62 add_test_suite(cipher cipher.null) 63 add_test_suite(cipher cipher.padding)
|
/net-tools-3.7.0/tinydtls-0.8.2/ |
D | dtls.c | 461 static inline int is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(dtls_cipher_t cipher) in is_tls_ecdhe_ecdsa_with_aes_128_ccm_8() argument 464 return cipher == TLS_ECDHE_ECDSA_WITH_AES_128_CCM_8; in is_tls_ecdhe_ecdsa_with_aes_128_ccm_8() 471 static inline int is_tls_psk_with_aes_128_ccm_8(dtls_cipher_t cipher) in is_tls_psk_with_aes_128_ccm_8() argument 474 return cipher == TLS_PSK_WITH_AES_128_CCM_8; in is_tls_psk_with_aes_128_ccm_8() 615 switch (handshake->cipher) { in calculate_key_block() 693 security->cipher = handshake->cipher; in calculate_key_block() 789 if (is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(handshake->cipher)) { in dtls_check_tls_extension() 865 if (is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(handshake->cipher) && client_hello) { in dtls_check_tls_extension() 871 } else if (is_tls_ecdhe_ecdsa_with_aes_128_ccm_8(handshake->cipher) && !client_hello) { in dtls_check_tls_extension() 929 if (!security || security->cipher == TLS_NULL_WITH_NULL_NULL) in dtls_update_parameters() [all …]
|
D | crypto.h | 102 dtls_cipher_t cipher; /**< cipher type */ member 128 dtls_cipher_t cipher; /**< cipher type */ member
|
D | crypto.c | 168 security->cipher = TLS_NULL_WITH_NULL_NULL; in dtls_security_new()
|
/net-tools-3.7.0/mbedtls-2.4.0/tests/suites/ |
D | test_suite_cipher.function | 2 #include "mbedtls/cipher.h" 463 unsigned char cipher[200]; 479 memset( cipher, 0x00, sizeof( cipher ) ); 487 cipher_len = unhexify( cipher, hex_cipher ); 515 TEST_ASSERT( 0 == mbedtls_cipher_update( &ctx, cipher, cipher_len, output, &outlen ) ); 544 unsigned char cipher[200]; 558 memset( cipher, 0x00, sizeof( cipher ) ); 567 cipher_len = unhexify( cipher, hex_cipher ); 578 cipher, cipher_len, output, &outlen, 609 TEST_ASSERT( memcmp( output, cipher, clear_len ) == 0 );
|
D | test_suite_pk.function | 330 unsigned char cipher[1000]; 342 memset( cipher, 0, sizeof( cipher ) ); 345 cipher_len = unhexify( cipher, cipher_hex ); 371 TEST_ASSERT( mbedtls_pk_decrypt( &pk, cipher, cipher_len,
|
D | test_suite_cmac.data | 31 CMAC init #7 Camellia: wrong cipher
|
D | test_suite_cmac.function | 2 #include "mbedtls/cipher.h" 29 /* Test NULL cipher info */
|
/net-tools-3.7.0/mbedtls-2.4.0/library/ |
D | gcm.c | 162 mbedtls_cipher_id_t cipher, in mbedtls_gcm_setkey() argument 169 cipher_info = mbedtls_cipher_info_from_values( cipher, keybits, MBEDTLS_MODE_ECB ); in mbedtls_gcm_setkey() 743 mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES; in mbedtls_gcm_self_test() local 757 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test() 784 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test() 811 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test() 878 mbedtls_gcm_setkey( &ctx, cipher, key[key_index[i]], key_len ); in mbedtls_gcm_self_test()
|
D | ccm.c | 69 mbedtls_cipher_id_t cipher, in mbedtls_ccm_setkey() argument 76 cipher_info = mbedtls_cipher_info_from_values( cipher, keybits, MBEDTLS_MODE_ECB ); in mbedtls_ccm_setkey()
|
D | ssl_ticket.c | 124 mbedtls_cipher_type_t cipher, in mbedtls_ssl_ticket_setup() argument 135 cipher_info = mbedtls_cipher_info_from_type( cipher); in mbedtls_ssl_ticket_setup()
|
D | Makefile | 50 ccm.o cipher.o cipher_wrap.o \
|
D | CMakeLists.txt | 16 cipher.c
|
D | ssl_srv.c | 737 suite_info->cipher == MBEDTLS_CIPHER_ARC4_128 ) in ssl_ciphersuite_match() 1887 const mbedtls_cipher_info_t *cipher = NULL; local 1904 ( cipher = mbedtls_cipher_info_from_type( suite->cipher ) ) == NULL || 1905 cipher->mode != MBEDTLS_MODE_CBC )
|
D | cipher.c | 123 if( def->info->base->cipher == cipher_id && in mbedtls_cipher_info_from_values()
|
D | ssl_cli.c | 874 ciphersuite_info->cipher == MBEDTLS_CIPHER_ARC4_128 ) 1632 suite_info->cipher == MBEDTLS_CIPHER_ARC4_128 )
|
D | ssl_ciphersuites.c | 1725 cs_info->cipher != MBEDTLS_CIPHER_ARC4_128 ) in mbedtls_ssl_list_ciphersuites()
|
/net-tools-3.7.0/mbedtls-2.4.0/include/mbedtls/ |
D | ssl_ticket.h | 107 mbedtls_cipher_type_t cipher,
|
D | ccm.h | 63 mbedtls_cipher_id_t cipher,
|
D | cipher_internal.h | 46 mbedtls_cipher_id_t cipher; member
|
D | gcm.h | 76 mbedtls_cipher_id_t cipher,
|
D | ssl_ciphersuites.h | 293 mbedtls_cipher_type_t cipher; member
|
/net-tools-3.7.0/mbedtls-2.4.0/ |
D | ChangeLog | 734 * Add CCM module and cipher mode to Cipher Layer 738 * Blowfish in the cipher layer now supports variable length keys. 1007 * Padding checks in cipher layer are now constant-time 1013 * More stringent checks in cipher layer 1064 (ISO/IEC 7816-4) padding and zero padding in the cipher layer 1302 symmetric cipher and hash algorithms (e.g. POLARSSL_AES_ALT in 1318 * Fixed values for 2-key Triple DES in cipher layer 1419 * Added support for NULL cipher (POLARSSL_CIPHER_NULL_CIPHER) and weak 1439 * Added blowfish algorithm (Generic and cipher layer) 1505 * Fixed values for 2-key Triple DES in cipher layer [all …]
|
/net-tools-3.7.0/mbedtls-2.4.0/yotta/data/ |
D | README.md | 41 …p`, if you want to enable the EC J-PAKE key exchange and disable the CBC cipher mode, you can crea…
|
/net-tools-3.7.0/mbedtls-2.4.0/programs/ssl/ |
D | ssl_client2.c | 845 if( ciphersuite_info->cipher == MBEDTLS_CIPHER_ARC4_128 ) in main()
|