/external/chromium_org/third_party/tlslite/tlslite/utils/ |
H A D | openssl_rc4.py | 7 from .rc4 import RC4 18 self.rc4 = m2.rc4_new() 19 m2.rc4_set_key(self.rc4, key) 22 m2.rc4_free(self.rc4) 25 return bytearray(m2.rc4_update(self.rc4, plaintext))
|
H A D | pycrypto_rc4.py | 7 from .rc4 import *
|
H A D | python_rc4.py | 6 from .rc4 import RC4
|
/external/openssl/crypto/rc4/ |
H A D | rc4_utl.c | 1 /* crypto/rc4/rc4_utl.c -*- mode:C; c-file-style: "eay" -*- */ 54 #include <openssl/rc4.h>
|
H A D | rc4_skey.c | 1 /* crypto/rc4/rc4_skey.c */ 59 #include <openssl/rc4.h> 69 return("rc4(idx,char)"); 71 return("rc4(idx,int)"); 74 return("rc4(ptr,char)"); 76 return("rc4(ptr,int)");
|
H A D | rc4s.cpp | 35 #include <openssl/rc4.h>
|
H A D | rc4.c | 1 /* crypto/rc4/rc4.c */ 62 #include <openssl/rc4.h> 66 "usage: rc4 args\n",
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_internal-cipher.c | 24 } rc4; member in union:crypto_cipher::__anon33587 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 113 ctx->u.rc4.used_bytes, crypt, len); 114 ctx->u.rc4.used_bytes += len; 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4 [all...] |
H A D | crypto_libtomcrypt.c | 285 int rc4; member in struct:crypto_cipher 292 } rc4; member in union:crypto_cipher::__anon33594 302 int idx, res, rc4 = 0; local 319 rc4 = 1; 329 if (rc4) { 330 ctx->rc4 = 1; 331 if (key_len > sizeof(ctx->u.rc4.key)) { 335 ctx->u.rc4.keylen = key_len; 336 os_memcpy(ctx->u.rc4.key, key, key_len); 355 if (ctx->rc4) { [all...] |
H A D | Makefile | 39 rc4.o \
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | crypto_internal-cipher.c | 24 } rc4; member in union:crypto_cipher::__anon33840 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 113 ctx->u.rc4.used_bytes, crypt, len); 114 ctx->u.rc4.used_bytes += len; 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4 [all...] |
H A D | crypto_libtomcrypt.c | 285 int rc4; member in struct:crypto_cipher 292 } rc4; member in union:crypto_cipher::__anon33847 302 int idx, res, rc4 = 0; local 319 rc4 = 1; 329 if (rc4) { 330 ctx->rc4 = 1; 331 if (key_len > sizeof(ctx->u.rc4.key)) { 335 ctx->u.rc4.keylen = key_len; 336 os_memcpy(ctx->u.rc4.key, key, key_len); 355 if (ctx->rc4) { [all...] |
H A D | Makefile | 39 rc4.o \
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | crypto_internal-cipher.c | 24 } rc4; member in union:crypto_cipher::__anon34091 57 if (key_len > sizeof(ctx->u.rc4.key)) { 61 ctx->u.rc4.keylen = key_len; 62 os_memcpy(ctx->u.rc4.key, key, key_len); 112 rc4_skip(ctx->u.rc4.key, ctx->u.rc4.keylen, 113 ctx->u.rc4.used_bytes, crypt, len); 114 ctx->u.rc4.used_bytes += len; 176 rc4_skip(ctx->u.rc4.key, ctx->u.rc4 [all...] |
