| /src/crypto/external/bsd/openssh/dist/ |
| bcrypt_pbkdf.c | 72 u_int8_t ciphertext[BCRYPT_HASHSIZE] = local 90 cdata[i] = Blowfish_stream2word(ciphertext, sizeof(ciphertext), 104 memset(ciphertext, 0, sizeof(ciphertext));
|
| kexmlkem768x25519.c | 142 /* generate ECDH key pair, store server pubkey after ciphertext */ 192 const u_char *ciphertext, *server_pub; local 208 ciphertext = sshbuf_ptr(server_blob); 209 server_pub = ciphertext + crypto_kem_mlkem768_CIPHERTEXTBYTES; 217 memcpy(mlkem_ciphertext.value, ciphertext,
|
| kexsntrup761x25519.c | 85 u_char *kem_key, *ciphertext, *server_pub; local 123 if ((r = sshbuf_reserve(server_blob, need, &ciphertext)) != 0) 126 crypto_kem_sntrup761_enc(ciphertext, kem_key, client_pub); 127 /* generate ECDH key pair, store server pubkey after ciphertext */ 128 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES; 138 dump_digest("server cipher text:", ciphertext, 170 const u_char *ciphertext, *server_pub; local 182 ciphertext = sshbuf_ptr(server_blob); 183 server_pub = ciphertext + crypto_kem_sntrup761_CIPHERTEXTBYTES; 185 dump_digest("server cipher text:", ciphertext, [all...] |
| /src/sys/external/isc/libsodium/dist/test/default/ |
| aead_aes256gcm.c | 3083 unsigned char *ciphertext; local 3135 ciphertext = (unsigned char *) sodium_malloc(ciphertext_len); 3150 ciphertext, ciphertext_len); 3155 crypto_aead_aes256gcm_encrypt(ciphertext, &found_ciphertext_len, 3160 if (memcmp(ciphertext, expected_ciphertext, ciphertext_len) != 0) { 3164 ciphertext, ciphertext_len); 3172 NULL, ciphertext, 3189 NULL, ciphertext, ciphertext_len, 3194 NULL, ciphertext, ciphertext_len, 3216 sodium_free(ciphertext); [all...] |
| /src/sys/external/isc/libsodium/src/ |
| sodium_selftest.c | 118 static const uint8_t ciphertext[] = { local 138 uint8_t inbuf[sizeof(ciphertext) + TESTALIGN]; 139 uint8_t outbuf[sizeof(ciphertext) + TESTALIGN]; 147 * (plaintext/ciphertext, associated data, nonce, and key), and 148 * the output (ciphertext/plaintext). 164 * Verify encryption produces the expected ciphertext. 191 if (outsize != sizeof(ciphertext)) { 196 outsize, sizeof(ciphertext)); 199 if (memcmp(outbuf + M, ciphertext, sizeof(ciphertext)) != 0) 361 static const uint8_t ciphertext[] = { local [all...] |
| /src/crypto/external/apache2/openssl/dist/test/ |
| ml_kem_internal_test.c | 104 uint8_t *ciphertext = NULL; local 130 ciphertext = OPENSSL_malloc(v->ctext_bytes); 131 if (encoded_public_key == NULL || ciphertext == NULL) 145 /* Check that we got the expected 'rho' value in the ciphertext */ 167 if (!ossl_ml_kem_encap_rand(ciphertext, v->ctext_bytes, 173 /* Check the ciphertext hash */ 174 if (!TEST_true(EVP_Digest(ciphertext, v->ctext_bytes, 187 /* Now decapsulate the ciphertext */ 190 ciphertext, v->ctext_bytes, private_key)) 199 /* Now a quick negative test by zeroing the ciphertext */ [all...] |
| igetest.c | 227 unsigned char ciphertext[BIG_TEST_SIZE]; local 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 245 unsigned char ciphertext[BIG_TEST_SIZE]; local 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 267 unsigned char ciphertext[BIG_TEST_SIZE]; local 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 275 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2 293 unsigned char ciphertext[BIG_TEST_SIZE]; local 331 unsigned char ciphertext[BIG_TEST_SIZE]; local 352 unsigned char ciphertext[BIG_TEST_SIZE]; local 383 unsigned char ciphertext[BIG_TEST_SIZE]; local 414 unsigned char ciphertext[BIG_TEST_SIZE]; local [all...] |
| tls13encryptiontest.c | 30 const char *ciphertext[3]; member in struct:__anon774 260 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
|
| modes_internal_test.c | 196 unsigned char cleartext[64], ciphertext[64], vector[64]; local 205 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len, 209 || !TEST_mem_eq(ciphertext, len, vector, len) 215 size = fixture->decrypt_block(ciphertext, cleartext, len, 225 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len, 229 || !TEST_mem_eq(ciphertext, len, vector, len) 235 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
