/external/chromium-trace/catapult/third_party/vinn/third_party/parse5/test/data/tree_construction/ |
D | tests18.dat | 2 <!doctype html><plaintext></plaintext> 9 | <plaintext> 10 | "</plaintext>" 13 <!doctype html><table><plaintext></plaintext> 20 | <plaintext> 21 | "</plaintext>" 25 <!doctype html><table><tbody><plaintext></plaintext> 32 | <plaintext> 33 | "</plaintext>" 38 <!doctype html><table><tbody><tr><plaintext></plaintext> [all …]
|
D | tests4.dat | 34 </plaintext> 37 plaintext 39 | "</plaintext>"
|
D | tests2.dat | 128 <table><plaintext><td> 131 Line: 1 Col: 18 Unexpected start tag (plaintext) in table context caused voodoo mode. 137 | <plaintext> 142 <plaintext></plaintext> 144 Line: 1 Col: 11 Unexpected start tag (plaintext). Expected DOCTYPE. 150 | <plaintext> 151 | "</plaintext>"
|
/external/boringssl/src/crypto/rsa/ |
D | rsa_test.cc | 549 uint8_t plaintext[256]; in TestRSA() local 551 if (!RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA() 554 memcmp(plaintext, kPlaintext, plaintext_len) != 0) { in TestRSA() 568 if (!RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA() 571 memcmp(plaintext, kPlaintext, plaintext_len) != 0) { in TestRSA() 578 if (!RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA() 582 memcmp(plaintext, kPlaintext, plaintext_len) != 0) { in TestRSA() 591 if (RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA() 601 if (RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA()
|
/external/boringssl/src/crypto/modes/ |
D | gcm_test.c | 62 const char *plaintext; member 304 uint8_t *key = NULL, *plaintext = NULL, *additional_data = NULL, in run_test_case() local 311 !decode_hex(&plaintext, &plaintext_len, test->plaintext, test_num, in run_test_case() 353 if (plaintext) { in run_test_case() 354 CRYPTO_gcm128_encrypt(&ctx, &aes_key, plaintext, out, plaintext_len); in run_test_case() 376 if (plaintext && memcmp(out, plaintext, plaintext_len)) { in run_test_case() 385 OPENSSL_free(plaintext); in run_test_case()
|
/external/boringssl/src/crypto/aes/ |
D | aes_test.cc | 23 const uint8_t plaintext[AES_BLOCK_SIZE], in TestAES() 33 AES_encrypt(plaintext, block, &aes_key); in TestAES() 40 memcpy(block, plaintext, AES_BLOCK_SIZE); in TestAES() 54 if (memcmp(block, plaintext, AES_BLOCK_SIZE) != 0) { in TestAES() 62 if (memcmp(block, plaintext, AES_BLOCK_SIZE) != 0) { in TestAES()
|
/external/boringssl/src/crypto/cipher/ |
D | cipher_test.cc | 115 const std::vector<uint8_t> &plaintext, in TestOperation() argument 121 in = &plaintext; in TestOperation() 125 out = &plaintext; in TestOperation() 227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; in TestCipher() local 229 !t->GetBytes(&plaintext, "Plaintext") || in TestCipher() 264 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher() 266 iv, plaintext, ciphertext, aad, tag)) { in TestCipher() 272 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher() 274 key, iv, plaintext, ciphertext, aad, tag)) { in TestCipher()
|
/external/srtp/crypto/cipher/ |
D | aes.c | 1913 aes_encrypt(v128_t *plaintext, const aes_expanded_key_t exp_key) { in aes_encrypt() argument 1916 v128_xor_eq(plaintext, exp_key + 0); in aes_encrypt() 1919 aes_round(plaintext, exp_key + 1); in aes_encrypt() 1920 aes_round(plaintext, exp_key + 2); in aes_encrypt() 1921 aes_round(plaintext, exp_key + 3); in aes_encrypt() 1922 aes_round(plaintext, exp_key + 4); in aes_encrypt() 1923 aes_round(plaintext, exp_key + 5); in aes_encrypt() 1924 aes_round(plaintext, exp_key + 6); in aes_encrypt() 1925 aes_round(plaintext, exp_key + 7); in aes_encrypt() 1926 aes_round(plaintext, exp_key + 8); in aes_encrypt() [all …]
