Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 - 25 of 58) sorted by relevance

123

/third_party/node/test/fixtures/crypto/
H A Drsa.js77 const ciphertext = {
180 ciphertext: ciphertext['sha-1, no label']
193 ciphertext: ciphertext['sha-256, no label']
206 ciphertext: ciphertext['sha-384, no label']
219 ciphertext: ciphertext['sha-512, no label']
232 ciphertext
[all...]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/encrypt_decrypt/
H A Drsa_vectors.js19 // result - the expected result (usually just ciphertext, sometimes with added authentication)
31 var ciphertext = {
54 ciphertext: ciphertext["sha-1, no label"]
67 ciphertext: ciphertext["sha-256, no label"]
80 ciphertext: ciphertext["sha-384, no label"]
93 ciphertext: ciphertext["sh
[all...]
H A Drsa.js19 if (!("ciphertext" in vector)) {
24 return subtle.decrypt(vector.algorithm, vector.privateKey, vector.ciphertext)
48 if (!("ciphertext" in vector)) {
53 var ciphertext = copyBuffer(vector.ciphertext);
54 var operation = subtle.decrypt(vector.algorithm, vector.privateKey, ciphertext)
60 ciphertext[0] = 255 - ciphertext[0];
62 }, vector.name + " decryption with altered ciphertext");
69 }, "importVectorKeys step: " + vector.name + " decryption with altered ciphertext");
[all...]
H A Daes_gcm_vectors.js12 // result - the expected result (usually just ciphertext, sometimes with added authentication)
21 ciphertext,
33 var result = new Uint8Array(ciphertext[keyLength].byteLength + byteCount);
34 result.set(ciphertext[keyLength], 0);
35 result.set(tag[keyLength].slice(0, byteCount), ciphertext[keyLength].byteLength);
45 var noadresult = new Uint8Array(ciphertext[keyLength].byteLength + byteCount);
46 noadresult.set(ciphertext[keyLength], 0);
47 noadresult.set(tag_with_empty_ad[keyLength].slice(0, byteCount), ciphertext[keyLength].byteLength);
70 result: ciphertext[keyLength]
H A Daes_cbc_vectors.js13 // result - the expected result (usually just ciphertext, sometimes with added authentication)
76 // AES-CBC produces ciphertext
77 var ciphertext = {
181 // Replace the last block of each ciphertext with bad padding below for decryption errors
211 result: ciphertext[keyLength]
225 result: ciphertext[keyLength]
237 result: ciphertext[keyLength]
245 var badCiphertext = new Uint8Array(ciphertext[keyLength].byteLength);
246 badCiphertext.set(ciphertext[keyLength].slice(0, ciphertext[keyLengt
[all...]
H A Daes_ctr_vectors.js13 // result - the expected result (usually just ciphertext, sometimes with added authentication)
76 // AES-CTR produces ciphertext
77 var ciphertext = {
96 result: ciphertext[keyLength]
109 result: ciphertext[keyLength]
118 result: ciphertext[keyLength]
H A Daes_gcm_256_iv_fixtures.js97 // AES-GCM produces ciphertext and a tag.
98 var ciphertext = {
208 ciphertext,
H A Daes_gcm_96_iv_fixtures.js97 // AES-GCM produces ciphertext and a tag.
98 var ciphertext = {
207 ciphertext,
/third_party/openssl/test/
H A Digetest.c227 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_dec() local
232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec()
236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_dec()
245 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_chaining() local
250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining()
253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, in test_ige_enc_chaining()
258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); in test_ige_enc_chaining()
267 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_dec_chaining() local
272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining()
275 ciphertext in test_ige_dec_chaining()
293 unsigned char ciphertext[BIG_TEST_SIZE]; test_ige_garble_forwards() local
331 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_enc_dec() local
352 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_garble1() local
383 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_garble2() local
414 unsigned char ciphertext[BIG_TEST_SIZE]; test_bi_ige_garble3() local
[all...]
