HomeSort by relevance Sort by last modified time
    Searched full:rc4 (Results 1 - 25 of 601) sorted by null

1 2 3 4 5 6 7 8 91011>>

  /external/dropbear/libtomcrypt/src/prngs/
rc4.c 14 @file rc4.c
15 RC4 PRNG, Tom St Denis
18 #ifdef RC4
22 "rc4", 32,
43 prng->rc4.x = 0;
61 if (prng->rc4.x + inlen > 256) {
62 if (prng->rc4.x == 256) {
67 inlen = 256 - prng->rc4.x;
72 prng->rc4.buf[prng->rc4.x++] = *in++
    [all...]
  /external/openssl/crypto/rc4/
rc4s.cpp 35 #include <openssl/rc4.h>
59 RC4(&ctx,numm,buffer,buffer);
61 RC4(&ctx,numm,buffer,buffer);
64 RC4(&ctx,num,buffer,buffer);
66 RC4(&ctx,num,buffer,buffer);
69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
rc4_skey.c 1 /* crypto/rc4/rc4_skey.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
59 #include <openssl/rc4.h>
63 const char RC4_version[]="RC4" OPENSSL_VERSION_PTEXT;
69 return("rc4(idx,char)");
71 return("rc4(idx,int)");
74 return("rc4(ptr,char)");
76 return("rc4(ptr,int)");
80 /* RC4 as implemented from a posting from
83 * Subject: RC4 Algorithm revealed
    [all...]
rc4.h 1 /* crypto/rc4/rc4.h */
11 * apply to all code found in this distribution, be it the RC4, RSA,
64 #error RC4 is disabled.
83 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
rc4speed.c 1 /* crypto/rc4/rc4speed.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
102 #include <openssl/rc4.h>
204 RC4(&sch,8,buf,buf);
233 printf("Doing RC4 on %ld byte blocks for 10 seconds\n",BUFSIZE);
236 printf("Doing RC4 %ld times on %ld byte blocks\n",cc,BUFSIZE);
240 RC4(&sch,BUFSIZE,buf,buf);
242 printf("%ld RC4's of %ld byte blocks in %.2f second\n",
246 printf("RC4 set_key per sec = %12.2f (%9.3fuS)\n",a,1.0e6/a);
247 printf("RC4 bytes per sec = %12.2f (%9.3fuS)\n",c,8.0e6/c)
    [all...]
rc4test.c 1 /* crypto/rc4/rc4test.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
68 printf("No RC4 support\n");
72 #include <openssl/rc4.h>
133 RC4(&key,data_len[i],&(data[i][0]),obuf);
136 printf("error calculating RC4\n");
156 RC4(&key,i,&(data[3][0]),obuf);
159 printf("error in RC4 length processing\n");
183 RC4(&key,i,&(data[3][0]),obuf);
184 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i]))
    [all...]
rc4.c 1 /* crypto/rc4/rc4.c */
11 * apply to all code found in this distribution, be it the RC4, RSA,
62 #include <openssl/rc4.h>
66 "usage: rc4 args\n",
156 i=EVP_read_pw_string(buf,BUFSIZ,"Enter RC4 password:",0);
179 RC4(&key,(unsigned int)i,(unsigned char *)buf,
rc4_utl.c 1 /* crypto/rc4/rc4_utl.c -*- mode:C; c-file-style: "eay" -*- */
54 #include <openssl/rc4.h>
59 fips_cipher_abort(RC4);
rrc4.doc 4 Subject: RC4 Algorithm revealed.
16 America by reverse engineering the RC4 algorithm and
22 SUBJECT: RC4 Source Code
25 I've tested this. It is compatible with the RC4 object module
28 /* rc4.h */
37 void rc4(unsigned char *buffer_ptr,int buffer_len,rc4_key * key);
40 /*rc4.c */
41 #include "rc4.h"
69 void rc4(unsigned char *buffer_ptr, int buffer_len, rc4_key *key)
108 official RC4 object cod
    [all...]
  /external/openssl/crypto/rc4/asm/
rc4-md5-x86_64.pl 12 # This is RC4+MD5 "stitch" implementation. The idea, as spelled in
16 # processor resources better and achieve better performance. RC4
17 # instruction sequence is virtually identical to rc4-x86_64.pl, which
20 # minimize register usage, which was used as "main thread" with RC4
21 # weaved into it, one RC4 round per one MD5 round. In addition to the
23 # md5_block_asm_data_order and RC4. Below are performance numbers in
27 # RC4 MD5 RC4+MD5 stitch gain
34 # (*) rc4-x86_64.pl delivers 5.3 on Opteron, so real improvement
37 my ($rc4,$md5)=(1,1); # what to generate
    [all...]
rc4-s390x.pl 46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out)
