| /mbedtls/tests/suites/ |
| A D | test_suite_ccm.data | 57 CCM* encrypt and tag #1 61 CCM* encrypt and tag #2 65 CCM* encrypt and tag #3 81 CCM encrypt and tag RFC 3610 #1 85 CCM encrypt and tag RFC 3610 #2 89 CCM encrypt and tag RFC 3610 #3 93 CCM encrypt and tag RFC 3610 #4 97 CCM encrypt and tag RFC 3610 #5 101 CCM encrypt and tag RFC 3610 #6 105 CCM encrypt and tag RFC 3610 #7 [all …]
|
| A D | test_suite_psa_crypto_driver_wrappers.data | 334 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, good 338 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, good 350 PSA symmetric encrypt multipart: AES-CTR, 16 bytes, fake 354 PSA symmetric encrypt multipart: AES-CTR, 15 bytes, fake 458 PSA AEAD encrypt: AES-CCM, 24 bytes 462 PSA AEAD encrypt: AES-CCM, 24 bytes, fallback 466 PSA AEAD encrypt: AES-CCM, 24 bytes, INSUFFICIENT_MEMORY 470 PSA AEAD encrypt, AES-GCM, 128 bytes #1 474 PSA AEAD encrypt, AES-GCM, 128 bytes #1, fallback 800 PSA AEAD encrypt setup, AES-GCM, 128 bytes #1 [all …]
|
| A D | test_suite_psa_crypto.data | 936 PSA key policy: AEAD, encrypt | decrypt 2238 PSA cipher encrypt: invalid key type 2563 PSA symmetric encrypt/decrypt: AES-CTR 2810 PSA AEAD encrypt: AES-CCM, 23 bytes 2814 PSA AEAD encrypt: AES-CCM, 24 bytes 5046 PSA encrypt: RSA PKCS#1 v1.5, good 5050 PSA encrypt: RSA OAEP-SHA-256, good 5058 PSA encrypt: RSA OAEP-SHA-384, good 5086 PSA encrypt: invalid algorithm 5102 PSA encrypt-decrypt: RSA OAEP-SHA-256 [all …]
|
| A D | test_suite_block_cipher.function | 45 /* encrypt() before successful setup() */ 85 * (Also, encrypting again ensures the previous call to encrypt()
|
| A D | test_suite_aes.function | 22 // Set key and encrypt with original context 118 // encrypt 176 // encrypt in multiple steps of varying size
|
| A D | test_suite_psa_crypto_driver_wrappers.function | 1473 * Test encrypt failure 1501 /* Test setup call, encrypt */ 2544 /* We test encryption by checking that encrypt-then-decrypt gives back 2837 * set length (additional data and data to encrypt) */ 2851 /* Pass the data to encrypt */
|
| A D | test_suite_pk.function | 719 /* unsupported operations: verify, decrypt, encrypt */ 1735 * Test it against the public operations (encrypt, verify) of a
|
| A D | test_suite_ssl.function | 1362 * 1) Try to encrypt with 0, 1, 2, ... bytes available 1366 * 2) Try to encrypt with 0, 1, 2, ... bytes available 1370 * 3) Try to encrypt with 0, 1, 2, ... bytes available
|
| A D | test_suite_pk.data | 453 RSA encrypt-decrypt test PKCS1 v1.5 457 RSA encrypt-decrypt test PKCS1 v2.1
|
| A D | test_suite_psa_crypto.function | 339 * \param input_data Data to encrypt / decrypt 602 * \param input_data Data to encrypt / decrypt 3983 /* Call encrypt setup twice in a row. */ 6587 * lengths for them. (encrypt) */ 8587 /* We test encryption by checking that encrypt-then-decrypt gives back
|
| /mbedtls/programs/psa/ |
| A D | crypto_examples.c | 161 uint8_t encrypt[block_size]; in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() local 178 encrypt, sizeof(encrypt), &output_len); in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 182 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_nopad_1_block() 210 encrypt[input_size + block_size], decrypt[input_size + block_size]; in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() local 226 encrypt, sizeof(encrypt), &output_len); in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 230 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_cbc_pkcs7_multi() 256 uint8_t iv[block_size], input[input_size], encrypt[input_size], in cipher_example_encrypt_decrypt_aes_ctr_multi() local 273 encrypt, sizeof(encrypt), &output_len); in cipher_example_encrypt_decrypt_aes_ctr_multi() 277 encrypt, output_len, part_size, in cipher_example_encrypt_decrypt_aes_ctr_multi()