/third_party/mbedtls/tests/src/drivers/
H A Dtest_driver_aead.c32 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_test_transparent_aead_encrypt()
50 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt()
59 ciphertext, ciphertext_size, ciphertext_length); in mbedtls_test_transparent_aead_encrypt()
71 (void) ciphertext; in mbedtls_test_transparent_aead_encrypt()
87 const uint8_t *ciphertext, size_t ciphertext_length, in mbedtls_test_transparent_aead_decrypt()
105 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt()
114 ciphertext, ciphertext_length, in mbedtls_test_transparent_aead_decrypt()
125 (void) ciphertext; in mbedtls_test_transparent_aead_decrypt()
339 uint8_t *ciphertext, in mbedtls_test_transparent_aead_finish()
355 libtestdriver1_mbedtls_psa_aead_finish(operation, ciphertext, in mbedtls_test_transparent_aead_finish()
25 mbedtls_test_transparent_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_test_transparent_aead_encrypt() argument
81 mbedtls_test_transparent_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_test_transparent_aead_decrypt() argument
337 mbedtls_test_transparent_aead_finish( mbedtls_transparent_test_driver_aead_operation_t *operation, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length, uint8_t *tag, size_t tag_size, size_t *tag_length) mbedtls_test_transparent_aead_finish() argument
[all...]
/third_party/mbedtls/library/
H A Dpsa_crypto_aead.c124 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) in mbedtls_psa_aead_encrypt()
138 * ciphertext. */ in mbedtls_psa_aead_encrypt()
143 tag = ciphertext + plaintext_length; in mbedtls_psa_aead_encrypt()
153 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
165 plaintext, ciphertext, in mbedtls_psa_aead_encrypt()
182 ciphertext, in mbedtls_psa_aead_encrypt()
206 /* Locate the tag in a ciphertext buffer containing the encrypted data
212 const uint8_t *ciphertext, in psa_aead_unpadded_locate_tag()
225 *p_tag = ciphertext + payload_length; in psa_aead_unpadded_locate_tag()
235 const uint8_t *ciphertext, size_ in mbedtls_psa_aead_decrypt()
117 mbedtls_psa_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_psa_aead_encrypt() argument
211 psa_aead_unpadded_locate_tag(size_t tag_length, const uint8_t *ciphertext, size_t ciphertext_length, size_t plaintext_size, const uint8_t **p_tag) psa_aead_unpadded_locate_tag() argument
229 mbedtls_psa_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_psa_aead_decrypt() argument
549 mbedtls_psa_aead_finish( mbedtls_psa_aead_operation_t *operation, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length, uint8_t *tag, size_t tag_size, size_t *tag_length) mbedtls_psa_aead_finish() argument
[all...]
H A Dpsa_crypto_aead.h50 * \param[out] ciphertext Output buffer for the authenticated and
57 * \param ciphertext_size Size of the ciphertext buffer in bytes. This
66 * ciphertext size of any supported AEAD
69 * ciphertext buffer.
86 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length);
110 * \param[in] ciphertext Data that has been authenticated and
116 * \param ciphertext_length Size of ciphertext in bytes.
148 const uint8_t *ciphertext, size_t ciphertext_length,
427 * - \p ciphertext contains trailing ciphertext tha
[all...]
H A Dccm.c689 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local
710 memset(ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN); in mbedtls_ccm_self_test()
716 plaintext, ciphertext, in mbedtls_ccm_self_test()
717 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
721 memcmp(ciphertext, res_test_data[i], in mbedtls_ccm_self_test()
734 ciphertext, plaintext, in mbedtls_ccm_self_test()
735 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
/third_party/node/deps/openssl/openssl/crypto/camellia/
H A Dcmll_local.h35 u8 ciphertext[]);
36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[],
40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]);
41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
H A Dcamellia.c405 u8 ciphertext[]) in Camellia_EncryptBlock_Rounds()
443 PUTU32(ciphertext, s2); in Camellia_EncryptBlock_Rounds()
444 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds()
445 PUTU32(ciphertext + 8, s0); in Camellia_EncryptBlock_Rounds()
446 PUTU32(ciphertext + 12, s1); in Camellia_EncryptBlock_Rounds()
450 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) in Camellia_EncryptBlock()
453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock()
456 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], in Camellia_DecryptBlock_Rounds() argument
463 s0 = GETU32(ciphertext) ^ k[0]; in Camellia_DecryptBlock_Rounds()
464 s1 = GETU32(ciphertext in Camellia_DecryptBlock_Rounds()
403 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock_Rounds() argument
449 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock() argument
502 Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], const KEY_TABLE_TYPE keyTable, u8 plaintext[]) Camellia_DecryptBlock() argument
[all...]
