| /openbsd-src/usr.bin/ssh/ |
| H A D | PROTOCOL.chacha20poly1305 | 12 Poly1305[2], also by Daniel Bernstein, is a one-time Carter-Wegman MAC 19 data passed to the MAC and in the addition of encryption of the packet 26 authentication. As such, no separate MAC is required. If the 28 the offered MAC algorithms are ignored and no MAC is required to be 49 the MAC. By using an independently-keyed cipher instance to encrypt the 52 its MAC (assuming key derivation, ChaCha20 and Poly1305 are secure). 71 Once the entire packet has been received, the MAC MUST be checked 73 above and the MAC tag calculated using Poly1305 with this key over the 75 MAC is then compared in constant time with the one appended to the 82 encrypted length. Finally, calculate a MAC tag and append it.
|
| H A D | PROTOCOL | 17 1.1. transport: Protocol 2 MAC algorithm "umac-64@openssh.com" 19 This is a new transport-layer MAC method using the UMAC algorithm 54 1.5 transport: Protocol 2 Encrypt-then-MAC MAC algorithms 56 OpenSSH supports MAC algorithms, whose names contain "-etm", that 58 4253. These variants use the so-called "encrypt then MAC" ordering, 59 calculating the MAC over the packet ciphertext rather than the 65 Specifically, the "-etm" MAC algorithms modify the transport protocol 66 to calculate the MAC over the packet ciphertext and to send the packet 68 length of the packet and location of the MAC tag so that it may be 71 As such, the MAC covers: [all …]
|
| /openbsd-src/gnu/usr.bin/binutils-2.17/include/opcode/ |
| H A D | maxq.h | 540 #define MAC 0x02 /* Hardware Multiplier Module. */ macro 660 "MCNT", MAC, 0x1, 0x10 | MOD2, Reg_8W, MAX}, 663 "MA", MAC, 0x2, 0x20 | MOD2, Reg_16W, MAX}, 666 "MB", MAC, 0x3, 0x30 | MOD2, Reg_16W, MAX}, 669 "MC2", MAC, 0x4, 0x40 | MOD2, Reg_16W, MAX}, 672 "MC1", MAC, 0x5, 0x50 | MOD2, Reg_16W, MAX}, 675 "MC0", MAC, 0x6, 0x60 | MOD2, Reg_16W, MAX},
|
| /openbsd-src/gnu/llvm/llvm/lib/Target/ARM/ |
| H A D | ARMScheduleV6.td | 239 // Single-precision FP MAC 242 // Double-precision FP MAC 245 // Single-precision Fused FP MAC 248 // Double-precision Fused FP MAC
|
| H A D | ARMScheduleM4.td | 47 // Loads, MAC's and DIV all get a higher latency of 2 105 // Most FP instructions are single-cycle latency, except MAC's, Div's and Sqrt's.
|
| H A D | ARMScheduleM7.td | 25 // The Cortex-M7 has two ALU, two LOAD, a STORE, a MAC, a BRANCH and a VFP 348 // MAC operations that don't have SchedRW set. 469 // Double-precision chained MAC stalls the pipeline behind it for 3 cycles, 488 // Double-precision fused MAC stalls the pipeline behind it for 2 cycles, making
|
| /openbsd-src/gnu/llvm/llvm/tools/llvm-mt/ |
| H A D | llvm-mt.cpp | 89 unsigned MAI, MAC; in llvm_mt_main() local 91 opt::InputArgList InputArgs = T.ParseArgs(ArgsArr, MAI, MAC); in llvm_mt_main()
|
| /openbsd-src/gnu/llvm/llvm/tools/llvm-cvtres/ |
| H A D | llvm-cvtres.cpp | 123 unsigned MAI, MAC; in main() local 125 opt::InputArgList InputArgs = T.ParseArgs(ArgsArr, MAI, MAC); in main()
|
| /openbsd-src/gnu/llvm/llvm/lib/Target/AArch64/ |
| H A D | AArch64SchedThunderX.td | 38 def THXT8XUnitMAC : ProcResource<1> { let BufferSize = 0; } // Int MAC 59 // MAC 227 // MAC - Operands are generally needed one cycle later in the MAC pipe. 349 // Floating Point MAC, DIV, SQRT
|
| H A D | AArch64SchedA53.td | 43 def A53UnitMAC : ProcResource<1> { let BufferSize = 0; } // Int MAC 68 // MAC 184 // MAC - Operands are generally needed one cycle later in the MAC pipe. 288 // Floating Point MAC, DIV, SQRT
|
| /openbsd-src/regress/usr.bin/ssh/ |
| H A D | integrity.sh | 55 Corrupted?MAC* | *message?authentication?code?incorrect*)
|
