Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 25 of 26) sorted by relevance

12

/lib/mbedtls/external/mbedtls/library/
A Dpsa_crypto_aead.c121 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_encrypt() argument
178 nonce, in mbedtls_psa_aead_encrypt()
188 (void) nonce; in mbedtls_psa_aead_encrypt()
233 const uint8_t *nonce, size_t nonce_length, in mbedtls_psa_aead_decrypt() argument
289 nonce, in mbedtls_psa_aead_decrypt()
298 (void) nonce; in mbedtls_psa_aead_decrypt()
364 const uint8_t *nonce, in mbedtls_psa_aead_set_nonce() argument
375 nonce, in mbedtls_psa_aead_set_nonce()
385 nonce, in mbedtls_psa_aead_set_nonce()
402 nonce, in mbedtls_psa_aead_set_nonce()
[all …]
A Dchachapoly.c105 const unsigned char nonce[12], in mbedtls_chachapoly_starts()
112 ret = mbedtls_chacha20_starts(&ctx->chacha20_ctx, nonce, 0U); in mbedtls_chachapoly_starts()
247 const unsigned char nonce[12], in chachapoly_crypt_and_tag()
256 ret = mbedtls_chachapoly_starts(ctx, nonce, mode); in chachapoly_crypt_and_tag()
279 const unsigned char nonce[12], in mbedtls_chachapoly_encrypt_and_tag()
287 length, nonce, aad, aad_len, in mbedtls_chachapoly_encrypt_and_tag()
293 const unsigned char nonce[12], in mbedtls_chachapoly_auth_decrypt()
305 MBEDTLS_CHACHAPOLY_DECRYPT, length, nonce, in mbedtls_chachapoly_auth_decrypt()
A Dchacha20.c182 const unsigned char nonce[12], in mbedtls_chacha20_starts()
189 ctx->state[13] = MBEDTLS_GET_UINT32_LE(nonce, 0); in mbedtls_chacha20_starts()
190 ctx->state[14] = MBEDTLS_GET_UINT32_LE(nonce, 4); in mbedtls_chacha20_starts()
191 ctx->state[15] = MBEDTLS_GET_UINT32_LE(nonce, 8); in mbedtls_chacha20_starts()
246 const unsigned char nonce[12], in mbedtls_chacha20_crypt()
262 ret = mbedtls_chacha20_starts(&ctx, nonce, counter); in mbedtls_chacha20_crypt()
A Dpsa_crypto_aead.h71 const uint8_t *nonce, size_t nonce_length,
134 const uint8_t *nonce, size_t nonce_length,
255 const uint8_t *nonce,
A Dpsa_crypto_driver_wrappers.h1717 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_encrypt() argument
1737 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt()
1751 nonce, nonce_length, in psa_driver_wrapper_aead_encrypt()
1769 const uint8_t *nonce, size_t nonce_length, in psa_driver_wrapper_aead_decrypt() argument
1789 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt()
1803 nonce, nonce_length, in psa_driver_wrapper_aead_decrypt()
1917 const uint8_t *nonce, in psa_driver_wrapper_aead_set_nonce() argument
1925 nonce, in psa_driver_wrapper_aead_set_nonce()
1935 nonce, nonce_length ) ); in psa_driver_wrapper_aead_set_nonce()
1943 (void)nonce; in psa_driver_wrapper_aead_set_nonce()
A Dpsa_crypto.c4743 LOCAL_INPUT_DECLARE(nonce_external, nonce); in psa_aead_encrypt()
4774 nonce, nonce_length, in psa_aead_encrypt()
4784 LOCAL_INPUT_FREE(nonce_external, nonce); in psa_aead_encrypt()
4809 LOCAL_INPUT_DECLARE(nonce_external, nonce); in psa_aead_decrypt()
4841 nonce, nonce_length, in psa_aead_decrypt()
4851 LOCAL_INPUT_FREE(nonce_external, nonce); in psa_aead_decrypt()
5037 LOCAL_OUTPUT_DECLARE(nonce_external, nonce); in psa_aead_generate_nonce()
5078 memcpy(nonce, local_nonce, required_nonce_size); in psa_aead_generate_nonce()
