/external/openssl/crypto/rc4/ |
D | rc4s.cpp | 59 RC4(&ctx,numm,buffer,buffer); in main() 61 RC4(&ctx,numm,buffer,buffer); in main() 64 RC4(&ctx,num,buffer,buffer); in main() 66 RC4(&ctx,num,buffer,buffer); in main()
|
D | rc4test.c | 127 RC4(&key,data_len[i],&(data[i][0]),obuf); in main() 150 RC4(&key,i,&(data[3][0]),obuf); in main() 177 RC4(&key,i,&(data[3][0]),obuf); in main() 178 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])); in main() 211 RC4(&key,sizeof(buf),buf,buf); in main()
|
D | rc4.h | 64 #error RC4 is disabled. 80 void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata,
|
D | rrc4.doc | 4 Subject: RC4 Algorithm revealed. 16 America by reverse engineering the RC4 algorithm and 22 SUBJECT: RC4 Source Code 25 I've tested this. It is compatible with the RC4 object module 108 official RC4 object code 114 Subject: RC4 compatibility testing 119 I can't say anything about the internals of RC4 versus the 120 algorithm that Bill Sommerfeld is rightly calling 'Alleged RC4', 121 since I don't know anything about RC4's internals. 125 of genuine RC4 as found in BSAFE. I chose a set of test vectors
|
D | rc4speed.c | 204 RC4(&sch,8,buf,buf); in main() 240 RC4(&sch,BUFSIZE,buf,buf); in main()
|
D | rc4.c | 179 RC4(&key,(unsigned int)i,(unsigned char *)buf, in main()
|
D | rc4_enc.c | 70 void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata, in RC4() function
|
/external/openssl/crypto/rc4/asm/ |
D | rc4-ia64.S | 72 .global RC4# 73 .proc RC4# 76 RC4: label 159 .endp RC4#
|
D | rc4-586.pl | 39 &RC4("RC4"); 102 sub RC4 subroutine
|
/external/openssl/include/openssl/ |
D | rc4.h | 64 #error RC4 is disabled. 80 void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata,
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_prng.h | 11 #ifdef RC4 55 #ifdef RC4 145 #ifdef RC4
|
/external/openssl/crypto/evp/ |
D | evptests.txt | 177 # RC4 tests (from rc4test) 178 RC4:0123456789abcdef0123456789abcdef::0123456789abcdef:75b7878099e0c596 179 RC4:0123456789abcdef0123456789abcdef::0000000000000000:7494c2e7104b0879 180 RC4:00000000000000000000000000000000::0000000000000000:de188941a3375d3a 181 RC4:ef012345ef012345ef012345ef012345::0000000000000000000000000000000000000000:d6a141a7ec3c38dfbd61… 182 RC4:0123456789abcdef0123456789abcdef::123456789ABCDEF0123456789ABCDEF0123456789ABCDEF012345678:66a0… 183 RC4:ef012345ef012345ef012345ef012345::00000000000000000000:d6a141a7ec3c38dfbd61
|
D | e_rc4.c | 133 RC4(&data(ctx)->ks,inl,in,out); in rc4_cipher()
|
/external/dropbear/libtomcrypt/src/prngs/ |
D | rc4.c | 18 #ifdef RC4
|
/external/openssl/crypto/engine/ |
D | eng_openssl.c | 246 RC4(&test(ctx)->ks,inl,in,out); in test_rc4_cipher()
|
/external/openssl/crypto/ |
D | install.com | 38 DES,RC2,RC4,RC5,IDEA,BF,CAST,CAMELLIA,SEED,-
|
/external/openssl/crypto/objects/ |
D | objects.txt | 326 pkcs12-pbeids 1 : PBE-SHA1-RC4-128 : pbeWithSHA1And128BitRC4 328 pkcs12-pbeids 2 : PBE-SHA1-RC4-40 : pbeWithSHA1And40BitRC4 360 rsadsi 3 4 : RC4 : rc4 361 : RC4-40 : rc4-40
|
/external/openssl/ |
D | NOTICE | 80 * apply to all code found in this distribution, be it the RC4, RSA,
|
/external/wpa_supplicant/ |
D | README | 270 for protecting wireless networks. WEP uses RC4 with 40-bit keys, 273 too small against current attacks, RC4 key scheduling is insufficient 282 hardware. It still uses RC4 for the encryption like WEP, but with 283 per-packet RC4 keys. In addition, it implements replay protection,
|
D | ChangeLog | 377 RC4-128-SHA for authentication and AES128-SHA for provisioning
|
/external/dropbear/libtomcrypt/ |
D | changes | 46 …-- Added LTC_VALGRIND define which makes SOBER-128 and RC4 a pure PRNG (and not a stream cipher). … 473 -- Added test functions to PRNG api, RC4 now conforms ;-) [was a minor issue] 476 -- Changed RC4 back [due to request]. It will now XOR the output so you can use it like 483 -- Updated RC4 so that when you feed it >256 bytes of entropy it quietly ignores additional 525 -- Changed RC4 to store it's output. If you want to encrypt with RC4 946 v0.73 -- Fixed bug in RC4 code where it could only use 255 byte keys. 981 -- Fixed a bug in the RC4 code [wasn't setting up the key correctly] 1016 …-- Added "rc4.c" a RC4 implementation with a PRNG interface. Since RC4 isn't a block cipher it wo…
|
D | crypt.tex | 197 The RC2 and RC4 symmetric ciphers are not under patents but are under trademark regulations. This … 2851 \hline RC4 & rc4\_desc & Stream Cipher \\ 2885 \subsubsection{RC4} subsubsection 2887 RC4 is an old stream cipher that can also double duty as a PRNG in a pinch. You key RC4 by 2891 When you read from RC4, the output is XOR'ed against your buffer you provide. In this manner, you … 2894 You really should not use RC4. This is not because RC4 is weak, (though biases are known to exist)… 2899 SOBER--128 is a stream cipher designed by the QUALCOMM Australia team. Like RC4, you key it by 2910 Like RC4, the output of SOBER--128 is XOR'ed against the buffer you provide it. In this manner, yo… 2913 Since SOBER-128 has a fixed keying scheme, and is very fast (faster than RC4) the ideal usage of SO… 2928 printf("RC4 init error: %s\n", error_to_string(err)); [all …]
|
/external/dropbear/libtomcrypt/testprof/ |
D | x86_prof.c | 241 #ifdef RC4 in reg_algs()
|
/external/openssl/apps/ |
D | speed.c | 1758 RC4(&rc4_ks,(unsigned int)lengths[j], in MAIN()
|