Home
last modified time | relevance | path

Searched full:arc4 (Results 1 – 25 of 28) sorted by relevance

12

/freebsd/sys/dev/qat/qat_api/common/crypto/sym/include/
H A Dlac_sym_cipher_defs.h38 * Constants value for ARC4 algorithm
40 /* ARC4 algorithm block size */
42 /* ARC4 key matrix size (bytes) */
44 /* ARC4 256 bytes for key matrix, 2 for i and j and 6 bytes for padding */
82 * (can be IV , counter or ARC4 state) */
87 * but not ARC4 state) */
135 /* Macro to check if the Algorithm is ARC4 */
H A Dlac_sym_cipher.h23 * and Triple-DES cipher algorithms, in ECB, CBC and CTR modes. The ARC4 stream
49 * implemented entirely by the QAT. However, in the case of the ARC4 algorithm,
52 * by the user, using a simple ARC4 Key Scheduling Algorithm (KSA). Then the
56 * The ARC4 key scheduling algorithm (KSA) is specified as follows
69 * On registration of a new ARC4 session, the user provides a base key of any
70 * length from 1 to 256 bytes. This algorithm produces the initial ARC4 state
71 * (key matrix + i & j index values) from that base key. This ARC4 state is
72 * used as input for each ARC4 cipher operation in that session, and is updated
73 * by the QAT after each operation. The ARC4 state is stored in a session
79 * TripleDES algorithms in CTR mode, and ARC4. The 2 primary differences are:
[all …]
H A Dlac_sym_qat_cipher.h126 * Derive initial ARC4 cipher state from a base key
129 * An initial state for an ARC4 cipher session is derived from the base
130 * key provided by the user, using the ARC4 Key Scheduling Algorithm (KSA)
H A Dlac_session.h296 /**< Buffer to hold the initial ARC4 cipher state for the session, which
303 /**< The physical address of the ARC4 initial state, set at init
315 * - cipher algorithm is not ARC4 or Snow3G
637 * - cipher algorithm not ARC4 or Snow3G, no Partials, nonAuthEncrypt.
H A Dlac_sym_partial.h67 * For ARC4, the state is managed internally and the packet type will always
H A Dlac_sym.h84 /* The ARC4 key will not be stored in the content descriptor so we only need to
/freebsd/contrib/netbsd-tests/crypto/opencrypto/
H A Dt_opencrypto.sh72 atf_test_case arc4 cleanup
74 common_head "Test ARC4 crypto"
78 atf_skip "ARC4 not implemented by swcrypto"
262 atf_add_test_case arc4
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/
H A Dlac_sym_cipher.c175 /* For full packets, the initial ARC4 state is stored in in LacCipher_PerformIvCheck()
180 /* For partial packets, we maintain the running ARC4 in LacCipher_PerformIvCheck()
233 "Invalid ARC4 cipher key length"); in LacCipher_SessionSetupDataCheck()
H A Dlac_sym_alg_chain.c1048 /* ARC4 base key isn't added to the content descriptor, in LacAlgChain_SessionInit()
1072 "the initial state for ARC4\n"); in LacAlgChain_SessionInit()
H A Dlac_sym_dp.c778 /* ARC4 does not have an IV but the field is used to in LacDp_WriteRingMsgFull()
/freebsd/sys/contrib/device-tree/Bindings/crypto/
H A Dsamsung-sss.yaml23 -- ARCFOUR (ARC4)
H A Dfsl-sec2.txt21 bit 1 = set if SEC has the ARC4 EU (AFEU)
/freebsd/contrib/wpa/src/crypto/
H A Dcrypto_wolfssl.c20 #include <wolfssl/wolfcrypt/arc4.h>
734 Arc4 arc4; in rc4_skip() local
737 wc_Arc4SetKey(&arc4, key, keylen); in rc4_skip()
744 wc_Arc4Process(&arc4, skip_buf, skip_buf, len); in rc4_skip()
748 wc_Arc4Process(&arc4, data, data, data_len); in rc4_skip()
763 Arc4 arc4; member
786 wc_Arc4SetKey(&ctx->enc.arc4, key, key_len); in crypto_cipher_init()
787 wc_Arc4SetKey(&ctx->dec.arc4, key, key_len); in crypto_cipher_init()
841 wc_Arc4Process(&ctx->enc.arc4, crypt, plain, len); in crypto_cipher_encrypt()
871 wc_Arc4Process(&ctx->dec.arc4, plain, crypt, len); in crypto_cipher_decrypt()
H A Dcrypto_linux.c552 skcipher = linux_af_alg_skcipher("ecb(arc4)", key, keylen); in rc4_skip()
877 name = "ecb(arc4)"; in crypto_cipher_init()
/freebsd/lib/libc/gen/
H A Darc4random.3148 RC4 (also known as ARC4) algorithm.
/freebsd/sys/dev/qat/qat_api/common/crypto/sym/qat/
H A Dlac_sym_qat_cipher.c490 /* Base Key is not passed down to QAT in the case of ARC4 or NULL */ in LacSymQat_CipherCtrlBlockWrite()
654 * Arc4 and Null cipher */ in LacSymQat_CipherHwBlockPopulateKeySetup()
/freebsd/contrib/libarchive/libarchive/
H A Darchive_random.c150 * Arc4 random number generator for OpenBSD.
/freebsd/contrib/ntp/sntp/libevent/include/event2/
H A Dutil.h820 * Current versions of Libevent use an ARC4-based random number generator,
823 * should be: ARC4 is a pretty lousy cipher, and the current implementation
/freebsd/contrib/libevent/include/event2/
H A Dutil.h820 * Current versions of Libevent use an ARC4-based random number generator,
823 * should be: ARC4 is a pretty lousy cipher, and the current implementation
/freebsd/contrib/ntp/sntp/libevent/
H A Darc4random.c28 * Arc4 random number generator for OpenBSD.
/freebsd/contrib/libevent/
H A Darc4random.c28 * Arc4 random number generator for OpenBSD.
/freebsd/crypto/openssh/
H A DLICENCE39 - RC4 support has been replaced with ARC4 support from OpenSSL
/freebsd/sys/dev/safe/
H A Dsafereg.h239 #define SAFE_DEVINFO_ARC4 0x00000200 /* ARC4 support present */
/freebsd/sys/kgssapi/krb5/
H A Dkrb5_mech.c907 * that data using the SGN_CKSUM as IV. Note: ARC4 wants the in krb5_get_mic_old()
1104 * that data using the SGN_CKSUM as IV. Note: ARC4 wants the in krb5_verify_mic_old()
/freebsd/sys/dev/qat/qat_api/firmware/include/
H A Dicp_qat_hw.h724 ICP_QAT_HW_CIPHER_ALGO_ARC4 = 6, /*!< ARC4 ciphering */
1037 * Define the key size for ARC4 */

12