/external/boringssl/src/crypto/cipher/test/ |
cipher_test.txt | 5 Ciphertext = 75b7878099e0c596 10 Ciphertext = 7494c2e7104b0879 15 Ciphertext = de188941a3375d3a 20 Ciphertext = d6a141a7ec3c38dfbd615a1162e1c7ba36b67858 25 Ciphertext = 66a0949f8af7d6891f7f832ba833c00c892ebe30143ce28740011ecf 30 Ciphertext = d6a141a7ec3c38dfbd61 38 Ciphertext = 3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D41C673812CFDE9675 46 Ciphertext = 7948C0DA4FE91CD815DCA96DBC9B60A857EB954F4DEB08EB98722642AE69257B 54 Ciphertext = 22E889402E28422F8167AD279D90A566DA75B734E12C671FC2669AECB3E4FE8F 62 Ciphertext = 69C4E0D86A7B0430D8CDB78070B4C55 [all...] |
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
cfb_test.go | 20 key, iv, plaintext, ciphertext string 62 expected, err := hex.DecodeString(test.ciphertext) 72 ciphertext := make([]byte, len(plaintext)) 74 cfb.XORKeyStream(ciphertext, plaintext) 76 if !bytes.Equal(ciphertext, expected) { 77 t.Errorf("#%d: wrong output: got %x, expected %x", i, ciphertext, expected) 81 plaintextCopy := make([]byte, len(ciphertext)) 82 cfbdec.XORKeyStream(plaintextCopy, ciphertext) 101 ciphertext := make([]byte, len(plaintext)) 102 copy(ciphertext, plaintext [all...] |
example_test.go | 19 ciphertext, _ := hex.DecodeString("f363f3ccdcb12bb883abf484ba77d9cd7d32b5baecb3d4b1b3e0e4beffdb3ded") 27 // include it at the beginning of the ciphertext. 28 if len(ciphertext) < aes.BlockSize { 29 panic("ciphertext too short") 31 iv := ciphertext[:aes.BlockSize] 32 ciphertext = ciphertext[aes.BlockSize:] 35 if len(ciphertext)%aes.BlockSize != 0 { 36 panic("ciphertext is not a multiple of the block size") 42 mode.CryptBlocks(ciphertext, ciphertext [all...] |
/prebuilts/go/linux-x86/src/crypto/cipher/ |
cfb_test.go | 20 key, iv, plaintext, ciphertext string 62 expected, err := hex.DecodeString(test.ciphertext) 72 ciphertext := make([]byte, len(plaintext)) 74 cfb.XORKeyStream(ciphertext, plaintext) 76 if !bytes.Equal(ciphertext, expected) { 77 t.Errorf("#%d: wrong output: got %x, expected %x", i, ciphertext, expected) 81 plaintextCopy := make([]byte, len(ciphertext)) 82 cfbdec.XORKeyStream(plaintextCopy, ciphertext) 101 ciphertext := make([]byte, len(plaintext)) 102 copy(ciphertext, plaintext [all...] |
example_test.go | 19 ciphertext, _ := hex.DecodeString("f363f3ccdcb12bb883abf484ba77d9cd7d32b5baecb3d4b1b3e0e4beffdb3ded") 27 // include it at the beginning of the ciphertext. 28 if len(ciphertext) < aes.BlockSize { 29 panic("ciphertext too short") 31 iv := ciphertext[:aes.BlockSize] 32 ciphertext = ciphertext[aes.BlockSize:] 35 if len(ciphertext)%aes.BlockSize != 0 { 36 panic("ciphertext is not a multiple of the block size") 42 mode.CryptBlocks(ciphertext, ciphertext [all...] |
/system/connectivity/shill/ |
crypto_provider.cc | 49 string ciphertext; local 50 if (crypto->Encrypt(plaintext, &ciphertext)) { 52 return prefix + ciphertext; 59 string CryptoProvider::Decrypt(const string& ciphertext) { 62 if (base::StartsWith(ciphertext, prefix, base::CompareCase::SENSITIVE)) { 63 string to_decrypt = ciphertext; 74 return ciphertext;
|
crypto_rot47.cc | 31 bool CryptoROT47::Encrypt(const string& plaintext, string* ciphertext) { 37 *ciphertext = plaintext; 38 for (auto& ch : *ciphertext) { 48 bool CryptoROT47::Decrypt(const string& ciphertext, string* plaintext) { 50 return Encrypt(ciphertext, plaintext);
