/third_party/parse5/test/data/parser-feedback/ |
D | tests18.test | 5 "description": "<plaintext></plaintext>", 6 "input": "<plaintext></plaintext>", 10 "plaintext", 15 "</plaintext>" 21 "description": "<!doctype html><plaintext></plaintext>", 22 "input": "<!doctype html><plaintext></plaintext>", 33 "plaintext", 38 "</plaintext>" 44 "description": "<!doctype html><html><plaintext></plaintext>", 45 "input": "<!doctype html><html><plaintext></plaintext>", [all …]
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/encrypt_decrypt/ |
D | rsa_vectors.js | 29 …var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210… 53 plaintext: plaintext.slice(0, 214), property 66 plaintext: plaintext.slice(0, 190), property 79 plaintext: plaintext.slice(0, 158), property 92 plaintext: plaintext.slice(0, 126), property 105 plaintext: plaintext.slice(0, 214), property 118 plaintext: plaintext.slice(0, 190), property 131 plaintext: plaintext.slice(0, 158), property 144 plaintext: plaintext.slice(0, 126), property 157 plaintext: plaintext.slice(0, 214), property [all …]
|
D | rsa.js | 25 .then(function(plaintext) { argument 26 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works")); 55 .then(function(plaintext) { argument 56 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works")); 81 .then(function(plaintext) { argument 109 .then(function(plaintext) { argument 133 var plaintext = copyBuffer(vector.plaintext); 134 var operation = subtle.encrypt(vector.algorithm, vector.publicKey, plaintext) 140 … assert_true(equalBuffers(result, vector.plaintext), "Round trip returns original plaintext"); 148 return subtle.encrypt(vector.algorithm, vector.publicKey, vector.plaintext) [all …]
|
D | aes_cbc_vectors.js | 16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115, 210 plaintext: plaintext, property 224 plaintext: plaintext, property 236 plaintext: plaintext, property 254 plaintext: plaintext, property
|
D | aes_ctr_vectors.js | 16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115, 95 plaintext: plaintext, property 108 plaintext: plaintext, property 117 plaintext: plaintext, property
|
/third_party/node/test/fixtures/crypto/ |
D | rsa.js | 67 const plaintext = Buffer.from( 179 plaintext: plaintext.slice(0, 214), property 192 plaintext: plaintext.slice(0, 190), property 205 plaintext: plaintext.slice(0, 158), property 218 plaintext: plaintext.slice(0, 126), property 231 plaintext: plaintext.slice(0, 214), property 244 plaintext: plaintext.slice(0, 190), property 257 plaintext: plaintext.slice(0, 158), property 270 plaintext: plaintext.slice(0, 126), property 283 plaintext: plaintext.slice(0, 214), property [all …]
|
D | rsa_pss.js | 53 const plaintext = Buffer.from( 87 plaintext, property 95 plaintext, property 103 plaintext, property 111 plaintext, property 119 plaintext, property 127 plaintext, property 135 plaintext, property 143 plaintext, property
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/ |
D | rsa_pss_vectors.js | 25 …var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210… 50 plaintext: plaintext, property 63 plaintext: plaintext, property 76 plaintext: plaintext, property 89 plaintext: plaintext, property 102 plaintext: plaintext, property 115 plaintext: plaintext, property 128 plaintext: plaintext, property 141 plaintext: plaintext, property
|
D | rsa_pkcs_vectors.js | 25 …var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210… 46 plaintext: plaintext, property 59 plaintext: plaintext, property 72 plaintext: plaintext, property 85 plaintext: plaintext, property
|
D | hmac.js | 19 … = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vector.plaintext) 46 …eration = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, signature, vector.plaintext) 70 var plaintext = copyBuffer(vector.plaintext); 71 …eration = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, plaintext) 78 plaintext[0] = 255 - plaintext[0]; 97 …rn subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vector.plaintext) 98 .then(function(plaintext) { argument 118 return subtle.sign({name: "HMAC", hash: vector.hash}, vector.key, vector.plaintext) 121 … return subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, signature, vector.plaintext) 150 …r operation = subtle.sign({name: "HMAC", hash: vector.hash}, wrongKey.privateKey, vector.plaintext) [all …]
