/third_party/node/test/fixtures/crypto/ |
H A D | rsa.js | 77 const ciphertext = { 180 ciphertext: ciphertext['sha-1, no label'] 193 ciphertext: ciphertext['sha-256, no label'] 206 ciphertext: ciphertext['sha-384, no label'] 219 ciphertext: ciphertext['sha-512, no label'] 232 ciphertext [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/encrypt_decrypt/ |
H A D | rsa_vectors.js | 19 // result - the expected result (usually just ciphertext, sometimes with added authentication) 31 var ciphertext = { 54 ciphertext: ciphertext["sha-1, no label"] 67 ciphertext: ciphertext["sha-256, no label"] 80 ciphertext: ciphertext["sha-384, no label"] 93 ciphertext: ciphertext["sh [all...] |
H A D | rsa.js | 19 if (!("ciphertext" in vector)) { 24 return subtle.decrypt(vector.algorithm, vector.privateKey, vector.ciphertext) 48 if (!("ciphertext" in vector)) { 53 var ciphertext = copyBuffer(vector.ciphertext); 54 var operation = subtle.decrypt(vector.algorithm, vector.privateKey, ciphertext) 60 ciphertext[0] = 255 - ciphertext[0]; 62 }, vector.name + " decryption with altered ciphertext"); 69 }, "importVectorKeys step: " + vector.name + " decryption with altered ciphertext"); [all...] |
H A D | aes_gcm_vectors.js | 12 // result - the expected result (usually just ciphertext, sometimes with added authentication) 21 ciphertext, 33 var result = new Uint8Array(ciphertext[keyLength].byteLength + byteCount); 34 result.set(ciphertext[keyLength], 0); 35 result.set(tag[keyLength].slice(0, byteCount), ciphertext[keyLength].byteLength); 45 var noadresult = new Uint8Array(ciphertext[keyLength].byteLength + byteCount); 46 noadresult.set(ciphertext[keyLength], 0); 47 noadresult.set(tag_with_empty_ad[keyLength].slice(0, byteCount), ciphertext[keyLength].byteLength); 70 result: ciphertext[keyLength]
|
H A D | aes_cbc_vectors.js | 13 // result - the expected result (usually just ciphertext, sometimes with added authentication) 76 // AES-CBC produces ciphertext 77 var ciphertext = { 181 // Replace the last block of each ciphertext with bad padding below for decryption errors 211 result: ciphertext[keyLength] 225 result: ciphertext[keyLength] 237 result: ciphertext[keyLength] 245 var badCiphertext = new Uint8Array(ciphertext[keyLength].byteLength); 246 badCiphertext.set(ciphertext[keyLength].slice(0, ciphertext[keyLengt [all...] |
H A D | aes_ctr_vectors.js | 13 // result - the expected result (usually just ciphertext, sometimes with added authentication) 76 // AES-CTR produces ciphertext 77 var ciphertext = { 96 result: ciphertext[keyLength] 109 result: ciphertext[keyLength] 118 result: ciphertext[keyLength]
|
H A D | aes_gcm_256_iv_fixtures.js | 97 // AES-GCM produces ciphertext and a tag. 98 var ciphertext = { 208 ciphertext,
|
H A D | aes_gcm_96_iv_fixtures.js | 97 // AES-GCM produces ciphertext and a tag. 98 var ciphertext = { 207 ciphertext,
|
/third_party/openssl/test/ |
H A D | igetest.c | 227 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_dec() local 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec() 236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_dec() 245 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_chaining() local 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining() 253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, in test_ige_enc_chaining() 258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_chaining() 267 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_dec_chaining() local 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining() 275 ciphertext in test_ige_dec_chaining() 293 unsigned char ciphertext[BIG_TEST_SIZE]; test_ige_garble_forwards() local 331 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_enc_dec() local 352 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_garble1() local 383 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_garble2() local 414 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_garble3() local [all...] |
