/third_party/node/test/fixtures/crypto/ |
H A D | rsa.js | 66 // overlong plaintext for RSA-OAEP 67 const plaintext = Buffer.from( 179 plaintext: plaintext.slice(0, 214), 192 plaintext: plaintext.slice(0, 190), 205 plaintext: plaintext.slice(0, 158), 218 plaintext: plaintext [all...] |
H A D | rsa_pss.js | 53 const plaintext = Buffer.from( 87 plaintext, 95 plaintext, 103 plaintext, 111 plaintext, 119 plaintext, 127 plaintext, 135 plaintext, 143 plaintext,
|
H A D | rsa_pkcs.js | 52 // plaintext 53 const plaintext = Buffer.from( 108 plaintext, 116 plaintext, 124 plaintext, 132 plaintext,
|
/third_party/node/test/fixtures/wpt/WebCryptoAPI/encrypt_decrypt/ |
H A D | rsa_vectors.js | 18 // plaintext - the text to encrypt 28 // overlong plaintext for RSA-OAEP 29 var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210, 91, 248, 62, 90, 113, 37, 160, 140, 175, 231, 60, 62, 186, 196, 33, 119, 157, 249, 213, 93, 24, 12, 58, 233, 148, 38, 69, 225, 216, 47, 238, 140, 157, 41, 75, 60, 177, 160, 138, 153, 49, 32, 27, 60, 14, 129, 252, 71, 202, 207, 131, 21, 162, 175, 102, 50, 65, 19, 195, 182, 98, 48, 195, 70, 8, 196, 244, 89, 54, 52, 206, 2, 178, 103, 54, 34, 119, 240, 168, 64, 202, 116, 188, 61, 26, 98, 54, 149, 44, 94, 215, 170, 248, 168, 254, 203, 221, 250, 117, 132, 230, 151, 140, 234, 93, 42, 91, 159, 183, 241, 180, 140, 139, 11, 229, 138, 48, 82, 2, 117, 77, 131, 118, 16, 115, 116, 121, 60, 240, 38, 170, 238, 83, 0, 114, 125, 131, 108, 215, 30, 113, 179, 69, 221, 178, 228, 68, 70, 255, 197, 185, 1, 99, 84, 19, 137, 13, 145, 14, 163, 128, 152, 74, 144, 25, 16, 49, 50, 63, 22, 219, 204, 157, 107, 225, 104, 184, 72, 133, 56, 76, 160, 62, 18, 96, 10, 193, 194, 72, 2, 138, 243, 114, 108, 201, 52, 99, 136, 46, 168, 192, 42, 171]); 53 plaintext: plaintext.slice(0, 214), 66 plaintext: plaintext.slice(0, 190), 79 plaintext: plaintext.slice(0, 158), 92 plaintext [all...] |
H A D | rsa.js | 18 // Get a one byte longer plaintext to encrypt 25 .then(function(plaintext) { 26 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works")); 47 // Get a one byte longer plaintext to encrypt 55 .then(function(plaintext) { 56 assert_true(equalBuffers(plaintext, vector.plaintext, "Decryption works")); 81 .then(function(plaintext) { 106 // Get a one byte longer plaintext t [all...] |
H A D | aes_cbc_vectors.js | 12 // plaintext - the text to encrypt 16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115, 210 plaintext: plaintext, 224 plaintext: plaintext, 236 plaintext: plaintext, 254 plaintext: plaintext, [all...] |
H A D | aes_ctr_vectors.js | 12 // plaintext - the text to encrypt 16 var plaintext = new Uint8Array([84, 104, 105, 115, 32, 115, 95 plaintext: plaintext, 108 plaintext: plaintext, 117 plaintext: plaintext,
|
H A D | aes_gcm_vectors.js | 11 // plaintext - the text to encrypt 15 plaintext, 41 plaintext: plaintext, 53 plaintext: plaintext, 69 plaintext: plaintext,
|
H A D | aes.js | 20 return subtle.encrypt(vector.algorithm, vector.key, vector.plaintext) 40 var plaintext = copyBuffer(vector.plaintext); 44 var operation = subtle.encrypt(vector.algorithm, vector.key, plaintext) 50 plaintext[0] = 255 - plaintext[0]; 52 }, vector.name + " with altered plaintext"); 58 }, "importKey step: " + vector.name + " with altered plaintext"); 71 assert_true(equalBuffers(result, vector.plaintext), "Should return expected result"); 95 assert_true(equalBuffers(result, vector.plaintext), "Shoul [all...] |
/third_party/node/test/fixtures/wpt/WebCryptoAPI/sign_verify/ |
