/external/openssh/openbsd-compat/ |
H A D | bcrypt_pbkdf.c | 71 u_int8_t ciphertext[BCRYPT_HASHSIZE] = local 89 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), 103 explicit_bzero(ciphertext, sizeof(ciphertext));
|
/external/boringssl/src/crypto/cipher/ |
H A D | cipher_test.cc | 110 const std::vector<uint8_t> &ciphertext, 116 out = &ciphertext; 118 in = &ciphertext; 204 std::vector<uint8_t> key, iv, plaintext, ciphertext, aad, tag; local 207 !t->GetBytes(&ciphertext, "Ciphertext")) { 241 ciphertext, aad, tag)) { 246 ciphertext, aad, tag)) { 104 TestOperation(FileTest *t, const EVP_CIPHER *cipher, bool encrypt, const std::vector<uint8_t> &key, const std::vector<uint8_t> &iv, const std::vector<uint8_t> &plaintext, const std::vector<uint8_t> &ciphertext, const std::vector<uint8_t> &aad, const std::vector<uint8_t> &tag) argument
|
H A D | e_aes.c | 1605 const uint8_t *nonce, const uint8_t *ciphertext, 1624 SHA256_Update(&sha256, ciphertext, ciphertext_len); 1601 hmac_calculate(uint8_t out[SHA256_DIGEST_LENGTH], const SHA256_CTX *inner_init_state, const SHA256_CTX *outer_init_state, const uint8_t *ad, size_t ad_len, const uint8_t *nonce, const uint8_t *ciphertext, size_t ciphertext_len) argument
|
/external/boringssl/src/crypto/modes/ |
H A D | gcm_test.c | 65 const char *ciphertext; member in struct:test_case 316 *nonce = NULL, *ciphertext = NULL, *tag = NULL, *out = NULL; local 327 !decode_hex(&ciphertext, &ciphertext_len, test->ciphertext, test_num, 328 "ciphertext") || 334 fprintf(stderr, "%u: plaintext and ciphertext have differing lengths.\n", 368 (ciphertext && memcmp(out, ciphertext, plaintext_len) != 0)) { 371 hexdump("want", ciphertext, plaintext_len); 380 if (ciphertext) { [all...] |
/external/srtp/crypto/include/ |
H A D | cipher.h | 63 direction_encrypt, /**< encryption (convert plaintext to ciphertext) */ 64 direction_decrypt, /**< decryption (convert ciphertext to plaintext) */ 120 * plaintext, and ciphertext values that are known to be correct for a 133 uint8_t *ciphertext; /* ciphertext */ member in struct:cipher_test_case_t 196 * an array of values of key/xtd_seq_num_t/plaintext/ciphertext
|
/external/srtp/srtp/ |
H A D | ekt.c | 150 aes_decrypt_with_raw_key(void *ciphertext, const void *key) { argument 154 aes_decrypt(ciphertext, expanded_key);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_module_tests.c | 418 char *ciphertext; member in struct:ecb_test_vector 477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_module_tests.c | 418 char *ciphertext; member in struct:ecb_test_vector 477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_module_tests.c | 418 char *ciphertext; member in struct:ecb_test_vector 477 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
|
/external/libvncserver/libvncclient/ |
H A D | rfbproto.c | 834 uint8_t userpass[128], ciphertext[128]; local 960 error = gcry_cipher_encrypt(aes, ciphertext, sizeof(ciphertext), userpass, sizeof(userpass)); 967 if (!WriteToRFBServer(client, (char *)ciphertext, sizeof(ciphertext)))
|
/external/conscrypt/src/main/native/ |
H A D | org_conscrypt_NativeCrypto.cpp | 1503 // from |ciphertext|. The ciphertext is expected to be padded using the scheme 1507 const char* ciphertext, size_t ciphertext_len) { 1521 memcpy(ciphertextBytes.get(), ciphertext, ciphertext_len); 1659 ALOGE("RSA ciphertext size mismatch, actual: %zd, expected <= %zd", cleartextBytes.size(), 1506 rsaDecryptWithPrivateKey(JNIEnv* env, jobject privateKey, jint padding, const char* ciphertext, size_t ciphertext_len) argument
|