/external/dropbear/libtomcrypt/src/prngs/ |
rc4.c | 14 @file rc4.c 15 RC4 PRNG, Tom St Denis 18 #ifdef RC4 22 "rc4", 32, 43 prng->rc4.x = 0; 61 if (prng->rc4.x + inlen > 256) { 62 if (prng->rc4.x == 256) { 67 inlen = 256 - prng->rc4.x; 72 prng->rc4.buf[prng->rc4.x++] = *in++ [all...] |
/external/openssl/crypto/rc4/ |
rc4s.cpp | 35 #include <openssl/rc4.h> 59 RC4(&ctx,numm,buffer,buffer); 61 RC4(&ctx,numm,buffer,buffer); 64 RC4(&ctx,num,buffer,buffer); 66 RC4(&ctx,num,buffer,buffer); 69 printf("RC4 (%d bytes) %d %d (%d) - 8 bytes\n",num,
|
rc4_skey.c | 1 /* crypto/rc4/rc4_skey.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 59 #include <openssl/rc4.h> 63 const char RC4_version[]="RC4" OPENSSL_VERSION_PTEXT; 69 return("rc4(idx,char)"); 71 return("rc4(idx,int)"); 74 return("rc4(ptr,char)"); 76 return("rc4(ptr,int)"); 80 /* RC4 as implemented from a posting from 83 * Subject: RC4 Algorithm revealed [all...] |
rc4.h | 1 /* crypto/rc4/rc4.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #error RC4 is disabled. 83 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
|
rc4speed.c | 1 /* crypto/rc4/rc4speed.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 102 #include <openssl/rc4.h> 204 RC4(&sch,8,buf,buf); 233 printf("Doing RC4 on %ld byte blocks for 10 seconds\n",BUFSIZE); 236 printf("Doing RC4 %ld times on %ld byte blocks\n",cc,BUFSIZE); 240 RC4(&sch,BUFSIZE,buf,buf); 242 printf("%ld RC4's of %ld byte blocks in %.2f second\n", 246 printf("RC4 set_key per sec = %12.2f (%9.3fuS)\n",a,1.0e6/a); 247 printf("RC4 bytes per sec = %12.2f (%9.3fuS)\n",c,8.0e6/c) [all...] |
rc4test.c | 1 /* crypto/rc4/rc4test.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 68 printf("No RC4 support\n"); 72 #include <openssl/rc4.h> 133 RC4(&key,data_len[i],&(data[i][0]),obuf); 136 printf("error calculating RC4\n"); 156 RC4(&key,i,&(data[3][0]),obuf); 159 printf("error in RC4 length processing\n"); 183 RC4(&key,i,&(data[3][0]),obuf); 184 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])) [all...] |
rc4.c | 1 /* crypto/rc4/rc4.c */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rc4.h> 66 "usage: rc4 args\n", 156 i=EVP_read_pw_string(buf,BUFSIZ,"Enter RC4 password:",0); 179 RC4(&key,(unsigned int)i,(unsigned char *)buf,
|
rc4_utl.c | 1 /* crypto/rc4/rc4_utl.c -*- mode:C; c-file-style: "eay" -*- */ 54 #include <openssl/rc4.h> 59 fips_cipher_abort(RC4);
|
rrc4.doc | 4 Subject: RC4 Algorithm revealed. 16 America by reverse engineering the RC4 algorithm and 22 SUBJECT: RC4 Source Code 25 I've tested this. It is compatible with the RC4 object module 28 /* rc4.h */ 37 void rc4(unsigned char *buffer_ptr,int buffer_len,rc4_key * key); 40 /*rc4.c */ 41 #include "rc4.h" 69 void rc4(unsigned char *buffer_ptr, int buffer_len, rc4_key *key) 108 official RC4 object cod [all...] |
/external/openssl/crypto/rc4/asm/ |
rc4-md5-x86_64.pl | 12 # This is RC4+MD5 "stitch" implementation. The idea, as spelled in 16 # processor resources better and achieve better performance. RC4 17 # instruction sequence is virtually identical to rc4-x86_64.pl, which 20 # minimize register usage, which was used as "main thread" with RC4 21 # weaved into it, one RC4 round per one MD5 round. In addition to the 23 # md5_block_asm_data_order and RC4. Below are performance numbers in 27 # RC4 MD5 RC4+MD5 stitch gain 34 # (*) rc4-x86_64.pl delivers 5.3 on Opteron, so real improvement 37 my ($rc4,$md5)=(1,1); # what to generate [all...] |
