Home
last modified time | relevance | path

Searched refs:block (Results 1 – 25 of 29) sorted by relevance

12

/mbedtls-latest/library/
Daesce.c159 block = vaeseq_u8(block, vld1q_u8(keys)); \
160 block = vaesmcq_u8(block); \
166 static uint8x16_t aesce_encrypt_block(uint8x16_t block, in aesce_encrypt_block() argument
189 block = vaeseq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block()
195 block = veorq_u8(block, vld1q_u8(keys)); in aesce_encrypt_block()
197 return block; in aesce_encrypt_block()
222 block = vaesdq_u8(block, vld1q_u8(keys)); \
223 block = vaesimcq_u8(block); \
229 static uint8x16_t aesce_decrypt_block(uint8x16_t block, in aesce_decrypt_block() argument
252 block = vaesdq_u8(block, vld1q_u8(keys)); in aesce_decrypt_block()
[all …]
/mbedtls-latest/tests/suites/
Dtest_suite_psa_crypto_init.data40 Fake entropy: less than the block size
47 Fake entropy: one block eventually
51 Fake entropy: one block in two steps
55 Fake entropy: more than one block in two steps
65 NV seed only: less than one block
Dtest_suite_cmac.data56 CMAC Single Blocks #1 AES-128 - Empty block, no updates
60 CMAC Single Blocks #2 AES-128 - Single 16 byte block
64 CMAC Single Blocks #3 AES-128 - Single 64 byte block
88 CMAC Multiple Operations, same key #2 AES-192 - Empty, 64 byte block
Dtest_suite_pem.data56 # The output sequence's length is not multiple of block size (16 bytes). This
74 # Padding data (0x11) is larger than AES block size (16).
77 PEM read (AES-128-CBC, padding data is larger than AES block length)
81 # Padding data (0x9) is larger than DES block size (8).
84 PEM read (DES-CBC, padding data is larger than DES block length)
Dtest_suite_ctr_drbg.data993 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 1 #0
997 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 1 #0
1001 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 2 #0
1005 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 2 #0
1009 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 3 #0
1013 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 3 #0
1017 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,0) block 4 #0
1021 CTR_DRBG CAVS 14.3 (AES-256 no df,no reseed,256,128,0,256) block 4 #0
1025 CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,0) block 1 #0
1029 CTR_DRBG CAVS 14.3 (AES-128 use df,no reseed,128,64,0,128) block 1 #0
[all …]
Dtest_suite_aes.ofb.data4 OFB-AES128.Encrypt - Single block
Dtest_suite_block_cipher.function28 /* That size is valid for a key or an input/output block. */
Dtest_suite_constant_time_hmac.function83 * by at least one block size.
Dtest_suite_memory_buffer_alloc.function134 /* Once blocks are reallocated, the block allocated to the memory request
Dtest_suite_aes.xts.data13 AES-128-XTS Encrypt Fail Sector Too Large (by 1 block)
Dtest_suite_cipher.function355 /* Update ECB with partial block */
638 * On the other hand, CBC and ECB ciphers need a full block of input.
Dtest_suite_psa_crypto_metadata.function666 /* Check that the block size is a power of 2. This is required, at least,
/mbedtls-latest/
DSECURITY.md42 and workarounds see the [Block Ciphers](#block-ciphers) section.
73 details and workarounds see the [Block Ciphers](#block-ciphers) section.
120 Currently there are four block ciphers in Mbed TLS: AES, CAMELLIA, ARIA and
135 - Use cryptographic mechanisms that are not based on block ciphers. In
137 block cipher modes. For random generation, use HMAC\_DRBG instead of CTR\_DRBG.
DChangeLog243 the decryption direction of block ciphers (AES, ARIA, Camellia).
254 accelerates the key type (that is, the block cipher primitive). See
514 maximum size of any supported block cipher) or the new name
516 maximum size of a block cipher supported by the CMAC module).
702 mode of operation due to the input not being multiple of block size.
1517 * Add functions to get the IV and block size from cipher_info structs.
1565 * Failures of alternative implementations of AES or DES single-block
