/external/dropbear/libtomcrypt/src/prngs/ |
D | rc4.c | 43 prng->rc4.x = 0; in rc4_start() 61 if (prng->rc4.x + inlen > 256) { in rc4_add_entropy() 62 if (prng->rc4.x == 256) { in rc4_add_entropy() 67 inlen = 256 - prng->rc4.x; in rc4_add_entropy() 72 prng->rc4.buf[prng->rc4.x++] = *in++; in rc4_add_entropy() 92 s = prng->rc4.buf; in rc4_ready() 94 keylen = prng->rc4.x; in rc4_ready() 102 y = (y + prng->rc4.buf[x] + key[j++]) & 255; in rc4_ready() 108 prng->rc4.x = 0; in rc4_ready() 109 prng->rc4.y = 0; in rc4_ready() [all …]
|
/external/openssl/crypto/rc4/asm/ |
D | rc4-md5-x86_64.pl | 37 my ($rc4,$md5)=(1,1); # what to generate? 59 if ($rc4 && !$md5) { 62 } elsif ($md5 && !$rc4) { 125 if ($rc4) { 221 $code.=" movdqu ($in0),%xmm2\n" if ($rc4 && $j==15); 222 $code.=" add \$$MOD,$XX[0]#b\n" if ($rc4 && $j==15 && $k==$MOD-1); 223 $code.=" pxor $xmm,$xmm\n" if ($rc4 && $j<=1); 243 $code.=<<___ if ($rc4 && $j==15 && $k==$MOD-1); 249 $code.=<<___ if ($rc4 && $j==15); 261 $code.=" movdqu 16($in0),%xmm3\n" if ($rc4 && $j==15); [all …]
|
/external/openssh/openbsd-compat/ |
D | bsd-arc4random.c | 40 static RC4_KEY rc4; variable 55 RC4(&rc4, sizeof(r), (unsigned char *)&r, (unsigned char *)&r); in arc4random() 68 memset(&rc4, 0, sizeof(rc4)); in arc4random_stir() 72 RC4_set_key(&rc4, sizeof(rand_buf), rand_buf); in arc4random_stir() 79 RC4(&rc4, sizeof(rand_buf), rand_buf, rand_buf); in arc4random_stir()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_internal-cipher.c | 24 } rc4; member 57 if (key_len > sizeof(ctx->u.rc4.key)) { in crypto_cipher_init() 61 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 62 os_memcpy(ctx->u.rc4.key, key, key_len); in crypto_cipher_init() 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_encrypt() 113 ctx->u.rc4.used_bytes, crypt, len); in crypto_cipher_encrypt() 114 ctx->u.rc4.used_bytes += len; in crypto_cipher_encrypt() 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, in crypto_cipher_decrypt() 177 ctx->u.rc4.used_bytes, plain, len); in crypto_cipher_decrypt() 178 ctx->u.rc4.used_bytes += len; in crypto_cipher_decrypt()
|
D | crypto_libtomcrypt.c | 285 int rc4; member 292 } rc4; member 302 int idx, res, rc4 = 0; in crypto_cipher_init() local 319 rc4 = 1; in crypto_cipher_init() 329 if (rc4) { in crypto_cipher_init() 330 ctx->rc4 = 1; in crypto_cipher_init() 331 if (key_len > sizeof(ctx->u.rc4.key)) { in crypto_cipher_init() 335 ctx->u.rc4.keylen = key_len; in crypto_cipher_init() 336 os_memcpy(ctx->u.rc4.key, key, key_len); in crypto_cipher_init() 355 if (ctx->rc4) { in crypto_cipher_encrypt() [all …]
|
D | Makefile | 38 rc4.o \
|
/external/openssl/ |
D | Crypto-config.mk | 436 crypto/rc4/rc4_enc.c \ 437 crypto/rc4/rc4_skey.c \ 438 crypto/rc4/rc4_utl.c \ 634 crypto/rc4/asm/rc4-md5-x86_64.S \ 635 crypto/rc4/asm/rc4-x86_64.S \ 645 crypto/rc4/rc4_enc.c \
