/third_party/parse5/test/data/parser-feedback/ |
D | tests18.test | 4 "description": "<!doctype html><plaintext></plaintext>", 5 "input": "<!doctype html><plaintext></plaintext>", 16 "plaintext", 21 "</plaintext>" 26 "description": "<!doctype html><table><plaintext></plaintext>", 27 "input": "<!doctype html><table><plaintext></plaintext>", 43 "plaintext", 48 "</plaintext>" 53 "description": "<!doctype html><table><tbody><plaintext></plaintext>", 54 "input": "<!doctype html><table><tbody><plaintext></plaintext>", [all …]
|
D | webkit02.test | 403 …"description": "<svg><foreignObject><div>foo</div><plaintext></foreignObject></svg><div>bar</div>", 404 … "input": "<svg><foreignObject><div>foo</div><plaintext></foreignObject></svg><div>bar</div>", 431 "plaintext", 474 "description": "</foreignObject><plaintext><div>foo</div>", 475 "input": "</foreignObject><plaintext><div>foo</div>", 483 "plaintext",
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_nist_kw.function | 22 unsigned char plaintext[32]; 27 memset( plaintext, 0, sizeof( plaintext ) ); 44 plaintext, sizeof( plaintext ), 56 plaintext, &output_len, 57 sizeof( plaintext ) ) == 0 ); 59 TEST_ASSERT( output_len == sizeof( plaintext ) ); 60 for( i = 0; i < sizeof( plaintext ); i++ ) 62 TEST_ASSERT( plaintext[i] == 0 ); 80 plaintext, sizeof( plaintext ), 86 plaintext, sizeof( plaintext ), [all …]
|
/third_party/openssl/test/recipes/ |
D | 20-test_enc_more.t | 25 my $plaintext = catfile(".", "testdatafile"); 41 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 48 my $cipherfile = "$plaintext.$ciphername.cipher"; 49 my $clearfile = "$plaintext.$ciphername.clear"; 52 ok(run(app([@common, "-e", "-in", $plaintext, "-out", $cipherfile])) 53 && compare_text($plaintext, $cipherfile) != 0 55 && compare_text($plaintext, $clearfile) == 0 61 unlink $plaintext;
|
/third_party/openssl/test/ |
D | igetest.c | 27 static unsigned char plaintext[BIG_TEST_SIZE]; variable 227 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec() 233 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec() 245 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining() 247 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining() 255 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining() 267 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining() 269 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining() 281 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining() 297 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards() [all …]
|
/third_party/node/test/parallel/ |
D | test-crypto-cipher-decipher.js | 24 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!'; 29 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 37 assert.strictEqual(txt, plaintext); 44 cStream.end(plaintext); 51 assert.strictEqual(txt, plaintext); 58 const plaintext = 66 let ciph = cipher.update(plaintext, 'utf8', 'base64'); 73 assert.strictEqual(txt, plaintext); 207 const plaintext = 'Top secret!!!'; constant 209 let ciph = c.update(plaintext, 'utf16le', 'base64'); [all …]
|
D | test-crypto-padding-aes256.js | 49 let plaintext = '0123456789abcdef0123456789abcdef'; // Multiple of block size variable 50 let encrypted = encrypt(plaintext, false); 52 assert.strictEqual(decrypted, plaintext); 57 plaintext = '0123456789abcdef0123456789abcde'; // not a multiple 58 encrypted = encrypt(plaintext, true); 60 assert.strictEqual(decrypted, plaintext);
|
D | test-crypto-cipheriv-decipheriv.js | 11 const plaintext = 16 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 23 assert.strictEqual(txt, plaintext, 31 cStream.end(plaintext); 38 assert.strictEqual(txt, plaintext, 45 const plaintext = 50 let ciph = cipher.update(plaintext, 'utf8', 'buffer'); 57 assert.strictEqual(txt, plaintext, 65 const plaintext = Buffer.from('00112233445566778899AABBCCDDEEFF', 'hex'); 68 let ciph = cipher.update(plaintext, 'utf8', 'buffer'); [all …]
|
D | test-crypto-key-objects.js | 77 const plaintext = Buffer.from('Hello world', 'utf8'); constant 81 cipher.update(plaintext), cipher.final(), 89 assert(plaintext.equals(deciphered)); 162 const plaintext = Buffer.from('Hello world', 'utf8'); constant 167 assert.deepStrictEqual(deciphered, plaintext); 174 publicEncrypt(publicKey, plaintext), 175 publicEncrypt({ key: publicKey }, plaintext), 178 publicEncrypt(privateKey, plaintext), 179 publicEncrypt({ key: privateKey }, plaintext), 182 publicEncrypt(derivedPublicKey, plaintext), [all …]
|
