/mbedtls-development/library/ |
A D | psa_crypto_aead.c | 165 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt() 176 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 190 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 210 ciphertext, in mbedtls_psa_aead_encrypt() 246 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag() 256 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_psa_aead_decrypt() argument 284 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() 299 ciphertext, plaintext ) ); in mbedtls_psa_aead_decrypt() 318 ciphertext, in mbedtls_psa_aead_decrypt() 551 uint8_t *ciphertext, in mbedtls_psa_aead_finish() argument [all …]
|
A D | psa_crypto_aead.h | 86 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ); 148 const uint8_t *ciphertext, size_t ciphertext_length, 477 uint8_t *ciphertext,
|
A D | ccm.c | 665 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local 686 memset( ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN ); in mbedtls_ccm_self_test() 692 plaintext, ciphertext, in mbedtls_ccm_self_test() 693 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test() 697 memcmp( ciphertext, res_test_data[i], in mbedtls_ccm_self_test() 710 ciphertext, plaintext, in mbedtls_ccm_self_test() 711 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
|
A D | psa_crypto_driver_wrappers.h | 211 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ); 219 const uint8_t *ciphertext, size_t ciphertext_length, 259 uint8_t *ciphertext,
|
A D | psa_crypto_driver_wrappers.c | 1471 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in psa_driver_wrapper_aead_encrypt() argument 1491 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt() 1505 ciphertext, ciphertext_size, ciphertext_length ) ); in psa_driver_wrapper_aead_encrypt() 1522 const uint8_t *ciphertext, size_t ciphertext_length, in psa_driver_wrapper_aead_decrypt() argument 1542 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 1556 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 1812 uint8_t *ciphertext, in psa_driver_wrapper_aead_finish() argument 1824 ciphertext, in psa_driver_wrapper_aead_finish() 1836 ciphertext, ciphertext_size, in psa_driver_wrapper_aead_finish() 1845 (void)ciphertext; in psa_driver_wrapper_aead_finish()
|
A D | psa_crypto.c | 3678 uint8_t *ciphertext, in psa_aead_encrypt() argument 3709 ciphertext, ciphertext_size, ciphertext_length ); in psa_aead_encrypt() 3712 memset( ciphertext, 0, ciphertext_size ); in psa_aead_encrypt() 3726 const uint8_t *ciphertext, in psa_aead_decrypt() argument 3758 ciphertext, ciphertext_length, in psa_aead_decrypt() 4132 uint8_t *ciphertext, in psa_aead_finish() argument 4154 status = psa_driver_wrapper_aead_finish( operation, ciphertext, in psa_aead_finish()
|
/mbedtls-development/tests/src/ |
A D | psa_exercise_key.c | 170 size_t ciphertext_length = sizeof( ciphertext ); in exercise_cipher_key() 171 unsigned char decrypted[sizeof( ciphertext )]; in exercise_cipher_key() 182 ciphertext, sizeof( ciphertext ), in exercise_cipher_key() 210 ciphertext, ciphertext_length, in exercise_cipher_key() 242 size_t ciphertext_length = sizeof( ciphertext ); in exercise_aead_key() 243 size_t plaintext_length = sizeof( ciphertext ); in exercise_aead_key() 271 ciphertext, sizeof( ciphertext ), in exercise_aead_key() 284 ciphertext, ciphertext_length, in exercise_aead_key() 386 size_t ciphertext_length = sizeof( ciphertext ); in exercise_asymmetric_encryption_key() 394 ciphertext, sizeof( ciphertext ), in exercise_asymmetric_encryption_key() [all …]
|
/mbedtls-development/tests/suites/ |
A D | test_suite_nist_kw.function | 154 unsigned char *ciphertext = NULL; 169 ciphertext = mbedtls_calloc( 1, output_len ); 170 TEST_ASSERT( ciphertext != NULL ); 177 ciphertext, &output_len, 193 mbedtls_free( ciphertext ); 205 unsigned char *ciphertext = NULL; 220 ciphertext = mbedtls_calloc( 1, in_len ); 221 TEST_ASSERT( ciphertext != NULL ); 226 unwrap_ret = mbedtls_nist_kw_unwrap( &ctx, mode, ciphertext, in_len, 238 mbedtls_free( ciphertext );
