Home
last modified time | relevance | path

Searched refs:nonce (Results 1 – 25 of 23817) sorted by path

12345678910>>...953

/dports/accessibility/kmouth/kmouth-21.12.3/po/fr/
H A Dkmouth.po151 msgstr "Énonce la ou les phrases actives"
160nonce la ou les phrases actives. S'il y a du texte dans le champ d'édition, "
202 msgstr "Énonce les phrases actuellement sélectionnées de l'historique"
809 msgstr "Énonce tout de suite"
/dports/accessibility/py-speech-dispatcher/speech-dispatcher-0.10.2/po/
H A Dfr.po255 msgstr "énonce le caractère\n"
260 msgstr "énonce la touche\n"
/dports/accessibility/speech-dispatcher/speech-dispatcher-0.10.2/po/
H A Dfr.po255 msgstr "énonce le caractère\n"
260 msgstr "énonce la touche\n"
/dports/accessibility/wl-gammarelay-rs/wl-gammarelay-rs-0.2.1/cargo-crates/rand_chacha-0.3.1/src/
H A Dguts.rs72 pub fn new(key: &[u8; 32], nonce: &[u8]) -> Self { in new()
73 init_chacha(key, nonce)
235 fn init_chacha(key: &[u8; 32], nonce: &[u8]) -> ChaCha {
238 if nonce.len() == 12 {
239 read_u32le(&nonce[0..4])
243 read_u32le(&nonce[nonce.len() - 8..nonce.len() - 4]),
244 read_u32le(&nonce[nonce.len() - 4..]),
257 fn init_chacha_x(key: &[u8; 32], nonce: &[u8; 24], rounds: u32) -> ChaCha {
260 let nonce0: Mach::u32x4 = m.read_le(&nonce[..16]);
267 let ctr_nonce1 = [0, 0, read_u32le(&nonce[16..20]), read_u32le(&nonce[20..24])];
/dports/archivers/libarchive/libarchive-3.5.2/libarchive/
H A Darchive_cryptor.c171 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init()
196 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_release()
309 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init()
341 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init()
358 ctx->nonce); in aes_ctr_encrypt_counter()
363 ctx->nonce); in aes_ctr_encrypt_counter()
368 ctx->nonce); in aes_ctr_encrypt_counter()
402 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_init()
436 memset(ctx->nonce, 0, sizeof(ctx->nonce)); in aes_ctr_release()
487 uint8_t *const nonce = ctx->nonce; in aes_ctr_increase_counter() local
[all …]
H A Darchive_cryptor_private.h60 uint8_t nonce[AES_BLOCK_SIZE]; member
80 uint8_t nonce[AES_BLOCK_SIZE]; member
97 uint8_t nonce[AES_BLOCK_SIZE]; member
121 uint8_t nonce[AES_BLOCK_SIZE]; member
136 uint8_t nonce[AES_BLOCK_SIZE]; member
/dports/archivers/peazip/peazip-8.1.0.src/
H A Daes_ccm.pas87 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
98 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
109 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
120 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
295 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
302 AES_CCM_Enc_AuthEx := AES_CCM_Core(ctx,true,tag,tLen,@nonce,nLen,hdr,hLen,ptp,pLen,ctp);
309 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
321 else AES_CCM_Enc_Auth := AES_CCM_Core(ctx,true,tag,tLen,@nonce,nLen,hdr,hLen,ptp,pLen,ctp);
329 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
340 err := AES_CCM_Core(ctx,false,tag,tLen,@nonce,nLen,hdr,hLen,ctp,cLen,ptp);
[all …]
H A Daes_eax.pas90 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): i… in AES_EAX_Init()
95 function AES_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TAES_EAXContext): integ… in AES_EAX_Init()
117 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
127 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
141 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): i… in AES_EAX_Init()
144 function AES_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TAES_EAXContext): integ… in AES_EAX_Init()
159 if err=0 then err := AES_OMAC_Update(@nonce, nLen, ctx.MsgOMAC);
233 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
258 err := AES_EAX_Init(Key, KBits, nonce, nLen, ctx);
314 {$ifdef CONST}const{$else}var{$endif} nonce; nLen: word; {nonce: address / length}
[all …]
