| /mbedtls/tests/scripts/ |
| A D | generate_tls13_compat_tests.py | 87 [cipher for cipher in ciphersuites if cipher not in self._ciphers]) 344 map(lambda cipher: self.CIPHER_SUITE[cipher], self._ciphers)) 478 def generate_compat_test(client=None, server=None, cipher=None, named_group=None, sig_alg=None): argument 483 client=client, server=server, cipher=cipher[4:], sig_alg=sig_alg, named_group=named_group) 485 server_object = SERVER_CLASSES[server](ciphersuite=cipher, 489 client_object = CLIENT_CLASSES[client](ciphersuite=cipher, 600 for client, server, cipher, named_group, sig_alg in \ 608 cipher=cipher, named_group=named_group, 652 cipher=args.cipher, named_group=args.named_group))
|
| /mbedtls/library/ |
| A D | psa_crypto_cipher.c | 296 mbedtls_cipher_init(&operation->ctx.cipher); in psa_cipher_setup() 306 ret = mbedtls_cipher_setup(&operation->ctx.cipher, cipher_info); in psa_cipher_setup() 317 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, in psa_cipher_setup() 323 ret = mbedtls_cipher_setkey(&operation->ctx.cipher, key_buffer, in psa_cipher_setup() 391 mbedtls_cipher_set_iv(&operation->ctx.cipher, in mbedtls_psa_cipher_set_iv() 513 (operation->ctx.cipher.unprocessed_len + input_length) in mbedtls_psa_cipher_update() 528 status = psa_cipher_update_ecb(&operation->ctx.cipher, in mbedtls_psa_cipher_update() 541 mbedtls_cipher_update(&operation->ctx.cipher, input, in mbedtls_psa_cipher_update() 559 if (operation->ctx.cipher.unprocessed_len != 0) { in mbedtls_psa_cipher_finish() 568 mbedtls_cipher_finish(&operation->ctx.cipher, in mbedtls_psa_cipher_finish() [all …]
|
| A D | gcm.c | 163 mbedtls_cipher_id_t cipher, in mbedtls_gcm_setkey() argument 176 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_gcm_setkey() 186 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_gcm_setkey() 1023 mbedtls_cipher_id_t cipher = MBEDTLS_CIPHER_ID_AES; in mbedtls_gcm_self_test() local 1060 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test() 1115 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test() 1154 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test() 1236 ret = mbedtls_gcm_setkey(&ctx, cipher, in mbedtls_gcm_self_test()
|
| A D | nist_kw.c | 52 mbedtls_cipher_id_t cipher, in mbedtls_nist_kw_setkey() argument 60 cipher_info = mbedtls_cipher_info_from_values(cipher, in mbedtls_nist_kw_setkey() 80 if (cipher != MBEDTLS_CIPHER_ID_AES) { in mbedtls_nist_kw_setkey()
|
| A D | ssl_ticket.c | 216 mbedtls_cipher_type_t cipher, in mbedtls_ssl_ticket_setup() argument 230 if (mbedtls_ssl_cipher_to_psa(cipher, TICKET_AUTH_TAG_BYTES, in mbedtls_ssl_ticket_setup() 239 cipher_info = mbedtls_cipher_info_from_type(cipher); in mbedtls_ssl_ticket_setup()
|
| A D | ccm.c | 53 mbedtls_cipher_id_t cipher, in mbedtls_ccm_setkey() argument 62 if ((ret = mbedtls_block_cipher_setup(&ctx->block_cipher_ctx, cipher)) != 0) { in mbedtls_ccm_setkey() 72 cipher_info = mbedtls_cipher_info_from_values(cipher, keybits, in mbedtls_ccm_setkey()
|
| A D | cipher_wrap.h | 76 mbedtls_cipher_id_t cipher; member
|
| /mbedtls/tests/suites/ |
| A D | test_suite_cmac.data | 32 CMAC init Camellia-128: wrong cipher 36 CMAC init Camellia-192: wrong cipher 40 CMAC init Camellia-256: wrong cipher 44 CMAC init #8 ARIA-128: wrong cipher 48 CMAC init #8 ARIA-192: wrong cipher 52 CMAC init #8 ARIA-256: wrong cipher
|
| A D | test_suite_pkcs12.function | 73 void pkcs12_pbe_encrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw, 79 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher; 128 void pkcs12_pbe_decrypt(int params_tag, int cipher, int md, data_t *params_hex, data_t *pw, 134 mbedtls_cipher_type_t cipher_alg = (mbedtls_cipher_type_t) cipher;
|
