Searched refs:ciphertext (Results 1 – 8 of 8) sorted by relevance
/optee_os-3.20.0/core/lib/libtomcrypt/src/stream/salsa20/ |
A D | xsalsa20_test.c | 40 unsigned char ciphertext[17]; in xsalsa20_test() 46 if ((err = salsa20_crypt(&st, msg, msglen, ciphertext)) != CRYPT_OK) return err; in xsalsa20_test() 50 if ((err = salsa20_crypt(&st, ciphertext, msglen, msg2)) != CRYPT_OK) return err; in xsalsa20_test() 57 …alsa20_memory(key, sizeof(key), 20, nonce, sizeof(nonce), msg, msglen, ciphertext)) != CRYPT_OK) … in xsalsa20_test() 58 …if ((err = xsalsa20_memory(key, sizeof(key), 20, nonce, sizeof(nonce), ciphertext, msglen, msg2)) … in xsalsa20_test()
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/ |
A D | ccm.c | 474 unsigned char ciphertext[CCM_SELFTEST_CT_MAX_LEN]; in mbedtls_ccm_self_test() local 495 memset( ciphertext, 0, CCM_SELFTEST_CT_MAX_LEN ); in mbedtls_ccm_self_test() 501 plaintext, ciphertext, in mbedtls_ccm_self_test() 502 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test() 506 memcmp( ciphertext, res_test_data[i], in mbedtls_ccm_self_test() 519 ciphertext, plaintext, in mbedtls_ccm_self_test() 520 ciphertext + msg_len_test_data[i], in mbedtls_ccm_self_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/eax/ |
A D | eax_test.c | 31 ciphertext[MAXBLOCKSIZE], in eax_test() 227 … compare_testvector(outct, tests[x].msglen, tests[x].ciphertext, tests[x].msglen, "EAX CT", x)) { in eax_test()
|
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/ |
A D | anubis.c | 1023 static void anubis_crypt(const unsigned char *plaintext, unsigned char *ciphertext, in anubis_crypt() argument 1109 ciphertext[pos ] = (unsigned char)(w >> 24); in anubis_crypt() 1110 ciphertext[pos + 1] = (unsigned char)(w >> 16); in anubis_crypt() 1111 ciphertext[pos + 2] = (unsigned char)(w >> 8); in anubis_crypt() 1112 ciphertext[pos + 3] = (unsigned char)(w ); in anubis_crypt()
|
A D | khazad.c | 665 static void khazad_crypt(const unsigned char *plaintext, unsigned char *ciphertext, in khazad_crypt() argument 717 ciphertext[0] = (unsigned char)(state >> 56); in khazad_crypt() 718 ciphertext[1] = (unsigned char)(state >> 48); in khazad_crypt() 719 ciphertext[2] = (unsigned char)(state >> 40); in khazad_crypt() 720 ciphertext[3] = (unsigned char)(state >> 32); in khazad_crypt() 721 ciphertext[4] = (unsigned char)(state >> 24); in khazad_crypt() 722 ciphertext[5] = (unsigned char)(state >> 16); in khazad_crypt() 723 ciphertext[6] = (unsigned char)(state >> 8); in khazad_crypt() 724 ciphertext[7] = (unsigned char)(state ); in khazad_crypt()
|
/optee_os-3.20.0/scripts/ |
A D | sign_encrypt.py | 399 self.ciphertext = out[:-TAG_SIZE] 520 self.ciphertext = self.inf[offs:-tag_len] 521 if len(self.ciphertext) != img_size: 524 .format(len(self.ciphertext), img_size)) 525 self.img = self.ciphertext 623 ciphertext = self.inf[offs:-tag_len] 626 .format(len(ciphertext), len(ciphertext))) 627 if len(ciphertext) != img_size: 630 .format(len(ciphertext), img_size)) 724 self.img = cipher.decrypt(self.nonce, self.ciphertext, None) [all …]
|
A D | sign_helper_kms.py | 86 def decrypt(self, ciphertext: bytes, padding: AsymmetricPadding) -> bytes:
|
/optee_os-3.20.0/lib/libmbedtls/mbedtls/ |
A D | ChangeLog | 138 man-in-the-middle to inject fake ciphertext into a DTLS connection. 555 these new functions always append the tag to the ciphertext, and include 556 the tag in the ciphertext length.
|
Completed in 17 milliseconds