/mbedtls-development/tests/suites/ |
A D | test_suite_cipher.camellia.data | 9 CAMELLIA Encrypt and decrypt 0 bytes [#1] 17 CAMELLIA Encrypt and decrypt 2 bytes [#1] 21 CAMELLIA Encrypt and decrypt 7 bytes [#1] 25 CAMELLIA Encrypt and decrypt 8 bytes [#1] 29 CAMELLIA Encrypt and decrypt 9 bytes [#1] 33 CAMELLIA Encrypt and decrypt 15 bytes [#1] 37 CAMELLIA Encrypt and decrypt 16 bytes [#1] 41 CAMELLIA Encrypt and decrypt 17 bytes [#1] 45 CAMELLIA Encrypt and decrypt 31 bytes [#1] 49 CAMELLIA Encrypt and decrypt 32 bytes [#1] [all …]
|
A D | test_suite_cipher.des.data | 13 DES Encrypt and decrypt 0 bytes [#1] 21 DES Encrypt and decrypt 2 bytes 25 DES Encrypt and decrypt 7 bytes 29 DES Encrypt and decrypt 8 bytes 33 DES Encrypt and decrypt 9 bytes 37 DES Encrypt and decrypt 15 bytes 41 DES Encrypt and decrypt 16 bytes 45 DES Encrypt and decrypt 17 bytes 49 DES Encrypt and decrypt 31 bytes 61 DES Encrypt and decrypt 47 bytes [all …]
|
A D | test_suite_cipher.chacha20.data | 5 ChaCha20 Encrypt and decrypt 0 bytes 9 ChaCha20 Encrypt and decrypt 1 bytes 13 ChaCha20 Encrypt and decrypt 2 bytes 17 ChaCha20 Encrypt and decrypt 7 bytes 21 ChaCha20 Encrypt and decrypt 8 bytes 25 ChaCha20 Encrypt and decrypt 9 bytes 29 ChaCha20 Encrypt and decrypt 15 bytes 33 ChaCha20 Encrypt and decrypt 16 bytes 37 ChaCha20 Encrypt and decrypt 17 bytes 41 ChaCha20 Encrypt and decrypt 31 bytes [all …]
|
A D | test_suite_cipher.null.data | 1 NULL Encrypt and decrypt 0 bytes 5 NULL Encrypt and decrypt 1 bytes 9 NULL Encrypt and decrypt 2 bytes 13 NULL Encrypt and decrypt 7 bytes 17 NULL Encrypt and decrypt 8 bytes 21 NULL Encrypt and decrypt 9 bytes 25 NULL Encrypt and decrypt 15 bytes 29 NULL Encrypt and decrypt 16 bytes 33 NULL Encrypt and decrypt 31 bytes 37 NULL Encrypt and decrypt 32 bytes [all …]
|
A D | test_suite_cipher.aria.data | 5 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 0 bytes 13 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 2 bytes 17 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 7 bytes 21 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 8 bytes 25 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 9 bytes 29 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 15 bytes 33 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 16 bytes 37 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 17 bytes 41 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 31 bytes 45 ARIA-128 CCM*-NO-TAG - Encrypt and decrypt 32 bytes [all …]
|
A D | test_suite_cipher.chachapoly.data | 5 ChaCha20+Poly1305 Encrypt and decrypt 0 bytes 9 ChaCha20+Poly1305 Encrypt and decrypt 1 bytes 13 ChaCha20+Poly1305 Encrypt and decrypt 2 bytes 17 ChaCha20+Poly1305 Encrypt and decrypt 7 bytes 21 ChaCha20+Poly1305 Encrypt and decrypt 8 bytes 25 ChaCha20+Poly1305 Encrypt and decrypt 9 bytes 29 ChaCha20+Poly1305 Encrypt and decrypt 15 bytes 33 ChaCha20+Poly1305 Encrypt and decrypt 16 bytes 37 ChaCha20+Poly1305 Encrypt and decrypt 17 bytes 41 ChaCha20+Poly1305 Encrypt and decrypt 31 bytes [all …]
|
A D | test_suite_cipher.aes.data | 377 AES-128 CFB - Encrypt and decrypt 0 bytes 385 AES-128 CFB - Encrypt and decrypt 2 bytes 389 AES-128 CFB - Encrypt and decrypt 7 bytes 393 AES-128 CFB - Encrypt and decrypt 8 bytes 397 AES-128 CFB - Encrypt and decrypt 9 bytes 481 AES-128 OFB - Encrypt and decrypt 0 bytes 489 AES-128 OFB - Encrypt and decrypt 2 bytes 493 AES-128 OFB - Encrypt and decrypt 7 bytes 497 AES-128 OFB - Encrypt and decrypt 8 bytes 501 AES-128 OFB - Encrypt and decrypt 9 bytes [all …]
