Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 124) sorted by relevance

12345

/third_party/parse5/test/data/parser-feedback/
Dtests18.test4 "description": "<!doctype html><plaintext></plaintext>",
5 "input": "<!doctype html><plaintext></plaintext>",
16 "plaintext",
21 "</plaintext>"
26 "description": "<!doctype html><table><plaintext></plaintext>",
27 "input": "<!doctype html><table><plaintext></plaintext>",
43 "plaintext",
48 "</plaintext>"
53 "description": "<!doctype html><table><tbody><plaintext></plaintext>",
54 "input": "<!doctype html><table><tbody><plaintext></plaintext>",
[all …]
Dwebkit02.test403 …"description": "<svg><foreignObject><div>foo</div><plaintext></foreignObject></svg><div>bar</div>",
404 … "input": "<svg><foreignObject><div>foo</div><plaintext></foreignObject></svg><div>bar</div>",
431 "plaintext",
474 "description": "</foreignObject><plaintext><div>foo</div>",
475 "input": "</foreignObject><plaintext><div>foo</div>",
483 "plaintext",
/third_party/mbedtls/tests/suites/
Dtest_suite_nist_kw.function22 unsigned char plaintext[32];
27 memset( plaintext, 0, sizeof( plaintext ) );
44 plaintext, sizeof( plaintext ),
56 plaintext, &output_len,
57 sizeof( plaintext ) ) == 0 );
59 TEST_ASSERT( output_len == sizeof( plaintext ) );
60 for( i = 0; i < sizeof( plaintext ); i++ )
62 TEST_ASSERT( plaintext[i] == 0 );
80 plaintext, sizeof( plaintext ),
86 plaintext, sizeof( plaintext ),
[all …]
/third_party/openssl/test/recipes/
D20-test_enc_more.t25 my $plaintext = catfile(".", "testdatafile");
41 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) {
48 my $cipherfile = "$plaintext.$ciphername.cipher";
49 my $clearfile = "$plaintext.$ciphername.clear";
52 ok(run(app([@common, "-e", "-in", $plaintext, "-out", $cipherfile]))
53 && compare_text($plaintext, $cipherfile) != 0
55 && compare_text($plaintext, $clearfile) == 0
61 unlink $plaintext;
/third_party/openssl/test/
Digetest.c27 static unsigned char plaintext[BIG_TEST_SIZE]; variable
227 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec()
233 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec()
245 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining()
247 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining()
255 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining()
267 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining()
269 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining()
281 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining()
297 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards()
[all …]
/third_party/node/test/parallel/
Dtest-crypto-cipher-decipher.js24 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!';
29 let ciph = cipher.update(plaintext, 'utf8', 'hex');
37 assert.strictEqual(txt, plaintext);
44 cStream.end(plaintext);
51 assert.strictEqual(txt, plaintext);
58 const plaintext =
66 let ciph = cipher.update(plaintext, 'utf8', 'base64');
73 assert.strictEqual(txt, plaintext);
207 const plaintext = 'Top secret!!!'; constant
209 let ciph = c.update(plaintext, 'utf16le', 'base64');
[all …]
Dtest-crypto-padding-aes256.js49 let plaintext = '0123456789abcdef0123456789abcdef'; // Multiple of block size variable
50 let encrypted = encrypt(plaintext, false);
52 assert.strictEqual(decrypted, plaintext);
57 plaintext = '0123456789abcdef0123456789abcde'; // not a multiple
58 encrypted = encrypt(plaintext, true);
60 assert.strictEqual(decrypted, plaintext);
Dtest-crypto-cipheriv-decipheriv.js11 const plaintext =
16 let ciph = cipher.update(plaintext, 'utf8', 'hex');
23 assert.strictEqual(txt, plaintext,
31 cStream.end(plaintext);
38 assert.strictEqual(txt, plaintext,
45 const plaintext =
50 let ciph = cipher.update(plaintext, 'utf8', 'buffer');
57 assert.strictEqual(txt, plaintext,
65 const plaintext = Buffer.from('00112233445566778899AABBCCDDEEFF', 'hex');
68 let ciph = cipher.update(plaintext, 'utf8', 'buffer');
[all …]
Dtest-crypto-key-objects.js77 const plaintext = Buffer.from('Hello world', 'utf8'); constant
81 cipher.update(plaintext), cipher.final(),
89 assert(plaintext.equals(deciphered));
162 const plaintext = Buffer.from('Hello world', 'utf8'); constant
167 assert.deepStrictEqual(deciphered, plaintext);
174 publicEncrypt(publicKey, plaintext),
175 publicEncrypt({ key: publicKey }, plaintext),
178 publicEncrypt(privateKey, plaintext),
