Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 - 25 of 79) sorted by relevance

1234

/third_party/node/test/fixtures/crypto/
H A Drsa.js66 // overlong plaintext for RSA-OAEP
67 const plaintext = Buffer.from(
179 plaintext: plaintext.slice(0, 214),
192 plaintext: plaintext.slice(0, 190),
205 plaintext: plaintext.slice(0, 158),
218 plaintext: plaintext
[all...]
H A Drsa_pss.js53 const plaintext = Buffer.from(
87 plaintext,
95 plaintext,
103 plaintext,
111 plaintext,
119 plaintext,
127 plaintext,
135 plaintext,
143 plaintext,
H A Drsa_pkcs.js52 // plaintext
53 const plaintext = Buffer.from(
108 plaintext,
116 plaintext,
124 plaintext,
132 plaintext,
/third_party/node/test/fixtures/wpt/WebCryptoAPI/encrypt_decrypt/
H A Drsa_vectors.js18 // plaintext - the text to encrypt
28 // overlong plaintext for RSA-OAEP
29 var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210, 91, 248, 62, 90, 113, 37, 160, 140, 175, 231, 60, 62, 186, 196, 33, 119, 157, 249, 213, 93, 24, 12, 58, 233, 148, 38, 69, 225, 216, 47, 238, 140, 157, 41, 75, 60, 177, 160, 138, 153, 49, 32, 27, 60, 14, 129, 252, 71, 202, 207, 131, 21, 162, 175, 102, 50, 65, 19, 195, 182, 98, 48, 195, 70, 8, 196, 244, 89, 54, 52, 206, 2, 178, 103, 54, 34, 119, 240, 168, 64, 202, 116, 188, 61, 26, 98, 54, 149, 44, 94, 215, 170, 248, 168, 254, 203, 221, 250, 117, 132, 230, 151, 140, 234, 93, 42, 91, 159, 183, 241, 180, 140, 139, 11, 229, 138, 48, 82, 2, 117, 77, 131, 118, 16, 115, 116, 121, 60, 240, 38, 170, 238, 83, 0, 114, 125, 131, 108, 215, 30, 113, 179, 69, 221, 178, 228, 68, 70, 255, 197, 185, 1, 99, 84, 19, 137, 13, 145, 14, 163, 128, 152, 74, 144, 25, 16, 49, 50, 63, 22, 219, 204, 157, 107, 225, 104, 184, 72, 133, 56, 76, 160, 62, 18, 96, 10, 193, 194, 72, 2, 138, 243, 114, 108, 201, 52, 99, 136, 46, 168, 192, 42, 171]);
53 plaintext: plaintext.slice(0, 214),
66 plaintext: plaintext.slice(0, 190),
79 plaintext: plaintext.slice(0, 158),
92 plaintext
[all...]
H A Drsa.js18 // Get a one byte longer plaintext to encrypt
25 .then(function(plaintext) {
26 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works"));
47 // Get a one byte longer plaintext to encrypt
55 .then(function(plaintext) {
56 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works"));
81 .then(function(plaintext) {
106 // Get a one byte longer plaintext t
[all...]
H A Daes_cbc_vectors.js12 // plaintext - the text to encrypt
16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115,
210 plaintext: plaintext,
224 plaintext: plaintext,
236 plaintext: plaintext,
254 plaintext: plaintext,
[all...]
H A Daes_ctr_vectors.js12 // plaintext - the text to encrypt
16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115,
95 plaintext: plaintext,
108 plaintext: plaintext,
117 plaintext: plaintext,
H A Daes_gcm_vectors.js11 // plaintext - the text to encrypt
15 plaintext,
41 plaintext: plaintext,
53 plaintext: plaintext,
69 plaintext: plaintext,
H A Daes.js20 return subtle.encrypt(vector.algorithm, vector.key, vector.plaintext)
40 var plaintext = copyBuffer(vector.plaintext);
44 var operation = subtle.encrypt(vector.algorithm, vector.key, plaintext)
50 plaintext[0] = 255 - plaintext[0];
52 }, vector.name + " with altered plaintext");
58 }, "importKey step: " + vector.name + " with altered plaintext");
71 assert_true(equalBuffers(result, vector.plaintext), "Should return expected result");
95 assert_true(equalBuffers(result, vector.plaintext), "Shoul
[all...]
