HomeSort by relevance Sort by last modified time
    Searched full:ciphertext (Results 1 - 25 of 186) sorted by null

1 2 3 4 5 6 7 8

  /external/boringssl/src/crypto/cipher/test/
cipher_test.txt 5 Ciphertext = 75b7878099e0c596
10 Ciphertext = 7494c2e7104b0879
15 Ciphertext = de188941a3375d3a
20 Ciphertext = d6a141a7ec3c38dfbd615a1162e1c7ba36b67858
25 Ciphertext = 66a0949f8af7d6891f7f832ba833c00c892ebe30143ce28740011ecf
30 Ciphertext = d6a141a7ec3c38dfbd61
38 Ciphertext = 3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D41C673812CFDE9675
46 Ciphertext = 7948C0DA4FE91CD815DCA96DBC9B60A857EB954F4DEB08EB98722642AE69257B
54 Ciphertext = 22E889402E28422F8167AD279D90A566DA75B734E12C671FC2669AECB3E4FE8F
62 Ciphertext = 69C4E0D86A7B0430D8CDB78070B4C55
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/cipher/
cfb_test.go 20 key, iv, plaintext, ciphertext string
62 expected, err := hex.DecodeString(test.ciphertext)
72 ciphertext := make([]byte, len(plaintext))
74 cfb.XORKeyStream(ciphertext, plaintext)
76 if !bytes.Equal(ciphertext, expected) {
77 t.Errorf("#%d: wrong output: got %x, expected %x", i, ciphertext, expected)
81 plaintextCopy := make([]byte, len(ciphertext))
82 cfbdec.XORKeyStream(plaintextCopy, ciphertext)
101 ciphertext := make([]byte, len(plaintext))
102 copy(ciphertext, plaintext
    [all...]
example_test.go 19 ciphertext, _ := hex.DecodeString("f363f3ccdcb12bb883abf484ba77d9cd7d32b5baecb3d4b1b3e0e4beffdb3ded")
27 // include it at the beginning of the ciphertext.
28 if len(ciphertext) < aes.BlockSize {
29 panic("ciphertext too short")
31 iv := ciphertext[:aes.BlockSize]
32 ciphertext = ciphertext[aes.BlockSize:]
35 if len(ciphertext)%aes.BlockSize != 0 {
36 panic("ciphertext is not a multiple of the block size")
42 mode.CryptBlocks(ciphertext, ciphertext
    [all...]
  /prebuilts/go/linux-x86/src/crypto/cipher/
cfb_test.go 20 key, iv, plaintext, ciphertext string
62 expected, err := hex.DecodeString(test.ciphertext)
72 ciphertext := make([]byte, len(plaintext))
74 cfb.XORKeyStream(ciphertext, plaintext)
76 if !bytes.Equal(ciphertext, expected) {
77 t.Errorf("#%d: wrong output: got %x, expected %x", i, ciphertext, expected)
81 plaintextCopy := make([]byte, len(ciphertext))
82 cfbdec.XORKeyStream(plaintextCopy, ciphertext)
101 ciphertext := make([]byte, len(plaintext))
102 copy(ciphertext, plaintext
    [all...]
example_test.go 19 ciphertext, _ := hex.DecodeString("f363f3ccdcb12bb883abf484ba77d9cd7d32b5baecb3d4b1b3e0e4beffdb3ded")
27 // include it at the beginning of the ciphertext.
28 if len(ciphertext) < aes.BlockSize {
29 panic("ciphertext too short")
31 iv := ciphertext[:aes.BlockSize]
32 ciphertext = ciphertext[aes.BlockSize:]
35 if len(ciphertext)%aes.BlockSize != 0 {
36 panic("ciphertext is not a multiple of the block size")
42 mode.CryptBlocks(ciphertext, ciphertext
    [all...]
