Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 26) sorted by relevance

12

/mbedtls-3.4.0/tests/suites/
Dtest_suite_nist_kw.function22 unsigned char plaintext[32];
27 memset( plaintext, 0, sizeof( plaintext ) );
44 plaintext, sizeof( plaintext ),
56 plaintext, &output_len,
57 sizeof( plaintext ) ) == 0 );
59 TEST_ASSERT( output_len == sizeof( plaintext ) );
60 for( i = 0; i < sizeof( plaintext ); i++ )
62 TEST_ASSERT( plaintext[i] == 0 );
80 plaintext, sizeof( plaintext ),
86 plaintext, sizeof( plaintext ),
[all …]
Dtest_suite_constant_time.data1 # these are the numbers we'd get with an empty plaintext and truncated HMAC
5 # we could get this with 255-bytes plaintext and untruncated SHA-256
9 # we could get this with 255-bytes plaintext and untruncated SHA-384
Dtest_suite_gcm.aes128_en.data673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0
677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1
681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2
685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0
701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1
705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2
709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0
[all …]
Dtest_suite_psa_crypto_op_fail.function276 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = {0};
295 plaintext, 1,
304 plaintext, sizeof( plaintext ),
Dtest_suite_nist_kw.data27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks)
30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets)
39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks)
42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets)
51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks.
72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
Dtest_suite_ccm.function590 /* Provide unexpected plaintext/ciphertext data */
694 /* Provide too much plaintext/ciphertext */
722 /* Provide incomplete plaintext/ciphertext and finish */
755 /* Provide full plaintext/ciphertext of first update
756 * Provide unexpected plaintext/ciphertext on second update */
786 /* Provide incomplete plaintext/ciphertext of first update
787 * Provide too much plaintext/ciphertext on second update */
821 /* Finish without passing any auth data or plaintext/ciphertext input */
Dtest_suite_ssl.data2580 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad
2584 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad
2612 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad
2616 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad
2644 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad
2648 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad
2676 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad
2680 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad
2708 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad
2712 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad
[all …]
Dtest_suite_cipher.function836 /* check plaintext only if everything went fine */
856 * this results in the expected plaintext, and that
1070 /* check plaintext only if everything went fine */
1116 /* check plaintext only if everything went fine */
Dtest_suite_ssl.function3848 * in front of the plaintext, and expect the encryption
3852 * at the end of the plaintext, and expect the encryption
3856 * both at the front and end of the plaintext,
4023 * - if it's -1, the plaintext length is 0 and minimal padding is applied
4024 * - if it's -2, the plaintext length is 0 and maximal padding is applied
4027 * byte that encodes the length. The minimal non-zero plaintext length
4063 /* Determine padding/plaintext length */
4183 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */
4203 * in this case. (With larger buffers, ie when the plaintext is long or
4555 data_t *plaintext,
[all …]
Dtest_suite_psa_crypto.function3940 data_t *plaintext, data_t *ciphertext )
3956 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE( key_type, alg, plaintext->len ) );
3957 TEST_LE_U( PSA_CIPHER_ENCRYPT_OUTPUT_SIZE( key_type, alg, plaintext->len ),
3958 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE( plaintext->len ) );
3959 TEST_LE_U( plaintext->len,
3973 plaintext->len );
3999 plaintext->x, plaintext->len,
4027 ASSERT_COMPARE( plaintext->x, plaintext->len,
4032 PSA_ASSERT( psa_cipher_encrypt( key, alg, plaintext->x, plaintext->len,
4043 ASSERT_COMPARE( plaintext->x, plaintext->len,
[all …]
Dtest_suite_psa_crypto_driver_wrappers.function10 * \param input_data The input plaintext.
41 /* Sanity checks on the padded plaintext */
1012 /* Allocate input buffer and copy the iv and the plaintext */
2178 * the original plaintext because of the non-optional random
/mbedtls-3.4.0/tests/src/drivers/
Dtest_driver_aead.c41 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument
62 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
71 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
82 (void) plaintext; in mbedtls_test_transparent_aead_encrypt()
101 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_test_transparent_aead_decrypt() argument
122 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt()
131 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt()
