Searched refs:ciphertext (Results 1 - 11 of 11) sorted by relevance

/external/openssl/crypto/evp/
H A Devp_test.c139 const unsigned char *ciphertext,int cn,
152 hexdump(stdout,"Ciphertext",ciphertext,cn);
191 if(memcmp(out,ciphertext,cn))
195 hexdump(stderr,"Expected",ciphertext,cn);
210 if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn))
247 const unsigned char *ciphertext,int cn,
256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec);
263 const unsigned char *ciphertext, unsigned int cn)
276 hexdump(stdout,"Digest",ciphertext,cn);
305 if(memcmp(md,ciphertext,c
136 test1(const EVP_CIPHER *c,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument
244 test_cipher(const char *cipher,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument
261 test_digest(const char *digest, const unsigned char *plaintext,int pn, const unsigned char *ciphertext, unsigned int cn) argument
369 unsigned char *iv,*key,*plaintext,*ciphertext; local
[all...]
/external/webkit/SunSpider/tests/sunspider-0.9/
H A Dcrypto-aes.js189 var ciphertext = new Array(blockCount); // ciphertext as array of strings
208 // ct is now ciphertext for this block
210 ciphertext[b] = escCtrlChars(ct); // escape troublesome characters in ciphertext
213 // convert the nonce to a string to go on the front of the ciphertext
219 return ctrTxt + '-' + ciphertext.join('-');
224 * Use AES to decrypt 'ciphertext' with 'password' using 'nBits' key, in Counter mode of operation
230 function AESDecryptCtr(ciphertext, password, nBits) {
242 ciphertext
[all...]
/external/webkit/SunSpider/tests/sunspider-0.9.1/
H A Dcrypto-aes.js189 var ciphertext = new Array(blockCount); // ciphertext as array of strings
208 // ct is now ciphertext for this block
210 ciphertext[b] = escCtrlChars(ct); // escape troublesome characters in ciphertext
213 // convert the nonce to a string to go on the front of the ciphertext
219 return ctrTxt + '-' + ciphertext.join('-');
224 * Use AES to decrypt 'ciphertext' with 'password' using 'nBits' key, in Counter mode of operation
230 function AESDecryptCtr(ciphertext, password, nBits) {
242 ciphertext
[all...]
/external/dropbear/libtomcrypt/demos/
H A Dencrypt.c97 unsigned char plaintext[512],ciphertext[512]; local
223 if ((errno = ctr_encrypt(inbuf,ciphertext,y,&ctr)) != CRYPT_OK) {
228 if (fwrite(ciphertext,1,y,fdout) != y) {
/external/openssl/include/openssl/
H A Dfips.h101 const unsigned char *ciphertext,
/external/dropbear/
H A Dkeyimport.c1264 char *ciphertext;
1329 ciphertext = (char *)key->keyblob + pos + 4;
1370 des3_decrypt_pubkey_ossh(keybuf, iv, (unsigned char *)ciphertext,
1389 len = GET_32BIT(ciphertext);
1394 ciphertext += 4;
1408 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &e);
1409 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &d);
1410 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &n);
1411 pos += sshcom_read_mpint(ciphertext+pos, cipherlen-pos, &u);
1412 pos += sshcom_read_mpint(ciphertext
[all...]
/external/dropbear/libtomcrypt/src/encauth/eax/
H A Deax_test.c39 ciphertext[MAXBLOCKSIZE],
55 /* ciphertext */
75 /* ciphertext */
95 /* ciphertext */
119 /* ciphertext */
146 /* ciphertext */
234 if (XMEMCMP(outct, tests[x].ciphertext, tests[x].msglen) || XMEMCMP(outtag, tests[x].tag, len)) {
/external/dropbear/libtomcrypt/src/ciphers/
H A Dkhazad.c677 static void khazad_crypt(const unsigned char *plaintext, unsigned char *ciphertext, argument
727 * map cipher state to ciphertext block (mu^{-1}):
729 ciphertext[0] = (unsigned char)(state >> 56);
730 ciphertext[1] = (unsigned char)(state >> 48);
731 ciphertext[2] = (unsigned char)(state >> 40);
732 ciphertext[3] = (unsigned char)(state >> 32);
733 ciphertext[4] = (unsigned char)(state >> 24);
734 ciphertext[5] = (unsigned char)(state >> 16);
735 ciphertext[6] = (unsigned char)(state >> 8);
736 ciphertext[
[all...]
H A Danubis.c1039 static void anubis_crypt(const unsigned char *plaintext, unsigned char *ciphertext, argument
1121 * map cipher state to ciphertext block (mu^{-1}):
1125 ciphertext[pos ] = (unsigned char)(w >> 24);
1126 ciphertext[pos + 1] = (unsigned char)(w >> 16);
1127 ciphertext[pos + 2] = (unsigned char)(w >> 8);
1128 ciphertext[pos + 3] = (unsigned char)(w );
1135 @param ct The output ciphertext (16 bytes)
1150 @param ct The input ciphertext (16 bytes)
/external/dropbear/libtomcrypt/
H A Dcrypt.tex446 \textit{ct}\footnote{ct stands for ciphertext.} is the output. For the decryption function it's the opposite. They both
840 by encrypting the last ciphertext block in ECB mode, and XOR'ing the output against the last partial block of plaintext. LibTomCrypt does not
910 and end up with the same ciphertext. However, encrypting \textit{ABC} and \textit{DABC} will result in different ciphertexts. All
939 were the last ciphertext block. In CFB mode, the IV is encrypted as if it were the prior encrypted pad. In CTR mode, the IV is encrypted without
989 buffer, /* ciphertext */
997 /* make use of ciphertext... */
1008 if ((err = ctr_decrypt( buffer, /* ciphertext */
1071 These will encrypt (or decrypt) the plaintext to the ciphertext buffer (or vice versa). The length is specified by \textit{len} in octets but must be a multiple
1169 The mode can then process plaintext producing ciphertext as well as compute a partial checksum. The actual checksum
1171 sized message block to send to the recipient as ciphertext
[all...]
/external/openssl/ssl/
H A Dkssl.c1277 new5ticket->enc_part.ciphertext.length =
1279 if ((new5ticket->enc_part.ciphertext.data =
1290 memcpy(new5ticket->enc_part.ciphertext.data,

Completed in 202 milliseconds