61 .globl RC4
62 .type RC4,\@function
64 RC4:
155 .size RC4,.-RC4
156 .string "RC4 for s390x, CRYPTOGAMS by <appro\@openssl.org>"
230 .string "rc4(8x,char)"
  /external/openssh/openbsd-compat/
bsd-arc4random.c 30 #include <openssl/rc4.h>
40 static RC4_KEY rc4; variable
55 RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r);
68 memset(&rc4, 0, sizeof(rc4));
72 RC4_set_key(&rc4, sizeof(rand_buf), rand_buf);
76 * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
79 RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf)
    [all...]
  /external/wpa_supplicant_8/src/crypto/
crypto_internal-cipher.c 24 } rc4; member in union:crypto_cipher::__anon18433
57 if (key_len > sizeof(ctx->u.rc4.key)) {
61 ctx->u.rc4.keylen = key_len;
62 os_memcpy(ctx->u.rc4.key, key, key_len);
112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen,
113 ctx->u.rc4.used_bytes, crypt, len);
114 ctx->u.rc4.used_bytes += len;
176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen
    [all...]
rc4.c 2 * RC4 stream cipher
23 /* Setup RC4 state */
44 /* Apply RC4 to data */
crypto_libtomcrypt.c 285 int rc4; member in struct:crypto_cipher
292 } rc4; member in union:crypto_cipher::__anon18440
302 int idx, res, rc4 = 0; local
319 rc4 = 1;
329 if (rc4) {
330 ctx->rc4 = 1;
331 if (key_len > sizeof(ctx->u.rc4.key)) {
335 ctx->u.rc4.keylen = key_len;
336 os_memcpy(ctx->u.rc4.key, key, key_len);
355 if (ctx->rc4) {
    [all...]
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/
ARC4.java 51 provider.addAlgorithm("Alg.Alias.Cipher.RC4", "ARC4");
53 provider.addAlgorithm("Alg.Alias.KeyGenerator.RC4", "ARC4");
  /external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/
RC4Engine.java 13 * variables to hold the state of the RC4 engine
23 * initialise a RC4 cipher.
38 * RC4 encryption and decryption is completely
48 throw new IllegalArgumentException("invalid parameter passed to RC4 init - " + params.getClass().getName());
53 return "RC4";
  /external/openssl/include/openssl/
rc4.h 1 /* crypto/rc4/rc4.h */
11 * apply to all code found in this distribution, be it the RC4, RSA,
64 #error RC4 is disabled.
83 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
  /external/chromium/net/tools/flip_server/
constants.h 23 #define SSL_CIPHER_LIST "!aNULL:!ADH:!eNull:!LOW:!EXP:RC4+RSA:MEDIUM:HIGH"
  /external/dhcpcd/compat/
arc4random.c 13 * compatible with RSA Labs "RC4" cipher (the actual description of
22 * RC4 is a registered trademark of RSA Laboratories.
122 * paper "Weaknesses in the Key Scheduling Algorithm of RC4"
  /external/webkit/Source/JavaScriptCore/wtf/
CryptographicallyRandomNumber.cpp 23 * compatible with RSA Labs "RC4" cipher (the actual description of
27 * RC4 is a registered trademark of RSA Laboratories.
108 // http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
  /libcore/luni/src/test/java/libcore/javax/crypto/
KeyGeneratorTest.java 110 putKeySize("RC4", 40);
111 putKeySize("RC4", 41);
112 putKeySize("RC4", 1024);
  /external/dropbear/libtomcrypt/src/headers/
tomcrypt_prng.h 11 #ifdef RC4
55 #ifdef RC4
56 struct rc4_prng rc4; member in union:Prng_state
145 #ifdef RC4
  /external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
wpa_background.sgml 34 algorithm for protecting wireless networks. WEP uses RC4 with
38 RC4 key scheduling is insufficient (beginning of the pseudorandom
47 hardware. It still uses RC4 for the encryption like WEP, but with
48 per-packet RC4 keys. In addition, it implements replay protection,
  /hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/
eapol.h 68 /* RC4 EAPOL-Key header field sizes */
73 /* RC4 EAPOL-Key */
86 /* RC4 EAPOL-Key flags */
91 /* RC4 EAPOL-Key index */

Completed in 1137 milliseconds

1 2 3 4 5 6 7 8 91011>>