/external/chromium_org/v8/test/mjsunit/ |
H A D | regexp-not-sticky-yet.js | 42 var plain = /foobar/; variable 43 assertEquals("/foobar/", "" + plain);
|
/external/chromium_org/v8/test/mjsunit/harmony/ |
H A D | regexp-sticky.js | 35 var plain = /foobar/; variable 37 assertTrue(!!"foobar".match(plain)); 38 assertTrue(!!"..foobar".match(plain));
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 56 SaslMechanism::Base64Encode(const std::string & plain) { argument 57 return Base64::Encode(plain); 66 SaslMechanism::Base64EncodeFromArray(const char * plain, size_t length) { argument 68 Base64::EncodeFromArray(plain, length, &result);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 23 * @plain: Plaintext key, n * 64 bits 27 u8 *plain) 36 r = plain; 51 r = plain + (n - 1) * 8; 71 * These are already in @plain due to the location of temporary 26 aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, u8 *plain) argument
|
H A D | aes-wrap.c | 22 * @plain: Plaintext key to be wrapped, n * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 38 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-enc.c | 115 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 118 rijndaelEncrypt(ctx, rk[AES_PRIV_NR_POS], plain, crypt);
|
H A D | crypto_internal-rsa.c | 113 u8 *plain, size_t *plain_len) 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-ccm.c | 149 size_t M, const u8 *plain, size_t plain_len, 164 aes_ccm_auth(aes, plain, plain_len, x); 168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 202 aes_ccm_auth(aes, plain, crypt_len, x); 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-internal-dec.c | 150 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 153 rijndaelDecrypt(ctx, rk[AES_PRIV_NR_POS], crypt, plain);
|
H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_ 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 23 * @plain: Plaintext key, n * 64 bits 27 u8 *plain) 36 r = plain; 51 r = plain + (n - 1) * 8; 71 * These are already in @plain due to the location of temporary 26 aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, u8 *plain) argument
|
H A D | aes-wrap.c | 22 * @plain: Plaintext key to be wrapped, n * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 38 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-enc.c | 115 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 118 rijndaelEncrypt(ctx, rk[AES_PRIV_NR_POS], plain, crypt);
|
H A D | crypto_internal-rsa.c | 113 u8 *plain, size_t *plain_len) 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-ccm.c | 149 size_t M, const u8 *plain, size_t plain_len, 164 aes_ccm_auth(aes, plain, plain_len, x); 168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 202 aes_ccm_auth(aes, plain, crypt_len, x); 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-internal-dec.c | 150 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 153 rijndaelDecrypt(ctx, rk[AES_PRIV_NR_POS], crypt, plain);
|
H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_ 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-unwrap.c | 23 * @plain: Plaintext key, n * 64 bits 27 u8 *plain) 36 r = plain; 51 r = plain + (n - 1) * 8; 71 * These are already in @plain due to the location of temporary 26 aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, u8 *plain) argument
|
H A D | aes-wrap.c | 22 * @plain: Plaintext key to be wrapped, n * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 38 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-enc.c | 115 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 118 rijndaelEncrypt(ctx, rk[AES_PRIV_NR_POS], plain, crypt);
|
H A D | crypto_internal-rsa.c | 113 u8 *plain, size_t *plain_len) 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
/external/chromium_org/chrome/common/extensions/api/networking_private/ |
H A D | networking_private_crypto_unittest.cc | 15 // |plain| data. 17 const std::string& plain, 22 return decrypted == plain; 147 std::string plain; local 151 plain = kTestData; 153 public_key, plain, &encrypted_output)); 154 EXPECT_TRUE(VerifyByteString(kPrivateKey, plain, encrypted_output)); 157 plain = kEmptyData; 159 public_key, plain, &encrypted_output)); 16 VerifyByteString(const std::string& private_key_pem, const std::string& plain, const std::vector<uint8>& encrypted) argument
|
/external/openssl/crypto/rc2/ |
H A D | rc2test.c | 120 static unsigned char plain[CFB_TEST_SIZE]= variable 225 idea_cfb64_encrypt(plain,cfb_buf1,(long)12,&eks, 227 idea_cfb64_encrypt(&(plain[12]),&(cfb_buf1[12]), 244 if (memcmp(plain,cfb_buf2,CFB_TEST_SIZE) != 0)
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 136 u8 *plain, size_t *plain_len) 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 157 plain[0] != 0x00 || plain[1] != 0x01) { 163 pos = plain + 3; 165 if (plain[2] != 0xff) { 170 while (pos < plain + len && *pos == 0xff) 173 if (pos - plain - 2 < 8) { 180 if (pos + 16 /* min hash len */ >= plain + len || *pos != 0x00) { 186 len -= pos - plain; 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 136 u8 *plain, size_t *plain_len) 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 157 plain[0] != 0x00 || plain[1] != 0x01) { 163 pos = plain + 3; 165 if (plain[2] != 0xff) { 170 while (pos < plain + len && *pos == 0xff) 173 if (pos - plain - 2 < 8) { 180 if (pos + 16 /* min hash len */ >= plain + len || *pos != 0x00) { 186 len -= pos - plain; 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |