Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 28) sorted by relevance

12

/openthread-latest/third_party/mbedtls/repo/tests/suites/
Dtest_suite_nist_kw.function22 unsigned char plaintext[32];
27 memset(plaintext, 0, sizeof(plaintext));
44 plaintext, sizeof(plaintext),
56 plaintext, &output_len,
57 sizeof(plaintext)) == 0);
59 TEST_ASSERT(output_len == sizeof(plaintext));
60 for (i = 0; i < sizeof(plaintext); i++) {
61 TEST_ASSERT(plaintext[i] == 0);
79 plaintext, sizeof(plaintext),
85 plaintext, sizeof(plaintext),
[all …]
Dtest_suite_ssl_decrypt.misc.data17 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad
21 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad
49 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad
53 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad
81 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad
85 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad
113 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad
117 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad
145 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad
149 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad
[all …]
Dtest_suite_ssl_decrypt.function64 /* Change any one byte of the plaintext or MAC. The MAC will be wrong. */
136 * - if it's -1, the plaintext length is 0 and minimal padding is applied
137 * - if it's -2, the plaintext length is 0 and maximal padding is applied
140 * byte that encodes the length. The minimal non-zero plaintext length
167 /* Determine padding/plaintext length */
254 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */
274 * in this case. (With larger buffers, ie when the plaintext is long or
Dtest_suite_gcm.aes128_en.data673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0
677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1
681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2
685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0
701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1
705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2
709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0
[all …]
Dtest_suite_psa_crypto_op_fail.function296 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = { 0 };
314 plaintext, 1,
323 plaintext, sizeof(plaintext),
Dtest_suite_nist_kw.data27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks)
30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets)
39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks)
42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets)
51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks.
72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
Dtest_suite_ccm.function618 /* Provide unexpected plaintext/ciphertext data */
731 /* Provide too much plaintext/ciphertext */
761 /* Provide incomplete plaintext/ciphertext and finish */
796 /* Provide full plaintext/ciphertext of first update
797 * Provide unexpected plaintext/ciphertext on second update */
829 /* Provide incomplete plaintext/ciphertext of first update
830 * Provide too much plaintext/ciphertext on second update */
866 /* Finish without passing any auth data or plaintext/ciphertext input */
Dtest_suite_aes.function15 unsigned char plaintext[16] = {
27 plaintext, ciphertext) == 0);
41 plaintext, output) == 0);
48 TEST_MEMORY_COMPARE(plaintext, 16, output, 16);
Dtest_suite_constant_time.data1 # these are the numbers we'd get with an empty plaintext and truncated HMAC
5 # we could get this with 255-bytes plaintext and untruncated SHA-256
9 # we could get this with 255-bytes plaintext and untruncated SHA-384
Dtest_suite_cipher.function838 /* check plaintext only if everything went fine */
857 * this results in the expected plaintext, and that
1072 /* check plaintext only if everything went fine */
1118 /* check plaintext only if everything went fine */
Dtest_suite_ssl.function1363 * in front of the plaintext, and expect the encryption
1367 * at the end of the plaintext, and expect the encryption
1371 * both at the front and end of the plaintext,
1837 data_t *plaintext,
1895 /* Copy plaintext into record structure */
1899 TEST_ASSERT(plaintext->len <= ciphertext->len);
1900 memcpy(rec.buf + rec.data_offset, plaintext->x, plaintext->len);
1901 rec.data_len = plaintext->len;
1919 plaintext->x, plaintext->len);
Dtest_suite_psa_crypto.function4244 data_t *plaintext, data_t *ciphertext)
4260 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len));
4261 TEST_LE_U(PSA_CIPHER_ENCRYPT_OUTPUT_SIZE(key_type, alg, plaintext->len),
4262 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE(plaintext->len));
4263 TEST_LE_U(plaintext->len,
4277 plaintext->len);
4303 plaintext->x, plaintext->len,
4331 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len,
4336 PSA_ASSERT(psa_cipher_encrypt(key, alg, plaintext->x, plaintext->len,
4347 TEST_MEMORY_COMPARE(plaintext->x, plaintext->len,
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function424 * \param input_data The input plaintext.
455 /* Sanity checks on the padded plaintext */
1403 /* Allocate input buffer and copy the iv and the plaintext */
2545 * the original plaintext because of the non-optional random
/openthread-latest/third_party/mbedtls/repo/tests/src/drivers/
Dtest_driver_aead.c31 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument
49 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
58 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
69 (void) plaintext; in mbedtls_test_transparent_aead_encrypt()
88 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt() argument
106 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
115 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
127 (void) plaintext; in mbedtls_test_transparent_aead_decrypt()
380 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument
399 plaintext, in mbedtls_test_transparent_aead_verify()
[all …]
/openthread-latest/third_party/mbedtls/repo/library/
Dpsa_crypto_aead.c123 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument
153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
181 plaintext, in mbedtls_psa_aead_encrypt()
192 (void) plaintext; in mbedtls_psa_aead_encrypt()
236 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_psa_aead_decrypt() argument
264 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
277 ciphertext, plaintext)); in mbedtls_psa_aead_decrypt()
294 plaintext)); in mbedtls_psa_aead_decrypt()
302 (void) plaintext; in mbedtls_psa_aead_decrypt()
Dccm.c688 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local
709 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test()
711 memcpy(plaintext, msg_test_data, msg_len_test_data[i]); in mbedtls_ccm_self_test()
716 plaintext, ciphertext, in mbedtls_ccm_self_test()
729 memset(plaintext, 0, CCM_SELFTEST_PT_MAX_LEN); in mbedtls_ccm_self_test()
734 ciphertext, plaintext, in mbedtls_ccm_self_test()
739 memcmp(plaintext, msg_test_data, msg_len_test_data[i]) != 0) { in mbedtls_ccm_self_test()
Dpsa_crypto_aead.h73 const uint8_t *plaintext, size_t plaintext_length,
137 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
Dpsa_crypto_driver_wrappers.h1719 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument
1739 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
1753 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
1772 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument
1792 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
1806 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt()
2106 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument
2122 plaintext, in psa_driver_wrapper_aead_verify()
2149 plaintext, plaintext_size, in psa_driver_wrapper_aead_verify()
2158 (void)plaintext; in psa_driver_wrapper_aead_verify()
Dpsa_crypto.c4745 LOCAL_INPUT_DECLARE(plaintext_external, plaintext); in psa_aead_encrypt()
4763 LOCAL_INPUT_ALLOC(plaintext_external, plaintext_length, plaintext); in psa_aead_encrypt()
4776 plaintext, plaintext_length, in psa_aead_encrypt()
4786 LOCAL_INPUT_FREE(plaintext_external, plaintext); in psa_aead_encrypt()
4812 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext); in psa_aead_decrypt()
4831 LOCAL_OUTPUT_ALLOC(plaintext_external, plaintext_size, plaintext); in psa_aead_decrypt()
4844 plaintext, plaintext_size, plaintext_length); in psa_aead_decrypt()
4847 memset(plaintext, 0, plaintext_size); in psa_aead_decrypt()
4854 LOCAL_OUTPUT_FREE(plaintext_external, plaintext); in psa_aead_decrypt()
5375 LOCAL_OUTPUT_DECLARE(plaintext_external, plaintext); in psa_aead_verify()
[all …]
/openthread-latest/third_party/mbedtls/repo/tests/include/test/drivers/
Daead.h53 const uint8_t *plaintext, size_t plaintext_length,
63 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length);
111 uint8_t *plaintext,
/openthread-latest/third_party/mbedtls/repo/tests/src/
Dpsa_exercise_key.c185 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local
210 plaintext, sizeof(plaintext), in exercise_cipher_key()
272 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local
291 plaintext, sizeof(plaintext), in exercise_aead_key()
310 plaintext, sizeof(plaintext), in exercise_aead_key()
444 unsigned char plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = in exercise_asymmetric_encryption_key() local
453 plaintext, plaintext_length, in exercise_asymmetric_encryption_key()
468 plaintext, sizeof(plaintext), in exercise_asymmetric_encryption_key()
/openthread-latest/third_party/mbedtls/repo/include/psa/
Dcrypto.h2112 const uint8_t *plaintext,
2187 uint8_t *plaintext,
2789 uint8_t *plaintext,
/openthread-latest/third_party/mbedtls/repo/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.h.jinja1682 const uint8_t *plaintext, size_t plaintext_length,
1702 plaintext, plaintext_length,
1716 plaintext, plaintext_length,
1735 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length )
1755 plaintext, plaintext_size, plaintext_length );
1769 plaintext, plaintext_size, plaintext_length ) );
2069 uint8_t *plaintext,
2085 plaintext,
2112 plaintext, plaintext_size,
2121 (void)plaintext;
/openthread-latest/third_party/mbedtls/repo/docs/architecture/
Dpsa-shared-memory.md47 …eparately calculates the ciphertext and the MAC from the plaintext. A client sets the plaintext in…
72plaintext. To save memory, when it calls the crypto service, it passes an output buffer that is in…
74plaintext to the output buffer and calculating the tag. (This is how AEAD decryption usually works…
84 …10.1007/3-540-45708-9_2.pdf): if the client can choose the content of a plaintext block after seei…
196 …ispatch layer shall allocate an intermediate buffer for cipher and AEAD plaintext/ciphertext input…
/openthread-latest/third_party/mbedtls/repo/docs/
D3.0-migration-guide.md793 infer upper bounds on the plaintext size of incoming and
833 set the maximum length of incoming and outgoing plaintext fragments,
838 the maximum incoming and outgoing plaintext fragment lengths, respectively.

12