H A D | rsa_pss_vectors.js | 18 // plaintext - the text to encrypt 24 // plaintext for RSA-PSS 25 var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210, 91, 248, 62, 90, 113, 37, 160, 140, 175, 231, 60, 62, 186, 196, 33, 119, 157, 249, 213, 93, 24, 12, 58, 233, 148, 38, 69, 225, 216, 47, 238, 140, 157, 41, 75, 60, 177, 160, 138, 153, 49, 32, 27, 60, 14, 129, 252, 71, 202, 207, 131, 21, 162, 175, 102, 50, 65, 19, 195, 182, 98, 48, 195, 70, 8, 196, 244, 89, 54, 52, 206, 2, 178, 103, 54, 34, 119, 240, 168, 64, 202, 116, 188, 61, 26, 98, 54, 149, 44, 94, 215, 170, 248, 168, 254, 203, 221, 250, 117, 132, 230, 151, 140, 234, 93, 42, 91, 159, 183, 241, 180, 140, 139, 11, 229, 138, 48, 82, 2, 117, 77, 131, 118, 16, 115, 116, 121, 60, 240, 38, 170, 238, 83, 0, 114, 125, 131, 108, 215, 30, 113, 179, 69, 221, 178, 228, 68, 70, 255, 197, 185, 1, 99, 84, 19, 137, 13, 145, 14, 163, 128, 152, 74, 144, 25, 16, 49, 50, 63, 22, 219, 204, 157, 107, 225, 104, 184, 72, 133, 56, 76, 160, 62, 18, 96, 10, 193, 194, 72, 2, 138, 243, 114, 108, 201, 52, 99, 136, 46, 168, 192, 42, 171]); 50 plaintext: plaintext, 63 plaintext: plaintext, 76 plaintext: plaintext, 89 plaintext [all...] |
H A D | rsa_pkcs_vectors.js | 18 // plaintext - the text to encrypt 24 // plaintext 25 var plaintext = new Uint8Array([95, 77, 186, 79, 50, 12, 12, 232, 118, 114, 90, 252, 229, 251, 210, 91, 248, 62, 90, 113, 37, 160, 140, 175, 231, 60, 62, 186, 196, 33, 119, 157, 249, 213, 93, 24, 12, 58, 233, 148, 38, 69, 225, 216, 47, 238, 140, 157, 41, 75, 60, 177, 160, 138, 153, 49, 32, 27, 60, 14, 129, 252, 71, 202, 207, 131, 21, 162, 175, 102, 50, 65, 19, 195, 182, 98, 48, 195, 70, 8, 196, 244, 89, 54, 52, 206, 2, 178, 103, 54, 34, 119, 240, 168, 64, 202, 116, 188, 61, 26, 98, 54, 149, 44, 94, 215, 170, 248, 168, 254, 203, 221, 250, 117, 132, 230, 151, 140, 234, 93, 42, 91, 159, 183, 241, 180, 140, 139, 11, 229, 138, 48, 82, 2, 117, 77, 131, 118, 16, 115, 116, 121, 60, 240, 38, 170, 238, 83, 0, 114, 125, 131, 108, 215, 30, 113, 179, 69, 221, 178, 228, 68, 70, 255, 197, 185, 1, 99, 84, 19, 137, 13, 145, 14, 163, 128, 152, 74, 144, 25, 16, 49, 50, 63, 22, 219, 204, 157, 107, 225, 104, 184, 72, 133, 56, 76, 160, 62, 18, 96, 10, 193, 194, 72, 2, 138, 243, 114, 108, 201, 52, 99, 136, 46, 168, 192, 42, 171]); 46 plaintext: plaintext, 59 plaintext: plaintext, 72 plaintext: plaintext, 85 plaintext [all...] |
H A D | hmac.js | 19 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, vector.plaintext) 46 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, signature, vector.plaintext) 65 // Check for successful verification even if plaintext is altered after call. 70 var plaintext = copyBuffer(vector.plaintext); 71 var operation = subtle.verify({name: "HMAC", hash: vector.hash}, vector.key, vector.signature, plaintext) 78 plaintext[0] = 255 - plaintext[0]; 80 }, vector.name + " with altered plaintext after call"); 84 }, "importVectorKeys step: " + vector.name + " with altered plaintext"); [all...] |
H A D | ecdsa.js | 21 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, vector.plaintext) 49 var operation = subtle.verify(algorithm, vector.publicKey, signature, vector.plaintext) 68 // Check for successful verification even if plaintext is altered after call. 74 var plaintext = copyBuffer(vector.plaintext); 75 var operation = subtle.verify(algorithm, vector.publicKey, vector.signature, plaintext) 82 plaintext[0] = 255 - plaintext[0]; 84 }, vector.name + " with altered plaintext after call"); 88 }, "importVectorKeys step: " + vector.name + " with altered plaintext afte [all...] |