|
D | cipher.c | 132 buffer[i] = test_case->plaintext[i]; in cipher_type_self_test() 229 if (buffer[i] != test_case->plaintext[i]) { in cipher_type_self_test() 240 octet_string_hex_string(test_case->plaintext, in cipher_type_self_test()
|
/external/curl/lib/ |
D | curl_ntlm_core.c | 361 const unsigned char *plaintext, in Curl_ntlm_core_lm_resp() argument 368 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) results, in Curl_ntlm_core_lm_resp() 372 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 8), in Curl_ntlm_core_lm_resp() 376 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 16), in Curl_ntlm_core_lm_resp() 381 des_encrypt(&des, 8, results, plaintext); in Curl_ntlm_core_lm_resp() 383 des_encrypt(&des, 8, results + 8, plaintext); in Curl_ntlm_core_lm_resp() 385 des_encrypt(&des, 8, results + 16, plaintext); in Curl_ntlm_core_lm_resp() 391 gcry_cipher_encrypt(des, results, 8, plaintext, 8); in Curl_ntlm_core_lm_resp() 396 gcry_cipher_encrypt(des, results + 8, 8, plaintext, 8); in Curl_ntlm_core_lm_resp() 401 gcry_cipher_encrypt(des, results + 16, 8, plaintext, 8); in Curl_ntlm_core_lm_resp() [all …]
|
/external/boringssl/src/ssl/test/runner/ |
D | chacha20_poly1305.go | 180 func (c *chaCha20Poly1305) Seal(dst, nonce, plaintext, additionalData []byte) []byte { 185 ret, out := sliceForAppend(dst, len(plaintext)+16) 186 chaCha20(out[:len(plaintext)], plaintext, c.key[:], nonce, 1) 190 c.poly1305Old(&tag, nonce, out[:len(plaintext)], additionalData) 192 c.poly1305(&tag, nonce, out[:len(plaintext)], additionalData) 194 copy(out[len(plaintext):], tag[:])
|
D | cipher_suites.go | 227 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 229 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData) 232 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 234 return f.aead.Open(out, f.openNonce, plaintext, additionalData) 281 func (x *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 283 ret := x.aead.Seal(out, x.sealNonce, plaintext, additionalData) 288 func (x *xorNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 290 ret, err := x.aead.Open(out, x.openNonce, plaintext, additionalData)
|
D | ticket.go | 215 plaintext := make([]byte, len(ciphertext)) 216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext) 219 ok := state.unmarshal(plaintext)
|
/external/webrtc/webrtc/base/ |
D | base64_unittest.cc | 25 const char* plaintext; member 283 const char* plaintext; 371 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST() 410 EXPECT_EQ(0, memcmp(decode_buffer, base64_tests[i].plaintext, decode_length)); in TEST() 427 EXPECT_EQ_ARRAY(decoded2.size(), decoded2.data(), base64_tests[i].plaintext, i); in TEST() 442 EXPECT_EQ_ARRAY(decoded2.size(), decoded2, base64_tests[i].plaintext, i); in TEST()
|
/external/srtp/crypto/include/ |
D | aes.h | 67 aes_encrypt(v128_t *plaintext, const aes_expanded_key_t exp_key); 70 aes_decrypt(v128_t *plaintext, const aes_expanded_key_t exp_key);
|
/external/dbus/dbus/ |
