Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 25 of 58) sorted by relevance

123

/third_party/openssl/test/
Digetest.c222 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_dec() local
227 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec()
231 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_dec()
240 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_chaining() local
245 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining()
248 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, in test_ige_enc_chaining()
253 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_chaining()
262 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_dec_chaining() local
267 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining()
270 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, in test_ige_dec_chaining()
[all …]
Dmodes_internal_test.c188 unsigned char cleartext[64], ciphertext[64], vector[64]; in execute_cts128() local
197 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len, in execute_cts128()
200 || !TEST_mem_eq(ciphertext, len, vector, len) in execute_cts128()
206 size = fixture->decrypt_block(ciphertext, cleartext, len, in execute_cts128()
216 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len, in execute_cts128()
220 || !TEST_mem_eq(ciphertext, len, vector, len) in execute_cts128()
226 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len, in execute_cts128()
Devp_extra_test.c966 unsigned char ciphertext[32], plaintext[16]; in test_EVP_Enveloped() local
974 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, in test_EVP_Enveloped()
976 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, in test_EVP_Enveloped()
984 ciphertext, ciphertext_len)) in test_EVP_Enveloped()
1276 uint8_t ciphertext[128]; in test_EVP_SM2() local
1277 size_t ctext_len = sizeof(ciphertext); in test_EVP_SM2()
1363 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, sizeof(kMsg)))) in test_EVP_SM2()
1369 if (!TEST_true(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, ctext_len))) in test_EVP_SM2()
1675 unsigned char ciphertext[80]; in test_decrypt_null_chunks() local
1685 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg, in test_decrypt_null_chunks()
[all …]
/third_party/mbedtls/library/
Dpsa_crypto_aead.c148 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in mbedtls_psa_aead_encrypt() argument
167 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt()
178 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
192 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
212 ciphertext, in mbedtls_psa_aead_encrypt()
242 const uint8_t *ciphertext, in psa_aead_unpadded_locate_tag() argument
253 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag()
263 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_psa_aead_decrypt() argument
277 ciphertext, ciphertext_length, in mbedtls_psa_aead_decrypt()
291 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
[all …]
Dpsa_crypto_aead.h86 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length );
148 const uint8_t *ciphertext, size_t ciphertext_length,
477 uint8_t *ciphertext,
Dccm.c665 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local
686 memset( ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN ); in mbedtls_ccm_self_test()
692 plaintext, ciphertext, in mbedtls_ccm_self_test()
693 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
697 memcmp( ciphertext, res_test_data[i], in mbedtls_ccm_self_test()
710 ciphertext, plaintext, in mbedtls_ccm_self_test()
711 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
Dpsa_crypto_driver_wrappers.c1521 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in psa_driver_wrapper_aead_encrypt() argument
1541 ciphertext, ciphertext_size, ciphertext_length ); in psa_driver_wrapper_aead_encrypt()
1555 ciphertext, ciphertext_size, ciphertext_length ) ); in psa_driver_wrapper_aead_encrypt()
1572 const uint8_t *ciphertext, size_t ciphertext_length, in psa_driver_wrapper_aead_decrypt() argument
1592 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt()
1606 ciphertext, ciphertext_length, in psa_driver_wrapper_aead_decrypt()
1862 uint8_t *ciphertext, in psa_driver_wrapper_aead_finish() argument
1874 ciphertext, in psa_driver_wrapper_aead_finish()
