/external/boringssl/src/crypto/cipher/ |
e_rc4.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 62 #include <openssl/rc4.h> 77 RC4(rc4key, in_len, in, out); 81 static const EVP_CIPHER rc4 = { variable 87 const EVP_CIPHER *EVP_rc4(void) { return &rc4; }
|
/external/wpa_supplicant_8/src/crypto/ |
crypto_internal-cipher.c | 24 } rc4; member in union:crypto_cipher::__anon28311 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 113 ctx->u.rc4.used_bytes, crypt, len); 114 ctx->u.rc4.used_bytes += len; 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen [all...] |
crypto_libtomcrypt.c | 285 int rc4; member in struct:crypto_cipher 292 } rc4; member in union:crypto_cipher::__anon28318 302 int idx, res, rc4 = 0; local 319 rc4 = 1; 329 if (rc4) { 330 ctx->rc4 = 1; 331 if (key_len > sizeof(ctx->u.rc4.key)) { 335 ctx->u.rc4.keylen = key_len; 336 os_memcpy(ctx->u.rc4.key, key, key_len); 355 if (ctx->rc4) { [all...] |
Makefile | 40 rc4.o \
|
/external/boringssl/src/crypto/cipher/test/ |
make_all_legacy_aead_tests.sh | 5 go run make_legacy_aead_tests.go -cipher rc4 -mac md5 > rc4_md5_tls_tests.txt 6 go run make_legacy_aead_tests.go -cipher rc4 -mac sha1 > rc4_sha1_tls_tests.txt 20 go run make_legacy_aead_tests.go -cipher rc4 -mac md5 -ssl3 > rc4_md5_ssl3_tests.txt 21 go run make_legacy_aead_tests.go -cipher rc4 -mac sha1 -ssl3 > rc4_sha1_ssl3_tests.txt
|
make_legacy_aead_tests.go | 10 "crypto/rc4" 28 cipher *rc4.Cipher 32 cipher, err := rc4.NewCipher([]byte(seed)) 63 case "rc4": 188 if *bulkCipher == "rc4" { 193 stream, err := rc4.NewCipher(encKey) 313 if *bulkCipher != "rc4" {
|
/prebuilts/go/darwin-x86/src/crypto/rc4/ |
rc4_asm.go | 7 package rc4 package
|
rc4_ref.go | 7 package rc4 package
|
rc4.go | 5 // Package rc4 implements RC4 encryption, as defined in Bruce Schneier's 7 package rc4 package 9 // BUG(agl): RC4 is in common use but has design weaknesses that make 14 // A Cipher is an instance of RC4 using a particular key. 23 return "crypto/rc4: invalid key size " + strconv.Itoa(int(k)) 27 // RC4 key, at least 1 byte and at most 256 bytes.
|
rc4_test.go | 5 package rc4 package 33 // Test vectors from the Wikipedia page: http://en.wikipedia.org/wiki/RC4
|
/prebuilts/go/linux-x86/src/crypto/rc4/ |
rc4_asm.go | 7 package rc4 package
|
rc4_ref.go | 7 package rc4 package
|
rc4.go | 5 // Package rc4 implements RC4 encryption, as defined in Bruce Schneier's 7 package rc4 package 9 // BUG(agl): RC4 is in common use but has design weaknesses that make 14 // A Cipher is an instance of RC4 using a particular key. 23 return "crypto/rc4: invalid key size " + strconv.Itoa(int(k)) 27 // RC4 key, at least 1 byte and at most 256 bytes.
|
rc4_test.go | 5 package rc4 package 33 // Test vectors from the Wikipedia page: http://en.wikipedia.org/wiki/RC4
|
/external/autotest/docs/ |
test-that.md | 64 $ test_that -b lumpy -i lumpy-paladin/R38-6009.0.0-rc4 :lab: dummy_Pass 69 lumpy-paladin/R38-6009.0.0-rc4. The lab's scheduler will take responsibility
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
ARC4.java | 99 provider.addAlgorithm("Alg.Alias.Cipher", PKCSObjectIdentifiers.rc4, "ARC4"); 101 provider.addAlgorithm("Alg.Alias.Cipher.RC4", "ARC4"); 103 provider.addAlgorithm("Alg.Alias.KeyGenerator.RC4", "ARC4");
|
/external/boringssl/ |
sources.mk | 185 src/crypto/rc4/rc4.c\ 364 linux-x86/crypto/rc4/rc4-586.S\ 383 linux-x86_64/crypto/rc4/rc4-x86_64.S\ 397 mac-x86/crypto/rc4/rc4-586.S\ 416 mac-x86_64/crypto/rc4/rc4-x86_64.S [all...] |
/external/boringssl/src/crypto/rc4/ |
rc4.c | 10 * apply to all code found in this distribution, be it the RC4, RSA, 57 #include <openssl/rc4.h> 71 /* RC4 as implemented from a posting from 74 * Subject: RC4 Algorithm revealed. 78 void RC4(RC4_KEY *key, size_t len, const uint8_t *in, uint8_t *out) { 274 void RC4(RC4_KEY *key, size_t len, const uint8_t *in, uint8_t *out) {
|
/bionic/libm/upstream-freebsd/lib/msun/ld128/ |
s_erfl.c | 177 rc4 = -2.04415631865861549920184039902945685e4L, /* 0xc00d3f66, 0x40b3fc04, 0x5388f2ec, 0xb009e1f0 */ variable 318 R=rc0+s*(rc1+s*(rc2+s*(rc3+s*(rc4+s*(rc5+s*(rc6+s*(rc7+
|
/prebuilts/go/darwin-x86/src/go/internal/gccgoimporter/ |
gccgoinstallation_test.go | 36 "crypto/rc4",
|
/prebuilts/go/darwin-x86/test/stress/ |
parsego.go | 105 "crypto/rc4",
|
/prebuilts/go/linux-x86/src/go/internal/gccgoimporter/ |
gccgoinstallation_test.go | 36 "crypto/rc4",
|
/prebuilts/go/linux-x86/test/stress/ |
parsego.go | 105 "crypto/rc4",
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
PKCSObjectIdentifiers.java | 90 static final ASN1ObjectIdentifier rc4 = encryptionAlgorithm.branch("4"); field in interface:PKCSObjectIdentifiers
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 12 "crypto/rc4" 77 // and RC4 comes before AES (because of the Lucky13 attack). 96 cipher, _ := rc4.NewCipher(key)
|