HomeSort by relevance Sort by last modified time
    Searched full:rc4 (Results 1 - 25 of 591) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/wpa_supplicant/
rc4.c 2 * RC4 stream cipher
18 #include "rc4.h"
23 * rc4 - XOR RC4 stream to given data with skip-stream-start
24 * @key: RC4 key
25 * @keylen: RC4 key length
26 * @skip: number of bytes to skip from the beginning of the RC4 stream
27 * @data: data to be XOR'ed with RC4 stream
30 * Generate RC4 pseudo random stream for the given key, skip beginning of the
31 * stream, and XOR the end result with the data buffer to perform RC4
83 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len) function
    [all...]
rc4.h 2 * RC4 stream cipher
20 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len);
crypto_libtomcrypt.c 19 #include "rc4.h"
292 int rc4; member in struct:crypto_cipher
299 } rc4; member in union:crypto_cipher::__anon13657
309 int idx, res, rc4 = 0; local
326 rc4 = 1;
336 if (rc4) {
337 ctx->rc4 = 1;
338 if (key_len > sizeof(ctx->u.rc4.key)) {
342 ctx->u.rc4.keylen = key_len;
343 os_memcpy(ctx->u.rc4.key, key, key_len)
    [all...]
crypto_internal.c 21 #include "rc4.h"
237 } rc4; member in union:crypto_cipher::__anon13652
266 if (key_len > sizeof(ctx->u.rc4.key)) {
270 ctx->u.rc4.keylen = key_len;
271 os_memcpy(ctx->u.rc4.key, key, key_len);
318 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
319 ctx->u.rc4.used_bytes, crypt, len);
320 ctx->u.rc4.used_bytes += len;
369 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
rc4.c 2 * RC4 stream cipher
18 #include "rc4.h"
23 * rc4 - XOR RC4 stream to given data with skip-stream-start
24 * @key: RC4 key
25 * @keylen: RC4 key length
26 * @skip: number of bytes to skip from the beginning of the RC4 stream
27 * @data: data to be XOR'ed with RC4 stream
30 * Generate RC4 pseudo random stream for the given key, skip beginning of the
31 * stream, and XOR the end result with the data buffer to perform RC4
    [all...]
rc4.h 2 * RC4 stream cipher
crypto_libtomcrypt.c 19 #include "rc4.h"
292 int rc4; member in struct:crypto_cipher
299 } rc4; member in union:crypto_cipher::__anon13823
309 int idx, res, rc4 = 0; local
326 rc4 = 1;
336 if (rc4) {
337 ctx->rc4 = 1;
338 if (key_len > sizeof(ctx->u.rc4.key)) {
342 ctx->u.rc4.keylen = key_len;
343 os_memcpy(ctx->u.rc4.key, key, key_len)
    [all...]
  /external/dropbear/libtomcrypt/src/prngs/
rc4.c 14 @file rc4.c
15 RC4 PRNG, Tom St Denis
18 #ifdef RC4
22 "rc4", 32,
43 prng->rc4.x = 0;
61 if (prng->rc4.x + inlen > 256) {
62 if (prng->rc4.x == 256) {
67 inlen = 256 - prng->rc4.x;
72 prng->rc4.buf[prng->rc4.x++] = *in++
    [all...]
  /external/openssl/crypto/rc4/
rc4s.cpp 35 #include <openssl/rc4.h>
59 RC4(&ctx,numm,buffer,buffer);
61 RC4(&ctx,numm,buffer,buffer);
64 RC4(&ctx,num,buffer,buffer);
66 RC4(&ctx,num,buffer,buffer);
69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
rc4_skey.c 1 /* crypto/rc4/rc4_skey.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
59 #include <openssl/rc4.h>
63 const char RC4_version[]="RC4" OPENSSL_VERSION_PTEXT;
69 return("rc4(idx,char)");
71 return("rc4(idx,int)");
74 return("rc4(ptr,char)");
76 return("rc4(ptr,int)");
80 /* RC4 as implemented from a posting from
83 * Subject: RC4 Algorithm revealed
    [all...]
rc4.h 1 /* crypto/rc4/rc4.h */
11 * apply to all code found in this distribution, be it the RC4, RSA,
64 #error RC4 is disabled.