|
crypto_interface.h | 32 // Encrypts |plaintext| into |ciphertext|. Returns true on success. 34 std::string* ciphertext) = 0; 36 // Decrypts |ciphertext| into |plaintext|. Returns true on success. 37 virtual bool Decrypt(const std::string& ciphertext,
|
crypto_des_cbc.cc | 42 bool CryptoDESCBC::Encrypt(const string& plaintext, string* ciphertext) { 48 bool CryptoDESCBC::Decrypt(const string& ciphertext, string* plaintext) { 52 string b64_ciphertext = ciphertext; 53 if (base::StartsWith(ciphertext, kVersion2Prefix, 61 LOG(ERROR) << "Unable to base64-decode DEC-CBC ciphertext."; 68 LOG(ERROR) << "Invalid DES-CBC ciphertext size: " << data.size();
|
crypto_provider.h | 41 // Returns |ciphertext| decrypted by the highest priority available crypto 43 // |ciphertext| as is. 44 std::string Decrypt(const std::string& ciphertext);
|
/system/webservd/webservd/ |
fake_encryptor.cc | 22 // ciphertext. Obviously, this should be used only for testing. 26 std::string* ciphertext) override { 27 *ciphertext = brillo::data_encoding::Base64Encode(plaintext); 31 bool DecryptWithAuthentication(const std::string& ciphertext, 33 return brillo::data_encoding::Base64Decode(ciphertext, plaintext);
|
encryptor.h | 29 // |ciphertext|. Returns true on success. 31 std::string* ciphertext) = 0; 33 // Decrypts and authenticates the given |ciphertext| and emits the 35 virtual bool DecryptWithAuthentication(const std::string& ciphertext,
|
keystore_encryptor.cc | 40 std::string* ciphertext) { 42 ciphertext); 45 bool KeystoreEncryptor::DecryptWithAuthentication(const std::string& ciphertext, 47 return keystore_->decryptWithAuthentication(kWebserverKeyName, ciphertext,
|
fake_encryptor.h | 25 // ciphertext. Obviously, this should be used only for testing. 29 std::string* ciphertext) override; 31 bool DecryptWithAuthentication(const std::string& ciphertext,
|
/cts/tests/tests/keystore/src/android/keystore/cts/ |
RSACipherTest.java | 91 byte[] ciphertext = cipher.doFinal(plaintext); 93 MoreAsserts.assertEquals(plaintext, cipher.doFinal(ciphertext)); 118 byte[] ciphertext = cipher.doFinal(plaintext); 119 fail("Unexpectedly produced ciphertext (" + ciphertext.length + " bytes): " 120 + HexEncoding.encode(ciphertext)); 147 byte[] ciphertext = cipher.doFinal(plaintext); 148 fail("Unexpectedly produced ciphertext (" + ciphertext.length + " bytes): " 149 + HexEncoding.encode(ciphertext)); [all...] |
AESGCMCipherTestBase.java | 182 byte[] ciphertext = getKatCiphertext(); 183 ciphertext[ciphertext.length / 2] ^= 0x40; 186 doFinal(ciphertext); 194 byte[] ciphertext = getKatCiphertextWhenKatAadPresent(); 200 doFinal(ciphertext);
|
/system/weaved/buffet/ |
encryptor.h | 32 // |ciphertext|. Returns true on success. 34 std::string* ciphertext) = 0; 36 // Decrypts and authenticates the given |ciphertext| and emits the 38 virtual bool DecryptWithAuthentication(const std::string& ciphertext,
|
fake_encryptor.cc | 26 std::string* ciphertext) override { 27 *ciphertext = brillo::data_encoding::Base64Encode(plaintext); 31 bool DecryptWithAuthentication(const std::string& ciphertext, 33 return brillo::data_encoding::Base64Decode(ciphertext, plaintext);
|