179 publicEncrypt({ key: privateKey }, plaintext),
182 publicEncrypt(derivedPublicKey, plaintext),
[all …]
Dtest-crypto-binary-default.js464 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!';
469 let ciph = cipher.update(plaintext, 'utf8', 'hex');
477 assert.strictEqual(txt, plaintext);
484 const plaintext =
492 let ciph = cipher.update(plaintext, 'utf8', 'base64');
499 assert.strictEqual(txt, plaintext);
505 const plaintext =
510 let ciph = cipher.update(plaintext, 'utf8', 'hex');
517 assert.strictEqual(txt, plaintext);
523 const plaintext =
[all …]
Dtest-crypto-des3-wrap.js14 plaintext: '32|RmVZZkFUVmpRRkp0TmJaUm56ZU9qcnJkaXNNWVNpTTU*|iXmckfRWZBG' + property
20 const ciphertext = cipher.update(test.plaintext, 'utf8');
25 assert.strictEqual(msg, test.plaintext);
/third_party/protobuf/src/google/protobuf/stubs/
Dstrutil_unittest.cc85 const char* plaintext; member
345 const char* plaintext; member
448 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST()
450 StringPiece plaintext(base64_tests[i].plaintext, in TEST() local
491 EXPECT_EQ(plaintext, decode_str); in TEST()
495 Base64Escape(string(base64_tests[i].plaintext, in TEST()
504 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
522 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
533 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
560 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
[all …]
/third_party/python/Lib/test/
Dtest_uu.py15 plaintext = b"The symbols on top of your keyboard are !@#$%^&*()_+|~\n" variable
61 inp = io.BytesIO(plaintext)
65 inp = io.BytesIO(plaintext)
69 inp = io.BytesIO(plaintext)
81 self.assertEqual(out.getvalue(), plaintext)
89 self.assertEqual(out.getvalue(), plaintext)
125 plaintext = b"\x33" # 00110011
132 self.assertEqual(out.getvalue(), plaintext)
137 self.assertEqual(decoded, plaintext)
141 inp = io.BytesIO(plaintext)
[all …]
/third_party/libwebsockets/lib/misc/
Dbase64-decode.c214 static const char * const plaintext[] = {
242 for (test = 0; test < (int)LWS_ARRAY_SIZE(plaintext); test++) {
245 n = lws_b64_encode_string(plaintext[test],
246 strlen(plaintext[test]), buf, sizeof buf);
255 if (n != strlen(plaintext[test]) ||
256 strcmp(buf, plaintext[test])) {
259 test, buf, plaintext[test], n,
260 strlen(plaintext[test]));
/third_party/openssl/crypto/camellia/
Dcmll_local.h33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[],
38 u8 plaintext[]);
39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[],
42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
Dcamellia.c397 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], in Camellia_EncryptBlock_Rounds() argument
404 s0 = GETU32(plaintext) ^ k[0]; in Camellia_EncryptBlock_Rounds()
405 s1 = GETU32(plaintext + 4) ^ k[1]; in Camellia_EncryptBlock_Rounds()
406 s2 = GETU32(plaintext + 8) ^ k[2]; in Camellia_EncryptBlock_Rounds()
407 s3 = GETU32(plaintext + 12) ^ k[3]; in Camellia_EncryptBlock_Rounds()
443 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], in Camellia_EncryptBlock() argument
447 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock()
452 u8 plaintext[]) in Camellia_DecryptBlock_Rounds() argument
490 PUTU32(plaintext, s2); in Camellia_DecryptBlock_Rounds()
491 PUTU32(plaintext + 4, s3); in Camellia_DecryptBlock_Rounds()
[all …]
/third_party/mbedtls/tests/src/drivers/
Dtest_driver_aead.c37 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument
56 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
67 (void) plaintext; in mbedtls_test_transparent_aead_encrypt()
86 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_test_transparent_aead_decrypt() argument
105 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt()
117 (void) plaintext; in mbedtls_test_transparent_aead_decrypt()
351 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument
372 plaintext, in mbedtls_test_transparent_aead_verify()
380 (void) plaintext; in mbedtls_test_transparent_aead_verify()
/third_party/openssl/doc/man7/
Ddes_modes.pod31 The same plaintext block always produces the same ciphertext block
55 plaintext is encrypted using the same key and starting variable.
60 current and all preceding plaintext blocks and therefore blocks can not
65 The use of different starting variables prevents the same plaintext
87 plaintext is encrypted using the same key and starting variable.
