HomeSort by relevance Sort by last modified time
    Searched refs:plaintext (Results 1 - 15 of 15) sorted by null

  /external/openssl/crypto/evp/
evp_test.c 138 const unsigned char *plaintext,int pn,
151 hexdump(stdout,"Plaintext",plaintext,pn);
171 if(!EVP_EncryptUpdate(&ctx,out,&outl,plaintext,pn))
225 fprintf(stderr,"Plaintext length mismatch got %d expected %d\n",
230 if(memcmp(out,plaintext,pn))
232 fprintf(stderr,"Plaintext mismatch\n");
234 hexdump(stderr,"Expected",plaintext,pn);
246 const unsigned char *plaintext,int pn,
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec)
369 unsigned char *iv,*key,*plaintext,*ciphertext; local
    [all...]
  /external/dbus/dbus/
dbus-auth.h 65 const DBusString *plaintext,
70 DBusString *plaintext);
dbus-auth.c 1083 DBusString plaintext; local
1085 if (!_dbus_string_init (&plaintext))
    [all...]
dbus-transport.c 790 DBusString plaintext; local
795 if (!_dbus_string_init (&plaintext))
802 encoded, &plaintext))
804 _dbus_string_free (&plaintext);
813 if (!_dbus_string_move (&plaintext, 0, buffer,
816 _dbus_string_free (&plaintext);
831 _dbus_string_free (&plaintext);
    [all...]
  /external/dropbear/libtomcrypt/demos/
tv_gen.c 168 "The output of step N is used as the key and plaintext for step N+1 (key bytes repeated as required to fill the key)\n\n");
398 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
402 fprintf(out, "EAX Test Vectors. Uses the 00010203...NN-1 pattern for header/nonce/plaintext/key. The outputs\n"
424 plaintext[z] = (unsigned char)(z & 255);
429 if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) {
435 fprintf(out, "%02X", plaintext[z]);
458 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
462 fprintf(out, "OCB Test Vectors. Uses the 00010203...NN-1 pattern for nonce/plaintext/key. The outputs\n"
489 plaintext[z] = (unsigned char)(z & 255)
522 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
584 unsigned char key[MAXBLOCKSIZE], plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local
    [all...]
encrypt.c 97 unsigned char plaintext[512],ciphertext[512]; local
182 if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) {
187 if (fwrite(plaintext,1,y,fdout) != y) {
  /external/openssl/include/openssl/
fips.h 100 const unsigned char *plaintext,
  /external/webkit/SunSpider/tests/sunspider-0.9/
crypto-aes.js 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation
162 * - cipherblock = plaintext xor outputblock
164 function AESEncryptCtr(plaintext, password, nBits) {
188 var blockCount = Math.ceil(plaintext.length/blockSize);
200 var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1;
203 for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter byte-by-byte --
204 var plaintextByte = plaintext.charCodeAt(b*blockSize+i);
228 * - cipherblock = plaintext xor outputblock
250 var plaintext = new Array(ciphertext.length-1);
263 // -- xor plaintext with ciphered counter byte-by-byte -
    [all...]
  /external/webkit/SunSpider/tests/sunspider-0.9.1/
crypto-aes.js 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation
162 * - cipherblock = plaintext xor outputblock
164 function AESEncryptCtr(plaintext, password, nBits) {
188 var blockCount = Math.ceil(plaintext.length/blockSize);
200 var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1;
203 for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter byte-by-byte --
204 var plaintextByte = plaintext.charCodeAt(b*blockSize+i);
228 * - cipherblock = plaintext xor outputblock
250 var plaintext = new Array(ciphertext.length-1);
263 // -- xor plaintext with ciphered counter byte-by-byte -
    [all...]
  /external/dropbear/libtomcrypt/src/encauth/eax/
eax_test.c 38 plaintext[MAXBLOCKSIZE],
53 /* plaintext */
73 /* plaintext */
93 /* plaintext */
102 /* test with header + nonce + plaintext */
114 /* plaintext */
129 /* test with header + nonce + plaintext [not even sizes!] */
141 /* plaintext */
231 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) {
259 if ((res != 1) || XMEMCMP(outct, tests[x].plaintext, tests[x].msglen))
    [all...]
  /external/dropbear/libtomcrypt/src/ciphers/
khazad.c     [all...]
anubis.c     [all...]
  /external/dropbear/libtomcrypt/
crypt.tex 445 the same buffer. For the encrypt function \textit{pt}\footnote{pt stands for plaintext.} is the input and
509 /* ... load a block of plaintext in pt ... */
533 /* now we have decrypted ct to the original plaintext in pt */
    [all...]
  /external/webkit/WebCore/css/
html.css 550 pre, xmp, plaintext, listing {
  /external/webkit/WebCore/inspector/front-end/
inspector.css 539 -webkit-user-modify: read-write-plaintext-only;
1481 -webkit-user-modify: read-write-plaintext-only;
1499 -webkit-user-modify: read-write-plaintext-only;
    [all...]

Completed in 385 milliseconds