/external/boringssl/src/ssl/test/runner/ |
D | chacha20_poly1305.go | 143 func (c *chaCha20Poly1305) poly1305(tag *[16]byte, nonce, ciphertext, additionalData []byte) { 144 input := make([]byte, 0, len(additionalData)+15+len(ciphertext)+15+8+8) 150 input = append(input, ciphertext...) 157 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext))) 165 func (c *chaCha20Poly1305) poly1305Old(tag *[16]byte, nonce, ciphertext, additionalData []byte) { 166 input := make([]byte, 0, len(additionalData)+8+len(ciphertext)+8) 170 input = append(input, ciphertext...) 172 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext))) 199 func (c *chaCha20Poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 203 if len(ciphertext) < 16 { [all …]
|
D | key_agreement.go | 108 if len(ckx.ciphertext) < 2 { 112 ciphertext := ckx.ciphertext 114 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1]) 115 if ciphertextLen != len(ckx.ciphertext)-2 { 118 ciphertext = ckx.ciphertext[2:] 125 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret) 177 ckx.ciphertext = make([]byte, len(encrypted)+2) 178 ckx.ciphertext[0] = byte(len(encrypted) >> 8) 179 ckx.ciphertext[1] = byte(len(encrypted)) 180 copy(ckx.ciphertext[2:], encrypted) [all …]
|
D | ticket.go | 214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size] 215 plaintext := make([]byte, len(ciphertext)) 216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
|
D | handshake_messages.go | 1178 ciphertext []byte member 1185 length := len(m.ciphertext) 1191 copy(x[4:], m.ciphertext) 1206 m.ciphertext = data[4:]
|
/external/boringssl/src/crypto/modes/ |
D | gcm_test.c | 65 const char *ciphertext; member 305 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; in run_test_case() local 316 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, in run_test_case() 357 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { in run_test_case() 360 hexdump(stderr, "want:", ciphertext, plaintext_len); in run_test_case() 369 if (ciphertext) { in run_test_case() 370 CRYPTO_gcm128_decrypt(&ctx, &aes_key, ciphertext, out, plaintext_len); in run_test_case() 388 OPENSSL_free(ciphertext); in run_test_case()
|
/external/boringssl/src/crypto/aes/ |
D | aes_test.cc | 24 const uint8_t ciphertext[AES_BLOCK_SIZE]) { in TestAES() 34 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) { in TestAES() 42 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) { in TestAES() 53 AES_decrypt(ciphertext, block, &aes_key); in TestAES() 60 memcpy(block, ciphertext, AES_BLOCK_SIZE); in TestAES()
|
/external/boringssl/src/crypto/cipher/ |
D | cipher_test.cc | 116 const std::vector<uint8_t> &ciphertext, in TestOperation() argument 122 out = &ciphertext; in TestOperation() 124 in = &ciphertext; in TestOperation() 227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; in TestCipher() local 230 !t->GetBytes(&ciphertext, "Ciphertext")) { in TestCipher() 264 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher() 266 iv, plaintext, ciphertext, aad, tag)) { in TestCipher() 272 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher() 274 key, iv, plaintext, ciphertext, aad, tag)) { in TestCipher()
|
D | e_chacha20poly1305.c | 89 size_t ad_len, const uint8_t *ciphertext, 99 size_t ad_len, const uint8_t *ciphertext, in aead_poly1305() argument 107 update(&ctx, ad, ad_len, ciphertext, ciphertext_len); in aead_poly1305() 200 size_t ad_len, const uint8_t *ciphertext, in poly1305_update() argument 203 poly1305_update_padded_16(ctx, ciphertext, ciphertext_len); in poly1305_update() 257 size_t ad_len, const uint8_t *ciphertext, in poly1305_update_old() argument 261 CRYPTO_poly1305_update(ctx, ciphertext, ciphertext_len); in poly1305_update_old()
|
/external/boringssl/src/crypto/rsa/ |
