| /src/crypto/external/bsd/openssl.old/dist/test/recipes/ |
| 20-test_enc_more.t | 25 my $plaintext = catfile(".", "testdatafile"); 41 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 48 my $cipherfile = "$plaintext.$ciphername.cipher"; 49 my $clearfile = "$plaintext.$ciphername.clear"; 52 ok(run(app([@common, "-e", "-in", $plaintext, "-out", $cipherfile])) 53 && compare_text($plaintext, $cipherfile) != 0 55 && compare_text($plaintext, $clearfile) == 0 61 unlink $plaintext;
|
| 70-test_sslcbcpadding.t | 94 # Size the plaintext so that 256 is a valid padding. 96 my $plaintext = "A" x $plaintext_len; 99 $data .= $plaintext; 121 $plaintext,
|
| /src/crypto/external/apache2/openssl/dist/crypto/camellia/ |
| cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
| camellia.c | 405 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 412 s0 = GETU32(plaintext) ^ k[0]; 413 s1 = GETU32(plaintext + 4) ^ k[1]; 414 s2 = GETU32(plaintext + 8) ^ k[2]; 415 s3 = GETU32(plaintext + 12) ^ k[3]; 451 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 455 plaintext, keyTable, ciphertext); 460 u8 plaintext[]) 498 PUTU32(plaintext, s2); 499 PUTU32(plaintext + 4, s3) [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/camellia/ |
| cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
| camellia.c | 403 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 410 s0 = GETU32(plaintext) ^ k[0]; 411 s1 = GETU32(plaintext + 4) ^ k[1]; 412 s2 = GETU32(plaintext + 8) ^ k[2]; 413 s3 = GETU32(plaintext + 12) ^ k[3]; 449 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 453 plaintext, keyTable, ciphertext); 458 u8 plaintext[]) 496 PUTU32(plaintext, s2); 497 PUTU32(plaintext + 4, s3) [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/camellia/ |
| cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
| camellia.c | 397 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 404 s0 = GETU32(plaintext) ^ k[0]; 405 s1 = GETU32(plaintext + 4) ^ k[1]; 406 s2 = GETU32(plaintext + 8) ^ k[2]; 407 s3 = GETU32(plaintext + 12) ^ k[3]; 443 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 447 plaintext, keyTable, ciphertext); 452 u8 plaintext[]) 490 PUTU32(plaintext, s2); 491 PUTU32(plaintext + 4, s3) [all...] |
| /src/crypto/external/bsd/heimdal/dist/lib/hcrypto/ |
| camellia-ntt.h | 53 const unsigned char *plaintext, 60 unsigned char *plaintext);
|
| /src/crypto/external/apache2/openssl/dist/test/recipes/ |
| 20-test_enc_more.t | 27 my $plaintext = catfile(".", "testdatafile"); 49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 56 my $cipherfile = "$plaintext.$ciphername.cipher"; 57 my $clearfile = "$plaintext.$ciphername.clear"; 60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile])) 61 && compare_text($plaintext, $cipherfile) != 0 63 && compare_text($plaintext, $clearfile) == 0
|
| 70-test_sslcbcpadding.t | 95 # Size the plaintext so that 256 is a valid padding. 97 my $plaintext = "A" x $plaintext_len; 100 $data .= $plaintext; 122 $plaintext,
|
| /src/crypto/external/bsd/openssl/dist/test/recipes/ |
| 20-test_enc_more.t | 27 my $plaintext = catfile(".", "testdatafile"); 49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 56 my $cipherfile = "$plaintext.$ciphername.cipher"; 57 my $clearfile = "$plaintext.$ciphername.clear"; 60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile])) 61 && compare_text($plaintext, $cipherfile) != 0 63 && compare_text($plaintext, $clearfile) == 0
|
| 70-test_sslcbcpadding.t | 96 # Size the plaintext so that 256 is a valid padding. 98 my $plaintext = "A" x $plaintext_len; 101 $data .= $plaintext; 123 $plaintext,
|
| /src/sys/crypto/camellia/ |
| camellia.h | 51 const unsigned char *plaintext, 58 unsigned char *plaintext);
|
| /src/external/gpl3/gcc/dist/gcc/jit/docs/_build/texinfo/ |
| Makefile | 7 MAKEINFO_plaintext = makeinfo --no-split --plaintext 15 plaintext: $(addsuffix .txt,$(ALLDOCS)) 57 .PHONY: all info plaintext html pdf install-info uninstall-info clean
|
| /src/external/gpl3/gcc.old/dist/gcc/jit/docs/_build/texinfo/ |
| Makefile | 7 MAKEINFO_plaintext = makeinfo --no-split --plaintext 15 plaintext: $(addsuffix .txt,$(ALLDOCS)) 57 .PHONY: all info plaintext html pdf install-info uninstall-info clean
