/openssl/test/ |
H A D | igetest.c | 227 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_dec() local 245 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_enc_chaining() local 267 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_dec_chaining() local 293 unsigned char ciphertext[BIG_TEST_SIZE]; in test_ige_garble_forwards() local 306 ++ciphertext[sizeof(ciphertext) / 2]; in test_ige_garble_forwards() 331 unsigned char ciphertext[BIG_TEST_SIZE]; in test_bi_ige_enc_dec() local 352 unsigned char ciphertext[BIG_TEST_SIZE]; in test_bi_ige_garble1() local 364 ++ciphertext[sizeof(ciphertext) / 2]; in test_bi_ige_garble1() 383 unsigned char ciphertext[BIG_TEST_SIZE]; in test_bi_ige_garble2() local 395 ++ciphertext[sizeof(ciphertext) - 1]; in test_bi_ige_garble2() [all …]
|
H A D | modes_internal_test.c | 195 unsigned char cleartext[64], ciphertext[64], vector[64]; in execute_cts128() local 204 if (!TEST_size_t_eq(fixture->encrypt_block(test_input, ciphertext, len, in execute_cts128() 207 || !TEST_mem_eq(ciphertext, len, vector, len) in execute_cts128() 213 size = fixture->decrypt_block(ciphertext, cleartext, len, in execute_cts128() 223 if (!TEST_size_t_eq(fixture->encrypt_stream(test_input, ciphertext, len, in execute_cts128() 227 || !TEST_mem_eq(ciphertext, len, vector, len) in execute_cts128() 233 if (!TEST_size_t_eq(fixture->decrypt_stream(ciphertext, cleartext, len, in execute_cts128()
|
H A D | tls13encryptiontest.c | 30 const char *ciphertext[3]; member 286 refd = multihexstr2buf(recd->ciphertext, &refdatalen); in test_record()
|
H A D | evp_extra_test.c | 1654 unsigned char ciphertext[32], plaintext[16]; in test_EVP_Enveloped() local 1681 ciphertext, ciphertext_len)) in test_EVP_Enveloped() 2386 uint8_t ciphertext[128]; in test_EVP_SM2() local 2387 size_t ctext_len = sizeof(ciphertext); in test_EVP_SM2() 3441 unsigned char ciphertext[80]; in test_decrypt_null_chunks() local 3479 ciphertext + dec_offset, in test_decrypt_null_chunks() 3740 unsigned char ciphertext[32], oiv[16], iv[16]; in test_evp_iv_aes() local 3766 int len = sizeof(ciphertext); in test_evp_iv_aes() 3849 || !TEST_true(EVP_EncryptFinal_ex(ctx, ciphertext, &len))) in test_evp_iv_aes() 3897 unsigned char ciphertext[32], oiv[8], iv[8]; in test_evp_iv_des() local [all …]
|
/openssl/crypto/camellia/ |
H A D | cmll_local.h | 35 u8 ciphertext[]); 36 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 40 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 41 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
H A D | camellia.c | 405 u8 ciphertext[]) in Camellia_EncryptBlock_Rounds() argument 443 PUTU32(ciphertext, s2); in Camellia_EncryptBlock_Rounds() 444 PUTU32(ciphertext + 4, s3); in Camellia_EncryptBlock_Rounds() 445 PUTU32(ciphertext + 8, s0); in Camellia_EncryptBlock_Rounds() 446 PUTU32(ciphertext + 12, s1); in Camellia_EncryptBlock_Rounds() 453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 463 s0 = GETU32(ciphertext) ^ k[0]; in Camellia_DecryptBlock_Rounds() 464 s1 = GETU32(ciphertext + 4) ^ k[1]; in Camellia_DecryptBlock_Rounds() 465 s2 = GETU32(ciphertext + 8) ^ k[2]; in Camellia_DecryptBlock_Rounds() 466 s3 = GETU32(ciphertext + 12) ^ k[3]; in Camellia_DecryptBlock_Rounds() [all …]
|
/openssl/doc/man7/ |
H A D | des_modes.pod | 31 The same plaintext block always produces the same ciphertext block 36 An error will only affect one ciphertext block. 54 The CBC mode produces the same ciphertext whenever the same 59 The chaining operation makes the ciphertext blocks dependent on the 66 enciphering to the same ciphertext. 70 An error will affect the current and the following ciphertext blocks. 86 The CFB mode produces the same ciphertext whenever the same 98 enciphering to the same ciphertext. 133 The OFB mode produces the same ciphertext whenever the same 146 plaintext enciphering to the same ciphertext, by producing different [all …]
|
H A D | EVP_CIPHER-SM4.pod | 46 of the blocksize but is larger than one block. In that case ciphertext
|
H A D | EVP_CIPHER-AES.pod | 76 of the blocksize but is larger than one block. In that case ciphertext
|
/openssl/include/crypto/ |
H A D | aes_platform.h | 130 …_t aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 132 …_t aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 134 …_t aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 136 size_t aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaint… 138 size_t aes_gcm_dec_192_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaint… 140 size_t aes_gcm_dec_256_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaint… 142 …r3_aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 144 …r3_aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 146 …r3_aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphertext, 148 size_t unroll8_eor3_aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, ui… [all …]
|
H A D | sm2.h | 80 const uint8_t *ciphertext, size_t ciphertext_len,
|
/openssl/doc/man3/ |
H A D | RSA_public_encrypt.pod | 29 session key) using the public key B<rsa> and stores the ciphertext in 59 RSA_public_encrypt() will include some random bytes into the ciphertext 60 and therefore the ciphertext will be different each time, even if the 62 The returned ciphertext in B<to> will always be zero padded to exactly 69 bytes are in the ciphertext. Those are not important and may be removed, 100 key and provided ciphertext so that application code doesn't have to implement
|
H A D | OSSL_HPKE_CTX_new.pod | 270 I<aad> of size I<aadlen>, and returns the ciphertext I<ct> of size I<ctlen>. 319 OSSL_HPKE_open() is used by the recipient to decrypt the ciphertext I<ct> of 325 a little smaller than the ciphertext input. 431 way for the caller to know by how much ciphertext will be longer than a 433 so there is a small amount of ciphertext expansion.)
