/external/exoplayer/tree/testdata/src/test/assets/mp4/ |
D | sample_ac4_protected.mp4.0.dump | 24 encryption key = length 16, hash 9FDDEA52 30 encryption key = length 16, hash 9FDDEA52 36 encryption key = length 16, hash 9FDDEA52 42 encryption key = length 16, hash 9FDDEA52 48 encryption key = length 16, hash 9FDDEA52 54 encryption key = length 16, hash 9FDDEA52 60 encryption key = length 16, hash 9FDDEA52 66 encryption key = length 16, hash 9FDDEA52 72 encryption key = length 16, hash 9FDDEA52 78 encryption key = length 16, hash 9FDDEA52 [all …]
|
D | sample_ac4_protected.mp4.unknown_length.dump | 24 encryption key = length 16, hash 9FDDEA52 30 encryption key = length 16, hash 9FDDEA52 36 encryption key = length 16, hash 9FDDEA52 42 encryption key = length 16, hash 9FDDEA52 48 encryption key = length 16, hash 9FDDEA52 54 encryption key = length 16, hash 9FDDEA52 60 encryption key = length 16, hash 9FDDEA52 66 encryption key = length 16, hash 9FDDEA52 72 encryption key = length 16, hash 9FDDEA52 78 encryption key = length 16, hash 9FDDEA52 [all …]
|
D | sample_ac4_protected.mp4.1.dump | 24 encryption key = length 16, hash 9FDDEA52 30 encryption key = length 16, hash 9FDDEA52 36 encryption key = length 16, hash 9FDDEA52 42 encryption key = length 16, hash 9FDDEA52 48 encryption key = length 16, hash 9FDDEA52 54 encryption key = length 16, hash 9FDDEA52 60 encryption key = length 16, hash 9FDDEA52 66 encryption key = length 16, hash 9FDDEA52 72 encryption key = length 16, hash 9FDDEA52 78 encryption key = length 16, hash 9FDDEA52 [all …]
|
D | sample_ac4_protected.mp4.2.dump | 24 encryption key = length 16, hash 9FDDEA52 30 encryption key = length 16, hash 9FDDEA52 36 encryption key = length 16, hash 9FDDEA52 42 encryption key = length 16, hash 9FDDEA52 48 encryption key = length 16, hash 9FDDEA52 54 encryption key = length 16, hash 9FDDEA52 60 encryption key = length 16, hash 9FDDEA52
|
/external/python/cryptography/docs/ |
D | glossary.rst | 14 encryption 26 Cryptographic operations where encryption and decryption use the same 31 Cryptographic operations where encryption and decryption use different 32 keys. There are separate encryption and decryption keys. Typically 33 encryption is performed using a :term:`public key`, and it can then be 55 individual (or program). Like encryption, authentication can be either 57 encryption. 60 This is a property of encryption systems whereby two encrypted messages 61 aren't distinguishable without knowing the encryption key. This is 62 considered a basic, necessary property for a working encryption system. [all …]
|
/external/python/cryptography/.travis/downstream.d/ |
D | dynamodb-encryption-sdk.sh | 5 git clone --depth=1 https://github.com/awslabs/aws-dynamodb-encryption-python 6 cd aws-dynamodb-encryption-python 12 cd aws-dynamodb-encryption-python
|
D | aws-encryption-sdk.sh | 5 git clone --depth=1 https://github.com/awslabs/aws-encryption-sdk-python 6 cd aws-encryption-sdk-python 12 cd aws-encryption-sdk-python
|
/external/libcups/cups/ |
D | usersys.c | 65 http_encryption_t encryption; /* Encryption setting */ member 120 if (cg->encryption == (http_encryption_t)-1) in cupsEncryption() 123 return (cg->encryption); in cupsEncryption() 286 cg->encryption = e; in cupsSetEncryption() 932 if (cg->encryption == (http_encryption_t)-1) in _cupsSetDefaults() 933 cg->encryption = cc.encryption; in _cupsSetDefaults() 1076 if (cc->encryption == (http_encryption_t)-1) in cups_finalize_client_conf() 1077 cc->encryption = HTTP_ENCRYPTION_IF_REQUESTED; in cups_finalize_client_conf() 1173 cc->encryption = (http_encryption_t)-1; in cups_init_client_conf() 1293 cc->encryption = HTTP_ENCRYPTION_NEVER; in cups_set_encryption() [all …]
|
D | http.c | 53 http_encryption_t encryption, 455 http_encryption_t encryption, /* I - Type of encryption to use */ in httpConnect2() argument 463 …ocking=%d, msec=%d, cancel=%p)", host, port, (void *)addrlist, family, encryption, blocking, msec,… in httpConnect2() 469 if ((http = http_create(host, port, addrlist, family, encryption, blocking, in httpConnect2() 503 http_encryption_t encryption) /* I - Type of encryption to use */ in httpConnectEncrypt() argument 506 host, port, encryption)); in httpConnectEncrypt() 508 return (httpConnect2(host, port, NULL, AF_UNSPEC, encryption, 1, 30000, in httpConnectEncrypt() 559 http->encryption = e; in httpEncryption() 561 if ((http->encryption == HTTP_ENCRYPTION_ALWAYS && !http->tls) || in httpEncryption() 562 (http->encryption == HTTP_ENCRYPTION_NEVER && http->tls)) in httpEncryption() [all …]
|
/external/scapy/test/ |
D | ipsec.uts | 68 * after encryption the original packet payload should NOT be readable 120 * after encryption the original packet payload should NOT be readable 171 * after encryption the original packet payload should NOT be readable 223 * after encryption the original packet payload should NOT be readable 274 * after encryption the original packet payload should NOT be readable 325 * after encryption the original packet payload should NOT be readable 375 * after encryption packet should be encapsulated with the given ip tunnel header 408 * after encryption packet should be encapsulated with the given ip tunnel header 416 * after encryption the original packet payload should NOT be readable 443 * after encryption packet should be encapsulated with the given ip tunnel header [all …]
|
/external/cros/system_api/dbus/authpolicy/ |
D | active_directory_info.proto | 94 // Domain join failed because KDC does not support the encryption enforced in 95 // the Samba configuration, e.g. if 'kerberos encryption types' is set to 96 // 'strong' to enforce AES encryption, but KDC does not support AES. 177 // What Kerberos encryption types kinit should use. 197 // Supported Kerberos encryption types for domain join. By default, only 202 // allow strong encryption. In this case, domain join fails. Likewise, there 203 // might also be rare use cases that require legacy encryption only. If the 204 // server supports strong encryption, it is always preferred. 206 // DeviceKerberosEncryptionTypes policy is used to determine encryption types.