5084 LOCAL_OUTPUT_FREE(nonce_external, nonce); in psa_aead_generate_nonce()
5097 LOCAL_INPUT_DECLARE(nonce_external, nonce); in psa_aead_set_nonce()
[all …]
/lib/mbedtls/external/mbedtls/tests/src/drivers/
A Dtest_driver_aead.c29 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_encrypt() argument
47 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt()
56 nonce, nonce_length, in mbedtls_test_transparent_aead_encrypt()
65 (void) nonce; in mbedtls_test_transparent_aead_encrypt()
85 const uint8_t *nonce, size_t nonce_length, in mbedtls_test_transparent_aead_decrypt() argument
103 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt()
112 nonce, nonce_length, in mbedtls_test_transparent_aead_decrypt()
121 (void) nonce; in mbedtls_test_transparent_aead_decrypt()
212 const uint8_t *nonce, in mbedtls_test_transparent_aead_set_nonce() argument
227 mbedtls_psa_aead_set_nonce(operation, nonce, nonce_length); in mbedtls_test_transparent_aead_set_nonce()
[all …]
/lib/mbedtls/external/mbedtls/tests/suites/
A Dtest_suite_chachapoly.function83 unsigned char nonce[12];
93 memset(nonce, 0x00, sizeof(nonce));
121 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
133 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
145 TEST_ASSERT(mbedtls_chachapoly_starts(&ctx, nonce, MBEDTLS_CHACHAPOLY_ENCRYPT)
A Dtest_suite_ctr_drbg.function32 static void ctr_drbg_validate_internal(int reseed_mode, data_t *nonce,
48 /* CTR_DRBG_Instantiate(entropy[:entropy->len], nonce, perso, <ignored>)
49 * where nonce||perso = nonce[nonce->len] */
55 nonce->x, nonce->len) == 0);
218 /*nonce*/ MBEDTLS_CTR_DRBG_ENTROPY_NONCE_LEN +
232 * for the entropy input and byte_strength/2 bytes for a nonce. */
A Dtest_suite_psa_crypto.function455 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
459 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
461 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
5080 nonce->x, nonce->len,
5109 nonce->x, nonce->len,
5169 nonce->x, nonce->len,
5239 nonce->x, nonce->len,
5738 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
6044 TEST_EQUAL(psa_aead_set_nonce(&operation, nonce->x, nonce->len),
6192 TEST_EQUAL(psa_aead_set_nonce(&operation, nonce->x, nonce->len),
[all …]
A Dtest_suite_psa_crypto_init.function17 * once for the initial entropy and once for a nonce. The nonce length is
25 * and once for a nonce. */
A Dtest_suite_psa_crypto_init.data43 Fake entropy: not enough for a nonce
A Dtest_suite_psa_crypto_driver_wrappers.function1652 data_t *nonce,
1693 nonce->x, nonce->len,
1720 data_t *nonce,
1755 nonce->x, nonce->len,
2773 data_t *nonce,
2830 /* Set the nonce. */
2831 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
2890 data_t *nonce,
2937 PSA_ASSERT(psa_aead_set_nonce(&operation, nonce->x, nonce->len));
A Dtest_suite_psa_crypto.data2910 PSA AEAD decrypt: AES-CCM, invalid nonce length 6
2914 PSA AEAD decrypt: AES-CCM, invalid nonce length 14
2918 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 6
2922 PSA AEAD decrypt: AES-CCM_8, invalid nonce length 14
2934 PSA AEAD encrypt/decrypt, AES-GCM, 19 bytes, 12 byte nonce , 1
2938 PSA AEAD encrypt/decrypt, AES GCM, 19 bytes, 12 byte nonce , 2
3078 PSA AEAD decrypt: AES-GCM, nonce=0 (bad)