H A D | crypto_libtomcrypt.c | 285 int rc4; member in struct:crypto_cipher 292 } rc4; member in union:crypto_cipher::__anon34098 302 int idx, res, rc4 = 0; local 319 rc4 = 1; 329 if (rc4) { 330 ctx->rc4 = 1; 331 if (key_len > sizeof(ctx->u.rc4.key)) { 335 ctx->u.rc4.keylen = key_len; 336 os_memcpy(ctx->u.rc4.key, key, key_len); 355 if (ctx->rc4) { [all...] |
H A D | Makefile | 39 rc4.o \
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | e_rc4.c | 66 #include <openssl/rc4.h> 87 static const EVP_CIPHER rc4 = { variable 93 const EVP_CIPHER *EVP_rc4(void) { return &rc4; } 97 RC4_KEY rc4; member in struct:aead_rc4_md5_tls_ctx 134 RC4_set_key(&rc4_ctx->rc4, key_len - MD5_DIGEST_LENGTH, 213 rc4_off = 32 - 1 - (rc4_ctx->rc4.x & (32 - 1)); 225 RC4(&rc4_ctx->rc4, rc4_off, in, out); 228 rc4_md5_enc(&rc4_ctx->rc4, in + rc4_off, out + rc4_off, &md, in + md5_off, 257 RC4(&rc4_ctx->rc4, in_len - rc4_off, in + rc4_off, out + rc4_off); 258 RC4(&rc4_ctx->rc4, MD5_DIGEST_LENGT [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/rc4/asm/ |
H A D | rc4-md5-x86_64.pl | 17 # instruction sequence is virtually identical to rc4-x86_64.pl, which 34 # (*) rc4-x86_64.pl delivers 5.3 on Opteron, so real improvement 37 my ($rc4,$md5)=(1,1); # what to generate? 40 # to be able to use 'openssl speed rc4' for 59 if ($rc4 && !$md5) { 62 } elsif ($md5 && !$rc4) { 125 if ($rc4) { 193 #rc4# add $TX[0]#b,$YY#b 194 #rc4# lea ($dat,$XX[0],4),$XX[1] 221 $code.=" movdqu ($in0),%xmm2\n" if ($rc4 [all...] |
/external/openssl/crypto/rc4/asm/ |
H A D | rc4-md5-x86_64.pl | 17 # instruction sequence is virtually identical to rc4-x86_64.pl, which 34 # (*) rc4-x86_64.pl delivers 5.3 on Opteron, so real improvement 37 my ($rc4,$md5)=(1,1); # what to generate? 40 # to be able to use 'openssl speed rc4' for 59 if ($rc4 && !$md5) { 62 } elsif ($md5 && !$rc4) { 125 if ($rc4) { 193 #rc4# add $TX[0]#b,$YY#b 194 #rc4# lea ($dat,$XX[0],4),$XX[1] 221 $code.=" movdqu ($in0),%xmm2\n" if ($rc4 [all...] |
/external/openssl/apps/ |
H A D | progs.pl | 74 "des", "des3", "desx", "idea", "seed", "rc4", "rc4-40", 95 elsif ($_ =~ /rc4/) { $t="#ifndef OPENSSL_NO_RC4\n${t}#endif\n"; }
|
H A D | version.c | 123 # include <openssl/rc4.h>
|
/external/openssl/crypto/evp/ |
H A D | e_rc4.c | 67 #include <openssl/rc4.h>
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
H A D | ARC4.java | 99 provider.addAlgorithm("Alg.Alias.Cipher." + PKCSObjectIdentifiers.rc4, "ARC4");
|
/external/openssl/ |
H A D | Crypto-config-host.mk | 438 crypto/rc4/rc4_enc.c \ 439 crypto/rc4/rc4_skey.c \ 440 crypto/rc4/rc4_utl.c \ 667 crypto/rc4/asm/rc4-md5-x86_64.S \ 668 crypto/rc4/asm/rc4-x86_64.S \ 679 crypto/rc4/rc4_enc.c \ 680 crypto/rc4/rc4_skey.c \
|
H A D | Crypto-config-target.mk | 438 crypto/rc4/rc4_enc.c \ 439 crypto/rc4/rc4_skey.c \ 440 crypto/rc4/rc4_utl.c \ 667 crypto/rc4/asm/rc4-md5-x86_64.S \ 668 crypto/rc4/asm/rc4-x86_64.S \ 679 crypto/rc4/rc4_enc.c \ 680 crypto/rc4/rc4_skey.c \
|