Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 25 of 59) sorted by relevance

123

/external/chromium-trace/catapult/third_party/vinn/third_party/parse5/test/data/tree_construction/
Dtests18.dat2 <!doctype html><plaintext></plaintext>
9 | <plaintext>
10 | "</plaintext>"
13 <!doctype html><table><plaintext></plaintext>
20 | <plaintext>
21 | "</plaintext>"
25 <!doctype html><table><tbody><plaintext></plaintext>
32 | <plaintext>
33 | "</plaintext>"
38 <!doctype html><table><tbody><tr><plaintext></plaintext>
[all …]
Dtests4.dat34 </plaintext>
37 plaintext
39 | "</plaintext>"
Dtests2.dat128 <table><plaintext><td>
131 Line: 1 Col: 18 Unexpected start tag (plaintext) in table context caused voodoo mode.
137 | <plaintext>
142 <plaintext></plaintext>
144 Line: 1 Col: 11 Unexpected start tag (plaintext). Expected DOCTYPE.
150 | <plaintext>
151 | "</plaintext>"
/external/boringssl/src/crypto/rsa/
Drsa_test.cc549 uint8_t plaintext[256]; in TestRSA() local
551 if (!RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA()
554 memcmp(plaintext, kPlaintext, plaintext_len) != 0) { in TestRSA()
568 if (!RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA()
571 memcmp(plaintext, kPlaintext, plaintext_len) != 0) { in TestRSA()
578 if (!RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA()
582 memcmp(plaintext, kPlaintext, plaintext_len) != 0) { in TestRSA()
591 if (RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA()
601 if (RSA_decrypt(key.get(), &plaintext_len, plaintext, sizeof(plaintext), in TestRSA()
/external/boringssl/src/crypto/modes/
Dgcm_test.c62 const char *plaintext; member
304 uint8_t *key = NULL, *plaintext = NULL, *additional_data = NULL, in run_test_case() local
311 !decode_hex(&plaintext, &plaintext_len, test->plaintext, test_num, in run_test_case()
353 if (plaintext) { in run_test_case()
354 CRYPTO_gcm128_encrypt(&ctx, &aes_key, plaintext, out, plaintext_len); in run_test_case()
376 if (plaintext && memcmp(out, plaintext, plaintext_len)) { in run_test_case()
385 OPENSSL_free(plaintext); in run_test_case()
/external/boringssl/src/crypto/aes/
Daes_test.cc23 const uint8_t plaintext[AES_BLOCK_SIZE], in TestAES()
33 AES_encrypt(plaintext, block, &aes_key); in TestAES()
40 memcpy(block, plaintext, AES_BLOCK_SIZE); in TestAES()
54 if (memcmp(block, plaintext, AES_BLOCK_SIZE) != 0) { in TestAES()
62 if (memcmp(block, plaintext, AES_BLOCK_SIZE) != 0) { in TestAES()
/external/boringssl/src/crypto/cipher/
Dcipher_test.cc115 const std::vector<uint8_t> &plaintext, in TestOperation() argument
121 in = &plaintext; in TestOperation()
125 out = &plaintext; in TestOperation()
227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; in TestCipher() local
229 !t->GetBytes(&plaintext, "Plaintext") || in TestCipher()
264 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher()
266 iv, plaintext, ciphertext, aad, tag)) { in TestCipher()
272 key, iv, plaintext, ciphertext, aad, tag) || in TestCipher()
274 key, iv, plaintext, ciphertext, aad, tag)) { in TestCipher()
/external/srtp/crypto/cipher/
Daes.c1913 aes_encrypt(v128_t *plaintext, const aes_expanded_key_t exp_key) { in aes_encrypt() argument
1916 v128_xor_eq(plaintext, exp_key + 0); in aes_encrypt()
1919 aes_round(plaintext, exp_key + 1); in aes_encrypt()
1920 aes_round(plaintext, exp_key + 2); in aes_encrypt()
1921 aes_round(plaintext, exp_key + 3); in aes_encrypt()
1922 aes_round(plaintext, exp_key + 4); in aes_encrypt()
1923 aes_round(plaintext, exp_key + 5); in aes_encrypt()
