HomeSort by: relevance | last modified time | path
    Searched defs:ciphertext (Results 1 - 25 of 27) sorted by relevancy

1 2

  /src/crypto/external/bsd/openssh/dist/
bcrypt_pbkdf.c 72 u_int8_t ciphertext[BCRYPT_HASHSIZE] = local
90 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext),
104 memset(ciphertext, 0, sizeof(ciphertext));
kexmlkem768x25519.c 142 /* generate ECDH key pair, store server pubkey after ciphertext */
192 const u_char *ciphertext, *server_pub; local
208 ciphertext = sshbuf_ptr(server_blob);
209 server_pub = ciphertext + crypto_kem_mlkem768_CIPHERTEXTBYTES;
217 memcpy(mlkem_ciphertext.value, ciphertext,
kexsntrup761x25519.c 85 u_char *kem_key, *ciphertext, *server_pub; local
123 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0)
126 crypto_kem_sntrup761_enc(ciphertext, kem_key, client_pub);
127 /* generate ECDH key pair, store server pubkey after ciphertext */
128 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES;
138 dump_digest("server cipher text:", ciphertext,
170 const u_char *ciphertext, *server_pub; local
182 ciphertext = sshbuf_ptr(server_blob);
183 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES;
185 dump_digest("server cipher text:", ciphertext,
    [all...]
  /src/sys/external/isc/libsodium/dist/test/default/
aead_aes256gcm.c 3083 unsigned char *ciphertext; local
3135 ciphertext = (unsigned char *) sodium_malloc(ciphertext_len);
3150 ciphertext, ciphertext_len);
3155 crypto_aead_aes256gcm_encrypt(ciphertext, &found_ciphertext_len,
3160 if (memcmp(ciphertext, expected_ciphertext, ciphertext_len) != 0) {
3164 ciphertext, ciphertext_len);
3172 NULL, ciphertext,
3189 NULL, ciphertext, ciphertext_len,
3194 NULL, ciphertext, ciphertext_len,
3216 sodium_free(ciphertext);
    [all...]
  /src/sys/external/isc/libsodium/src/
sodium_selftest.c 118 static const uint8_t ciphertext[] = { local
138 uint8_t inbuf[sizeof(ciphertext) + TESTALIGN];
139 uint8_t outbuf[sizeof(ciphertext) + TESTALIGN];
147 * (plaintext/ciphertext, associated data, nonce, and key), and
148 * the output (ciphertext/plaintext).
164 * Verify encryption produces the expected ciphertext.
191 if (outsize != sizeof(ciphertext)) {
196 outsize, sizeof(ciphertext));
199 if (memcmp(outbuf + M, ciphertext, sizeof(ciphertext)) != 0)
361 static const uint8_t ciphertext[] = { local
    [all...]
  /src/crypto/external/apache2/openssl/dist/test/
ml_kem_internal_test.c 104 uint8_t *ciphertext = NULL; local
130 ciphertext = OPENSSL_malloc(v->ctext_bytes);
131 if (encoded_public_key == NULL || ciphertext == NULL)
145 /* Check that we got the expected 'rho' value in the ciphertext */
167 if (!ossl_ml_kem_encap_rand(ciphertext, v->ctext_bytes,
173 /* Check the ciphertext hash */
174 if (!TEST_true(EVP_Digest(ciphertext, v->ctext_bytes,
187 /* Now decapsulate the ciphertext */
190 ciphertext, v->ctext_bytes, private_key))
199 /* Now a quick negative test by zeroing the ciphertext */
    [all...]
igetest.c 227 unsigned char ciphertext[BIG_TEST_SIZE]; local
232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT);
236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
245 unsigned char ciphertext[BIG_TEST_SIZE]; local
250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2,
258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
267 unsigned char ciphertext[BIG_TEST_SIZE]; local
272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
275 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2
293 unsigned char ciphertext[BIG_TEST_SIZE]; local
331 unsigned char ciphertext[BIG_TEST_SIZE]; local
352 unsigned char ciphertext[BIG_TEST_SIZE]; local
383 unsigned char ciphertext[BIG_TEST_SIZE]; local
414 unsigned char ciphertext[BIG_TEST_SIZE]; local
    [all...]