|
| /mbedtls/programs/ |
| A D | README.md | 26 …crypt.c): loads a PEM or DER public/private key file and uses the key to encrypt/decrypt a short s… 34 ….c`](pkey/rsa_decrypt.c): loads an RSA public/private key and uses it to encrypt/decrypt a short s…
|
| /mbedtls/docs/architecture/psa-migration/ |
| A D | psa-legacy-bridges.md | 56 * Cryptographic operations: hash, sign, encrypt, etc. 284 …_ANY_HASH)` for a sign/verify usage, and `PSA_ALG_RSA_PKCS1V15_CRYPT` for an encrypt/decrypt usage. 285 …_ANY_HASH)` for a sign/verify usage, and `PSA_ALG_RSA_OAEP(hash)` for an encrypt/decrypt usage whe… 311 …a_get_key_algorithm`) if that is a matching operation type (sign/verify, encrypt/decrypt), but wit… 313 …* For an RSA key, the output key will allow both encrypt/decrypt and sign/verify regardless of the…
|
| A D | md-cipher-dispatch.md | 148 * 3DES or DES in CBC mode with PKCS7 padding, both encrypt and decrypt. 153 * AES in ECB mode, encrypt only. 158 * AES, Camellia or Aria in ECB mode, encrypt only. 164 * AES or DES in ECB mode, encrypt only. 170 * AES, Camellia or Aria in ECB mode, encrypt only. 354 …d CTR-DRBG. All three of them use the block cipher primitive only in the encrypt direction. Curren…
|
| /mbedtls/docs/architecture/ |
| A D | psa-shared-memory.md | 47 …er an RPC to perform authenticated encryption, using a mechanism with an encrypt-and-MAC structure… 84 … This is a security violation if the key policy only allowed the client to encrypt, not to decrypt. 190 …with an encrypt-and-authenticate or authenticate-then-encrypt structure (one read to calculate the… 191 * when decrypting with an encrypt-then-authenticate structure (one read to decrypt and one read to …
|
| /mbedtls/docs/ |
| A D | psa-transition.md | 371 …/en/development/api/file/crypto__sizes_8h/#c.PSA_CIPHER_IV_LENGTH)). (To encrypt with a specified … 400 …GTH)), with the authentication tag written at the end of the output. (To encrypt with a specified … 1019 …dtls_rsa_rsaes_pkcs1_v15_encrypt` or `mbedtls_rsa_rsaes_oaep_encrypt` to encrypt a short message (… 1031 This is the mechanism used by the PK functions and by `mbedtls_rsa_pkcs1_{encrypt,decrypt}` unless … 1032 This is also the mechanism used by `mbedtls_rsa_rsaes_pkcs1_v15_{encrypt,decrypt}`. 1040 This is the mechanism used by `mbedtls_rsa_rsaes_oaep_{encrypt,decrypt}`.
|
| A D | 3.0-migration-guide.md | 287 This affects all users who use the RSA encrypt, decrypt, sign and 365 This affects all users who use the RSA encrypt, decrypt, sign and
|
| /mbedtls/docs/proposed/ |
| A D | psa-conditional-inclusion-c.md | 42 [Limitation.direction] For mechanisms that have multiple directions (for example encrypt/decrypt, s…
|
| A D | psa-driver-interface.md | 1416 …he persistent state at arbitrary times is to renew a key that is used to encrypt communications be…
|
| /mbedtls/tests/data_files/ |
| A D | Makefile | 2023 …$(OPENSSL) smime -encrypt -aes256 -in pkcs7_data.bin -binary -outform DER -out $@ pkcs7-rsa-sha256…
|
| /mbedtls/ |
| A D | ChangeLog | 217 encrypt/decrypt functions returned an error. Fixes #8824. 1827 (when the encrypt-then-MAC extension is not in use) with some ALT 2809 either used both encrypt and decrypt key schedules, or which perform padding.
|