Home
last modified time | relevance | path

Searched refs:ciphertext (Results 1 – 16 of 16) sorted by relevance

/ssl/test/runner/
A Dkey_agreement.go106 if len(ckx.ciphertext) < 2 {
110 ciphertextLen := int(ckx.ciphertext[0])<<8 | int(ckx.ciphertext[1])
114 ciphertext := ckx.ciphertext[2:]
553 ciphertext = t.transform(ciphertext)
775 if len(ckx.ciphertext) == 0 || int(ckx.ciphertext[0]) != len(ckx.ciphertext)-1 {
820 ckx.ciphertext = make([]byte, 1+len(ciphertext))
821 ckx.ciphertext[0] = byte(len(ciphertext))
822 copy(ckx.ciphertext[1:], ciphertext)
922 identityLen := (int(ckx.ciphertext[0]) << 8) | int(ckx.ciphertext[1])
939 newCkx.ciphertext = ckx.ciphertext[2+identityLen:]
[all …]
A Dshim_ticket.go112 ciphertext := out[len(name)+len(iv):]
113 cbc.CryptBlocks(ciphertext, ciphertext)
A Dticket.go214 ciphertext := encrypted[aes.BlockSize : len(encrypted)-sha256.Size]
215 plaintext := make([]byte, len(ciphertext))
216 cipher.NewCTR(block, iv).XORKeyStream(plaintext, ciphertext)
A Dhandshake_messages.go2400 ciphertext []byte member
2409 addUint24LengthPrefixedBytes(msg, m.ciphertext)
2423 m.ciphertext = data[4:]
A Dhandshake_server.go1011 ciphertext, ecdheSecret, err := kem.encap(config, peerKey)
1027 keyExchange: ciphertext,
1034 keyExchange: ciphertext,
/ssl/
A Dssl_key_share.cc80 Span<const uint8_t> ciphertext) override { in Decap() argument
92 if (ciphertext.empty() || ciphertext[0] != POINT_CONVERSION_UNCOMPRESSED || in Decap()
160 Span<const uint8_t> ciphertext) override { in Decap() argument
168 if (ciphertext.size() != 32 || // in Decap()
258 Span<const uint8_t> ciphertext) override { in Decap() argument
348 Span<const uint8_t> ciphertext) override { in Decap() argument
357 if (ciphertext.size() != in Decap()
406 uint8_t ciphertext[MLKEM1024_CIPHERTEXT_BYTES]; in Encap() local
408 if (!CBB_add_bytes(out_ciphertext, ciphertext, sizeof(ciphertext))) { in Encap()
416 Span<const uint8_t> ciphertext) override { in Decap() argument
[all …]
A Dextensions.cc2306 CBS ciphertext; in ssl_ext_key_share_parse_serverhello() local
2309 !CBS_get_u16_length_prefixed(contents, &ciphertext) || in ssl_ext_key_share_parse_serverhello()
2326 if (!key_share->Decap(out_secret, out_alert, ciphertext)) { in ssl_ext_key_share_parse_serverhello()
2415 CBB entry, ciphertext; in ssl_ext_key_share_add_serverhello() local
2419 !CBB_add_u16_length_prefixed(&entry, &ciphertext) || in ssl_ext_key_share_add_serverhello()
2420 !CBB_add_bytes(&ciphertext, hs->key_share_ciphertext.data(), in ssl_ext_key_share_add_serverhello()
4288 auto ciphertext = ticket.subspan(SSL_TICKET_KEY_NAME_LEN + iv_len); in decrypt_ticket_with_cipher_ctx() local
4291 if (!plaintext.CopyFrom(ciphertext)) { in decrypt_ticket_with_cipher_ctx()
4295 if (ciphertext.size() >= INT_MAX) { in decrypt_ticket_with_cipher_ctx()
4298 if (!plaintext.InitForOverwrite(ciphertext.size())) { in decrypt_ticket_with_cipher_ctx()