/third_party/openssl/crypto/camellia/
H A Dcmll_local.h35 u8 ciphertext[]);
36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[],
40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]);
41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
H A Dcamellia.c405 u8 ciphertext[]) in Camellia_EncryptBlock_Rounds()
443 PUTU32(ciphertext, s2); in Camellia_EncryptBlock_Rounds()
444 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds()
445 PUTU32(ciphertext + 8, s0); in Camellia_EncryptBlock_Rounds()
446 PUTU32(ciphertext + 12, s1); in Camellia_EncryptBlock_Rounds()
450 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) in Camellia_EncryptBlock()
453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock()
456 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], in Camellia_DecryptBlock_Rounds() argument
463 s0 = GETU32(ciphertext) ^ k[0]; in Camellia_DecryptBlock_Rounds()
464 s1 = GETU32(ciphertext in Camellia_DecryptBlock_Rounds()
403 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock_Rounds() argument
449 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) Camellia_EncryptBlock() argument
502 Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[], const KEY_TABLE_TYPE keyTable, u8 plaintext[]) Camellia_DecryptBlock() argument
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-authenticated.js573 const ciphertext = Buffer.concat([cipher.update(plain), cipher.final()]);
583 const resultUpdate = decipher.update(ciphertext);
604 const ciphertext = Buffer.concat([cipher.update(plain), cipher.final()]);
614 decipher.update(ciphertext),
712 const ciphertext = Buffer.concat([cipher.update('foo'), cipher.final()]);
724 const plaintext = decipher.update(ciphertext);
771 const ciphertext = Buffer.concat([
777 assert.strictEqual(ciphertext.toString('hex'), testCase.ct);
782 decipher.setAAD(aad).update(ciphertext),
804 const ciphertext
[all...]
H A Dtest-crypto-des3-wrap.js10 // then plaintext to store ciphertext.
20 const ciphertext = cipher.update(test.plaintext, 'utf8');
23 const msg = decipher.update(ciphertext, 'buffer', 'utf8');
H A Dtest-crypto-authenticated-stream.js32 const ciphertext = Buffer.concat([c.update(expected), c.final()]);
37 const actual = Buffer.concat([d.update(ciphertext), d.final()]);
94 const ciphertext = fs.readFileSync(filename('b'));
98 const actual = Buffer.concat([d.update(ciphertext), d.final()]);
/third_party/mbedtls/tests/src/
H A Dpsa_exercise_key.c186 unsigned char ciphertext[32] = "(wabblewebblewibblewobblewubble)"; in exercise_cipher_key() local
187 size_t ciphertext_length = sizeof(ciphertext); in exercise_cipher_key()
188 unsigned char decrypted[sizeof(ciphertext)]; in exercise_cipher_key()
211 ciphertext, sizeof(ciphertext), in exercise_cipher_key()
214 ciphertext + ciphertext_length, in exercise_cipher_key()
215 sizeof(ciphertext) - ciphertext_length, in exercise_cipher_key()
237 ciphertext, ciphertext_length, in exercise_cipher_key()
246 ciphertext, a padding error is likely. */ in exercise_cipher_key()
273 unsigned char ciphertext[4 in exercise_aead_key() local
446 unsigned char ciphertext[PSA_ASYMMETRIC_ENCRYPT_OUTPUT_MAX_SIZE] = exercise_asymmetric_encryption_key() local
[all...]
/third_party/libcoap/src/oscore/
H A Doscore_cose.c287 ptr->ciphertext.s, in cose_encrypt0_encode()
288 ptr->ciphertext.length); in cose_encrypt0_encode()
310 ptr->ciphertext.s = buffer; in cose_encrypt0_set_ciphertext()
311 ptr->ciphertext.length = size; in cose_encrypt0_set_ciphertext()
466 size_t max_result_len = ptr->ciphertext.length - tag_len; in cose_encrypt0_decrypt()
478 if (ptr->ciphertext.s == NULL || in cose_encrypt0_decrypt()
479 ptr->ciphertext.length > (plaintext_len + tag_len)) { in cose_encrypt0_decrypt()
490 &ptr->ciphertext, in cose_encrypt0_decrypt()
/third_party/mbedtls/tests/include/test/drivers/
H A Daead.h66 uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length);
74 const uint8_t *ciphertext, size_t ciphertext_length,
114 uint8_t *ciphertext,
/third_party/node/deps/openssl/openssl/include/crypto/
H A Daes_platform.h108 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
110 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
112 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
114 size_t aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
116 size_t aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
118 size_t aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
/third_party/openssl/include/crypto/
H A Daes_platform.h108 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
110 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
112 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext,
114 size_t aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
116 size_t aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
118 size_t aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,

Completed in 15 milliseconds

123