Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 173) sorted by relevance

1234567

/third_party/parse5/test/data/parser-feedback/
Dtests18.test5 "description": "<plaintext></plaintext>",
6 "input": "<plaintext></plaintext>",
10 "plaintext",
15 "</plaintext>"
21 "description": "<!doctype html><plaintext></plaintext>",
22 "input": "<!doctype html><plaintext></plaintext>",
33 "plaintext",
38 "</plaintext>"
44 "description": "<!doctype html><html><plaintext></plaintext>",
45 "input": "<!doctype html><html><plaintext></plaintext>",
[all …]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/encrypt_decrypt/
Drsa_vectors.js29 …var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210…
53 plaintext: plaintext.slice(0, 214), property
66 plaintext: plaintext.slice(0, 190), property
79 plaintext: plaintext.slice(0, 158), property
92 plaintext: plaintext.slice(0, 126), property
105 plaintext: plaintext.slice(0, 214), property
118 plaintext: plaintext.slice(0, 190), property
131 plaintext: plaintext.slice(0, 158), property
144 plaintext: plaintext.slice(0, 126), property
157 plaintext: plaintext.slice(0, 214), property
[all …]
Drsa.js25 .then(function(plaintext) { argument
26 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works"));
55 .then(function(plaintext) { argument
56 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works"));
81 .then(function(plaintext) { argument
109 .then(function(plaintext) { argument
133 var plaintext = copyBuffer(vector.plaintext);
134 var operation = subtle.encrypt(vector.algorithm, vector.publicKey, plaintext)
140 … assert_true(equalBuffers(result, vector.plaintext), "Round trip returns original plaintext");
148 return subtle.encrypt(vector.algorithm, vector.publicKey, vector.plaintext)
[all …]
Daes_cbc_vectors.js16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115,
210 plaintext: plaintext, property
224 plaintext: plaintext, property
236 plaintext: plaintext, property
254 plaintext: plaintext, property
Daes_ctr_vectors.js16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115,
95 plaintext: plaintext, property
108 plaintext: plaintext, property
117 plaintext: plaintext, property
/third_party/node/test/fixtures/crypto/
Drsa.js67 const plaintext = Buffer.from(
179 plaintext: plaintext.slice(0, 214), property
192 plaintext: plaintext.slice(0, 190), property
205 plaintext: plaintext.slice(0, 158), property
218 plaintext: plaintext.slice(0, 126), property
231 plaintext: plaintext.slice(0, 214), property
244 plaintext: plaintext.slice(0, 190), property
257 plaintext: plaintext.slice(0, 158), property
270 plaintext: plaintext.slice(0, 126), property
283 plaintext: plaintext.slice(0, 214), property
[all …]
Drsa_pss.js53 const plaintext = Buffer.from(
87 plaintext, property
95 plaintext, property
103 plaintext, property
111 plaintext, property
119 plaintext, property
127 plaintext, property
135 plaintext, property
143 plaintext, property
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/
Drsa_pss_vectors.js25 …var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210…
50 plaintext: plaintext, property
63 plaintext: plaintext, property
76 plaintext: plaintext, property
89 plaintext: plaintext, property
102 plaintext: plaintext, property
115 plaintext: plaintext, property
128 plaintext: plaintext, property
141 plaintext: plaintext, property
Drsa_pkcs_vectors.js25 …var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210…
46 plaintext: plaintext, property
59 plaintext: plaintext, property
72 plaintext: plaintext, property
85 plaintext: plaintext, property
Dhmac.js19 … = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vector.plaintext)
46 …eration = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, signature, vector.plaintext)
70 var plaintext = copyBuffer(vector.plaintext);
71 …eration = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, plaintext)
78 plaintext[0] = 255 - plaintext[0];
97 …rn subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vector.plaintext)
98 .then(function(plaintext) { argument
118 return subtle.sign({name: "HMAC", hash: vector.hash}, vector.key, vector.plaintext)
121 … return subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, signature, vector.plaintext)
