/openthread-latest/third_party/mbedtls/repo/library/ |
D | ccm.c | 225 size_t iv_len) in mbedtls_ccm_starts() argument 228 if (iv_len < 7 || iv_len > 13) { in mbedtls_ccm_starts() 233 ctx->q = 16 - 1 - (unsigned char) iv_len; in mbedtls_ccm_starts() 247 memcpy(ctx->ctr + 1, iv, iv_len); in mbedtls_ccm_starts() 248 memset(ctx->ctr + 1 + iv_len, 0, ctx->q); in mbedtls_ccm_starts() 254 memcpy(ctx->y + 1, iv, iv_len); in mbedtls_ccm_starts() 513 const unsigned char *iv, size_t iv_len, in ccm_auth_crypt() argument 521 if ((ret = mbedtls_ccm_starts(ctx, mode, iv, iv_len)) != 0) { in ccm_auth_crypt() 549 const unsigned char *iv, size_t iv_len, in mbedtls_ccm_star_encrypt_and_tag() argument 554 return ccm_auth_crypt(ctx, MBEDTLS_CCM_STAR_ENCRYPT, length, iv, iv_len, in mbedtls_ccm_star_encrypt_and_tag() [all …]
|
D | ssl_tls13_keys.c | 225 unsigned char *iv, size_t iv_len) in ssl_tls13_make_traffic_key() argument 244 iv, iv_len); in ssl_tls13_make_traffic_key() 268 size_t key_len, size_t iv_len, in mbedtls_ssl_tls13_make_traffic_keys() argument 276 keys->client_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys() 284 keys->server_write_iv, iv_len); in mbedtls_ssl_tls13_make_traffic_keys() 290 keys->iv_len = iv_len; in mbedtls_ssl_tls13_make_traffic_keys() 1005 memcpy(transform->iv_enc, iv_enc, traffic_keys->iv_len); in mbedtls_ssl_tls13_populate_transform() 1006 memcpy(transform->iv_dec, iv_dec, traffic_keys->iv_len); in mbedtls_ssl_tls13_populate_transform() 1034 transform->ivlen = traffic_keys->iv_len; in mbedtls_ssl_tls13_populate_transform() 1095 size_t *key_len, size_t *iv_len) in ssl_tls13_get_cipher_key_info() argument [all …]
|
D | cipher.c | 414 size_t iv_len) in mbedtls_cipher_set_iv() argument 431 if (iv_len > MBEDTLS_MAX_IV_LENGTH) { in mbedtls_cipher_set_iv() 436 actual_iv_size = iv_len; in mbedtls_cipher_set_iv() 441 if (actual_iv_size > iv_len) { in mbedtls_cipher_set_iv() 451 if (iv_len != 12) { in mbedtls_cipher_set_iv() 463 iv_len != 12) { in mbedtls_cipher_set_iv() 473 iv, iv_len); in mbedtls_cipher_set_iv() 499 iv, iv_len); in mbedtls_cipher_set_iv() 1307 const unsigned char *iv, size_t iv_len, in mbedtls_cipher_crypt() argument 1349 status = psa_cipher_set_iv(&cipher_op, iv, iv_len); in mbedtls_cipher_crypt() [all …]
|
D | gcm.c | 379 const unsigned char *iv, size_t iv_len) in mbedtls_gcm_starts() argument 392 if (iv_len == 0 || (uint64_t) iv_len >> 61 != 0) { in mbedtls_gcm_starts() 403 if (iv_len == 12) { in mbedtls_gcm_starts() 404 memcpy(ctx->y, iv, iv_len); in mbedtls_gcm_starts() 408 iv_bits = (uint64_t) iv_len * 8; in mbedtls_gcm_starts() 412 while (iv_len > 0) { in mbedtls_gcm_starts() 413 use_len = (iv_len < 16) ? iv_len : 16; in mbedtls_gcm_starts() 428 iv_len -= use_len; in mbedtls_gcm_starts() 707 size_t iv_len, in mbedtls_gcm_crypt_and_tag() argument 718 if ((ret = mbedtls_gcm_starts(ctx, mode, iv, iv_len)) != 0) { in mbedtls_gcm_crypt_and_tag() [all …]
|
D | pkcs12.c | 162 size_t iv_len = 0; in mbedtls_pkcs12_pbe_ext() local 190 iv_len = mbedtls_cipher_info_get_iv_size(cipher_info); in mbedtls_pkcs12_pbe_ext() 193 iv, iv_len)) != 0) { in mbedtls_pkcs12_pbe_ext() 228 ret = mbedtls_cipher_crypt(&cipher_ctx, iv, iv_len, data, len, output, &finish_olen); in mbedtls_pkcs12_pbe_ext()
|
D | pem.c | 48 size_t iv_len) in pem_get_iv() argument 52 memset(iv, 0, iv_len); in pem_get_iv() 54 for (i = 0; i < iv_len * 2; i++, s++) { in pem_get_iv()
|
D | ssl_tls13_keys.h | 154 size_t key_len, size_t iv_len,
|
D | ssl_misc.h | 622 size_t iv_len; /*!< The length of client_write_iv and member
|
/openthread-latest/third_party/mbedtls/repo/include/mbedtls/ |
D | ccm.h | 174 const unsigned char *iv, size_t iv_len, 223 const unsigned char *iv, size_t iv_len, 260 const unsigned char *iv, size_t iv_len, 306 const unsigned char *iv, size_t iv_len, 342 size_t iv_len);