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| igetest.c | 32 static unsigned char plaintext[BIG_TEST_SIZE]; variable 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, 260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, 286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| igetest.c | 32 static unsigned char plaintext[BIG_TEST_SIZE]; variable 232 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 238 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 250 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, 260 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 272 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 274 AES_ige_encrypt(plaintext + TEST_SIZE / 2, 286 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| igetest.c | 27 static unsigned char plaintext[BIG_TEST_SIZE]; variable 227 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 233 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 245 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 247 AES_ige_encrypt(plaintext + TEST_SIZE / 2, 255 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 267 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 269 AES_ige_encrypt(plaintext + TEST_SIZE / 2, 281 return TEST_mem_eq(checktext, TEST_SIZE, plaintext, TEST_SIZE); 297 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv [all...] |
| /src/sys/external/isc/libsodium/src/ |
| sodium_selftest.c | 87 static const uint8_t plaintext[] = { local 147 * (plaintext/ciphertext, associated data, nonce, and key), and 148 * the output (ciphertext/plaintext). 172 memcpy(inbuf + i, plaintext, sizeof(plaintext)); 179 inbuf + i, sizeof(plaintext), 209 * and produces the expected plaintext. 236 if (outsize != sizeof(plaintext)) { 241 outsize, sizeof(plaintext)); 244 if (memcmp(outbuf + M, plaintext, sizeof(plaintext)) != 0) 328 static const uint8_t plaintext[] = { local [all...] |
| /src/external/bsd/libfido2/dist/tools/ |
| largeblob.c | 351 decompress(const struct blob *plaintext, uint64_t origsiz) 353 if (try_decompress(plaintext, origsiz, MAX_WBITS) == 0) /* rfc1950 */ 355 return try_decompress(plaintext, origsiz, -MAX_WBITS); /* rfc1951 */ 365 struct blob plaintext; local 369 memset(&plaintext, 0, sizeof(plaintext)); 381 plaintext.len = ciphertext->len - 16; 382 if ((plaintext.ptr = calloc(1, plaintext.len)) == NULL) 399 EVP_Cipher(ctx, plaintext.ptr, ciphertext->ptr [all...] |
| /src/crypto/external/apache2/openssl/dist/include/crypto/ |
| aes_platform.h | 127 size_t aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 129 size_t aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 131 size_t aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 133 size_t aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 135 size_t aes_gcm_dec_192_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 137 size_t aes_gcm_dec_256_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 139 size_t unroll8_eor3_aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 141 size_t unroll8_eor3_aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 143 size_t unroll8_eor3_aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 145 size_t unroll8_eor3_aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, [all...] |
| /src/crypto/external/apache2/openssl/lib/libcrypto/arch/riscv64/ |
| aes-gcm-riscv64-zvkb-zvkg-zvkned.S | 47 #### Load plaintext into v24 and handle padding. We also load the init tag 193 # We already have the ciphertext/plaintext and ctr data for the first round. 214 # Store ciphertext/plaintext 220 # Store ciphertext/plaintext using mask 256 # Load plaintext into v24 371 # We already have the ciphertext/plaintext and ctr data for the first round. 408 # Store ciphertext/plaintext 414 # Store ciphertext/plaintext using mask 450 # Load plaintext into v24 581 # We already have the ciphertext/plaintext and ctr data for the first round [all...] |
| /src/external/bsd/libfido2/dist/src/ |
| largeblob.c | 67 fido_blob_t *plaintext = NULL, *aad = NULL; local 70 if ((plaintext = fido_blob_new()) == NULL || 80 plaintext) < 0) { 90 fido_blob_free(&plaintext); 92 return plaintext; 121 fido_blob_t *plaintext = NULL, *aad = NULL; local 124 if ((plaintext = fido_blob_new()) == NULL || 129 if (fido_compress(plaintext, body) != FIDO_OK) { 141 if (aes256_gcm_enc(key, &blob->nonce, aad, plaintext, 150 fido_blob_free(&plaintext); 362 fido_blob_t *plaintext = NULL; local [all...] |
| /src/crypto/external/bsd/openssl/dist/include/crypto/ |
| aes_platform.h | 110 size_t aes_gcm_enc_128_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 112 size_t aes_gcm_enc_192_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 114 size_t aes_gcm_enc_256_kernel(const uint8_t * plaintext, uint64_t plaintext_length, uint8_t * ciphertext, 116 size_t aes_gcm_dec_128_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 118 size_t aes_gcm_dec_192_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext, 120 size_t aes_gcm_dec_256_kernel(const uint8_t * ciphertext, uint64_t plaintext_length, uint8_t * plaintext,
|