/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_aead.c | 32 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_test_transparent_aead_encrypt() 50 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt() 59 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt() 71 (void) ciphertext; in mbedtls_test_transparent_aead_encrypt() 87 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 105 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 114 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt() 125 (void) ciphertext; in mbedtls_test_transparent_aead_decrypt() 339 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish() 355 libtestdriver1_mbedtls_psa_aead_finish(operation, ciphertext, in mbedtls_test_transparent_aead_finish() 25 mbedtls_test_transparent_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_test_transparent_aead_encrypt() argument 81 mbedtls_test_transparent_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_test_transparent_aead_decrypt() argument 337 mbedtls_test_transparent_aead_finish( mbedtls_transparent_test_driver_aead_operation_t *operation, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length, uint8_t *tag, size_t tag_size, size_t *tag_length) mbedtls_test_transparent_aead_finish() argument [all...] |
/third_party/mbedtls/library/ |
H A D | psa_crypto_aead.c | 124 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_psa_aead_encrypt() 138 * ciphertext. */ in mbedtls_psa_aead_encrypt() 143 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt() 153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt() 182 ciphertext, in mbedtls_psa_aead_encrypt() 206 /* Locate the tag in a ciphertext buffer containing the encrypted data 212 const uint8_t *ciphertext, in psa_aead_unpadded_locate_tag() 225 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag() 235 const uint8_t *ciphertext, size_ in mbedtls_psa_aead_decrypt() 117 mbedtls_psa_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_psa_aead_encrypt() argument 211 psa_aead_unpadded_locate_tag(size_t tag_length, const uint8_t *ciphertext, size_t ciphertext_length, size_t plaintext_size, const uint8_t **p_tag) psa_aead_unpadded_locate_tag() argument 229 mbedtls_psa_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_psa_aead_decrypt() argument 549 mbedtls_psa_aead_finish( mbedtls_psa_aead_operation_t *operation, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length, uint8_t *tag, size_t tag_size, size_t *tag_length) mbedtls_psa_aead_finish() argument [all...] |
H A D | psa_crypto_aead.h | 50 * \param[out] ciphertext Output buffer for the authenticated and 57 * \param ciphertext_size Size of the ciphertext buffer in bytes. This 66 * ciphertext size of any supported AEAD 69 * ciphertext buffer. 86 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length); 110 * \param[in] ciphertext Data that has been authenticated and 116 * \param ciphertext_length Size of ciphertext in bytes. 148 const uint8_t *ciphertext, size_t ciphertext_length, 427 * - \p ciphertext contains trailing ciphertext tha [all...] |
H A D | ccm.c | 689 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local 710 memset(ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN); in mbedtls_ccm_self_test() 716 plaintext, ciphertext, in mbedtls_ccm_self_test() 717 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test() 721 memcmp(ciphertext, res_test_data[i], in mbedtls_ccm_self_test() 734 ciphertext, plaintext, in mbedtls_ccm_self_test() 735 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
|
/third_party/node/deps/openssl/openssl/crypto/camellia/ |
H A D | cmll_local.h | 35 u8 ciphertext[]); 36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
H A D | camellia.c | 405 u8 ciphertext[]) in Camellia_EncryptBlock_Rounds() 443 PUTU32(ciphertext, s2); in Camellia_EncryptBlock_Rounds() 444 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds() 445 PUTU32(ciphertext + 8, s0); in Camellia_EncryptBlock_Rounds() 446 PUTU32(ciphertext + 12, s1); in Camellia_EncryptBlock_Rounds() 450 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) in Camellia_EncryptBlock() 453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 456 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], in Camellia_DecryptBlock_Rounds() argument 463 s0 = GETU32(ciphertext) ^ k[0]; in Camellia_DecryptBlock_Rounds() 464 s1 = GETU32(ciphertext in Camellia_DecryptBlock_Rounds() 403 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock_Rounds() argument 449 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock() argument 502 Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], const KEY_TABLE_TYPE keyTable, u8 plaintext[]) Camellia_DecryptBlock() argument [all...] |
/third_party/openssl/crypto/camellia/ |
H A D | cmll_local.h | 35 u8 ciphertext[]); 36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
