/third_party/openssl/test/recipes/30-test_evp_data/ |
D | evpciph_rc4.txt | 9 Title = RC4 tests 12 Cipher = RC4 18 Cipher = RC4 24 Cipher = RC4 30 Cipher = RC4 36 Cipher = RC4 42 Cipher = RC4 47 Title = RC4 tests (From RFC6229) 50 Cipher = RC4-40 56 Cipher = RC4-40 [all …]
|
D | evpciph_rc4_stitched.txt | 1 Title = RC4-HMAC-MD5 test vectors 4 Cipher = RC4-HMAC-MD5 15 Cipher = RC4-HMAC-MD5
|
/third_party/typescript/tests/baselines/reference/ |
D | tsxUnionElementType3.types | 51 class RC4 extends React.Component<{}, {}> { 52 >RC4 : RC4 65 var EmptyRCComp = RC3 || RC4; 67 >RC3 || RC4 : typeof RC3 69 >RC4 : typeof RC4 71 var PartRCComp = RC1 || RC4; 72 >PartRCComp : typeof RC4 73 >RC1 || RC4 : typeof RC4 75 >RC4 : typeof RC4 104 >PartRCComp : typeof RC4 [all …]
|
D | tsxUnionElementType4.types | 51 class RC4 extends React.Component<{}, {}> { 52 >RC4 : RC4 71 var EmptyRCComp = RC3 || RC4; 73 >RC3 || RC4 : typeof RC3 75 >RC4 : typeof RC4 77 var PartRCComp = RC1 || RC4; 78 >PartRCComp : typeof RC4 79 >RC1 || RC4 : typeof RC4 81 >RC4 : typeof RC4 93 >PartRCComp : typeof RC4
|
D | tsxUnionElementType4.js | 23 class RC4 extends React.Component<{}, {}> { 30 var EmptyRCComp = RC3 || RC4; 31 var PartRCComp = RC1 || RC4; 88 var RC4 = /** @class */ (function (_super) { class 89 __extends(RC4, _super); 90 function RC4() { class in RC4 93 RC4.prototype.render = function () { 96 return RC4; 99 var EmptyRCComp = RC3 || RC4; 100 var PartRCComp = RC1 || RC4;
|
D | tsxUnionElementType3.js | 23 class RC4 extends React.Component<{}, {}> { 29 var EmptyRCComp = RC3 || RC4; 30 var PartRCComp = RC1 || RC4; 89 var RC4 = /** @class */ (function (_super) { class 90 __extends(RC4, _super); 91 function RC4() { class in RC4 94 RC4.prototype.render = function () { 97 return RC4; 99 var EmptyRCComp = RC3 || RC4; 100 var PartRCComp = RC1 || RC4;
|
D | tsxUnionElementType4.symbols | 48 class RC4 extends React.Component<{}, {}> { 49 >RC4 : Symbol(RC4, Decl(file.tsx, 19, 1)) 55 >render : Symbol(RC4.render, Decl(file.tsx, 21, 43)) 66 var EmptyRCComp = RC3 || RC4; 69 >RC4 : Symbol(RC4, Decl(file.tsx, 19, 1)) 71 var PartRCComp = RC1 || RC4; 74 >RC4 : Symbol(RC4, Decl(file.tsx, 19, 1))
|
D | tsxUnionElementType3.symbols | 48 class RC4 extends React.Component<{}, {}> { 49 >RC4 : Symbol(RC4, Decl(file.tsx, 19, 1)) 55 >render : Symbol(RC4.render, Decl(file.tsx, 21, 43)) 61 var EmptyRCComp = RC3 || RC4; 64 >RC4 : Symbol(RC4, Decl(file.tsx, 19, 1)) 66 var PartRCComp = RC1 || RC4; 69 >RC4 : Symbol(RC4, Decl(file.tsx, 19, 1))
|
D | tsxUnionElementType4.errors.txt | 2 … is not assignable to type 'IntrinsicAttributes & IntrinsicClassAttributes<RC4> & { children?: Rea… 3 …Property 'x' does not exist on type 'IntrinsicAttributes & IntrinsicClassAttributes<RC4> & { child… 30 class RC4 extends React.Component<{}, {}> { 37 var EmptyRCComp = RC3 || RC4; 38 var PartRCComp = RC1 || RC4; 46 … is not assignable to type 'IntrinsicAttributes & IntrinsicClassAttributes<RC4> & { children?: Rea… 47 …'x' does not exist on type 'IntrinsicAttributes & IntrinsicClassAttributes<RC4> & { children?: Rea…
|
D | tsxUnionElementType3.errors.txt | 26 class RC4 extends React.Component<{}, {}> { 32 var EmptyRCComp = RC3 || RC4; 33 var PartRCComp = RC1 || RC4;
|
/third_party/openssl/doc/man3/ |
D | RC4_set_key.pod | 5 RC4_set_key, RC4 - RC4 encryption 17 void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata, 26 This library implements the Alleged RC4 cipher, which is described for 28 with RC4[TM], a proprietary cipher of RSA Security Inc. 30 RC4 is a stream cipher with variable key length. Typically, 128 bit 34 RC4 consists of a key setup phase and the actual encryption or 40 RC4() encrypts or decrypts the B<len> bytes of data at B<indata> using 41 B<key> and places the result at B<outdata>. Repeated RC4() calls with 44 Since RC4 is a stream cipher (the input is XORed with a pseudo-random 50 RC4_set_key() and RC4() do not return values.