  /system/connectivity/shill/
crypto_provider.cc 49 string ciphertext; local
50 if (crypto->Encrypt(plaintext, &ciphertext)) {
52 return prefix + ciphertext;
59 string CryptoProvider::Decrypt(const string& ciphertext) {
62 if (base::StartsWith(ciphertext, prefix, base::CompareCase::SENSITIVE)) {
63 string to_decrypt = ciphertext;
74 return ciphertext;
crypto_rot47.cc 31 bool CryptoROT47::Encrypt(const string& plaintext, string* ciphertext) {
37 *ciphertext = plaintext;
38 for (auto& ch : *ciphertext) {
48 bool CryptoROT47::Decrypt(const string& ciphertext, string* plaintext) {
50 return Encrypt(ciphertext, plaintext);
crypto_interface.h 32 // Encrypts |plaintext| into |ciphertext|. Returns true on success.
34 std::string* ciphertext) = 0;
36 // Decrypts |ciphertext| into |plaintext|. Returns true on success.
37 virtual bool Decrypt(const std::string& ciphertext,
crypto_des_cbc.cc 42 bool CryptoDESCBC::Encrypt(const string& plaintext, string* ciphertext) {
48 bool CryptoDESCBC::Decrypt(const string& ciphertext, string* plaintext) {
52 string b64_ciphertext = ciphertext;
53 if (base::StartsWith(ciphertext, kVersion2Prefix,
61 LOG(ERROR) << "Unable to base64-decode DEC-CBC ciphertext.";
68 LOG(ERROR) << "Invalid DES-CBC ciphertext size: " << data.size();
crypto_provider.h 41 // Returns |ciphertext| decrypted by the highest priority available crypto
43 // |ciphertext| as is.
44 std::string Decrypt(const std::string& ciphertext);
  /system/webservd/webservd/
fake_encryptor.cc 22 // ciphertext. Obviously, this should be used only for testing.
26 std::string* ciphertext) override {
27 *ciphertext = brillo::data_encoding::Base64Encode(plaintext);
31 bool DecryptWithAuthentication(const std::string& ciphertext,
33 return brillo::data_encoding::Base64Decode(ciphertext, plaintext);
encryptor.h 29 // |ciphertext|. Returns true on success.
31 std::string* ciphertext) = 0;
33 // Decrypts and authenticates the given |ciphertext| and emits the
35 virtual bool DecryptWithAuthentication(const std::string& ciphertext,
keystore_encryptor.cc 40 std::string* ciphertext) {
42 ciphertext);
45 bool KeystoreEncryptor::DecryptWithAuthentication(const std::string& ciphertext,
47 return keystore_->decryptWithAuthentication(kWebserverKeyName, ciphertext,
fake_encryptor.h 25 // ciphertext. Obviously, this should be used only for testing.
29 std::string* ciphertext) override;
31 bool DecryptWithAuthentication(const std::string& ciphertext,
  /cts/tests/tests/keystore/src/android/keystore/cts/
RSACipherTest.java 91 byte[] ciphertext = cipher.doFinal(plaintext);
93 MoreAsserts.assertEquals(plaintext, cipher.doFinal(ciphertext));
118 byte[] ciphertext = cipher.doFinal(plaintext);
119 fail("Unexpectedly produced ciphertext (" + ciphertext.length + " bytes): "
120 + HexEncoding.encode(ciphertext));
147 byte[] ciphertext = cipher.doFinal(plaintext);
148 fail("Unexpectedly produced ciphertext (" + ciphertext.length + " bytes): "
149 + HexEncoding.encode(ciphertext));
    [all...]
AESGCMCipherTestBase.java 182 byte[] ciphertext = getKatCiphertext();
183 ciphertext[ciphertext.length / 2] ^= 0x40;
186 doFinal(ciphertext);
194 byte[] ciphertext = getKatCiphertextWhenKatAadPresent();
200 doFinal(ciphertext);
  /system/weaved/buffet/
encryptor.h 32 // |ciphertext|. Returns true on success.