keystore_encryptor.cc | 40 std::string* ciphertext) { 42 ciphertext); 45 bool KeystoreEncryptor::DecryptWithAuthentication(const std::string& ciphertext, 47 return keystore_->decryptWithAuthentication(kBuffetKeyName, ciphertext,
|
/external/boringssl/src/ssl/test/runner/ |
chacha20_poly1305.go | 143 func (c *chaCha20Poly1305) poly1305(tag *[16]byte, nonce, ciphertext, additionalData []byte) { 144 input := make([]byte, 0, len(additionalData)+15+len(ciphertext)+15+8+8) 150 input = append(input, ciphertext...) 157 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext))) 165 func (c *chaCha20Poly1305) poly1305Old(tag *[16]byte, nonce, ciphertext, additionalData []byte) { 166 input := make([]byte, 0, len(additionalData)+8+len(ciphertext)+8) 170 input = append(input, ciphertext...) 172 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext))) 199 func (c *chaCha20Poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 203 if len(ciphertext) < 16 [all...] |
/external/boringssl/src/crypto/modes/ |
gcm_test.c | 65 const char *ciphertext; member in struct:test_case 305 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local 316 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, 317 "ciphertext") || 323 fprintf(stderr, "%u: plaintext and ciphertext have differing lengths.\n", 357 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { 360 hexdump(stderr, "want:", ciphertext, plaintext_len); 369 if (ciphertext) { [all...] |
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
pkcs1v15_test.go | 55 func(ciphertext []byte) (plaintext []byte, err error) { 56 return DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext) 58 func(ciphertext []byte) (plaintext []byte, err error) { 59 return rsaPrivateKey.Decrypt(nil, ciphertext, nil) 86 ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in) 98 plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext) 228 ciphertext := decodeBase64("fjOVdirUzFoLlukv80dBllMLjXythIf22feqPrNo0YoIjzyzyoMFiLjAc/Y4krkeZ11XFThIrEvw\nkRiZcCq5ng==") 229 _, err := DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext) 259 // ciphertext is too small doesn't run outside the array bounds. 260 ciphertext, err := EncryptPKCS1v15(rand.Reader, &rsaPrivateKey.PublicKey, []byte{1} [all...] |
/prebuilts/go/linux-x86/src/crypto/rsa/ |
pkcs1v15_test.go | 55 func(ciphertext []byte) (plaintext []byte, err error) { 56 return DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext) 58 func(ciphertext []byte) (plaintext []byte, err error) { 59 return rsaPrivateKey.Decrypt(nil, ciphertext, nil) 86 ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in) 98 plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext) 228 ciphertext := decodeBase64("fjOVdirUzFoLlukv80dBllMLjXythIf22feqPrNo0YoIjzyzyoMFiLjAc/Y4krkeZ11XFThIrEvw\nkRiZcCq5ng==") 229 _, err := DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext) 259 // ciphertext is too small doesn't run outside the array bounds. 260 ciphertext, err := EncryptPKCS1v15(rand.Reader, &rsaPrivateKey.PublicKey, []byte{1} [all...] |
/external/srtp/crypto/include/ |
aes_cbc.h | 19 v128_t previous; /* previous ciphertext block */
|
/external/tpm2/ |
RSA_Decrypt.c | 19 // TPM_RC_SIZE cipherText is not the size of the modulus of key referenced by 21 // TPM_RC_VALUE label is not a null terminated string or the value of cipherText is 75 scheme, in->cipherText.t.size, 76 in->cipherText.t.buffer,
|