H A D | rsa.js | 19 var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, vector.plaintext) 46 var operation = subtle.verify(vector.algorithm, vector.publicKey, signature, vector.plaintext) 65 // Check for successful verification even if plaintext is altered after call. 70 var plaintext = copyBuffer(vector.plaintext); 71 var operation = subtle.verify(vector.algorithm, vector.publicKey, vector.signature, plaintext) 78 plaintext[0] = 255 - plaintext[0]; 80 }, vector.name + " with altered plaintext after call"); 84 }, "importVectorKeys step: " + vector.name + " with altered plaintext afte [all...] |
/third_party/node/test/parallel/ |
H A D | test-crypto-cipher-decipher.js | 24 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!'; 27 // Encrypt plaintext which is in utf8 format 29 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 37 assert.strictEqual(txt, plaintext); 44 cStream.end(plaintext); 51 assert.strictEqual(txt, plaintext); 58 const plaintext = 64 // Encrypt plaintext which is in utf8 format to a ciphertext which will be in 66 let ciph = cipher.update(plaintext, 'utf8', 'base64'); 73 assert.strictEqual(txt, plaintext); [all...] |
H A D | test-crypto-padding-aes256.js | 49 let plaintext = '0123456789abcdef0123456789abcdef'; // Multiple of block size 50 let encrypted = encrypt(plaintext, false); 52 assert.strictEqual(decrypted, plaintext); 57 plaintext = '0123456789abcdef0123456789abcde'; // not a multiple 58 encrypted = encrypt(plaintext, true); 60 assert.strictEqual(decrypted, plaintext);
|
H A D | test-crypto-cipheriv-decipheriv.js | 11 const plaintext = 16 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 23 assert.strictEqual(txt, plaintext, 31 cStream.end(plaintext); 38 assert.strictEqual(txt, plaintext, 45 const plaintext = 50 let ciph = cipher.update(plaintext, 'utf8', 'buffer'); 57 assert.strictEqual(txt, plaintext, 65 const plaintext = Buffer.from('00112233445566778899AABBCCDDEEFF', 'hex'); 68 let ciph = cipher.update(plaintext, 'utf [all...] |
H A D | test-crypto-binary-default.js | 464 const plaintext = 'Keep this a secret? No! Tell everyone about node.js!'; 467 // Encrypt plaintext which is in utf8 format 469 let ciph = cipher.update(plaintext, 'utf8', 'hex'); 477 assert.strictEqual(txt, plaintext); 484 const plaintext = 490 // Encrypt plaintext which is in utf8 format 492 let ciph = cipher.update(plaintext, 'utf8', 'base64'); 499 assert.strictEqual(txt, plaintext); 505 const plaintext = 510 let ciph = cipher.update(plaintext, 'utf [all...] |
/third_party/protobuf/src/google/protobuf/stubs/ |
H A D | strutil_unittest.cc | 85 const char* plaintext; member 345 const char* plaintext; member 448 reinterpret_cast<const unsigned char*>(base64_tests[i].plaintext); in TEST() 450 StringPiece plaintext(base64_tests[i].plaintext, in TEST() 491 EXPECT_EQ(plaintext, decode_str); in TEST() 495 Base64Escape(string(base64_tests[i].plaintext, in TEST() 504 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 522 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, i); in TEST() 533 EXPECT_EQ_ARRAY(decoded.size(), decoded, base64_tests[i].plaintext, in TEST() [all...] |
/third_party/mbedtls/tests/src/drivers/ |
