/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/tools/perf/scripts/perl/Perf-Trace-Util/ |
H A D | Context.c | 60 XSprePUSH; PUSHi((IV)RETVAL); 83 XSprePUSH; PUSHi((IV)RETVAL); 106 XSprePUSH; PUSHi((IV)RETVAL);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/perl/DB_File/ |
H A D | fallback.h | 24 constant_6 (pTHX_ const char *name, IV *iv_return) { 79 constant_7 (pTHX_ const char *name, IV *iv_return) { 123 constant_8 (pTHX_ const char *name, IV *iv_return) { 167 constant_9 (pTHX_ const char *name, IV *iv_return) { 211 constant_10 (pTHX_ const char *name, IV *iv_return) { 266 constant_11 (pTHX_ const char *name, IV *iv_return) { 332 constant (pTHX_ const char *name, STRLEN len, IV *iv_return) { 347 my $types = {map {($_, 1)} qw(IV)}; 356 foreach (C_constant ("DB_File", 'constant', 'IV', $types, undef, 3, @names) ) {
|
H A D | fallback.xs | 11 IV iv;
|
H A D | ppport.h | 56 # define PTR2IV(d) (IV)(d)
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iputils/racoon/missing/crypto/rijndael/ |
H A D | rijndael-api-fst.c | 75 int rijndael_cipherInit(cipherInstance *cipher, BYTE mode, char *IV) { argument 81 if (IV != NULL) { 82 bcopy(IV, cipher->IV, MAX_IV_SIZE); 84 bzero(cipher->IV, MAX_IV_SIZE); 115 ((word32*)block)[0] = ((word32*)cipher->IV)[0] ^ ((word32*)input)[0]; 116 ((word32*)block)[1] = ((word32*)cipher->IV)[1] ^ ((word32*)input)[1]; 117 ((word32*)block)[2] = ((word32*)cipher->IV)[2] ^ ((word32*)input)[2]; 118 ((word32*)block)[3] = ((word32*)cipher->IV)[3] ^ ((word32*)input)[3]; 133 *((word32*)iv[0]) = *((word32*)(cipher->IV )); [all...] |
H A D | rijndael-api-fst.h | 42 #define MAX_IV_SIZE 16 /* # bytes needed to represent an IV */ 68 u_int8_t IV[MAX_IV_SIZE]; /* A possible Initialization Vector for ciphering */ member in struct:__anon20236 84 int rijndael_cipherInit(cipherInstance *cipher, u_int8_t mode, char *IV);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | salsa.h | 21 void CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length); 50 void CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length);
|
H A D | default.cpp | 59 static void GenerateKeyIV(const byte *passphrase, size_t passphraseLength, const byte *salt, size_t saltLength, byte *key, byte *IV) argument 67 memcpy(IV, keyIV+KEYLENGTH, BLOCKSIZE); 107 // mash passphrase and salt together into key and IV 109 SecByteBlock IV(BLOCKSIZE); 110 GenerateKeyIV(m_passphrase, m_passphrase.size(), salt, SALTLENGTH, key, IV); 112 m_cipher.SetKeyWithIV(key, key.size(), IV); 171 SecByteBlock IV(BLOCKSIZE); 172 GenerateKeyIV(m_passphrase, m_passphrase.size(), salt, SALTLENGTH, key, IV); 174 m_cipher.SetKeyWithIV(key, key.size(), IV);
|
H A D | seal.h | 21 void CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length);
|
H A D | argnames.h | 16 CRYPTOPP_DEFINE_NAME_STRING(IV) //!< ConstByteArrayParameter, also accepts const byte * for backwards compatibility
|
H A D | vmac.h | 17 void GetNextIV(RandomNumberGenerator &rng, byte *IV);
|
H A D | seal.cpp | 69 void SEAL_Policy<B>::CipherResynchronize(byte *keystreamBuffer, const byte *IV, size_t length) argument 72 m_outsideCounter = IV ? GetWord<word32>(false, BIG_ENDIAN_ORDER, IV) : 0;
|
H A D | shark.cpp | 45 byte IV[8] = {0,0,0,0,0,0,0,0}; local 46 CFB_Mode_ExternalCipher::Encryption cfb(e, IV);
|
H A D | fipsalgt.cpp | 55 enum DataType {OTHER, COUNT, KEY_T, IV, INPUT, OUTPUT}; enumerator in enum:TestDataParser::DataType 70 m_nameToType["IV"] = IV; 71 m_nameToType["IV1"] = IV; 72 m_nameToType["CV"] = IV; 73 m_nameToType["CV1"] = IV; 74 m_nameToType["IB"] = IV; 80 m_nameToType["DT"] = IV; 752 SecByteBlock seed(m_data2[INPUT]), dt(m_data2[IV]), r(8); 821 SecByteBlock &iv = m_data2[IV]; [all...] |
H A D | bench.cpp | 190 obj->SetKey(key, keyLength, CombinedNameValuePairs(params, MakeParameters(Name::IV(), ConstByteArrayParameter(key, obj->IVSize()), false))); 192 BenchMarkKeying(*obj, keyLength, CombinedNameValuePairs(params, MakeParameters(Name::IV(), ConstByteArrayParameter(key, obj->IVSize()), false))); 225 cpk = "<TH>Cycles to<br>Setup Key and IV"; 235 cout << "<THEAD><TR><TH>Algorithm<TH>MiB/Second" << cpb << "<TH>Microseconds to<br>Setup Key and IV" << cpk << endl;