D | test-crypto-binary-default.js | 464 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!'; 469 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 477 assert.strictEqual(txt, plaintext); 484 const plaintext = 492 let ciph = cipher.update(plaintext, 'utf8', 'base64'); 499 assert.strictEqual(txt, plaintext); 505 const plaintext = 510 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 517 assert.strictEqual(txt, plaintext); 523 const plaintext = [all …]
|
D | test-crypto-des3-wrap.js | 14 plaintext: '32|RmVZZkFUVmpRRkp0TmJaUm56ZU9qcnJkaXNNWVNpTTU*|iXmckfRWZBG' + property 20 const ciphertext = cipher.update(test.plaintext, 'utf8'); 25 assert.strictEqual(msg, test.plaintext);
|
/third_party/protobuf/src/google/protobuf/stubs/ |
D | strutil_unittest.cc | 85 const char* plaintext; member 345 const char* plaintext; member 448 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST() 450 StringPiece plaintext(base64_tests[i].plaintext, in TEST() local 491 EXPECT_EQ(plaintext, decode_str); in TEST() 495 Base64Escape(string(base64_tests[i].plaintext, in TEST() 504 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 522 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 533 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 560 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() [all …]
|
/third_party/python/Lib/test/ |
D | test_uu.py | 15 plaintext = b"The symbols on top of your keyboard are !@#$%^&*()_+|~\n" variable 61 inp = io.BytesIO(plaintext) 65 inp = io.BytesIO(plaintext) 69 inp = io.BytesIO(plaintext) 81 self.assertEqual(out.getvalue(), plaintext) 89 self.assertEqual(out.getvalue(), plaintext) 125 plaintext = b"\x33" # 00110011 132 self.assertEqual(out.getvalue(), plaintext) 137 self.assertEqual(decoded, plaintext) 141 inp = io.BytesIO(plaintext) [all …]
|
/third_party/libwebsockets/lib/misc/ |
D | base64-decode.c | 214 static const char * const plaintext[] = { 242 for (test = 0; test < (int)LWS_ARRAY_SIZE(plaintext); test++) { 245 n = lws_b64_encode_string(plaintext[test], 246 strlen(plaintext[test]), buf, sizeof buf); 255 if (n != strlen(plaintext[test]) || 256 strcmp(buf, plaintext[test])) { 259 test, buf, plaintext[test], n, 260 strlen(plaintext[test]));
|
/third_party/openssl/crypto/camellia/ |
D | cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
D | camellia.c | 397 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], in Camellia_EncryptBlock_Rounds() argument 404 s0 = GETU32(plaintext) ^ k[0]; in Camellia_EncryptBlock_Rounds() 405 s1 = GETU32(plaintext + 4) ^ k[1]; in Camellia_EncryptBlock_Rounds() 406 s2 = GETU32(plaintext + 8) ^ k[2]; in Camellia_EncryptBlock_Rounds() 407 s3 = GETU32(plaintext + 12) ^ k[3]; in Camellia_EncryptBlock_Rounds() 443 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], in Camellia_EncryptBlock() argument 447 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 452 u8 plaintext[]) in Camellia_DecryptBlock_Rounds() argument 490 PUTU32(plaintext, s2); in Camellia_DecryptBlock_Rounds() 491 PUTU32(plaintext + 4, s3); in Camellia_DecryptBlock_Rounds() [all …]
|
/third_party/mbedtls/tests/src/drivers/ |
D | test_driver_aead.c | 37 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() argument 56 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 67 (void) plaintext; in mbedtls_test_transparent_aead_encrypt() 86 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_test_transparent_aead_decrypt() argument 105 plaintext, plaintext_size, plaintext_length ); in mbedtls_test_transparent_aead_decrypt() 117 (void) plaintext; in mbedtls_test_transparent_aead_decrypt() 351 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() argument 372 plaintext, in mbedtls_test_transparent_aead_verify() 380 (void) plaintext; in mbedtls_test_transparent_aead_verify()
|
/third_party/openssl/doc/man7/ |
D | des_modes.pod | 31 The same plaintext block always produces the same ciphertext block 55 plaintext is encrypted using the same key and starting variable. 60 current and all preceding plaintext blocks and therefore blocks can not 65 The use of different starting variables prevents the same plaintext 87 plaintext is encrypted using the same key and starting variable. 97 The use of different starting variables prevents the same plaintext 108 the encipherment algorithm per unit of plaintext and thus cause 134 plaintext enciphered using the same key and starting variable. More 146 plaintext enciphering to the same ciphertext, by producing different 152 the encipherment algorithm per unit of plaintext and thus cause [all …]
|
/third_party/abseil-cpp/absl/strings/ |
