/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | pubkey.h | 169 DecodingResult Decrypt(RandomNumberGenerator &rng, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs ¶meters = g_nullNameValuePairs) const; 176 void Encrypt(RandomNumberGenerator &rng, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs ¶meters = g_nullNameValuePairs) const; 941 virtual void SymmetricEncrypt(RandomNumberGenerator &rng, const byte *key, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs ¶meters) const =0; 942 virtual DecodingResult SymmetricDecrypt(const byte *key, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs ¶meters) const =0; 1184 DecodingResult Decrypt(RandomNumberGenerator &rng, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs ¶meters = g_nullNameValuePairs) const argument 1194 Element q = params.DecodeElement(ciphertext, true); 1196 ciphertext += elementSize; 1204 return encAlg.SymmetricDecrypt(derivedKey, ciphertext, ciphertextLength, plaintext, parameters); 1220 void Encrypt(RandomNumberGenerator &rng, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs ¶meters = g_nullNameValuePairs) const argument 1230 params.EncodeElement(true, q, ciphertext); [all...] |
H A D | cryptlib.h | 158 //! exception thrown by decryption filters when trying to decrypt an invalid ciphertext 661 virtual void EncryptAndAuthenticate(byte *ciphertext, byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *message, size_t messageLength); 663 virtual bool DecryptAndVerify(byte *message, const byte *mac, size_t macLength, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *ciphertext, size_t ciphertextLength); 1203 for querying their plaintext and ciphertext lengths. 1210 //! maximum length of plaintext for a given ciphertext length 1214 //! calculate length of ciphertext given length of plaintext 1222 //! return fixed ciphertext length, if one exists, otherwise return 0 1223 /*! \note "Fixed" here means length of ciphertext does not depend on length of plaintext. 1227 //! return maximum plaintext length given the fixed ciphertext length, if one exists, otherwise return 0 1249 \pre size of ciphertext 1283 FixedLengthDecrypt(RandomNumberGenerator &rng, const byte *ciphertext, byte *plaintext, const NameValuePairs ¶meters = g_nullNameValuePairs) const argument [all...] |
H A D | validat2.cpp | 166 SecByteBlock ciphertext(priv.CiphertextLength(messageLen)); 167 SecByteBlock plaintext(priv.MaxPlaintextLength(ciphertext.size())); 169 pub.Encrypt(GlobalRNG(), message, messageLen, ciphertext); local 170 fail = priv.Decrypt(GlobalRNG(), ciphertext, priv.CiphertextLength(messageLen), plaintext) != DecodingResult(messageLen);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/common/ |
H A D | cmm_aes.c | 346 unsigned char *ciphertext) 359 xor_128(round_key, data, ciphertext); 362 byte_sub(ciphertext, intermediatea); 364 xor_128(intermediateb, round_key, ciphertext); 367 byte_sub(ciphertext, intermediatea); 373 xor_128(intermediatea, round_key, ciphertext); 1207 u32 p_len, u8 * ciphertext) 1243 /* Output ciphertext */ 1244 NdisMoveMemory(ciphertext, A, 8); 1248 ciphertext[ 345 aes128k128d(unsigned char *key, unsigned char *data, unsigned char *ciphertext) argument 1205 AES_GTK_KEY_WRAP(u8 * key, u8 * plaintext, u32 p_len, u8 * ciphertext) argument 1267 AES_GTK_KEY_UNWRAP(u8 * key, u8 * plaintext, u32 c_len, u8 * ciphertext) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavutil/ |