tls13encryptiontest.c 30 const char *ciphertext[3]; member in struct:__anon774
260 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
modes_internal_test.c 196 unsigned char cleartext[64], ciphertext[64], vector[64]; local
205 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len,
209 || !TEST_mem_eq(ciphertext, len, vector, len)
215 size = fixture->decrypt_block(ciphertext, cleartext, len,
225 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len,
229 || !TEST_mem_eq(ciphertext, len, vector, len)
235 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
evp_extra_test.c 1770 unsigned char ciphertext[32], plaintext[16]; local
1787 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len,
1789 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len,
1797 ciphertext, ciphertext_len))
2567 uint8_t ciphertext[128]; local
2568 size_t ctext_len = sizeof(ciphertext);
2701 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg,
2711 if (!TEST_int_gt(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext,
4073 unsigned char ciphertext[80]; local
4084 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg
4372 unsigned char ciphertext[32], oiv[16], iv[16]; local
4523 unsigned char ciphertext[32], oiv[8], iv[8]; local
6504 unsigned char *ciphertext, *exp_plaintext, *tag; local
    [all...]
evp_test.c 891 unsigned char *ciphertext; member in struct:cipher_data_st
991 OPENSSL_free(cdat->ciphertext);
1022 if (strcmp(keyword, "Ciphertext") == 0)
1023 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len);
1107 expected_out = expected->ciphertext;
1110 in = expected->ciphertext;
2147 /* Ciphertext */
2148 unsigned char *ciphertext; member in struct:kem_data_st
2182 OPENSSL_free(kdata->ciphertext);
2208 if (strcmp(keyword, "Ciphertext") == 0
    [all...]
  /src/lib/libcrypt/
bcrypt.c 67 #define BCRYPT_BLOCKS 6 /* Ciphertext blocks */
216 u_int8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local
285 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j);
292 ciphertext[4 * i + 3] = cdata[i] & 0xff;
294 ciphertext[4 * i + 2] = cdata[i] & 0xff;
296 ciphertext[4 * i + 1] = cdata[i] & 0xff;
298 ciphertext[4 * i + 0] = cdata[i] & 0xff;
312 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext,
  /src/crypto/external/bsd/openssl/dist/test/
igetest.c 227 unsigned char ciphertext[BIG_TEST_SIZE]; local
232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT);
236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
245 unsigned char ciphertext[BIG_TEST_SIZE]; local
250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2,
258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
267 unsigned char ciphertext[BIG_TEST_SIZE]; local
272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
275 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2
293 unsigned char ciphertext[BIG_TEST_SIZE]; local
331 unsigned char ciphertext[BIG_TEST_SIZE]; local
352 unsigned char ciphertext[BIG_TEST_SIZE]; local
383 unsigned char ciphertext[BIG_TEST_SIZE]; local
414 unsigned char ciphertext[BIG_TEST_SIZE]; local
    [all...]
tls13encryptiontest.c 28 const char *ciphertext[3]; member in struct:__anon1782
283 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
modes_internal_test.c 194 unsigned char cleartext[64], ciphertext[64], vector[64]; local
203 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len,
206 || !TEST_mem_eq(ciphertext, len, vector, len)
212 size = fixture->decrypt_block(ciphertext, cleartext, len,
222 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len,
226 || !TEST_mem_eq(ciphertext, len, vector, len)
232 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
evp_extra_test.c 1299 unsigned char ciphertext[32], plaintext[16]; local
1316 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len,
1318 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len,
1326 ciphertext, ciphertext_len))
2031 uint8_t ciphertext[128]; local
2032 size_t ctext_len = sizeof(ciphertext);
2165 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg,
2175 if (!TEST_int_gt(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext,
3022 unsigned char ciphertext[80]; local
3033 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg
3316 unsigned char ciphertext[32], oiv[16], iv[16]; local
3457 unsigned char ciphertext[32], oiv[8], iv[8]; local
    [all...]
