/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/camellia/ |
H A D | cmll_locl.h | 78 u8 ciphertext[]); 79 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 83 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 84 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
H A D | camellia.c | 482 u8 ciphertext[]) 520 PUTU32(ciphertext, s2); 521 PUTU32(ciphertext + 4, s3); 522 PUTU32(ciphertext + 8, s0); 523 PUTU32(ciphertext + 12, s1); 527 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) 530 plaintext, keyTable, ciphertext); 533 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], argument 540 s0 = GETU32(ciphertext) ^ k[0]; 541 s1 = GETU32(ciphertext 480 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 526 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 579 Camellia_DecryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/camellia/ |
H A D | cmll_locl.h | 78 u8 ciphertext[]); 79 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], 83 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]); 84 void Camellia_DecryptBlock(int keyBitLength, const u8 ciphertext[],
|
H A D | camellia.c | 482 u8 ciphertext[]) 520 PUTU32(ciphertext, s2); 521 PUTU32(ciphertext + 4, s3); 522 PUTU32(ciphertext + 8, s0); 523 PUTU32(ciphertext + 12, s1); 527 const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) 530 plaintext, keyTable, ciphertext); 533 void Camellia_DecryptBlock_Rounds(int grandRounds, const u8 ciphertext[], argument 540 s0 = GETU32(ciphertext) ^ k[0]; 541 s1 = GETU32(ciphertext 480 Camellia_EncryptBlock_Rounds(int grandRounds, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 526 Camellia_EncryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument 579 Camellia_DecryptBlock(int keyBitLength, const u8 plaintext[], const KEY_TABLE_TYPE keyTable, u8 ciphertext[]) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | evp_test.c | 139 const unsigned char *ciphertext,int cn, 152 hexdump(stdout,"Ciphertext",ciphertext,cn); 191 if(memcmp(out,ciphertext,cn)) 195 hexdump(stderr,"Expected",ciphertext,cn); 210 if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn)) 247 const unsigned char *ciphertext,int cn, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 263 const unsigned char *ciphertext, unsigned int cn) 276 hexdump(stdout,"Digest",ciphertext,cn); 305 if(memcmp(md,ciphertext,c 136 test1(const EVP_CIPHER *c,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 244 test_cipher(const char *cipher,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 261 test_digest(const char *digest, const unsigned char *plaintext,int pn, const unsigned char *ciphertext, unsigned int cn) argument 369 unsigned char *iv,*key,*plaintext,*ciphertext; local [all...] |
H A D | igetest.c | 273 unsigned char ciphertext[BIG_TEST_SIZE]; local 292 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, 297 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, 311 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv, 314 ciphertext+TEST_SIZE/2, TEST_SIZE/2, 319 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, 333 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE/2, &key, iv, 336 ciphertext+TEST_SIZE/2, TEST_SIZE/2, 341 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE/2, &key, iv, 343 AES_ige_encrypt(ciphertext [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/evp/ |
H A D | evp_test.c | 139 const unsigned char *ciphertext,int cn, 152 hexdump(stdout,"Ciphertext",ciphertext,cn); 191 if(memcmp(out,ciphertext,cn)) 195 hexdump(stderr,"Expected",ciphertext,cn); 210 if(!EVP_DecryptUpdate(&ctx,out,&outl,ciphertext,cn)) 247 const unsigned char *ciphertext,int cn, 256 test1(c,key,kn,iv,in,plaintext,pn,ciphertext,cn,encdec); 263 const unsigned char *ciphertext, unsigned int cn) 276 hexdump(stdout,"Digest",ciphertext,cn); 305 if(memcmp(md,ciphertext,c 136 test1(const EVP_CIPHER *c,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 244 test_cipher(const char *cipher,const unsigned char *key,int kn, const unsigned char *iv,int in, const unsigned char *plaintext,int pn, const unsigned char *ciphertext,int cn, int encdec) argument 261 test_digest(const char *digest, const unsigned char *plaintext,int pn, const unsigned char *ciphertext, unsigned int cn) argument 369 unsigned char *iv,*key,*plaintext,*ciphertext; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/evp/ |
