/mbedtls-development/tests/suites/ |
A D | test_suite_nist_kw.function | 22 unsigned char plaintext[32]; 27 memset( plaintext, 0, sizeof( plaintext ) ); 44 plaintext, sizeof( plaintext ), 62 TEST_ASSERT( plaintext[i] == 0 ); 80 plaintext, sizeof( plaintext ), 86 plaintext, sizeof( plaintext ), 106 TEST_ASSERT( plaintext[i] == 0 ); 153 unsigned char *plaintext = NULL; 194 mbedtls_free( plaintext ); 204 unsigned char *plaintext = NULL; [all …]
|
A D | test_suite_gcm.aes128_en.data | 673 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 128 bytes, ciphertext updates: 0 685 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty plaintext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 0 713 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 1 717 AES-GCM NIST CAVS 14.0 - empty AD, plaintext length: 51 bytes, AD updates: 2 [all …]
|
A D | test_suite_nist_kw.data | 27 NIST KW lengths #1 KW plaintext OK (2 to 2^54 - 1 semiblocks) 30 NIST KW lengths #2 KWP plaintext OK (1 to 2^32 - 1 octets) 39 NIST KW lengths #5 KW plaintext too short (2 to 2^54 - 1 semiblocks) 42 NIST KW lengths #6 KWP plaintext too short (1 to 2^32 - 1 octets) 51 NIST KW lengths #10 KW plaintext not a multiple of semiblocks. 72 NIST KW lengths #17 KW plaintext NULL (2 to 2^54 - 1 semiblocks)
|
A D | test_suite_ccm.function | 590 /* Provide unexpected plaintext/ciphertext data */ 694 /* Provide too much plaintext/ciphertext */ 722 /* Provide incomplete plaintext/ciphertext and finish */ 755 /* Provide full plaintext/ciphertext of first update 756 * Provide unexpected plaintext/ciphertext on second update */ 786 /* Provide incomplete plaintext/ciphertext of first update 787 * Provide too much plaintext/ciphertext on second update */ 821 /* Finish without passing any auth data or plaintext/ciphertext input */
|
A D | test_suite_ssl.data | 4865 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, minpad 4869 Decrypt CBC !EtM, AES MD5 !trunc, empty plaintext, maxpad 4873 Decrypt CBC !EtM, AES MD5 trunc, empty plaintext, minpad 4877 Decrypt CBC !EtM, AES MD5 trunc, empty plaintext, maxpad 4929 Decrypt CBC !EtM, AES SHA1 !trunc, empty plaintext, minpad 4937 Decrypt CBC !EtM, AES SHA1 trunc, empty plaintext, minpad 4941 Decrypt CBC !EtM, AES SHA1 trunc, empty plaintext, maxpad 5129 Decrypt CBC !EtM, ARIA MD5 trunc, empty plaintext, minpad 5133 Decrypt CBC !EtM, ARIA MD5 trunc, empty plaintext, maxpad 5641 Decrypt CBC !EtM, 3DES MD5 trunc, empty plaintext, minpad [all …]
|
A D | test_suite_cipher.function | 763 /* check plaintext only if everything went fine */ 783 * this results in the expected plaintext, and that 997 /* check plaintext only if everything went fine */ 1043 /* check plaintext only if everything went fine */
|
A D | test_suite_ssl.function | 3303 * in front of the plaintext, and expect the encryption 3307 * at the end of the plaintext, and expect the encryption 3311 * both at the front and end of the plaintext, 3502 /* Determine padding/plaintext length */ 3631 * in this case. (With larger buffers, ie when the plaintext is long or 3956 data_t *plaintext, 4012 /* Copy plaintext into record structure */ 4016 TEST_ASSERT( plaintext->len <= ciphertext->len ); 4017 memcpy( rec.buf + rec.data_offset, plaintext->x, plaintext->len ); 4018 rec.data_len = plaintext->len; [all …]
|
A D | test_suite_psa_crypto.function | 3300 /* Allocate input buffer and copy the iv and the plaintext */ 3348 /* Allocate input buffer and copy the iv and the plaintext */ 4401 unsigned char *plaintext = NULL; 4424 ASSERT_ALLOC( plaintext, plaintext_size ); 4450 plaintext, plaintext_size, 4468 mbedtls_free( plaintext ); 5629 * the original plaintext because of the non-optional random
|
A D | test_suite_psa_crypto_driver_wrappers.function | 804 /* Allocate input buffer and copy the iv and the plaintext */
|
A D | test_suite_ccm.data | 1744 CCM encrypt, unexpected ciphertext/plaintext data, NIST VPT AES-128 #14 (P=13, N=13, A=32, T=16)
|
/mbedtls-development/tests/src/drivers/ |
A D | test_driver_aead.c | 37 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument 55 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 69 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_test_transparent_aead_decrypt() argument 87 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt() 257 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument 277 plaintext, in mbedtls_test_transparent_aead_verify()
|
/mbedtls-development/tests/src/ |