150 …r operation = subtle.sign({name: "HMAC", hash: vector.hash}, wrongKey.privateKey, vector.plaintext)
[all …]
Drsa.js19 …r operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, vector.plaintext)
46 … var operation = subtle.verify(vector.algorithm, vector.publicKey, signature, vector.plaintext)
70 var plaintext = copyBuffer(vector.plaintext);
71 … var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, plaintext)
78 plaintext[0] = 255 - plaintext[0];
95 … return subtle.verify(vector.algorithm, vector.privateKey, vector.signature, vector.plaintext)
96 .then(function(plaintext) { argument
117 return subtle.sign(vector.algorithm, vector.publicKey, vector.plaintext)
140 … return subtle.verify(vector.algorithm, vector.publicKey, vector.signature, vector.plaintext)
141 .then(function(plaintext) { argument
[all …]
Decdsa.js21 … var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, vector.plaintext)
49 … var operation = subtle.verify(algorithm, vector.publicKey, signature, vector.plaintext)
74 var plaintext = copyBuffer(vector.plaintext);
75 … var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, plaintext)
82 plaintext[0] = 255 - plaintext[0];
100 … return subtle.verify(algorithm, vector.privateKey, vector.signature, vector.plaintext)
101 .then(function(plaintext) { argument
123 return subtle.sign(algorithm, vector.publicKey, vector.plaintext)
147 … return subtle.verify(algorithm, vector.publicKey, vector.signature, vector.plaintext)
148 .then(function(plaintext) { argument
[all …]
/third_party/mbedtls/tests/suites/
Dtest_suite_nist_kw.function22 unsigned char plaintext[32];
27 memset(plaintext, 0, sizeof(plaintext));
44 plaintext, sizeof(plaintext),
56 plaintext, &output_len,
57 sizeof(plaintext)) == 0);
59 TEST_ASSERT(output_len == sizeof(plaintext));
60 for (i = 0; i < sizeof(plaintext); i++) {
61 TEST_ASSERT(plaintext[i] == 0);
79 plaintext, sizeof(plaintext),
85 plaintext, sizeof(plaintext),
[all …]
/third_party/node/test/parallel/
Dtest-webcrypto-sign-verify-rsa.js20 plaintext, property
61 assert(await subtle.verify(algorithm, publicKey, signature, plaintext));
64 const copy = Buffer.from(plaintext);
73 subtle.verify(algorithm, privateKey, signature, plaintext), {
78 subtle.verify(algorithm, noVerifyPublicKey, signature, plaintext), {
84 subtle.verify(algorithm, hmacKey, signature, plaintext), {
89 subtle.verify(algorithm, ecdsaKeys.publicKey, signature, plaintext), {
97 assert(!(await subtle.verify(algorithm, publicKey, copy, plaintext)));
102 plaintext)));
107 const copy = Buffer.from(plaintext);
[all …]
Dtest-webcrypto-sign-verify-ecdsa.js19 plaintext }) { field
67 assert(await subtle.verify({ name, hash }, publicKey, signature, plaintext));
70 const copy = Buffer.from(plaintext);
79 subtle.verify({ name, hash }, privateKey, signature, plaintext), {
84 subtle.verify({ name, hash }, noVerifyPublicKey, signature, plaintext), {
90 subtle.verify({ name, hash }, hmacKey, signature, plaintext), {
95 subtle.verify({ name, hash }, rsaKeys.publicKey, signature, plaintext), {
100 subtle.verify({ name, hash }, okpKeys.publicKey, signature, plaintext), {
112 plaintext)));
117 plaintext)));
[all …]
Dtest-webcrypto-sign-verify-hmac.js16 plaintext }) { field
46 assert(await subtle.verify({ name, hash }, key, signature, plaintext));
49 const copy = Buffer.from(plaintext);
58 subtle.verify({ name, hash }, noVerifyKey, signature, plaintext), {
64 subtle.verify({ name, hash }, rsaKeys.publicKey, signature, plaintext), {
76 plaintext)));
81 plaintext)));
86 const copy = Buffer.from(plaintext);
100 assert(!(await subtle.verify({ name }, keyWithOtherHash, signature, plaintext)));
107 plaintext }) { field
[all …]
Dtest-webcrypto-encrypt-decrypt-rsa.js34 plaintext, property
51 const encodedPlaintext = Buffer.from(plaintext).toString('hex');
73 plaintext, property
91 plaintext = Buffer.from(plaintext); // make a copy
93 const encodedPlaintext = Buffer.from(plaintext).toString('hex');
95 const result = await subtle.encrypt(algorithm, publicKey, plaintext);
97 plaintext[0] = 255 - plaintext[0];
111 plaintext, property
124 const newplaintext = new Uint8Array(plaintext.byteLength + 1);
125 newplaintext.set(plaintext, 0);
[all …]