|
D | EVP_rc4.pod | 8 - EVP RC4 stream cipher 20 The RC4 stream cipher for EVP. 26 RC4 stream cipher. This is a variable key length cipher with a default key 31 RC4 stream cipher with 40 bit key length. 38 Authenticated encryption with the RC4 stream cipher with MD5 as HMAC.
|
/third_party/openssl/doc/man7/ |
D | EVP_CIPHER-RC4.pod | 5 EVP_CIPHER-RC4 - The RC4 EVP_CIPHER implementations 9 Support for RC4 symmetric encryption using the B<EVP_CIPHER> API. 17 =item "RC4" 19 =item "RC4-40" 21 =item "RC4-HMAC-MD5"
|
D | OSSL_PROVIDER-legacy.pod | 74 =item RC4, see L<EVP_CIPHER-RC4(7)>
|
/third_party/openssl/test/ |
D | rc4test.c | 71 RC4(&key, data_len[i], &(data[i][0]), obuf); in test_rc4_encrypt() 82 RC4(&key, i, &(data[3][0]), obuf); in test_rc4_end_processing() 95 RC4(&key, i, &(data[3][0]), obuf); in test_rc4_multi_call() 96 RC4(&key, data_len[3] - i, &(data[3][i]), &(obuf[i])); in test_rc4_multi_call() 116 RC4(&key, sizeof(buf), buf, buf); in test_rc_bulk()
|
/third_party/typescript/tests/cases/conformance/jsx/ |
D | tsxUnionElementType4.tsx | 28 class RC4 extends React.Component<{}, {}> { 35 var EmptyRCComp = RC3 || RC4; 36 var PartRCComp = RC1 || RC4;
|
D | tsxUnionElementType3.tsx | 28 class RC4 extends React.Component<{}, {}> { 34 var EmptyRCComp = RC3 || RC4; 35 var PartRCComp = RC1 || RC4;
|
/third_party/openssl/providers/implementations/ciphers/ |
D | cipher_rc4_hmac_md5_hw.c | 78 RC4(ks, rc4_off, in, out); in cipher_hw_rc4_hmac_md5_cipher() 106 RC4(ks, len - rc4_off, out + rc4_off, out + rc4_off); in cipher_hw_rc4_hmac_md5_cipher() 108 RC4(ks, len - rc4_off, in + rc4_off, out + rc4_off); in cipher_hw_rc4_hmac_md5_cipher() 123 RC4(ks, rc4_off, in, out); in cipher_hw_rc4_hmac_md5_cipher() 142 RC4(ks, len - rc4_off, in + rc4_off, out + rc4_off); in cipher_hw_rc4_hmac_md5_cipher()
|
D | cipher_rc4.c | 119 IMPLEMENT_cipher(rc4, RC4, RC4_FLAGS, 40, 8, 0, stream) 121 IMPLEMENT_cipher(rc4, RC4, RC4_FLAGS, 128, 8, 0, stream)
|
/third_party/openssl/crypto/evp/ |
D | e_rc4_hmac_md5.c | 102 RC4(&key->ks, rc4_off, in, out); in rc4_hmac_md5_cipher() 130 RC4(&key->ks, len - rc4_off, out + rc4_off, out + rc4_off); in rc4_hmac_md5_cipher() 132 RC4(&key->ks, len - rc4_off, in + rc4_off, out + rc4_off); in rc4_hmac_md5_cipher() 145 RC4(&key->ks, rc4_off, in, out); in rc4_hmac_md5_cipher() 164 RC4(&key->ks, len - rc4_off, in + rc4_off, out + rc4_off); in rc4_hmac_md5_cipher()
|
/third_party/openssl/doc/man1/ |
D | openssl-ciphers.pod.in | 120 It can consist of a single cipher suite such as B<RC4-SHA>. 174 this includes all RC4 and anonymous ciphers. Note that this rule does 176 necessary). Note that RC4 based cipher suites are not built into OpenSSL by 328 =item B<RC4> 330 Cipher suites using RC4. 425 SSL_RSA_WITH_RC4_128_MD5 RC4-MD5 426 SSL_RSA_WITH_RC4_128_SHA RC4-SHA 435 SSL_DH_anon_WITH_RC4_128_MD5 ADH-RC4-MD5 446 TLS_RSA_WITH_RC4_128_MD5 RC4-MD5 447 TLS_RSA_WITH_RC4_128_SHA RC4-SHA [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 34 algorithm for protecting wireless networks. WEP uses RC4 with 38 RC4 key scheduling is insufficient (beginning of the pseudorandom 47 hardware. It still uses RC4 for the encryption like WEP, but with 48 per-packet RC4 keys. In addition, it implements replay protection,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 38 algorithm for protecting wireless networks. WEP uses RC4 with 42 RC4 key scheduling is insufficient (beginning of the pseudorandom 51 hardware. It still uses RC4 for the encryption like WEP, but with 52 per-packet RC4 keys. In addition, it implements replay protection,
|
/third_party/openssl/ohos_lite/include/openssl/ |
D | rc4.h | 28 void RC4(RC4_KEY *key, size_t len, const unsigned char *indata,
|
/third_party/openssl/include/openssl/ |
D | rc4.h | 37 OSSL_DEPRECATEDIN_3_0 void RC4(RC4_KEY *key, size_t len,
|