Searched defs:ciphertext (Results 1 - 11 of 11) sorted by relevance

/external/openssh/openbsd-compat/
H A Dbcrypt_pbkdf.c71 u_int8_t ciphertext[BCRYPT_HASHSIZE] = local
89 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext),
103 explicit_bzero(ciphertext, sizeof(ciphertext));
/external/boringssl/src/crypto/cipher/
H A Dcipher_test.cc110 const std::vector<uint8_t> &ciphertext,
116 out = &ciphertext;
118 in = &ciphertext;
204 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local
207 !t->GetBytes(&ciphertext, "Ciphertext")) {
241 ciphertext, aad, tag)) {
246 ciphertext, aad, tag)) {
104 TestOperation(FileTest *t, const EVP_CIPHER *cipher, bool encrypt, const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, const std::vector<uint8_t> &plaintext, const std::vector<uint8_t> &ciphertext, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &tag) argument
H A De_aes.c1605 const uint8_t *nonce, const uint8_t *ciphertext,
1624 SHA256_Update(&sha256, ciphertext, ciphertext_len);
1601 hmac_calculate(uint8_t out[SHA256_DIGEST_LENGTH], const SHA256_CTX *inner_init_state, const SHA256_CTX *outer_init_state, const uint8_t *ad, size_t ad_len, const uint8_t *nonce, const uint8_t *ciphertext, size_t ciphertext_len) argument
/external/boringssl/src/crypto/modes/
H A Dgcm_test.c65 const char *ciphertext; member in struct:test_case
316 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local
327 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num,
328 "ciphertext") ||
334 fprintf(stderr, "%u: plaintext and ciphertext have differing lengths.\n",
368 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) {
371 hexdump("want", ciphertext, plaintext_len);
380 if (ciphertext) {
[all...]
/external/srtp/crypto/include/
H A Dcipher.h63 direction_encrypt, /**< encryption (convert plaintext to ciphertext) */
64 direction_decrypt, /**< decryption (convert ciphertext to plaintext) */
120 * plaintext, and ciphertext values that are known to be correct for a
133 uint8_t *ciphertext; /* ciphertext */ member in struct:cipher_test_case_t
196 * an array of values of key/xtd_seq_num_t/plaintext/ciphertext
/external/srtp/srtp/
H A Dekt.c150 aes_decrypt_with_raw_key(void *ciphertext, const void *key) { argument
154 aes_decrypt(ciphertext, expanded_key);
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dcrypto_module_tests.c418 char *ciphertext; member in struct:ecb_test_vector
477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
/external/wpa_supplicant_8/src/crypto/
H A Dcrypto_module_tests.c418 char *ciphertext; member in struct:ecb_test_vector
477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dcrypto_module_tests.c418 char *ciphertext; member in struct:ecb_test_vector
477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
/external/libvncserver/libvncclient/
H A Drfbproto.c834 uint8_t userpass[128], ciphertext[128]; local
960 error = gcry_cipher_encrypt(aes, ciphertext, sizeof(ciphertext), userpass, sizeof(userpass));
967 if (!WriteToRFBServer(client, (char *)ciphertext, sizeof(ciphertext)))
/external/conscrypt/src/main/native/
H A Dorg_conscrypt_NativeCrypto.cpp1503 // from |ciphertext|. The ciphertext is expected to be padded using the scheme
1507 const char* ciphertext, size_t ciphertext_len) {
1521 memcpy(ciphertextBytes.get(), ciphertext, ciphertext_len);
1659 ALOGE("RSA ciphertext size mismatch, actual: %zd, expected <= %zd", cleartextBytes.size(),
1506 rsaDecryptWithPrivateKey(JNIEnv* env, jobject privateKey, jint padding, const char* ciphertext, size_t ciphertext_len) argument

Completed in 441 milliseconds