| A D | test_suite_cipher.function | 2 #include "mbedtls/cipher.h" 13 /* Check the internal consistency of a cipher info structure, and 560 void dec_empty_buf(int cipher, 785 data_t *iv, data_t *cipher, 825 TEST_ASSERT(0 == mbedtls_cipher_update(&ctx, cipher->x, cipher->len, output, &outlen)); 876 * key, cipher and tag can't be empty. */ 921 cipher_plus_tag_len = cipher->len + tag->len; 923 memcpy(cipher_plus_tag, cipher->x, cipher->len); 1020 TEST_ASSERT(outlen == cipher->len + tag->len); 1021 TEST_ASSERT(memcmp(encrypt_buf, cipher->x, cipher->len) == 0); [all …]
|
| A D | test_suite_psa_crypto_op_fail.generated.data | 5042 PSA cipher CCM: invalid with AES 5046 PSA cipher CCM: invalid with ARIA 5442 PSA cipher CFB: !CFB with AES 5446 PSA cipher CFB: !CFB with ARIA 5922 PSA cipher CMAC: invalid with AES 5962 PSA cipher CTR: !CTR with AES 5966 PSA cipher CTR: !CTR with ARIA 22106 PSA cipher GCM: invalid with AES 28726 PSA cipher OFB: !OFB with AES 41190 PSA cipher XTS: !XTS with AES [all …]
|
| A D | test_suite_psa_crypto_metadata.data | 372 Block cipher key type: AES 376 Block cipher key type: ARIA 380 Block cipher key type: DES 384 Block cipher key type: Camellia 388 Stream cipher key type: ChaCha20
|
| A D | test_suite_ssl_decrypt.misc.data | 1 Decrypt null cipher, MD5 5 Decrypt null cipher, SHA-1 9 Decrypt null cipher, SHA-256 13 Decrypt null cipher, SHA-384
|
| A D | test_suite_cmac.function | 2 #include "mbedtls/cipher.h" 29 /* Test NULL cipher info */
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | md-cipher-dispatch.md | 129 Symmetric ciphers and AEADs (before work on driver-only cipher): 139 * In principle: any cipher-mode (default padding), passed an 145 * Note: `cipher.h` exposed through API. 161 * Note: also called by `cipher.c` if enabled. 167 * Note: also called by `cipher.c` if enabled. 173 * Note: also called by `cipher.c` if enabled. 179 * Note: also called by `cipher.c` if enabled. 180 * Note: `cipher.h` exposed through API. 183 * potentially any cipher/AEAD in any mode and any direction 352 ### Dual-dispatch for block cipher primitives [all …]
|
| /mbedtls/programs/ |
| A D | CMakeLists.txt | 2 add_subdirectory(cipher)
|
| A D | Makefile | 34 cipher/cipher_aead_demo \ 153 cipher/cipher_aead_demo$(EXEXT): cipher/cipher_aead_demo.c $(DEP) 155 $(CC) $(LOCAL_CFLAGS) $(CFLAGS) cipher/cipher_aead_demo.c $(LOCAL_LDFLAGS) $(LDFLAGS) -o $@
|
| A D | .gitignore | 9 cipher/cipher_aead_demo
|
| /mbedtls/include/mbedtls/ |
| A D | nist_kw.h | 86 mbedtls_cipher_id_t cipher,
|
| A D | ssl_ticket.h | 126 mbedtls_cipher_type_t cipher,
|
| A D | gcm.h | 111 mbedtls_cipher_id_t cipher,
|
| A D | ccm.h | 124 mbedtls_cipher_id_t cipher,
|
| /mbedtls/include/psa/ |
| A D | crypto_builtin_primitives.h | 108 mbedtls_cipher_context_t MBEDTLS_PRIVATE(cipher);
|
| /mbedtls/docs/ |
| A D | psa-transition.md | 114 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o… 116 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o… 133 …tric encryption](#symmetric-encryption), [Authenticated cipher operations](#authenticated-cipher-o… 263 …ons take care of verifying the tag. See “[Authenticated cipher operations](#authenticated-cipher-o… 273 For modes that are based on a block cipher, the key type encodes the choice of block cipher: 280 * Unauthenticated cipher modes: 359 ### Unauthenticated cipher operations 361 Recall the workflow of an unauthenticated cipher operation in the legacy Mbed TLS cipher API: 384 ### Authenticated cipher operations 386 Recall the workflow of an authenticated cipher operation in the legacy Mbed TLS cipher API (or simi… [all …]
|
| A D | driver-only-builds.md | 372 is enabled, then only the corresponding cipher will be available at runtime 377 ciphers that are built-in - that is, both the underlying cipher 396 - In the legacy API, `MBEDTLS_CHACHA20_C` enables the ChaCha20 stream cipher, and 400 - The legacy symbol `MBEDTLS_CCM_C` adds support for both cipher and AEAD, 409 from PSA acceleration of the underlying block cipher by enabling support for
|