H A D | evp_test.c | 135 const unsigned char *ciphertext, int cn, 151 hexdump(stdout, "Ciphertext", ciphertext, cn); 247 if (memcmp(out, ciphertext, cn)) { 250 hexdump(stderr, "Expected", ciphertext, cn); 346 if (!EVP_DecryptUpdate(&ctx, out, &outl, ciphertext, cn)) { 380 const unsigned char *ciphertext, int cn, 390 test1(c, key, kn, iv, in, plaintext, pn, ciphertext, cn, aad, an, tag, tn, 398 const unsigned char *ciphertext, unsigned int cn) 411 hexdump(stdout, "Digest", ciphertext, cn); 437 if (memcmp(md, ciphertext, c 132 test1(const EVP_CIPHER *c, const unsigned char *key, int kn, const unsigned char *iv, int in, const unsigned char *plaintext, int pn, const unsigned char *ciphertext, int cn, const unsigned char *aad, int an, const unsigned char *tag, int tn, int encdec) argument 377 test_cipher(const char *cipher, const unsigned char *key, int kn, const unsigned char *iv, int in, const unsigned char *plaintext, int pn, const unsigned char *ciphertext, int cn, const unsigned char *aad, int an, const unsigned char *tag, int tn, int encdec) argument 396 test_digest(const char *digest, const unsigned char *plaintext, int pn, const unsigned char *ciphertext, unsigned int cn) argument 501 unsigned char *iv, *key, *plaintext, *ciphertext, *aad, *tag; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/evp/ |
H A D | evp_test.c | 135 const unsigned char *ciphertext, int cn, 151 hexdump(stdout, "Ciphertext", ciphertext, cn); 247 if (memcmp(out, ciphertext, cn)) { 250 hexdump(stderr, "Expected", ciphertext, cn); 346 if (!EVP_DecryptUpdate(&ctx, out, &outl, ciphertext, cn)) { 380 const unsigned char *ciphertext, int cn, 390 test1(c, key, kn, iv, in, plaintext, pn, ciphertext, cn, aad, an, tag, tn, 398 const unsigned char *ciphertext, unsigned int cn) 411 hexdump(stdout, "Digest", ciphertext, cn); 437 if (memcmp(md, ciphertext, c 132 test1(const EVP_CIPHER *c, const unsigned char *key, int kn, const unsigned char *iv, int in, const unsigned char *plaintext, int pn, const unsigned char *ciphertext, int cn, const unsigned char *aad, int an, const unsigned char *tag, int tn, int encdec) argument 377 test_cipher(const char *cipher, const unsigned char *key, int kn, const unsigned char *iv, int in, const unsigned char *plaintext, int pn, const unsigned char *ciphertext, int cn, const unsigned char *aad, int an, const unsigned char *tag, int tn, int encdec) argument 396 test_digest(const char *digest, const unsigned char *plaintext, int pn, const unsigned char *ciphertext, unsigned int cn) argument 501 unsigned char *iv, *key, *plaintext, *ciphertext, *aad, *tag; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | igetest.c | 281 unsigned char ciphertext[BIG_TEST_SIZE]; local 300 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 304 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 316 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 319 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 324 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 336 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 339 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 344 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE / 2, &key, iv, 346 AES_ige_encrypt(ciphertext [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | igetest.c | 281 unsigned char ciphertext[BIG_TEST_SIZE]; local 300 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE, &key, iv, AES_ENCRYPT); 304 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 316 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 319 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 324 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE, &key, iv, AES_DECRYPT); 336 AES_ige_encrypt(plaintext, ciphertext, TEST_SIZE / 2, &key, iv, 339 ciphertext + TEST_SIZE / 2, TEST_SIZE / 2, 344 AES_ige_encrypt(ciphertext, checktext, TEST_SIZE / 2, &key, iv, 346 AES_ige_encrypt(ciphertext [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/modes/ |
