/openssl/test/recipes/ |
H A D | 20-test_enc_more.t | 27 my $plaintext = catfile(".", "testdatafile"); 49 unless (ok(copy($testsrc, $plaintext), "Copying $testsrc to $plaintext")) { 56 my $cipherfile = "$plaintext.$ciphername.cipher"; 57 my $clearfile = "$plaintext.$ciphername.clear"; 60 ok(run(app([@common, @prov, "-e", "-in", $plaintext, "-out", $cipherfile])) 61 && compare_text($plaintext, $cipherfile) != 0 63 && compare_text($plaintext, $clearfile) == 0
|
H A D | 70-test_sslcbcpadding.t | 97 my $plaintext = "A" x $plaintext_len; 100 $data .= $plaintext; 122 $plaintext,
|
/openssl/test/ |
H A D | igetest.c | 32 static unsigned char plaintext[BIG_TEST_SIZE]; variable 252 AES_ige_encrypt(plaintext + TEST_SIZE / 2, in test_ige_enc_chaining() 302 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_ige_garble_forwards() 314 if (checktext[n] == plaintext[n]) in test_ige_garble_forwards() 360 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_bi_ige_garble1() 372 if (checktext[n] == plaintext[n]) in test_bi_ige_garble1() 391 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_bi_ige_garble2() 403 if (checktext[n] == plaintext[n]) in test_bi_ige_garble2() 422 AES_ige_encrypt(plaintext, ciphertext, sizeof(plaintext), &key, iv, in test_bi_ige_garble3() 434 if (checktext[n] == plaintext[n]) in test_bi_ige_garble3() [all …]
|
H A D | tls13encryptiontest.c | 29 const char *plaintext[3]; member 251 pt = multihexstr2buf(recd->plaintext, &ptlen); in load_record() 288 refd = multihexstr2buf(recd->plaintext, &refdatalen); in test_record()
|
H A D | evp_extra_test.c | 1654 unsigned char ciphertext[32], plaintext[16]; in test_EVP_Enveloped() local 1680 || !TEST_true(EVP_OpenUpdate(ctx, plaintext, &plaintext_len, in test_EVP_Enveloped() 1682 || !TEST_true(EVP_OpenFinal(ctx, plaintext + plaintext_len, &len))) in test_EVP_Enveloped() 1686 if (!TEST_mem_eq(msg, sizeof(msg), plaintext, plaintext_len)) in test_EVP_Enveloped() 2389 uint8_t plaintext[8]; in test_EVP_SM2() local 2390 size_t ptext_len = sizeof(plaintext); in test_EVP_SM2() 2553 if (!TEST_true(memcmp(plaintext, kMsg, sizeof(kMsg)) == 0)) in test_EVP_SM2() 3442 unsigned char plaintext[80]; in test_decrypt_null_chunks() local 3478 || !TEST_true(EVP_DecryptUpdate(ctx, plaintext + ptlen, &tmp, in test_decrypt_null_chunks() 3482 || !TEST_true(EVP_DecryptFinal(ctx, plaintext + ptlen, &tmp)) in test_decrypt_null_chunks() [all …]
|
/openssl/crypto/camellia/ |
H A D | cmll_local.h | 33 void Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], 38 u8 plaintext[]); 39 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], 42 const KEY_TABLE_TYPE keyTable, u8 plaintext[]);
|
H A D | camellia.c | 410 s0 = GETU32(plaintext) ^ k[0]; in Camellia_EncryptBlock_Rounds() 411 s1 = GETU32(plaintext + 4) ^ k[1]; in Camellia_EncryptBlock_Rounds() 412 s2 = GETU32(plaintext + 8) ^ k[2]; in Camellia_EncryptBlock_Rounds() 413 s3 = GETU32(plaintext + 12) ^ k[3]; in Camellia_EncryptBlock_Rounds() 449 void Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], in Camellia_EncryptBlock() argument 453 plaintext, keyTable, ciphertext); in Camellia_EncryptBlock() 458 u8 plaintext[]) in Camellia_DecryptBlock_Rounds() argument 496 PUTU32(plaintext, s2); in Camellia_DecryptBlock_Rounds() 497 PUTU32(plaintext + 4, s3); in Camellia_DecryptBlock_Rounds() 498 PUTU32(plaintext + 8, s0); in Camellia_DecryptBlock_Rounds() [all …]
|
/openssl/doc/man7/ |
H A D | des_modes.pod | 31 The same plaintext block always produces the same ciphertext block 55 plaintext is encrypted using the same key and starting variable. 65 The use of different starting variables prevents the same plaintext 87 plaintext is encrypted using the same key and starting variable. 97 The use of different starting variables prevents the same plaintext 108 the encipherment algorithm per unit of plaintext and thus cause 134 plaintext enciphered using the same key and starting variable. More 146 plaintext enciphering to the same ciphertext, by producing different 152 the encipherment algorithm per unit of plaintext and thus cause 163 only one bit to be in error in the deciphered plaintext. [all …]
|
H A D | OSSL_PROVIDER-base.pod | 53 the encoding output format. Either the DER, PEM and plaintext are
|
/openssl/include/crypto/ |
H A D | aes_platform.h | 130 size_t aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphert… 132 size_t aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphert… 134 size_t aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uint8_t *ciphert… 136 …_t aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 138 …_t aes_gcm_dec_192_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 140 …_t aes_gcm_dec_256_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, 142 size_t unroll8_eor3_aes_gcm_enc_128_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uin… 144 size_t unroll8_eor3_aes_gcm_enc_192_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uin… 146 size_t unroll8_eor3_aes_gcm_enc_256_kernel(const uint8_t *plaintext, uint64_t plaintext_length, uin… 148 …r3_aes_gcm_dec_128_kernel(const uint8_t *ciphertext, uint64_t plaintext_length, uint8_t *plaintext, [all …]
|
/openssl/doc/man3/ |
H A D | RSA_public_encrypt.pod | 61 plaintext and the public key are exactly identical. 67 private key B<rsa> and stores the plaintext in B<to>. B<flen> should 82 recovered plaintext. A return value of 0 is not an error and 83 means only that the plaintext was empty.
