Searched refs:arc4 (Results 1 - 5 of 5) sorted by relevance
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/ |
H A D | ppp_mppe.c | 38 * Use Linux kernel 2.6 arc4 and sha1 routines rather than 97 struct crypto_blkcipher *arc4; member in struct:ppp_mppe_state 164 struct blkcipher_desc desc = { .tfm = state->arc4 }; 168 crypto_blkcipher_setkey(state->arc4, state->sha1_digest, 187 crypto_blkcipher_setkey(state->arc4, state->session_key, state->keylen); 207 state->arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, CRYPTO_ALG_ASYNC); 208 if (IS_ERR(state->arc4)) { 209 state->arc4 = NULL; 245 if (state->arc4) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/crypto/ |
H A D | Makefile | 71 obj-$(CONFIG_CRYPTO_ARC4) += arc4.o
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | validat1.cpp | 16 #include "arc4.h" 1043 member_ptr<Weak::ARC4> arc4; local 1049 arc4.reset(new Weak::ARC4(Key0, sizeof(Key0))); 1050 arc4->ProcessString(Input0, sizeof(Input0)); 1055 arc4.reset(new Weak::ARC4(Key1, sizeof(Key1))); 1056 arc4->ProcessString(Key1, Input1, sizeof(Key1)); 1061 arc4.reset(new Weak::ARC4(Key2, sizeof(Key2))); 1063 if (arc4->ProcessByte(Input2[i]) != Output2[i]) 1068 arc4.reset(new Weak::ARC4(Key3, sizeof(Key3))); 1070 if (arc4 [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/staging/rtl8192u/ieee80211/ |
H A D | Makefile | 111 crypto-rsl.o: arc4.o api.o autoload.o cipher.o compress.o digest.o scatterwalk.o proc.o
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/crypto/ |
H A D | n2_core.c | 643 u8 arc4[258]; /* S-box, X, Y */ member in union:n2_cipher_context::__anon11166 784 u8 *s = ctx->key.arc4; 1113 { .name = "ecb(arc4)", 1114 .drv_name = "ecb-arc4",
|
Completed in 143 milliseconds