/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/i386/crypto/ |
H A D | aes.c | 60 u32 dkey[AES_KS_LENGTH]; member in struct:aes_ctx 432 ctx->dkey[0] = ss[0] = le32_to_cpu(key[0]); 433 ctx->dkey[1] = ss[1] = le32_to_cpu(key[1]); 434 ctx->dkey[2] = ss[2] = le32_to_cpu(key[2]); 435 ctx->dkey[3] = ss[3] = le32_to_cpu(key[3]); 439 kdf4(ctx->dkey, 0); 441 kd4(ctx->dkey, i); 442 kdl4(ctx->dkey, 9); 446 ctx->dkey[4] = ff(ss[4] = le32_to_cpu(key[4])); 447 ctx->dkey[ [all...] |
H A D | aes-i586-asm.S | 51 #define dkey (crypto_tfm_ctx_offset + 260) define 317 #if dkey != 0 318 lea dkey(%ebp),%ebp // key pointer
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/test/ |
H A D | ideatest.c | 113 IDEA_KEY_SCHEDULE key,dkey; local 132 idea_set_decrypt_key(&key,&dkey); 133 idea_ecb_encrypt(c,out,&dkey); 153 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 154 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
H A D | rc2test.c | 188 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 189 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/idea/ |
H A D | ideatest.c | 113 IDEA_KEY_SCHEDULE key,dkey; local 132 idea_set_decrypt_key(&key,&dkey); 133 idea_ecb_encrypt(c,out,&dkey); 153 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 154 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/idea/ |
H A D | ideatest.c | 113 IDEA_KEY_SCHEDULE key,dkey; local 132 idea_set_decrypt_key(&key,&dkey); 133 idea_ecb_encrypt(c,out,&dkey); 153 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 154 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | ideatest.c | 113 IDEA_KEY_SCHEDULE key,dkey; local 132 idea_set_decrypt_key(&key,&dkey); 133 idea_ecb_encrypt(c,out,&dkey); 153 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 154 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
H A D | rc2test.c | 188 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 189 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/fips/ |
H A D | fips_test_suite.c | 46 AES_KEY dkey; local 52 if (AES_set_decrypt_key( userkey, 128, &dkey )) 54 AES_decrypt( ciphertext, buf, &dkey);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/rc2/ |
H A D | rc2test.c | 188 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 189 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/demos/tunala/ |
H A D | tunala.c | 71 const char *dcert, const char *dkey, const char *cipher_list, 123 " -dkey <path|NULL> (usually for DSA, default = whatever '-dcert' is)\n" 302 const char *dkey = def_dkey; local 376 } else if(strcmp(*argv, "-dkey") == 0) { 378 return usage("-dkey requires an argument", 0); 381 dkey = NULL; 383 dkey = *argv; 489 cacert, cert, key, dcert, dkey, cipher_list, dh_file, 719 const char *dcert, const char *dkey, const char *cipher_list, 770 /* dcert and dkey */ 717 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/rc2/ |
H A D | rc2test.c | 188 idea_cbc_encrypt(out,out,8,&dkey,iv,0); 189 idea_cbc_encrypt(&(out[8]),&(out[8]),strlen(text)+1-8,&dkey,iv,0);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/demos/tunala/ |
H A D | tunala.c | 71 const char *dcert, const char *dkey, const char *cipher_list, 124 " -dkey <path|NULL> (usually for DSA, default = whatever '-dcert' is)\n" 304 const char *dkey = def_dkey; local 379 } else if(strcmp(*argv, "-dkey") == 0) { 381 return usage("-dkey requires an argument", 0); 384 dkey = NULL; 386 dkey = *argv; 495 cacert, cert, key, dcert, dkey, cipher_list, dh_file, 730 const char *dcert, const char *dkey, const char *cipher_list, 781 /* dcert and dkey */ 728 initialise_ssl_ctx(int server_mode, const char *engine_id, const char *CAfile, const char *cert, const char *key, const char *dcert, const char *dkey, const char *cipher_list, const char *dh_file, const char *dh_special, int tmp_rsa, int ctx_options, int out_state, int out_verify, int verify_mode, unsigned int verify_depth) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/include/asm-s390/ |
H A D | qdio.h | 161 unsigned int dkey : 4; /* access key for SLSB */ member in struct:qdesfmt0
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/libgcrypt-1.5.0/cipher/ |
H A D | rijndael.c | 466 m128i_t *dkey = (m128i_t*)ctx->keyschdec; 469 dkey[0] = ekey[ctx->rounds]; 476 "movdqu %%xmm1, %[dkey]" 477 : [dkey] "=m" (dkey[r]) 480 dkey[r] = ekey[0]; 463 m128i_t *dkey = (m128i_t*)ctx->keyschdec; local
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/crypto/ |
H A D | des.c | 719 static void dkey(u32 *pe, const u8 *k) function 883 dkey(expkey, key); expkey += DES_EXPKEY_WORDS; key += DES_KEY_SIZE;
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/s390/cio/ |
H A D | qdio.c | 2793 irq_ptr->qdr->qdf0[i].dkey=QDIO_STORAGE_KEY; 2813 irq_ptr->qdr->qdf0[i+j].dkey=QDIO_STORAGE_KEY;
|