/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/ |
H A D | lac_sym_cipher_defs.h | 38 * Constants value for ARC4 algorithm 40 /* ARC4 algorithm block size */ 42 /* ARC4 key matrix size (bytes) */ 44 /* ARC4 256 bytes for key matrix, 2 for i and j and 6 bytes for padding */ 82 * (can be IV , counter or ARC4 state) */ 87 * but not ARC4 state) */ 135 /* Macro to check if the Algorithm is ARC4 */
|
H A D | lac_sym_cipher.h | 23 * and Triple-DES cipher algorithms, in ECB, CBC and CTR modes. The ARC4 stream 49 * implemented entirely by the QAT. However, in the case of the ARC4 algorithm, 52 * by the user, using a simple ARC4 Key Scheduling Algorithm (KSA). Then the 56 * The ARC4 key scheduling algorithm (KSA) is specified as follows 69 * On registration of a new ARC4 session, the user provides a base key of any 70 * length from 1 to 256 bytes. This algorithm produces the initial ARC4 state 71 * (key matrix + i & j index values) from that base key. This ARC4 state is 72 * used as input for each ARC4 cipher operation in that session, and is updated 73 * by the QAT after each operation. The ARC4 state is stored in a session 79 * TripleDES algorithms in CTR mode, and ARC4. The 2 primary differences are: [all …]
|
H A D | lac_sym_qat_cipher.h | 126 * Derive initial ARC4 cipher state from a base key 129 * An initial state for an ARC4 cipher session is derived from the base 130 * key provided by the user, using the ARC4 Key Scheduling Algorithm (KSA)
|
H A D | lac_session.h | 296 /**< Buffer to hold the initial ARC4 cipher state for the session, which 303 /**< The physical address of the ARC4 initial state, set at init 315 * - cipher algorithm is not ARC4 or Snow3G 637 * - cipher algorithm not ARC4 or Snow3G, no Partials, nonAuthEncrypt.
|
H A D | lac_sym_partial.h | 67 * For ARC4, the state is managed internally and the packet type will always
|
H A D | lac_sym.h | 84 /* The ARC4 key will not be stored in the content descriptor so we only need to
|
/freebsd/contrib/netbsd-tests/crypto/opencrypto/ |
H A D | t_opencrypto.sh | 72 atf_test_case arc4 cleanup 74 common_head "Test ARC4 crypto" 78 atf_skip "ARC4 not implemented by swcrypto" 262 atf_add_test_case arc4
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/ |
H A D | lac_sym_cipher.c | 175 /* For full packets, the initial ARC4 state is stored in in LacCipher_PerformIvCheck() 180 /* For partial packets, we maintain the running ARC4 in LacCipher_PerformIvCheck() 233 "Invalid ARC4 cipher key length"); in LacCipher_SessionSetupDataCheck()
|
H A D | lac_sym_alg_chain.c | 1048 /* ARC4 base key isn't added to the content descriptor, in LacAlgChain_SessionInit() 1072 "the initial state for ARC4\n"); in LacAlgChain_SessionInit()
|
H A D | lac_sym_dp.c | 778 /* ARC4 does not have an IV but the field is used to in LacDp_WriteRingMsgFull()
|
/freebsd/sys/contrib/device-tree/Bindings/crypto/ |
H A D | samsung-sss.yaml | 23 -- ARCFOUR (ARC4)
|
H A D | fsl-sec2.txt | 21 bit 1 = set if SEC has the ARC4 EU (AFEU)
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | crypto_wolfssl.c | 20 #include <wolfssl/wolfcrypt/arc4.h> 734 Arc4 arc4; in rc4_skip() local 737 wc_Arc4SetKey(&arc4, key, keylen); in rc4_skip() 744 wc_Arc4Process(&arc4, skip_buf, skip_buf, len); in rc4_skip() 748 wc_Arc4Process(&arc4, data, data, data_len); in rc4_skip() 763 Arc4 arc4; member 786 wc_Arc4SetKey(&ctx->enc.arc4, key, key_len); in crypto_cipher_init() 787 wc_Arc4SetKey(&ctx->dec.arc4, key, key_len); in crypto_cipher_init() 841 wc_Arc4Process(&ctx->enc.arc4, crypt, plain, len); in crypto_cipher_encrypt() 871 wc_Arc4Process(&ctx->dec.arc4, plain, crypt, len); in crypto_cipher_decrypt()
|
H A D | crypto_linux.c | 552 skcipher = linux_af_alg_skcipher("ecb(arc4)", key, keylen); in rc4_skip() 877 name = "ecb(arc4)"; in crypto_cipher_init()
|
/freebsd/lib/libc/gen/ |
H A D | arc4random.3 | 148 RC4 (also known as ARC4) algorithm.
|
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/ |
H A D | lac_sym_qat_cipher.c | 490 /* Base Key is not passed down to QAT in the case of ARC4 or NULL */ in LacSymQat_CipherCtrlBlockWrite() 654 * Arc4 and Null cipher */ in LacSymQat_CipherHwBlockPopulateKeySetup()
|
/freebsd/contrib/libarchive/libarchive/ |
H A D | archive_random.c | 150 * Arc4 random number generator for OpenBSD.
|
/freebsd/contrib/ntp/sntp/libevent/include/event2/ |
H A D | util.h | 820 * Current versions of Libevent use an ARC4-based random number generator, 823 * should be: ARC4 is a pretty lousy cipher, and the current implementation
|
/freebsd/contrib/libevent/include/event2/ |
H A D | util.h | 820 * Current versions of Libevent use an ARC4-based random number generator, 823 * should be: ARC4 is a pretty lousy cipher, and the current implementation
|
/freebsd/contrib/ntp/sntp/libevent/ |
H A D | arc4random.c | 28 * Arc4 random number generator for OpenBSD.
|
/freebsd/contrib/libevent/ |
H A D | arc4random.c | 28 * Arc4 random number generator for OpenBSD.
|
/freebsd/crypto/openssh/ |
H A D | LICENCE | 39 - RC4 support has been replaced with ARC4 support from OpenSSL
|
/freebsd/sys/dev/safe/ |
H A D | safereg.h | 239 #define SAFE_DEVINFO_ARC4 0x00000200 /* ARC4 support present */
|
/freebsd/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 907 * that data using the SGN_CKSUM as IV. Note: ARC4 wants the in krb5_get_mic_old() 1104 * that data using the SGN_CKSUM as IV. Note: ARC4 wants the in krb5_verify_mic_old()
|
/freebsd/sys/dev/qat/qat_api/firmware/include/ |
H A D | icp_qat_hw.h | 724 ICP_QAT_HW_CIPHER_ALGO_ARC4 = 6, /*!< ARC4 ciphering */ 1037 * Define the key size for ARC4 */
|