Home
last modified time | relevance | path

Searched refs:cipher (Results 1 – 25 of 59) sorted by relevance

123

/mbedtls/tests/scripts/
A Dgenerate_tls13_compat_tests.py87 [cipher for cipher in ciphersuites if cipher not in self._ciphers])
344 map(lambda cipher: self.CIPHER_SUITE[cipher], self._ciphers))
478 def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): argument
483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group)
485 server_object = SERVER_CLASSES[server](ciphersuite=cipher,
489 client_object = CLIENT_CLASSES[client](ciphersuite=cipher,
600 for client, server, cipher, named_group, sig_alg in \
608 cipher=cipher, named_group=named_group,
652 cipher=args.cipher, named_group=args.named_group))
/mbedtls/library/
A Dpsa_crypto_cipher.c296 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup()
306 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup()
317 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, in psa_cipher_setup()
323 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, key_buffer, in psa_cipher_setup()
391 mbedtls_cipher_set_iv(&operation->ctx.cipher, in mbedtls_psa_cipher_set_iv()
513 (operation->ctx.cipher.unprocessed_len + input_length) in mbedtls_psa_cipher_update()
528 status = psa_cipher_update_ecb(&operation->ctx.cipher, in mbedtls_psa_cipher_update()
541 mbedtls_cipher_update(&operation->ctx.cipher, input, in mbedtls_psa_cipher_update()
559 if (operation->ctx.cipher.unprocessed_len != 0) { in mbedtls_psa_cipher_finish()
568 mbedtls_cipher_finish(&operation->ctx.cipher, in mbedtls_psa_cipher_finish()
[all …]
A Dgcm.c163 mbedtls_cipher_id_t cipher, in mbedtls_gcm_setkey() argument
176 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_gcm_setkey()
186 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_gcm_setkey()
1023 mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES; in mbedtls_gcm_self_test() local
1060 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
1115 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
1154 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
1236 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
A Dnist_kw.c52 mbedtls_cipher_id_t cipher, in mbedtls_nist_kw_setkey() argument
60 cipher_info = mbedtls_cipher_info_from_values(cipher, in mbedtls_nist_kw_setkey()
80 if (cipher != MBEDTLS_CIPHER_ID_AES) { in mbedtls_nist_kw_setkey()
A Dssl_ticket.c216 mbedtls_cipher_type_t cipher, in mbedtls_ssl_ticket_setup() argument
230 if (mbedtls_ssl_cipher_to_psa(cipher, TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_setup()
239 cipher_info = mbedtls_cipher_info_from_type(cipher); in mbedtls_ssl_ticket_setup()
A Dccm.c53 mbedtls_cipher_id_t cipher, in mbedtls_ccm_setkey() argument
62 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_ccm_setkey()
72 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_ccm_setkey()
A Dcipher_wrap.h76 mbedtls_cipher_id_t cipher; member
/mbedtls/tests/suites/
A Dtest_suite_cmac.data32 CMAC init Camellia-128: wrong cipher
36 CMAC init Camellia-192: wrong cipher
40 CMAC init Camellia-256: wrong cipher
44 CMAC init #8 ARIA-128: wrong cipher
48 CMAC init #8 ARIA-192: wrong cipher
52 CMAC init #8 ARIA-256: wrong cipher
A Dtest_suite_pkcs12.function73 void pkcs12_pbe_encrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw,
79 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher;
128 void pkcs12_pbe_decrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw,
134 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher;
A Dtest_suite_cipher.function2 #include "mbedtls/cipher.h"
13 /* Check the internal consistency of a cipher info structure, and
560 void dec_empty_buf(int cipher,
785 data_t *iv, data_t *cipher,
