/mbedtls-3.4.0/tests/suites/ |
D | test_suite_nist_kw.function | 22 unsigned char plaintext[32]; 27 memset( plaintext, 0, sizeof( plaintext ) ); 44 plaintext, sizeof( plaintext ), 56 plaintext, &output_len, 57 sizeof( plaintext ) ) == 0 ); 59 TEST_ASSERT( output_len == sizeof( plaintext ) ); 60 for( i = 0; i < sizeof( plaintext ); i++ ) 62 TEST_ASSERT( plaintext[i] == 0 ); 80 plaintext, sizeof( plaintext ), 86 plaintext, sizeof( plaintext ), [all …]
|
D | test_suite_constant_time.data | 1 # these are the numbers we'd get with an empty plaintext and truncated HMAC 5 # we could get this with 255-bytes plaintext and untruncated SHA-256 9 # we could get this with 255-bytes plaintext and untruncated SHA-384
|
D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0 [all …]
|
D | test_suite_psa_crypto_op_fail.function | 276 uint8_t plaintext[PSA_ASYMMETRIC_DECRYPT_OUTPUT_MAX_SIZE] = {0}; 295 plaintext, 1, 304 plaintext, sizeof( plaintext ),
|
D | test_suite_nist_kw.data | 27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks) 30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets) 39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks) 42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets) 51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks. 72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
|
D | test_suite_ccm.function | 590 /* Provide unexpected plaintext/ciphertext data */ 694 /* Provide too much plaintext/ciphertext */ 722 /* Provide incomplete plaintext/ciphertext and finish */ 755 /* Provide full plaintext/ciphertext of first update 756 * Provide unexpected plaintext/ciphertext on second update */ 786 /* Provide incomplete plaintext/ciphertext of first update 787 * Provide too much plaintext/ciphertext on second update */ 821 /* Finish without passing any auth data or plaintext/ciphertext input */
|
D | test_suite_ssl.data | 2580 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad 2584 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad 2612 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad 2616 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, maxpad 2644 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, minpad 2648 Decrypt CBC !EtM, AES SHA256 !trunc, empty plaintext, maxpad 2676 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, minpad 2680 Decrypt CBC !EtM, AES SHA384 !trunc, empty plaintext, maxpad 2708 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, minpad 2712 Decrypt CBC !EtM, ARIA MD5 !trunc, empty plaintext, maxpad [all …]
|
D | test_suite_cipher.function | 836 /* check plaintext only if everything went fine */ 856 * this results in the expected plaintext, and that 1070 /* check plaintext only if everything went fine */ 1116 /* check plaintext only if everything went fine */
|
D | test_suite_ssl.function | 3848 * in front of the plaintext, and expect the encryption 3852 * at the end of the plaintext, and expect the encryption 3856 * both at the front and end of the plaintext, 4023 * - if it's -1, the plaintext length is 0 and minimal padding is applied 4024 * - if it's -2, the plaintext length is 0 and maximal padding is applied 4027 * byte that encodes the length. The minimal non-zero plaintext length 4063 /* Determine padding/plaintext length */ 4183 /* Corrupt one byte of the data (could be plaintext, MAC or padding) */ 4203 * in this case. (With larger buffers, ie when the plaintext is long or 4555 data_t *plaintext, [all …]
|
D | test_suite_psa_crypto.function | 3940 data_t *plaintext, data_t *ciphertext ) 3956 PSA_CIPHER_ENCRYPT_OUTPUT_SIZE( key_type, alg, plaintext->len ) ); 3957 TEST_LE_U( PSA_CIPHER_ENCRYPT_OUTPUT_SIZE( key_type, alg, plaintext->len ), 3958 PSA_CIPHER_ENCRYPT_OUTPUT_MAX_SIZE( plaintext->len ) ); 3959 TEST_LE_U( plaintext->len, 3973 plaintext->len ); 3999 plaintext->x, plaintext->len, 4027 ASSERT_COMPARE( plaintext->x, plaintext->len, 4032 PSA_ASSERT( psa_cipher_encrypt( key, alg, plaintext->x, plaintext->len, 4043 ASSERT_COMPARE( plaintext->x, plaintext->len, [all …]
|
D | test_suite_psa_crypto_driver_wrappers.function | 10 * \param input_data The input plaintext. 41 /* Sanity checks on the padded plaintext */ 1012 /* Allocate input buffer and copy the iv and the plaintext */ 2178 * the original plaintext because of the non-optional random
|
/mbedtls-3.4.0/tests/src/drivers/ |
D | test_driver_aead.c | 41 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument 62 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 71 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 82 (void) plaintext; in mbedtls_test_transparent_aead_encrypt() 101 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_test_transparent_aead_decrypt() argument 122 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt() 131 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt() 143 (void) plaintext; in mbedtls_test_transparent_aead_decrypt() 415 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument 437 plaintext, in mbedtls_test_transparent_aead_verify() [all …]
|
/mbedtls-3.4.0/library/ |
