/prebuilts/go/darwin-x86/src/crypto/cipher/ |
ofb_test.go | 81 ciphertext := make([]byte, len(plaintext)) 82 ofb.XORKeyStream(ciphertext, plaintext) 83 if !bytes.Equal(ciphertext, tt.out[:len(plaintext)]) { 84 t.Errorf("%s/%d: encrypting\ninput % x\nhave % x\nwant % x", test, len(plaintext), plaintext, ciphertext, tt.out) 89 ciphertext := tt.out[0 : len(tt.in)-j] 91 plaintext := make([]byte, len(ciphertext)) 92 ofb.XORKeyStream(plaintext, ciphertext) 93 if !bytes.Equal(plaintext, tt.in[:len(ciphertext)]) { 94 t.Errorf("%s/%d: decrypting\nhave % x\nwant % x", test, len(ciphertext), plaintext, tt.in)
|
gcm.go | 20 // plaintext and ciphertext. 31 // Open decrypts and authenticates ciphertext, authenticates the 37 // The ciphertext and dst may alias exactly or not at all. 38 Open(dst, nonce, ciphertext, data []byte) ([]byte, error) 137 func (g *gcm) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) { 142 if len(ciphertext) < gcmTagSize { 145 tag := ciphertext[len(ciphertext)-gcmTagSize:] 146 ciphertext = ciphertext[:len(ciphertext)-gcmTagSize [all...] |
/prebuilts/go/linux-x86/src/crypto/cipher/ |
ofb_test.go | 81 ciphertext := make([]byte, len(plaintext)) 82 ofb.XORKeyStream(ciphertext, plaintext) 83 if !bytes.Equal(ciphertext, tt.out[:len(plaintext)]) { 84 t.Errorf("%s/%d: encrypting\ninput % x\nhave % x\nwant % x", test, len(plaintext), plaintext, ciphertext, tt.out) 89 ciphertext := tt.out[0 : len(tt.in)-j] 91 plaintext := make([]byte, len(ciphertext)) 92 ofb.XORKeyStream(plaintext, ciphertext) 93 if !bytes.Equal(plaintext, tt.in[:len(ciphertext)]) { 94 t.Errorf("%s/%d: decrypting\nhave % x\nwant % x", test, len(ciphertext), plaintext, tt.in)
|
gcm.go | 20 // plaintext and ciphertext. 31 // Open decrypts and authenticates ciphertext, authenticates the 37 // The ciphertext and dst may alias exactly or not at all. 38 Open(dst, nonce, ciphertext, data []byte) ([]byte, error) 137 func (g *gcm) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) { 142 if len(ciphertext) < gcmTagSize { 145 tag := ciphertext[len(ciphertext)-gcmTagSize:] 146 ciphertext = ciphertext[:len(ciphertext)-gcmTagSize [all...] |
/system/keymaster/ |
ocb_utils.cpp | 122 KeymasterKeyBlob* ciphertext, Buffer* tag) { 123 assert(ciphertext && tag); 137 if (!ciphertext->Reset(plaintext.key_material_size)) 142 0 /* additional data length */, ciphertext->writable_data(), 157 const KeymasterKeyBlob& ciphertext, const Buffer& nonce, 173 if (!plaintext->Reset(ciphertext.key_material_size)) 176 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material, 177 ciphertext.key_material_size, NULL /* additional data */, 190 assert(ae_err == static_cast<int>(ciphertext.key_material_size));
|
ocb_utils.h | 38 KeymasterKeyBlob* ciphertext, Buffer* tag); 43 const KeymasterKeyBlob& ciphertext, const Buffer& nonce,
|
android_keymaster_test.cpp | 1916 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); local 1970 string ciphertext = EncryptMessage(message, KM_PAD_NONE); local 2092 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); local 2109 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_224, KM_PAD_RSA_OAEP); local 2169 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); local 2213 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); local 2254 string ciphertext = EncryptMessage(message, KM_PAD_RSA_PKCS1_1_5_ENCRYPT); local 2292 string ciphertext = EncryptMessage(message, digest, padding); local 2325 string ciphertext = EncryptMessage(string(message), KM_PAD_RSA_PKCS1_1_5_ENCRYPT); local 2427 string ciphertext; local 2445 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); local 2479 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); local 2537 