/third_party/openssl/test/ |
D | igetest.c | 222 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_dec() local 227 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec() 231 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_dec() 240 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_chaining() local 245 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining() 248 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, in test_ige_enc_chaining() 253 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_chaining() 262 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_dec_chaining() local 267 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining() 270 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, in test_ige_dec_chaining() [all …]
|
D | modes_internal_test.c | 188 unsigned char cleartext[64], ciphertext[64], vector[64]; in execute_cts128() local 197 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len, in execute_cts128() 200 || !TEST_mem_eq(ciphertext, len, vector, len) in execute_cts128() 206 size = fixture->decrypt_block(ciphertext, cleartext, len, in execute_cts128() 216 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len, in execute_cts128() 220 || !TEST_mem_eq(ciphertext, len, vector, len) in execute_cts128() 226 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len, in execute_cts128()
|
D | evp_extra_test.c | 966 unsigned char ciphertext[32], plaintext[16]; in test_EVP_Enveloped() local 974 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, in test_EVP_Enveloped() 976 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, in test_EVP_Enveloped() 984 ciphertext, ciphertext_len)) in test_EVP_Enveloped() 1276 uint8_t ciphertext[128]; in test_EVP_SM2() local 1277 size_t ctext_len = sizeof(ciphertext); in test_EVP_SM2() 1363 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, sizeof(kMsg)))) in test_EVP_SM2() 1369 if (!TEST_true(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, ctext_len))) in test_EVP_SM2() 1675 unsigned char ciphertext[80]; in test_decrypt_null_chunks() local 1685 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg, in test_decrypt_null_chunks() [all …]
|
/third_party/mbedtls/library/ |
D | psa_crypto_aead.c | 148 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in mbedtls_psa_aead_encrypt() argument 167 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt() 178 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 192 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 212 ciphertext, in mbedtls_psa_aead_encrypt() 242 const uint8_t *ciphertext, in psa_aead_unpadded_locate_tag() argument 253 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag() 263 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_psa_aead_decrypt() argument 277 ciphertext, ciphertext_length, in mbedtls_psa_aead_decrypt() 291 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() [all …]
|
D | psa_crypto_aead.h | 86 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ); 148 const uint8_t *ciphertext, size_t ciphertext_length, 477 uint8_t *ciphertext,
|
D | ccm.c | 665 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local 686 memset( ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN ); in mbedtls_ccm_self_test() 692 plaintext, ciphertext, in mbedtls_ccm_self_test() 693 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test() 697 memcmp( ciphertext, res_test_data[i], in mbedtls_ccm_self_test() 710 ciphertext, plaintext, in mbedtls_ccm_self_test() 711 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
|
D | psa_crypto_driver_wrappers.c | 1521 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in psa_driver_wrapper_aead_encrypt() argument 1541 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt() 1555 ciphertext, ciphertext_size, ciphertext_length ) ); in psa_driver_wrapper_aead_encrypt() 1572 const uint8_t *ciphertext, size_t ciphertext_length, in psa_driver_wrapper_aead_decrypt() argument 1592 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 1606 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt() 1862 uint8_t *ciphertext, in psa_driver_wrapper_aead_finish() argument 1874 ciphertext, in psa_driver_wrapper_aead_finish() 1886 ciphertext, ciphertext_size, in psa_driver_wrapper_aead_finish() 1895 (void)ciphertext; in psa_driver_wrapper_aead_finish()
