Home
last modified time | relevance | path

Searched refs:plaintext (Results 1 – 5 of 5) sorted by relevance

/optee_os-3.20.0/core/lib/libtomcrypt/src/encauth/eax/
A Deax_test.c30 plaintext[MAXBLOCKSIZE], in eax_test()
223 tests[x].plaintext, tests[x].msglen, outct, outtag, &len)) != CRYPT_OK) { in eax_test()
237 …if ((res != 1) || compare_testvector(outct, tests[x].msglen, tests[x].plaintext, tests[x].msglen, … in eax_test()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/library/
A Dccm.c473 unsigned char plaintext[CCM_SELFTEST_PT_MAX_LEN]; in mbedtls_ccm_self_test() local
494 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test()
496 memcpy( plaintext, msg_test_data, msg_len_test_data[i] ); in mbedtls_ccm_self_test()
501 plaintext, ciphertext, in mbedtls_ccm_self_test()
514 memset( plaintext, 0, CCM_SELFTEST_PT_MAX_LEN ); in mbedtls_ccm_self_test()
519 ciphertext, plaintext, in mbedtls_ccm_self_test()
524 memcmp( plaintext, msg_test_data, msg_len_test_data[i] ) != 0 ) in mbedtls_ccm_self_test()
/optee_os-3.20.0/core/lib/libtomcrypt/src/ciphers/
A Danubis.c1023 static void anubis_crypt(const unsigned char *plaintext, unsigned char *ciphertext, in anubis_crypt() argument
1035 (((ulong32)plaintext[pos ]) << 24) ^ in anubis_crypt()
1036 (((ulong32)plaintext[pos + 1]) << 16) ^ in anubis_crypt()
1037 (((ulong32)plaintext[pos + 2]) << 8) ^ in anubis_crypt()
1038 (((ulong32)plaintext[pos + 3]) ) ^ in anubis_crypt()
A Dkhazad.c665 static void khazad_crypt(const unsigned char *plaintext, unsigned char *ciphertext, in khazad_crypt() argument
674 ((ulong64)plaintext[0] << 56) ^ in khazad_crypt()
675 ((ulong64)plaintext[1] << 48) ^ in khazad_crypt()
676 ((ulong64)plaintext[2] << 40) ^ in khazad_crypt()
677 ((ulong64)plaintext[3] << 32) ^ in khazad_crypt()
678 ((ulong64)plaintext[4] << 24) ^ in khazad_crypt()
679 ((ulong64)plaintext[5] << 16) ^ in khazad_crypt()
680 ((ulong64)plaintext[6] << 8) ^ in khazad_crypt()
681 ((ulong64)plaintext[7] ) ^ in khazad_crypt()
/optee_os-3.20.0/lib/libmbedtls/mbedtls/
A DChangeLog759 * Zeroising of plaintext buffers in mbedtls_ssl_read() to erase unused
857 plaintext after repeated timing measurements under some conditions.
1514 a plaintext for RSA PKCS#1 v1.5 decryption but only observe the timing
1737 partially recover the plaintext of messages under some conditions by
1751 plaintext of messages under some conditions by using a cache attack
1761 to partially recover the plaintext of messages under some conditions (see
1943 * Return the plaintext data more quickly on unpadded CBC decryption, as

Completed in 16 milliseconds