/openthread-3.4.0/third_party/mbedtls/repo/library/ |
D | ccm.c | 149 const unsigned char *iv, size_t iv_len, in ccm_auth_crypt() argument 175 if( iv_len < 7 || iv_len > 13 ) in ccm_auth_crypt() 181 q = 16 - 1 - (unsigned char) iv_len; in ccm_auth_crypt() 200 memcpy( b + 1, iv, iv_len ); in ccm_auth_crypt() 257 memcpy( ctr + 1, iv, iv_len ); in ccm_auth_crypt() 258 memset( ctr + 1 + iv_len, 0, q ); in ccm_auth_crypt() 320 const unsigned char *iv, size_t iv_len, in mbedtls_ccm_star_encrypt_and_tag() argument 331 return( ccm_auth_crypt( ctx, CCM_ENCRYPT, length, iv, iv_len, in mbedtls_ccm_star_encrypt_and_tag() 336 const unsigned char *iv, size_t iv_len, in mbedtls_ccm_encrypt_and_tag() argument 350 return( mbedtls_ccm_star_encrypt_and_tag( ctx, length, iv, iv_len, add, in mbedtls_ccm_encrypt_and_tag() [all …]
|
D | cipher.c | 353 size_t iv_len ) in mbedtls_cipher_set_iv() argument 358 CIPHER_VALIDATE_RET( iv_len == 0 || iv != NULL ); in mbedtls_cipher_set_iv() 372 if( iv_len > MBEDTLS_MAX_IV_LENGTH ) in mbedtls_cipher_set_iv() 376 actual_iv_size = iv_len; in mbedtls_cipher_set_iv() 382 if( actual_iv_size > iv_len ) in mbedtls_cipher_set_iv() 1189 const unsigned char *iv, size_t iv_len, in mbedtls_cipher_crypt() argument 1197 CIPHER_VALIDATE_RET( iv_len == 0 || iv != NULL ); in mbedtls_cipher_crypt() 1241 status = psa_cipher_set_iv( &cipher_op, iv, iv_len ); in mbedtls_cipher_crypt() 1263 if( ( ret = mbedtls_cipher_set_iv( ctx, iv, iv_len ) ) != 0 ) in mbedtls_cipher_crypt() 1288 const unsigned char *iv, size_t iv_len, in mbedtls_cipher_aead_encrypt() argument [all …]
|
D | gcm.c | 251 size_t iv_len, in mbedtls_gcm_starts() argument 268 if( iv_len == 0 || in mbedtls_gcm_starts() 269 ( (uint64_t) iv_len ) >> 61 != 0 || in mbedtls_gcm_starts() 282 if( iv_len == 12 ) in mbedtls_gcm_starts() 284 memcpy( ctx->y, iv, iv_len ); in mbedtls_gcm_starts() 290 iv_bits = (uint64_t)iv_len * 8; in mbedtls_gcm_starts() 294 while( iv_len > 0 ) in mbedtls_gcm_starts() 296 use_len = ( iv_len < 16 ) ? iv_len : 16; in mbedtls_gcm_starts() 303 iv_len -= use_len; in mbedtls_gcm_starts() 445 size_t iv_len, in mbedtls_gcm_crypt_and_tag() argument [all …]
|
D | ssl_tls13_keys.c | 200 size_t slen, size_t key_len, size_t iv_len, in mbedtls_ssl_tls1_3_make_traffic_keys() argument 225 keys->client_write_iv, iv_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 233 keys->server_write_iv, iv_len ); in mbedtls_ssl_tls1_3_make_traffic_keys() 238 keys->iv_len = iv_len; in mbedtls_ssl_tls1_3_make_traffic_keys()
|
D | ssl_tls13_keys.h | 149 size_t slen, size_t key_len, size_t iv_len,
|
D | pem.c | 55 size_t iv_len ) in pem_get_iv() argument 59 memset( iv, 0, iv_len ); in pem_get_iv() 61 for( i = 0; i < iv_len * 2; i++, s++ ) in pem_get_iv()
|
/openthread-3.4.0/third_party/mbedtls/repo/include/mbedtls/ |
D | ccm.h | 162 const unsigned char *iv, size_t iv_len, 210 const unsigned char *iv, size_t iv_len, 247 const unsigned char *iv, size_t iv_len, 292 const unsigned char *iv, size_t iv_len,
|
D | gcm.h | 175 size_t iv_len, 219 size_t iv_len, 247 size_t iv_len,
|
D | cipher.h | 696 size_t iv_len ); 863 const unsigned char *iv, size_t iv_len, 921 const unsigned char *iv, size_t iv_len, 980 const unsigned char *iv, size_t iv_len, 1036 const unsigned char *iv, size_t iv_len, 1092 const unsigned char *iv, size_t iv_len,
|
D | ssl_internal.h | 419 size_t iv_len; /*!< The length of client_write_iv and member
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_ccm.function | 38 void ccm_lengths( int msg_len, int iv_len, int add_len, int tag_len, int res ) 61 TEST_ASSERT( mbedtls_ccm_encrypt_and_tag( &ctx, msg_len, iv, iv_len, add, add_len, 64 decrypt_ret = mbedtls_ccm_auth_decrypt( &ctx, msg_len, iv, iv_len, add, add_len, 79 void ccm_star_lengths( int msg_len, int iv_len, int add_len, int tag_len, 103 TEST_ASSERT( mbedtls_ccm_star_encrypt_and_tag( &ctx, msg_len, iv, iv_len, 106 decrypt_ret = mbedtls_ccm_star_auth_decrypt( &ctx, msg_len, iv, iv_len, add, 204 size_t iv_len, tag_len; 221 iv_len = sizeof( iv ); 226 ret = mbedtls_ccm_star_encrypt_and_tag( &ctx, msg->len, iv, iv_len, 254 size_t iv_len, tag_len; [all …]
|
D | test_suite_pkcs5.data | 201 PBES2 Decrypt (bad enc_scheme_alg params: len != iv_len)
|
D | test_suite_ssl.function | 3760 keys.iv_len, 3764 keys.iv_len,
|
/openthread-3.4.0/third_party/mbedtls/repo/tests/scripts/ |
D | gen_gcm_encrypt.pl | 64 my $iv_len = get_suite_val("IVlen"); 79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
D | gen_gcm_decrypt.pl | 81 my $iv_len = get_suite_val("IVlen"); 96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/openthread-3.4.0/third_party/mbedtls/repo/programs/psa/ |
D | crypto_examples.c | 110 size_t iv_len = 0; in cipher_encrypt() local 116 status = psa_cipher_generate_iv( &operation, iv, iv_size, &iv_len ); in cipher_encrypt()
|
/openthread-3.4.0/third_party/mbedtls/repo/docs/ |
D | getting_started.md | 213 size_t iv_len; 248 status = psa_cipher_generate_iv(&operation, iv, sizeof(iv), &iv_len);
|
/openthread-3.4.0/third_party/mbedtls/repo/ |
D | ChangeLog | 2237 * Add a check if iv_len is zero in GCM, and return an error if it is zero.
|