|
/third_party/openssl/crypto/camellia/ |
D | cmll_local.h | 35 u8 ciphertext[]); 36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
D | camellia.c | 399 u8 ciphertext[]) in Camellia_EncryptBlock_Rounds() argument 437 PUTU32(ciphertext, s2); in Camellia_EncryptBlock_Rounds() 438 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds() 439 PUTU32(ciphertext + 8, s0); in Camellia_EncryptBlock_Rounds() 440 PUTU32(ciphertext + 12, s1); in Camellia_EncryptBlock_Rounds() 444 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) in Camellia_EncryptBlock() argument 447 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 450 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], in Camellia_DecryptBlock_Rounds() argument 457 s0 = GETU32(ciphertext) ^ k[0]; in Camellia_DecryptBlock_Rounds() 458 s1 = GETU32(ciphertext + 4) ^ k[1]; in Camellia_DecryptBlock_Rounds() [all …]
|
/third_party/mbedtls/tests/src/ |
D | psa_exercise_key.c | 170 unsigned char ciphertext[32] = "(wabblewebblewibblewobblewubble)"; in exercise_cipher_key() local 171 size_t ciphertext_length = sizeof( ciphertext ); in exercise_cipher_key() 172 unsigned char decrypted[sizeof( ciphertext )]; in exercise_cipher_key() 183 ciphertext, sizeof( ciphertext ), in exercise_cipher_key() 186 ciphertext + ciphertext_length, in exercise_cipher_key() 187 sizeof( ciphertext ) - ciphertext_length, in exercise_cipher_key() 211 ciphertext, ciphertext_length, in exercise_cipher_key() 242 unsigned char ciphertext[48] = "(wabblewebblewibblewobblewubble)"; in exercise_aead_key() local 243 size_t ciphertext_length = sizeof( ciphertext ); in exercise_aead_key() 244 size_t plaintext_length = sizeof( ciphertext ); in exercise_aead_key() [all …]
|
/third_party/mbedtls/tests/src/drivers/ |
D | test_driver_aead.c | 38 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in mbedtls_test_transparent_aead_encrypt() argument 57 ciphertext, ciphertext_size, ciphertext_length ); in mbedtls_test_transparent_aead_encrypt() 69 (void) ciphertext; in mbedtls_test_transparent_aead_encrypt() 85 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt() argument 104 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 115 (void) ciphertext; in mbedtls_test_transparent_aead_decrypt() 313 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish() argument 331 mbedtls_psa_aead_finish( operation, ciphertext, ciphertext_size, in mbedtls_test_transparent_aead_finish() 336 (void) ciphertext; in mbedtls_test_transparent_aead_finish()
|
/third_party/openssl/doc/man7/ |
D | des_modes.pod | 31 The same plaintext block always produces the same ciphertext block 36 An error will only affect one ciphertext block. 54 The CBC mode produces the same ciphertext whenever the same 59 The chaining operation makes the ciphertext blocks dependent on the 66 enciphering to the same ciphertext. 70 An error will affect the current and the following ciphertext blocks. 86 The CFB mode produces the same ciphertext whenever the same 91 The chaining operation makes the ciphertext variables dependent on the 98 enciphering to the same ciphertext. 117 An error will affect the current and the following ciphertext variables. [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_nist_kw.function | 154 unsigned char *ciphertext = NULL; 169 ciphertext = mbedtls_calloc( 1, output_len ); 170 TEST_ASSERT( ciphertext != NULL ); 177 ciphertext, &output_len, 193 mbedtls_free( ciphertext ); 205 unsigned char *ciphertext = NULL; 220 ciphertext = mbedtls_calloc( 1, in_len ); 221 TEST_ASSERT( ciphertext != NULL ); 226 unwrap_ret = mbedtls_nist_kw_unwrap( &ctx, mode, ciphertext, in_len, 238 mbedtls_free( ciphertext );
|
D | test_suite_gcm.aes128_de.data | 673 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 0 677 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 1 681 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 2 685 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 0 689 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 1 693 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 2 697 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 0 701 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 1 705 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 2 709 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 0 [all …]