rc4-s390x.pl | 46 # void RC4(RC4_KEY *key,size_t len,const void *inp,void *out) 61 .globl RC4 62 .type RC4,\@function 64 RC4: 155 .size RC4,.-RC4 156 .string "RC4 for s390x, CRYPTOGAMS by <appro\@openssl.org>" 230 .string "rc4(8x,char)"
|
/external/openssh/openbsd-compat/ |
bsd-arc4random.c | 30 #include <openssl/rc4.h> 40 static RC4_KEY rc4; variable 55 RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r); 68 memset(&rc4, 0, sizeof(rc4)); 72 RC4_set_key(&rc4, sizeof(rand_buf), rand_buf); 76 * http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps 79 RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 24 } rc4; member in union:crypto_cipher::__anon18433 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 113 ctx->u.rc4.used_bytes, crypt, len); 114 ctx->u.rc4.used_bytes += len; 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen [all...] |
rc4.c | 2 * RC4 stream cipher 23 /* Setup RC4 state */ 44 /* Apply RC4 to data */
|
crypto_libtomcrypt.c | 285 int rc4; member in struct:crypto_cipher 292 } rc4; member in union:crypto_cipher::__anon18440 302 int idx, res, rc4 = 0; local 319 rc4 = 1; 329 if (rc4) { 330 ctx->rc4 = 1; 331 if (key_len > sizeof(ctx->u.rc4.key)) { 335 ctx->u.rc4.keylen = key_len; 336 os_memcpy(ctx->u.rc4.key, key, key_len); 355 if (ctx->rc4) { [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
ARC4.java | 51 provider.addAlgorithm("Alg.Alias.Cipher.RC4", "ARC4"); 53 provider.addAlgorithm("Alg.Alias.KeyGenerator.RC4", "ARC4");
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
RC4Engine.java | 13 * variables to hold the state of the RC4 engine 23 * initialise a RC4 cipher. 38 * RC4 encryption and decryption is completely 48 throw new IllegalArgumentException("invalid parameter passed to RC4 init - " + params.getClass().getName()); 53 return "RC4";
|
/external/openssl/include/openssl/ |
rc4.h | 1 /* crypto/rc4/rc4.h */ 11 * apply to all code found in this distribution, be it the RC4, RSA, 64 #error RC4 is disabled. 83 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
|
/external/chromium/net/tools/flip_server/ |
constants.h | 23 #define SSL_CIPHER_LIST "!aNULL:!ADH:!eNull:!LOW:!EXP:RC4+RSA:MEDIUM:HIGH"
|
/external/dhcpcd/compat/ |
arc4random.c | 13 * compatible with RSA Labs "RC4" cipher (the actual description of 22 * RC4 is a registered trademark of RSA Laboratories. 122 * paper "Weaknesses in the Key Scheduling Algorithm of RC4"
|
/external/webkit/Source/JavaScriptCore/wtf/ |
CryptographicallyRandomNumber.cpp | 23 * compatible with RSA Labs "RC4" cipher (the actual description of 27 * RC4 is a registered trademark of RSA Laboratories. 108 // http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Rc4_ksa.ps
|
/libcore/luni/src/test/java/libcore/javax/crypto/ |
KeyGeneratorTest.java | 110 putKeySize("RC4", 40); 111 putKeySize("RC4", 41); 112 putKeySize("RC4", 1024);
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_prng.h | 11 #ifdef RC4 55 #ifdef RC4 56 struct rc4_prng rc4; member in union:Prng_state 145 #ifdef RC4
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
wpa_background.sgml | 34 algorithm for protecting wireless networks. WEP uses RC4 with 38 RC4 key scheduling is insufficient (beginning of the pseudorandom 47 hardware. It still uses RC4 for the encryption like WEP, but with 48 per-packet RC4 keys. In addition, it implements replay protection,
|
/hardware/broadcom/wlan/bcmdhd/dhdutil/include/proto/ |
eapol.h | 68 /* RC4 EAPOL-Key header field sizes */ 73 /* RC4 EAPOL-Key */ 86 /* RC4 EAPOL-Key flags */ 91 /* RC4 EAPOL-Key index */
|