comparison src/cipher.c @ 14035:8bda65b88e49

[gaim-migrate @ 16638] A bunch of small changes. Mostly remove "if not null" checks before calling g_free, g_list_free, g_slist_free and g_strdup. Also use g_list_foreach() to call g_free to free strings in an array. And some whitespace changes here and there. committer: Tailor Script <tailor@pidgin.im>
author Mark Doliner <mark@kingant.net>
date Sat, 05 Aug 2006 08:27:39 +0000
parents ff94569010f5
children
comparison
equal deleted inserted replaced
14034:0839a7b71325 14035:8bda65b88e49
8 * Original md5 8 * Original md5
9 * Copyright (C) 2001-2003 Christophe Devine <c.devine@cr0.net> 9 * Copyright (C) 2001-2003 Christophe Devine <c.devine@cr0.net>
10 * 10 *
11 * Original md4 taken from linux kernel 11 * Original md4 taken from linux kernel
12 * MD4 Message Digest Algorithm (RFC1320). 12 * MD4 Message Digest Algorithm (RFC1320).
13 * 13 *
14 * Implementation derived from Andrew Tridgell and Steve French's 14 * Implementation derived from Andrew Tridgell and Steve French's
15 * CIFS MD4 implementation, and the cryptoapi implementation 15 * CIFS MD4 implementation, and the cryptoapi implementation
16 * originally based on the public domain implementation written 16 * originally based on the public domain implementation written
17 * by Colin Plumb in 1993. 17 * by Colin Plumb in 1993.
18 * 18 *
24 * 24 *
25 * Original des taken from gpg 25 * Original des taken from gpg
26 * 26 *
27 * des.c - DES and Triple-DES encryption/decryption Algorithm 27 * des.c - DES and Triple-DES encryption/decryption Algorithm
28 * Copyright (C) 1998 Free Software Foundation, Inc. 28 * Copyright (C) 1998 Free Software Foundation, Inc.
29 * 29 *
30 * Please see below for more legal information! 30 * Please see below for more legal information!
31 * 31 *
32 * According to the definition of DES in FIPS PUB 46-2 from December 1993. 32 * According to the definition of DES in FIPS PUB 46-2 from December 1993.
33 * For a description of triple encryption, see: 33 * For a description of triple encryption, see:
34 * Bruce Schneier: Applied Cryptography. Second Edition. 34 * Bruce Schneier: Applied Cryptography. Second Edition.
35 * John Wiley & Sons, 1996. ISBN 0-471-12845-7. Pages 358 ff. 35 * John Wiley & Sons, 1996. ISBN 0-471-12845-7. Pages 358 ff.
36 * 36 *
37 * This file is part of GnuPG. 37 * This file is part of GnuPG.
38 * 38 *
39 * This program is free software; you can redistribute it and/or modify 39 * This program is free software; you can redistribute it and/or modify
40 * it under the terms of the GNU General Public License as published by 40 * it under the terms of the GNU General Public License as published by
41 * the Free Software Foundation; either version 2 of the License, or 41 * the Free Software Foundation; either version 2 of the License, or
42 * (at your option) any later version. 42 * (at your option) any later version.
43 * 43 *