1886 ciphertext, ciphertext_size, in psa_driver_wrapper_aead_finish()
1895 (void)ciphertext; in psa_driver_wrapper_aead_finish()
/third_party/openssl/crypto/camellia/
Dcmll_local.h35 u8 ciphertext[]);
36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[],
40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]);
41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
Dcamellia.c399 u8 ciphertext[]) in Camellia_EncryptBlock_Rounds() argument
437 PUTU32(ciphertext, s2); in Camellia_EncryptBlock_Rounds()
438 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds()
439 PUTU32(ciphertext + 8, s0); in Camellia_EncryptBlock_Rounds()
440 PUTU32(ciphertext + 12, s1); in Camellia_EncryptBlock_Rounds()
444 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) in Camellia_EncryptBlock() argument
447 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock()
450 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], in Camellia_DecryptBlock_Rounds() argument
457 s0 = GETU32(ciphertext) ^ k[0]; in Camellia_DecryptBlock_Rounds()
458 s1 = GETU32(ciphertext + 4) ^ k[1]; in Camellia_DecryptBlock_Rounds()
[all …]
/third_party/mbedtls/tests/src/
Dpsa_exercise_key.c170 unsigned char ciphertext[32] = "(wabblewebblewibblewobblewubble)"; in exercise_cipher_key() local
171 size_t ciphertext_length = sizeof( ciphertext ); in exercise_cipher_key()
172 unsigned char decrypted[sizeof( ciphertext )]; in exercise_cipher_key()
183 ciphertext, sizeof( ciphertext ), in exercise_cipher_key()
186 ciphertext + ciphertext_length, in exercise_cipher_key()
187 sizeof( ciphertext ) - ciphertext_length, in exercise_cipher_key()
211 ciphertext, ciphertext_length, in exercise_cipher_key()
242 unsigned char ciphertext[48] = "(wabblewebblewibblewobblewubble)"; in exercise_aead_key() local
243 size_t ciphertext_length = sizeof( ciphertext ); in exercise_aead_key()
244 size_t plaintext_length = sizeof( ciphertext ); in exercise_aead_key()
[all …]
/third_party/mbedtls/tests/src/drivers/
Dtest_driver_aead.c38 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length ) in mbedtls_test_transparent_aead_encrypt() argument
57 ciphertext, ciphertext_size, ciphertext_length ); in mbedtls_test_transparent_aead_encrypt()
69 (void) ciphertext; in mbedtls_test_transparent_aead_encrypt()
85 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt() argument
104 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt()
115 (void) ciphertext; in mbedtls_test_transparent_aead_decrypt()
313 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish() argument
331 mbedtls_psa_aead_finish( operation, ciphertext, ciphertext_size, in mbedtls_test_transparent_aead_finish()
336 (void) ciphertext; in mbedtls_test_transparent_aead_finish()
/third_party/openssl/doc/man7/
Ddes_modes.pod31 The same plaintext block always produces the same ciphertext block
36 An error will only affect one ciphertext block.
54 The CBC mode produces the same ciphertext whenever the same
59 The chaining operation makes the ciphertext blocks dependent on the
66 enciphering to the same ciphertext.
70 An error will affect the current and the following ciphertext blocks.
86 The CFB mode produces the same ciphertext whenever the same
91 The chaining operation makes the ciphertext variables dependent on the
98 enciphering to the same ciphertext.
117 An error will affect the current and the following ciphertext variables.
[all …]
/third_party/mbedtls/tests/suites/
Dtest_suite_nist_kw.function154 unsigned char *ciphertext = NULL;
169 ciphertext = mbedtls_calloc( 1, output_len );
170 TEST_ASSERT( ciphertext != NULL );
177 ciphertext, &output_len,
193 mbedtls_free( ciphertext );
205 unsigned char *ciphertext = NULL;
220 ciphertext = mbedtls_calloc( 1, in_len );
221 TEST_ASSERT( ciphertext != NULL );
226 unwrap_ret = mbedtls_nist_kw_unwrap( &ctx, mode, ciphertext, in_len,
238 mbedtls_free( ciphertext );
Dtest_suite_gcm.aes128_de.data673 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 0
677 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 1
681 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 128 bytes, ciphertext updates: 2
685 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 0
689 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 1
