/dports/accessibility/kmouth/kmouth-21.12.3/po/fr/ |
H A D | kmouth.po | 151 msgstr "Énonce la ou les phrases actives" 160 "Énonce la ou les phrases actives. S'il y a du texte dans le champ d'édition, " 202 msgstr "Énonce les phrases actuellement sélectionnées de l'historique" 809 msgstr "Énonce tout de suite"
|
/dports/accessibility/py-speech-dispatcher/speech-dispatcher-0.10.2/po/ |
H A D | fr.po | 255 msgstr "énonce le caractère\n" 260 msgstr "énonce la touche\n"
|
/dports/accessibility/speech-dispatcher/speech-dispatcher-0.10.2/po/ |
H A D | fr.po | 255 msgstr "énonce le caractère\n" 260 msgstr "énonce la touche\n"
|
/dports/accessibility/wl-gammarelay-rs/wl-gammarelay-rs-0.2.1/cargo-crates/rand_chacha-0.3.1/src/ |
H A D | guts.rs | 72 pub fn new(key: &[u8; 32], nonce: &[u8]) -> Self { in new() 73 init_chacha(key, nonce) 235 fn init_chacha(key: &[u8; 32], nonce: &[u8]) -> ChaCha { 238 if nonce.len() == 12 { 239 read_u32le(&nonce[0..4]) 243 read_u32le(&nonce[nonce.len() - 8..nonce.len() - 4]), 244 read_u32le(&nonce[nonce.len() - 4..]), 257 fn init_chacha_x(key: &[u8; 32], nonce: &[u8; 24], rounds: u32) -> ChaCha { 260 let nonce0: Mach::u32x4 = m.read_le(&nonce[..16]); 267 let ctr_nonce1 = [0, 0, read_u32le(&nonce[16..20]), read_u32le(&nonce[20..24])];
|
/dports/archivers/libarchive/libarchive-3.5.2/libarchive/ |
H A D | archive_cryptor.c | 171 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init() 196 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_release() 309 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init() 341 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init() 358 ctx->nonce); in aes_ctr_encrypt_counter() 363 ctx->nonce); in aes_ctr_encrypt_counter() 368 ctx->nonce); in aes_ctr_encrypt_counter() 402 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init() 436 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_release() 487 uint8_t *const nonce = ctx->nonce; in aes_ctr_increase_counter() local [all …]
|
H A D | archive_cryptor_private.h | 60 uint8_t nonce[AES_BLOCK_SIZE]; member 80 uint8_t nonce[AES_BLOCK_SIZE]; member 97 uint8_t nonce[AES_BLOCK_SIZE]; member 121 uint8_t nonce[AES_BLOCK_SIZE]; member 136 uint8_t nonce[AES_BLOCK_SIZE]; member
|
/dports/archivers/peazip/peazip-8.1.0.src/ |
H A D | aes_ccm.pas | 87 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 98 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 109 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 120 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 295 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 302 AES_CCM_Enc_AuthEx := AES_CCM_Core(ctx,true,tag,tLen,@nonce,nLen,hdr,hLen,ptp,pLen,ctp); 309 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 321 else AES_CCM_Enc_Auth := AES_CCM_Core(ctx,true,tag,tLen,@nonce,nLen,hdr,hLen,ptp,pLen,ctp); 329 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 340 err := AES_CCM_Core(ctx,false,tag,tLen,@nonce,nLen,hdr,hLen,ctp,cLen,ptp); [all …]
|
H A D | aes_eax.pas | 90 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): i… in AES_EAX_Init() 95 function AES_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TAES_EAXContext): integ… in AES_EAX_Init() 117 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 127 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 141 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): i… in AES_EAX_Init() 144 function AES_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TAES_EAXContext): integ… in AES_EAX_Init() 159 if err=0 then err := AES_OMAC_Update(@nonce, nLen, ctx.MsgOMAC); 233 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} 258 err := AES_EAX_Init(Key, KBits, nonce, nLen, ctx); 314 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length} [all …]
|