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/
H A Drsa_pss_vectors.js18 // plaintext - the text to encrypt
24 // plaintext for RSA-PSS
25 var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210, 91, 248, 62, 90, 113, 37, 160, 140, 175, 231, 60, 62, 186, 196, 33, 119, 157, 249, 213, 93, 24, 12, 58, 233, 148, 38, 69, 225, 216, 47, 238, 140, 157, 41, 75, 60, 177, 160, 138, 153, 49, 32, 27, 60, 14, 129, 252, 71, 202, 207, 131, 21, 162, 175, 102, 50, 65, 19, 195, 182, 98, 48, 195, 70, 8, 196, 244, 89, 54, 52, 206, 2, 178, 103, 54, 34, 119, 240, 168, 64, 202, 116, 188, 61, 26, 98, 54, 149, 44, 94, 215, 170, 248, 168, 254, 203, 221, 250, 117, 132, 230, 151, 140, 234, 93, 42, 91, 159, 183, 241, 180, 140, 139, 11, 229, 138, 48, 82, 2, 117, 77, 131, 118, 16, 115, 116, 121, 60, 240, 38, 170, 238, 83, 0, 114, 125, 131, 108, 215, 30, 113, 179, 69, 221, 178, 228, 68, 70, 255, 197, 185, 1, 99, 84, 19, 137, 13, 145, 14, 163, 128, 152, 74, 144, 25, 16, 49, 50, 63, 22, 219, 204, 157, 107, 225, 104, 184, 72, 133, 56, 76, 160, 62, 18, 96, 10, 193, 194, 72, 2, 138, 243, 114, 108, 201, 52, 99, 136, 46, 168, 192, 42, 171]);
50 plaintext: plaintext,
63 plaintext: plaintext,
76 plaintext: plaintext,
89 plaintext
[all...]
H A Drsa_pkcs_vectors.js18 // plaintext - the text to encrypt
24 // plaintext
25 var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210, 91, 248, 62, 90, 113, 37, 160, 140, 175, 231, 60, 62, 186, 196, 33, 119, 157, 249, 213, 93, 24, 12, 58, 233, 148, 38, 69, 225, 216, 47, 238, 140, 157, 41, 75, 60, 177, 160, 138, 153, 49, 32, 27, 60, 14, 129, 252, 71, 202, 207, 131, 21, 162, 175, 102, 50, 65, 19, 195, 182, 98, 48, 195, 70, 8, 196, 244, 89, 54, 52, 206, 2, 178, 103, 54, 34, 119, 240, 168, 64, 202, 116, 188, 61, 26, 98, 54, 149, 44, 94, 215, 170, 248, 168, 254, 203, 221, 250, 117, 132, 230, 151, 140, 234, 93, 42, 91, 159, 183, 241, 180, 140, 139, 11, 229, 138, 48, 82, 2, 117, 77, 131, 118, 16, 115, 116, 121, 60, 240, 38, 170, 238, 83, 0, 114, 125, 131, 108, 215, 30, 113, 179, 69, 221, 178, 228, 68, 70, 255, 197, 185, 1, 99, 84, 19, 137, 13, 145, 14, 163, 128, 152, 74, 144, 25, 16, 49, 50, 63, 22, 219, 204, 157, 107, 225, 104, 184, 72, 133, 56, 76, 160, 62, 18, 96, 10, 193, 194, 72, 2, 138, 243, 114, 108, 201, 52, 99, 136, 46, 168, 192, 42, 171]);
46 plaintext: plaintext,
59 plaintext: plaintext,
72 plaintext: plaintext,
85 plaintext
[all...]
H A Dhmac.js19 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vector.plaintext)
46 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, signature, vector.plaintext)
65 // Check for successful verification even if plaintext is altered after call.
70 var plaintext = copyBuffer(vector.plaintext);
71 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, plaintext)
78 plaintext[0] = 255 - plaintext[0];
80 }, vector.name + " with altered plaintext after call");
84 }, "importVectorKeys step: " + vector.name + " with altered plaintext");
[all...]
H A Decdsa.js21 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, vector.plaintext)
49 var operation = subtle.verify(algorithm, vector.publicKey, signature, vector.plaintext)
68 // Check for successful verification even if plaintext is altered after call.
74 var plaintext = copyBuffer(vector.plaintext);
75 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, plaintext)
82 plaintext[0] = 255 - plaintext[0];
84 }, vector.name + " with altered plaintext after call");
88 }, "importVectorKeys step: " + vector.name + " with altered plaintext afte
[all...]
H A Drsa.js19 var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, vector.plaintext)
46 var operation = subtle.verify(vector.algorithm, vector.publicKey, signature, vector.plaintext)
65 // Check for successful verification even if plaintext is altered after call.
70 var plaintext = copyBuffer(vector.plaintext);
71 var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, plaintext)
78 plaintext[0] = 255 - plaintext[0];
80 }, vector.name + " with altered plaintext after call");
84 }, "importVectorKeys step: " + vector.name + " with altered plaintext afte
[all...]
/third_party/node/test/parallel/
H A Dtest-crypto-cipher-decipher.js24 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!';
27 // Encrypt plaintext which is in utf8 format
29 let ciph = cipher.update(plaintext, 'utf8', 'hex');
37 assert.strictEqual(txt, plaintext);
44 cStream.end(plaintext);
51 assert.strictEqual(txt, plaintext);
58 const plaintext =
64 // Encrypt plaintext which is in utf8 format to a ciphertext which will be in
66 let ciph = cipher.update(plaintext, 'utf8', 'base64');
73 assert.strictEqual(txt, plaintext);
[all...]
