Home
last modified time | relevance | path

Searched refs:ciphers (Results 1 – 13 of 13) sorted by relevance

/openthread-latest/third_party/mbedtls/repo/tests/
Dcompat.sh288 ciphers=$(scripts/translate_ciphers.py "$@")
667 case $($OPENSSL ciphers ALL) in
1139 for i in $ciphers; do
1149 for i in $ciphers; do
1168 for i in $ciphers; do
1177 for i in $ciphers; do
1197 for i in $ciphers; do
/openthread-latest/third_party/mbedtls/repo/
DSECURITY.md40 **Warning!** Block ciphers do not yet achieve full protection against attackers
42 and workarounds see the [Block Ciphers](#block-ciphers) section.
72 **Warning!** Block ciphers do not yet achieve full protection. For
73 details and workarounds see the [Block Ciphers](#block-ciphers) section.
118 #### Block ciphers
120 Currently there are four block ciphers in Mbed TLS: AES, CAMELLIA, ARIA and
135 - Use cryptographic mechanisms that are not based on block ciphers. In
DChangeLog49 the decryption direction of block ciphers (AES, ARIA, Camellia).
69 unauthenticated (non-AEAD) ciphers are disabled, or if they're all
441 only used in relation with CMAC which does not support these ciphers.
2055 mbedtls_cipher_auth_decrypt_ext(). Please note that with AEAD ciphers,
2061 ciphers, asymmetric signing/verification and key generation, validate_key
2154 MBEDTLS_MODE_ECB to 0, since ECB mode ciphers don't use IVs.
2808 * Fix bugs in the AEAD test suite which would be exposed by ciphers which
4697 * Use deterministic nonces for AEAD ciphers in TLS by default (possible to
5637 * Changed the defined key-length of DES ciphers in cipher.h to include the
5686 * Added additional Cipher Block Modes to symmetric ciphers
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/scripts/
Dtranslate_ciphers.py30 ciphers = [
65 for s, g_exp, o_exp, m_exp in ciphers:
Dgenerate_tls13_compat_tests.py343 ciphers = ','.join(
345 ret += ["force_ciphersuite={ciphers}".format(ciphers=ciphers)]
/openthread-latest/third_party/mbedtls/repo/docs/
Ddriver-only-builds.md66 - Unauthenticated ciphers:
307 It is possible to have all ciphers and AEAD operations provided only by a
318 - Unauthenticated ciphers modes:
366 of some ciphers are removed:
377 ciphers that are built-in - that is, both the underlying cipher
381 ciphers that are built-in.
382 - PEM decryption will only work with ciphers that are built-in.
383 - PK parse will only be able to parse encrypted keys using built-in ciphers.
440 - In PSA, all unauthenticated (that is, non-AEAD) ciphers are either disabled or
453 Note: AEAD ciphers (CCM, GCM, ChachaPoly) do not have a dependency on
[all …]
Duse-psa-crypto.md127 This function only worked for a small number of ciphers. It is now deprecated
Dpsa-transition.md342 * The legacy API uses the same interface for authenticated and non-authenticated ciphers, while the…
530 * The legacy API uses the same interface for authenticated and non-authenticated ciphers, while the…
/openthread-latest/third_party/mbedtls/repo/docs/architecture/psa-migration/
Dtesting.md24 path. (For example, for record protection, previously (until 3.1), some ciphers were supported
28 ciphers that are supposed to be supported.)
Dmd-cipher-dispatch.md1 PSA migration strategy for hashes and ciphers
129 Symmetric ciphers and AEADs (before work on driver-only cipher):
195 * For ciphers, the keystore is not initialized yet, and Mbed TLS uses a custom implementation of PS…
267 …hout initialization](https://github.com/Mbed-TLS/mbedtls/pull/6470). For ciphers, this is more com…
328 We do not need to support driver-only hashes and ciphers in PK. X.509 and TLS without `MBEDTLS_USE_…
330 Note that this applies to TLS 1.3 as well, as some uses of hashes and all uses of ciphers there are…
357 …is no plan to extend it to other block ciphers at the moment), while GCM and CCM need to work with…
593 The only supported ciphers are AES, ARIA and Camellia. They are identified by
Dstrategy.md119 - Cipher for symmetric ciphers (included AEAD)
207 ciphers.)
284 ciphers. For example,`ctr_drbg.c` calls the legacy API `mbedtls_aes`.
295 - for hashes and ciphers, see `md-cipher-dispatch.md` in the same directory;
396 type for unauthenticated and AEAD ciphers, which again the PSA API
/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_cipher.function94 * guaranteed to work with new ciphers or with alternative implementations of
95 * individual ciphers, and it doesn't work with the PSA wrappers. So don't do
631 /* Non-CBC and non-ECB ciphers are OK with decrypting empty buffers and
634 * On the other hand, CBC and ECB ciphers need a full block of input.
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-shared-memory.md568 …they may have local optimizations that reduce memory usage. For example, ciphers may be able to us…