D | escaping_test.cc | 300 absl::string_view plaintext; member 566 absl::Base64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape() 568 EXPECT_EQ(absl::Base64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape() 572 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape() 585 absl::WebSafeBase64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape() 587 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), websafe); in TestEscapeAndUnescape() 592 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape() 598 absl::WebSafeBase64Escape(tc.plaintext, &buffer); in TestEscapeAndUnescape() 600 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape()
|
/third_party/skia/third_party/externals/abseil-cpp/absl/strings/ |
D | escaping_test.cc | 300 absl::string_view plaintext; member 566 absl::Base64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape() 568 EXPECT_EQ(absl::Base64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape() 572 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape() 585 absl::WebSafeBase64Escape(tc.plaintext, &encoded); in TestEscapeAndUnescape() 587 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), websafe); in TestEscapeAndUnescape() 592 EXPECT_EQ(decoded, tc.plaintext); in TestEscapeAndUnescape() 598 absl::WebSafeBase64Escape(tc.plaintext, &buffer); in TestEscapeAndUnescape() 600 EXPECT_EQ(absl::WebSafeBase64Escape(tc.plaintext), tc.cyphertext); in TestEscapeAndUnescape()
|
/third_party/grpc/test/core/tsi/alts/crypt/ |
D | aes_gcm_test.cc | 37 uint8_t* plaintext; member 115 uint8_t* plaintext = static_cast<uint8_t*>(gpr_malloc(plaintext_length)); in gsec_test_random_encrypt_decrypt() local 118 ciphertext_bytes_written, plaintext, plaintext_length, in gsec_test_random_encrypt_decrypt() 123 GPR_ASSERT(memcmp(message, plaintext, message_length) == 0); in gsec_test_random_encrypt_decrypt() 138 ciphertext_and_tag, ciphertext_bytes_written, plaintext, in gsec_test_random_encrypt_decrypt() 145 GPR_ASSERT(memcmp(zero_message, plaintext, plaintext_length) == 0); in gsec_test_random_encrypt_decrypt() 158 corrupt_ciphertext_and_tag, ciphertext_bytes_written, plaintext, in gsec_test_random_encrypt_decrypt() 165 GPR_ASSERT(memcmp(zero_message, plaintext, plaintext_length) == 0); in gsec_test_random_encrypt_decrypt() 176 corrupt_ciphertext_and_tag, ciphertext_bytes_written, plaintext, in gsec_test_random_encrypt_decrypt() 179 GPR_ASSERT(memcmp(zero_message, plaintext, plaintext_length) == 0); in gsec_test_random_encrypt_decrypt() [all …]
|
/third_party/mbedtls/library/ |
D | psa_crypto_aead.c | 147 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_psa_aead_encrypt() argument 178 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 192 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 211 plaintext, in mbedtls_psa_aead_encrypt() 223 (void) plaintext; in mbedtls_psa_aead_encrypt() 264 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length ) in mbedtls_psa_aead_decrypt() argument 291 ciphertext, plaintext, in mbedtls_psa_aead_decrypt() 306 ciphertext, plaintext ) ); in mbedtls_psa_aead_decrypt() 326 plaintext ) ); in mbedtls_psa_aead_decrypt() 335 (void) plaintext; in mbedtls_psa_aead_decrypt()
|
/third_party/curl/lib/ |
D | curl_ntlm_core.c | 362 const unsigned char *plaintext, in Curl_ntlm_core_lm_resp() argument 369 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) results, in Curl_ntlm_core_lm_resp() 373 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 8), in Curl_ntlm_core_lm_resp() 377 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 16), in Curl_ntlm_core_lm_resp() 382 des_encrypt(&des, 8, results, plaintext); in Curl_ntlm_core_lm_resp() 384 des_encrypt(&des, 8, results + 8, plaintext); in Curl_ntlm_core_lm_resp() 386 des_encrypt(&des, 8, results + 16, plaintext); in Curl_ntlm_core_lm_resp() 389 encrypt_des(plaintext, results, keys); in Curl_ntlm_core_lm_resp() 390 encrypt_des(plaintext, results + 8, keys + 7); in Curl_ntlm_core_lm_resp() 391 encrypt_des(plaintext, results + 16, keys + 14); in Curl_ntlm_core_lm_resp()
|
/third_party/ffmpeg/libavutil/tests/ |
D | blowfish.c | 112 static const uint8_t plaintext[8] = "BLOWFISH"; variable 158 test_blowfish(ctx, tmp, plaintext, ciphertext, 1, NULL, 0, "encryption"); in main() 159 test_blowfish(ctx, tmp, ciphertext, plaintext, 1, NULL, 1, "decryption"); in main() 161 test_blowfish(ctx, tmp, tmp, plaintext, 1, NULL, 1, "Inplace decryption"); in main()
|
/third_party/node/deps/npm/node_modules/oauth-sign/ |
D | index.js | 106 function plaintext (consumer_secret, token_secret) { function 130 method = plaintext 143 exports.plaintext = plaintext
|