/external/libcups/cups/ |
D | usersys.c | 65 http_encryption_t encryption; /* Encryption setting */ member 120 if (cg->encryption == (http_encryption_t)-1) in cupsEncryption() 123 return (cg->encryption); in cupsEncryption() 286 cg->encryption = e; in cupsSetEncryption() 932 if (cg->encryption == (http_encryption_t)-1) in _cupsSetDefaults() 933 cg->encryption = cc.encryption; in _cupsSetDefaults() 1076 if (cc->encryption == (http_encryption_t)-1) in cups_finalize_client_conf() 1077 cc->encryption = HTTP_ENCRYPTION_IF_REQUESTED; in cups_finalize_client_conf() 1173 cc->encryption = (http_encryption_t)-1; in cups_init_client_conf() 1293 cc->encryption = HTTP_ENCRYPTION_NEVER; in cups_set_encryption() [all …]
|
D | http.c | 53 http_encryption_t encryption, 455 http_encryption_t encryption, /* I - Type of encryption to use */ in httpConnect2() argument 463 …ocking=%d, msec=%d, cancel=%p)", host, port, (void *)addrlist, family, encryption, blocking, msec,… in httpConnect2() 469 if ((http = http_create(host, port, addrlist, family, encryption, blocking, in httpConnect2() 503 http_encryption_t encryption) /* I - Type of encryption to use */ in httpConnectEncrypt() argument 506 host, port, encryption)); in httpConnectEncrypt() 508 return (httpConnect2(host, port, NULL, AF_UNSPEC, encryption, 1, 30000, in httpConnectEncrypt() 559 http->encryption = e; in httpEncryption() 561 if ((http->encryption == HTTP_ENCRYPTION_ALWAYS && !http->tls) || in httpEncryption() 562 (http->encryption == HTTP_ENCRYPTION_NEVER && http->tls)) in httpEncryption() [all …]
|
D | dest-localization.c | 334 http_encryption_t encryption; /* Encryption to use */ in cups_create_localizations() local 393 encryption = HTTP_ENCRYPTION_ALWAYS; in cups_create_localizations() 395 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in cups_create_localizations() 397 if ((http2 = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, in cups_create_localizations()
|
D | testhttp.c | 226 http_encryption_t encryption; /* Encryption type */ in main() local 655 encryption = HTTP_ENCRYPTION_ALWAYS; in main() 657 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in main() 659 http = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, 30000, NULL); in main()
|
/external/scapy/test/ |
D | ipsec.uts | 68 * after encryption the original packet payload should NOT be readable 120 * after encryption the original packet payload should NOT be readable 171 * after encryption the original packet payload should NOT be readable 223 * after encryption the original packet payload should NOT be readable 274 * after encryption the original packet payload should NOT be readable 325 * after encryption the original packet payload should NOT be readable 375 * after encryption packet should be encapsulated with the given ip tunnel header 408 * after encryption packet should be encapsulated with the given ip tunnel header 416 * after encryption the original packet payload should NOT be readable 443 * after encryption packet should be encapsulated with the given ip tunnel header [all …]
|
/external/cros/system_api/dbus/authpolicy/ |
D | active_directory_info.proto | 94 // Domain join failed because KDC does not support the encryption enforced in 95 // the Samba configuration, e.g. if 'kerberos encryption types' is set to 96 // 'strong' to enforce AES encryption, but KDC does not support AES. 177 // What Kerberos encryption types kinit should use. 197 // Supported Kerberos encryption types for domain join. By default, only 202 // allow strong encryption. In this case, domain join fails. Likewise, there 203 // might also be rare use cases that require legacy encryption only. If the 204 // server supports strong encryption, it is always preferred. 206 // DeviceKerberosEncryptionTypes policy is used to determine encryption types.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/external/libcups/filter/ |
D | testclient.c | 38 http_encryption_t encryption; /* Use encryption? */ member 85 http_encryption_t encryption; /* Encryption mode */ in main() local 205 encryption = HTTP_ENCRYPTION_ALWAYS; in main() 207 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in main() 209 if ((http = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, 0, NULL)) == NULL) in main() 289 monitor.encryption = encryption; in main() 756 …http = httpConnect2(monitor->hostname, monitor->port, NULL, AF_UNSPEC, monitor->encryption, 1, 0, … in monitor_printer()
|
/external/u-boot/board/xilinx/zynqmp/ |
D | Kconfig | 14 either authentication or encryption or both encryption
|
/external/apache-commons-compress/ |
D | README.txt | 24 possession, use, and/or re-export to another country, of encryption 25 software. BEFORE using any encryption software, please check your 27 possession, or use, and re-export of encryption software, to see if
|
/external/openssh/ |
