/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
rc4.c | 2 * RC4 stream cipher 18 #include "rc4.h" 23 * rc4 - XOR RC4 stream to given data with skip-stream-start 24 * @key: RC4 key 25 * @keylen: RC4 key length 26 * @skip: number of bytes to skip from the beginning of the RC4 stream 27 * @data: data to be XOR'ed with RC4 stream 30 * Generate RC4 pseudo random stream for the given key, skip beginning of the 31 * stream, and XOR the end result with the data buffer to perform RC4 [all...] |
rc4.h | 2 * RC4 stream cipher
|
crypto_libtomcrypt.c | 19 #include "rc4.h" 292 int rc4; member in struct:crypto_cipher 299 } rc4; member in union:crypto_cipher::__anon15372 309 int idx, res, rc4 = 0; local 326 rc4 = 1; 336 if (rc4) { 337 ctx->rc4 = 1; 338 if (key_len > sizeof(ctx->u.rc4.key)) { 342 ctx->u.rc4.keylen = key_len; 343 os_memcpy(ctx->u.rc4.key, key, key_len) [all...] |
/external/dropbear/libtomcrypt/src/prngs/ |
rc4.c | 14 @file rc4.c 15 RC4 PRNG, Tom St Denis 18 #ifdef RC4 22 "rc4", 32, 43 prng->rc4.x = 0; 61 if (prng->rc4.x + inlen > 256) { 62 if (prng->rc4.x == 256) { 67 inlen = 256 - prng->rc4.x; 72 prng->rc4.buf[prng->rc4.x++] = *in++ [all...] |
/external/openssl/crypto/rc4/ |
rc4s.cpp | 35 #include <openssl/rc4.h> 59 RC4(&ctx,numm,buffer,buffer); 61 RC4(&ctx,numm,buffer,buffer); 64 RC4(&ctx,num,buffer,buffer); 66 RC4(&ctx,num,buffer,buffer); 69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
|
rc4_skey.c | 1 /* crypto/rc4/rc4_skey.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 59 #include <openssl/rc4.h> 63 const char RC4_version[]="RC4" OPENSSL_VERSION_PTEXT; 69 return("rc4(idx,char)"); 71 return("rc4(idx,int)"); 74 return("rc4(ptr,char)"); 76 return("rc4(ptr,int)"); 80 /* RC4 as implemented from a posting from 83 * Subject: RC4 Algorithm revealed [all...] |
rc4.h | 1 /* crypto/rc4/rc4.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #error RC4 is disabled. 83 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
|
rc4speed.c | 1 /* crypto/rc4/rc4speed.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 102 #include <openssl/rc4.h> 204 RC4(&sch,8,buf,buf); 233 printf("Doing RC4 on %ld byte blocks for 10 seconds\n",BUFSIZE); 236 printf("Doing RC4 %ld times on %ld byte blocks\n",cc,BUFSIZE); 240 RC4(&sch,BUFSIZE,buf,buf); 242 printf("%ld RC4's of %ld byte blocks in %.2f second\n", 246 printf("RC4 set_key per sec = %12.2f (%9.3fuS)\n",a,1.0e6/a); 247 printf("RC4 bytes per sec = %12.2f (%9.3fuS)\n",c,8.0e6/c) [all...] |
rc4test.c | 1 /* crypto/rc4/rc4test.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 68 printf("No RC4 support\n"); 72 #include <openssl/rc4.h> 133 RC4(&key,data_len[i],&(data[i][0]),obuf); 136 printf("error calculating RC4\n"); 156 RC4(&key,i,&(data[3][0]),obuf); 159 printf("error in RC4 length processing\n"); 183 RC4(&key,i,&(data[3][0]),obuf); 184 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])) [all...] |
rc4.c | 1 /* crypto/rc4/rc4.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rc4.h> 66 "usage: rc4 args\n", 156 i=EVP_read_pw_string(buf,BUFSIZ,"Enter RC4 password:",0); 179 RC4(&key,(unsigned int)i,(unsigned char *)buf,
|
rc4_utl.c | 1 /* crypto/rc4/rc4_utl.c -*- mode:C; c-file-style: "eay" -*- */ 54 #include <openssl/rc4.h> 59 fips_cipher_abort(RC4);
|
/external/openssl/crypto/rc4/asm/ |