|
/external/u-boot/board/xilinx/zynqmp/ |
D | Kconfig | 14 either authentication or encryption or both encryption
|
/external/python/cryptography/vectors/cryptography_vectors/asymmetric/RSA/pkcs-1v2-1d2-vec/ |
D | readme.txt | 11 oaep-vect.txt Test vectors for RSA-OAEP encryption. 13 encryption and RSA decryption with CRT.
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/external/libcups/filter/ |
D | testclient.c | 38 http_encryption_t encryption; /* Use encryption? */ member 85 http_encryption_t encryption; /* Encryption mode */ in main() local 205 encryption = HTTP_ENCRYPTION_ALWAYS; in main() 207 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in main() 209 if ((http = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, 0, NULL)) == NULL) in main() 289 monitor.encryption = encryption; in main() 756 …http = httpConnect2(monitor->hostname, monitor->port, NULL, AF_UNSPEC, monitor->encryption, 1, 0, … in monitor_printer()
|
/external/apache-commons-compress/ |
D | README.txt | 24 possession, use, and/or re-export to another country, of encryption 25 software. BEFORE using any encryption software, please check your 27 possession, or use, and re-export of encryption software, to see if
|
/external/u-boot/board/xilinx/zynq/ |
D | Kconfig | 29 either authentication or encryption or both encryption
|
/external/openssh/ |
D | PROTOCOL.chacha20poly1305 | 2 encryption cipher supported by OpenSSH. 17 authenticated encryption mode. The construction used is based on that 25 The chacha20-poly1305@openssh.com offers both encryption and 60 for encryption of the packet payload. 87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
|
/external/wycheproof/doc/ |
D | rsa.md | 36 ## RSA PKCS #1 v1.5 encryption 40 PKCS #1 v1.5 encryption often depends on the amount of information leaked after 46 chosen ciphertexts [S10], though in this case the encryption did not use PKCS #1 102 the RSA encryption standard PKCS# 1" Crypto 98 105 encryption padding (OAEP) as standardized in PKCS# 1 v2.0", Crypto 2001 This 108 "Errors matter: Breaking RSA-based PIN encryption with thirty ciphertext
|
/external/python/cryptography/vectors/cryptography_vectors/asymmetric/PEM_Serialization/ |
D | README.txt | 10 "123456" with DES3 encryption. 14 dsaparam.pem, protected by the secret "123456" with DES3 encryption.
|
/external/python/cryptography/docs/hazmat/primitives/ |
D | symmetric-encryption.rst | 4 Symmetric encryption 9 Symmetric encryption is a way to `encrypt`_ or hide the contents of material 11 encryption is **not** sufficient for most applications because it only 16 For this reason it is **strongly** recommended to combine encryption with a 50 :ref:`below <symmetric-encryption-algorithms>`. 53 :ref:`below <symmetric-encryption-modes>`. 82 .. _symmetric-encryption-algorithms: 93 choice for encryption. 255 .. _symmetric-encryption-modes: 378 AEAD (authenticated encryption with additional data) mode is a type of [all …]
|
D | keywrap.rst | 8 Key wrapping is a cryptographic construct that uses symmetric encryption to 12 :doc:`symmetric encryption </hazmat/primitives/symmetric-encryption>`.
|
D | aead.rst | 4 Authenticated encryption 9 Authenticated encryption with associated data (AEAD) are encryption schemes 78 ``None`` if none was passed during encryption. 152 ``None`` if none was passed during encryption. 241 ``None`` if none was passed during encryption.
|
/external/libsrtp2/ |
D | timing | 20 # plot encryption-only data 29 # plot encryption and authentication data
|
/external/u-boot/tools/ |
D | zynqimage.c | 74 uint32_t encryption; /* 0x28 */ member 99 checksum += le32_to_cpu(ptr->encryption); in zynqimage_checksum() 121 ptr->encryption = cpu_to_le32(ENCRYPTION_NONE); in zynqimage_default_header()
|