Home
last modified time | relevance | path

Searched refs:RC4 (Results 1 – 24 of 24) sorted by relevance

/external/openssl/crypto/rc4/
Drc4s.cpp59 RC4(&ctx,numm,buffer,buffer); in main()
61 RC4(&ctx,numm,buffer,buffer); in main()
64 RC4(&ctx,num,buffer,buffer); in main()
66 RC4(&ctx,num,buffer,buffer); in main()
Drc4test.c127 RC4(&key,data_len[i],&(data[i][0]),obuf); in main()
150 RC4(&key,i,&(data[3][0]),obuf); in main()
177 RC4(&key,i,&(data[3][0]),obuf); in main()
178 RC4(&key,data_len[3]-i,&(data[3][i]),&(obuf[i])); in main()
211 RC4(&key,sizeof(buf),buf,buf); in main()
Drc4.h64 #error RC4 is disabled.
80 void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata,
Drrc4.doc4 Subject: RC4 Algorithm revealed.
16 America by reverse engineering the RC4 algorithm and
22 SUBJECT: RC4 Source Code
25 I've tested this. It is compatible with the RC4 object module
108 official RC4 object code
114 Subject: RC4 compatibility testing
119 I can't say anything about the internals of RC4 versus the
120 algorithm that Bill Sommerfeld is rightly calling 'Alleged RC4',
121 since I don't know anything about RC4's internals.
125 of genuine RC4 as found in BSAFE. I chose a set of test vectors
Drc4speed.c204 RC4(&sch,8,buf,buf); in main()
240 RC4(&sch,BUFSIZE,buf,buf); in main()
Drc4.c179 RC4(&key,(unsigned int)i,(unsigned char *)buf, in main()
Drc4_enc.c70 void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata, in RC4() function
/external/openssl/crypto/rc4/asm/
Drc4-ia64.S72 .global RC4#
73 .proc RC4#
76 RC4: label
159 .endp RC4#
Drc4-586.pl39 &RC4("RC4");
102 sub RC4 subroutine
/external/openssl/include/openssl/
Drc4.h64 #error RC4 is disabled.
80 void RC4(RC4_KEY *key, unsigned long len, const unsigned char *indata,
/external/dropbear/libtomcrypt/src/headers/
Dtomcrypt_prng.h11 #ifdef RC4
55 #ifdef RC4
145 #ifdef RC4
/external/openssl/crypto/evp/
Devptests.txt177 # RC4 tests (from rc4test)
178 RC4:0123456789abcdef0123456789abcdef::0123456789abcdef:75b7878099e0c596
179 RC4:0123456789abcdef0123456789abcdef::0000000000000000:7494c2e7104b0879
180 RC4:00000000000000000000000000000000::0000000000000000:de188941a3375d3a
181 RC4:ef012345ef012345ef012345ef012345::0000000000000000000000000000000000000000:d6a141a7ec3c38dfbd61…
182 RC4:0123456789abcdef0123456789abcdef::123456789ABCDEF0123456789ABCDEF0123456789ABCDEF012345678:66a0…
183 RC4:ef012345ef012345ef012345ef012345::00000000000000000000:d6a141a7ec3c38dfbd61
De_rc4.c133 RC4(&data(ctx)->ks,inl,in,out); in rc4_cipher()
/external/dropbear/libtomcrypt/src/prngs/
Drc4.c18 #ifdef RC4
/external/openssl/crypto/engine/
Deng_openssl.c246 RC4(&test(ctx)->ks,inl,in,out); in test_rc4_cipher()
/external/openssl/crypto/
Dinstall.com38 DES,RC2,RC4,RC5,IDEA,BF,CAST,CAMELLIA,SEED,-
/external/openssl/crypto/objects/
Dobjects.txt326 pkcs12-pbeids 1 : PBE-SHA1-RC4-128 : pbeWithSHA1And128BitRC4
328 pkcs12-pbeids 2 : PBE-SHA1-RC4-40 : pbeWithSHA1And40BitRC4
360 rsadsi 3 4 : RC4 : rc4
361 : RC4-40 : rc4-40
/external/openssl/
DNOTICE80 * apply to all code found in this distribution, be it the RC4, RSA,
/external/wpa_supplicant/
DREADME270 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
273 too small against current attacks, RC4 key scheduling is insufficient
282 hardware. It still uses RC4 for the encryption like WEP, but with
283 per-packet RC4 keys. In addition, it implements replay protection,
DChangeLog377 RC4-128-SHA for authentication and AES128-SHA for provisioning
/external/dropbear/libtomcrypt/
Dchanges46 …-- Added LTC_VALGRIND define which makes SOBER-128 and RC4 a pure PRNG (and not a stream cipher). …
473 -- Added test functions to PRNG api, RC4 now conforms ;-) [was a minor issue]
476 -- Changed RC4 back [due to request]. It will now XOR the output so you can use it like
483 -- Updated RC4 so that when you feed it >256 bytes of entropy it quietly ignores additional
525 -- Changed RC4 to store it's output. If you want to encrypt with RC4
946 v0.73 -- Fixed bug in RC4 code where it could only use 255 byte keys.
981 -- Fixed a bug in the RC4 code [wasn't setting up the key correctly]
1016 …-- Added "rc4.c" a RC4 implementation with a PRNG interface. Since RC4 isn't a block cipher it wo…
Dcrypt.tex197 The RC2 and RC4 symmetric ciphers are not under patents but are under trademark regulations. This …
2851 \hline RC4 & rc4\_desc & Stream Cipher \\
2885 \subsubsection{RC4} subsubsection
2887 RC4 is an old stream cipher that can also double duty as a PRNG in a pinch. You key RC4 by
2891 When you read from RC4, the output is XOR'ed against your buffer you provide. In this manner, you …
2894 You really should not use RC4. This is not because RC4 is weak, (though biases are known to exist)…
2899 SOBER--128 is a stream cipher designed by the QUALCOMM Australia team. Like RC4, you key it by
2910 Like RC4, the output of SOBER--128 is XOR'ed against the buffer you provide it. In this manner, yo…
2913 Since SOBER-128 has a fixed keying scheme, and is very fast (faster than RC4) the ideal usage of SO…
2928 printf("RC4 init error: %s\n", error_to_string(err));
[all …]
/external/dropbear/libtomcrypt/testprof/
Dx86_prof.c241 #ifdef RC4 in reg_algs()
/external/openssl/apps/
Dspeed.c1758 RC4(&rc4_ks,(unsigned int)lengths[j], in MAIN()