825 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx, cipher->x, cipher->len, output, &outlen));
876 * key, cipher and tag can't be empty. */
921 cipher_plus_tag_len = cipher->len + tag->len;
923 memcpy(cipher_plus_tag, cipher->x, cipher->len);
1020 TEST_ASSERT(outlen == cipher->len + tag->len);
1021 TEST_ASSERT(memcmp(encrypt_buf, cipher->x, cipher->len) == 0);
[all …]
A Dtest_suite_psa_crypto_op_fail.generated.data5042 PSA cipher CCM: invalid with AES
5046 PSA cipher CCM: invalid with ARIA
5442 PSA cipher CFB: !CFB with AES
5446 PSA cipher CFB: !CFB with ARIA
5922 PSA cipher CMAC: invalid with AES
5962 PSA cipher CTR: !CTR with AES
5966 PSA cipher CTR: !CTR with ARIA
22106 PSA cipher GCM: invalid with AES
28726 PSA cipher OFB: !OFB with AES
41190 PSA cipher XTS: !XTS with AES
[all …]
A Dtest_suite_psa_crypto_metadata.data372 Block cipher key type: AES
376 Block cipher key type: ARIA
380 Block cipher key type: DES
384 Block cipher key type: Camellia
388 Stream cipher key type: ChaCha20
A Dtest_suite_ssl_decrypt.misc.data1 Decrypt null cipher, MD5
5 Decrypt null cipher, SHA-1
9 Decrypt null cipher, SHA-256
13 Decrypt null cipher, SHA-384
A Dtest_suite_cmac.function2 #include "mbedtls/cipher.h"
29 /* Test NULL cipher info */
/mbedtls/docs/architecture/psa-migration/
A Dmd-cipher-dispatch.md129 Symmetric ciphers and AEADs (before work on driver-only cipher):
139 * In principle: any cipher-mode (default padding), passed an
145 * Note: `cipher.h` exposed through API.
161 * Note: also called by `cipher.c` if enabled.
167 * Note: also called by `cipher.c` if enabled.
173 * Note: also called by `cipher.c` if enabled.
179 * Note: also called by `cipher.c` if enabled.
180 * Note: `cipher.h` exposed through API.
183 * potentially any cipher/AEAD in any mode and any direction
352 ### Dual-dispatch for block cipher primitives
[all …]
/mbedtls/programs/
A DCMakeLists.txt2 add_subdirectory(cipher)
A DMakefile34 cipher/cipher_aead_demo \
153 cipher/cipher_aead_demo$(EXEXT): cipher/cipher_aead_demo.c $(DEP)
155 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) cipher/cipher_aead_demo.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
A D.gitignore9 cipher/cipher_aead_demo
/mbedtls/include/mbedtls/
A Dnist_kw.h86 mbedtls_cipher_id_t cipher,
A Dssl_ticket.h126 mbedtls_cipher_type_t cipher,
A Dgcm.h111 mbedtls_cipher_id_t cipher,
A Dccm.h124 mbedtls_cipher_id_t cipher,
/mbedtls/include/psa/
A Dcrypto_builtin_primitives.h108 mbedtls_cipher_context_t MBEDTLS_PRIVATE(cipher);
/mbedtls/docs/
A Dpsa-transition.md114 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o…
116 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o…
133 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o…
263 …ons take care of verifying the tag. See “[Authenticated cipher operations](#authenticated-cipher-o…
273 For modes that are based on a block cipher, the key type encodes the choice of block cipher:
280 * Unauthenticated cipher modes:
359 ### Unauthenticated cipher operations
361 Recall the workflow of an unauthenticated cipher operation in the legacy Mbed TLS cipher API:
384 ### Authenticated cipher operations
386 Recall the workflow of an authenticated cipher operation in the legacy Mbed TLS cipher API (or simi…
[all …]
A Ddriver-only-builds.md372 is enabled, then only the corresponding cipher will be available at runtime
377 ciphers that are built-in - that is, both the underlying cipher
396 - In the legacy API, `MBEDTLS_CHACHA20_C` enables the ChaCha20 stream cipher, and
400 - The legacy symbol `MBEDTLS_CCM_C` adds support for both cipher and AEAD,
409 from PSA acceleration of the underlying block cipher by enabling support for

Completed in 153 milliseconds

123