|
D | rsa.js | 19 …r operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, vector.plaintext) 46 … var operation = subtle.verify(vector.algorithm, vector.publicKey, signature, vector.plaintext) 70 var plaintext = copyBuffer(vector.plaintext); 71 … var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, plaintext) 78 plaintext[0] = 255 - plaintext[0]; 95 … return subtle.verify(vector.algorithm, vector.privateKey, vector.signature, vector.plaintext) 96 .then(function(plaintext) { argument 117 return subtle.sign(vector.algorithm, vector.publicKey, vector.plaintext) 140 … return subtle.verify(vector.algorithm, vector.publicKey, vector.signature, vector.plaintext) 141 .then(function(plaintext) { argument [all …]
|
D | ecdsa.js | 21 … var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, vector.plaintext) 49 … var operation = subtle.verify(algorithm, vector.publicKey, signature, vector.plaintext) 74 var plaintext = copyBuffer(vector.plaintext); 75 … var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, plaintext) 82 plaintext[0] = 255 - plaintext[0]; 100 … return subtle.verify(algorithm, vector.privateKey, vector.signature, vector.plaintext) 101 .then(function(plaintext) { argument 123 return subtle.sign(algorithm, vector.publicKey, vector.plaintext) 147 … return subtle.verify(algorithm, vector.publicKey, vector.signature, vector.plaintext) 148 .then(function(plaintext) { argument [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_nist_kw.function | 22 unsigned char plaintext[32]; 27 memset(plaintext, 0, sizeof(plaintext)); 44 plaintext, sizeof(plaintext), 56 plaintext, &output_len, 57 sizeof(plaintext)) == 0); 59 TEST_ASSERT(output_len == sizeof(plaintext)); 60 for (i = 0; i < sizeof(plaintext); i++) { 61 TEST_ASSERT(plaintext[i] == 0); 79 plaintext, sizeof(plaintext), 85 plaintext, sizeof(plaintext), [all …]
|
/third_party/node/test/parallel/ |
D | test-webcrypto-sign-verify-rsa.js | 20 plaintext, property 61 assert(await subtle.verify(algorithm, publicKey, signature, plaintext)); 64 const copy = Buffer.from(plaintext); 73 subtle.verify(algorithm, privateKey, signature, plaintext), { 78 subtle.verify(algorithm, noVerifyPublicKey, signature, plaintext), { 84 subtle.verify(algorithm, hmacKey, signature, plaintext), { 89 subtle.verify(algorithm, ecdsaKeys.publicKey, signature, plaintext), { 97 assert(!(await subtle.verify(algorithm, publicKey, copy, plaintext))); 102 plaintext))); 107 const copy = Buffer.from(plaintext); [all …]
|
D | test-webcrypto-sign-verify-ecdsa.js | 19 plaintext }) { field 67 assert(await subtle.verify({ name, hash }, publicKey, signature, plaintext)); 70 const copy = Buffer.from(plaintext); 79 subtle.verify({ name, hash }, privateKey, signature, plaintext), { 84 subtle.verify({ name, hash }, noVerifyPublicKey, signature, plaintext), { 90 subtle.verify({ name, hash }, hmacKey, signature, plaintext), { 95 subtle.verify({ name, hash }, rsaKeys.publicKey, signature, plaintext), { 100 subtle.verify({ name, hash }, okpKeys.publicKey, signature, plaintext), { 112 plaintext))); 117 plaintext))); [all …]
|
D | test-webcrypto-sign-verify-hmac.js | 16 plaintext }) { field 46 assert(await subtle.verify({ name, hash }, key, signature, plaintext)); 49 const copy = Buffer.from(plaintext); 58 subtle.verify({ name, hash }, noVerifyKey, signature, plaintext), { 64 subtle.verify({ name, hash }, rsaKeys.publicKey, signature, plaintext), { 76 plaintext))); 81 plaintext))); 86 const copy = Buffer.from(plaintext); 100 assert(!(await subtle.verify({ name }, keyWithOtherHash, signature, plaintext))); 107 plaintext }) { field [all …]
|
D | test-webcrypto-encrypt-decrypt-rsa.js | 34 plaintext, property 51 const encodedPlaintext = Buffer.from(plaintext).toString('hex'); 73 plaintext, property 91 plaintext = Buffer.from(plaintext); // make a copy 93 const encodedPlaintext = Buffer.from(plaintext).toString('hex'); 95 const result = await subtle.encrypt(algorithm, publicKey, plaintext); 97 plaintext[0] = 255 - plaintext[0]; 111 plaintext, property 124 const newplaintext = new Uint8Array(plaintext.byteLength + 1); 125 newplaintext.set(plaintext, 0); [all …]
|
