Searched refs:ciphertext (Results 26 - 44 of 44) sorted by relevance

12

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dpubkey.h169 DecodingResult Decrypt(RandomNumberGenerator &rng, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs &parameters = g_nullNameValuePairs) const;
176 void Encrypt(RandomNumberGenerator &rng, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs &parameters = g_nullNameValuePairs) const;
941 virtual void SymmetricEncrypt(RandomNumberGenerator &rng, const byte *key, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs &parameters) const =0;
942 virtual DecodingResult SymmetricDecrypt(const byte *key, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs &parameters) const =0;
1184 DecodingResult Decrypt(RandomNumberGenerator &rng, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs &parameters = g_nullNameValuePairs) const argument
1194 Element q = params.DecodeElement(ciphertext, true);
1196 ciphertext += elementSize;
1204 return encAlg.SymmetricDecrypt(derivedKey, ciphertext, ciphertextLength, plaintext, parameters);
1220 void Encrypt(RandomNumberGenerator &rng, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs &parameters = g_nullNameValuePairs) const argument
1230 params.EncodeElement(true, q, ciphertext);
[all...]
H A Dcryptlib.h158 //! exception thrown by decryption filters when trying to decrypt an invalid ciphertext
661 virtual void EncryptAndAuthenticate(byte *ciphertext, byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *message, size_t messageLength);
663 virtual bool DecryptAndVerify(byte *message, const byte *mac, size_t macLength, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *ciphertext, size_t ciphertextLength);
1203 for querying their plaintext and ciphertext lengths.
1210 //! maximum length of plaintext for a given ciphertext length
1214 //! calculate length of ciphertext given length of plaintext
1222 //! return fixed ciphertext length, if one exists, otherwise return 0
1223 /*! \note "Fixed" here means length of ciphertext does not depend on length of plaintext.
1227 //! return maximum plaintext length given the fixed ciphertext length, if one exists, otherwise return 0
1249 \pre size of ciphertext
1283 FixedLengthDecrypt(RandomNumberGenerator &rng, const byte *ciphertext, byte *plaintext, const NameValuePairs &parameters = g_nullNameValuePairs) const argument
[all...]
H A Dvalidat2.cpp166 SecByteBlock ciphertext(priv.CiphertextLength(messageLen));
167 SecByteBlock plaintext(priv.MaxPlaintextLength(ciphertext.size()));
169 pub.Encrypt(GlobalRNG(), message, messageLen, ciphertext); local
170 fail = priv.Decrypt(GlobalRNG(), ciphertext, priv.CiphertextLength(messageLen), plaintext) != DecodingResult(messageLen);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/common/
H A Dcmm_aes.c346 unsigned char *ciphertext)
359 xor_128(round_key, data, ciphertext);
362 byte_sub(ciphertext, intermediatea);
364 xor_128(intermediateb, round_key, ciphertext);
367 byte_sub(ciphertext, intermediatea);
373 xor_128(intermediatea, round_key, ciphertext);
1207 u32 p_len, u8 * ciphertext)
1243 /* Output ciphertext */
1244 NdisMoveMemory(ciphertext, A, 8);
1248 ciphertext[
345 aes128k128d(unsigned char *key, unsigned char *data, unsigned char *ciphertext) argument
1205 AES_GTK_KEY_WRAP(u8 * key, u8 * plaintext, u32 p_len, u8 * ciphertext) argument
1267 AES_GTK_KEY_UNWRAP(u8 * key, u8 * plaintext, u32 c_len, u8 * ciphertext) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavutil/
H A Dblowfish.c485 /* ciphertext bytes -- left halves */
496 /* ciphertext bytes -- right halves */
512 /* ciphertext bytes */
513 static const uint8_t ciphertext[8] = { variable
552 test_blowfish(&ctx, tmp, plaintext, ciphertext, 1, NULL, 0, "encryption");