Dtest-webcrypto-encrypt-decrypt-aes.js12 async function testEncrypt({ keyBuffer, algorithm, plaintext, result }) { property
14 plaintext = Buffer.from(plaintext);
23 const output = await subtle.encrypt(algorithm, key, plaintext);
24 plaintext[0] = 255 - plaintext[0];
37 Buffer.from(plaintext).toString('hex'));
40 async function testEncryptNoEncrypt({ keyBuffer, algorithm, plaintext }) { field
48 return assert.rejects(subtle.encrypt(algorithm, key, plaintext), {
53 async function testEncryptNoDecrypt({ keyBuffer, algorithm, plaintext }) { field
61 const output = await subtle.encrypt(algorithm, key, plaintext);
68 async function testEncryptWrongAlg({ keyBuffer, algorithm, plaintext }, alg) { field
[all …]
Dtest-crypto-cipher-decipher.js24 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!';
29 let ciph = cipher.update(plaintext, 'utf8', 'hex');
37 assert.strictEqual(txt, plaintext);
44 cStream.end(plaintext);
51 assert.strictEqual(txt, plaintext);
58 const plaintext =
66 let ciph = cipher.update(plaintext, 'utf8', 'base64');
73 assert.strictEqual(txt, plaintext);
197 const plaintext = 'Top secret!!!'; constant
199 let ciph = c.update(plaintext, 'utf16le', 'base64');
[all …]
Dtest-crypto-cipheriv-decipheriv.js11 const plaintext =
16 let ciph = cipher.update(plaintext, 'utf8', 'hex');
23 assert.strictEqual(txt, plaintext,
31 cStream.end(plaintext);
38 assert.strictEqual(txt, plaintext,
45 const plaintext =
50 let ciph = cipher.update(plaintext, 'utf8', 'buffer');
57 assert.strictEqual(txt, plaintext,
65 const plaintext = Buffer.from('00112233445566778899AABBCCDDEEFF', 'hex');
68 let ciph = cipher.update(plaintext, 'utf8', 'buffer');
[all …]
Dtest-crypto-padding-aes256.js49 let plaintext = '0123456789abcdef0123456789abcdef'; // Multiple of block size variable
50 let encrypted = encrypt(plaintext, false);
52 assert.strictEqual(decrypted, plaintext);
57 plaintext = '0123456789abcdef0123456789abcde'; // not a multiple
58 encrypted = encrypt(plaintext, true);
60 assert.strictEqual(decrypted, plaintext);
/third_party/openssl/test/
Digetest.c32 static unsigned char plaintext[BIG_TEST_SIZE]; variable
232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec()
238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec()
250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining()
252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining()
260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining()
272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining()
274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining()
286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining()
302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards()
[all …]
/third_party/openssl/test/recipes/
D20-test_enc_more.t27 my $plaintext = catfile(".", "testdatafile");
49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) {
56 my $cipherfile = "$plaintext.$ciphername.cipher";
57 my $clearfile = "$plaintext.$ciphername.clear";
60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile]))
61 && compare_text($plaintext, $cipherfile) != 0
63 && compare_text($plaintext, $clearfile) == 0
/third_party/protobuf/src/google/protobuf/stubs/
Dstrutil_unittest.cc85 const char* plaintext; member
345 const char* plaintext; member
448 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST()
450 StringPiece plaintext(base64_tests[i].plaintext, in TEST() local
491 EXPECT_EQ(plaintext, decode_str); in TEST()
495 Base64Escape(string(base64_tests[i].plaintext, in TEST()
504 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
522 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
533 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
560 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
[all …]
/third_party/python/Lib/test/
Dtest_uu.py15 plaintext = b"The symbols on top of your keyboard are !@#$%^&*()_+|~\n" variable
61 inp = io.BytesIO(plaintext)
65 inp = io.BytesIO(plaintext)
69 inp = io.BytesIO(plaintext)
81 self.assertEqual(out.getvalue(), plaintext)
89 self.assertEqual(out.getvalue(), plaintext)
125 plaintext = b"\x33" # 00110011
132 self.assertEqual(out.getvalue(), plaintext)
137 self.assertEqual(decoded, plaintext)
141 inp = io.BytesIO(plaintext)
[all …]

1234567