Home
last modified time | relevance | path

Searched refs:IV (Results 1 – 19 of 19) sorted by relevance

/mbedtls-development/programs/aes/
A Dcrypt_and_hash.c90 unsigned char IV[16]; in main() local
285 memcpy( IV, digest, 16 ); in main()
290 if( fwrite( IV, 1, 16, fout ) != 16 ) in main()
301 memcpy( digest, IV, 16 ); in main()
320 if( mbedtls_cipher_set_iv( &cipher_ctx, IV, 16 ) != 0 ) in main()
436 memcpy( IV, buffer, 16 ); in main()
443 memcpy( digest, IV, 16 ); in main()
462 if( mbedtls_cipher_set_iv( &cipher_ctx, IV, 16 ) != 0 ) in main()
555 mbedtls_platform_zeroize( IV, sizeof( IV ) ); in main()
/mbedtls-development/tests/suites/
A Dtest_suite_psa_crypto.data2718 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0, AAD=0, TAG=16
2722 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=0, AAD=48, TAG=14
2726 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=16, AAD=0, TAG=15
2738 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=16, AAD=48, TAG=8
2742 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=13, AAD=0, TAG=15
2754 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=24, IV=12, IN=13, AAD=48, TAG=4
2758 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=0, TAG=16
2762 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=16, TAG=15
2766 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=20, TAG=15
2770 PSA AEAD decrypt, CAVS14.0, AES-GCM, KEY=32, IV=12, IN=0, AAD=48, TAG=14
[all …]
A Dtest_suite_cipher.function317 /* IV too big */
321 /* IV too small */
405 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes.
406 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */
652 iv_len = 13; /* For CCM, IV length is expected to be between 7 and 13 bytes.
653 * For CCM*-NO-TAG, IV length must be exactly 13 bytes long. */
A Dtest_suite_psa_crypto_driver_wrappers.function896 /* Test IV setting failure */
905 /* When setting the IV fails, it should call abort too */
918 /* Test IV generation failure */
927 /* When generating the IV fails, it should call abort too */
A Dtest_suite_psa_crypto.function2692 /* Generate an IV without calling setup beforehand. */
2699 /* Generate an IV twice in a row. */
2713 /* Generate an IV after it's already set. */
2723 /* Set an IV without calling setup beforehand. */
2729 /* Set an IV after it's already set. */
2741 /* Set an IV after it's already generated. */
2759 /* Call update without an IV where an IV is required. */
2790 /* Call finish without an IV where an IV is required. */
A Dtest_suite_ssl.data5913 # Server handshake traffic secret -> Server traffic IV
5925 # Client handshake traffic secret -> Client traffic IV
5931 # Server handshake traffic secret -> Server traffic IV
5943 # Client handshake traffic secret -> Client traffic IV
6026 # - Server App IV: 1b13dd9f8d8f17091d34b349
6028 # - Client App IV: bc4dd5f7b98acff85466261d
6036 # - Server App IV: 1b13dd9f8d8f17091d34b349
6038 # - Client App IV: bc4dd5f7b98acff85466261d
6047 # - Server App IV: cf 78 2b 88 dd 83 54 9a ad f1 e9 84
6049 # - Client App IV: 5b 78 92 3d ee 08 57 90 33 e5 23 d9
[all …]
A Dtest_suite_gcm.aes192_en.data673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
A Dtest_suite_gcm.aes256_en.data673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
A Dtest_suite_gcm.aes128_en.data725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
A Dtest_suite_gcm.aes192_de.data673 AES-GCM Bad IV (AES-192,128,0,0,32) #0
A Dtest_suite_gcm.aes256_de.data673 AES-GCM Bad IV (AES-256,128,0,0,32) #0
A Dtest_suite_gcm.aes128_de.data725 AES-GCM Bad IV (AES-128,128,0,0,32) #0
A Dtest_suite_ssl.function1299 /* Pick IV's (regardless of whether they
1404 /* Setup IV's */
3209 * 2) The record counter sometimes determines the IV.
3558 /* Set dummy IV */
A Dtest_suite_ccm.data42 CCM lengths #8 msg too long for this IV length (2^16, q = 2)
/mbedtls-development/ChangeLog.d/
A Dccm_star_no_tag.txt8 Currently only 13-byte long IV's are supported.
/mbedtls-development/docs/
A Dgetting_started.md197 …r set the initialization vector (IV). We recommend calling `psa_cipher_generate_iv()`, unless you …
250 printf("Failed to generate IV\n");
281 1. Call `psa_cipher_set_iv()` with the IV for the decryption.
334 printf("Failed to set IV\n");
A D3.0-migration-guide.md217 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_…
227 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u…
740 - It no longer exports raw keys and IV.
749 For users which do not rely on raw keys and IV, adjusting to the new
/mbedtls-development/docs/architecture/
A Dtls13-experimental.md31 of AAD, IV, and the introduction of a flexible padding.
46 * The traffic {Key,IV} generation from secret
/mbedtls-development/
A DChangeLog702 * Correct the default IV size for mbedtls_cipher_info_t structures using
1660 * Ignore IV in mbedtls_cipher_set_iv() when the cipher mode is
3660 * Internals for SSL module adapted to have separate IV pointer that is

Completed in 66 milliseconds