D | test-webcrypto-encrypt-decrypt-aes.js | 12 async function testEncrypt({ keyBuffer, algorithm, plaintext, result }) { property 14 plaintext = Buffer.from(plaintext); 23 const output = await subtle.encrypt(algorithm, key, plaintext); 24 plaintext[0] = 255 - plaintext[0]; 37 Buffer.from(plaintext).toString('hex')); 40 async function testEncryptNoEncrypt({ keyBuffer, algorithm, plaintext }) { field 48 return assert.rejects(subtle.encrypt(algorithm, key, plaintext), { 53 async function testEncryptNoDecrypt({ keyBuffer, algorithm, plaintext }) { field 61 const output = await subtle.encrypt(algorithm, key, plaintext); 68 async function testEncryptWrongAlg({ keyBuffer, algorithm, plaintext }, alg) { field [all …]
|
D | test-crypto-cipher-decipher.js | 24 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!'; 29 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 37 assert.strictEqual(txt, plaintext); 44 cStream.end(plaintext); 51 assert.strictEqual(txt, plaintext); 58 const plaintext = 66 let ciph = cipher.update(plaintext, 'utf8', 'base64'); 73 assert.strictEqual(txt, plaintext); 197 const plaintext = 'Top secret!!!'; constant 199 let ciph = c.update(plaintext, 'utf16le', 'base64'); [all …]
|
D | test-crypto-cipheriv-decipheriv.js | 11 const plaintext = 16 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 23 assert.strictEqual(txt, plaintext, 31 cStream.end(plaintext); 38 assert.strictEqual(txt, plaintext, 45 const plaintext = 50 let ciph = cipher.update(plaintext, 'utf8', 'buffer'); 57 assert.strictEqual(txt, plaintext, 65 const plaintext = Buffer.from('00112233445566778899AABBCCDDEEFF', 'hex'); 68 let ciph = cipher.update(plaintext, 'utf8', 'buffer'); [all …]
|
D | test-crypto-padding-aes256.js | 49 let plaintext = '0123456789abcdef0123456789abcdef'; // Multiple of block size variable 50 let encrypted = encrypt(plaintext, false); 52 assert.strictEqual(decrypted, plaintext); 57 plaintext = '0123456789abcdef0123456789abcde'; // not a multiple 58 encrypted = encrypt(plaintext, true); 60 assert.strictEqual(decrypted, plaintext);
|
/third_party/openssl/test/ |
D | igetest.c | 32 static unsigned char plaintext[BIG_TEST_SIZE]; variable 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec() 238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec() 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining() 252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining() 260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining() 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining() 274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining() 286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining() 302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards() [all …]
|
/third_party/openssl/test/recipes/ |
D | 20-test_enc_more.t | 27 my $plaintext = catfile(".", "testdatafile"); 49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 56 my $cipherfile = "$plaintext.$ciphername.cipher"; 57 my $clearfile = "$plaintext.$ciphername.clear"; 60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile])) 61 && compare_text($plaintext, $cipherfile) != 0 63 && compare_text($plaintext, $clearfile) == 0
|
/third_party/protobuf/src/google/protobuf/stubs/ |
D | strutil_unittest.cc | 85 const char* plaintext; member 345 const char* plaintext; member 448 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST() 450 StringPiece plaintext(base64_tests[i].plaintext, in TEST() local 491 EXPECT_EQ(plaintext, decode_str); in TEST() 495 Base64Escape(string(base64_tests[i].plaintext, in TEST() 504 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 522 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 533 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 560 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() [all …]
|
/third_party/python/Lib/test/ |
D | test_uu.py | 15 plaintext = b"The symbols on top of your keyboard are !@#$%^&*()_+|~\n" variable 61 inp = io.BytesIO(plaintext) 65 inp = io.BytesIO(plaintext) 69 inp = io.BytesIO(plaintext) 81 self.assertEqual(out.getvalue(), plaintext) 89 self.assertEqual(out.getvalue(), plaintext) 125 plaintext = b"\x33" # 00110011 132 self.assertEqual(out.getvalue(), plaintext) 137 self.assertEqual(decoded, plaintext) 141 inp = io.BytesIO(plaintext) [all …]
|