D | rsa_test.cc | 539 uint8_t ciphertext[256]; in TestRSA() local 542 if (!RSA_encrypt(key.get(), &ciphertext_len, ciphertext, sizeof(ciphertext), in TestRSA() 552 ciphertext, ciphertext_len, RSA_PKCS1_PADDING) || in TestRSA() 560 if (!RSA_encrypt(key.get(), &ciphertext_len, ciphertext, sizeof(ciphertext), in TestRSA() 569 ciphertext, ciphertext_len, RSA_PKCS1_OAEP_PADDING) || in TestRSA() 588 memcpy(ciphertext, oaep_ciphertext, oaep_ciphertext_len); in TestRSA() 590 ciphertext[i] ^= 1; in TestRSA() 592 ciphertext, oaep_ciphertext_len, RSA_PKCS1_OAEP_PADDING)) { in TestRSA() 596 ciphertext[i] ^= 1; in TestRSA() 602 ciphertext, len, RSA_PKCS1_OAEP_PADDING)) { in TestRSA()
|
/external/openssh/openbsd-compat/ |
D | bcrypt_pbkdf.c | 73 u_int8_t ciphertext[BCRYPT_HASHSIZE] = in bcrypt_hash() local 91 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), in bcrypt_hash() 105 explicit_bzero(ciphertext, sizeof(ciphertext)); in bcrypt_hash()
|
/external/ImageMagick/MagickCore/ |
D | cipher.c | 281 static inline void AddRoundKey(const unsigned int *ciphertext, in AddRoundKey() argument 291 plaintext[i]=key[i] ^ ciphertext[i]; in AddRoundKey() 319 static void FinalizeRoundKey(const unsigned int *ciphertext, in FinalizeRoundKey() argument 338 value=ciphertext[i] ^ key[i]; in FinalizeRoundKey() 348 static void InitializeRoundKey(const unsigned char *ciphertext, in InitializeRoundKey() argument 361 p=ciphertext; in InitializeRoundKey() 381 unsigned char *ciphertext) in EncipherAESBlock() argument 481 FinalizeRoundKey(key,aes_info->encipher_key+4*aes_info->rounds,ciphertext); in EncipherAESBlock()
|
/external/srtp/srtp/ |
D | ekt.c | 150 aes_decrypt_with_raw_key(void *ciphertext, const void *key) { in aes_decrypt_with_raw_key() argument 154 aes_decrypt(ciphertext, expanded_key); in aes_decrypt_with_raw_key()
|
/external/srtp/crypto/cipher/ |
D | cipher.c | 162 if (buffer[i] != test_case->ciphertext[i]) { in cipher_type_self_test() 174 octet_string_hex_string(test_case->ciphertext, in cipher_type_self_test() 199 buffer[i] = test_case->ciphertext[i]; in cipher_type_self_test()
|
/external/boringssl/src/crypto/cipher/test/ |
D | make_legacy_aead_tests.go | 119 ciphertext []byte member 269 ciphertext: sealed[:len(sealed)-hash.Size()], 283 fmt.Printf("CT: %s\n", hex.EncodeToString(t.ciphertext))
|
D | cipher_test.txt | 75 # AES-bits-ECB:key::plaintext:ciphertext:encdec 121 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
|
D | rc4_sha1_tls_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | aes_128_cbc_sha1_ssl3_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | aes_256_cbc_sha1_tls_implicit_iv_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | des_ede3_cbc_sha1_ssl3_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
D | des_ede3_cbc_sha1_tls_implicit_iv_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed
|
/external/srtp/crypto/include/ |
D | cipher.h | 133 uint8_t *ciphertext; /* ciphertext */ member
|
/external/openssh/ |
D | PROTOCOL.chacha20poly1305 | 64 bytes of ciphertext length have been received, they may be decrypted 72 ciphertext of the packet length and the payload together. The calculated
|
D | PROTOCOL | 59 calculating the MAC over the packet ciphertext rather than the 61 protocol, where decryption of unauthenticated ciphertext provided a 66 to calculate the MAC over the packet ciphertext and to send the packet
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 418 char *ciphertext; in test_ecb() member 477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) { in test_ecb()
|
/external/libvncserver/libvncclient/ |
D | rfbproto.c | 855 uint8_t userpass[128], ciphertext[128]; in HandleARDAuth() local 981 error = gcry_cipher_encrypt(aes, ciphertext, sizeof(ciphertext), userpass, sizeof(userpass)); in HandleARDAuth() 988 if (!WriteToRFBServer(client, (char *)ciphertext, sizeof(ciphertext))) in HandleARDAuth()
|