693 AES-GCM NIST CAVS 14.0 - empty ciphertext, AD length: 90 bytes, ciphertext updates: 2
697 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 0
701 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 1
705 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 128 bytes, AD updates: 2
709 AES-GCM NIST CAVS 14.0 - empty AD, ciphertext length: 51 bytes, AD updates: 0
[all …]
/third_party/grpc/src/core/tsi/alts/crypt/
Daes_gcm.cc318 uint8_t* ciphertext = static_cast<uint8_t*>(ciphertext_vec.iov_base); in gsec_aes_gcm_aead_crypter_encrypt_iovec() local
320 if (ciphertext == nullptr) { in gsec_aes_gcm_aead_crypter_encrypt_iovec()
342 if (!EVP_EncryptUpdate(aes_gcm_crypter->ctx, ciphertext, &bytes_written, in gsec_aes_gcm_aead_crypter_encrypt_iovec()
351 ciphertext += bytes_written; in gsec_aes_gcm_aead_crypter_encrypt_iovec()
372 kAesGcmTagLength, ciphertext)) { in gsec_aes_gcm_aead_crypter_encrypt_iovec()
376 ciphertext += kAesGcmTagLength; in gsec_aes_gcm_aead_crypter_encrypt_iovec()
477 const uint8_t* ciphertext = nullptr; in gsec_aes_gcm_aead_crypter_decrypt_iovec() local
482 ciphertext = static_cast<uint8_t*>(ciphertext_vec[i].iov_base); in gsec_aes_gcm_aead_crypter_decrypt_iovec()
484 if (ciphertext == nullptr) { in gsec_aes_gcm_aead_crypter_decrypt_iovec()
505 reinterpret_cast<int*>(&bytes_written), ciphertext, in gsec_aes_gcm_aead_crypter_decrypt_iovec()
[all …]
/third_party/ffmpeg/libavutil/tests/
Dblowfish.c117 static const uint8_t ciphertext[8] = { variable
158 test_blowfish(ctx, tmp, plaintext, ciphertext, 1, NULL, 0, "encryption"); in main()
159 test_blowfish(ctx, tmp, ciphertext, plaintext, 1, NULL, 1, "decryption"); in main()
160 test_blowfish(ctx, tmp, tmp, ciphertext, 1, NULL, 0, "Inplace encryption"); in main()
/third_party/mbedtls/tests/include/test/drivers/
Daead.h66 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length );
74 const uint8_t *ciphertext, size_t ciphertext_length,
114 uint8_t *ciphertext,
/third_party/node/test/parallel/
Dtest-crypto-des3-wrap.js20 const ciphertext = cipher.update(test.plaintext, 'utf8'); constant
23 const msg = decipher.update(ciphertext, 'buffer', 'utf8');
Dtest-crypto-authenticated-stream.js32 const ciphertext = Buffer.concat([c.update(expected), c.final()]);
37 const actual = Buffer.concat([d.update(ciphertext), d.final()]);
94 const ciphertext = fs.readFileSync(filename('b'));
98 const actual = Buffer.concat([d.update(ciphertext), d.final()]);
Dtest-crypto-aes-wrap.js53 const ciphertext = cipher.update(data.text, 'utf8'); constant
59 const msg = decipher.update(ciphertext, 'buffer', 'utf8');
Dtest-crypto-key-objects.js80 const ciphertext = Buffer.concat([ constant
86 decipher.update(ciphertext), decipher.final(),
164 for (const ciphertext of ciphertexts) {
166 const deciphered = fn(key, ciphertext);
/third_party/openssl/doc/man3/
DRSA_public_encrypt.pod20 session key) using the public key B<rsa> and stores the ciphertext in
55 RSA_public_encrypt() will include some random bytes into the ciphertext
56 and therefore the ciphertext will be different each time, even if the
58 The returned ciphertext in B<to> will always be zero padded to exactly
65 bytes are in the ciphertext. Those are not important and may be removed,
/third_party/gstreamer/gstplugins_bad/ext/aes/
Dgstaesenc.c436 guchar *ciphertext; in gst_aes_enc_transform() local
457 ciphertext = outmap.data; in gst_aes_enc_transform()
465 memcpy (ciphertext, filter->iv, GST_AES_BLOCK_SIZE); in gst_aes_enc_transform()
466 ciphertext += GST_AES_BLOCK_SIZE; in gst_aes_enc_transform()
471 if (!EVP_CipherUpdate (filter->evp_ctx, ciphertext, in gst_aes_enc_transform()
487 ciphertext + ciphertext_len, &temp, in gst_aes_enc_transform()
Dgstaesdec.c437 guchar *ciphertext; in gst_aes_dec_transform() local
455 ciphertext = inmap.data; in gst_aes_dec_transform()
466 memcpy (filter->iv, ciphertext, GST_AES_BLOCK_SIZE); in gst_aes_dec_transform()
470 ciphertext += GST_AES_BLOCK_SIZE; in gst_aes_dec_transform()
482 &plaintext_len, ciphertext, ciphertext_len)) { in gst_aes_dec_transform()
/third_party/node/deps/npm/node_modules/bcrypt-pbkdf/
Dindex.js474 ciphertext = new Uint8Array([79,120,121,99,104,114,111,109,97,116,105,
485 cdata[i] = stream2word(ciphertext, ciphertext.byteLength);

123