[all …]
A Dtls13_server.cc101 ScopedCBB ciphertext; in resolve_ecdhe_secret() local
104 !CBB_init(ciphertext.get(), 32) || in resolve_ecdhe_secret()
105 !key_share->Encap(ciphertext.get(), &secret, &alert, peer_key) || in resolve_ecdhe_secret()
106 !CBBFinishArray(ciphertext.get(), &hs->key_share_ciphertext)) { in resolve_ecdhe_secret()
A Dhandoff.cc1074 CBS ciphertext, secret; in SSL_set_handshake_hints() local
1077 !CBS_get_asn1(&key_share, &ciphertext, CBS_ASN1_OCTETSTRING) || in SSL_set_handshake_hints()
1078 !hints_obj->key_share_ciphertext.CopyFrom(ciphertext) || in SSL_set_handshake_hints()
A Dhandshake_server.cc1394 CBS ciphertext; in do_read_client_key_exchange() local
1395 if (!CBS_get_u8_length_prefixed(&client_key_exchange, &ciphertext) || in do_read_client_key_exchange()
1404 if (!hs->key_shares[0]->Decap(&premaster_secret, &alert, ciphertext)) { in do_read_client_key_exchange()
A Dinternal.h931 Span<const uint8_t> ciphertext) = 0;
A Dssl_test.cc3838 const uint8_t *ciphertext = ticket + 16 + 16; in GetServerTicketTime() local
3848 !EVP_DecryptUpdate(ctx.get(), plaintext.get(), &len1, ciphertext, in GetServerTicketTime()
/ssl/test/runner/kyber/
A Dkyber_test.go41 var ciphertext *[CiphertextSize]byte
65 ciphertext = priv.Encap(sharedSecret, &hashedEntropy)
67 priv.Decap(decapSharedSecret, ciphertext)
84 if !bytes.Equal(ciphertext[:], value) {
85 t.Errorf("bad 'ct' value on line %d:\nwant: %x\ncalc: %x", lineNo, value, ciphertext[:])
113 ciphertext := priv.Encap(sharedSecret[:], &encapEntropy)
114 h.Write(ciphertext[:])
118 priv.Decap(decapSharedSecret[:], ciphertext)
A Dkyber.go536 ciphertext := pub.encryptCPA(entropy, (*[32]byte)(prekeyAndRandomness[32:]))
537 ciphertextHash := sha3.Sum256(ciphertext[:])
540 return ciphertext
572 func (priv *PrivateKey) decryptCPA(ciphertext *[CiphertextSize]byte) [32]byte {
574 u.decode(ciphertext[:], du)
579 v.decode(ciphertext[compressedVectorSize:], dv)
592 func (priv *PrivateKey) Decap(outSharedSecret []byte, ciphertext *[CiphertextSize]byte) {
593 decrypted := priv.decryptCPA(ciphertext)
599 equal := subtle.ConstantTimeCompare(ciphertext[:], expectedCiphertext[:])
604 ciphertextHash := sha3.Sum256(ciphertext[:])
/ssl/test/runner/hpke/
A Dhpke_test.go59 ciphertext := senderContext.Seal(plaintext, nil)
60 decrypted, err := receiverContext.Open(ciphertext, nil)
160 ciphertext := senderContext.Seal(e.Plaintext, e.AdditionalData)
161 checkBytesEqual(t, "ciphertext", ciphertext, e.Ciphertext)
163 decrypted, err := receiverContext.Open(ciphertext, e.AdditionalData)
A Dhpke.go142 ciphertext := c.aead.Seal(nil, c.computeNonce(), plaintext, additionalData)
144 return ciphertext
147 func (c *Context) Open(ciphertext, additionalData []byte) ([]byte, error) {
148 plaintext, err := c.aead.Open(nil, c.computeNonce(), ciphertext, additionalData)

Completed in 94 milliseconds