H A D | blowfish.c | 485 /* ciphertext bytes -- left halves */ 496 /* ciphertext bytes -- right halves */ 512 /* ciphertext bytes */ 513 static const uint8_t ciphertext[8] = { variable 552 test_blowfish(&ctx, tmp, plaintext, ciphertext, 1, NULL, 0, "encryption"); 553 test_blowfish(&ctx, tmp, ciphertext, plaintext, 1, NULL, 1, "decryption"); 554 test_blowfish(&ctx, tmp, tmp, ciphertext, 1, NULL, 0, "Inplace encryption");
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | camellia.c | 1405 unsigned char *ciphertext) 1427 PUTU32(ciphertext, tmp[0]); 1428 PUTU32(ciphertext + 4, tmp[1]); 1429 PUTU32(ciphertext + 8, tmp[2]); 1430 PUTU32(ciphertext + 12, tmp[3]); 1434 const unsigned char *ciphertext, 1440 tmp[0] = GETU32(ciphertext); 1441 tmp[1] = GETU32(ciphertext + 4); 1442 tmp[2] = GETU32(ciphertext + 8); 1443 tmp[3] = GETU32(ciphertext 1402 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument 1433 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument [all...] |
H A D | seed.c | 452 static const byte ciphertext[16] = { 459 if (memcmp (scratch, ciphertext, sizeof (ciphertext))) 447 static const byte ciphertext[16] = { local
|
H A D | twofish.c | 892 static const byte ciphertext[16] = { 913 if (memcmp (scratch, ciphertext, sizeof (ciphertext))) 883 static const byte ciphertext[16] = { local
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | camellia.c | 1405 unsigned char *ciphertext) 1427 PUTU32(ciphertext, tmp[0]); 1428 PUTU32(ciphertext + 4, tmp[1]); 1429 PUTU32(ciphertext + 8, tmp[2]); 1430 PUTU32(ciphertext + 12, tmp[3]); 1434 const unsigned char *ciphertext, 1440 tmp[0] = GETU32(ciphertext); 1441 tmp[1] = GETU32(ciphertext + 4); 1442 tmp[2] = GETU32(ciphertext + 8); 1443 tmp[3] = GETU32(ciphertext 1402 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument 1433 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument [all...] |
H A D | seed.c | 452 static const byte ciphertext[16] = { 459 if (memcmp (scratch, ciphertext, sizeof (ciphertext))) 447 static const byte ciphertext[16] = { local
|
H A D | twofish.c | 892 static const byte ciphertext[16] = { 913 if (memcmp (scratch, ciphertext, sizeof (ciphertext))) 883 static const byte ciphertext[16] = { local
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | kssl.c | 1259 new5ticket->enc_part.ciphertext.length = 1261 if ((new5ticket->enc_part.ciphertext.data = 1269 memcpy(new5ticket->enc_part.ciphertext.data,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.c | 1282 new5ticket->enc_part.ciphertext.length = 1284 if ((new5ticket->enc_part.ciphertext.data = 1295 memcpy(new5ticket->enc_part.ciphertext.data,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | kssl.c | 1259 new5ticket->enc_part.ciphertext.length = 1261 if ((new5ticket->enc_part.ciphertext.data = 1269 memcpy(new5ticket->enc_part.ciphertext.data,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | anubis.c | 575 u8 *ciphertext, const u8 *plaintext, const int R) 578 __be32 *dst = (__be32 *)ciphertext; 655 * map cipher state to ciphertext block (mu^{-1}): 574 anubis_crypt(u32 roundKey[ANUBIS_MAX_ROUNDS + 1][4], u8 *ciphertext, const u8 *plaintext, const int R) argument
|
H A D | khazad.c | 803 u8 *ciphertext, const u8 *plaintext) 806 __be64 *dst = (__be64 *)ciphertext; 802 khazad_crypt(const u64 roundKey[KHAZAD_ROUNDS + 1], u8 *ciphertext, const u8 *plaintext) argument
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/ |
H A D | rtmp.h | 3439 u32 c_len, u8 *ciphertext); 3511 u32 p_len, u8 *ciphertext);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/aes/asm/ |
H A D | bsaes-armv7.pl | 2383 @ calculate one round of extra tweak for the stolen ciphertext
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/aes/asm/ |
H A D | bsaes-armv7.pl | 2383 @ calculate one round of extra tweak for the stolen ciphertext
|