Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 25 of 45) sorted by relevance

12

/external/boringssl/src/ssl/test/runner/
Dchacha20_poly1305.go143 func (c *chaCha20Poly1305) poly1305(tag *[16]byte, nonce, ciphertext, additionalData []byte) {
144 input := make([]byte, 0, len(additionalData)+15+len(ciphertext)+15+8+8)
150 input = append(input, ciphertext...)
157 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext)))
165 func (c *chaCha20Poly1305) poly1305Old(tag *[16]byte, nonce, ciphertext, additionalData []byte) {
166 input := make([]byte, 0, len(additionalData)+8+len(ciphertext)+8)
170 input = append(input, ciphertext...)
172 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext)))
199 func (c *chaCha20Poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) {
203 if len(ciphertext) < 16 {
[all …]
Dkey_agreement.go108 if len(ckx.ciphertext) < 2 {
112 ciphertext := ckx.ciphertext
114 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1])
115 if ciphertextLen != len(ckx.ciphertext)-2 {
118 ciphertext = ckx.ciphertext[2:]
125 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret)
177 ckx.ciphertext = make([]byte, len(encrypted)+2)
178 ckx.ciphertext[0] = byte(len(encrypted) >> 8)
179 ckx.ciphertext[1] = byte(len(encrypted))
180 copy(ckx.ciphertext[2:], encrypted)
[all …]
Dticket.go214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size]
215 plaintext := make([]byte, len(ciphertext))
216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
Dhandshake_messages.go1178 ciphertext []byte member
1185 length := len(m.ciphertext)
1191 copy(x[4:], m.ciphertext)
1206 m.ciphertext = data[4:]
/external/boringssl/src/crypto/modes/
Dgcm_test.c65 const char *ciphertext; member
305 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; in run_test_case() local
316 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, in run_test_case()
357 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { in run_test_case()
360 hexdump(stderr, "want:", ciphertext, plaintext_len); in run_test_case()
369 if (ciphertext) { in run_test_case()
370 CRYPTO_gcm128_decrypt(&ctx, &aes_key, ciphertext, out, plaintext_len); in run_test_case()
388 OPENSSL_free(ciphertext); in run_test_case()
/external/boringssl/src/crypto/aes/
Daes_test.cc24 const uint8_t ciphertext[AES_BLOCK_SIZE]) { in TestAES()
34 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) { in TestAES()
42 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) { in TestAES()
53 AES_decrypt(ciphertext, block, &aes_key); in TestAES()
60 memcpy(block, ciphertext, AES_BLOCK_SIZE); in TestAES()
/external/boringssl/src/crypto/cipher/
Dcipher_test.cc116 const std::vector<uint8_t> &ciphertext, in TestOperation() argument
122 out = &ciphertext; in TestOperation()
124 in = &ciphertext; in TestOperation()
227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; in TestCipher() local
230 !t->GetBytes(&ciphertext, "Ciphertext")) { in TestCipher()
264 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher()
266 iv, plaintext, ciphertext, aad, tag)) { in TestCipher()
272 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher()
274 key, iv, plaintext, ciphertext, aad, tag)) { in TestCipher()
De_chacha20poly1305.c89 size_t ad_len, const uint8_t *ciphertext,
99 size_t ad_len, const uint8_t *ciphertext, in aead_poly1305() argument
107 update(&ctx, ad, ad_len, ciphertext, ciphertext_len); in aead_poly1305()
200 size_t ad_len, const uint8_t *ciphertext, in poly1305_update() argument
203 poly1305_update_padded_16(ctx, ciphertext, ciphertext_len); in poly1305_update()
257 size_t ad_len, const uint8_t *ciphertext, in poly1305_update_old() argument
261 CRYPTO_poly1305_update(ctx, ciphertext, ciphertext_len); in poly1305_update_old()
/external/boringssl/src/crypto/rsa/
