Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 24 of 24) sorted by relevance

/mbedtls-development/tests/suites/
A Dtest_suite_nist_kw.function22 unsigned char plaintext[32];
27 memset( plaintext, 0, sizeof( plaintext ) );
44 plaintext, sizeof( plaintext ),
62 TEST_ASSERT( plaintext[i] == 0 );
80 plaintext, sizeof( plaintext ),
86 plaintext, sizeof( plaintext ),
106 TEST_ASSERT( plaintext[i] == 0 );
153 unsigned char *plaintext = NULL;
194 mbedtls_free( plaintext );
204 unsigned char *plaintext = NULL;
[all …]
A Dtest_suite_gcm.aes128_en.data673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0
685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2
697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0
701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1
705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2
709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0
713 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 1
717 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 2
[all …]
A Dtest_suite_nist_kw.data27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks)
30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets)
39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks)
42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets)
51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks.
72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
A Dtest_suite_ccm.function590 /* Provide unexpected plaintext/ciphertext data */
694 /* Provide too much plaintext/ciphertext */
722 /* Provide incomplete plaintext/ciphertext and finish */
755 /* Provide full plaintext/ciphertext of first update
756 * Provide unexpected plaintext/ciphertext on second update */
786 /* Provide incomplete plaintext/ciphertext of first update
787 * Provide too much plaintext/ciphertext on second update */
821 /* Finish without passing any auth data or plaintext/ciphertext input */
A Dtest_suite_ssl.data4865 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad
4869 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad
4873 Decrypt CBC !EtM, AES MD5 trunc, empty plaintext, minpad
4877 Decrypt CBC !EtM, AES MD5 trunc, empty plaintext, maxpad
4929 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad
4937 Decrypt CBC !EtM, AES SHA1 trunc, empty plaintext, minpad
4941 Decrypt CBC !EtM, AES SHA1 trunc, empty plaintext, maxpad
5129 Decrypt CBC !EtM, ARIA MD5 trunc, empty plaintext, minpad
5133 Decrypt CBC !EtM, ARIA MD5 trunc, empty plaintext, maxpad
5641 Decrypt CBC !EtM, 3DES MD5 trunc, empty plaintext, minpad
[all …]
A Dtest_suite_cipher.function763 /* check plaintext only if everything went fine */
783 * this results in the expected plaintext, and that
997 /* check plaintext only if everything went fine */
1043 /* check plaintext only if everything went fine */
A Dtest_suite_ssl.function3303 * in front of the plaintext, and expect the encryption
3307 * at the end of the plaintext, and expect the encryption
3311 * both at the front and end of the plaintext,
3502 /* Determine padding/plaintext length */
3631 * in this case. (With larger buffers, ie when the plaintext is long or
3956 data_t *plaintext,
4012 /* Copy plaintext into record structure */
4016 TEST_ASSERT( plaintext->len <= ciphertext->len );
4017 memcpy( rec.buf + rec.data_offset, plaintext->x, plaintext->len );
4018 rec.data_len = plaintext->len;
[all …]
A Dtest_suite_psa_crypto.function3300 /* Allocate input buffer and copy the iv and the plaintext */
3348 /* Allocate input buffer and copy the iv and the plaintext */
4401 unsigned char *plaintext = NULL;
4424 ASSERT_ALLOC( plaintext, plaintext_size );
4450 plaintext, plaintext_size,
4468 mbedtls_free( plaintext );
5629 * the original plaintext because of the non-optional random
A Dtest_suite_psa_crypto_driver_wrappers.function804 /* Allocate input buffer and copy the iv and the plaintext */
A Dtest_suite_ccm.data1744 CCM encrypt, unexpected ciphertext/plaintext data, NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
/mbedtls-development/tests/src/drivers/
A Dtest_driver_aead.c37 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument
55 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
69 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_test_transparent_aead_decrypt() argument
87 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt()
257 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument
277 plaintext, in mbedtls_test_transparent_aead_verify()
/mbedtls-development/tests/src/
