/external/openssl/crypto/evp/ |
evp_test.c | 138 const unsigned char *plaintext,int pn, 151 hexdump(stdout,"Plaintext",plaintext,pn); 171 if(!EVP_EncryptUpdate(&ctx,out,&outl,plaintext,pn)) 225 fprintf(stderr,"Plaintext length mismatch got %d expected %d\n", 230 if(memcmp(out,plaintext,pn)) 232 fprintf(stderr,"Plaintext mismatch\n"); 234 hexdump(stderr,"Expected",plaintext,pn); 246 const unsigned char *plaintext,int pn, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec) 369 unsigned char *iv,*key,*plaintext,*ciphertext; local [all...] |
/external/dbus/dbus/ |
dbus-auth.h | 65 const DBusString *plaintext, 70 DBusString *plaintext);
|
dbus-auth.c | 1083 DBusString plaintext; local 1085 if (!_dbus_string_init (&plaintext)) [all...] |
dbus-transport.c | 790 DBusString plaintext; local 795 if (!_dbus_string_init (&plaintext)) 802 encoded, &plaintext)) 804 _dbus_string_free (&plaintext); 813 if (!_dbus_string_move (&plaintext, 0, buffer, 816 _dbus_string_free (&plaintext); 831 _dbus_string_free (&plaintext); [all...] |
/external/dropbear/libtomcrypt/demos/ |
tv_gen.c | 168 "The output of step N is used as the key and plaintext for step N+1 (key bytes repeated as required to fill the key)\n\n"); 398 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 402 fprintf(out, "EAX Test Vectors. Uses the 00010203...NN-1 pattern for header/nonce/plaintext/key. The outputs\n" 424 plaintext[z] = (unsigned char)(z & 255); 429 if ((err = eax_encrypt_authenticate_memory(x, key, kl, nonce, y1, header, y1, plaintext, y1, plaintext, tag, &len)) != CRYPT_OK) { 435 fprintf(out, "%02X", plaintext[z]); 458 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 462 fprintf(out, "OCB Test Vectors. Uses the 00010203...NN-1 pattern for nonce/plaintext/key. The outputs\n" 489 plaintext[z] = (unsigned char)(z & 255) 522 plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local 584 unsigned char key[MAXBLOCKSIZE], plaintext[MAXBLOCKSIZE*2], tag[MAXBLOCKSIZE]; local [all...] |
encrypt.c | 97 unsigned char plaintext[512],ciphertext[512]; local 182 if ((errno = ctr_decrypt(inbuf,plaintext,y,&ctr)) != CRYPT_OK) { 187 if (fwrite(plaintext,1,y,fdout) != y) {
|
/external/openssl/include/openssl/ |
fips.h | 100 const unsigned char *plaintext,
|
/external/webkit/SunSpider/tests/sunspider-0.9/ |
crypto-aes.js | 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 162 * - cipherblock = plaintext xor outputblock 164 function AESEncryptCtr(plaintext, password, nBits) { 188 var blockCount = Math.ceil(plaintext.length/blockSize); 200 var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1; 203 for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter byte-by-byte -- 204 var plaintextByte = plaintext.charCodeAt(b*blockSize+i); 228 * - cipherblock = plaintext xor outputblock 250 var plaintext = new Array(ciphertext.length-1); 263 // -- xor plaintext with ciphered counter byte-by-byte - [all...] |
/external/webkit/SunSpider/tests/sunspider-0.9.1/ |
crypto-aes.js | 158 * Use AES to encrypt 'plaintext' with 'password' using 'nBits' key, in 'Counter' mode of operation 162 * - cipherblock = plaintext xor outputblock 164 function AESEncryptCtr(plaintext, password, nBits) { 188 var blockCount = Math.ceil(plaintext.length/blockSize); 200 var blockLength = b<blockCount-1 ? blockSize : (plaintext.length-1)%blockSize+1; 203 for (var i=0; i<blockLength; i++) { // -- xor plaintext with ciphered counter byte-by-byte -- 204 var plaintextByte = plaintext.charCodeAt(b*blockSize+i); 228 * - cipherblock = plaintext xor outputblock 250 var plaintext = new Array(ciphertext.length-1); 263 // -- xor plaintext with ciphered counter byte-by-byte - [all...] |
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_test.c | 38 plaintext[MAXBLOCKSIZE], 53 /* plaintext */ 73 /* plaintext */ 93 /* plaintext */ 102 /* test with header + nonce + plaintext */ 114 /* plaintext */ 129 /* test with header + nonce + plaintext [not even sizes!] */ 141 /* plaintext */ 231 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) { 259 if ((res != 1) || XMEMCMP(outct, tests[x].plaintext, tests[x].msglen)) [all...] |
/external/dropbear/libtomcrypt/src/ciphers/ |
khazad.c | [all...] |
anubis.c | [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | 445 the same buffer. For the encrypt function \textit{pt}\footnote{pt stands for plaintext.} is the input and 509 /* ... load a block of plaintext in pt ... */ 533 /* now we have decrypted ct to the original plaintext in pt */ [all...] |
/external/webkit/WebCore/css/ |
html.css | 550 pre, xmp, plaintext, listing {
|
/external/webkit/WebCore/inspector/front-end/ |
inspector.css | 539 -webkit-user-modify: read-write-plaintext-only; 1481 -webkit-user-modify: read-write-plaintext-only; 1499 -webkit-user-modify: read-write-plaintext-only; [all...] |