| /openbsd-src/gnu/usr.bin/binutils-2.17/cpu/ |
| H A D | m32r.cpu | 799 (MAC - () "Multiply/Accumulate") 1467 (MACH m32r) (PIPE S) (IDOC MAC) 1487 ((MACH m32rx,m32r2) (PIPE S) (IDOC MAC)) 1505 ((MACH m32r) (PIPE S) (IDOC MAC)) 1522 ((MACH m32rx,m32r2) (PIPE S) (IDOC MAC)) 1540 ((MACH m32r) (PIPE S) (IDOC MAC)) 1557 ((MACH m32rx,m32r2) (PIPE S) SPECIAL (IDOC MAC)) 1570 ((MACH m32r) (PIPE S) (IDOC MAC)) 1587 ((MACH m32rx,m32r2) (PIPE S) SPECIAL (IDOC MAC)) 1875 ((MACH m32r) (PIPE S) (IDOC MAC)) [all …]
|
| /openbsd-src/gnu/gcc/gcc/config/crx/ |
| H A D | crx.opt | 23 Target Report Mask(MAC)
|
| /openbsd-src/gnu/llvm/llvm/tools/llvm-rc/ |
| H A D | llvm-rc.cpp | 369 unsigned MAI, MAC; in parseWindresOptions() local 370 opt::InputArgList InputArgs = T.ParseArgs(ArgsArr, MAI, MAC); in parseWindresOptions() 519 unsigned MAI, MAC; in parseRcOptions() local 520 opt::InputArgList InputArgs = T.ParseArgs(ArgsArr, MAI, MAC); in parseRcOptions()
|
| /openbsd-src/gnu/gcc/gcc/config/score/ |
| H A D | score.opt | 39 Target RejectNegative Report Mask(MAC)
|
| /openbsd-src/usr.sbin/ldapd/schema/ |
| H A D | nis.schema | 124 DESC 'MAC address in maximal, colon separated hex notation, 240 DESC 'A device with a MAC address; device SHOULD be used as a
|
| /openbsd-src/gnu/gcc/gcc/config/h8300/ |
| H A D | h8300.opt | 31 Target Mask(MAC)
|
| /openbsd-src/gnu/llvm/llvm/lib/Option/ |
| H A D | OptTable.cpp | 501 unsigned MAI, MAC; in parseArgs() local 502 opt::InputArgList Args = ParseArgs(ArrayRef(NewArgv), MAI, MAC); in parseArgs() 503 if (MAC) in parseArgs()
|
| /openbsd-src/share/snmp/ |
| H A D | BRIDGE-MIB.txt | 82 and its last 6 octets contain the MAC address used to 84 numerically smallest MAC address of all ports on the 169 "The MAC address used by this bridge when it must be 171 that this be the numerically smallest MAC address of 804 "Information about a specific unicast MAC address 825 "A unicast MAC address for which the bridge has 935 -- can differ from the MAC layer (especially if several layers 944 "The maximum size of the INFO (non-MAC) field that 1048 "The destination MAC address in a frame to which this 1074 specific port and destined for a specific MAC address,
|
| /openbsd-src/regress/sys/net/pf_state/ |
| H A D | README | 15 You should choose a different set of MAC and IP addresses.
|
| /openbsd-src/regress/sys/netinet/arp/ |
| H A D | README | 21 You should choose a different set of MAC and IP addresses.
|
| /openbsd-src/lib/libssl/doc/ |
| H A D | openssl.txt | 985 algorithms, iter is the encryption iteration count, mac_iter is the MAC 1028 contains a MAC which is a kind of password protected digest to preserve 1041 are collected into a STACK and added to a PKCS12 structure. Finally a MAC 1044 Pulling one apart is basically the reverse process. The MAC is verified against 1122 Add a MAC to a PKCS12 structure. If EVP_MD is NULL use SHA-1, the spec suggests 1192 Check to see if a MAC is present. 1196 Verify a MAC on a PKCS12 structure. Returns an error if MAC not present. 1206 ASCII password and length. The password on the MAC is called the "integrity 1220 not support an iteration count on the MAC. If the password for the MAC and 1222 count for encryption if the MAC has no count. The MAC could be attacked
|
| /openbsd-src/sys/arch/macppc/conf/ |
| H A D | files.macppc | 30 # MAC generic 107 # MAC periph
|
| /openbsd-src/sys/stand/efi/include/ |
| H A D | efinet.h | 267 OUT EFI_MAC_ADDRESS *MAC
|
| /openbsd-src/gnu/llvm/llvm/tools/llvm-dwarfutil/ |
| H A D | llvm-dwarfutil.cpp | 477 unsigned MAC; in main() local 479 opt::InputArgList Args = T.ParseArgs(ArgsArr, MAI, MAC); in main()
|