/external/wpa_supplicant/ |
rc4.c | 2 * RC4 stream cipher 18 #include "rc4.h" 23 * rc4 - XOR RC4 stream to given data with skip-stream-start 24 * @key: RC4 key 25 * @keylen: RC4 key length 26 * @skip: number of bytes to skip from the beginning of the RC4 stream 27 * @data: data to be XOR'ed with RC4 stream 30 * Generate RC4 pseudo random stream for the given key, skip beginning of the 31 * stream, and XOR the end result with the data buffer to perform RC4 83 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len) function [all...] |
rc4.h | 2 * RC4 stream cipher 20 void rc4(u8 *buf, size_t len, const u8 *key, size_t key_len);
|
crypto_libtomcrypt.c | 19 #include "rc4.h" 292 int rc4; member in struct:crypto_cipher 299 } rc4; member in union:crypto_cipher::__anon13657 309 int idx, res, rc4 = 0; local 326 rc4 = 1; 336 if (rc4) { 337 ctx->rc4 = 1; 338 if (key_len > sizeof(ctx->u.rc4.key)) { 342 ctx->u.rc4.keylen = key_len; 343 os_memcpy(ctx->u.rc4.key, key, key_len) [all...] |
crypto_internal.c | 21 #include "rc4.h" 237 } rc4; member in union:crypto_cipher::__anon13652 266 if (key_len > sizeof(ctx->u.rc4.key)) { 270 ctx->u.rc4.keylen = key_len; 271 os_memcpy(ctx->u.rc4.key, key, key_len); 318 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 319 ctx->u.rc4.used_bytes, crypt, len); 320 ctx->u.rc4.used_bytes += len; 369 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
rc4.c | 2 * RC4 stream cipher 18 #include "rc4.h" 23 * rc4 - XOR RC4 stream to given data with skip-stream-start 24 * @key: RC4 key 25 * @keylen: RC4 key length 26 * @skip: number of bytes to skip from the beginning of the RC4 stream 27 * @data: data to be XOR'ed with RC4 stream 30 * Generate RC4 pseudo random stream for the given key, skip beginning of the 31 * stream, and XOR the end result with the data buffer to perform RC4 [all...] |
rc4.h | 2 * RC4 stream cipher
|
crypto_libtomcrypt.c | 19 #include "rc4.h" 292 int rc4; member in struct:crypto_cipher 299 } rc4; member in union:crypto_cipher::__anon13823 309 int idx, res, rc4 = 0; local 326 rc4 = 1; 336 if (rc4) { 337 ctx->rc4 = 1; 338 if (key_len > sizeof(ctx->u.rc4.key)) { 342 ctx->u.rc4.keylen = key_len; 343 os_memcpy(ctx->u.rc4.key, key, key_len) [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
rc4.c | 14 @file rc4.c 15 RC4 PRNG, Tom St Denis 18 #ifdef RC4 22 "rc4", 32, 43 prng->rc4.x = 0; 61 if (prng->rc4.x + inlen > 256) { 62 if (prng->rc4.x == 256) { 67 inlen = 256 - prng->rc4.x; 72 prng->rc4.buf[prng->rc4.x++] = *in++ [all...] |
/external/openssl/crypto/rc4/ |
rc4s.cpp | 35 #include <openssl/rc4.h> 59 RC4(&ctx,numm,buffer,buffer); 61 RC4(&ctx,numm,buffer,buffer); 64 RC4(&ctx,num,buffer,buffer); 66 RC4(&ctx,num,buffer,buffer); 69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
|
rc4_skey.c | 1 /* crypto/rc4/rc4_skey.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 59 #include <openssl/rc4.h> 63 const char RC4_version[]="RC4" OPENSSL_VERSION_PTEXT; 69 return("rc4(idx,char)"); 71 return("rc4(idx,int)"); 74 return("rc4(ptr,char)"); 76 return("rc4(ptr,int)"); 80 /* RC4 as implemented from a posting from 83 * Subject: RC4 Algorithm revealed [all...] |
rc4.h | 1 /* crypto/rc4/rc4.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #error RC4 is disabled. 82 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
|
