/crypto/ |
A D | impl_dispatch_test.cc | 117 const uint8_t kZeros[16] = {0}; in TEST_F() local 122 ASSERT_TRUE(EVP_AEAD_CTX_init(ctx.get(), EVP_aead_aes_128_gcm(), kZeros, in TEST_F() 123 sizeof(kZeros), in TEST_F() 126 ctx.get(), ciphertext, &ciphertext_len, sizeof(ciphertext), kZeros, in TEST_F() 140 static const uint8_t kZeros[16] = {0}; in TEST_F() local 141 AES_set_encrypt_key(kZeros, sizeof(kZeros) * 8, &key); in TEST_F() 147 static const uint8_t kZeros[16] = {0}; in TEST_F() local 148 AES_set_encrypt_key(kZeros, sizeof(kZeros) * 8, &key); in TEST_F()
|
/crypto/rand/ |
A D | rand_test.cc | 46 static const uint8_t kZeros[256] = {0}; in TEST() local 53 EXPECT_NE(Bytes(buf1), Bytes(kZeros)); in TEST() 54 EXPECT_NE(Bytes(buf2), Bytes(kZeros)); in TEST() 133 static const uint8_t kZeros[16] = {0}; in TEST() local 156 EXPECT_NE(Bytes(buf), Bytes(kZeros)); in TEST() 170 static const uint8_t kZeros[256] = {0}; in RunConcurrentRands() local 184 EXPECT_NE(Bytes(bufs[i]), Bytes(kZeros)); in RunConcurrentRands()
|
A D | getentropy_test.cc | 43 static const uint8_t kZeros[256] = {0}; in TEST() local 50 EXPECT_NE(Bytes(buf1), Bytes(kZeros)); in TEST() 51 EXPECT_NE(Bytes(buf2), Bytes(kZeros)); in TEST()
|
/crypto/rsa/ |
A D | rsa_test.cc | 717 static const uint8_t kZeros[32] = {0}; in TEST() local 719 ASSERT_TRUE(RSA_sign(NID_sha256, kZeros, sizeof(kZeros), sig.data(), &sig_len, in TEST() 721 EXPECT_TRUE(RSA_verify(NID_sha256, kZeros, sizeof(kZeros), sig.data(), in TEST() 1127 const uint8_t kZeros[32] = {0}; in TEST() local 1130 ASSERT_TRUE(RSA_sign(NID_sha256, kZeros, sizeof(kZeros), sig.data(), &len_u, in TEST() 1140 EXPECT_FALSE(RSA_sign(NID_sha256, kZeros, sizeof(kZeros), out.data(), &len_u, in TEST() 1155 EXPECT_FALSE(RSA_verify(NID_sha256, kZeros, sizeof(kZeros), sig.data(), in TEST()
|
/crypto/cipher/ |
A D | aead_test.cc | 698 static const uint8_t kZeros[EVP_AEAD_MAX_KEY_LENGTH] = {0}; in TEST_P() local 702 ASSERT_LE(ad_len, sizeof(kZeros)); in TEST_P() 711 ctx.get(), aead(), kZeros, EVP_AEAD_key_length(aead()), in TEST_P() 716 0, kZeros /* ad */, ad_len)); in TEST_P() 726 ctx.get(), aead(), kZeros, EVP_AEAD_key_length(aead()), in TEST_P() 729 nonce.data(), nonce.size(), kZeros /* in */, in TEST_P() 730 sizeof(kZeros), kZeros /* ad */, ad_len)); in TEST_P()
|
/crypto/fipsmodule/slhdsa/ |
A D | thash.cc.inc | 36 static const uint8_t kZeros[64 - BCM_SLHDSA_SHA2_128S_N] = {0}; 38 SHA256_Update(&sha256, kZeros, sizeof(kZeros));
|
/crypto/curve25519/ |
A D | x25519_test.cc | 155 static const uint8_t kZeros[32] = {0}; in TEST() local 156 EXPECT_EQ(Bytes(kZeros), Bytes(out)); in TEST()
|
A D | curve25519.cc | 2118 static const uint8_t kZeros[32] = {0}; in X25519() local 2122 CRYPTO_memcmp(kZeros, out_shared_key, 32)) != 0; in X25519()
|
/crypto/bytestring/ |
A D | bytestring_test.cc | 1267 static const uint8_t kZeros[256] = {0}; in TEST() local 1270 ASSERT_TRUE(CBB_add_bytes(&child, kZeros, sizeof(kZeros))); in TEST() 1283 ASSERT_FALSE(CBB_add_bytes(cbb.get(), kZeros, sizeof(kZeros))); in TEST()
|
/crypto/evp/ |
A D | evp_extra_test.cc | 799 static const uint8_t kZeros[32] = {0}; in TEST() local 801 EVP_PKEY_ED25519, nullptr, kZeros, sizeof(kZeros))); in TEST()
|
/crypto/ec/ |
A D | hash_to_curve.cc | 81 static const uint8_t kZeros[EVP_MAX_MD_BLOCK_SIZE] = {0}; in expand_message_xmd() local 88 !EVP_DigestUpdate(ctx.get(), kZeros, block_size) || in expand_message_xmd()
|
/crypto/asn1/ |
A D | asn1_test.cc | 871 static const uint8_t kZeros[64] = {0}; in TEST() local 872 ASSERT_TRUE(ASN1_STRING_set(val.get(), kZeros, sizeof(kZeros))); in TEST()
|