string ciphertext; local 2568 const char* ciphertext; member in struct:keymaster::test::AesCtrSp80038aTestVector 2607 const string ciphertext = hex2str(test.ciphertext); local 2755 string ciphertext; local 2792 string ciphertext = EncryptMessage(message, KM_MODE_CBC, KM_PAD_PKCS7, &iv); local 2820 string ciphertext; local 2886 string ciphertext; local 2912 uint8_t ciphertext[] = { local 2985 string ciphertext; local 3026 string ciphertext; local 3098 string ciphertext; local 3152 string ciphertext; local 3196 string ciphertext; local 3238 string ciphertext; local 3678 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); local 3724 string ciphertext = EncryptMessage(message, KM_PAD_NONE); local [all...] |
android_keymaster_test_utils.cpp | 475 string ciphertext = local 484 return ciphertext; 506 string ciphertext = local 515 return ciphertext; 525 string ciphertext = local 534 return ciphertext; 545 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_padding_t padding) { 550 return ProcessMessage(KM_PURPOSE_DECRYPT, ciphertext, begin_params, update_params); 553 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_digest_t digest, 560 return ProcessMessage(KM_PURPOSE_DECRYPT, ciphertext, begin_params, update_params) 651 string ciphertext = local [all...] |
/hardware/intel/img/psb_headers/DRM/cc54/inc/ |
wv_drm_api.h | 40 * ciphertext decryption. 45 * input_ciphertext_size - Input ciphertext data size in bytes. 46 * p_input_ciphertext - Pointer to the input ciphertext data buffer. 62 * ciphertext decryption. 67 * input_ciphertext_size - Input ciphertext data size in bytes. 68 * p_input_ciphertext - Pointer to the input ciphertext data. 142 * @return DRM_SUCCESSFUL The Widevine audio ciphertext was decrypted 150 * @brief Decrypts Widevine video ciphertext data into the IMR decryption buffer
|
/system/connectivity/shill/ |
crypto_rot47.h | 37 virtual bool Encrypt(const std::string& plaintext, std::string* ciphertext); 38 virtual bool Decrypt(const std::string& ciphertext, std::string* plaintext);
|
crypto_des_cbc.h | 50 virtual bool Encrypt(const std::string& plaintext, std::string* ciphertext); 51 virtual bool Decrypt(const std::string& ciphertext, std::string* plaintext);
|
/system/weaved/buffet/ |
keystore_encryptor.h | 36 std::string* ciphertext) override; 37 bool DecryptWithAuthentication(const std::string& ciphertext,
|
/system/webservd/webservd/ |
keystore_encryptor.h | 36 std::string* ciphertext) override; 37 bool DecryptWithAuthentication(const std::string& ciphertext,
|
/external/boringssl/src/crypto/aes/ |
aes_test.cc | 24 const uint8_t ciphertext[AES_BLOCK_SIZE]) { 34 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) { 42 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) { 53 AES_decrypt(ciphertext, block, &aes_key); 60 memcpy(block, ciphertext, AES_BLOCK_SIZE);
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
key_agreement.go | 33 if len(ckx.ciphertext) < 2 { 37 ciphertext := ckx.ciphertext 39 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1]) 40 if ciphertextLen != len(ckx.ciphertext)-2 { 43 ciphertext = ckx.ciphertext[2:] 50 preMasterSecret, err := priv.Decrypt(config.rand(), ciphertext, &rsa.PKCS1v15DecryptOptions{SessionKeyLen: 48}) 81 ckx.ciphertext = make([]byte, len(encrypted)+2 [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
key_agreement.go | 33 if len(ckx.ciphertext) < 2 { 37 ciphertext := ckx.ciphertext 39 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1]) 40 if ciphertextLen != len(ckx.ciphertext)-2 { 43 ciphertext = ckx.ciphertext[2:] 50 preMasterSecret, err := priv.Decrypt(config.rand(), ciphertext, &rsa.PKCS1v15DecryptOptions{SessionKeyLen: 48}) 81 ckx.ciphertext = make([]byte, len(encrypted)+2 [all...] |