3082 PSA AEAD decrypt: AES-GCM, nonce=0 (bad), TAG=12
3190 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=8, not supported)
3194 PSA AEAD decrypt: ChaCha20-Poly1305 (nonce=11, too short)
[all …]
A Dtest_suite_hmac_drbg.function69 /* default_entropy_len of entropy, plus half as much for the nonce */
/lib/mbedtls/external/mbedtls/include/mbedtls/
A Dchachapoly.h155 const unsigned char nonce[12],
287 const unsigned char nonce[12],
321 const unsigned char nonce[12],
A Dchacha20.h116 const unsigned char nonce[12],
182 const unsigned char nonce[12],
/lib/mbedtls/external/mbedtls/tests/include/test/drivers/
A Daead.h51 const uint8_t *nonce, size_t nonce_length,
60 const uint8_t *nonce, size_t nonce_length,
79 const uint8_t *nonce,
/lib/mbedtls/external/mbedtls/include/psa/
A Dcrypto.h2108 const uint8_t *nonce,
2181 const uint8_t *nonce,
2403 uint8_t *nonce,
2443 const uint8_t *nonce,
/lib/mbedtls/external/mbedtls/scripts/data_files/driver_templates/
A Dpsa_crypto_driver_wrappers.h.jinja1680 const uint8_t *nonce, size_t nonce_length,
1700 nonce, nonce_length,
1714 nonce, nonce_length,
1732 const uint8_t *nonce, size_t nonce_length,
1752 nonce, nonce_length,
1766 nonce, nonce_length,
1880 const uint8_t *nonce,
1888 nonce,
1898 nonce, nonce_length ) );
1906 (void)nonce;
/lib/mbedtls/external/mbedtls/tests/src/
A Dpsa_exercise_key.c268 unsigned char nonce[PSA_AEAD_NONCE_MAX_SIZE] = { 0 }; in exercise_aead_key() local
289 nonce, nonce_length, in exercise_aead_key()
307 nonce, nonce_length, in exercise_aead_key()
/lib/mbedtls/external/mbedtls/docs/
A Dpsa-transition.md329 | `mbedtls_cipher_info_get_block_size` | not available (use specific macros for the IV, nonce or ta…
390 3. Set the nonce with `mbedtls_cipher_set_iv` (or the `starts` function for low-level modules). For…
400nonce of the default size (indicated by [`PSA_AEAD_NONCE_LENGTH`](https://mbed-tls.readthedocs.io/…
407nonce, use [`psa_aead_generate_nonce`](https://mbed-tls.readthedocs.io/projects/api/en/development…
A D3.0-migration-guide.md238 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). Call the new function `mbedtls_…
248 * `mbedtls_gcm_starts()` now only sets the mode and the nonce (IV). The new function `mbedtls_gcm_u…
/lib/mbedtls/external/mbedtls/docs/architecture/
A Dpsa-shared-memory.md174 … what about IV/nonce inputs? They are typically small, but don't necessarily have a static size li…
224 * Cipher/AEAD IV/nonce (to be confirmed).
/lib/mbedtls/external/mbedtls/
A DChangeLog1441 * Indicate in the error returned if the nonce length used with
1760 learn partial information about the leading bits of the nonce used for the
1869 maximum nonce length returned by psa_aead_generate_nonce().
1970 nonce from entropy. Applications were affected if they called
1974 In such cases, a random nonce was necessary to achieve the advertised
1976 entropy from the nonce.
2533 entropy function to obtain entropy for a nonce if the entropy size is less
2536 nonce length to 0.
2570 * The CTR_DRBG module can grab a nonce from the entropy source during the
2571 initial seeding. The default nonce length is chosen based on the key size

Completed in 133 milliseconds

12