|
A D | test_suite_cipher.padding.data | 68 Check PKCS padding #6 (too few padding bytes) 72 Check PKCS padding #7 (non-uniform padding bytes #1) 76 Check PKCS padding #7 (non-uniform padding bytes #2) 80 Check PKCS padding #7 (non-uniform padding bytes #3) 84 Check PKCS padding #7 (non-uniform padding bytes #4) 88 Check PKCS padding #7 (non-uniform padding bytes #5) 92 Check PKCS padding #7 (non-uniform padding bytes #6) 96 Check PKCS padding #7 (non-uniform padding bytes #7) 100 Check PKCS padding #7 (non-uniform padding bytes #8) 104 Check PKCS padding #7 (non-uniform padding bytes #9) [all …]
|
A D | test_suite_psa_crypto_driver_wrappers.data | 160 PSA symmetric decrypt: AES-CTR, 16 bytes, good 164 PSA symmetric decrypt: AES-CTR, 16 bytes, fallback 168 PSA symmetric decrypt: AES-CTR, 16 bytes, fake 260 PSA AEAD encrypt: AES-CCM, 24 bytes 264 PSA AEAD encrypt: AES-CCM, 24 bytes, fallback 272 PSA AEAD encrypt, AES-GCM, 128 bytes #1 276 PSA AEAD encrypt, AES-GCM, 128 bytes #1, fallback 284 PSA AEAD decrypt: AES-CCM, 39 bytes 288 PSA AEAD decrypt: AES-CCM, 39 bytes, fallback 296 PSA AEAD decrypt, AES-GCM, 144 bytes #1 [all …]
|
A D | test_suite_psa_its.data | 1 Set/get/remove 0 bytes 4 Set/get/remove 42 bytes 7 Set/get/remove 1000 bytes 37 Get 0 bytes of 10 at 10 43 Get 0 bytes of 10 at 0 49 Get 2 bytes of 10 at 1 58 Get 0 bytes of 10 at 11: out of range
|
A D | test_suite_asn1parse.data | 64 length=0 (2 length bytes) 73 length=1 (2 length bytes) 76 length=1 (3 length bytes) 79 length=1 (4 length bytes) 88 length=2 (2 length bytes) 91 length=2 (3 length bytes) 94 length=2 (4 length bytes) 103 length=128 (2 length bytes) 109 length=255 (2 length bytes) 112 length=256 (2 length bytes) [all …]
|
A D | test_suite_psa_crypto.data | 4 PSA import/export raw: 1 bytes 7 PSA import/export raw: 1 bytes, larger buffer 10 PSA import/export raw: 2 bytes, buffer too small 25 PSA import/export raw: 1 bytes, opaque 2438 PSA AEAD encrypt: AES-CCM, 23 bytes 2442 PSA AEAD encrypt: AES-CCM, 24 bytes 4852 PSA generate random: 0 bytes 4858 PSA generate random: 4 bytes 4861 PSA generate random: 16 bytes 4864 PSA generate random: 19 bytes [all …]
|
A D | test_suite_cipher.gcm.data | 13 AES 128 GCM Encrypt and decrypt 0 bytes 21 AES 128 GCM Encrypt and decrypt 2 bytes 25 AES 128 GCM Encrypt and decrypt 7 bytes 29 AES 128 GCM Encrypt and decrypt 8 bytes 33 AES 128 GCM Encrypt and decrypt 9 bytes 37 AES 128 GCM Encrypt and decrypt 15 bytes 41 AES 128 GCM Encrypt and decrypt 16 bytes 45 AES 128 GCM Encrypt and decrypt 17 bytes 49 AES 128 GCM Encrypt and decrypt 31 bytes 61 AES 128 GCM Encrypt and decrypt 47 bytes [all …]
|
A D | test_suite_mps.data | 49 MPS Reader: Pausing, feed 50 bytes in 10b + 10b + 80b 52 MPS Reader: Pausing, feed 50 bytes in 50x1b 55 MPS Reader: Pausing, feed 50 bytes in 49x1b + 51b
|
A D | test_suite_mpi.data | 1642 Fill random: 0 bytes 1660 Fill random: 0 bytes, previously small >0 1663 Fill random: 0 bytes, previously small <0 1666 Fill random: 0 bytes, previously large >0 1669 Fill random: 0 bytes, previously large <0 1696 Fill random: 4 bytes, RNG failure after 3 bytes 1699 Fill random: 8 bytes, RNG failure after 7 bytes 1702 Fill random: 16 bytes, RNG failure after 1 bytes 1705 Fill random: 16 bytes, RNG failure after 8 bytes 1708 Fill random: 16 bytes, RNG failure after 15 bytes [all …]