|
| evp_extra_test.c | 1770 unsigned char ciphertext[32], plaintext[16]; local 1787 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 1789 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 1797 ciphertext, ciphertext_len)) 2567 uint8_t ciphertext[128]; local 2568 size_t ctext_len = sizeof(ciphertext); 2701 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, 2711 if (!TEST_int_gt(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, 4073 unsigned char ciphertext[80]; local 4084 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg 4372 unsigned char ciphertext[32], oiv[16], iv[16]; local 4523 unsigned char ciphertext[32], oiv[8], iv[8]; local 6504 unsigned char *ciphertext, *exp_plaintext, *tag; local [all...] |
| evp_test.c | 891 unsigned char *ciphertext; member in struct:cipher_data_st 991 OPENSSL_free(cdat->ciphertext); 1022 if (strcmp(keyword, "Ciphertext") == 0) 1023 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len); 1107 expected_out = expected->ciphertext; 1110 in = expected->ciphertext; 2147 /* Ciphertext */ 2148 unsigned char *ciphertext; member in struct:kem_data_st 2182 OPENSSL_free(kdata->ciphertext); 2208 if (strcmp(keyword, "Ciphertext") == 0 [all...] |
| /src/lib/libcrypt/ |
| bcrypt.c | 67 #define BCRYPT_BLOCKS 6 /* Ciphertext blocks */ 216 u_int8_t ciphertext[4 * BCRYPT_BLOCKS] = "OrpheanBeholderScryDoubt"; local 285 cdata[i] = Blowfish_stream2word(ciphertext, 4 * BCRYPT_BLOCKS, &j); 292 ciphertext[4 * i + 3] = cdata[i] & 0xff; 294 ciphertext[4 * i + 2] = cdata[i] & 0xff; 296 ciphertext[4 * i + 1] = cdata[i] & 0xff; 298 ciphertext[4 * i + 0] = cdata[i] & 0xff; 312 encode_base64((u_int8_t *) encrypted + strlen(encrypted), ciphertext,
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| igetest.c | 227 unsigned char ciphertext[BIG_TEST_SIZE]; local 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 236 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 245 unsigned char ciphertext[BIG_TEST_SIZE]; local 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 253 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 258 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 267 unsigned char ciphertext[BIG_TEST_SIZE]; local 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 275 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2 293 unsigned char ciphertext[BIG_TEST_SIZE]; local 331 unsigned char ciphertext[BIG_TEST_SIZE]; local 352 unsigned char ciphertext[BIG_TEST_SIZE]; local 383 unsigned char ciphertext[BIG_TEST_SIZE]; local 414 unsigned char ciphertext[BIG_TEST_SIZE]; local [all...] |
| tls13encryptiontest.c | 28 const char *ciphertext[3]; member in struct:__anon1782 283 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
|
| modes_internal_test.c | 194 unsigned char cleartext[64], ciphertext[64], vector[64]; local 203 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len, 206 || !TEST_mem_eq(ciphertext, len, vector, len) 212 size = fixture->decrypt_block(ciphertext, cleartext, len, 222 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len, 226 || !TEST_mem_eq(ciphertext, len, vector, len) 232 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
|
| evp_extra_test.c | 1299 unsigned char ciphertext[32], plaintext[16]; local 1316 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 1318 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 1326 ciphertext, ciphertext_len)) 2031 uint8_t ciphertext[128]; local 2032 size_t ctext_len = sizeof(ciphertext); 2165 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, 2175 if (!TEST_int_gt(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, 3022 unsigned char ciphertext[80]; local 3033 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg 3316 unsigned char ciphertext[32], oiv[16], iv[16]; local 3457 unsigned char ciphertext[32], oiv[8], iv[8]; local [all...] |