H A D | aes_intf.pas | 355 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): … in AES_EAX_Init() 377 const nonce; nLen: word; {nonce: address / length} 387 const nonce; nLen : word; {nonce: address / length} 428 const nonce; nLen: word; {nonce: address / length} 438 const nonce; nLen: word; {nonce: address / length} 448 const nonce; nLen: word; {nonce: address / length} 458 const nonce; nLen: word; {nonce: address / length}
|
H A D | aes_intv.pas | 300 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): … in AES_EAX_Init() 317 const nonce; nLen: word; {nonce: address / length} 326 const nonce; nLen : word; {nonce: address / length} 363 const nonce; nLen: word; {nonce: address / length} 373 const nonce; nLen: word; {nonce: address / length} 383 const nonce; nLen: word; {nonce: address / length} 393 const nonce; nLen: word; {nonce: address / length}
|
H A D | sp_eax.pas | 68 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init() 72 function SP_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TSP_EAXContext): integer; in SP_EAX_Init() 98 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init() 101 function SP_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TSP_EAXContext): integer; in SP_EAX_Init() 116 if err=0 then err := SP_OMAC_Update(@nonce, nLen, ctx.MsgOMAC);
|
H A D | sp_intf.pas | 266 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init()
|
H A D | sp_intv.pas | 228 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init()
|
H A D | t_aes_ws.pas | 446 function test(var key, hdr, nonce, pt, tct, ttag; nlen, hlen, plen: word): boolean; in test() 455 if AES_EAX_Init(Key, 128, nonce, nlen, ctx)<>0 then exit; 462 if AES_EAX_Init(Key, 128, nonce, nlen, ctx)<>0 then exit; 470 if AES_EAX_Enc_Auth(tag,Key,128,nonce,nlen,@hdr,hLen, @pt,plen, @buf)<>0 then exit; 475 if AES_EAX_Dec_Veri(@ttag,16,key,128,nonce,nlen,@hdr,hLen,@tct,plen,@buf)<>0 then exit;
|
H A D | t_aesccm.pas | 187 key, nonce, tag: TAESBlock; 196 nonce := key; 254 nonce[00] := 0; 255 nonce[01] := 0; 256 nonce[02] := 0; 257 nonce[07] := $A0; 258 nonce[08] := $A1; 259 nonce[09] := $A2; 260 nonce[10] := $A3; 261 nonce[11] := $A4; [all …]
|
H A D | t_eax1.pas | 164 procedure test(const key, hdr, nonce, pt, tct, ttag; nlen, hlen, plen, nr: word); 166 procedure test(var key, hdr, nonce, pt, tct, ttag; nlen, hlen, plen, nr: word); 180 err := AES_EAX_Init(Key, 128, nonce, nlen, ctx); 192 err := AES_EAX_Init(Key, 128, nonce, nlen, ctx);
|
H A D | tf_eax.pas | 68 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init() 72 function TF_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TTF_EAXContext): integer; in TF_EAX_Init() 98 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init() 101 function TF_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TTF_EAXContext): integer; in TF_EAX_Init() 116 if err=0 then err := TF_OMAC_Update(@nonce, nLen, ctx.MsgOMAC);
|
H A D | tf_intf.pas | 273 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init()
|
H A D | tf_intv.pas | 234 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init()
|
/dports/archivers/py-borgbackup/borgbackup-1.1.17/ |
H A D | CHANGES.rst | 1829 - datas: enc: correct factual error -- no nonce involved there.
|
/dports/archivers/py-borgbackup/borgbackup-1.1.17/docs/ |
H A D | changes.rst | 1829 - datas: enc: correct factual error -- no nonce involved there.
|
H A D | faq.rst | 466 If a nonce (counter) value is reused, AES-CTR mode crypto is broken.
|
/dports/archivers/py-borgbackup/borgbackup-1.1.17/docs/internals/ |
H A D | data-structures.rst | 825 To reduce payload size, only 8 bytes of the 16 bytes nonce is saved in the
|
H A D | security.rst | 205 manifest or has a more recent nonce reservation). If the repository is
|
/dports/archivers/py-borgbackup/borgbackup-1.1.17/src/borg/crypto/ |
H A D | key.py | 403 nonce = bytes_to_long(payload[33:41]) 404 return nonce
|