/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreCipherSpiBase.java | 292 * Creates a streamer which sends plaintext/ciphertext into the provided KeyStore and receives 293 * the corresponding ciphertext/plaintext from the KeyStore. [all...] |
KeyGenParameterSpec.java | 521 * weaknesses due to which ciphertext may leak information about plaintext. For example, if a 522 * given plaintext always produces the same ciphertext, an attacker may see the repeated [all...] |
AndroidKeyStoreAuthenticatedAESCipherSpi.java | 184 // plaintext before ciphertext is authenticated by KeyStore.finish.
|
KeyStoreCryptoOperationChunkedStreamer.java | 319 * provided and ciphertext is obtained.
|
/libcore/ojluni/src/main/java/javax/crypto/spec/ |
GCMParameterSpec.java | 44 * plain/ciphertext and authentication tags) are handled in the {@code
|
/external/boringssl/src/include/openssl/ |
evp.h | 480 * maximum size of the ciphertext is written to |out_len|. Otherwise, |*out_len| 482 * the ciphertext will be written to |out| and |*out_len| updated with the true 486 * ciphertext. The actual ciphertext may be smaller. 502 * the ciphertext will be written to |out| and |*out_len| updated with the true [all...] |
aead.h | 30 * which is authenticated but not included in the ciphertext. 81 * ciphertext and must be identical for both the "seal" and "open" call. This
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_messages.go | 1014 ciphertext []byte 1024 bytes.Equal(m.ciphertext, m1.ciphertext) 1031 length := len(m.ciphertext) 1037 copy(x[4:], m.ciphertext) 1052 m.ciphertext = data[4:]
|
handshake_messages_test.go | 229 m.ciphertext = randomBytes(rand.Intn(1000)+1, rand)
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_messages.go | 1014 ciphertext []byte 1024 bytes.Equal(m.ciphertext, m1.ciphertext) 1031 length := len(m.ciphertext) 1037 copy(x[4:], m.ciphertext) 1052 m.ciphertext = data[4:]
|
handshake_messages_test.go | 229 m.ciphertext = randomBytes(rand.Intn(1000)+1, rand)
|
/external/boringssl/src/crypto/modes/ |
cbc.c | 164 * directly to |out| would overwrite a ciphertext block before it is used as
|
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 341 + ".ciphertext"; 419 byte[] cipherText = loadBytes("hyts_" + "des-ede3-cbc.test" + index 420 + ".ciphertext"); 422 Arrays.toString(cipherText), Arrays.toString(encryptedPlaintext)); [all...] |
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt_test.go | 236 // incompleteBlockPEM contains ciphertext that is not a multiple of the
|
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt_test.go | 236 // incompleteBlockPEM contains ciphertext that is not a multiple of the
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
ECDHKeyAgreementTest.java | 336 // We'll have to encrypt a known plaintext and check that the ciphertext is as
|
/system/tpm/trunks/ |
tpm_utility_impl.cc | 414 std::string* ciphertext) { 468 ciphertext->assign(StringFrom_TPM2B_PUBLIC_KEY_RSA(out_message)); 475 const std::string& ciphertext, 523 TPM2B_PUBLIC_KEY_RSA in_message = Make_TPM2B_PUBLIC_KEY_RSA(ciphertext); [all...] |
/docs/source.android.com/src/security/keystore/ |
features.jd | 327 "originate" a new ciphertext/signature/etc., or to "use" an existing 328 ciphertext/signature/etc. Note that this distinction is not exposed to
|
/external/boringssl/src/crypto/rsa/ |
padding.c | 418 * particular ciphertext. */ 483 /* to avoid chosen ciphertext attacks, the error message should not reveal
|
/external/libvncserver/libvncclient/ |
rfbproto.c | 855 uint8_t userpass[128], ciphertext[128]; local 981 error = gcry_cipher_encrypt(aes, ciphertext, sizeof(ciphertext), userpass, sizeof(userpass)); 988 if (!WriteToRFBServer(client, (char *)ciphertext, sizeof(ciphertext))) [all...] |
/libcore/ojluni/src/main/java/javax/crypto/ |
Cipher.java | 102 * to the ciphertext during encryption, and is verified on decryption. 105 * before starting the ciphertext authenticity calculations. To avoid 106 * implementations having to internally buffer ciphertext, all AAD data 108 * updateAAD} methods) <b>before</b> the ciphertext is processed (via [all...] |
/development/samples/ApiDemos/src/com/example/android/apis/security/ |
KeyStoreUsage.java | 214 mCipherText = (EditText) findViewById(R.id.ciphertext);
|
/device/google/contexthub/firmware/src/ |
appSec.c | 48 #define STATE_VERIFY 5 // decryption of ciphertext done; now decrypting and verifying the encrypted plaintext SHA2
|
/external/boringssl/src/crypto/cipher/ |
cipher.c | 456 /* The following assumes that the ciphertext has been authenticated.
|
/external/boringssl/src/crypto/cipher/test/ |
aes_128_cbc_sha1_ssl3_tests.txt | 4 # Note: aead_test's input format splits the ciphertext and tag positions of the sealed [all...] |