553 test_blowfish(&ctx, tmp, ciphertext, plaintext, 1, NULL, 1, "decryption");
554 test_blowfish(&ctx, tmp, tmp, ciphertext, 1, NULL, 0, "Inplace encryption");
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/
H A Dcamellia.c1405 unsigned char *ciphertext)
1427 PUTU32(ciphertext, tmp[0]);
1428 PUTU32(ciphertext + 4, tmp[1]);
1429 PUTU32(ciphertext + 8, tmp[2]);
1430 PUTU32(ciphertext + 12, tmp[3]);
1434 const unsigned char *ciphertext,
1440 tmp[0] = GETU32(ciphertext);
1441 tmp[1] = GETU32(ciphertext + 4);
1442 tmp[2] = GETU32(ciphertext + 8);
1443 tmp[3] = GETU32(ciphertext
1402 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument
1433 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument
[all...]
H A Dseed.c452 static const byte ciphertext[16] = {
459 if (memcmp (scratch, ciphertext, sizeof (ciphertext)))
447 static const byte ciphertext[16] = { local
H A Dtwofish.c892 static const byte ciphertext[16] = {
913 if (memcmp (scratch, ciphertext, sizeof (ciphertext)))
883 static const byte ciphertext[16] = { local
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/
H A Dcamellia.c1405 unsigned char *ciphertext)
1427 PUTU32(ciphertext, tmp[0]);
1428 PUTU32(ciphertext + 4, tmp[1]);
1429 PUTU32(ciphertext + 8, tmp[2]);
1430 PUTU32(ciphertext + 12, tmp[3]);
1434 const unsigned char *ciphertext,
1440 tmp[0] = GETU32(ciphertext);
1441 tmp[1] = GETU32(ciphertext + 4);
1442 tmp[2] = GETU32(ciphertext + 8);
1443 tmp[3] = GETU32(ciphertext
1402 Camellia_EncryptBlock(const int keyBitLength, const unsigned char *plaintext, const KEY_TABLE_TYPE keyTable, unsigned char *ciphertext) argument
1433 Camellia_DecryptBlock(const int keyBitLength, const unsigned char *ciphertext, const KEY_TABLE_TYPE keyTable, unsigned char *plaintext) argument
[all...]
H A Dseed.c452 static const byte ciphertext[16] = {
459 if (memcmp (scratch, ciphertext, sizeof (ciphertext)))
447 static const byte ciphertext[16] = { local
H A Dtwofish.c892 static const byte ciphertext[16] = {
913 if (memcmp (scratch, ciphertext, sizeof (ciphertext)))
883 static const byte ciphertext[16] = { local
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dkssl.c1259 new5ticket->enc_part.ciphertext.length =
1261 if ((new5ticket->enc_part.ciphertext.data =
1269 memcpy(new5ticket->enc_part.ciphertext.data,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl.c1282 new5ticket->enc_part.ciphertext.length =
1284 if ((new5ticket->enc_part.ciphertext.data =
1295 memcpy(new5ticket->enc_part.ciphertext.data,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dkssl.c1259 new5ticket->enc_part.ciphertext.length =
1261 if ((new5ticket->enc_part.ciphertext.data =
1269 memcpy(new5ticket->enc_part.ciphertext.data,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A Danubis.c575 u8 *ciphertext, const u8 *plaintext, const int R)
578 __be32 *dst = (__be32 *)ciphertext;
655 * map cipher state to ciphertext block (mu^{-1}):
574 anubis_crypt(u32 roundKey[ANUBIS_MAX_ROUNDS + 1][4], u8 *ciphertext, const u8 *plaintext, const int R) argument
H A Dkhazad.c803 u8 *ciphertext, const u8 *plaintext)
806 __be64 *dst = (__be64 *)ciphertext;
802 khazad_crypt(const u64 roundKey[KHAZAD_ROUNDS + 1], u8 *ciphertext, const u8 *plaintext) argument
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rt2860/
H A Drtmp.h3439 u32 c_len, u8 *ciphertext);
3511 u32 p_len, u8 *ciphertext);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/aes/asm/
H A Dbsaes-armv7.pl2383 @ calculate one round of extra tweak for the stolen ciphertext
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/aes/asm/
H A Dbsaes-armv7.pl2383 @ calculate one round of extra tweak for the stolen ciphertext

Completed in 251 milliseconds

12