Searched refs:arc4 (Results 1 - 5 of 5) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/
H A Dppp_mppe.c38 * Use Linux kernel 2.6 arc4 and sha1 routines rather than
97 struct crypto_blkcipher *arc4; member in struct:ppp_mppe_state
164 struct blkcipher_desc desc = { .tfm = state->arc4 };
168 crypto_blkcipher_setkey(state->arc4, state->sha1_digest,
187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen);
207 state->arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, CRYPTO_ALG_ASYNC);
208 if (IS_ERR(state->arc4)) {
209 state->arc4 = NULL;
245 if (state->arc4)
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/
H A DMakefile71 obj-$(CONFIG_CRYPTO_ARC4) += arc4.o
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Dvalidat1.cpp16 #include "arc4.h"
1043 member_ptr<Weak::ARC4> arc4; local
1049 arc4.reset(new Weak::ARC4(Key0, sizeof(Key0)));
1050 arc4->ProcessString(Input0, sizeof(Input0));
1055 arc4.reset(new Weak::ARC4(Key1, sizeof(Key1)));
1056 arc4->ProcessString(Key1, Input1, sizeof(Key1));
1061 arc4.reset(new Weak::ARC4(Key2, sizeof(Key2)));
1063 if (arc4->ProcessByte(Input2[i]) != Output2[i])
1068 arc4.reset(new Weak::ARC4(Key3, sizeof(Key3)));
1070 if (arc4
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/
H A DMakefile111 crypto-rsl.o: arc4.o api.o autoload.o cipher.o compress.o digest.o scatterwalk.o proc.o
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/
H A Dn2_core.c643 u8 arc4[258]; /* S-box, X, Y */ member in union:n2_cipher_context::__anon11166
784 u8 *s = ctx->key.arc4;
1113 { .name = "ecb(arc4)",
1114 .drv_name = "ecb-arc4",

Completed in 143 milliseconds