Drsa_test.cc539 uint8_t ciphertext[256]; in TestRSA() local
542 if (!RSA_encrypt(key.get(), &ciphertext_len, ciphertext, sizeof(ciphertext), in TestRSA()
552 ciphertext, ciphertext_len, RSA_PKCS1_PADDING) || in TestRSA()
560 if (!RSA_encrypt(key.get(), &ciphertext_len, ciphertext, sizeof(ciphertext), in TestRSA()
569 ciphertext, ciphertext_len, RSA_PKCS1_OAEP_PADDING) || in TestRSA()
588 memcpy(ciphertext, oaep_ciphertext, oaep_ciphertext_len); in TestRSA()
590 ciphertext[i] ^= 1; in TestRSA()
592 ciphertext, oaep_ciphertext_len, RSA_PKCS1_OAEP_PADDING)) { in TestRSA()
596 ciphertext[i] ^= 1; in TestRSA()
602 ciphertext, len, RSA_PKCS1_OAEP_PADDING)) { in TestRSA()
/external/openssh/openbsd-compat/
Dbcrypt_pbkdf.c73 u_int8_t ciphertext[BCRYPT_HASHSIZE] = in bcrypt_hash() local
91 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), in bcrypt_hash()
105 explicit_bzero(ciphertext, sizeof(ciphertext)); in bcrypt_hash()
/external/ImageMagick/MagickCore/
Dcipher.c281 static inline void AddRoundKey(const unsigned int *ciphertext, in AddRoundKey() argument
291 plaintext[i]=key[i] ^ ciphertext[i]; in AddRoundKey()
319 static void FinalizeRoundKey(const unsigned int *ciphertext, in FinalizeRoundKey() argument
338 value=ciphertext[i] ^ key[i]; in FinalizeRoundKey()
348 static void InitializeRoundKey(const unsigned char *ciphertext, in InitializeRoundKey() argument
361 p=ciphertext; in InitializeRoundKey()
381 unsigned char *ciphertext) in EncipherAESBlock() argument
481 FinalizeRoundKey(key,aes_info->encipher_key+4*aes_info->rounds,ciphertext); in EncipherAESBlock()
/external/srtp/srtp/
Dekt.c150 aes_decrypt_with_raw_key(void *ciphertext, const void *key) { in aes_decrypt_with_raw_key() argument
154 aes_decrypt(ciphertext, expanded_key); in aes_decrypt_with_raw_key()
/external/srtp/crypto/cipher/
Dcipher.c162 if (buffer[i] != test_case->ciphertext[i]) { in cipher_type_self_test()
174 octet_string_hex_string(test_case->ciphertext, in cipher_type_self_test()
199 buffer[i] = test_case->ciphertext[i]; in cipher_type_self_test()
/external/boringssl/src/crypto/cipher/test/
Dmake_legacy_aead_tests.go119 ciphertext []byte member
269 ciphertext: sealed[:len(sealed)-hash.Size()],
283 fmt.Printf("CT: %s\n", hex.EncodeToString(t.ciphertext))
Dcipher_test.txt75 # AES-bits-ECB:key::plaintext:ciphertext:encdec
121 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
Drc4_sha1_tls_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Daes_128_cbc_sha1_ssl3_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Daes_256_cbc_sha1_tls_implicit_iv_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Ddes_ede3_cbc_sha1_ssl3_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
Ddes_ede3_cbc_sha1_tls_implicit_iv_tests.txt4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
/external/srtp/crypto/include/
Dcipher.h133 uint8_t *ciphertext; /* ciphertext */ member
/external/openssh/
DPROTOCOL.chacha20poly130564 bytes of ciphertext length have been received, they may be decrypted
72 ciphertext of the packet length and the payload together. The calculated
DPROTOCOL59 calculating the MAC over the packet ciphertext rather than the
61 protocol, where decryption of unauthenticated ciphertext provided a
66 to calculate the MAC over the packet ciphertext and to send the packet
/external/wpa_supplicant_8/src/crypto/
Dcrypto_module_tests.c418 char *ciphertext; in test_ecb() member
477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) { in test_ecb()
/external/libvncserver/libvncclient/
Drfbproto.c855 uint8_t userpass[128], ciphertext[128]; in HandleARDAuth() local
981 error = gcry_cipher_encrypt(aes, ciphertext, sizeof(ciphertext), userpass, sizeof(userpass)); in HandleARDAuth()
988 if (!WriteToRFBServer(client, (char *)ciphertext, sizeof(ciphertext))) in HandleARDAuth()

12