Searched full:arc4 (Results 1 – 25 of 56) sorted by relevance
123
3 * \file arc4.h7 * \warning ARC4 is considered a weak cipher and its use constitutes a40 #define MBEDTLS_ERR_ARC4_HW_ACCEL_FAILED -0x0019 /**< ARC4 hardware accelerator f…51 * \brief ARC4 context structure53 * \warning ARC4 is considered a weak cipher and its use constitutes a70 * \brief Initialize ARC4 context72 * \param ctx ARC4 context to be initialized74 * \warning ARC4 is considered a weak cipher and its use constitutes a82 * \brief Clear ARC4 context84 * \param ctx ARC4 context to be cleared[all …]
79 * ARC4 1 0x0019-0x0019
5 * ARC4 Cipher Algorithm11 #include <crypto/arc4.h>46 pr_warn_ratelimited("\"%s\" (%ld) uses obsolete ecb(arc4) skcipher\n", in crypto_arc4_init()54 * For legacy reasons, this is named "ecb(arc4)", not "arc4".57 .base.cra_name = "ecb(arc4)",58 .base.cra_driver_name = "ecb(arc4)-generic",85 MODULE_DESCRIPTION("ARC4 Cipher Algorithm");87 MODULE_ALIAS_CRYPTO("ecb(arc4)");
37 * Use Linux kernel 2.6 arc4 and sha1 routines rather than45 #include <crypto/arc4.h>92 struct arc4_ctx arc4; member153 arc4_setkey(&state->arc4, state->sha1_digest, state->keylen); in mppe_rekey()154 arc4_crypt(&state->arc4, state->session_key, state->sha1_digest, in mppe_rekey()165 arc4_setkey(&state->arc4, state->session_key, state->keylen); in mppe_rekey()392 arc4_crypt(&state->arc4, obuf, ibuf, isize); in mppe_compress()566 arc4_crypt(&state->arc4, obuf, ibuf, 1); in mppe_decompress()581 arc4_crypt(&state->arc4, obuf + 1, ibuf + 1, isize - 1); in mppe_decompress()655 * Prior to allowing load, try to load the arc4 and sha1 crypto
5 * ARC4 Cipher Algorithm10 #include <crypto/arc4.h>
11 libarc4-y := arc4.o
48 CIPHER_TYPE_INIT = 0x0, /* used for ARC4 */51 CIPHER_TYPE_UPDT = 0x1, /* used for ARC4 */
3 * Common values for ARC4 Cipher Algorithm
29 PACKAGECONFIG[arc4] = "ac_cv_lib_bsd_arc4random_buf=yes,ac_cv_lib_bsd_arc4random_buf=no,libbsd"
27 PACKAGECONFIG[arc4] = "ac_cv_lib_bsd_arc4random_buf=yes,ac_cv_lib_bsd_arc4random_buf=no,libbsd"
46 priv->tx_tfm = crypto_alloc_blkcipher ("ecb(arc4)", 0, CRYPTO_ALG_ASYNC); in lib80211_wep_init()52 priv->rx_tfm = crypto_alloc_blkcipher ("ecb(arc4)", 0, CRYPTO_ALG_ASYNC); in lib80211_wep_init()
94 priv->tx_tfm_arc4 = crypto_alloc_skcipher("ecb(arc4)", 0, in lib80211_tkip_init()106 priv->rx_tfm_arc4 = crypto_alloc_skcipher("ecb(arc4)", 0, in lib80211_tkip_init()137 priv->tx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, in lib80211_tkip_init()149 priv->rx_tfm_arc4 = crypto_alloc_blkcipher("ecb(arc4)", 0, in lib80211_tkip_init()
24 -- ARCFOUR (ARC4)
21 bit 1 = set if SEC has the ARC4 EU (AFEU)
7 - Symmetric algorithms, like AES, Blowfish, Triple-DES, DES, ARC4, \
30 - RC4 support has been replaced with ARC4 support from OpenSSL
15 #include <crypto/arc4.h>
46 tfm_arc4 = crypto_alloc_sync_skcipher("ecb(arc4)", 0, 0); in spi_nor_init()
795 ARC4, enumerator850 INTC_VECT(ARC4, 0x620),975 ARC4, 0, SPI1, JMC, 0, 0, 0, DVC1070 { INT2PRI9, 0, 32, 8, { ARC4, 0, SPI1, JMC } },