1706 now takes extra output parameters for the last partial output block.
1806 They are: ARIA block cipher, CMAC mode, elliptic curve J-PAKE library and
2071 CMAC block cipher, and still pass the CMAC self test.
[all …]
/mbedtls-latest/tests/scripts/
Dtest_zeroize.gdb24 # intelligent compiler could determine that this function clears a block of
28 # the block of memory was correctly zeroed would force the compiler to not
/mbedtls-latest/docs/architecture/psa-migration/
Dmd-cipher-dispatch.md306 * Obtain some metadata about it (size, block size).
352 ### Dual-dispatch for block cipher primitives
354block cipher primitive only in the encrypt direction. Currently, GCM and CCM use the Cipher layer …
357 … there is no plan to extend it to other block ciphers at the moment), while GCM and CCM need to wo…
375 …d for 3 things: (1) to check if the cipher is supported, (2) to check its block size, (3) because …
382 …vings and cleaner code with a new internal module (see section "Internal "block cipher" abstractio…
537 In `mbedtls_md_get_size` and in modules that want a hash's block size, instead of looking up hash m…
569 ### Internal "block cipher" abstraction (previously known as "Cipher light")
601 A block cipher context contains either a legacy module's context (AES, ARIA, Camellia) or a PSA key…
/mbedtls-latest/docs/
Dpsa-driver-example-and-guide.md68 …er_wrappers.h`, placing the `#include` statements within an `#if defined` block which checks if th…
89 …* **Opaque Drivers** Calls to driver entry points go in a separate `case` block corresponding to t…
123 …TO_ACCELERATOR_DRIVER_PRESENT)` and a corresponding `#endif`. Within this block, each individual d…
156 …pers.h.jinja` for all four entry points have also been modified. The code block below shows the ad…
D3.0-migration-guide.md239 …had to pass inputs consisting of whole 16-byte blocks except for the last block (this limitation h…
240 …* As long as the input remains block-aligned, the output length is exactly the input length, as be…
241 …a multiple of 16, alternative implementations may return the last partial block in the call to `mb…
242 …put buffer for the last partial block. This is needed for alternative implementations that can onl…
251 …* Buffer the data for the last partial block, to be returned in the next call to `mbedtls_gcm_upda…
252 * `mbedtls_gcm_finish()` now takes an extra output buffer for the last partial block if needed.
Dpsa-transition.md267 …ere is no special API for a particular block cipher (`aes.h`, `aria.h`, `camellia.h`, `des.h`), a …
273 For modes that are based on a block cipher, the key type encodes the choice of block cipher:
457 …ues_8h/#c.PSA_ALG_CMAC) regardless of the underlying block cipher. The key type determines the blo…
560 2. Call `mbedtls_cipher_setup` to select the block cipher. Then call `mbedtls_md_cmac_starts` to se…
Ddriver-only-builds.md414 from PSA acceleration of the underlying block cipher by enabling support for
/mbedtls-latest/docs/architecture/
Dpsa-crypto-implementation-structure.md135 Some mechanisms require other mechanisms. For example, you can't do GCM without a block cipher, or …
170 * Potential edge cases (e.g. data less/equal/more than the block size, number equal to zero in asym…
Dtls13-support.md308 function to a longer name, or indenting a block more), avoid rewrapping
/mbedtls-latest/docs/proposed/
Dpsa-conditional-inclusion-c.md40 …bination of algorithms and key types, for example a block cipher mode (CBC, CTR, CFB, …) and a blo…
/mbedtls-latest/docs/architecture/testing/
Dpsa-storage-format-testing.md103 * HMAC keys longer than the block size: pre-hashed or not?
/mbedtls-latest/docs/architecture/psa-thread-safety/
Dpsa-thread-safety.md90 Much like all other API calls, `psa_destroy_key` does not block indefinitely, and when `psa_destroy…
306 `psa_destroy_key` does not block indefinitely, and when `psa_destroy_key` returns:

12