D | PROTOCOL.chacha20poly1305 | 2 encryption cipher supported by OpenSSH. 17 authenticated encryption mode. The construction used is based on that 25 The chacha20-poly1305@openssh.com offers both encryption and 60 for encryption of the packet payload. 87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
|
D | OVERVIEW | 36 - Ssh contains several encryption algorithms. These are all 48 RSA key generation, encryption, decryption 69 encryption routines. 145 negotiate encryption, then perform authentication, preparatory
|
/external/wycheproof/doc/ |
D | rsa.md | 36 ## RSA PKCS #1 v1.5 encryption 40 PKCS #1 v1.5 encryption often depends on the amount of information leaked after 46 chosen ciphertexts [S10], though in this case the encryption did not use PKCS #1 102 the RSA encryption standard PKCS# 1" Crypto 98 105 encryption padding (OAEP) as standardized in PKCS# 1 v2.0", Crypto 2001 This 108 "Errors matter: Breaking RSA-based PIN encryption with thirty ciphertext
|
/external/u-boot/tools/ |
D | zynqimage.c | 74 uint32_t encryption; /* 0x28 */ member 99 checksum += le32_to_cpu(ptr->encryption); in zynqimage_checksum() 121 ptr->encryption = cpu_to_le32(ENCRYPTION_NONE); in zynqimage_default_header()
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
D | DefaultCMSSignatureAlgorithmNameGenerator.java | 27 private void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument 30 encryptionAlgs.put(alias, encryption); in addEntries()
|
D | CMSSignedHelper.java | 43 private static void addEntries(ASN1ObjectIdentifier alias, String encryption) in addEntries() argument 45 encryptionAlgs.put(alias.getId(), encryption); in addEntries() local
|
/external/python/rsa/doc/ |
D | compatibility.rst | 7 Python-RSA implements encryption and signatures according to PKCS#1 27 :ref:`VARBLOCK <bigfiles>` encryption:
|
D | usage.rst | 18 as the *encryption key*. Decrypting a message can only be done using 263 encryption for you. 274 1. decrypt/encrypt_bigfile() does not implement `Authenticated encryption`_ nor 277 2. decrypt/encrypt_bigfile() does not use hybrid encryption (it uses plain RSA) 282 .. _Authenticated encryption: https://en.wikipedia.org/wiki/Authenticated_encryption
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 47 hardware. It still uses RC4 for the encryption like WEP, but with 60 Group Key Handshake) for generating and exchanging data encryption 75 support for more robust encryption algorithm (CCMP: AES in Counter
|
/external/python/rsa/ |
D | METADATA | 2 description: "Python-RSA is a pure-Python RSA implementation. It supports encryption and decryption…
|
/external/scrypt/lib/ |
D | README | 5 included here which is not actually used by the scrypt file encryption
|
/external/ukey2/src/main/proto/ |
D | securemessage.proto | 39 // Supported encryption schemes 41 // No encryption
|
/external/libvpx/libvpx/third_party/libwebm/mkvparser/ |
D | mkvparser.cc | 4266 ContentEncryption* const encryption = in ParseContentEncodingEntry() local 4268 if (!encryption) in ParseContentEncodingEntry() 4271 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry() 4273 delete encryption; in ParseContentEncodingEntry() 4276 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry() 4346 ContentEncryption* encryption) { in ParseEncryptionEntry() argument 4348 assert(encryption); in ParseEncryptionEntry() 4360 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry() 4361 if (encryption->algo != 5) in ParseEncryptionEntry() 4364 delete[] encryption->key_id; in ParseEncryptionEntry() [all …]
|
/external/libvpx/libwebm/mkvparser/ |
D | mkvparser.cc | 4268 ContentEncryption* const encryption = in ParseContentEncodingEntry() local 4270 if (!encryption) in ParseContentEncodingEntry() 4273 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry() 4275 delete encryption; in ParseContentEncodingEntry() 4279 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry() 4355 ContentEncryption* encryption) { in ParseEncryptionEntry() argument 4357 assert(encryption); in ParseEncryptionEntry() 4369 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry() 4370 if (encryption->algo != 5) in ParseEncryptionEntry() 4373 delete[] encryption->key_id; in ParseEncryptionEntry() [all …]
|
/external/libaom/libaom/third_party/libwebm/mkvparser/ |
D | mkvparser.cc | 4266 ContentEncryption* const encryption = in ParseContentEncodingEntry() local 4268 if (!encryption) in ParseContentEncodingEntry() 4271 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry() 4273 delete encryption; in ParseContentEncodingEntry() 4276 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry() 4346 ContentEncryption* encryption) { in ParseEncryptionEntry() argument 4348 assert(encryption); in ParseEncryptionEntry() 4360 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry() 4361 if (encryption->algo != 5) in ParseEncryptionEntry() 4364 delete[] encryption->key_id; in ParseEncryptionEntry() [all …]
|