|
H A D | cryptlib.cpp | 66 SetKey(key, length, MakeParameters(Name::IV(), ConstByteArrayParameter(iv, ivLength))); 78 throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": this object requires an IV"); 84 throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": this object cannot use a null IV"); 92 throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": IV length " + IntToString(size) + " is less than the minimum of " + IntToString(MinIVLength())); 94 throw InvalidArgument(GetAlgorithm().AlgorithmName() + ": IV length " + IntToString(size) + " exceeds the maximum of " + IntToString(MaxIVLength())); 105 try {found = params.GetValue(Name::IV(), ivWithLength);} 115 else if (params.GetValue(Name::IV(), iv)) 129 void SimpleKeyingInterface::GetNextIV(RandomNumberGenerator &rng, byte *IV) argument 131 rng.GenerateBlock(IV, IVSize());
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/db-4.7.25.NC/perl/BerkeleyDB/ |
H A D | constants.xs | 11 IV iv;
|
H A D | constants.h | 24 constant_6 (pTHX_ const char *name, IV *iv_return) { 79 constant_7 (pTHX_ const char *name, IV *iv_return) { 148 constant_8 (pTHX_ const char *name, IV *iv_return) { 256 constant_9 (pTHX_ const char *name, IV *iv_return) { 446 constant_10 (pTHX_ const char *name, IV *iv_return) { 689 constant_11 (pTHX_ const char *name, IV *iv_return) { 1181 constant_12 (pTHX_ const char *name, IV *iv_return) { 1657 constant_13 (pTHX_ const char *name, IV *iv_return) { 2185 constant_14 (pTHX_ const char *name, IV *iv_return) { 2738 constant_15 (pTHX_ const char *name, IV *iv_retur [all...] |
H A D | ppport.h | 56 # define PTR2IV(d) (IV)(d)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/block/ |
H A D | cryptoloop.c | 115 int size, sector_t IV) 150 iv[0] = cpu_to_le32(IV & 0xffffffff); 160 IV++; 112 cryptoloop_transfer(struct loop_device *lo, int cmd, struct page *raw_page, unsigned raw_off, struct page *loop_page, unsigned loop_off, int size, sector_t IV) argument
|
H A D | loop.c | 225 sector_t IV; local 231 IV = ((sector_t)index << (PAGE_CACHE_SHIFT - 9))+(offset >> 9); 244 bvec->bv_page, bv_offs, size, IV); 395 sector_t IV; local 402 IV = ((sector_t) page->index << (PAGE_CACHE_SHIFT - 9)) + 408 if (lo_do_transfer(lo, READ, page, buf->offset, p->page, p->offset, size, IV)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/crypto/ |
H A D | aesni-intel_asm.S | 34 #define IV %xmm3 define 684 movups (IVP), IV 698 pxor IV, STATE1 702 movaps IN4, IV 719 pxor IV, STATE 721 movaps IN, IV 728 movups IV, (IVP) 740 * IV 742 * CTR: == IV, in little endian 749 movaps IV, CT [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/aes/asm/ |
H A D | bsaes-armv7.pl | 1111 ldr $ivp, [ip] @ IV is 1st arg on the stack 1113 sub sp, #0x10 @ scratch space to carry over the IV 1152 vld1.8 {@XMM[15]}, [$ivp] @ load IV 1171 vstmia $fp, {@XMM[15]} @ put aside IV 1175 vldmia $fp, {@XMM[14]} @ reload IV 1177 veor @XMM[0], @XMM[0], @XMM[14] @ ^= IV 1212 vstmia $fp, {@XMM[15]} @ put aside IV 1229 vldmia $fp, {@XMM[14]} @ reload IV 1231 veor @XMM[0], @XMM[0], @XMM[14] @ ^= IV 1252 vldmia $fp,{@XMM[14]} @ reload IV [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/aes/asm/ |
H A D | bsaes-armv7.pl | 1111 ldr $ivp, [ip] @ IV is 1st arg on the stack 1113 sub sp, #0x10 @ scratch space to carry over the IV 1152 vld1.8 {@XMM[15]}, [$ivp] @ load IV 1171 vstmia $fp, {@XMM[15]} @ put aside IV 1175 vldmia $fp, {@XMM[14]} @ reload IV 1177 veor @XMM[0], @XMM[0], @XMM[14] @ ^= IV 1212 vstmia $fp, {@XMM[15]} @ put aside IV 1229 vldmia $fp, {@XMM[14]} @ reload IV 1231 veor @XMM[0], @XMM[0], @XMM[14] @ ^= IV 1252 vldmia $fp,{@XMM[14]} @ reload IV [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/minidlna/ffmpeg-2.3.4/libavutil/ |
H A D | blowfish.c | 522 #define IV "blowfish" macro 556 memcpy(iv, IV, 8); 558 memcpy(iv, IV, 8); 560 memcpy(iv, IV, 8); 562 memcpy(iv, IV, 8);
|