| /src/crypto/external/bsd/openssl.old/dist/test/ |
| rsa_mp_test.c | 191 unsigned char ctext[256]; local 208 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 213 num = RSA_private_decrypt(num, ctext, ptext, key, RSA_PKCS1_PADDING);
|
| rsa_test.c | 215 static int rsa_setkey(RSA** key, unsigned char *ctext, int idx) 223 clen = key1(*key, ctext); 226 clen = key2(*key, ctext); 229 clen = key3(*key, ctext); 242 unsigned char ctext[256]; local 253 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, en_pad_type); 257 num = RSA_private_decrypt(num, ctext, ptext, key, de_pad_type);
|
| sm2_internal_test.c | 151 uint8_t *ctext = NULL; local 173 ctext = OPENSSL_zalloc(ctext_len); 174 if (!TEST_ptr(ctext)) 179 ctext, &ctext_len))) { 185 if (!TEST_mem_eq(ctext, ctext_len, expected, ctext_len)) 188 if (!TEST_true(sm2_plaintext_size(ctext, ctext_len, &ptext_len)) 194 || !TEST_true(sm2_decrypt(key, digest, ctext, ctext_len, recovered, &recovered_len)) 203 OPENSSL_free(ctext);
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| rsa_mp_test.c | 247 unsigned char ctext[256]; local 269 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 274 num = RSA_private_decrypt(num, ctext, ptext, key, RSA_PKCS1_PADDING);
|
| rsa_test.c | 190 static int rsa_setkey(RSA **key, unsigned char *ctext, int idx) 198 clen = key1(*key, ctext); 201 clen = key2(*key, ctext); 204 clen = key3(*key, ctext); 217 unsigned char ctext[256]; local 228 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, en_pad_type); 232 num = RSA_private_decrypt(num, ctext, ptext, key, de_pad_type);
|
| sm2_internal_test.c | 146 uint8_t *ctext = NULL; local 169 ctext = OPENSSL_zalloc(ctext_len); 170 if (!TEST_ptr(ctext)) 176 ctext, &ctext_len))) { 182 if (!TEST_mem_eq(ctext, ctext_len, expected, ctext_len)) 185 if (!TEST_true(ossl_sm2_plaintext_size(ctext, ctext_len, &ptext_len)) 191 || !TEST_true(ossl_sm2_decrypt(key, digest, ctext, ctext_len, 201 OPENSSL_free(ctext);
|
| /src/crypto/external/bsd/openssl/dist/test/ |
| rsa_mp_test.c | 255 unsigned char ctext[256]; local 277 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, 282 num = RSA_private_decrypt(num, ctext, ptext, key, RSA_PKCS1_PADDING);
|
| rsa_test.c | 214 static int rsa_setkey(RSA** key, unsigned char *ctext, int idx) 222 clen = key1(*key, ctext); 225 clen = key2(*key, ctext); 228 clen = key3(*key, ctext); 241 unsigned char ctext[256]; local 252 num = RSA_public_encrypt(plen, ptext_ex, ctext, key, en_pad_type); 256 num = RSA_private_decrypt(num, ctext, ptext, key, de_pad_type);
|
| sm2_internal_test.c | 147 uint8_t *ctext = NULL; local 170 ctext = OPENSSL_zalloc(ctext_len); 171 if (!TEST_ptr(ctext)) 177 ctext, &ctext_len))) { 183 if (!TEST_mem_eq(ctext, ctext_len, expected, ctext_len)) 186 if (!TEST_true(ossl_sm2_plaintext_size(ctext, ctext_len, &ptext_len)) 192 || !TEST_true(ossl_sm2_decrypt(key, digest, ctext, ctext_len, 202 OPENSSL_free(ctext);
|
| /src/crypto/external/apache2/openssl/dist/providers/implementations/keymgmt/ |
| ml_kem_kmgmt.c | 76 unsigned char *ctext = NULL; local 105 ctext = OPENSSL_malloc(v->ctext_bytes); 106 if (ctext == NULL) 116 operation_result = ossl_ml_kem_encap_rand(ctext, v->ctext_bytes, 120 operation_result = ossl_ml_kem_encap_seed(ctext, v->ctext_bytes, 129 OSSL_SELF_TEST_oncorrupt_byte(st, ctext); 132 operation_result = ossl_ml_kem_decap(out, sizeof(out), ctext, v->ctext_bytes, 149 OPENSSL_free(ctext);
|
| /src/games/adventure/ |
| init.c | 81 struct text ctext[CLSMAX]; /* classes of adventurer */ variable in typeref:struct:text
|