HomeSort by relevance Sort by last modified time
    Searched full:ciphertext (Results 26 - 50 of 186) sorted by null

12 3 4 5 6 7 8

  /prebuilts/go/darwin-x86/src/crypto/cipher/
ofb_test.go 81 ciphertext := make([]byte, len(plaintext))
82 ofb.XORKeyStream(ciphertext, plaintext)
83 if !bytes.Equal(ciphertext, tt.out[:len(plaintext)]) {
84 t.Errorf("%s/%d: encrypting\ninput % x\nhave % x\nwant % x", test, len(plaintext), plaintext, ciphertext, tt.out)
89 ciphertext := tt.out[0 : len(tt.in)-j]
91 plaintext := make([]byte, len(ciphertext))
92 ofb.XORKeyStream(plaintext, ciphertext)
93 if !bytes.Equal(plaintext, tt.in[:len(ciphertext)]) {
94 t.Errorf("%s/%d: decrypting\nhave % x\nwant % x", test, len(ciphertext), plaintext, tt.in)
gcm.go 20 // plaintext and ciphertext.
31 // Open decrypts and authenticates ciphertext, authenticates the
37 // The ciphertext and dst may alias exactly or not at all.
38 Open(dst, nonce, ciphertext, data []byte) ([]byte, error)
137 func (g *gcm) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) {
142 if len(ciphertext) < gcmTagSize {
145 tag := ciphertext[len(ciphertext)-gcmTagSize:]
146 ciphertext = ciphertext[:len(ciphertext)-gcmTagSize
    [all...]
  /prebuilts/go/linux-x86/src/crypto/cipher/
ofb_test.go 81 ciphertext := make([]byte, len(plaintext))
82 ofb.XORKeyStream(ciphertext, plaintext)
83 if !bytes.Equal(ciphertext, tt.out[:len(plaintext)]) {
84 t.Errorf("%s/%d: encrypting\ninput % x\nhave % x\nwant % x", test, len(plaintext), plaintext, ciphertext, tt.out)
89 ciphertext := tt.out[0 : len(tt.in)-j]
91 plaintext := make([]byte, len(ciphertext))
92 ofb.XORKeyStream(plaintext, ciphertext)
93 if !bytes.Equal(plaintext, tt.in[:len(ciphertext)]) {
94 t.Errorf("%s/%d: decrypting\nhave % x\nwant % x", test, len(ciphertext), plaintext, tt.in)
gcm.go 20 // plaintext and ciphertext.
31 // Open decrypts and authenticates ciphertext, authenticates the
37 // The ciphertext and dst may alias exactly or not at all.
38 Open(dst, nonce, ciphertext, data []byte) ([]byte, error)
137 func (g *gcm) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) {
142 if len(ciphertext) < gcmTagSize {
145 tag := ciphertext[len(ciphertext)-gcmTagSize:]
146 ciphertext = ciphertext[:len(ciphertext)-gcmTagSize
    [all...]
  /system/keymaster/
ocb_utils.cpp 122 KeymasterKeyBlob* ciphertext, Buffer* tag) {
123 assert(ciphertext && tag);
137 if (!ciphertext->Reset(plaintext.key_material_size))
142 0 /* additional data length */, ciphertext->writable_data(),
157 const KeymasterKeyBlob& ciphertext, const Buffer& nonce,
173 if (!plaintext->Reset(ciphertext.key_material_size))
176 int ae_err = ae_decrypt(ctx.get(), nonce.peek_read(), ciphertext.key_material,
177 ciphertext.key_material_size, NULL /* additional data */,
190 assert(ae_err == static_cast<int>(ciphertext.key_material_size));
ocb_utils.h 38 KeymasterKeyBlob* ciphertext, Buffer* tag);
43 const KeymasterKeyBlob& ciphertext, const Buffer& nonce,
android_keymaster_test.cpp 1916 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); local
1970 string ciphertext = EncryptMessage(message, KM_PAD_NONE); local
2092 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); local
2109 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_224, KM_PAD_RSA_OAEP); local
2169 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); local
2213 string ciphertext = EncryptMessage(string(message), KM_DIGEST_SHA_2_256, KM_PAD_RSA_OAEP); local
2254 string ciphertext = EncryptMessage(message, KM_PAD_RSA_PKCS1_1_5_ENCRYPT); local
2292 string ciphertext = EncryptMessage(message, digest, padding); local
2325 string ciphertext = EncryptMessage(string(message), KM_PAD_RSA_PKCS1_1_5_ENCRYPT); local
2427 string ciphertext; local
2445 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); local
2479 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_PKCS7); local
2537 string ciphertext; local
2568 const char* ciphertext; member in struct:keymaster::test::AesCtrSp80038aTestVector
2607 const string ciphertext = hex2str(test.ciphertext); local
2755 string ciphertext; local
2792 string ciphertext = EncryptMessage(message, KM_MODE_CBC, KM_PAD_PKCS7, &iv); local
2820 string ciphertext; local
2886 string ciphertext; local
2912 uint8_t ciphertext[] = { local
2985 string ciphertext; local
3026 string ciphertext; local
3098 string ciphertext; local
3152 string ciphertext; local
3196 string ciphertext; local
3238 string ciphertext; local
3678 string ciphertext = EncryptMessage(message, KM_MODE_ECB, KM_PAD_NONE); local
3724 string ciphertext = EncryptMessage(message, KM_PAD_NONE); local
    [all...]