97 The use of different starting variables prevents the same plaintext
108 the encipherment algorithm per unit of plaintext and thus cause
134 plaintext enciphered using the same key and starting variable. More
146 plaintext enciphering to the same ciphertext, by producing different
152 the encipherment algorithm per unit of plaintext and thus cause
[all …]
/third_party/abseil-cpp/absl/strings/
Descaping_test.cc300 absl::string_view plaintext; member
566 absl::Base64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape()
568 EXPECT_EQ(absl::Base64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape()
572 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape()
585 absl::WebSafeBase64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape()
587 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), websafe); in TestEscapeAndUnescape()
592 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape()
598 absl::WebSafeBase64Escape(tc.plaintext, &buffer); in TestEscapeAndUnescape()
600 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape()
/third_party/skia/third_party/externals/abseil-cpp/absl/strings/
Descaping_test.cc300 absl::string_view plaintext; member
566 absl::Base64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape()
568 EXPECT_EQ(absl::Base64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape()
572 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape()
585 absl::WebSafeBase64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape()
587 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), websafe); in TestEscapeAndUnescape()
592 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape()
598 absl::WebSafeBase64Escape(tc.plaintext, &buffer); in TestEscapeAndUnescape()
600 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape()
/third_party/grpc/test/core/tsi/alts/crypt/
Daes_gcm_test.cc37 uint8_t* plaintext; member
115 uint8_t* plaintext = static_cast<uint8_t*>(gpr_malloc(plaintext_length)); in gsec_test_random_encrypt_decrypt() local
118 ciphertext_bytes_written, plaintext, plaintext_length, in gsec_test_random_encrypt_decrypt()
123 GPR_ASSERT(memcmp(message, plaintext, message_length) == 0); in gsec_test_random_encrypt_decrypt()
138 ciphertext_and_tag, ciphertext_bytes_written, plaintext, in gsec_test_random_encrypt_decrypt()
145 GPR_ASSERT(memcmp(zero_message, plaintext, plaintext_length) == 0); in gsec_test_random_encrypt_decrypt()
158 corrupt_ciphertext_and_tag, ciphertext_bytes_written, plaintext, in gsec_test_random_encrypt_decrypt()
165 GPR_ASSERT(memcmp(zero_message, plaintext, plaintext_length) == 0); in gsec_test_random_encrypt_decrypt()
176 corrupt_ciphertext_and_tag, ciphertext_bytes_written, plaintext, in gsec_test_random_encrypt_decrypt()
179 GPR_ASSERT(memcmp(zero_message, plaintext, plaintext_length) == 0); in gsec_test_random_encrypt_decrypt()
[all …]
/third_party/mbedtls/library/
Dpsa_crypto_aead.c147 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument
178 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
192 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
211 plaintext, in mbedtls_psa_aead_encrypt()
223 (void) plaintext; in mbedtls_psa_aead_encrypt()
264 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_psa_aead_decrypt() argument
291 ciphertext, plaintext, in mbedtls_psa_aead_decrypt()
306 ciphertext, plaintext ) ); in mbedtls_psa_aead_decrypt()
326 plaintext ) ); in mbedtls_psa_aead_decrypt()
335 (void) plaintext; in mbedtls_psa_aead_decrypt()
/third_party/curl/lib/
Dcurl_ntlm_core.c362 const unsigned char *plaintext, in Curl_ntlm_core_lm_resp() argument
369 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) results, in Curl_ntlm_core_lm_resp()
373 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 8), in Curl_ntlm_core_lm_resp()
377 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 16), in Curl_ntlm_core_lm_resp()
382 des_encrypt(&des, 8, results, plaintext); in Curl_ntlm_core_lm_resp()
384 des_encrypt(&des, 8, results + 8, plaintext); in Curl_ntlm_core_lm_resp()
386 des_encrypt(&des, 8, results + 16, plaintext); in Curl_ntlm_core_lm_resp()
389 encrypt_des(plaintext, results, keys); in Curl_ntlm_core_lm_resp()
390 encrypt_des(plaintext, results + 8, keys + 7); in Curl_ntlm_core_lm_resp()
391 encrypt_des(plaintext, results + 16, keys + 14); in Curl_ntlm_core_lm_resp()
/third_party/ffmpeg/libavutil/tests/
Dblowfish.c112 static const uint8_t plaintext[8] = "BLOWFISH"; variable
158 test_blowfish(ctx, tmp, plaintext, ciphertext, 1, NULL, 0, "encryption"); in main()
159 test_blowfish(ctx, tmp, ciphertext, plaintext, 1, NULL, 1, "decryption"); in main()
161 test_blowfish(ctx, tmp, tmp, plaintext, 1, NULL, 1, "Inplace decryption"); in main()
/third_party/node/deps/npm/node_modules/oauth-sign/
Dindex.js106 function plaintext (consumer_secret, token_secret) { function
130 method = plaintext
143 exports.plaintext = plaintext

12345