Home
last modified time | relevance | path

Searched refs:keyed (Results 1 – 25 of 35) sorted by relevance

12

/src/crypto/openssh/
H A DPROTOCOL.chacha20poly130540 The instance keyed by K_1 is a stream cipher that is used only
42 keyed by K_2, is used in conjunction with poly1305 to build an AEAD
49 the MAC. By using an independently-keyed cipher instance to encrypt the
/src/contrib/file/magic/Magdir/
H A Dbasis11 >7 string \002 keyed file
H A Dlinux696 >>>>>>>>12 ulelong&4 !0 \b, keyed hash siphash24
/src/contrib/wpa/wpa_supplicant/doc/docbook/
H A Dwpa_background.sgml44 makes attacks easier, there is no replay protection, and non-keyed
53 keyed packet authentication mechanism (Michael MIC).</para>
/src/sys/contrib/device-tree/src/arm64/marvell/
H A Dcn9130-cf-base.dts45 /* M.2 is B-keyed, so w-disable is for WWAN */
/src/contrib/sendmail/contrib/
H A Ddomainmap.m413 PH) which is keyed on username alone (as opposed to the
/src/crypto/openssl/doc/internal/man7/
H A DVERSION.pod19 This file is a set of keyed information looking like simple variable
/src/crypto/openssl/test/recipes/30-test_evp_data/
H A Devpmac_blake.txt144 Title = Custom keyed BLAKE2 tests
/src/crypto/openssl/crypto/property/
H A DREADME.md51 * A query cache is desirable. This would be a hash table keyed by the
/src/crypto/openssl/doc/man7/
H A DEVP_KDF-KB.pod10 (KBKDF). KBKDF derives a key from repeated application of a keyed MAC to an
/src/contrib/llvm-project/llvm/lib/Support/
H A Dxxhash.cpp785 uint64_t const keyed = input_64 ^ bitflip; in XXH3_len_4to8_128b() local
789 XXH128_hash_t m128 = XXH_mult64to128(keyed, PRIME64_1 + (len << 2)); in XXH3_len_4to8_128b()
/src/crypto/openssl/doc/man3/
H A DHMAC.pod56 HMAC is a MAC (message authentication code), i.e. a keyed hash
/src/sys/contrib/zstd/lib/common/
H A Dxxhash.h3484 xxh_u64 const keyed = (xxh_u64)combined ^ bitflip; in XXH3_len_1to3_64b() local
3485 return XXH64_avalanche(keyed); in XXH3_len_1to3_64b()
3500 xxh_u64 const keyed = input64 ^ bitflip; in XXH3_len_4to8_64b() local
3501 return XXH3_rrmxmx(keyed, len); in XXH3_len_4to8_64b()
5122 xxh_u64 const keyed = input_64 ^ bitflip; in XXH3_len_4to8_128b() local
5125 XXH128_hash_t m128 = XXH_mult64to128(keyed, XXH_PRIME64_1 + (len << 2)); in XXH3_len_4to8_128b()
/src/contrib/wpa/hostapd/
H A DREADME252 protection, and non-keyed authentication does not protect against bit
260 keyed packet authentication mechanism (Michael MIC).
/src/contrib/llvm-project/llvm/lib/Support/BLAKE3/
H A DREADME.md188 Initialize a `llvm_blake3_hasher` in the keyed hashing mode. The key must be
/src/sys/contrib/openzfs/module/zstd/lib/common/
H A Dxxhash.h4585 xxh_u64 const keyed = (xxh_u64)combined ^ bitflip; in XXH3_len_1to3_64b() local
4586 return XXH64_avalanche(keyed); in XXH3_len_1to3_64b()
4601 xxh_u64 const keyed = input64 ^ bitflip; in XXH3_len_4to8_64b() local
4602 return XXH3_rrmxmx(keyed, len); in XXH3_len_4to8_64b()
6509 xxh_u64 const keyed = input_64 ^ bitflip; in XXH3_len_4to8_128b() local
6512 XXH128_hash_t m128 = XXH_mult64to128(keyed, XXH_PRIME64_1 + (len << 2)); in XXH3_len_4to8_128b()
/src/crypto/openssl/doc/man1/
H A Dopenssl-dgst.pod.in165 Create MAC (keyed Message Authentication Code). The most popular MAC
/src/crypto/heimdal/
H A DChangeLog.200147 non-keyed checksum when it should be non-keyed
200 return any des-key not just keys that can be string-to-keyed by
H A DChangeLog.19981013 that the checksum has to be keyed, even though later drafts do.
1443 * lib/krb5/rd_safe.c: fix check for keyed and collision-proof
1449 * kdc/kerberos5.c: fix check for keyed and collision-proof
1481 - keyed and collision proof flags to each checksum method
2534 * kdc/kerberos5.c (tgs_rep): support keyed checksums
H A DChangeLog.2003878 calculating the length of the encrypted data, use the keyed
879 checksum length if the enctype supports a keyed checksum. This
943 Microsoft calculates the keyed checksum with the subkey of the
/src/crypto/krb5/src/include/krb5/
H A Dkrb5.hin861 * @param [in] key Encryption key for a keyed checksum
867 * @a key if the checksum type is a keyed checksum. If @a cksumtype is 0 and
890 * @param [in] key Encryption key for a keyed checksum
898 * the checksum type of @a cksum is a keyed checksum, @a key is used to verify
928 * Return a list of keyed checksum types usable with an encryption type.
1041 * Test whether a checksum type is keyed.
1045 * @return @c TRUE if @a ctype is a keyed checksum type, @c FALSE otherwise.
1067 * @param [in] key Encryption key for a keyed checksum
1093 * @param [in] key Encryption key for a keyed checksum
1400 * @param [in] key Encryption key for a keyed checksum
[all …]
/src/crypto/openssl/crypto/engine/
H A DREADME.md134 example tb_cipher.c, implements a hash-table keyed by integer "nid" values.
/src/contrib/sendmail/
H A DREADME429 makemap A program that creates the keyed maps used by the $( ... $)
/src/share/doc/IPv6/
H A DIMPLEMENTATION1938 keyed MD5 with 128bit crypto checksum (rfc1828.txt)
1939 keyed SHA1 with 128bit crypto checksum (no document)
1948 keyed MD5 with 96bit crypto checksum (no document)
1949 keyed SHA1 with 96bit crypto checksum (no document)
1977 keyed SHA1 with 160bit crypto checksum + 32bit padding (rfc1852.txt)
/src/contrib/wpa/wpa_supplicant/
H A DREADME214 protection, and non-keyed authentication does not protect against bit
222 keyed packet authentication mechanism (Michael MIC).

12