/external/tpm2/ |
RSA_Decrypt_fp.h | 14 TPM2B_PUBLIC_KEY_RSA cipherText;
|
Marshal_RSA_Decrypt.c | 45 result = TPM2B_PUBLIC_KEY_RSA_Unmarshal(&target->cipherText, buffer, size);
|
/system/weaved/buffet/ |
buffet_config_unittest.cc | 94 std::string* ciphertext) override { 95 *ciphertext = brillo::data_encoding::Base64Encode(plaintext); 98 bool DecryptWithAuthentication(const std::string& ciphertext, 101 brillo::data_encoding::Base64Decode(ciphertext, plaintext);
|
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
pkcs1v15.go | 62 func DecryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (out []byte, err error) { 66 valid, out, index, err := decryptPKCS1v15(rand, priv, ciphertext) 79 // It returns an error if the ciphertext is the wrong length or if the 80 // ciphertext is greater than the public modulus. Otherwise, no error is 87 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA 90 func DecryptPKCS1v15SessionKey(rand io.Reader, priv *PrivateKey, ciphertext []byte, key []byte) (err error) { 99 valid, em, index, err := decryptPKCS1v15(rand, priv, ciphertext) 115 // decryptPKCS1v15 decrypts ciphertext using priv and blinds the operation if 121 func decryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (valid int, em []byte, index int, err error) { 128 c := new(big.Int).SetBytes(ciphertext) [all...] |
rsa.go | 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type 93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) { 95 return DecryptPKCS1v15(rand, priv, ciphertext) 100 return DecryptOAEP(opts.Hash.New(), rand, priv, ciphertext, opts.Label) 108 if err := DecryptPKCS1v15SessionKey(rand, priv, ciphertext, plaintext); err != nil { 113 return DecryptPKCS1v15(rand, priv, ciphertext) 509 // DecryptOAEP decrypts ciphertext using RSA-OAEP. 511 func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) (msg []byte, err error) { 516 if len(ciphertext) > k || 522 c := new(big.Int).SetBytes(ciphertext) [all...] |
/prebuilts/go/linux-x86/src/crypto/rsa/ |
pkcs1v15.go | 62 func DecryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (out []byte, err error) { 66 valid, out, index, err := decryptPKCS1v15(rand, priv, ciphertext) 79 // It returns an error if the ciphertext is the wrong length or if the 80 // ciphertext is greater than the public modulus. Otherwise, no error is 87 // See ``Chosen Ciphertext Attacks Against Protocols Based on the RSA 90 func DecryptPKCS1v15SessionKey(rand io.Reader, priv *PrivateKey, ciphertext []byte, key []byte) (err error) { 99 valid, em, index, err := decryptPKCS1v15(rand, priv, ciphertext) 115 // decryptPKCS1v15 decrypts ciphertext using priv and blinds the operation if 121 func decryptPKCS1v15(rand io.Reader, priv *PrivateKey, ciphertext []byte) (valid int, em []byte, index int, err error) { 128 c := new(big.Int).SetBytes(ciphertext) [all...] |
rsa.go | 90 // Decrypt decrypts ciphertext with priv. If opts is nil or of type 93 func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) { 95 return DecryptPKCS1v15(rand, priv, ciphertext) 100 return DecryptOAEP(opts.Hash.New(), rand, priv, ciphertext, opts.Label) 108 if err := DecryptPKCS1v15SessionKey(rand, priv, ciphertext, plaintext); err != nil { 113 return DecryptPKCS1v15(rand, priv, ciphertext) 509 // DecryptOAEP decrypts ciphertext using RSA-OAEP. 511 func DecryptOAEP(hash hash.Hash, random io.Reader, priv *PrivateKey, ciphertext []byte, label []byte) (msg []byte, err error) { 516 if len(ciphertext) > k || 522 c := new(big.Int).SetBytes(ciphertext) [all...] |
/system/keymaster/ |
ae.h | 98 * Encrypt plaintext; provide for authentication of ciphertext/associated data. 107 * ct - Pointer to buffer to receive ciphertext encryption. 109 * if tag is to be bundled into the ciphertext. 128 * Decrypt ciphertext; provide authenticity of plaintext and associated data. 133 * ct - Pointer to ciphertext bytes to be decrypted. 139 * if tag is bundled into the ciphertext. Non-NULL tag is only 141 * final - Non-zero if this call completes the ciphertext being decrypted. 143 * If nonce!=NULL then "ct" points to the start of a ciphertext. If final!=0 144 * then "in" points to the final piece of ciphertext. If final==0 or nonce== 154 * NOTE !!! NOTE !!! -- The ciphertext should be assumed possibly inauthenti [all...] |
android_keymaster_test_utils.h | 261 std::string DecryptMessage(const std::string& ciphertext, keymaster_padding_t padding); 262 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest, 264 std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode, 266 std::string DecryptMessage(const std::string& ciphertext, keymaster_digest_t digest, 268 std::string DecryptMessage(const std::string& ciphertext, keymaster_block_mode_t block_mode, 270 std::string DecryptMessage(const AuthorizationSet& update_params, const std::string& ciphertext, 273 std::string DecryptMessage(const AuthorizationSet& update_params, const std::string& ciphertext,