|
/third_party/grpc/src/core/tsi/alts/crypt/ |
D | aes_gcm.cc | 318 uint8_t* ciphertext = static_cast<uint8_t*>(ciphertext_vec.iov_base); in gsec_aes_gcm_aead_crypter_encrypt_iovec() local 320 if (ciphertext == nullptr) { in gsec_aes_gcm_aead_crypter_encrypt_iovec() 342 if (!EVP_EncryptUpdate(aes_gcm_crypter->ctx, ciphertext, &bytes_written, in gsec_aes_gcm_aead_crypter_encrypt_iovec() 351 ciphertext += bytes_written; in gsec_aes_gcm_aead_crypter_encrypt_iovec() 372 kAesGcmTagLength, ciphertext)) { in gsec_aes_gcm_aead_crypter_encrypt_iovec() 376 ciphertext += kAesGcmTagLength; in gsec_aes_gcm_aead_crypter_encrypt_iovec() 477 const uint8_t* ciphertext = nullptr; in gsec_aes_gcm_aead_crypter_decrypt_iovec() local 482 ciphertext = static_cast<uint8_t*>(ciphertext_vec[i].iov_base); in gsec_aes_gcm_aead_crypter_decrypt_iovec() 484 if (ciphertext == nullptr) { in gsec_aes_gcm_aead_crypter_decrypt_iovec() 505 reinterpret_cast<int*>(&bytes_written), ciphertext, in gsec_aes_gcm_aead_crypter_decrypt_iovec() [all …]
|
/third_party/ffmpeg/libavutil/tests/ |
D | blowfish.c | 117 static const uint8_t ciphertext[8] = { variable 158 test_blowfish(ctx, tmp, plaintext, ciphertext, 1, NULL, 0, "encryption"); in main() 159 test_blowfish(ctx, tmp, ciphertext, plaintext, 1, NULL, 1, "decryption"); in main() 160 test_blowfish(ctx, tmp, tmp, ciphertext, 1, NULL, 0, "Inplace encryption"); in main()
|
/third_party/mbedtls/tests/include/test/drivers/ |
D | aead.h | 66 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ); 74 const uint8_t *ciphertext, size_t ciphertext_length, 114 uint8_t *ciphertext,
|
/third_party/node/test/parallel/ |
D | test-crypto-des3-wrap.js | 20 const ciphertext = cipher.update(test.plaintext, 'utf8'); constant 23 const msg = decipher.update(ciphertext, 'buffer', 'utf8');
|
D | test-crypto-authenticated-stream.js | 32 const ciphertext = Buffer.concat([c.update(expected), c.final()]); 37 const actual = Buffer.concat([d.update(ciphertext), d.final()]); 94 const ciphertext = fs.readFileSync(filename('b')); 98 const actual = Buffer.concat([d.update(ciphertext), d.final()]);
|
D | test-crypto-aes-wrap.js | 53 const ciphertext = cipher.update(data.text, 'utf8'); constant 59 const msg = decipher.update(ciphertext, 'buffer', 'utf8');
|
D | test-crypto-key-objects.js | 80 const ciphertext = Buffer.concat([ constant 86 decipher.update(ciphertext), decipher.final(), 164 for (const ciphertext of ciphertexts) { 166 const deciphered = fn(key, ciphertext);
|
/third_party/openssl/doc/man3/ |
D | RSA_public_encrypt.pod | 20 session key) using the public key B<rsa> and stores the ciphertext in 55 RSA_public_encrypt() will include some random bytes into the ciphertext 56 and therefore the ciphertext will be different each time, even if the 58 The returned ciphertext in B<to> will always be zero padded to exactly 65 bytes are in the ciphertext. Those are not important and may be removed,
|
/third_party/gstreamer/gstplugins_bad/ext/aes/ |
D | gstaesenc.c | 436 guchar *ciphertext; in gst_aes_enc_transform() local 457 ciphertext = outmap.data; in gst_aes_enc_transform() 465 memcpy (ciphertext, filter->iv, GST_AES_BLOCK_SIZE); in gst_aes_enc_transform() 466 ciphertext += GST_AES_BLOCK_SIZE; in gst_aes_enc_transform() 471 if (!EVP_CipherUpdate (filter->evp_ctx, ciphertext, in gst_aes_enc_transform() 487 ciphertext + ciphertext_len, &temp, in gst_aes_enc_transform()
|
D | gstaesdec.c | 437 guchar *ciphertext; in gst_aes_dec_transform() local 455 ciphertext = inmap.data; in gst_aes_dec_transform() 466 memcpy (filter->iv, ciphertext, GST_AES_BLOCK_SIZE); in gst_aes_dec_transform() 470 ciphertext += GST_AES_BLOCK_SIZE; in gst_aes_dec_transform() 482 &plaintext_len, ciphertext, ciphertext_len)) { in gst_aes_dec_transform()
|
/third_party/node/deps/npm/node_modules/bcrypt-pbkdf/ |
D | index.js | 474 ciphertext = new Uint8Array([79,120,121,99,104,114,111,109,97,116,105, 485 cdata[i] = stream2word(ciphertext, ciphertext.byteLength);
|