| /lib/mbedtls/external/mbedtls/library/ |
| A D | psa_crypto_aead.c | 121 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_encrypt() argument 178 nonce, in mbedtls_psa_aead_encrypt() 188 (void) nonce; in mbedtls_psa_aead_encrypt() 233 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_decrypt() argument 289 nonce, in mbedtls_psa_aead_decrypt() 298 (void) nonce; in mbedtls_psa_aead_decrypt() 364 const uint8_t *nonce, in mbedtls_psa_aead_set_nonce() argument 375 nonce, in mbedtls_psa_aead_set_nonce() 385 nonce, in mbedtls_psa_aead_set_nonce() 402 nonce, in mbedtls_psa_aead_set_nonce() [all …]
|
| A D | chachapoly.c | 105 const unsigned char nonce[12], in mbedtls_chachapoly_starts() 112 ret = mbedtls_chacha20_starts(&ctx->chacha20_ctx, nonce, 0U); in mbedtls_chachapoly_starts() 247 const unsigned char nonce[12], in chachapoly_crypt_and_tag() 256 ret = mbedtls_chachapoly_starts(ctx, nonce, mode); in chachapoly_crypt_and_tag() 279 const unsigned char nonce[12], in mbedtls_chachapoly_encrypt_and_tag() 287 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag() 293 const unsigned char nonce[12], in mbedtls_chachapoly_auth_decrypt() 305 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce, in mbedtls_chachapoly_auth_decrypt()
|
| A D | chacha20.c | 182 const unsigned char nonce[12], in mbedtls_chacha20_starts() 189 ctx->state[13] = MBEDTLS_GET_UINT32_LE(nonce, 0); in mbedtls_chacha20_starts() 190 ctx->state[14] = MBEDTLS_GET_UINT32_LE(nonce, 4); in mbedtls_chacha20_starts() 191 ctx->state[15] = MBEDTLS_GET_UINT32_LE(nonce, 8); in mbedtls_chacha20_starts() 246 const unsigned char nonce[12], in mbedtls_chacha20_crypt() 262 ret = mbedtls_chacha20_starts(&ctx, nonce, counter); in mbedtls_chacha20_crypt()
|
| A D | psa_crypto_aead.h | 71 const uint8_t *nonce, size_t nonce_length, 134 const uint8_t *nonce, size_t nonce_length, 255 const uint8_t *nonce,
|
| A D | psa_crypto_driver_wrappers.h | 1717 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_encrypt() argument 1737 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt() 1751 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt() 1769 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_decrypt() argument 1789 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt() 1803 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt() 1917 const uint8_t *nonce, in psa_driver_wrapper_aead_set_nonce() argument 1925 nonce, in psa_driver_wrapper_aead_set_nonce() 1935 nonce, nonce_length ) ); in psa_driver_wrapper_aead_set_nonce() 1943 (void)nonce; in psa_driver_wrapper_aead_set_nonce()
|
| A D | psa_crypto.c | 4743 LOCAL_INPUT_DECLARE(nonce_external, nonce); in psa_aead_encrypt() 4774 nonce, nonce_length, in psa_aead_encrypt() 4784 LOCAL_INPUT_FREE(nonce_external, nonce); in psa_aead_encrypt() 4809 LOCAL_INPUT_DECLARE(nonce_external, nonce); in psa_aead_decrypt() 4841 nonce, nonce_length, in psa_aead_decrypt() 4851 LOCAL_INPUT_FREE(nonce_external, nonce); in psa_aead_decrypt() 5037 LOCAL_OUTPUT_DECLARE(nonce_external, nonce); in psa_aead_generate_nonce() 5078 memcpy(nonce, local_nonce, required_nonce_size); in psa_aead_generate_nonce() 5084 LOCAL_OUTPUT_FREE(nonce_external, nonce); in psa_aead_generate_nonce() 5097 LOCAL_INPUT_DECLARE(nonce_external, nonce); in psa_aead_set_nonce() [all …]
|
| /lib/mbedtls/external/mbedtls/tests/src/drivers/ |
| A D | test_driver_aead.c | 29 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_encrypt() argument 47 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt() 56 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt() 65 (void) nonce; in mbedtls_test_transparent_aead_encrypt() 85 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_decrypt() argument 103 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt() 112 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt() 121 (void) nonce; in mbedtls_test_transparent_aead_decrypt() 212 const uint8_t *nonce, in mbedtls_test_transparent_aead_set_nonce() argument 227 mbedtls_psa_aead_set_nonce(operation, nonce, nonce_length); in mbedtls_test_transparent_aead_set_nonce() [all …]
|
| /lib/mbedtls/external/mbedtls/tests/suites/ |
| A D | test_suite_chachapoly.function | 83 unsigned char nonce[12]; 93 memset(nonce, 0x00, sizeof(nonce)); 121 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT) 133 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT) 145 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
|
| A D | test_suite_ctr_drbg.function | 32 static void ctr_drbg_validate_internal(int reseed_mode, data_t *nonce, 48 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>) 49 * where nonce||perso = nonce[nonce->len] */ 55 nonce->x, nonce->len) == 0); 218 /*nonce*/ MBEDTLS_CTR_DRBG_ENTROPY_NONCE_LEN + 232 * for the entropy input and byte_strength/2 bytes for a nonce. */