|
D | gcm.h | 170 size_t iv_len, 214 size_t iv_len, 238 size_t iv_len);
|
D | cipher.h | 874 size_t iv_len); 1057 const unsigned char *iv, size_t iv_len, 1107 const unsigned char *iv, size_t iv_len, 1163 const unsigned char *iv, size_t iv_len,
|
/openthread-latest/third_party/mbedtls/repo/tests/scripts/ |
D | gen_gcm_encrypt.pl | 52 my $iv_len = get_suite_val("IVlen"); 67 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
D | gen_gcm_decrypt.pl | 69 my $iv_len = get_suite_val("IVlen"); 84 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/openthread-latest/third_party/mbedtls/repo/tests/suites/ |
D | test_suite_cipher.function | 368 size_t length = length_val, outlen, total_len, i, block_size, iv_len; 425 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes. 429 iv_len = 12; 431 iv_len = sizeof(iv); 434 TEST_ASSERT(0 == mbedtls_cipher_set_iv(&ctx_dec, iv, iv_len)); 435 TEST_ASSERT(0 == mbedtls_cipher_set_iv(&ctx_enc, iv, iv_len)); 567 size_t iv_len = 16; 590 iv_len = 12; 593 TEST_CALLOC(iv, iv_len); 594 memset(iv, 0, iv_len); [all …]
|
D | test_suite_ccm.function | 101 void ccm_lengths(int msg_len, int iv_len, int add_len, int tag_len, int res) 125 TEST_ASSERT(mbedtls_ccm_encrypt_and_tag(&ctx, msg_len, iv, iv_len, add, add_len, 128 decrypt_ret = mbedtls_ccm_auth_decrypt(&ctx, msg_len, iv, iv_len, add, add_len, 145 void ccm_star_lengths(int msg_len, int iv_len, int add_len, int tag_len, 170 TEST_ASSERT(mbedtls_ccm_star_encrypt_and_tag(&ctx, msg_len, iv, iv_len, 173 decrypt_ret = mbedtls_ccm_star_auth_decrypt(&ctx, msg_len, iv, iv_len, add, 346 size_t iv_len, expected_tag_len; 379 iv_len = sizeof(iv); 386 TEST_EQUAL(mbedtls_ccm_star_encrypt_and_tag(&ctx, msg->len, iv, iv_len, 395 .len = iv_len }; [all …]
|
D | test_suite_gcm.function | 157 size_t key_bits, const uint8_t *iv, size_t iv_len, 165 TEST_EQUAL(starts_ret, mbedtls_gcm_starts(ctx, mode, iv, iv_len));
|
D | test_suite_pkcs5.data | 257 PBES2 Decrypt (bad enc_scheme_alg params: len != iv_len)
|
D | test_suite_ssl.function | 1600 keys.iv_len, 1604 keys.iv_len, 1873 keys.iv_len = server_write_iv->len;
|
/openthread-latest/third_party/mbedtls/repo/tests/src/test_helpers/ |
D | ssl_helpers.c | 1085 size_t iv_len, in mbedtls_test_psa_cipher_encrypt_helper() argument 1104 status = psa_cipher_set_iv(&cipher_op, iv, iv_len); in mbedtls_test_psa_cipher_encrypt_helper() 1127 iv, iv_len, input, ilen, output, olen); in mbedtls_test_psa_cipher_encrypt_helper() 1135 size_t *key_bits, size_t *iv_len) in mbedtls_test_ssl_cipher_info_from_type() argument 1141 *iv_len = 16; in mbedtls_test_ssl_cipher_info_from_type() 1146 *iv_len = 16; in mbedtls_test_ssl_cipher_info_from_type() 1151 *iv_len = 16; in mbedtls_test_ssl_cipher_info_from_type() 1156 *iv_len = 16; in mbedtls_test_ssl_cipher_info_from_type() 1161 *iv_len = 16; in mbedtls_test_ssl_cipher_info_from_type() 1166 *iv_len = 16; in mbedtls_test_ssl_cipher_info_from_type() [all …]
|
/openthread-latest/third_party/mbedtls/repo/programs/cipher/ |
D | cipher_aead_demo.c | 177 const unsigned char *iv, size_t iv_len, in aead_encrypt() argument 188 CHK(mbedtls_cipher_set_iv(ctx, iv, iv_len)); in aead_encrypt()
|
/openthread-latest/third_party/mbedtls/repo/programs/psa/ |
D | aead_demo.c | 192 const unsigned char *iv, size_t iv_len, in aead_encrypt() argument 206 PSA_CHECK(psa_aead_set_nonce(&op, iv, iv_len)); in aead_encrypt()
|
D | crypto_examples.c | 97 size_t iv_len = 0; in cipher_encrypt() local 103 status = psa_cipher_generate_iv(&operation, iv, iv_size, &iv_len); in cipher_encrypt()
|
/openthread-latest/third_party/mbedtls/repo/tests/include/test/ |
D | ssl_helpers.h | 507 size_t iv_len,
|
/openthread-latest/third_party/mbedtls/repo/ |
D | ChangeLog | 3832 * Add a check if iv_len is zero in GCM, and return an error if it is zero.
|