|
D | openssl.config | 166 crypto/rc4/Makefile \ 690 crypto/rc4/rc4_enc.c \ 691 crypto/rc4/rc4_skey.c \ 692 crypto/rc4/rc4_utl.c \ 858 crypto/rc4/asm/rc4-md5-x86_64.S \ 859 crypto/rc4/asm/rc4-x86_64.S \ 870 crypto/rc4/rc4_enc.c \
|
/external/openssl/crypto/rc4/ |
D | rrc4.doc | 28 /* rc4.h */ 37 void rc4(unsigned char *buffer_ptr,int buffer_len,rc4_key * key); 40 /*rc4.c */ 41 #include "rc4.h" 69 void rc4(unsigned char *buffer_ptr, int buffer_len, rc4_key *key)
|
/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_prng.h | 56 struct rc4_prng rc4; member
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/pkcs/ |
D | PKCSObjectIdentifiers.java | 63 static final ASN1ObjectIdentifier rc4 = encryptionAlgorithm.branch("4"); field
|
/external/openssl/crypto/ |
D | opensslconf.h.in | 45 * boundary. See crypto/rc4/rc4_enc.c for further details.
|
/external/ipsec-tools/ |
D | NEWS | 106 0.3rc4 - 25 March 2004
|
/external/openssl/crypto/objects/ |
D | obj_mac.num | 6 rc4 5
|
D | objects.txt | 380 rsadsi 3 4 : RC4 : rc4 381 : RC4-40 : rc4-40 1289 : RC4-HMAC-MD5 : rc4-hmac-md5
|
/external/wpa_supplicant_8/hostapd/ |
D | Makefile | 706 OBJS += ../src/crypto/rc4.o 877 NOBJS += ../src/crypto/rc4.o
|
/external/libpng/ |
D | CHANGES | 1140 version 1.2.3rc4 [May 2, 2002] 1342 version 1.0.16rc4 and 1.2.6rc4 [August 10, 2004] 1410 version 1.2.8rc4 [November 29, 2004] 1607 version 1.0.19rc4, 1.2.11rc4 [June 15, 2006] 1676 version 1.2.15rc4 [December 27, 2006] 1722 version 1.2.17rc4 [May 10, 2007] 1883 version 1.0.27rc4 and 1.2.19rc4 [August 9, 2007] 1895 Undid row initialization error exit added to rc2 and rc4. 1932 version 1.2.20rc4 [September 1, 2007]
|
/external/dropbear/libtomcrypt/ |
D | makefile.msvc | 112 src/prngs/rc4.obj src/prngs/rng_get_bytes.obj src/prngs/rng_make_prng.obj src/prngs/sober128.obj \
|
D | makefile.unix | 148 src/prngs/rc4.o src/prngs/rng_get_bytes.o src/prngs/rng_make_prng.o src/prngs/sober128.o \
|
D | makefile.icc | 202 src/prngs/rc4.o src/prngs/rng_get_bytes.o src/prngs/rng_make_prng.o src/prngs/sober128.o \
|
D | makefile.shared | 207 src/prngs/rc4.o src/prngs/rng_get_bytes.o src/prngs/rng_make_prng.o src/prngs/sober128.o \
|
D | changes | 1016 …-- Added "rc4.c" a RC4 implementation with a PRNG interface. Since RC4 isn't a block cipher it wo…
|
D | crypt.tex | 2851 \hline RC4 & rc4\_desc & Stream Cipher \\ 2891 …C4, the output is XOR'ed against your buffer you provide. In this manner, you can use rc4\_read()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | Makefile | 1165 OBJS += ../src/crypto/rc4.o
|
/external/e2fsprogs/debian/ |
D | changelog | 1466 e2fsprogs (1.36rc4-1) unstable; urgency=low
|