H A Dtest-crypto-padding-aes256.js49 let plaintext = '0123456789abcdef0123456789abcdef'; // Multiple of block size
50 let encrypted = encrypt(plaintext, false);
52 assert.strictEqual(decrypted, plaintext);
57 plaintext = '0123456789abcdef0123456789abcde'; // not a multiple
58 encrypted = encrypt(plaintext, true);
60 assert.strictEqual(decrypted, plaintext);
H A Dtest-crypto-cipheriv-decipheriv.js11 const plaintext =
16 let ciph = cipher.update(plaintext, 'utf8', 'hex');
23 assert.strictEqual(txt, plaintext,
31 cStream.end(plaintext);
38 assert.strictEqual(txt, plaintext,
45 const plaintext =
50 let ciph = cipher.update(plaintext, 'utf8', 'buffer');
57 assert.strictEqual(txt, plaintext,
65 const plaintext = Buffer.from('00112233445566778899AABBCCDDEEFF', 'hex');
68 let ciph = cipher.update(plaintext, 'utf
[all...]
H A Dtest-crypto-binary-default.js464 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!';
467 // Encrypt plaintext which is in utf8 format
469 let ciph = cipher.update(plaintext, 'utf8', 'hex');
477 assert.strictEqual(txt, plaintext);
484 const plaintext =
490 // Encrypt plaintext which is in utf8 format
492 let ciph = cipher.update(plaintext, 'utf8', 'base64');
499 assert.strictEqual(txt, plaintext);
505 const plaintext =
510 let ciph = cipher.update(plaintext, 'utf
[all...]
/third_party/protobuf/src/google/protobuf/stubs/
H A Dstrutil_unittest.cc85 const char* plaintext; member
345 const char* plaintext; member
448 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST()
450 StringPiece plaintext(base64_tests[i].plaintext, in TEST()
491 EXPECT_EQ(plaintext, decode_str); in TEST()
495 Base64Escape(string(base64_tests[i].plaintext, in TEST()
504 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
522 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST()
533 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, in TEST()
[all...]
/third_party/mbedtls/tests/src/drivers/
H A Dtest_driver_aead.c31 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt()
49 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
58 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt()
69 (void) plaintext; in mbedtls_test_transparent_aead_encrypt()
88 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt()
106 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
115 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt()
127 (void) plaintext; in mbedtls_test_transparent_aead_decrypt()
380 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify()
399 plaintext, in mbedtls_test_transparent_aead_verify()
25 mbedtls_test_transparent_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_test_transparent_aead_encrypt() argument
81 mbedtls_test_transparent_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_test_transparent_aead_decrypt() argument
378 mbedtls_test_transparent_aead_verify( mbedtls_transparent_test_driver_aead_operation_t *operation, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length, const uint8_t *tag, size_t tag_length) mbedtls_test_transparent_aead_verify() argument
[all...]
/third_party/openssl/test/
H A Digetest.c32 static unsigned char plaintext[BIG_TEST_SIZE]; variable
232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec()
238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec()
250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining()
252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining()
260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining()
272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining()
274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining()
286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining()
302 AES_ige_encrypt(plaintext, ciphertex in test_ige_garble_forwards()
[all...]
/third_party/python/Lib/test/
H A Dtest_uu.py16 plaintext = b"The symbols on top of your keyboard are !@#$%^&*()_+|~\n" variable
62 inp = io.BytesIO(plaintext)
66 inp = io.BytesIO(plaintext)
70 inp = io.BytesIO(plaintext)
83 self.assertEqual(out.getvalue(), plaintext)
91 self.assertEqual(out.getvalue(), plaintext)
127 plaintext = b"\x33" # 00110011
134 self.assertEqual(out.getvalue(), plaintext)
139 self.assertEqual(decoded, plaintext)
143 inp = io.BytesIO(plaintext)
[all...]
/third_party/node/deps/openssl/openssl/crypto/camellia/
H A Dcmll_local.h33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[],
38 u8 plaintext[]);
39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[],
42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
/third_party/openssl/crypto/camellia/
H A Dcmll_local.h33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[],
38 u8 plaintext[]);
39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[],
42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
/third_party/libwebsockets/lib/misc/
H A Dbase64-decode.c214 static const char * const plaintext[] = {
242 for (test = 0; test < (int)LWS_ARRAY_SIZE(plaintext); test++) {
245 n = lws_b64_encode_string(plaintext[test],
246 strlen(plaintext[test]), buf, sizeof buf);
255 if (n != strlen(plaintext[test]) ||
256 strcmp(buf, plaintext[test])) {
259 test, buf, plaintext[test], n,
260 strlen(plaintext[test]));

Completed in 9 milliseconds

1234