|
H A D | EVP_PKEY_encapsulate.pod | 34 The ciphertext in I<wrappedkey> is its encapsulated form, which can be sent
|
H A D | DES_random_key.pod | 146 (cleartext) is encrypted in to the I<output> (ciphertext) using the 149 ciphertext) is decrypted into the I<output> (now cleartext). Input 166 the I<input> argument into the ciphertext pointed to by the I<output>
|
H A D | EVP_aes_128_gcm.pod | 147 SP 800-38E. The XTS (XEX-based tweaked-codebook mode with ciphertext stealing)
|
H A D | EVP_EncryptInit.pod | 716 Gets 1 if the cipher algorithm I<cipher> uses ciphertext stealing, 867 the previous ciphertext block for CBC mode or the iteratively encrypted IV 990 written to the same location in the output buffer that the ciphertext payload 1452 For CCM mode, the total plaintext or ciphertext length B<MUST> be passed to 1688 The ciphertext from the above example can be decrypted using the B<openssl> 1750 Encryption using AES-CBC with a 256-bit key with "CS1" ciphertext stealing. 1757 * For ciphertext stealing mode the length of the ciphertext "out" will be
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_rsa_common.txt | 266 # Corrupted ciphertext 274 # Corrupted ciphertext 349 # OAEP padding, corrupted ciphertext 502 # ciphertext, decrypts to a random 11 byte long synthetic 511 # ciphertext, decrypts to a random 11 byte long synthetic 520 # ciphertext, decrypts to a random 11 byte long synthetic 626 # positive test case with null padded ciphertext 631 # positive test case with null truncated ciphertext 636 # positive test case with double null padded ciphertext 751 # a positive test case with null padded ciphertext [all …]
|
H A D | evpciph_camellia.txt | 17 # CAMELLIA-bits-ECB:key::plaintext:ciphertext:encdec 120 # CAMELLIA-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 213 # CAMELLIA-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec 419 # CAMELLIA-bits-OFB:key:IV/output':plaintext:ciphertext:encdec
|
H A D | evpciph_aes_cts.txt | 41 # Manually edited using the same inputs to also produce CS1 ciphertext 156 # Manually edited using the same inputs to also produce CS2 ciphertext
|
H A D | evpciph_camellia_cts.txt | 29 # The ciphertext result also contains a MAC result so this was also manually stripped from the test…
|
H A D | evpciph_aes_common.txt | 76 # AES-bits-ECB:key::plaintext:ciphertext:encdec 180 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 286 # AES-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec 486 # AES-bits-CFB:key:IV/output':plaintext:ciphertext:encdec 1191 # Exercise different lengths covering even ciphertext stealing cases
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1010 // x0 -> input ciphertext 1012 // x2 = size of ciphertext and plaintext in bytes (assumed a multiple of 16) 1014 // x4 -> 128-bit initialisation vector (or preceding 128-bit block of ciphertext if continuing af… 1018 // Initialisation vector overwritten with last quadword of ciphertext 1471 // x1 -> output ciphertext 1477 // Output ciphertext filled in 1855 // Penultimate plaintext block produces final ciphertext part-block 1856 // plus remaining part of final plaintext block. Move ciphertext part 1857 // to final position and reuse penultimate ciphertext block buffer to 1868 // Finally encrypt the penultimate ciphertext block using the
|
/openssl/crypto/sm2/ |
H A D | sm2_crypt.c | 277 const uint8_t *ciphertext, size_t ciphertext_len, in ossl_sm2_decrypt() argument 305 sm2_ctext = d2i_SM2_Ciphertext(NULL, &ciphertext, ciphertext_len); in ossl_sm2_decrypt()
|
/openssl/doc/man1/ |
H A D | openssl-enc.pod.in | 279 ciphertext when encrypting, and must again be explicitly provided when decrypting. 280 Conversely, when the B<-S> option is used during decryption, the ciphertext 285 then be read from the ciphertext. 286 To generate ciphertext that can be decrypted with OpenSSL 1.1.1 do not use
|