H A D | cts128.c | 419 unsigned char cleartext[64], ciphertext[64]; local 431 CRYPTO_cts128_encrypt_block(test_input, ciphertext, len, &encks, iv, 433 if (memcmp(ciphertext, vector, len)) 440 CRYPTO_cts128_decrypt_block(ciphertext, cleartext, len, &decks, iv, 449 CRYPTO_cts128_encrypt(test_input, ciphertext, len, &encks, iv, 451 if (memcmp(ciphertext, vector, len)) 458 CRYPTO_cts128_decrypt(ciphertext, cleartext, len, &decks, iv, 469 unsigned char cleartext[64], ciphertext[64], nistvector[64]; local 488 CRYPTO_nistcts128_encrypt_block(test_input, ciphertext, len, &encks, iv, 490 if (memcmp(ciphertext, nistvecto [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/modes/ |
H A D | cts128.c | 419 unsigned char cleartext[64], ciphertext[64]; local 431 CRYPTO_cts128_encrypt_block(test_input, ciphertext, len, &encks, iv, 433 if (memcmp(ciphertext, vector, len)) 440 CRYPTO_cts128_decrypt_block(ciphertext, cleartext, len, &decks, iv, 449 CRYPTO_cts128_encrypt(test_input, ciphertext, len, &encks, iv, 451 if (memcmp(ciphertext, vector, len)) 458 CRYPTO_cts128_decrypt(ciphertext, cleartext, len, &decks, iv, 469 unsigned char cleartext[64], ciphertext[64], nistvector[64]; local 488 CRYPTO_nistcts128_encrypt_block(test_input, ciphertext, len, &encks, iv, 490 if (memcmp(ciphertext, nistvecto [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | dlltest.cpp | 60 byte ciphertext[24]; local 65 encryption_DES_EDE3_CFB.ProcessString(ciphertext, plaintext, 24); 69 decryption_DES_EDE3_CFB.ProcessString(decrypted, ciphertext, 24);
|
H A D | pubkey.cpp | 135 DecodingResult TF_DecryptorBase::Decrypt(RandomNumberGenerator &rng, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs ¶meters) const argument 138 Integer x = GetTrapdoorFunctionInterface().CalculateInverse(rng, Integer(ciphertext, FixedCiphertextLength())); 145 void TF_EncryptorBase::Encrypt(RandomNumberGenerator &rng, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs ¶meters) const argument 157 GetTrapdoorFunctionInterface().ApplyRandomizedFunction(rng, Integer(paddedBlock, paddedBlock.size())).Encode(ciphertext, FixedCiphertextLength());
|
H A D | bench2.cpp | 39 SecByteBlock plaintext(len), ciphertext(key.CiphertextLength(len)); 46 key.Encrypt(rng, plaintext, len, ciphertext); 61 SecByteBlock ciphertext(pub.CiphertextLength(len)); 62 SecByteBlock plaintext(pub.MaxPlaintextLength(ciphertext.size())); 64 pub.Encrypt(rng, plaintext, len, ciphertext); 70 priv.Decrypt(rng, ciphertext, ciphertext.size(), plaintext);
|
H A D | gfpcrypt.h | 430 void SymmetricEncrypt(RandomNumberGenerator &rng, const byte *key, const byte *plaintext, size_t plaintextLength, byte *ciphertext, const NameValuePairs ¶meters) const argument 447 xorbuf(ciphertext, plaintext, cipherKey, plaintextLength); 449 mac.Update(ciphertext, plaintextLength); 457 mac.Final(ciphertext + plaintextLength); 459 DecodingResult SymmetricDecrypt(const byte *key, const byte *ciphertext, size_t ciphertextLength, byte *plaintext, const NameValuePairs ¶meters) const argument 478 mac.Update(ciphertext, plaintextLength); 486 if (!mac.Verify(ciphertext + plaintextLength)) 489 xorbuf(plaintext, ciphertext, cipherKey, plaintextLength);
|
H A D | fipstest.cpp | 80 void KnownAnswerTest(StreamTransformation &encryption, StreamTransformation &decryption, const char *plaintext, const char *ciphertext) argument 85 StringSource(ciphertext, true, new HexDecoder(new ChannelSwitch(comparison, "1"))); 87 StringSource(ciphertext, true, new HexDecoder(new StreamTransformationFilter(decryption, new ChannelSwitch(comparison, "0"), StreamTransformationFilter::NO_PADDING))); 189 std::string ciphertext, decrypted; local 197 new StringSink(ciphertext))); 199 if (ciphertext == testMessage) 203 ciphertext,
|