|
H A D | RSA_padding_add_PKCS1_type_1.pod | 130 plaintext and additionally some application specific consistency 131 checks on the plaintext need to be performed in constant time. 132 If the plaintext is rejected it must be kept secret which of the
|
H A D | SSL_CTX_set_record_padding_callback.pod | 60 The B<len> parameter is the current plaintext length of the record before encryption.
|
H A D | OSSL_HPKE_CTX_new.pod | 268 OSSL_HPKE_seal() takes the B<OSSL_HPKE_CTX> context I<ctx>, the plaintext 321 size I<aadlen>, to produce the plaintext I<pt> of size I<ptlen>. 324 I<ct> buffer will suffice - generally the plaintext output will be 432 plaintext of length I<clearlen>. (AEAD algorithms add a data integrity tag,
|
H A D | PEM_read.pod | 84 updated to indicate the plaintext length.
|
H A D | PKCS7_sign.pod | 46 detached signatures which are used in S/MIME plaintext signed messages for
|
H A D | SSL_CTX_set_options.pod | 139 By default TLS and QUIC SSL objects keep a copy of received plaintext 151 TLS connections do not buffer data to be sent in plaintext. QUIC stream 152 objects do buffer plaintext data to be sent and this option will also cause
|
/openssl/test/recipes/30-test_evp_data/ |
H A D | evppkey_sm2.txt | 62 # Test with an C1x and C1y valuey > 32 bytes in length, and longer plaintext (self generated) 66 Output = "Some longer plaintext for testing SM2 decryption. Blah blah blah blah blah blah blah blah…
|
H A D | evpciph_aes_common.txt | 76 # AES-bits-ECB:key::plaintext:ciphertext:encdec 180 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 210 # 128 bytes plaintext 218 # 1024 bytes plaintext 286 # AES-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec 486 # AES-bits-CFB:key:IV/output':plaintext:ciphertext:encdec 881 # 48 bytes plaintext 891 # 80 bytes plaintext 901 # 128 bytes plaintext 911 # 192 bytes plaintext, iv is chosen so that initial counter LSB is 0xFF [all …]
|
H A D | evppkey_rsa_common.txt | 485 # an otherwise correct plaintext, but with wrong first byte 486 # (0x01 instead of 0x00), generates a random 11 byte long plaintext 493 # an otherwise correct plaintext, but with wrong second byte 494 # (0x01 instead of 0x02), generates a random 11 byte long plaintext 503 # plaintext 512 # plaintext 521 # plaintext 530 # plaintext 538 # to random 11 byte long synthetic plaintext 810 # an otherwise valid plaintext, but with zero byte in first byte of padding [all …]
|
H A D | evpciph_camellia.txt | 17 # CAMELLIA-bits-ECB:key::plaintext:ciphertext:encdec 120 # CAMELLIA-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 213 # CAMELLIA-bits-CFB:key:IV/ciphertext':plaintext:ciphertext:encdec 419 # CAMELLIA-bits-OFB:key:IV/output':plaintext:ciphertext:encdec
|
H A D | evpciph_aes_wrap.txt | 50 # without returning any plaintext
|
H A D | evpciph_camellia_cts.txt | 30 # The random confounder is also prepended to the plaintext.
|
/openssl/crypto/aes/asm/ |
H A D | bsaes-armv8.pl | 1011 // x1 -> output plaintext 1012 // x2 = size of ciphertext and plaintext in bytes (assumed a multiple of 16) 1017 // Output plaintext filled in 1470 // x0 -> input plaintext 1473 // x3 -> key1 (used to encrypt the XORed plaintext blocks) 1855 // Penultimate plaintext block produces final ciphertext part-block 1856 // plus remaining part of final plaintext block. Move ciphertext part 1858 // construct final plaintext block
|
/openssl/providers/implementations/ciphers/ |
H A D | cipher_aes_ccm_hw_s390x.inc | 114 * En/de-crypt plain/cipher-text. Compute tag from plaintext. Returns 1 for
|