A Dpsa_exercise_key.c168 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local
181 plaintext, sizeof( plaintext ), in exercise_cipher_key()
240 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local
270 plaintext, sizeof( plaintext ), in exercise_aead_key()
285 plaintext, sizeof( plaintext ), in exercise_aead_key()
384 unsigned char plaintext[256] = "Hello, world..."; in exercise_asymmetric_encryption_key() local
392 plaintext, plaintext_length, in exercise_asymmetric_encryption_key()
404 plaintext, sizeof( plaintext ), in exercise_asymmetric_encryption_key()
/mbedtls-development/library/
A Dpsa_crypto_aead.c145 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument
176 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
190 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
209 plaintext, in mbedtls_psa_aead_encrypt()
257 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_psa_aead_decrypt() argument
284 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
299 ciphertext, plaintext ) ); in mbedtls_psa_aead_decrypt()
319 plaintext ) ); in mbedtls_psa_aead_decrypt()
A Dccm.c664 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local
685 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test()
687 memcpy( plaintext, msg_test_data, msg_len_test_data[i] ); in mbedtls_ccm_self_test()
692 plaintext, ciphertext, in mbedtls_ccm_self_test()
705 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test()
710 ciphertext, plaintext, in mbedtls_ccm_self_test()
715 memcmp( plaintext, msg_test_data, msg_len_test_data[i] ) != 0 ) in mbedtls_ccm_self_test()
A Dpsa_crypto_aead.h85 const uint8_t *plaintext, size_t plaintext_length,
149 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
A Dpsa_crypto_driver_wrappers.h210 const uint8_t *plaintext, size_t plaintext_length,
220 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
268 uint8_t *plaintext,
A Dpsa_crypto_driver_wrappers.c1470 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument
1490 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
1504 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt()
1523 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument
1543 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt()
1557 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt()
1857 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument
1873 plaintext, in psa_driver_wrapper_aead_verify()
1900 plaintext, plaintext_size, in psa_driver_wrapper_aead_verify()
1909 (void)plaintext; in psa_driver_wrapper_aead_verify()
A Dpsa_crypto.c3676 const uint8_t *plaintext, in psa_aead_encrypt() argument
3708 plaintext, plaintext_length, in psa_aead_encrypt()
3728 uint8_t *plaintext, in psa_aead_decrypt() argument
3759 plaintext, plaintext_size, plaintext_length ); in psa_aead_decrypt()
3762 memset( plaintext, 0, plaintext_size ); in psa_aead_decrypt()
4181 uint8_t *plaintext, in psa_aead_verify() argument
4201 status = psa_driver_wrapper_aead_verify( operation, plaintext, in psa_aead_verify()
/mbedtls-development/tests/include/test/drivers/
A Daead.h65 const uint8_t *plaintext, size_t plaintext_length,
75 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
123 uint8_t *plaintext,
/mbedtls-development/ChangeLog.d/
A Dccm_star_no_tag.txt2 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
/mbedtls-development/include/psa/
A Dcrypto.h2136 const uint8_t *plaintext,
2211 uint8_t *plaintext,
2824 uint8_t *plaintext,
/mbedtls-development/docs/
A Dgetting_started.md211 uint8_t plaintext[block_size] = SOME_PLAINTEXT;
242 /* Encrypt the plaintext */
253 status = psa_cipher_update(&operation, plaintext, sizeof(plaintext),
265 printf("Encrypted plaintext\n");
A D3.0-migration-guide.md765 infer upper bounds on the plaintext size of incoming and
805 set the maximum length of incoming and outgoing plaintext fragments,
810 the maximum incoming and outgoing plaintext fragment lengths, respectively.
/mbedtls-development/
A DChangeLog809 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused
907 plaintext after repeated timing measurements under some conditions.
1564 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
1787 partially recover the plaintext of messages under some conditions by
1801 plaintext of messages under some conditions by using a cache attack
1811 to partially recover the plaintext of messages under some conditions (see
1993 * Return the plaintext data more quickly on unpadded CBC decryption, as

Completed in 74 milliseconds