Home
last modified time | relevance | path

Searched refs:RC4 (Results 1 – 21 of 21) sorted by relevance

/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml34 algorithm for protecting wireless networks. WEP uses RC4 with
38 RC4 key scheduling is insufficient (beginning of the pseudorandom
47 hardware. It still uses RC4 for the encryption like WEP, but with
48 per-packet RC4 keys. In addition, it implements replay protection,
/external/boringssl/src/crypto/cipher_extra/test/
Dcipher_tests.txt1 # RC4 tests (from rc4test)
2 Cipher = RC4
7 Cipher = RC4
12 Cipher = RC4
17 Cipher = RC4
22 Cipher = RC4
27 Cipher = RC4
/external/ltp/testcases/commands/mail/
Dmail_tests.sh146 RC4=0
197 RC4=$(awk '{print match($1 $2 $3, "Nomailfor")}' \
199 if [ \( "$tvar" = "redhat" -o "$tvar" = "redhat-linux" \) -a -n "$RC4" ]; then
/external/boringssl/src/include/openssl/
Drc4.h82 OPENSSL_EXPORT void RC4(RC4_KEY *key, size_t len, const uint8_t *in,
/external/boringssl/src/crypto/cipher_extra/
De_rc4.c77 RC4(rc4key, in_len, in, out); in rc4_cipher()
/external/boringssl/src/crypto/rc4/
Drc4.c60 void RC4(RC4_KEY *key, size_t len, const uint8_t *in, uint8_t *out) { in RC4() function
/external/wpa_supplicant_8/hostapd/
DREADME258 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
261 too small against current attacks, RC4 key scheduling is insufficient
270 hardware. It still uses RC4 for the encryption like WEP, but with
271 per-packet RC4 keys. In addition, it implements replay protection,
/external/curl/docs/
DSSL-PROBLEMS.md54 includes symmetric ciphers with less than 128 bit keys and RC4.
/external/boringssl/src/crypto/obj/
Dobjects.txt339 pkcs12-pbeids 1 : PBE-SHA1-RC4-128 : pbeWithSHA1And128BitRC4
341 pkcs12-pbeids 2 : PBE-SHA1-RC4-40 : pbeWithSHA1And40BitRC4
381 rsadsi 3 4 : RC4 : rc4
382 : RC4-40 : rc4-40
1288 : RC4-HMAC-MD5 : rc4-hmac-md5
/external/boringssl/
DNOTICE80 * apply to all code found in this distribution, be it the RC4, RSA,
/external/wpa_supplicant_8/wpa_supplicant/
DREADME208 for protecting wireless networks. WEP uses RC4 with 40-bit keys,
211 too small against current attacks, RC4 key scheduling is insufficient
220 hardware. It still uses RC4 for the encryption like WEP, but with
221 per-packet RC4 keys. In addition, it implements replay protection,
DChangeLog1606 RC4-128-SHA for authentication and AES128-SHA for provisioning
/external/boringssl/src/
DLICENSE93 * apply to all code found in this distribution, be it the RC4, RSA,
/external/openssh/
DLICENCE39 - RC4 support has been replaced with ARC4 support from OpenSSL
DChangeLog5195 truncated HMACs, RC4, blowfish. ok markus@ dtucker@
/external/okhttp/
DCHANGELOG.md282 * **RC4 cipher suites are no longer supported by default.** To connect to
/external/python/cpython2/Doc/library/
Dssl.rst249 :data:`OP_NO_SSLv3` with high encryption cipher suites without RC4 and
281 RC4 was dropped from the default cipher string.
/external/python/cpython2/Doc/
Dlicense.rst768 * apply to all code found in this distribution, be it the RC4, RSA,
/external/c-ares/
DCHANGES729 which is used with an RC4 stream to generate the cryptographically secure
/external/bouncycastle/patches/
Dbcprov.patch5183 - super("RC4", 128, new CipherKeyGenerator());
/external/python/cpython2/Misc/
DNEWS1324 - Issue #23481: Remove RC4 from the SSL module's default cipher list.