HomeSort by relevance Sort by last modified time
    Searched full:ciphertext (Results 51 - 75 of 186) sorted by null

1 23 4 5 6 7 8

  /external/tpm2/
RSA_Decrypt_fp.h 14 TPM2B_PUBLIC_KEY_RSA cipherText;
Marshal_RSA_Decrypt.c 45 result = TPM2B_PUBLIC_KEY_RSA_Unmarshal(&target->cipherText, buffer, size);
  /system/weaved/buffet/
buffet_config_unittest.cc 94 std::string* ciphertext) override {
95 *ciphertext = brillo::data_encoding::Base64Encode(plaintext);
98 bool DecryptWithAuthentication(const std::string& ciphertext,
101 brillo::data_encoding::Base64Decode(ciphertext, plaintext);
  /prebuilts/go/darwin-x86/src/crypto/rsa/
pkcs1v15.go 62 func DecryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (out []byte, err error) {
66 valid, out, index, err := decryptPKCS1v15(rand, priv, ciphertext)
79 // It returns an error if the ciphertext is the wrong length or if the
80 // ciphertext is greater than the public modulus. Otherwise, no error is
87 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA
90 func DecryptPKCS1v15SessionKey(rand io.Reader, priv *PrivateKey, ciphertext []byte, key []byte) (err error) {
99 valid, em, index, err := decryptPKCS1v15(rand, priv, ciphertext)
115 // decryptPKCS1v15 decrypts ciphertext using priv and blinds the operation if
121 func decryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (valid int, em []byte, index int, err error) {
128 c := new(big.Int).SetBytes(ciphertext)
    [all...]
rsa.go 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type
93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) {
95 return DecryptPKCS1v15(rand, priv, ciphertext)
100 return DecryptOAEP(opts.Hash.New(), rand, priv, ciphertext, opts.Label)
108 if err := DecryptPKCS1v15SessionKey(rand, priv, ciphertext, plaintext); err != nil {
113 return DecryptPKCS1v15(rand, priv, ciphertext)
509 // DecryptOAEP decrypts ciphertext using RSA-OAEP.
511 func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) (msg []byte, err error) {
516 if len(ciphertext) > k ||
522 c := new(big.Int).SetBytes(ciphertext)
    [all...]
  /prebuilts/go/linux-x86/src/crypto/rsa/
pkcs1v15.go 62 func DecryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (out []byte, err error) {
66 valid, out, index, err := decryptPKCS1v15(rand, priv, ciphertext)
79 // It returns an error if the ciphertext is the wrong length or if the
80 // ciphertext is greater than the public modulus. Otherwise, no error is
87 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA
90 func DecryptPKCS1v15SessionKey(rand io.Reader, priv *PrivateKey, ciphertext []byte, key []byte) (err error) {
99 valid, em, index, err := decryptPKCS1v15(rand, priv, ciphertext)
115 // decryptPKCS1v15 decrypts ciphertext using priv and blinds the operation if
121 func decryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (valid int, em []byte, index int, err error) {
128 c := new(big.Int).SetBytes(ciphertext)
    [all...]
rsa.go 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type
93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) {
95 return DecryptPKCS1v15(rand, priv, ciphertext)
100 return DecryptOAEP(opts.Hash.New(), rand, priv, ciphertext, opts.Label)
108 if err := DecryptPKCS1v15SessionKey(rand, priv, ciphertext, plaintext); err != nil {
113 return DecryptPKCS1v15(rand, priv, ciphertext)
509 // DecryptOAEP decrypts ciphertext using RSA-OAEP.
511 func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) (msg []byte, err error) {
516 if len(ciphertext) > k ||
522 c := new(big.Int).SetBytes(ciphertext)
    [all...]
  /system/keymaster/
ae.h 98 * Encrypt plaintext; provide for authentication of ciphertext/associated data.
107 * ct - Pointer to buffer to receive ciphertext encryption.
109 * if tag is to be bundled into the ciphertext.
128 * Decrypt ciphertext; provide authenticity of plaintext and associated data.
133 * ct - Pointer to ciphertext bytes to be decrypted.
139 * if tag is bundled into the ciphertext. Non-NULL tag is only
141 * final - Non-zero if this call completes the ciphertext being decrypted.
143 * If nonce!=NULL then "ct" points to the start of a ciphertext. If final!=0
144 * then "in" points to the final piece of ciphertext. If final==0 or nonce==
154 * NOTE !!! NOTE !!! -- The ciphertext should be assumed possibly inauthenti
    [all...]
android_keymaster_test_utils.h 261 std::string DecryptMessage(const std::string& ciphertext, keymaster_padding_t padding);
262 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest,
264 std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode,
266 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest,
268 std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode,
270 std::string DecryptMessage(const AuthorizationSet& update_params, const std::string& ciphertext,