H A D | camellia.c | 405 u8 ciphertext[]) in Camellia_EncryptBlock_Rounds() 443 PUTU32(ciphertext, s2); in Camellia_EncryptBlock_Rounds() 444 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds() 445 PUTU32(ciphertext + 8, s0); in Camellia_EncryptBlock_Rounds() 446 PUTU32(ciphertext + 12, s1); in Camellia_EncryptBlock_Rounds() 450 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) in Camellia_EncryptBlock() 453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 456 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], in Camellia_DecryptBlock_Rounds() argument 463 s0 = GETU32(ciphertext) ^ k[0]; in Camellia_DecryptBlock_Rounds() 464 s1 = GETU32(ciphertext in Camellia_DecryptBlock_Rounds() 403 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock_Rounds() argument 449 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock() argument 502 Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], const KEY_TABLE_TYPE keyTable, u8 plaintext[]) Camellia_DecryptBlock() argument [all...] |
/third_party/node/test/parallel/ |
H A D | test-crypto-authenticated.js | 573 const ciphertext = Buffer.concat([cipher.update(plain), cipher.final()]); 583 const resultUpdate = decipher.update(ciphertext); 604 const ciphertext = Buffer.concat([cipher.update(plain), cipher.final()]); 614 decipher.update(ciphertext), 712 const ciphertext = Buffer.concat([cipher.update('foo'), cipher.final()]); 724 const plaintext = decipher.update(ciphertext); 771 const ciphertext = Buffer.concat([ 777 assert.strictEqual(ciphertext.toString('hex'), testCase.ct); 782 decipher.setAAD(aad).update(ciphertext), 804 const ciphertext [all...] |
H A D | test-crypto-des3-wrap.js | 10 // then plaintext to store ciphertext. 20 const ciphertext = cipher.update(test.plaintext, 'utf8'); 23 const msg = decipher.update(ciphertext, 'buffer', 'utf8');
|
H A D | test-crypto-authenticated-stream.js | 32 const ciphertext = Buffer.concat([c.update(expected), c.final()]); 37 const actual = Buffer.concat([d.update(ciphertext), d.final()]); 94 const ciphertext = fs.readFileSync(filename('b')); 98 const actual = Buffer.concat([d.update(ciphertext), d.final()]);
|
/third_party/mbedtls/tests/src/ |
H A D | psa_exercise_key.c | 186 unsigned char ciphertext[32] = "(wabblewebblewibblewobblewubble)"; in exercise_cipher_key() local 187 size_t ciphertext_length = sizeof(ciphertext); in exercise_cipher_key() 188 unsigned char decrypted[sizeof(ciphertext)]; in exercise_cipher_key() 211 ciphertext, sizeof(ciphertext), in exercise_cipher_key() 214 ciphertext + ciphertext_length, in exercise_cipher_key() 215 sizeof(ciphertext) - ciphertext_length, in exercise_cipher_key() 237 ciphertext, ciphertext_length, in exercise_cipher_key() 246 ciphertext, a padding error is likely. */ in exercise_cipher_key() 273 unsigned char ciphertext[4 in exercise_aead_key() local 446 unsigned char ciphertext[PSA_ASYMMETRIC_ENCRYPT_OUTPUT_MAX_SIZE] = exercise_asymmetric_encryption_key() local [all...] |
/third_party/libcoap/src/oscore/ |
H A D | oscore_cose.c | 287 ptr->ciphertext.s, in cose_encrypt0_encode() 288 ptr->ciphertext.length); in cose_encrypt0_encode() 310 ptr->ciphertext.s = buffer; in cose_encrypt0_set_ciphertext() 311 ptr->ciphertext.length = size; in cose_encrypt0_set_ciphertext() 466 size_t max_result_len = ptr->ciphertext.length - tag_len; in cose_encrypt0_decrypt() 478 if (ptr->ciphertext.s == NULL || in cose_encrypt0_decrypt() 479 ptr->ciphertext.length > (plaintext_len + tag_len)) { in cose_encrypt0_decrypt() 490 &ptr->ciphertext, in cose_encrypt0_decrypt()
|
/third_party/mbedtls/tests/include/test/drivers/ |
H A D | aead.h | 66 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length); 74 const uint8_t *ciphertext, size_t ciphertext_length, 114 uint8_t *ciphertext,
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | aes_platform.h | 108 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 110 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 112 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 114 size_t aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 116 size_t aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 118 size_t aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
|
/third_party/openssl/include/crypto/ |
H A D | aes_platform.h | 108 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 110 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 112 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 114 size_t aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 116 size_t aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 118 size_t aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
|