34 std::string* ciphertext) = 0;
36 // Decrypts and authenticates the given |ciphertext| and emits the
38 virtual bool DecryptWithAuthentication(const std::string& ciphertext,
fake_encryptor.cc 26 std::string* ciphertext) override {
27 *ciphertext = brillo::data_encoding::Base64Encode(plaintext);
31 bool DecryptWithAuthentication(const std::string& ciphertext,
33 return brillo::data_encoding::Base64Decode(ciphertext, plaintext);
keystore_encryptor.cc 40 std::string* ciphertext) {
42 ciphertext);
45 bool KeystoreEncryptor::DecryptWithAuthentication(const std::string& ciphertext,
47 return keystore_->decryptWithAuthentication(kBuffetKeyName, ciphertext,
  /external/boringssl/src/ssl/test/runner/
chacha20_poly1305.go 143 func (c *chaCha20Poly1305) poly1305(tag *[16]byte, nonce, ciphertext, additionalData []byte) {
144 input := make([]byte, 0, len(additionalData)+15+len(ciphertext)+15+8+8)
150 input = append(input, ciphertext...)
157 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext)))
165 func (c *chaCha20Poly1305) poly1305Old(tag *[16]byte, nonce, ciphertext, additionalData []byte) {
166 input := make([]byte, 0, len(additionalData)+8+len(ciphertext)+8)
170 input = append(input, ciphertext...)
172 binary.LittleEndian.PutUint64(out, uint64(len(ciphertext)))
199 func (c *chaCha20Poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) {
203 if len(ciphertext) < 16
    [all...]
  /external/boringssl/src/crypto/modes/
gcm_test.c 65 const char *ciphertext; member in struct:test_case
305 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local
316 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num,
317 "ciphertext") ||
323 fprintf(stderr, "%u: plaintext and ciphertext have differing lengths.\n",
357 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) {
360 hexdump(stderr, "want:", ciphertext, plaintext_len);
369 if (ciphertext) {
    [all...]
  /prebuilts/go/darwin-x86/src/crypto/rsa/
pkcs1v15_test.go 55 func(ciphertext []byte) (plaintext []byte, err error) {
56 return DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
58 func(ciphertext []byte) (plaintext []byte, err error) {
59 return rsaPrivateKey.Decrypt(nil, ciphertext, nil)
86 ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in)
98 plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext)
228 ciphertext := decodeBase64("fjOVdirUzFoLlukv80dBllMLjXythIf22feqPrNo0YoIjzyzyoMFiLjAc/Y4krkeZ11XFThIrEvw\nkRiZcCq5ng==")
229 _, err := DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
259 // ciphertext is too small doesn't run outside the array bounds.
260 ciphertext, err := EncryptPKCS1v15(rand.Reader, &rsaPrivateKey.PublicKey, []byte{1}
    [all...]
  /prebuilts/go/linux-x86/src/crypto/rsa/
pkcs1v15_test.go 55 func(ciphertext []byte) (plaintext []byte, err error) {
56 return DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
58 func(ciphertext []byte) (plaintext []byte, err error) {
59 return rsaPrivateKey.Decrypt(nil, ciphertext, nil)
86 ciphertext, err := EncryptPKCS1v15(random, &rsaPrivateKey.PublicKey, in)
98 plaintext, err := DecryptPKCS1v15(rand, rsaPrivateKey, ciphertext)
228 ciphertext := decodeBase64("fjOVdirUzFoLlukv80dBllMLjXythIf22feqPrNo0YoIjzyzyoMFiLjAc/Y4krkeZ11XFThIrEvw\nkRiZcCq5ng==")
229 _, err := DecryptPKCS1v15(nil, rsaPrivateKey, ciphertext)
259 // ciphertext is too small doesn't run outside the array bounds.
260 ciphertext, err := EncryptPKCS1v15(rand.Reader, &rsaPrivateKey.PublicKey, []byte{1}
    [all...]
  /external/srtp/crypto/include/
aes_cbc.h 19 v128_t previous; /* previous ciphertext block */
  /external/tpm2/
RSA_Decrypt.c 19 // TPM_RC_SIZE cipherText is not the size of the modulus of key referenced by
21 // TPM_RC_VALUE label is not a null terminated string or the value of cipherText is
75 scheme, in->cipherText.t.size,
76 in->cipherText.t.buffer,

Completed in 380 milliseconds

1 2 3 4 5 6 7 8