143 (void) plaintext; in mbedtls_test_transparent_aead_decrypt()
415 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument
437 plaintext, in mbedtls_test_transparent_aead_verify()
[all …]
/mbedtls-3.4.0/library/
Dpsa_crypto_aead.c133 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument
164 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
178 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
197 plaintext, in mbedtls_psa_aead_encrypt()
209 (void) plaintext; in mbedtls_psa_aead_encrypt()
250 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_psa_aead_decrypt() argument
277 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
292 ciphertext, plaintext ) ); in mbedtls_psa_aead_decrypt()
312 plaintext ) ); in mbedtls_psa_aead_decrypt()
321 (void) plaintext; in mbedtls_psa_aead_decrypt()
Dccm.c664 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local
685 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test()
687 memcpy( plaintext, msg_test_data, msg_len_test_data[i] ); in mbedtls_ccm_self_test()
692 plaintext, ciphertext, in mbedtls_ccm_self_test()
705 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test()
710 ciphertext, plaintext, in mbedtls_ccm_self_test()
715 memcmp( plaintext, msg_test_data, msg_len_test_data[i] ) != 0 ) in mbedtls_ccm_self_test()
Dpsa_crypto_aead.h85 const uint8_t *plaintext, size_t plaintext_length,
149 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
Dpsa_crypto_driver_wrappers.c1853 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument
1876 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
1888 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
1901 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
1920 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument
1943 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
1955 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
1968 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt()
2330 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument
2346 plaintext, in psa_driver_wrapper_aead_verify()
[all …]
Dpsa_crypto_driver_wrappers.h217 const uint8_t *plaintext, size_t plaintext_length,
227 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
275 uint8_t *plaintext,
Dpsa_crypto.c3608 const uint8_t *plaintext, in psa_aead_encrypt() argument
3641 plaintext, plaintext_length, in psa_aead_encrypt()
3661 uint8_t *plaintext, in psa_aead_decrypt() argument
3693 plaintext, plaintext_size, plaintext_length ); in psa_aead_decrypt()
3696 memset( plaintext, 0, plaintext_size ); in psa_aead_decrypt()
4179 uint8_t *plaintext, in psa_aead_verify() argument
4199 status = psa_driver_wrapper_aead_verify( operation, plaintext, in psa_aead_verify()
/mbedtls-3.4.0/tests/src/
Dpsa_exercise_key.c171 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local
191 plaintext, sizeof( plaintext ), in exercise_cipher_key()
249 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local
269 plaintext, sizeof( plaintext ), in exercise_aead_key()
284 plaintext, sizeof( plaintext ), in exercise_aead_key()
395 unsigned char plaintext[256] = "Hello, world..."; in exercise_asymmetric_encryption_key() local
403 plaintext, plaintext_length, in exercise_asymmetric_encryption_key()
415 plaintext, sizeof( plaintext ), in exercise_asymmetric_encryption_key()
/mbedtls-3.4.0/tests/include/test/drivers/
Daead.h65 const uint8_t *plaintext, size_t plaintext_length,
75 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
123 uint8_t *plaintext,
/mbedtls-3.4.0/include/psa/
Dcrypto.h2117 const uint8_t *plaintext,
2192 uint8_t *plaintext,
2794 uint8_t *plaintext,
/mbedtls-3.4.0/scripts/data_files/driver_templates/
Dpsa_crypto_driver_wrappers.c.jinja1545 const uint8_t *plaintext, size_t plaintext_length,
1565 plaintext, plaintext_length,
1579 plaintext, plaintext_length,
1598 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length )
1618 plaintext, plaintext_size, plaintext_length );
1632 plaintext, plaintext_size, plaintext_length ) );
1932 uint8_t *plaintext,
1948 plaintext,
1975 plaintext, plaintext_size,
1984 (void)plaintext;
/mbedtls-3.4.0/docs/
Dgetting_started.md211 uint8_t plaintext[block_size] = SOME_PLAINTEXT;
242 /* Encrypt the plaintext */
253 status = psa_cipher_update(&operation, plaintext, sizeof(plaintext),
265 printf("Encrypted plaintext\n");
D3.0-migration-guide.md793 infer upper bounds on the plaintext size of incoming and
833 set the maximum length of incoming and outgoing plaintext fragments,
838 the maximum incoming and outgoing plaintext fragment lengths, respectively.
/mbedtls-3.4.0/
DChangeLog646 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
1467 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused
1565 plaintext after repeated timing measurements under some conditions.
2222 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
2445 partially recover the plaintext of messages under some conditions by
2459 plaintext of messages under some conditions by using a cache attack
2469 to partially recover the plaintext of messages under some conditions (see
2651 * Return the plaintext data more quickly on unpadded CBC decryption, as

12