evp_test.c 533 unsigned char *ciphertext; member in struct:cipher_data_st
602 OPENSSL_free(cdat->ciphertext);
632 if (strcmp(keyword, "Ciphertext") == 0)
633 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len);
712 expected_out = expected->ciphertext;
715 in = expected->ciphertext;
  /src/crypto/external/bsd/openssl.old/dist/test/
igetest.c 222 unsigned char ciphertext[BIG_TEST_SIZE]; local
227 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT);
231 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
240 unsigned char ciphertext[BIG_TEST_SIZE]; local
245 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
248 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2,
253 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT);
262 unsigned char ciphertext[BIG_TEST_SIZE]; local
267 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv,
270 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2
288 unsigned char ciphertext[BIG_TEST_SIZE]; local
326 unsigned char ciphertext[BIG_TEST_SIZE]; local
347 unsigned char ciphertext[BIG_TEST_SIZE]; local
378 unsigned char ciphertext[BIG_TEST_SIZE]; local
409 unsigned char ciphertext[BIG_TEST_SIZE]; local
    [all...]
tls13encryptiontest.c 39 const char *ciphertext[3]; member in struct:__anon2290
294 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
evp_extra_test.c 966 unsigned char ciphertext[32], plaintext[16]; local
974 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len,
976 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len,
984 ciphertext, ciphertext_len))
1276 uint8_t ciphertext[128]; local
1277 size_t ctext_len = sizeof(ciphertext);
1363 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, sizeof(kMsg))))
1369 if (!TEST_true(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, ctext_len)))
1675 unsigned char ciphertext[80]; local
1685 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg
    [all...]
modes_internal_test.c 188 unsigned char cleartext[64], ciphertext[64], vector[64]; local
197 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len,
200 || !TEST_mem_eq(ciphertext, len, vector, len)
206 size = fixture->decrypt_block(ciphertext, cleartext, len,
216 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len,
220 || !TEST_mem_eq(ciphertext, len, vector, len)
226 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
evp_test.c 480 unsigned char *ciphertext; member in struct:cipher_data_st
527 OPENSSL_free(cdat->ciphertext);
544 if (strcmp(keyword, "Ciphertext") == 0)
545 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len);
590 expected_out = expected->ciphertext;
593 in = expected->ciphertext;
  /src/external/bsd/libfido2/dist/tools/
largeblob.c 359 decode(const struct blob *ciphertext, const struct blob *nonce,
377 if (ciphertext->len > UINT_MAX ||
378 ciphertext->len > SIZE_MAX - 16 ||
379 ciphertext->len < 16)
381 plaintext.len = ciphertext->len - 16;
390 ciphertext->ptr + ciphertext->len - 16) == 0)
399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr,
417 try_rp(const fido_credman_rk_t *rk, const struct blob *ciphertext,
424 decode(ciphertext, nonce, origsiz, cred) == 0
489 struct blob ciphertext, nonce; local
    [all...]
  /src/external/bsd/libfido2/dist/src/
largeblob.c 19 fido_blob_t ciphertext; member in struct:largeblob
32 fido_blob_reset(&blob->ciphertext);
79 if (aes256_gcm_dec(key, &blob->nonce, aad, &blob->ciphertext,
142 &blob->ciphertext) < 0) {
289 case 1: /* ciphertext */
290 if (fido_blob_decode(val, &blob->ciphertext) < 0 ||
291 blob->ciphertext.len < LARGEBLOB_TAG_LENGTH)
322 if (fido_blob_is_empty(&blob->ciphertext) ||
343 if ((argv[0] = fido_blob_encode(&blob->ciphertext)) == NULL ||
  /src/external/bsd/wpa/dist/src/crypto/
crypto_module_tests.c 423 char *ciphertext; member in struct:ecb_test_vector
482 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {

Completed in 58 milliseconds

1 2