Home
last modified time | relevance | path

Searched refs:RC4 (Results 1 – 25 of 43) sorted by relevance

12

/external/curl/docs/
DCIPHERS.md29 `RC4-MD5`
30 `RC4-SHA`
37 `ADH-RC4-MD5`
44 `RC4-MD5`
45 `RC4-SHA`
50 `ADH-RC4-MD5`
87 `ECDHE-RSA-RC4-SHA`
92 `ECDHE-ECDSA-RC4-SHA`
97 `AECDH-RC4-SHA`
346 `RC4-SHA`,
[all …]
DSSL-PROBLEMS.md54 includes symmetric ciphers with less than 128 bit keys and RC4.
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml38 algorithm for protecting wireless networks. WEP uses RC4 with
42 RC4 key scheduling is insufficient (beginning of the pseudorandom
51 hardware. It still uses RC4 for the encryption like WEP, but with
52 per-packet RC4 keys. In addition, it implements replay protection,
/external/boringssl/src/crypto/cipher_extra/test/
Dcipher_tests.txt1 # RC4 tests (from rc4test)
2 Cipher = RC4
7 Cipher = RC4
12 Cipher = RC4
17 Cipher = RC4
22 Cipher = RC4
27 Cipher = RC4
/external/rust/crates/quiche/deps/boringssl/src/include/openssl/
Drc4.h82 OPENSSL_EXPORT void RC4(RC4_KEY *key, size_t len, const uint8_t *in,
/external/boringssl/src/include/openssl/
Drc4.h82 OPENSSL_EXPORT void RC4(RC4_KEY *key, size_t len, const uint8_t *in,
/external/boringssl/src/crypto/cipher_extra/
De_rc4.c77 RC4(rc4key, in_len, in, out); in rc4_cipher()
/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/
De_rc4.c77 RC4(rc4key, in_len, in, out); in rc4_cipher()
/external/boringssl/src/crypto/rc4/
Drc4.c60 void RC4(RC4_KEY *key, size_t len, const uint8_t *in, uint8_t *out) { in RC4() function
/external/rust/crates/quiche/deps/boringssl/src/crypto/rc4/
Drc4.c60 void RC4(RC4_KEY *key, size_t len, const uint8_t *in, uint8_t *out) { in RC4() function
/external/apache-commons-compress/src/main/java/org/apache/commons/compress/archivers/zip/
DPKWareExtraHeader.java211 RC4(0x6801), enumConstant
/external/grpc-grpc/templates/
Dpackage.xml.template254 <release>1.0.0RC4</release>
255 <api>1.0.0RC4</api>
/external/scapy/test/tls/
Dtests_tls_netaccess.uts69 test_tls_server("RC4-SHA", "-tls1")
/external/wpa_supplicant_8/hostapd/
DREADME246 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
249 too small against current attacks, RC4 key scheduling is insufficient
258 hardware. It still uses RC4 for the encryption like WEP, but with
259 per-packet RC4 keys. In addition, it implements replay protection,
/external/conscrypt/
DCAPABILITIES.md117 The RC4 stream cipher.
/external/python/cpython3/Misc/NEWS.d/
D3.5.0a2.rst206 Remove RC4 from the SSL module's default cipher list.
/external/boringssl/src/crypto/obj/
Dobjects.txt339 pkcs12-pbeids 1 : PBE-SHA1-RC4-128 : pbeWithSHA1And128BitRC4
341 pkcs12-pbeids 2 : PBE-SHA1-RC4-40 : pbeWithSHA1And40BitRC4
381 rsadsi 3 4 : RC4 : rc4
382 : RC4-40 : rc4-40
1289 : RC4-HMAC-MD5 : rc4-hmac-md5
/external/scapy/test/
Dsslv2.uts16 …_server -cert test/tls/pki/srv_cert.pem -key test/tls/pki/srv_key.pem -Verify 2 -cipher EXP-RC4-MD5
185 = Check TLS-related scapy internals - Checking raw() harmlessness (with RC4)
191 = Check TLS-related scapy internals - Checking show2() harmlessness (with RC4)
/external/wpa_supplicant_8/wpa_supplicant/
DREADME208 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
211 too small against current attacks, RC4 key scheduling is insufficient
220 hardware. It still uses RC4 for the encryption like WEP, but with
221 per-packet RC4 keys. In addition, it implements replay protection,
/external/rust/crates/ring/
DLICENSE117 * apply to all code found in this distribution, be it the RC4, RSA,
/external/boringssl/src/
DLICENSE94 * apply to all code found in this distribution, be it the RC4, RSA,
/external/boringssl/
DNOTICE94 * apply to all code found in this distribution, be it the RC4, RSA,
/external/rust/crates/quiche/deps/boringssl/
DLICENSE94 * apply to all code found in this distribution, be it the RC4, RSA,
/external/python/cpython2/Misc/NEWS.d/
D2.7.10rc1.rst450 Remove RC4 from the SSL module's default cipher list.
/external/openssh/
DLICENCE39 - RC4 support has been replaced with ARC4 support from OpenSSL

12