|
A D | test_suite_gcm.aes128_de.data | 673 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 0 709 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 0 713 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 1 717 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 2 [all …]
|
A D | test_suite_nist_kw.data | 33 NIST KW lengths #3 KW ciphertext OK (3 to 2^54 semiblocks) 36 NIST KW lengths #4 KWP ciphertext OK (2 to 2^29 semiblocks) 45 NIST KW lengths #8 KW ciphertext too short (3 to 2^54 semiblocks) 48 NIST KW lengths #9 KWP ciphertext too short (2 to 2^29 semiblocks) 54 NIST KW lengths #11 KW ciphertext not a multiple of semiblocks. 57 NIST KW lengths #12 KWP ciphertext not a multiple of semiblocks. 81 NIST KW lengths #20 KW ciphertext NULL 84 NIST KW lengths #21 KWP ciphertext NULL
|
A D | test_suite_ccm.function | 590 /* Provide unexpected plaintext/ciphertext data */ 694 /* Provide too much plaintext/ciphertext */ 722 /* Provide incomplete plaintext/ciphertext and finish */ 755 /* Provide full plaintext/ciphertext of first update 756 * Provide unexpected plaintext/ciphertext on second update */ 786 /* Provide incomplete plaintext/ciphertext of first update 787 * Provide too much plaintext/ciphertext on second update */ 821 /* Finish without passing any auth data or plaintext/ciphertext input */
|
A D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
|
A D | test_suite_psa_crypto.function | 4023 unsigned char *ciphertext = NULL; 4049 ASSERT_ALLOC( ciphertext, ciphertext_size ); 4098 mbedtls_free( ciphertext ); 4122 unsigned char *ciphertext = NULL; 4150 ASSERT_ALLOC( ciphertext, ciphertext_size ); 4210 mbedtls_free( ciphertext ); 4235 unsigned char *ciphertext = NULL; 4257 ASSERT_ALLOC( ciphertext, ciphertext_size ); 4293 mbedtls_free( ciphertext ); 4317 unsigned char *ciphertext = NULL; [all …]
|
A D | test_suite_cipher.function | 781 * Take an AEAD ciphertext + tag and perform a pair 840 * (we need the tag appended to the ciphertext)
|
A D | test_suite_ssl.function | 3957 data_t *ciphertext ) 4002 buf_len = ciphertext->len + MBEDTLS_SSL_CID_TLS1_3_PADDING_GRANULARITY; 4016 TEST_ASSERT( plaintext->len <= ciphertext->len ); 4032 ciphertext->x, ciphertext->len );
|
A D | test_suite_ccm.data | 1744 CCM encrypt, unexpected ciphertext/plaintext data, NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
|
/mbedtls-development/tests/src/drivers/ |
A D | test_driver_aead.c | 38 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in mbedtls_test_transparent_aead_encrypt() argument 56 ciphertext, ciphertext_size, ciphertext_length ); in mbedtls_test_transparent_aead_encrypt() 68 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt() argument 86 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 230 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish() argument 247 mbedtls_psa_aead_finish( operation, ciphertext, ciphertext_size, in mbedtls_test_transparent_aead_finish()
|
/mbedtls-development/tests/include/test/drivers/ |
A D | aead.h | 66 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ); 74 const uint8_t *ciphertext, size_t ciphertext_length, 114 uint8_t *ciphertext,
|
/mbedtls-development/ChangeLog.d/ |
A D | ccm_star_no_tag.txt | 2 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
|
/mbedtls-development/include/psa/ |
A D | crypto.h | 2138 uint8_t *ciphertext, 2209 const uint8_t *ciphertext, 2739 uint8_t *ciphertext,
|
/mbedtls-development/docs/ |
A D | getting_started.md | 297 uint8_t ciphertext[block_size] = SOME_CIPHERTEXT; 326 /* Decrypt the ciphertext */ 337 status = psa_cipher_update(&operation, ciphertext, sizeof(ciphertext), 349 printf("Decrypted ciphertext\n");
|
/mbedtls-development/ |
A D | ChangeLog | 605 these new functions always append the tag to the ciphertext, and include 606 the tag in the ciphertext length.
|