/mbedtls-development/programs/aes/ |
A D | crypt_and_hash.c | 90 unsigned char IV[16]; in main() local 285 memcpy( IV, digest, 16 ); in main() 290 if( fwrite( IV, 1, 16, fout ) != 16 ) in main() 301 memcpy( digest, IV, 16 ); in main() 320 if( mbedtls_cipher_set_iv( &cipher_ctx, IV, 16 ) != 0 ) in main() 436 memcpy( IV, buffer, 16 ); in main() 443 memcpy( digest, IV, 16 ); in main() 462 if( mbedtls_cipher_set_iv( &cipher_ctx, IV, 16 ) != 0 ) in main() 555 mbedtls_platform_zeroize( IV, sizeof( IV ) ); in main()
|
/mbedtls-development/tests/suites/ |
A D | test_suite_psa_crypto.data | 2718 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0, AAD=0, TAG=16 2722 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0, AAD=48, TAG=14 2726 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=16, AAD=0, TAG=15 2738 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=16, AAD=48, TAG=8 2742 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=13, AAD=0, TAG=15 2754 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=13, AAD=48, TAG=4 2758 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=0, TAG=16 2762 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=16, TAG=15 2766 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=20, TAG=15 2770 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=48, TAG=14 [all …]
|
A D | test_suite_cipher.function | 317 /* IV too big */ 321 /* IV too small */ 405 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes. 406 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */ 652 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes. 653 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */
|
A D | test_suite_psa_crypto_driver_wrappers.function | 896 /* Test IV setting failure */ 905 /* When setting the IV fails, it should call abort too */ 918 /* Test IV generation failure */ 927 /* When generating the IV fails, it should call abort too */
|
A D | test_suite_psa_crypto.function | 2692 /* Generate an IV without calling setup beforehand. */ 2699 /* Generate an IV twice in a row. */ 2713 /* Generate an IV after it's already set. */ 2723 /* Set an IV without calling setup beforehand. */ 2729 /* Set an IV after it's already set. */ 2741 /* Set an IV after it's already generated. */ 2759 /* Call update without an IV where an IV is required. */ 2790 /* Call finish without an IV where an IV is required. */
|
A D | test_suite_ssl.data | 5913 # Server handshake traffic secret -> Server traffic IV 5925 # Client handshake traffic secret -> Client traffic IV 5931 # Server handshake traffic secret -> Server traffic IV 5943 # Client handshake traffic secret -> Client traffic IV 6026 # - Server App IV: 1b13dd9f8d8f17091d34b349 6028 # - Client App IV: bc4dd5f7b98acff85466261d 6036 # - Server App IV: 1b13dd9f8d8f17091d34b349 6038 # - Client App IV: bc4dd5f7b98acff85466261d 6047 # - Server App IV: cf 78 2b 88 dd 83 54 9a ad f1 e9 84 6049 # - Client App IV: 5b 78 92 3d ee 08 57 90 33 e5 23 d9 [all …]
|
A D | test_suite_gcm.aes192_en.data | 673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
|
A D | test_suite_gcm.aes256_en.data | 673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
|
A D | test_suite_gcm.aes128_en.data | 725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
|
A D | test_suite_gcm.aes192_de.data | 673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
|
A D | test_suite_gcm.aes256_de.data | 673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
|
A D | test_suite_gcm.aes128_de.data | 725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
|
A D | test_suite_ssl.function | 1299 /* Pick IV's (regardless of whether they 1404 /* Setup IV's */ 3209 * 2) The record counter sometimes determines the IV. 3558 /* Set dummy IV */
|
A D | test_suite_ccm.data | 42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
|
/mbedtls-development/ChangeLog.d/ |
A D | ccm_star_no_tag.txt | 8 Currently only 13-byte long IV's are supported.
|
/mbedtls-development/docs/ |
A D | getting_started.md | 197 …r set the initialization vector (IV). We recommend calling `psa_cipher_generate_iv()`, unless you … 250 printf("Failed to generate IV\n"); 281 1. Call `psa_cipher_set_iv()` with the IV for the decryption. 334 printf("Failed to set IV\n");
|
A D | 3.0-migration-guide.md | 217 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_… 227 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u… 740 - It no longer exports raw keys and IV. 749 For users which do not rely on raw keys and IV, adjusting to the new
|
/mbedtls-development/docs/architecture/ |
A D | tls13-experimental.md | 31 of AAD, IV, and the introduction of a flexible padding. 46 * The traffic {Key,IV} generation from secret
|
/mbedtls-development/ |
A D | ChangeLog | 702 * Correct the default IV size for mbedtls_cipher_info_t structures using 1660 * Ignore IV in mbedtls_cipher_set_iv() when the cipher mode is 3660 * Internals for SSL module adapted to have separate IV pointer that is
|