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
AESCipherNistCavpKatTest.java | 249 } else if ("CIPHERTEXT".equals(name)) { 250 testVector.ciphertext = HexEncoding.decode(value); 293 byte[] input = (encrypt) ? testVector.plaintext : testVector.ciphertext; 295 byte[] expectedOutput = (encrypt) ? testVector.ciphertext : testVector.plaintext; 322 public byte[] ciphertext; field in class:AESCipherNistCavpKatTest.TestVector
|
/external/srtp/crypto/cipher/ |
aes_cbc.c | 189 /* copy ciphertext to output */ 225 * loop over ciphertext blocks, decrypting then exoring with state 230 /* set state to ciphertext input block */ 245 * exor previous ciphertext block out of plaintext, and write new 246 * plaintext block to output, while copying old ciphertext block 375 32, /* octets in ciphertext */ 376 aes_cbc_test_case_0_ciphertext, /* ciphertext */ 426 80, /* octets in ciphertext */ 427 aes_cbc_test_case_1_ciphertext, /* ciphertext */
|
/external/srtp/crypto/include/ |
cryptoalg.h | 74 * authenticated (before the function call), and the ciphertext 79 * length of the ciphertext (after the call)
|
/system/connectivity/shill/ |
crypto_des_cbc_unittest.cc | 97 string ciphertext; local 98 EXPECT_FALSE(crypto_.Encrypt(kPlainText, &ciphertext));
|
/libcore/ojluni/src/main/java/javax/crypto/ |
NullCipher.java | 31 * a consequence, the ciphertext is identical to the plaintext. All
|
/external/boringssl/src/ssl/test/runner/ |
ticket.go | 214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size] 215 plaintext := make([]byte, len(ciphertext)) 216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
cbc.go | 8 // with the previous ciphertext block before applying the block cipher. 101 // For each block, we need to xor the decrypted data with the previous block's ciphertext (the iv). 107 // Copy the last block of ciphertext in preparation as the new iv.
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
ticket.go | 197 ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size] 198 plaintext := ciphertext 199 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
cbc.go | 8 // with the previous ciphertext block before applying the block cipher. 101 // For each block, we need to xor the decrypted data with the previous block's ciphertext (the iv). 107 // Copy the last block of ciphertext in preparation as the new iv.
|
/prebuilts/go/linux-x86/src/crypto/tls/ |
ticket.go | 197 ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size] 198 plaintext := ciphertext 199 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
|
/external/srtp/crypto/ae_xfm/ |
xfm.c | 253 printf("ciphertext len: %d\n", *opaque_len); 254 printf("ciphertext: %s\n", octet_string_hex_string(opaque, *opaque_len)); 260 * ciphertext 346 * set the protected data length to that of the ciphertext, by 352 printf("ciphertext len: %d\n", ciphertext_len); 384 * immediately follows the ciphertext) 407 printf("ciphertext: %s\n", octet_string_hex_string(opaque, *opaque_len));
|
/system/tpm/trunks/ |
tpm_utility_test.cc | 489 std::string output_ciphertext("ciphertext"); 490 std::string ciphertext; local 511 &ciphertext)); 512 EXPECT_EQ(0, ciphertext.compare(output_ciphertext)); 518 std::string ciphertext; local 534 &ciphertext)); 540 std::string ciphertext; local 552 &ciphertext)); 558 std::string output_ciphertext("ciphertext"); 559 std::string ciphertext; local 589 std::string ciphertext; local 618 std::string ciphertext; local 648 std::string ciphertext; local 672 std::string ciphertext; local 692 std::string ciphertext; local 703 std::string ciphertext; local 735 std::string ciphertext; local [all...] |
trunks_client_test.cc | 479 std::string ciphertext; local 483 &ciphertext); 497 TPM_ALG_NULL, ciphertext, 644 std::string ciphertext; local 646 "plaintext", nullptr, &ciphertext); 666 ciphertext, policy_session->GetDelegate(), 766 std::string ciphertext; local 768 "plaintext", nullptr, &ciphertext); 787 ciphertext, policy_session->GetDelegate(), 962 std::string ciphertext; local [all...] |
trunks_factory_for_test.cc | 179 std::string* ciphertext) override { 185 ciphertext); 191 const std::string& ciphertext, 197 ciphertext,
|
/external/boringssl/src/crypto/cipher/test/ |
make_legacy_aead_tests.go | 119 ciphertext []byte 269 ciphertext: sealed[:len(sealed)-hash.Size()], 283 fmt.Printf("CT: %s\n", hex.EncodeToString(t.ciphertext)) 306 fmt.Printf("# Note: aead_test's input format splits the ciphertext and tag positions of the sealed\n")
|
/development/samples/ApiDemos/res/layout/ |
keystore_usage.xml | 104 android:id="@+id/ciphertext" 117 android:layout_below="@+id/ciphertext" >
|