| evp_test.c | 533 unsigned char *ciphertext; member in struct:cipher_data_st 602 OPENSSL_free(cdat->ciphertext); 632 if (strcmp(keyword, "Ciphertext") == 0) 633 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len); 712 expected_out = expected->ciphertext; 715 in = expected->ciphertext;
|
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| igetest.c | 222 unsigned char ciphertext[BIG_TEST_SIZE]; local 227 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 231 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 240 unsigned char ciphertext[BIG_TEST_SIZE]; local 245 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 248 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 253 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 262 unsigned char ciphertext[BIG_TEST_SIZE]; local 267 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 270 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2 288 unsigned char ciphertext[BIG_TEST_SIZE]; local 326 unsigned char ciphertext[BIG_TEST_SIZE]; local 347 unsigned char ciphertext[BIG_TEST_SIZE]; local 378 unsigned char ciphertext[BIG_TEST_SIZE]; local 409 unsigned char ciphertext[BIG_TEST_SIZE]; local [all...] |
| tls13encryptiontest.c | 39 const char *ciphertext[3]; member in struct:__anon2290 294 refd = multihexstr2buf(recd->ciphertext, &refdatalen);
|
| evp_extra_test.c | 966 unsigned char ciphertext[32], plaintext[16]; local 974 || !TEST_true(EVP_SealUpdate(ctx, ciphertext, &ciphertext_len, 976 || !TEST_true(EVP_SealFinal(ctx, ciphertext + ciphertext_len, 984 ciphertext, ciphertext_len)) 1276 uint8_t ciphertext[128]; local 1277 size_t ctext_len = sizeof(ciphertext); 1363 if (!TEST_true(EVP_PKEY_encrypt(cctx, ciphertext, &ctext_len, kMsg, sizeof(kMsg)))) 1369 if (!TEST_true(EVP_PKEY_decrypt(cctx, plaintext, &ptext_len, ciphertext, ctext_len))) 1675 unsigned char ciphertext[80]; local 1685 || !TEST_true(EVP_EncryptUpdate(ctx, ciphertext, &ctlen, msg [all...] |
| modes_internal_test.c | 188 unsigned char cleartext[64], ciphertext[64], vector[64]; local 197 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len, 200 || !TEST_mem_eq(ciphertext, len, vector, len) 206 size = fixture->decrypt_block(ciphertext, cleartext, len, 216 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len, 220 || !TEST_mem_eq(ciphertext, len, vector, len) 226 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len,
|
| evp_test.c | 480 unsigned char *ciphertext; member in struct:cipher_data_st 527 OPENSSL_free(cdat->ciphertext); 544 if (strcmp(keyword, "Ciphertext") == 0) 545 return parse_bin(value, &cdat->ciphertext, &cdat->ciphertext_len); 590 expected_out = expected->ciphertext; 593 in = expected->ciphertext;
|
| /src/external/bsd/libfido2/dist/tools/ |
| largeblob.c | 359 decode(const struct blob *ciphertext, const struct blob *nonce, 377 if (ciphertext->len > UINT_MAX || 378 ciphertext->len > SIZE_MAX - 16 || 379 ciphertext->len < 16) 381 plaintext.len = ciphertext->len - 16; 390 ciphertext->ptr + ciphertext->len - 16) == 0) 399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr, 417 try_rp(const fido_credman_rk_t *rk, const struct blob *ciphertext, 424 decode(ciphertext, nonce, origsiz, cred) == 0 489 struct blob ciphertext, nonce; local [all...] |
| /src/external/bsd/libfido2/dist/src/ |
| largeblob.c | 19 fido_blob_t ciphertext; member in struct:largeblob 32 fido_blob_reset(&blob->ciphertext); 79 if (aes256_gcm_dec(key, &blob->nonce, aad, &blob->ciphertext, 142 &blob->ciphertext) < 0) { 289 case 1: /* ciphertext */ 290 if (fido_blob_decode(val, &blob->ciphertext) < 0 || 291 blob->ciphertext.len < LARGEBLOB_TAG_LENGTH) 322 if (fido_blob_is_empty(&blob->ciphertext) || 343 if ((argv[0] = fido_blob_encode(&blob->ciphertext)) == NULL ||
|
| /src/external/bsd/wpa/dist/src/crypto/ |
| crypto_module_tests.c | 423 char *ciphertext; member in struct:ecb_test_vector 482 hexstr2bin(tv->ciphertext, cipher, sizeof(cipher))) {
|