273 std::string DecryptMessage(const AuthorizationSet& update_params, const std::string& ciphertext,
  /cts/tests/tests/keystore/src/android/keystore/cts/
AESCipherNistCavpKatTest.java 249 } else if ("CIPHERTEXT".equals(name)) {
250 testVector.ciphertext = HexEncoding.decode(value);
293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext;
295 byte[] expectedOutput = (encrypt) ? testVector.ciphertext : testVector.plaintext;
322 public byte[] ciphertext; field in class:AESCipherNistCavpKatTest.TestVector
  /external/srtp/crypto/cipher/
aes_cbc.c 189 /* copy ciphertext to output */
225 * loop over ciphertext blocks, decrypting then exoring with state
230 /* set state to ciphertext input block */
245 * exor previous ciphertext block out of plaintext, and write new
246 * plaintext block to output, while copying old ciphertext block
375 32, /* octets in ciphertext */
376 aes_cbc_test_case_0_ciphertext, /* ciphertext */
426 80, /* octets in ciphertext */
427 aes_cbc_test_case_1_ciphertext, /* ciphertext */
  /external/srtp/crypto/include/
cryptoalg.h 74 * authenticated (before the function call), and the ciphertext
79 * length of the ciphertext (after the call)
  /system/connectivity/shill/
crypto_des_cbc_unittest.cc 97 string ciphertext; local
98 EXPECT_FALSE(crypto_.Encrypt(kPlainText, &ciphertext));
  /libcore/ojluni/src/main/java/javax/crypto/
NullCipher.java 31 * a consequence, the ciphertext is identical to the plaintext. All
  /external/boringssl/src/ssl/test/runner/
ticket.go 214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size]
215 plaintext := make([]byte, len(ciphertext))
216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
  /prebuilts/go/darwin-x86/src/crypto/cipher/
cbc.go 8 // with the previous ciphertext block before applying the block cipher.
101 // For each block, we need to xor the decrypted data with the previous block's ciphertext (the iv).
107 // Copy the last block of ciphertext in preparation as the new iv.
  /prebuilts/go/darwin-x86/src/crypto/tls/
ticket.go 197 ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size]
198 plaintext := ciphertext
199 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
  /prebuilts/go/linux-x86/src/crypto/cipher/
cbc.go 8 // with the previous ciphertext block before applying the block cipher.
101 // For each block, we need to xor the decrypted data with the previous block's ciphertext (the iv).
107 // Copy the last block of ciphertext in preparation as the new iv.
  /prebuilts/go/linux-x86/src/crypto/tls/
ticket.go 197 ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size]
198 plaintext := ciphertext
199 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
  /external/srtp/crypto/ae_xfm/
xfm.c 253 printf("ciphertext len: %d\n", *opaque_len);
254 printf("ciphertext: %s\n", octet_string_hex_string(opaque, *opaque_len));
260 * ciphertext
346 * set the protected data length to that of the ciphertext, by
352 printf("ciphertext len: %d\n", ciphertext_len);
384 * immediately follows the ciphertext)
407 printf("ciphertext: %s\n", octet_string_hex_string(opaque, *opaque_len));
  /system/tpm/trunks/
tpm_utility_test.cc 489 std::string output_ciphertext("ciphertext");
490 std::string ciphertext; local
511 &ciphertext));
512 EXPECT_EQ(0, ciphertext.compare(output_ciphertext));
518 std::string ciphertext; local
534 &ciphertext));
540 std::string ciphertext; local
552 &ciphertext));
558 std::string output_ciphertext("ciphertext");
559 std::string ciphertext; local
589 std::string ciphertext; local
618 std::string ciphertext; local
648 std::string ciphertext; local
672 std::string ciphertext; local
692 std::string ciphertext; local
703 std::string ciphertext; local
735 std::string ciphertext; local
    [all...]
trunks_client_test.cc 479 std::string ciphertext; local
483 &ciphertext);
497 TPM_ALG_NULL, ciphertext,
644 std::string ciphertext; local
646 "plaintext", nullptr, &ciphertext);
666 ciphertext, policy_session->GetDelegate(),
766 std::string ciphertext; local
768 "plaintext", nullptr, &ciphertext);
787 ciphertext, policy_session->GetDelegate(),
962 std::string ciphertext; local
    [all...]
trunks_factory_for_test.cc 179 std::string* ciphertext) override {
185 ciphertext);
191 const std::string& ciphertext,
197 ciphertext,
  /external/boringssl/src/crypto/cipher/test/
make_legacy_aead_tests.go 119 ciphertext []byte
269 ciphertext: sealed[:len(sealed)-hash.Size()],
283 fmt.Printf("CT: %s\n", hex.EncodeToString(t.ciphertext))
306 fmt.Printf("# Note: aead_test's input format splits the ciphertext and tag positions of the sealed\n")
  /development/samples/ApiDemos/res/layout/
keystore_usage.xml 104 android:id="@+id/ciphertext"
117 android:layout_below="@+id/ciphertext" >

Completed in 574 milliseconds

1 23 4 5 6 7 8