Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 16 of 16) sorted by relevance

/external/openssl/crypto/evp/
Devp_test.c139 const unsigned char *ciphertext,int cn, in test1() argument
152 hexdump(stdout,"Ciphertext",ciphertext,cn); in test1()
191 if(memcmp(out,ciphertext,cn)) in test1()
195 hexdump(stderr,"Expected",ciphertext,cn); in test1()
210 if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn)) in test1()
247 const unsigned char *ciphertext,int cn, in test_cipher() argument
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); in test_cipher()
263 const unsigned char *ciphertext, unsigned int cn) in test_digest() argument
276 hexdump(stdout,"Digest",ciphertext,cn); in test_digest()
305 if(memcmp(md,ciphertext,cn)) in test_digest()
[all …]
Devptests.txt1 #cipher:key:iv:plaintext:ciphertext:0/1(decrypt/encrypt)
62 # AES-bits-ECB:key::plaintext:ciphertext:encdec
79 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
97 # AES-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec
129 # AES-bits-CFB:key:IV/output':plaintext:ciphertext:encdec
188 # CAMELLIA-bits-ECB:key::plaintext:ciphertext:encdec
217 # CAMELLIA-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
238 # CAMELLIA-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec
276 # CAMELLIA-bits-OFB:key:IV/output':plaintext:ciphertext:encdec
/external/webkit/SunSpider/tests/
Dcrypto-aes.js189 var ciphertext = new Array(blockCount); // ciphertext as array of strings
210 ciphertext[b] = escCtrlChars(ct); // escape troublesome characters in ciphertext
219 return ctrTxt + '-' + ciphertext.join('-');
230 function AESDecryptCtr(ciphertext, password, nBits) { argument
242 ciphertext = ciphertext.split('-'); // split ciphertext into array of block-length strings
247 var ctrTxt = unescCtrlChars(ciphertext[0]);
250 var plaintext = new Array(ciphertext.length-1);
252 for (var b=1; b<ciphertext.length; b++) {
259 ciphertext[b] = unescCtrlChars(ciphertext[b]);
262 for (var i=0; i<ciphertext[b].length; i++) {
[all …]
/external/dropbear/
Dkeyimport.c1264 char *ciphertext;
1329 ciphertext = (char *)key->keyblob + pos + 4;
1370 des3_decrypt_pubkey_ossh(keybuf, iv, (unsigned char *)ciphertext,
1389 len = GET_32BIT(ciphertext);
1394 ciphertext += 4;
1408 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &e);
1409 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &d);
1410 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &n);
1411 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &u);
1412 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &p);
[all …]
/external/dropbear/libtomcrypt/src/ciphers/
Danubis.c1039 static void anubis_crypt(const unsigned char *plaintext, unsigned char *ciphertext, in anubis_crypt() argument
1125 ciphertext[pos ] = (unsigned char)(w >> 24); in anubis_crypt()
1126 ciphertext[pos + 1] = (unsigned char)(w >> 16); in anubis_crypt()
1127 ciphertext[pos + 2] = (unsigned char)(w >> 8); in anubis_crypt()
1128 ciphertext[pos + 3] = (unsigned char)(w ); in anubis_crypt()
Dkhazad.c677 static void khazad_crypt(const unsigned char *plaintext, unsigned char *ciphertext, in khazad_crypt() argument
729 ciphertext[0] = (unsigned char)(state >> 56); in khazad_crypt()
730 ciphertext[1] = (unsigned char)(state >> 48); in khazad_crypt()
731 ciphertext[2] = (unsigned char)(state >> 40); in khazad_crypt()
732 ciphertext[3] = (unsigned char)(state >> 32); in khazad_crypt()
733 ciphertext[4] = (unsigned char)(state >> 24); in khazad_crypt()
734 ciphertext[5] = (unsigned char)(state >> 16); in khazad_crypt()
735 ciphertext[6] = (unsigned char)(state >> 8); in khazad_crypt()
736 ciphertext[7] = (unsigned char)(state ); in khazad_crypt()
/external/dropbear/libtomcrypt/demos/
Dencrypt.c97 unsigned char plaintext[512],ciphertext[512]; in main() local
223 if ((errno = ctr_encrypt(inbuf,ciphertext,y,&ctr)) != CRYPT_OK) { in main()
228 if (fwrite(ciphertext,1,y,fdout) != y) { in main()
/external/dropbear/libtomcrypt/src/encauth/eax/
Deax_test.c39 ciphertext[MAXBLOCKSIZE], in eax_test()
234 … if (XMEMCMP(outct, tests[x].ciphertext, tests[x].msglen) || XMEMCMP(outtag, tests[x].tag, len)) { in eax_test()
/external/dropbear/libtomcrypt/notes/
Dccm_tv.txt2 are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag of the previous
Dgcm_tv.txt2 are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag of the previous
Docb_tv.txt2 are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag of the previous
Deax_tv.txt2 are of the form ciphertext,tag for a given NN. The key for step N>1 is the tag of the previous
/external/dropbear/libtomcrypt/
Dcrypt.tex446 \textit{ct}\footnote{ct stands for ciphertext.} is the output. For the decryption function it's th…
840 by encrypting the last ciphertext block in ECB mode, and XOR'ing the output against the last partia…
910 and end up with the same ciphertext. However, encrypting \textit{ABC} and \textit{DABC} will resul…
939 were the last ciphertext block. In CFB mode, the IV is encrypted as if it were the prior encrypted…
989 buffer, /* ciphertext */
997 /* make use of ciphertext... */
1008 if ((err = ctr_decrypt( buffer, /* ciphertext */
1071 These will encrypt (or decrypt) the plaintext to the ciphertext buffer (or vice versa). The length…
1169 The mode can then process plaintext producing ciphertext as well as compute a partial checksum. Th…
1171 sized message block to send to the recipient as ciphertext. This makes the EAX mode especially sui…
[all …]
/external/openssl/ssl/
Dkssl.c1282 new5ticket->enc_part.ciphertext.length = in kssl_TKT2tkt()
1284 if ((new5ticket->enc_part.ciphertext.data = in kssl_TKT2tkt()
1295 memcpy(new5ticket->enc_part.ciphertext.data, in kssl_TKT2tkt()
/external/openssl/crypto/rc2/
Drrc2.doc58 RRC.2 uses a single 256-byte S-box derived from the ciphertext contents of
/external/openssl/crypto/rc4/
Drrc4.doc134 The vectors I used (together with the ciphertext they produce)