D | dbus-auth.c | 1150 DBusString plaintext; in handle_client_initial_response_external_mech() local 1152 if (!_dbus_string_init (&plaintext)) in handle_client_initial_response_external_mech() 1155 if (!_dbus_append_user_from_current_process (&plaintext)) in handle_client_initial_response_external_mech() 1158 if (!_dbus_string_hex_encode (&plaintext, 0, in handle_client_initial_response_external_mech() 1163 _dbus_string_free (&plaintext); in handle_client_initial_response_external_mech() 1168 _dbus_string_free (&plaintext); in handle_client_initial_response_external_mech() 1249 DBusString plaintext; in handle_client_initial_response_anonymous_mech() local 1251 if (!_dbus_string_init (&plaintext)) in handle_client_initial_response_anonymous_mech() 1254 if (!_dbus_string_append (&plaintext, in handle_client_initial_response_anonymous_mech() 1258 if (!_dbus_string_hex_encode (&plaintext, 0, in handle_client_initial_response_anonymous_mech() [all …]
|
D | dbus-auth.h | 65 const DBusString *plaintext, 70 DBusString *plaintext);
|
D | dbus-transport.c | 988 DBusString plaintext; in recover_unused_bytes() local 993 if (!_dbus_string_init (&plaintext)) in recover_unused_bytes() 1000 encoded, &plaintext)) in recover_unused_bytes() 1002 _dbus_string_free (&plaintext); in recover_unused_bytes() 1011 if (!_dbus_string_move (&plaintext, 0, buffer, in recover_unused_bytes() 1014 _dbus_string_free (&plaintext); in recover_unused_bytes() 1029 _dbus_string_free (&plaintext); in recover_unused_bytes()
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/ |
D | test_kms.py | 41 self.service_connection.encrypt(key_id='foo', plaintext=data) 52 self.service_connection.encrypt(key_id='foo', plaintext=data)
|
/external/boringssl/src/crypto/cipher/test/ |
D | cipher_test.txt | 75 # AES-bits-ECB:key::plaintext:ciphertext:encdec 121 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 325 # 48 bytes plaintext 334 # 80 bytes plaintext 343 # 128 bytes plaintext 352 # 192 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF 361 # 288 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF 370 # 80 bytes plaintext, submitted by Intel
|
D | aes_128_gcm_tests.txt | 485 # 48 bytes plaintext 493 # 80 bytes plaintext 501 # 128 bytes plaintext 509 # 192 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF 517 # 288 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF 525 # 80 bytes plaintext, submitted by Intel
|
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/ |
D | layer1.py | 378 def encrypt(self, key_id, plaintext, encryption_context=None, argument 401 if not isinstance(plaintext, six.binary_type): 405 plaintext = base64.b64encode(plaintext) 406 params = {'KeyId': key_id, 'Plaintext': plaintext, }
|
/external/ImageMagick/MagickCore/ |
D | cipher.c | 282 const unsigned int *key,unsigned int *plaintext) in AddRoundKey() argument 291 plaintext[i]=key[i] ^ ciphertext[i]; in AddRoundKey() 320 const unsigned int *key,unsigned char *plaintext) in FinalizeRoundKey() argument 335 p=plaintext; in FinalizeRoundKey() 349 const unsigned int *key,unsigned int *plaintext) in InitializeRoundKey() argument 367 plaintext[i]=key[i] ^ value; in InitializeRoundKey() 380 static void EncipherAESBlock(AESInfo *aes_info,const unsigned char *plaintext, in EncipherAESBlock() argument 462 InitializeRoundKey(plaintext,aes_info->encipher_key,text); in EncipherAESBlock()
|
/external/srtp/tables/ |
D | aes_tables.c | 323 uint8_t plaintext[16] = { in aes_test_inverse() local 335 v128_copy_octet_string(&x, plaintext); in aes_test_inverse() 342 v128_copy_octet_string(&y, plaintext); in aes_test_inverse()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_module_tests.c | 36 u8 plaintext[] = { in test_siv() local 94 if (aes_siv_encrypt(key, plaintext, sizeof(plaintext), in test_siv() 109 if (os_memcmp(out, plaintext, sizeof(plaintext)) != 0) { in test_siv() 417 char *plaintext; in test_ecb() member 476 hexstr2bin(tv->plaintext, plain, sizeof(plain)) || in test_ecb()
|