| /src/crypto/openssh/ |
| H A D | PROTOCOL.chacha20poly1305 | 40 The instance keyed by K_1 is a stream cipher that is used only 42 keyed by K_2, is used in conjunction with poly1305 to build an AEAD 49 the MAC. By using an independently-keyed cipher instance to encrypt the
|
| /src/contrib/file/magic/Magdir/ |
| H A D | basis | 11 >7 string \002 keyed file
|
| H A D | linux | 696 >>>>>>>>12 ulelong&4 !0 \b, keyed hash siphash24
|
| /src/contrib/wpa/wpa_supplicant/doc/docbook/ |
| H A D | wpa_background.sgml | 44 makes attacks easier, there is no replay protection, and non-keyed 53 keyed packet authentication mechanism (Michael MIC).</para>
|
| /src/sys/contrib/device-tree/src/arm64/marvell/ |
| H A D | cn9130-cf-base.dts | 45 /* M.2 is B-keyed, so w-disable is for WWAN */
|
| /src/contrib/sendmail/contrib/ |
| H A D | domainmap.m4 | 13 PH) which is keyed on username alone (as opposed to the
|
| /src/crypto/openssl/doc/internal/man7/ |
| H A D | VERSION.pod | 19 This file is a set of keyed information looking like simple variable
|
| /src/crypto/openssl/test/recipes/30-test_evp_data/ |
| H A D | evpmac_blake.txt | 144 Title = Custom keyed BLAKE2 tests
|
| /src/crypto/openssl/crypto/property/ |
| H A D | README.md | 51 * A query cache is desirable. This would be a hash table keyed by the
|
| /src/crypto/openssl/doc/man7/ |
| H A D | EVP_KDF-KB.pod | 10 (KBKDF). KBKDF derives a key from repeated application of a keyed MAC to an
|
| /src/contrib/llvm-project/llvm/lib/Support/ |
| H A D | xxhash.cpp | 785 uint64_t const keyed = input_64 ^ bitflip; in XXH3_len_4to8_128b() local 789 XXH128_hash_t m128 = XXH_mult64to128(keyed, PRIME64_1 + (len << 2)); in XXH3_len_4to8_128b()
|
| /src/crypto/openssl/doc/man3/ |
| H A D | HMAC.pod | 56 HMAC is a MAC (message authentication code), i.e. a keyed hash
|
| /src/sys/contrib/zstd/lib/common/ |
| H A D | xxhash.h | 3484 xxh_u64 const keyed = (xxh_u64)combined ^ bitflip; in XXH3_len_1to3_64b() local 3485 return XXH64_avalanche(keyed); in XXH3_len_1to3_64b() 3500 xxh_u64 const keyed = input64 ^ bitflip; in XXH3_len_4to8_64b() local 3501 return XXH3_rrmxmx(keyed, len); in XXH3_len_4to8_64b() 5122 xxh_u64 const keyed = input_64 ^ bitflip; in XXH3_len_4to8_128b() local 5125 XXH128_hash_t m128 = XXH_mult64to128(keyed, XXH_PRIME64_1 + (len << 2)); in XXH3_len_4to8_128b()
|
| /src/contrib/wpa/hostapd/ |
| H A D | README | 252 protection, and non-keyed authentication does not protect against bit 260 keyed packet authentication mechanism (Michael MIC).
|
| /src/contrib/llvm-project/llvm/lib/Support/BLAKE3/ |
| H A D | README.md | 188 Initialize a `llvm_blake3_hasher` in the keyed hashing mode. The key must be
|
| /src/sys/contrib/openzfs/module/zstd/lib/common/ |
| H A D | xxhash.h | 4585 xxh_u64 const keyed = (xxh_u64)combined ^ bitflip; in XXH3_len_1to3_64b() local 4586 return XXH64_avalanche(keyed); in XXH3_len_1to3_64b() 4601 xxh_u64 const keyed = input64 ^ bitflip; in XXH3_len_4to8_64b() local 4602 return XXH3_rrmxmx(keyed, len); in XXH3_len_4to8_64b() 6509 xxh_u64 const keyed = input_64 ^ bitflip; in XXH3_len_4to8_128b() local 6512 XXH128_hash_t m128 = XXH_mult64to128(keyed, XXH_PRIME64_1 + (len << 2)); in XXH3_len_4to8_128b()
|
| /src/crypto/openssl/doc/man1/ |
| H A D | openssl-dgst.pod.in | 165 Create MAC (keyed Message Authentication Code). The most popular MAC
|
| /src/crypto/heimdal/ |
| H A D | ChangeLog.2001 | 47 non-keyed checksum when it should be non-keyed 200 return any des-key not just keys that can be string-to-keyed by
|
| H A D | ChangeLog.1998 | 1013 that the checksum has to be keyed, even though later drafts do. 1443 * lib/krb5/rd_safe.c: fix check for keyed and collision-proof 1449 * kdc/kerberos5.c: fix check for keyed and collision-proof 1481 - keyed and collision proof flags to each checksum method 2534 * kdc/kerberos5.c (tgs_rep): support keyed checksums
|
| H A D | ChangeLog.2003 | 878 calculating the length of the encrypted data, use the keyed 879 checksum length if the enctype supports a keyed checksum. This 943 Microsoft calculates the keyed checksum with the subkey of the
|
| /src/crypto/krb5/src/include/krb5/ |
| H A D | krb5.hin | 861 * @param [in] key Encryption key for a keyed checksum 867 * @a key if the checksum type is a keyed checksum. If @a cksumtype is 0 and 890 * @param [in] key Encryption key for a keyed checksum 898 * the checksum type of @a cksum is a keyed checksum, @a key is used to verify 928 * Return a list of keyed checksum types usable with an encryption type. 1041 * Test whether a checksum type is keyed. 1045 * @return @c TRUE if @a ctype is a keyed checksum type, @c FALSE otherwise. 1067 * @param [in] key Encryption key for a keyed checksum 1093 * @param [in] key Encryption key for a keyed checksum 1400 * @param [in] key Encryption key for a keyed checksum [all …]
|
| /src/crypto/openssl/crypto/engine/ |
| H A D | README.md | 134 example tb_cipher.c, implements a hash-table keyed by integer "nid" values.
|
| /src/contrib/sendmail/ |
| H A D | README | 429 makemap A program that creates the keyed maps used by the $( ... $)
|
| /src/share/doc/IPv6/ |
| H A D | IMPLEMENTATION | 1938 keyed MD5 with 128bit crypto checksum (rfc1828.txt) 1939 keyed SHA1 with 128bit crypto checksum (no document) 1948 keyed MD5 with 96bit crypto checksum (no document) 1949 keyed SHA1 with 96bit crypto checksum (no document) 1977 keyed SHA1 with 160bit crypto checksum + 32bit padding (rfc1852.txt)
|
| /src/contrib/wpa/wpa_supplicant/ |
| H A D | README | 214 protection, and non-keyed authentication does not protect against bit 222 keyed packet authentication mechanism (Michael MIC).
|