/external/boringssl/src/ssl/test/runner/ |
key_agreement.go | 108 if len(ckx.ciphertext) < 2 { 112 ciphertext := ckx.ciphertext 114 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1]) 115 if ciphertextLen != len(ckx.ciphertext)-2 { 118 ciphertext = ckx.ciphertext[2:] 125 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret) 177 ckx.ciphertext = make([]byte, len(encrypted)+2 [all...] |
/external/srtp/crypto/test/ |
aes_calc.c | 17 ciphertext: 69c4e0d86a7b0430d8cdb78070b4c55a 102 /* write ciphertext to output */ 105 printf("ciphertext:\t");
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
BlockCipherTestBase.java | 178 // ciphertext is authenticated. 207 // One full plaintext block results in one ciphertext block. 211 // ciphertext should be output. 215 // cause an error. Thus, there's no need to account for its ciphertext. 273 // One full ciphertext block results in one ciphertext block. 277 // No more ciphertext remaining. Thus, the last plaintext block is at 281 // Partial ciphertext block cannot be decrypted. Thus, the last 286 // When no padding is enabled, any remaining ciphertext will cause a error 360 byte[] ciphertext = doFinal(new byte[getBlockSize()]) [all...] |
CipherTest.java | 82 private final byte[] ciphertext; field in class:CipherTest.KatVector 94 private KatVector(byte[] plaintext, byte[] ciphertext) { 95 this(plaintext, null, ciphertext); 98 private KatVector(byte[] plaintext, AlgorithmParameterSpec params, byte[] ciphertext) { 100 this.ciphertext = ciphertext; 333 byte[] ciphertext = cipher.doFinal(plaintext); 346 byte[] actualPlaintext = cipher.doFinal(ciphertext); 378 byte[] ciphertext = cipher.doFinal(plaintext); 391 byte[] actualPlaintext = cipher.doFinal(ciphertext); [all...] |
/external/srtp/crypto/include/ |
cipher.h | 63 direction_encrypt, /**< encryption (convert plaintext to ciphertext) */ 64 direction_decrypt, /**< decryption (convert ciphertext to plaintext) */ 120 * plaintext, and ciphertext values that are known to be correct for a 133 uint8_t *ciphertext; /* ciphertext */ member in struct:cipher_test_case_t 196 * an array of values of key/xtd_seq_num_t/plaintext/ciphertext
|
xfm.h | 41 * authenticated (before the function call), and the ciphertext 46 * length of the ciphertext (after the call)
|
/external/boringssl/src/crypto/cipher/ |
cipher_test.cc | 116 const std::vector<uint8_t> &ciphertext, 122 out = &ciphertext; 124 in = &ciphertext; 227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local 230 !t->GetBytes(&ciphertext, "Ciphertext")) { 264 key, iv, plaintext, ciphertext, aad, tag) || 266 iv, plaintext, ciphertext, aad, tag)) { 272 key, iv, plaintext, ciphertext, aad, tag) || 274 key, iv, plaintext, ciphertext, aad, tag)) [all...] |
e_chacha20poly1305.c | 89 size_t ad_len, const uint8_t *ciphertext, 99 size_t ad_len, const uint8_t *ciphertext, 107 update(&ctx, ad, ad_len, ciphertext, ciphertext_len); 200 size_t ad_len, const uint8_t *ciphertext, 203 poly1305_update_padded_16(ctx, ciphertext, ciphertext_len); 257 size_t ad_len, const uint8_t *ciphertext, 261 CRYPTO_poly1305_update(ctx, ciphertext, ciphertext_len);
|
/external/srtp/crypto/cipher/ |
cipher.c | 76 * plaintext, and ciphertext that is known to be good 153 debug_print(mod_cipher, "ciphertext: %s", 157 /* compare the resulting ciphertext with that in the test case */ 162 if (buffer[i] != test_case->ciphertext[i]) { 174 octet_string_hex_string(test_case->ciphertext, 193 /* copy ciphertext into test buffer */ 199 buffer[i] = test_case->ciphertext[i]; 201 debug_print(mod_cipher, "ciphertext: %s", 320 debug_print(mod_cipher, "ciphertext: %s", 325 * decrypt the ciphertext [all...] |