android_keymaster_test_utils.cpp 475 string ciphertext = local
484 return ciphertext;
506 string ciphertext = local
515 return ciphertext;
525 string ciphertext = local
534 return ciphertext;
545 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_padding_t padding) {
550 return ProcessMessage(KM_PURPOSE_DECRYPT, ciphertext, begin_params, update_params);
553 string Keymaster2Test::DecryptMessage(const string& ciphertext, keymaster_digest_t digest,
560 return ProcessMessage(KM_PURPOSE_DECRYPT, ciphertext, begin_params, update_params)
651 string ciphertext = local
    [all...]
  /hardware/intel/img/psb_headers/DRM/cc54/inc/
wv_drm_api.h 40 * ciphertext decryption.
45 * input_ciphertext_size - Input ciphertext data size in bytes.
46 * p_input_ciphertext - Pointer to the input ciphertext data buffer.
62 * ciphertext decryption.
67 * input_ciphertext_size - Input ciphertext data size in bytes.
68 * p_input_ciphertext - Pointer to the input ciphertext data.
142 * @return DRM_SUCCESSFUL The Widevine audio ciphertext was decrypted
150 * @brief Decrypts Widevine video ciphertext data into the IMR decryption buffer
  /system/connectivity/shill/
crypto_rot47.h 37 virtual bool Encrypt(const std::string& plaintext, std::string* ciphertext);
38 virtual bool Decrypt(const std::string& ciphertext, std::string* plaintext);
crypto_des_cbc.h 50 virtual bool Encrypt(const std::string& plaintext, std::string* ciphertext);
51 virtual bool Decrypt(const std::string& ciphertext, std::string* plaintext);
  /system/weaved/buffet/
keystore_encryptor.h 36 std::string* ciphertext) override;
37 bool DecryptWithAuthentication(const std::string& ciphertext,
  /system/webservd/webservd/
keystore_encryptor.h 36 std::string* ciphertext) override;
37 bool DecryptWithAuthentication(const std::string& ciphertext,
  /external/boringssl/src/crypto/aes/
aes_test.cc 24 const uint8_t ciphertext[AES_BLOCK_SIZE]) {
34 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) {
42 if (memcmp(block, ciphertext, AES_BLOCK_SIZE) != 0) {
53 AES_decrypt(ciphertext, block, &aes_key);
60 memcpy(block, ciphertext, AES_BLOCK_SIZE);
  /prebuilts/go/darwin-x86/src/crypto/tls/
key_agreement.go 33 if len(ckx.ciphertext) < 2 {
37 ciphertext := ckx.ciphertext
39 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1])
40 if ciphertextLen != len(ckx.ciphertext)-2 {
43 ciphertext = ckx.ciphertext[2:]
50 preMasterSecret, err := priv.Decrypt(config.rand(), ciphertext, &rsa.PKCS1v15DecryptOptions{SessionKeyLen: 48})
81 ckx.ciphertext = make([]byte, len(encrypted)+2
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
key_agreement.go 33 if len(ckx.ciphertext) < 2 {
37 ciphertext := ckx.ciphertext
39 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1])
40 if ciphertextLen != len(ckx.ciphertext)-2 {
43 ciphertext = ckx.ciphertext[2:]
50 preMasterSecret, err := priv.Decrypt(config.rand(), ciphertext, &rsa.PKCS1v15DecryptOptions{SessionKeyLen: 48})
81 ckx.ciphertext = make([]byte, len(encrypted)+2
    [all...]