rc4-md5-x86_64.pl | 12 # This is RC4+MD5 "stitch" implementation. The idea, as spelled in 16 # processor resources better and achieve better performance. RC4 17 # instruction sequence is virtually identical to rc4-x86_64.pl, which 20 # minimize register usage, which was used as "main thread" with RC4 21 # weaved into it, one RC4 round per one MD5 round. In addition to the 23 # md5_block_asm_data_order and RC4. Below are performance numbers in 27 # RC4 MD5 RC4+MD5 stitch gain 34 # (*) rc4-x86_64.pl delivers 5.3 on Opteron, so real improvement 37 my ($rc4,$md5)=(1,1); # what to generate [all...] |
rc4-s390x.pl | 46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 61 .globl RC4 62 .type RC4,\@function 64 RC4: 155 .size RC4,.-RC4 156 .string "RC4 for s390x, CRYPTOGAMS by <appro\@openssl.org>" 230 .string "rc4(8x,char)"
|
/external/openssh/openbsd-compat/ |
bsd-arc4random.c | 30 #include <openssl/rc4.h> 40 static RC4_KEY rc4; variable 55 RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r); 68 memset(&rc4, 0, sizeof(rc4)); 72 RC4_set_key(&rc4, sizeof(rand_buf), rand_buf); 76 * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps 79 RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
rc4.c | 2 * RC4 stream cipher 23 /* Setup RC4 state */ 44 /* Apply RC4 to data */
|
crypto_internal-cipher.c | 24 } rc4; member in union:crypto_cipher::__anon15582 58 if (key_len > sizeof(ctx->u.rc4.key)) { 62 ctx->u.rc4.keylen = key_len; 63 os_memcpy(ctx->u.rc4.key, key, key_len); 118 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 119 ctx->u.rc4.used_bytes, crypt, len); 120 ctx->u.rc4.used_bytes += len; 183 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen [all...] |
crypto_libtomcrypt.c | 285 int rc4; member in struct:crypto_cipher 292 } rc4; member in union:crypto_cipher::__anon15589 302 int idx, res, rc4 = 0; local 319 rc4 = 1; 329 if (rc4) { 330 ctx->rc4 = 1; 331 if (key_len > sizeof(ctx->u.rc4.key)) { 335 ctx->u.rc4.keylen = key_len; 336 os_memcpy(ctx->u.rc4.key, key, key_len); 355 if (ctx->rc4) { [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/symmetric/ |
ARC4.java | 44 put("Alg.Alias.Cipher.RC4", "ARC4"); 46 put("Alg.Alias.KeyGenerator.RC4", "ARC4");
|
/external/bouncycastle/src/main/java/org/bouncycastle/crypto/engines/ |
RC4Engine.java | 13 * variables to hold the state of the RC4 engine 23 * initialise a RC4 cipher. 38 * RC4 encryption and decryption is completely 48 throw new IllegalArgumentException("invalid parameter passed to RC4 init - " + params.getClass().getName()); 53 return "RC4";
|
/external/openssl/include/openssl/ |
rc4.h | 1 /* crypto/rc4/rc4.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #error RC4 is disabled. 83 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
|
/external/chromium/net/tools/flip_server/ |
constants.h | 23 #define SSL_CIPHER_LIST "!aNULL:!ADH:!eNull:!LOW:!EXP:RC4+RSA:MEDIUM:HIGH"
|
/external/dhcpcd/compat/ |
arc4random.c | 13 * compatible with RSA Labs "RC4" cipher (the actual description of 22 * RC4 is a registered trademark of RSA Laboratories. 122 * paper "Weaknesses in the Key Scheduling Algorithm of RC4"
|
/external/webkit/Source/JavaScriptCore/wtf/ |
CryptographicallyRandomNumber.cpp | 23 * compatible with RSA Labs "RC4" cipher (the actual description of 27 * RC4 is a registered trademark of RSA Laboratories. 108 // http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
KeyGeneratorTest.java | 110 putKeySize("RC4", 40); 111 putKeySize("RC4", 41); 112 putKeySize("RC4", 1024);
|
/external/wpa_supplicant_8/src/ap/ |
ieee802_1x.h | 22 /* RFC 3580, 4. RC4 EAPOL-Key Frame */ 43 * RC4 key used in encryption = Key-IV + MS-MPPE-Recv-Key */
|