H A Daes_intf.pas355 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): … in AES_EAX_Init()
377 const nonce; nLen: word; {nonce: address / length}
387 const nonce; nLen : word; {nonce: address / length}
428 const nonce; nLen: word; {nonce: address / length}
438 const nonce; nLen: word; {nonce: address / length}
448 const nonce; nLen: word; {nonce: address / length}
458 const nonce; nLen: word; {nonce: address / length}
H A Daes_intv.pas300 function AES_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TAES_EAXContext): … in AES_EAX_Init()
317 const nonce; nLen: word; {nonce: address / length}
326 const nonce; nLen : word; {nonce: address / length}
363 const nonce; nLen: word; {nonce: address / length}
373 const nonce; nLen: word; {nonce: address / length}
383 const nonce; nLen: word; {nonce: address / length}
393 const nonce; nLen: word; {nonce: address / length}
H A Dsp_eax.pas68 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init()
72 function SP_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TSP_EAXContext): integer; in SP_EAX_Init()
98 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init()
101 function SP_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TSP_EAXContext): integer; in SP_EAX_Init()
116 if err=0 then err := SP_OMAC_Update(@nonce, nLen, ctx.MsgOMAC);
H A Dsp_intf.pas266 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init()
H A Dsp_intv.pas228 function SP_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TSP_EAXContext): int… in SP_EAX_Init()
H A Dt_aes_ws.pas446 function test(var key, hdr, nonce, pt, tct, ttag; nlen, hlen, plen: word): boolean; in test()
455 if AES_EAX_Init(Key, 128, nonce, nlen, ctx)<>0 then exit;
462 if AES_EAX_Init(Key, 128, nonce, nlen, ctx)<>0 then exit;
470 if AES_EAX_Enc_Auth(tag,Key,128,nonce,nlen,@hdr,hLen, @pt,plen, @buf)<>0 then exit;
475 if AES_EAX_Dec_Veri(@ttag,16,key,128,nonce,nlen,@hdr,hLen,@tct,plen,@buf)<>0 then exit;
H A Dt_aesccm.pas187 key, nonce, tag: TAESBlock;
196 nonce := key;
254 nonce[00] := 0;
255 nonce[01] := 0;
256 nonce[02] := 0;
257 nonce[07] := $A0;
258 nonce[08] := $A1;
259 nonce[09] := $A2;
260 nonce[10] := $A3;
261 nonce[11] := $A4;
[all …]
H A Dt_eax1.pas164 procedure test(const key, hdr, nonce, pt, tct, ttag; nlen, hlen, plen, nr: word);
166 procedure test(var key, hdr, nonce, pt, tct, ttag; nlen, hlen, plen, nr: word);
180 err := AES_EAX_Init(Key, 128, nonce, nlen, ctx);
192 err := AES_EAX_Init(Key, 128, nonce, nlen, ctx);
H A Dtf_eax.pas68 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init()
72 function TF_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TTF_EAXContext): integer; in TF_EAX_Init()
98 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init()
101 function TF_EAX_Init(var Key; KBits: word; var nonce; nLen: word; var ctx: TTF_EAXContext): integer; in TF_EAX_Init()
116 if err=0 then err := TF_OMAC_Update(@nonce, nLen, ctx.MsgOMAC);
H A Dtf_intf.pas273 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init()
H A Dtf_intv.pas234 function TF_EAX_Init(const Key; KBits: word; const nonce; nLen: word; var ctx: TTF_EAXContext): int… in TF_EAX_Init()
/dports/archivers/py-borgbackup/borgbackup-1.1.17/
H A DCHANGES.rst1829 - datas: enc: correct factual error -- no nonce involved there.
/dports/archivers/py-borgbackup/borgbackup-1.1.17/docs/
H A Dchanges.rst1829 - datas: enc: correct factual error -- no nonce involved there.
H A Dfaq.rst466 If a nonce (counter) value is reused, AES-CTR mode crypto is broken.
/dports/archivers/py-borgbackup/borgbackup-1.1.17/docs/internals/
H A Ddata-structures.rst825 To reduce payload size, only 8 bytes of the 16 bytes nonce is saved in the
H A Dsecurity.rst205 manifest or has a more recent nonce reservation). If the repository is
/dports/archivers/py-borgbackup/borgbackup-1.1.17/src/borg/crypto/
H A Dkey.py403 nonce = bytes_to_long(payload[33:41])
404 return nonce

12345678910>>...953