H A D | test_driver_aead.c | 31 const uint8_t *plaintext, size_t plaintext_length, in mbedtls_test_transparent_aead_encrypt() 49 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 58 plaintext, plaintext_length, in mbedtls_test_transparent_aead_encrypt() 69 (void) plaintext; in mbedtls_test_transparent_aead_encrypt() 88 uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) in mbedtls_test_transparent_aead_decrypt() 106 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 115 plaintext, plaintext_size, plaintext_length); in mbedtls_test_transparent_aead_decrypt() 127 (void) plaintext; in mbedtls_test_transparent_aead_decrypt() 380 uint8_t *plaintext, in mbedtls_test_transparent_aead_verify() 399 plaintext, in mbedtls_test_transparent_aead_verify() 25 mbedtls_test_transparent_aead_encrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *plaintext, size_t plaintext_length, uint8_t *ciphertext, size_t ciphertext_size, size_t *ciphertext_length) mbedtls_test_transparent_aead_encrypt() argument 81 mbedtls_test_transparent_aead_decrypt( const psa_key_attributes_t *attributes, const uint8_t *key_buffer, size_t key_buffer_size, psa_algorithm_t alg, const uint8_t *nonce, size_t nonce_length, const uint8_t *additional_data, size_t additional_data_length, const uint8_t *ciphertext, size_t ciphertext_length, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length) mbedtls_test_transparent_aead_decrypt() argument 378 mbedtls_test_transparent_aead_verify( mbedtls_transparent_test_driver_aead_operation_t *operation, uint8_t *plaintext, size_t plaintext_size, size_t *plaintext_length, const uint8_t *tag, size_t tag_length) mbedtls_test_transparent_aead_verify() argument [all...] |
/third_party/openssl/test/ |
H A D | igetest.c | 32 static unsigned char plaintext[BIG_TEST_SIZE]; variable 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); in test_ige_enc_dec() 238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_dec() 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_enc_chaining() 252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining() 260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_enc_chaining() 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, in test_ige_dec_chaining() 274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_dec_chaining() 286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); in test_ige_dec_chaining() 302 AES_ige_encrypt(plaintext, ciphertex in test_ige_garble_forwards() [all...] |
/third_party/python/Lib/test/ |
H A D | test_uu.py | 16 plaintext = b"The symbols on top of your keyboard are !@#$%^&*()_+|~\n" variable 62 inp = io.BytesIO(plaintext) 66 inp = io.BytesIO(plaintext) 70 inp = io.BytesIO(plaintext) 83 self.assertEqual(out.getvalue(), plaintext) 91 self.assertEqual(out.getvalue(), plaintext) 127 plaintext = b"\x33" # 00110011 134 self.assertEqual(out.getvalue(), plaintext) 139 self.assertEqual(decoded, plaintext) 143 inp = io.BytesIO(plaintext) [all...] |
/third_party/node/deps/openssl/openssl/crypto/camellia/ |
H A D | cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
/third_party/openssl/crypto/camellia/ |
H A D | cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
/third_party/libwebsockets/lib/misc/ |
H A D | base64-decode.c | 214 static const char * const plaintext[] = { 242 for (test = 0; test < (int)LWS_ARRAY_SIZE(plaintext); test++) { 245 n = lws_b64_encode_string(plaintext[test], 246 strlen(plaintext[test]), buf, sizeof buf); 255 if (n != strlen(plaintext[test]) || 256 strcmp(buf, plaintext[test])) { 259 test, buf, plaintext[test], n, 260 strlen(plaintext[test]));
|