H A D | test.cpp | 59 string RSADecryptString(const char *privFilename, const char *ciphertext); 69 string DecryptString(const char *ciphertext, const char *passPhrase); 177 string ciphertext = RSAEncryptString(pubFilename, seed, message); local 178 cout << "\nCiphertext: " << ciphertext << endl; 180 string decrypted = RSADecryptString(privFilename, ciphertext.c_str()); 268 string ciphertext = EncryptString(plaintext, passPhrase); local 269 cout << "\nCiphertext: " << ciphertext << endl; 271 string decrypted = DecryptString(ciphertext.c_str(), passPhrase); 417 string RSADecryptString(const char *privFilename, const char *ciphertext) 423 StringSource(ciphertext, tru [all...] |
H A D | cryptlib.cpp | 211 void AuthenticatedSymmetricCipher::EncryptAndAuthenticate(byte *ciphertext, byte *mac, size_t macSize, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *message, size_t messageLength) argument 216 ProcessString(ciphertext, message, messageLength); 220 bool AuthenticatedSymmetricCipher::DecryptAndVerify(byte *message, const byte *mac, size_t macLength, const byte *iv, int ivLength, const byte *header, size_t headerLength, const byte *ciphertext, size_t ciphertextLength) argument 225 ProcessString(message, ciphertext, ciphertextLength); 720 throw InvalidArgument("PK_DefaultDecryptionFilter: ciphertext too long"); 723 SecByteBlock ciphertext(ciphertextLength); 724 m_ciphertextQueue.Get(ciphertext, ciphertextLength); 726 m_result = m_decryptor.Decrypt(m_rng, ciphertext, ciphertextLength, m_plaintext, m_parameters); 728 throw InvalidCiphertext(m_decryptor.AlgorithmName() + ": invalid ciphertext");
|
H A D | datatest.cpp | 342 std::string encrypted, xorDigest, ciphertext, ciphertextXorDigest; local 356 ciphertext = GetDecodedDatum(v, "Ciphertext"); 364 if (test != "EncryptXorDigest" ? encrypted != ciphertext : xorDigest != ciphertextXorDigest) 400 std::string ciphertext = GetOptionalDecodedDatum(v, "Ciphertext"); local 427 StringStore sh(header), sp(plaintext), sc(ciphertext), sf(footer), sm(mac); 446 if (test == "Encrypt" && encrypted != ciphertext+mac) 463 if (ciphertext.size()+mac.size()-plaintext.size() != asc1->DigestSize())
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/libgcrypt-1.5.0/cipher/ |
H A D | rsa.c | 101 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); 113 public (ciphertext, plaintext, &pk); 116 if (!gcry_mpi_cmp (ciphertext, plaintext)) 120 secret (decr_plaintext, ciphertext, sk); 148 gcry_mpi_release (ciphertext); 1201 gcry_mpi_t ciphertext = NULL; 1227 /* Extraxt the ciphertext from the returned S-expression. */ 1229 ciphertext = extract_a_from_sexp (encr); 1230 if (!ciphertext) 1236 /* Check that the ciphertext doe 100 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); local 1199 gcry_mpi_t ciphertext = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | rsa.c | 101 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); 113 public (ciphertext, plaintext, &pk); 116 if (!gcry_mpi_cmp (ciphertext, plaintext)) 120 secret (decr_plaintext, ciphertext, sk); 148 gcry_mpi_release (ciphertext); 1201 gcry_mpi_t ciphertext = NULL; 1227 /* Extraxt the ciphertext from the returned S-expression. */ 1229 ciphertext = extract_a_from_sexp (encr); 1230 if (!ciphertext) 1236 /* Check that the ciphertext doe 100 gcry_mpi_t ciphertext = gcry_mpi_new (nbits); local 1199 gcry_mpi_t ciphertext = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6655/ |
H A D | aes_ccmp.c | 193 void AESv128(unsigned char *key, unsigned char *data, unsigned char *ciphertext) argument 208 xor_128(abyRoundKey, data, ciphertext); 213 SubBytes(ciphertext, TmpdataA); 215 xor_128(TmpdataB, abyRoundKey, ciphertext); 219 SubBytes(ciphertext, TmpdataA); 225 xor_128(TmpdataA, abyRoundKey, ciphertext);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/vt6656/ |
H A D | aes_ccmp.c | 186 void AESv128(BYTE *key, BYTE *data, BYTE *ciphertext) argument 199 xor_128(abyRoundKey, data, ciphertext); 202 SubBytes(ciphertext, TmpdataA); 204 xor_128(TmpdataB, abyRoundKey, ciphertext); 206 SubBytes(ciphertext, TmpdataA); 212 xor_128(TmpdataA, abyRoundKey, ciphertext);
|