1924 aes_round(plaintext, exp_key + 6); in aes_encrypt()
1925 aes_round(plaintext, exp_key + 7); in aes_encrypt()
1926 aes_round(plaintext, exp_key + 8); in aes_encrypt()
[all …]
Dcipher.c132 buffer[i] = test_case->plaintext[i]; in cipher_type_self_test()
229 if (buffer[i] != test_case->plaintext[i]) { in cipher_type_self_test()
240 octet_string_hex_string(test_case->plaintext, in cipher_type_self_test()
/external/curl/lib/
Dcurl_ntlm_core.c361 const unsigned char *plaintext, in Curl_ntlm_core_lm_resp() argument
368 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) results, in Curl_ntlm_core_lm_resp()
372 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 8), in Curl_ntlm_core_lm_resp()
376 DES_ecb_encrypt((DES_cblock*) plaintext, (DES_cblock*) (results + 16), in Curl_ntlm_core_lm_resp()
381 des_encrypt(&des, 8, results, plaintext); in Curl_ntlm_core_lm_resp()
383 des_encrypt(&des, 8, results + 8, plaintext); in Curl_ntlm_core_lm_resp()
385 des_encrypt(&des, 8, results + 16, plaintext); in Curl_ntlm_core_lm_resp()
391 gcry_cipher_encrypt(des, results, 8, plaintext, 8); in Curl_ntlm_core_lm_resp()
396 gcry_cipher_encrypt(des, results + 8, 8, plaintext, 8); in Curl_ntlm_core_lm_resp()
401 gcry_cipher_encrypt(des, results + 16, 8, plaintext, 8); in Curl_ntlm_core_lm_resp()
[all …]
/external/boringssl/src/ssl/test/runner/
Dchacha20_poly1305.go180 func (c *chaCha20Poly1305) Seal(dst, nonce, plaintext, additionalData []byte) []byte {
185 ret, out := sliceForAppend(dst, len(plaintext)+16)
186 chaCha20(out[:len(plaintext)], plaintext, c.key[:], nonce, 1)
190 c.poly1305Old(&tag, nonce, out[:len(plaintext)], additionalData)
192 c.poly1305(&tag, nonce, out[:len(plaintext)], additionalData)
194 copy(out[len(plaintext):], tag[:])
Dcipher_suites.go227 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
229 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData)
232 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) {
234 return f.aead.Open(out, f.openNonce, plaintext, additionalData)
281 func (x *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte {
283 ret := x.aead.Seal(out, x.sealNonce, plaintext, additionalData)
288 func (x *xorNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) {
290 ret, err := x.aead.Open(out, x.openNonce, plaintext, additionalData)
Dticket.go215 plaintext := make([]byte, len(ciphertext))
216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
219 ok := state.unmarshal(plaintext)
/external/webrtc/webrtc/base/
Dbase64_unittest.cc25 const char* plaintext; member
283 const char* plaintext;
371 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST()
410 EXPECT_EQ(0, memcmp(decode_buffer, base64_tests[i].plaintext, decode_length)); in TEST()
427 EXPECT_EQ_ARRAY(decoded2.size(), decoded2.data(), base64_tests[i].plaintext, i); in TEST()
442 EXPECT_EQ_ARRAY(decoded2.size(), decoded2, base64_tests[i].plaintext, i); in TEST()
/external/srtp/crypto/include/
Daes.h67 aes_encrypt(v128_t *plaintext, const aes_expanded_key_t exp_key);
70 aes_decrypt(v128_t *plaintext, const aes_expanded_key_t exp_key);
/external/dbus/dbus/
Ddbus-auth.c1150 DBusString plaintext; in handle_client_initial_response_external_mech() local
1152 if (!_dbus_string_init (&plaintext)) in handle_client_initial_response_external_mech()
1155 if (!_dbus_append_user_from_current_process (&plaintext)) in handle_client_initial_response_external_mech()
1158 if (!_dbus_string_hex_encode (&plaintext, 0, in handle_client_initial_response_external_mech()