A D | psa_exercise_key.c | 168 const unsigned char plaintext[16] = "Hello, world..."; in exercise_cipher_key() local 181 plaintext, sizeof( plaintext ), in exercise_cipher_key() 240 unsigned char plaintext[16] = "Hello, world..."; in exercise_aead_key() local 270 plaintext, sizeof( plaintext ), in exercise_aead_key() 285 plaintext, sizeof( plaintext ), in exercise_aead_key() 384 unsigned char plaintext[256] = "Hello, world..."; in exercise_asymmetric_encryption_key() local 392 plaintext, plaintext_length, in exercise_asymmetric_encryption_key() 404 plaintext, sizeof( plaintext ), in exercise_asymmetric_encryption_key()
|
/mbedtls-development/library/ |
A D | psa_crypto_aead.c | 145 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument 176 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 190 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 209 plaintext, in mbedtls_psa_aead_encrypt() 257 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_psa_aead_decrypt() argument 284 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() 299 ciphertext, plaintext ) ); in mbedtls_psa_aead_decrypt() 319 plaintext ) ); in mbedtls_psa_aead_decrypt()
|
A D | ccm.c | 664 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local 685 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test() 687 memcpy( plaintext, msg_test_data, msg_len_test_data[i] ); in mbedtls_ccm_self_test() 692 plaintext, ciphertext, in mbedtls_ccm_self_test() 705 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test() 710 ciphertext, plaintext, in mbedtls_ccm_self_test() 715 memcmp( plaintext, msg_test_data, msg_len_test_data[i] ) != 0 ) in mbedtls_ccm_self_test()
|
A D | psa_crypto_aead.h | 85 const uint8_t *plaintext, size_t plaintext_length, 149 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length );
|
A D | psa_crypto_driver_wrappers.h | 210 const uint8_t *plaintext, size_t plaintext_length, 220 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ); 268 uint8_t *plaintext,
|
A D | psa_crypto_driver_wrappers.c | 1470 const uint8_t *plaintext, size_t plaintext_length, in psa_driver_wrapper_aead_encrypt() argument 1490 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 1504 plaintext, plaintext_length, in psa_driver_wrapper_aead_encrypt() 1523 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in psa_driver_wrapper_aead_decrypt() argument 1543 plaintext, plaintext_size, plaintext_length ); in psa_driver_wrapper_aead_decrypt() 1557 plaintext, plaintext_size, plaintext_length ) ); in psa_driver_wrapper_aead_decrypt() 1857 uint8_t *plaintext, in psa_driver_wrapper_aead_verify() argument 1873 plaintext, in psa_driver_wrapper_aead_verify() 1900 plaintext, plaintext_size, in psa_driver_wrapper_aead_verify() 1909 (void)plaintext; in psa_driver_wrapper_aead_verify()
|
A D | psa_crypto.c | 3676 const uint8_t *plaintext, in psa_aead_encrypt() argument 3708 plaintext, plaintext_length, in psa_aead_encrypt() 3728 uint8_t *plaintext, in psa_aead_decrypt() argument 3759 plaintext, plaintext_size, plaintext_length ); in psa_aead_decrypt() 3762 memset( plaintext, 0, plaintext_size ); in psa_aead_decrypt() 4181 uint8_t *plaintext, in psa_aead_verify() argument 4201 status = psa_driver_wrapper_aead_verify( operation, plaintext, in psa_aead_verify()
|
/mbedtls-development/tests/include/test/drivers/ |
A D | aead.h | 65 const uint8_t *plaintext, size_t plaintext_length, 75 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ); 123 uint8_t *plaintext,
|
/mbedtls-development/ChangeLog.d/ |
A D | ccm_star_no_tag.txt | 2 * Ignore plaintext/ciphertext lengths for CCM*-no-tag operations.
|
/mbedtls-development/include/psa/ |
A D | crypto.h | 2136 const uint8_t *plaintext, 2211 uint8_t *plaintext, 2824 uint8_t *plaintext,
|
/mbedtls-development/docs/ |
A D | getting_started.md | 211 uint8_t plaintext[block_size] = SOME_PLAINTEXT; 242 /* Encrypt the plaintext */ 253 status = psa_cipher_update(&operation, plaintext, sizeof(plaintext), 265 printf("Encrypted plaintext\n");
|
A D | 3.0-migration-guide.md | 765 infer upper bounds on the plaintext size of incoming and 805 set the maximum length of incoming and outgoing plaintext fragments, 810 the maximum incoming and outgoing plaintext fragment lengths, respectively.
|
/mbedtls-development/ |
A D | ChangeLog | 809 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused 907 plaintext after repeated timing measurements under some conditions. 1564 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing 1787 partially recover the plaintext of messages under some conditions by 1801 plaintext of messages under some conditions by using a cache attack 1811 to partially recover the plaintext of messages under some conditions (see 1993 * Return the plaintext data more quickly on unpadded CBC decryption, as
|