|
A D | test_suite_random.data | 28 PSA classic wrapper: 0 bytes 34 PSA classic wrapper: 256 bytes
|
A D | test_suite_base64.data | 184 # Rotate the bytes around so that they end up at each offset modulo 3 in 186 Base64 encode hex all valid input bytes #0 189 Base64 encode hex all valid input bytes #1 192 Base64 encode hex all valid input bytes #2
|
A D | test_suite_debug.data | 26 …nt_buf:"MyFile":999:"Test return value":"":"MyFile(0999)\: dumping 'Test return value' (0 bytes)\n" 29 …9:"Test return value":"00":"MyFile(0999)\: dumping 'Test return value' (1 bytes)\nMyFile(0999)\: 0… 32 …0405060708090A0B0C0D0E0F":"MyFile(0999)\: dumping 'Test return value' (16 bytes)\nMyFile(0999)\: 0… 35 …05060708090A0B0C0D0E0F00":"MyFile(0999)\: dumping 'Test return value' (17 bytes)\nMyFile(0999)\: 0… 38 …25262728292A2B2C2D2E2F30":"MyFile(0999)\: dumping 'Test return value' (49 bytes)\nMyFile(0999)\: 0…
|
A D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0 713 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 1 [all …]
|
A D | test_suite_gcm.aes128_de.data | 673 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 1 685 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 0 713 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 1 [all …]
|
/mbedtls-development/scripts/mbedtls_dev/ |
A D | psa_storage.py | 111 material: bytes #pylint: disable=used-before-assignment argument 129 ) -> bytes: #pylint: disable=used-before-assignment 143 def bytes(self) -> bytes: member in Key 165 return self.bytes().hex() 183 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex)) 194 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex)) 202 self.assertEqual(key.bytes(), bytes.fromhex(expected_hex))
|
A D | asymmetric_key_data.py | 27 def unhexlify(text: str) -> bytes: 30 def construct_asymmetric_key_data(src) -> Dict[str, Dict[int, bytes]]:
|
/mbedtls-development/docs/architecture/ |
A D | mbed-crypto-storage-specification.md | 53 * magic (8 bytes): `"PSA\0KEY\0"` 54 * version (4 bytes): 0 58 * key material length (4 bytes) 185 * magic (8 bytes): `"PSA\0KEY\0"` 186 * version (4 bytes): 0 191 * key material length (4 bytes) 245 * version (4 bytes): 0. 251 * key material length (4 bytes). 269 * unused (2 bytes) 304 * version (4 bytes): 0. [all …]
|
/mbedtls-development/library/ |
A D | psa_crypto.c | 535 slot->key.bytes = buffer_length; in psa_allocate_buffer_to_slot() 980 slot->key.bytes = 0; in psa_remove_key_data_from_memory() 1219 slot->key.bytes, in psa_get_key_attributes() 1333 slot->key.data, slot->key.bytes, in psa_export_key() 1439 &attributes, slot->key.data, slot->key.bytes, in psa_export_public_key() 2562 slot->key.data, slot->key.bytes, in psa_mac_compute_internal() 4702 size_t bytes = PSA_BITS_TO_BYTES( bits ); in psa_generate_derived_key_internal() local 4703 size_t storage_size = bytes; in psa_generate_derived_key_internal() 4710 data = mbedtls_calloc( 1, bytes ); in psa_generate_derived_key_internal() 4719 psa_des_set_key_parity( data, bytes ); in psa_generate_derived_key_internal() [all …]
|
/mbedtls-development/programs/fuzz/ |
A D | README.md | 47 They also use the last bytes as configuration options. 54 * Finally, you can add the options by appending the last bytes to the file test.cor
|