1163 _dbus_string_free (&plaintext); in handle_client_initial_response_external_mech()
1168 _dbus_string_free (&plaintext); in handle_client_initial_response_external_mech()
1249 DBusString plaintext; in handle_client_initial_response_anonymous_mech() local
1251 if (!_dbus_string_init (&plaintext)) in handle_client_initial_response_anonymous_mech()
1254 if (!_dbus_string_append (&plaintext, in handle_client_initial_response_anonymous_mech()
1258 if (!_dbus_string_hex_encode (&plaintext, 0, in handle_client_initial_response_anonymous_mech()
[all …]
Ddbus-auth.h65 const DBusString *plaintext,
70 DBusString *plaintext);
Ddbus-transport.c988 DBusString plaintext; in recover_unused_bytes() local
993 if (!_dbus_string_init (&plaintext)) in recover_unused_bytes()
1000 encoded, &plaintext)) in recover_unused_bytes()
1002 _dbus_string_free (&plaintext); in recover_unused_bytes()
1011 if (!_dbus_string_move (&plaintext, 0, buffer, in recover_unused_bytes()
1014 _dbus_string_free (&plaintext); in recover_unused_bytes()
1029 _dbus_string_free (&plaintext); in recover_unused_bytes()
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/tests/unit/kms/
Dtest_kms.py41 self.service_connection.encrypt(key_id='foo', plaintext=data)
52 self.service_connection.encrypt(key_id='foo', plaintext=data)
/external/boringssl/src/crypto/cipher/test/
Dcipher_test.txt75 # AES-bits-ECB:key::plaintext:ciphertext:encdec
121 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec
325 # 48 bytes plaintext
334 # 80 bytes plaintext
343 # 128 bytes plaintext
352 # 192 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF
361 # 288 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF
370 # 80 bytes plaintext, submitted by Intel
Daes_128_gcm_tests.txt485 # 48 bytes plaintext
493 # 80 bytes plaintext
501 # 128 bytes plaintext
509 # 192 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF
517 # 288 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF
525 # 80 bytes plaintext, submitted by Intel
/external/chromium-trace/catapult/third_party/gsutil/third_party/boto/boto/kms/
Dlayer1.py378 def encrypt(self, key_id, plaintext, encryption_context=None, argument
401 if not isinstance(plaintext, six.binary_type):
405 plaintext = base64.b64encode(plaintext)
406 params = {'KeyId': key_id, 'Plaintext': plaintext, }
/external/ImageMagick/MagickCore/
Dcipher.c282 const unsigned int *key,unsigned int *plaintext) in AddRoundKey() argument
291 plaintext[i]=key[i] ^ ciphertext[i]; in AddRoundKey()
320 const unsigned int *key,unsigned char *plaintext) in FinalizeRoundKey() argument
335 p=plaintext; in FinalizeRoundKey()
349 const unsigned int *key,unsigned int *plaintext) in InitializeRoundKey() argument
367 plaintext[i]=key[i] ^ value; in InitializeRoundKey()
380 static void EncipherAESBlock(AESInfo *aes_info,const unsigned char *plaintext, in EncipherAESBlock() argument
462 InitializeRoundKey(plaintext,aes_info->encipher_key,text); in EncipherAESBlock()
/external/srtp/tables/
Daes_tables.c323 uint8_t plaintext[16] = { in aes_test_inverse() local
335 v128_copy_octet_string(&x, plaintext); in aes_test_inverse()
342 v128_copy_octet_string(&y, plaintext); in aes_test_inverse()
/external/wpa_supplicant_8/src/crypto/
Dcrypto_module_tests.c36 u8 plaintext[] = { in test_siv() local
94 if (aes_siv_encrypt(key, plaintext, sizeof(plaintext), in test_siv()
109 if (os_memcmp(out, plaintext, sizeof(plaintext)) != 0) { in test_siv()
417 char *plaintext; in test_ecb() member
476 hexstr2bin(tv->plaintext, plain, sizeof(plain)) || in test_ecb()

123