D | psa_crypto_aead.c | 133 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument 164 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 178 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 197 plaintext, in mbedtls_psa_aead_encrypt() 209 (void) plaintext; in mbedtls_psa_aead_encrypt() 250 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_psa_aead_decrypt() argument 277 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() 292 ciphertext, plaintext ) ); in mbedtls_psa_aead_decrypt() 312 plaintext ) ); in mbedtls_psa_aead_decrypt() 321 (void) plaintext; in mbedtls_psa_aead_decrypt()
|
D | ccm.c | 664 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local 685 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test() 687 memcpy( plaintext, msg_test_data, msg_len_test_data[i] ); in mbedtls_ccm_self_test() 692 plaintext, ciphertext, in mbedtls_ccm_self_test() 705 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test() 710 ciphertext, plaintext, in mbedtls_ccm_self_test() 715 memcmp( plaintext, msg_test_data, msg_len_test_data[i] ) != 0 ) in mbedtls_ccm_self_test()
|
D | psa_crypto_aead.h | 85 const uint8_t *plaintext, size_t plaintext_length, 149 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
|
D | psa_crypto_driver_wrappers.c | 1853 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument 1876 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 1888 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 1901 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 1920 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument 1943 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 1955 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 1968 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt() 2330 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument 2346 plaintext, in psa_driver_wrapper_aead_verify() [all …]
|
D | psa_crypto_driver_wrappers.h | 217 const uint8_t *plaintext, size_t plaintext_length, 227 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ); 275 uint8_t *plaintext,
|
D | psa_crypto.c | 3608 const uint8_t *plaintext, in psa_aead_encrypt() argument 3641 plaintext, plaintext_length, in psa_aead_encrypt() 3661 uint8_t *plaintext, in psa_aead_decrypt() argument 3693 plaintext, plaintext_size, plaintext_length ); in psa_aead_decrypt() 3696 memset( plaintext, 0, plaintext_size ); in psa_aead_decrypt() 4179 uint8_t *plaintext, in psa_aead_verify() argument 4199 status = psa_driver_wrapper_aead_verify( operation, plaintext, in psa_aead_verify()
|
/mbedtls-3.4.0/tests/src/ |
D | psa_exercise_key.c | 171 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local 191 plaintext, sizeof( plaintext ), in exercise_cipher_key() 249 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local 269 plaintext, sizeof( plaintext ), in exercise_aead_key() 284 plaintext, sizeof( plaintext ), in exercise_aead_key() 395 unsigned char plaintext[256] = "Hello, world..."; in exercise_asymmetric_encryption_key() local 403 plaintext, plaintext_length, in exercise_asymmetric_encryption_key() 415 plaintext, sizeof( plaintext ), in exercise_asymmetric_encryption_key()
|
/mbedtls-3.4.0/tests/include/test/drivers/ |
D | aead.h | 65 const uint8_t *plaintext, size_t plaintext_length, 75 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ); 123 uint8_t *plaintext,
|
/mbedtls-3.4.0/include/psa/ |
D | crypto.h | 2117 const uint8_t *plaintext, 2192 uint8_t *plaintext, 2794 uint8_t *plaintext,
|
/mbedtls-3.4.0/scripts/data_files/driver_templates/ |
D | psa_crypto_driver_wrappers.c.jinja | 1545 const uint8_t *plaintext, size_t plaintext_length, 1565 plaintext, plaintext_length, 1579 plaintext, plaintext_length, 1598 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) 1618 plaintext, plaintext_size, plaintext_length ); 1632 plaintext, plaintext_size, plaintext_length ) ); 1932 uint8_t *plaintext, 1948 plaintext, 1975 plaintext, plaintext_size, 1984 (void)plaintext;
|
/mbedtls-3.4.0/docs/ |
D | getting_started.md | 211 uint8_t plaintext[block_size] = SOME_PLAINTEXT; 242 /* Encrypt the plaintext */ 253 status = psa_cipher_update(&operation, plaintext, sizeof(plaintext), 265 printf("Encrypted plaintext\n");
|
D | 3.0-migration-guide.md | 793 infer upper bounds on the plaintext size of incoming and 833 set the maximum length of incoming and outgoing plaintext fragments, 838 the maximum incoming and outgoing plaintext fragment lengths, respectively.
|
/mbedtls-3.4.0/ |
D | ChangeLog | 646 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations. 1467 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused 1565 plaintext after repeated timing measurements under some conditions. 2222 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing 2445 partially recover the plaintext of messages under some conditions by 2459 plaintext of messages under some conditions by using a cache attack 2469 to partially recover the plaintext of messages under some conditions (see 2651 * Return the plaintext data more quickly on unpadded CBC decryption, as
|