  /external/boringssl/src/ssl/test/runner/
key_agreement.go 108 if len(ckx.ciphertext) < 2 {
112 ciphertext := ckx.ciphertext
114 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1])
115 if ciphertextLen != len(ckx.ciphertext)-2 {
118 ciphertext = ckx.ciphertext[2:]
125 err = rsa.DecryptPKCS1v15SessionKey(config.rand(), key, ciphertext, preMasterSecret)
177 ckx.ciphertext = make([]byte, len(encrypted)+2
    [all...]
  /external/srtp/crypto/test/
aes_calc.c 17 ciphertext: 69c4e0d86a7b0430d8cdb78070b4c55a
102 /* write ciphertext to output */
105 printf("ciphertext:\t");
  /cts/tests/tests/keystore/src/android/keystore/cts/
BlockCipherTestBase.java 178 // ciphertext is authenticated.
207 // One full plaintext block results in one ciphertext block.
211 // ciphertext should be output.
215 // cause an error. Thus, there's no need to account for its ciphertext.
273 // One full ciphertext block results in one ciphertext block.
277 // No more ciphertext remaining. Thus, the last plaintext block is at
281 // Partial ciphertext block cannot be decrypted. Thus, the last
286 // When no padding is enabled, any remaining ciphertext will cause a error
360 byte[] ciphertext = doFinal(new byte[getBlockSize()])
    [all...]
CipherTest.java 82 private final byte[] ciphertext; field in class:CipherTest.KatVector
94 private KatVector(byte[] plaintext, byte[] ciphertext) {
95 this(plaintext, null, ciphertext);
98 private KatVector(byte[] plaintext, AlgorithmParameterSpec params, byte[] ciphertext) {
100 this.ciphertext = ciphertext;
333 byte[] ciphertext = cipher.doFinal(plaintext);
346 byte[] actualPlaintext = cipher.doFinal(ciphertext);
378 byte[] ciphertext = cipher.doFinal(plaintext);
391 byte[] actualPlaintext = cipher.doFinal(ciphertext);
    [all...]
  /external/srtp/crypto/include/
cipher.h 63 direction_encrypt, /**< encryption (convert plaintext to ciphertext) */
64 direction_decrypt, /**< decryption (convert ciphertext to plaintext) */
120 * plaintext, and ciphertext values that are known to be correct for a
133 uint8_t *ciphertext; /* ciphertext */ member in struct:cipher_test_case_t
196 * an array of values of key/xtd_seq_num_t/plaintext/ciphertext
xfm.h 41 * authenticated (before the function call), and the ciphertext
46 * length of the ciphertext (after the call)
  /external/boringssl/src/crypto/cipher/
cipher_test.cc 116 const std::vector<uint8_t> &ciphertext,
122 out = &ciphertext;
124 in = &ciphertext;
227 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local
230 !t->GetBytes(&ciphertext, "Ciphertext")) {
264 key, iv, plaintext, ciphertext, aad, tag) ||
266 iv, plaintext, ciphertext, aad, tag)) {
272 key, iv, plaintext, ciphertext, aad, tag) ||
274 key, iv, plaintext, ciphertext, aad, tag))
    [all...]
e_chacha20poly1305.c 89 size_t ad_len, const uint8_t *ciphertext,
99 size_t ad_len, const uint8_t *ciphertext,
107 update(&ctx, ad, ad_len, ciphertext, ciphertext_len);
200 size_t ad_len, const uint8_t *ciphertext,
203 poly1305_update_padded_16(ctx, ciphertext, ciphertext_len);
257 size_t ad_len, const uint8_t *ciphertext,
261 CRYPTO_poly1305_update(ctx, ciphertext, ciphertext_len);
  /external/srtp/crypto/cipher/
cipher.c 76 * plaintext, and ciphertext that is known to be good
153 debug_print(mod_cipher, "ciphertext: %s",
157 /* compare the resulting ciphertext with that in the test case */
162 if (buffer[i] != test_case->ciphertext[i]) {
174 octet_string_hex_string(test_case->ciphertext,
193 /* copy ciphertext into test buffer */
199 buffer[i] = test_case->ciphertext[i];
201 debug_print(mod_cipher, "ciphertext: %s",
320 debug_print(mod_cipher, "ciphertext: %s",
325 * decrypt the ciphertext
    [all...]

Completed in 662 milliseconds

12 3 4 5 6 7 8