82 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
rc4speed.c 1 /* crypto/rc4/rc4speed.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
102 #include <openssl/rc4.h>
204 RC4(&sch,8,buf,buf);
233 printf("Doing RC4 on %ld byte blocks for 10 seconds\n",BUFSIZE);
236 printf("Doing RC4 %ld times on %ld byte blocks\n",cc,BUFSIZE);
240 RC4(&sch,BUFSIZE,buf,buf);
242 printf("%ld RC4's of %ld byte blocks in %.2f second\n",
246 printf("RC4 set_key per sec = %12.2f (%9.3fuS)\n",a,1.0e6/a);
247 printf("RC4 bytes per sec = %12.2f (%9.3fuS)\n",c,8.0e6/c)
    [all...]
rc4test.c 1 /* crypto/rc4/rc4test.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
68 printf("No RC4 support\n");
72 #include <openssl/rc4.h>
127 RC4(&key,data_len[i],&(data[i][0]),obuf);
130 printf("error calculating RC4\n");
150 RC4(&key,i,&(data[3][0]),obuf);
153 printf("error in RC4 length processing\n");
177 RC4(&key,i,&(data[3][0]),obuf);
178 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i]))
    [all...]
rc4.c 1 /* crypto/rc4/rc4.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
62 #include <openssl/rc4.h>
66 "usage: rc4 args\n",
156 i=EVP_read_pw_string(buf,BUFSIZ,"Enter RC4 password:",0);
179 RC4(&key,(unsigned int)i,(unsigned char *)buf,
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 30 } rc4; member in union:crypto_cipher::__anon14033
64 if (key_len > sizeof(ctx->u.rc4.key)) {
68 ctx->u.rc4.keylen = key_len;
69 os_memcpy(ctx->u.rc4.key, key, key_len);
124 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
125 ctx->u.rc4.used_bytes, crypt, len);
126 ctx->u.rc4.used_bytes += len;
189 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen
    [all...]
rc4.c 2 * RC4 stream cipher
29 /* Setup RC4 state */
50 /* Apply RC4 to data */
crypto_libtomcrypt.c 291 int rc4; member in struct:crypto_cipher
298 } rc4; member in union:crypto_cipher::__anon14040
308 int idx, res, rc4 = 0; local
325 rc4 = 1;
335 if (rc4) {
336 ctx->rc4 = 1;
337 if (key_len > sizeof(ctx->u.rc4.key)) {
341 ctx->u.rc4.keylen = key_len;
342 os_memcpy(ctx->u.rc4.key, key, key_len);
361 if (ctx->rc4) {
    [all...]
  /external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/symmetric/
ARC4.java 44 put("Alg.Alias.Cipher.RC4", "ARC4");
46 put("Alg.Alias.KeyGenerator.RC4", "ARC4");
  /external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/
RC4Engine.java 13 * variables to hold the state of the RC4 engine
23 * initialise a RC4 cipher.
38 * RC4 encryption and decryption is completely
48 throw new IllegalArgumentException("invalid parameter passed to RC4 init - " + params.getClass().getName());
53 return "RC4";
  /external/openssl/include/openssl/
rc4.h 1 /* crypto/rc4/rc4.h */
11 * apply to all code found in this distribution, be it the RC4, RSA,
64 #error RC4 is disabled.
82 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
  /external/chromium/net/tools/flip_server/
constants.h 23 #define SSL_CIPHER_LIST "!aNULL:!ADH:!eNull:!LOW:!EXP:RC4+RSA:MEDIUM:HIGH"
  /external/openssl/crypto/rc4/asm/
rc4-s390x.pl 23 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out)
38 .globl RC4
39 .type RC4,\@function
41 RC4:
127 .size RC4,.-RC4
128 .string "RC4 for s390x, CRYPTOGAMS by <appro\@openssl.org>"
202 .string "rc4(8x,char)"
  /external/dhcpcd/compat/
arc4random.c 13 * compatible with RSA Labs "RC4" cipher (the actual description of
22 * RC4 is a registered trademark of RSA Laboratories.
122 * paper "Weaknesses in the Key Scheduling Algorithm of RC4"
  /external/webkit/Source/JavaScriptCore/wtf/
CryptographicallyRandomNumber.cpp 23 * compatible with RSA Labs "RC4" cipher (the actual description of
27 * RC4 is a registered trademark of RSA Laboratories.
108 // http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
  /libcore/luni/src/test/java/libcore/javax/crypto/
KeyGeneratorTest.java 110 putKeySize("RC4", 40);
111 putKeySize("RC4", 41);
112 putKeySize("RC4", 1024);

Completed in 285 milliseconds

1 2 3 4 5 6 7 8 91011>>