rc4speed.c | 1 /* crypto/rc4/rc4speed.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 102 #include <openssl/rc4.h> 204 RC4(&sch,8,buf,buf); 233 printf("Doing RC4 on %ld byte blocks for 10 seconds\n",BUFSIZE); 236 printf("Doing RC4 %ld times on %ld byte blocks\n",cc,BUFSIZE); 240 RC4(&sch,BUFSIZE,buf,buf); 242 printf("%ld RC4's of %ld byte blocks in %.2f second\n", 246 printf("RC4 set_key per sec = %12.2f (%9.3fuS)\n",a,1.0e6/a); 247 printf("RC4 bytes per sec = %12.2f (%9.3fuS)\n",c,8.0e6/c) [all...] |
rc4test.c | 1 /* crypto/rc4/rc4test.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 68 printf("No RC4 support\n"); 72 #include <openssl/rc4.h> 127 RC4(&key,data_len[i],&(data[i][0]),obuf); 130 printf("error calculating RC4\n"); 150 RC4(&key,i,&(data[3][0]),obuf); 153 printf("error in RC4 length processing\n"); 177 RC4(&key,i,&(data[3][0]),obuf); 178 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])) [all...] |
rc4.c | 1 /* crypto/rc4/rc4.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rc4.h> 66 "usage: rc4 args\n", 156 i=EVP_read_pw_string(buf,BUFSIZ,"Enter RC4 password:",0); 179 RC4(&key,(unsigned int)i,(unsigned char *)buf,
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 30 } rc4; member in union:crypto_cipher::__anon14033 64 if (key_len > sizeof(ctx->u.rc4.key)) { 68 ctx->u.rc4.keylen = key_len; 69 os_memcpy(ctx->u.rc4.key, key, key_len); 124 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 125 ctx->u.rc4.used_bytes, crypt, len); 126 ctx->u.rc4.used_bytes += len; 189 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen [all...] |
rc4.c | 2 * RC4 stream cipher 29 /* Setup RC4 state */ 50 /* Apply RC4 to data */
|
crypto_libtomcrypt.c | 291 int rc4; member in struct:crypto_cipher 298 } rc4; member in union:crypto_cipher::__anon14040 308 int idx, res, rc4 = 0; local 325 rc4 = 1; 335 if (rc4) { 336 ctx->rc4 = 1; 337 if (key_len > sizeof(ctx->u.rc4.key)) { 341 ctx->u.rc4.keylen = key_len; 342 os_memcpy(ctx->u.rc4.key, key, key_len); 361 if (ctx->rc4) { [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/symmetric/ |
ARC4.java | 44 put("Alg.Alias.Cipher.RC4", "ARC4"); 46 put("Alg.Alias.KeyGenerator.RC4", "ARC4");
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
RC4Engine.java | 13 * variables to hold the state of the RC4 engine 23 * initialise a RC4 cipher. 38 * RC4 encryption and decryption is completely 48 throw new IllegalArgumentException("invalid parameter passed to RC4 init - " + params.getClass().getName()); 53 return "RC4";
|
/external/openssl/include/openssl/ |
rc4.h | 1 /* crypto/rc4/rc4.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #error RC4 is disabled. 82 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
|
/external/chromium/net/tools/flip_server/ |
constants.h | 23 #define SSL_CIPHER_LIST "!aNULL:!ADH:!eNull:!LOW:!EXP:RC4+RSA:MEDIUM:HIGH"
|
/external/openssl/crypto/rc4/asm/ |
rc4-s390x.pl | 23 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 38 .globl RC4 39 .type RC4,\@function 41 RC4: 127 .size RC4,.-RC4 128 .string "RC4 for s390x, CRYPTOGAMS by <appro\@openssl.org>" 202 .string "rc4(8x,char)"
|
/external/dhcpcd/compat/ |
arc4random.c | 13 * compatible with RSA Labs "RC4" cipher (the actual description of 22 * RC4 is a registered trademark of RSA Laboratories. 122 * paper "Weaknesses in the Key Scheduling Algorithm of RC4"
|
/external/webkit/Source/JavaScriptCore/wtf/ |
CryptographicallyRandomNumber.cpp | 23 * compatible with RSA Labs "RC4" cipher (the actual description of 27 * RC4 is a registered trademark of RSA Laboratories. 108 // http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
KeyGeneratorTest.java | 110 putKeySize("RC4", 40); 111 putKeySize("RC4", 41); 112 putKeySize("RC4", 1024);
|