Home
last modified time | relevance | path

Searched refs:iv_len (Results 1 – 18 of 18) sorted by relevance

/openthread-3.6.0/third_party/mbedtls/repo/library/
Dccm.c149 const unsigned char *iv, size_t iv_len, in ccm_auth_crypt() argument
175 if( iv_len < 7 || iv_len > 13 ) in ccm_auth_crypt()
181 q = 16 - 1 - (unsigned char) iv_len; in ccm_auth_crypt()
200 memcpy( b + 1, iv, iv_len ); in ccm_auth_crypt()
257 memcpy( ctr + 1, iv, iv_len ); in ccm_auth_crypt()
258 memset( ctr + 1 + iv_len, 0, q ); in ccm_auth_crypt()
320 const unsigned char *iv, size_t iv_len, in mbedtls_ccm_star_encrypt_and_tag() argument
331 return( ccm_auth_crypt( ctx, CCM_ENCRYPT, length, iv, iv_len, in mbedtls_ccm_star_encrypt_and_tag()
336 const unsigned char *iv, size_t iv_len, in mbedtls_ccm_encrypt_and_tag() argument
350 return( mbedtls_ccm_star_encrypt_and_tag( ctx, length, iv, iv_len, add, in mbedtls_ccm_encrypt_and_tag()
[all …]
Dcipher.c353 size_t iv_len ) in mbedtls_cipher_set_iv() argument
358 CIPHER_VALIDATE_RET( iv_len == 0 || iv != NULL ); in mbedtls_cipher_set_iv()
372 if( iv_len > MBEDTLS_MAX_IV_LENGTH ) in mbedtls_cipher_set_iv()
376 actual_iv_size = iv_len; in mbedtls_cipher_set_iv()
382 if( actual_iv_size > iv_len ) in mbedtls_cipher_set_iv()
1189 const unsigned char *iv, size_t iv_len, in mbedtls_cipher_crypt() argument
1197 CIPHER_VALIDATE_RET( iv_len == 0 || iv != NULL ); in mbedtls_cipher_crypt()
1241 status = psa_cipher_set_iv( &cipher_op, iv, iv_len ); in mbedtls_cipher_crypt()
1263 if( ( ret = mbedtls_cipher_set_iv( ctx, iv, iv_len ) ) != 0 ) in mbedtls_cipher_crypt()
1288 const unsigned char *iv, size_t iv_len, in mbedtls_cipher_aead_encrypt() argument
[all …]
Dgcm.c251 size_t iv_len, in mbedtls_gcm_starts() argument
268 if( iv_len == 0 || in mbedtls_gcm_starts()
269 ( (uint64_t) iv_len ) >> 61 != 0 || in mbedtls_gcm_starts()
282 if( iv_len == 12 ) in mbedtls_gcm_starts()
284 memcpy( ctx->y, iv, iv_len ); in mbedtls_gcm_starts()
290 iv_bits = (uint64_t)iv_len * 8; in mbedtls_gcm_starts()
294 while( iv_len > 0 ) in mbedtls_gcm_starts()
296 use_len = ( iv_len < 16 ) ? iv_len : 16; in mbedtls_gcm_starts()
303 iv_len -= use_len; in mbedtls_gcm_starts()
445 size_t iv_len, in mbedtls_gcm_crypt_and_tag() argument
[all …]
Dssl_tls13_keys.c200 size_t slen, size_t key_len, size_t iv_len, in mbedtls_ssl_tls1_3_make_traffic_keys() argument
225 keys->client_write_iv, iv_len ); in mbedtls_ssl_tls1_3_make_traffic_keys()
233 keys->server_write_iv, iv_len ); in mbedtls_ssl_tls1_3_make_traffic_keys()
238 keys->iv_len = iv_len; in mbedtls_ssl_tls1_3_make_traffic_keys()
Dssl_tls13_keys.h149 size_t slen, size_t key_len, size_t iv_len,
Dpem.c55 size_t iv_len ) in pem_get_iv() argument
59 memset( iv, 0, iv_len ); in pem_get_iv()
61 for( i = 0; i < iv_len * 2; i++, s++ ) in pem_get_iv()
/openthread-3.6.0/third_party/mbedtls/repo/include/mbedtls/
Dccm.h162 const unsigned char *iv, size_t iv_len,
210 const unsigned char *iv, size_t iv_len,
247 const unsigned char *iv, size_t iv_len,
292 const unsigned char *iv, size_t iv_len,
Dgcm.h175 size_t iv_len,
219 size_t iv_len,
247 size_t iv_len,
Dcipher.h696 size_t iv_len );
863 const unsigned char *iv, size_t iv_len,
921 const unsigned char *iv, size_t iv_len,
980 const unsigned char *iv, size_t iv_len,
1036 const unsigned char *iv, size_t iv_len,
1092 const unsigned char *iv, size_t iv_len,
Dssl_internal.h419 size_t iv_len; /*!< The length of client_write_iv and member
/openthread-3.6.0/third_party/mbedtls/repo/tests/suites/
Dtest_suite_ccm.function38 void ccm_lengths( int msg_len, int iv_len, int add_len, int tag_len, int res )
61 TEST_ASSERT( mbedtls_ccm_encrypt_and_tag( &ctx, msg_len, iv, iv_len, add, add_len,
64 decrypt_ret = mbedtls_ccm_auth_decrypt( &ctx, msg_len, iv, iv_len, add, add_len,
79 void ccm_star_lengths( int msg_len, int iv_len, int add_len, int tag_len,
103 TEST_ASSERT( mbedtls_ccm_star_encrypt_and_tag( &ctx, msg_len, iv, iv_len,
106 decrypt_ret = mbedtls_ccm_star_auth_decrypt( &ctx, msg_len, iv, iv_len, add,
204 size_t iv_len, tag_len;
221 iv_len = sizeof( iv );
226 ret = mbedtls_ccm_star_encrypt_and_tag( &ctx, msg->len, iv, iv_len,
254 size_t iv_len, tag_len;
[all …]
Dtest_suite_pkcs5.data201 PBES2 Decrypt (bad enc_scheme_alg params: len != iv_len)
Dtest_suite_ssl.function3760 keys.iv_len,
3764 keys.iv_len,
/openthread-3.6.0/third_party/mbedtls/repo/tests/scripts/
Dgen_gcm_encrypt.pl64 my $iv_len = get_suite_val("IVlen");
79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
Dgen_gcm_decrypt.pl81 my $iv_len = get_suite_val("IVlen");
96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
/openthread-3.6.0/third_party/mbedtls/repo/programs/psa/
Dcrypto_examples.c110 size_t iv_len = 0; in cipher_encrypt() local
116 status = psa_cipher_generate_iv( &operation, iv, iv_size, &iv_len ); in cipher_encrypt()
/openthread-3.6.0/third_party/mbedtls/repo/docs/
Dgetting_started.md213 size_t iv_len;
248 status = psa_cipher_generate_iv(&operation, iv, sizeof(iv), &iv_len);
/openthread-3.6.0/third_party/mbedtls/repo/
DChangeLog2237 * Add a check if iv_len is zero in GCM, and return an error if it is zero.