|
| A D | test_suite_psa_crypto.function | 455 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 459 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 461 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 5080 nonce->x, nonce->len, 5109 nonce->x, nonce->len, 5169 nonce->x, nonce->len, 5239 nonce->x, nonce->len, 5738 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 6044 TEST_EQUAL(psa_aead_set_nonce(&operation, nonce->x, nonce->len), 6192 TEST_EQUAL(psa_aead_set_nonce(&operation, nonce->x, nonce->len), [all …]
|
| A D | test_suite_psa_crypto_init.function | 17 * once for the initial entropy and once for a nonce. The nonce length is 25 * and once for a nonce. */
|
| A D | test_suite_psa_crypto_init.data | 43 Fake entropy: not enough for a nonce
|
| A D | test_suite_psa_crypto_driver_wrappers.function | 1652 data_t *nonce, 1693 nonce->x, nonce->len, 1720 data_t *nonce, 1755 nonce->x, nonce->len, 2773 data_t *nonce, 2830 /* Set the nonce. */ 2831 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len)); 2890 data_t *nonce, 2937 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
|
| A D | test_suite_psa_crypto.data | 2910 PSA AEAD decrypt: AES-CCM, invalid nonce length 6 2914 PSA AEAD decrypt: AES-CCM, invalid nonce length 14 2918 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 6 2922 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 14 2934 PSA AEAD encrypt/decrypt, AES-GCM, 19 bytes, 12 byte nonce , 1 2938 PSA AEAD encrypt/decrypt, AES GCM, 19 bytes, 12 byte nonce , 2 3078 PSA AEAD decrypt: AES-GCM, nonce=0 (bad) 3082 PSA AEAD decrypt: AES-GCM, nonce=0 (bad), TAG=12 3190 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=8, not supported) 3194 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=11, too short) [all …]
|
| A D | test_suite_hmac_drbg.function | 69 /* default_entropy_len of entropy, plus half as much for the nonce */
|
| /lib/mbedtls/external/mbedtls/include/mbedtls/ |
| A D | chachapoly.h | 155 const unsigned char nonce[12], 287 const unsigned char nonce[12], 321 const unsigned char nonce[12],
|
| A D | chacha20.h | 116 const unsigned char nonce[12], 182 const unsigned char nonce[12],
|
| /lib/mbedtls/external/mbedtls/tests/include/test/drivers/ |
| A D | aead.h | 51 const uint8_t *nonce, size_t nonce_length, 60 const uint8_t *nonce, size_t nonce_length, 79 const uint8_t *nonce,
|
| /lib/mbedtls/external/mbedtls/include/psa/ |
| A D | crypto.h | 2108 const uint8_t *nonce, 2181 const uint8_t *nonce, 2403 uint8_t *nonce, 2443 const uint8_t *nonce,
|
| /lib/mbedtls/external/mbedtls/scripts/data_files/driver_templates/ |
| A D | psa_crypto_driver_wrappers.h.jinja | 1680 const uint8_t *nonce, size_t nonce_length, 1700 nonce, nonce_length, 1714 nonce, nonce_length, 1732 const uint8_t *nonce, size_t nonce_length, 1752 nonce, nonce_length, 1766 nonce, nonce_length, 1880 const uint8_t *nonce, 1888 nonce, 1898 nonce, nonce_length ) ); 1906 (void)nonce;
|
| /lib/mbedtls/external/mbedtls/tests/src/ |
| A D | psa_exercise_key.c | 268 unsigned char nonce[PSA_AEAD_NONCE_MAX_SIZE] = { 0 }; in exercise_aead_key() local 289 nonce, nonce_length, in exercise_aead_key() 307 nonce, nonce_length, in exercise_aead_key()
|
| /lib/mbedtls/external/mbedtls/docs/ |
| A D | psa-transition.md | 329 | `mbedtls_cipher_info_get_block_size` | not available (use specific macros for the IV, nonce or ta… 390 3. Set the nonce with `mbedtls_cipher_set_iv` (or the `starts` function for low-level modules). For… 400 …nonce of the default size (indicated by [`PSA_AEAD_NONCE_LENGTH`](https://mbed-tls.readthedocs.io/… 407 …nonce, use [`psa_aead_generate_nonce`](https://mbed-tls.readthedocs.io/projects/api/en/development…
|
| A D | 3.0-migration-guide.md | 238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_… 248 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u…
|
| /lib/mbedtls/external/mbedtls/docs/architecture/ |
| A D | psa-shared-memory.md | 174 … what about IV/nonce inputs? They are typically small, but don't necessarily have a static size li… 224 * Cipher/AEAD IV/nonce (to be confirmed).
|
| /lib/mbedtls/external/mbedtls/ |
| A D | ChangeLog | 1441 * Indicate in the error returned if the nonce length used with 1760 learn partial information about the leading bits of the nonce used for the 1869 maximum nonce length returned by psa_aead_generate_nonce(). 1970 nonce from entropy. Applications were affected if they called 1974 In such cases, a random nonce was necessary to achieve the advertised 1976 entropy from the nonce. 2533 entropy function to obtain entropy for a nonce if the entropy size is less 2536 nonce length to 0. 2570 * The CTR_DRBG module can grab a nonce from the entropy source during the 2571 initial seeding. The default nonce length is chosen based on the key size
|