Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 221) sorted by relevance

123456789

/external/exoplayer/tree/testdata/src/test/assets/mp4/
Dsample_ac4_protected.mp4.0.dump24 encryption key = length 16, hash 9FDDEA52
30 encryption key = length 16, hash 9FDDEA52
36 encryption key = length 16, hash 9FDDEA52
42 encryption key = length 16, hash 9FDDEA52
48 encryption key = length 16, hash 9FDDEA52
54 encryption key = length 16, hash 9FDDEA52
60 encryption key = length 16, hash 9FDDEA52
66 encryption key = length 16, hash 9FDDEA52
72 encryption key = length 16, hash 9FDDEA52
78 encryption key = length 16, hash 9FDDEA52
[all …]
Dsample_ac4_protected.mp4.unknown_length.dump24 encryption key = length 16, hash 9FDDEA52
30 encryption key = length 16, hash 9FDDEA52
36 encryption key = length 16, hash 9FDDEA52
42 encryption key = length 16, hash 9FDDEA52
48 encryption key = length 16, hash 9FDDEA52
54 encryption key = length 16, hash 9FDDEA52
60 encryption key = length 16, hash 9FDDEA52
66 encryption key = length 16, hash 9FDDEA52
72 encryption key = length 16, hash 9FDDEA52
78 encryption key = length 16, hash 9FDDEA52
[all …]
Dsample_ac4_protected.mp4.1.dump24 encryption key = length 16, hash 9FDDEA52
30 encryption key = length 16, hash 9FDDEA52
36 encryption key = length 16, hash 9FDDEA52
42 encryption key = length 16, hash 9FDDEA52
48 encryption key = length 16, hash 9FDDEA52
54 encryption key = length 16, hash 9FDDEA52
60 encryption key = length 16, hash 9FDDEA52
66 encryption key = length 16, hash 9FDDEA52
72 encryption key = length 16, hash 9FDDEA52
78 encryption key = length 16, hash 9FDDEA52
[all …]
Dsample_ac4_protected.mp4.2.dump24 encryption key = length 16, hash 9FDDEA52
30 encryption key = length 16, hash 9FDDEA52
36 encryption key = length 16, hash 9FDDEA52
42 encryption key = length 16, hash 9FDDEA52
48 encryption key = length 16, hash 9FDDEA52
54 encryption key = length 16, hash 9FDDEA52
60 encryption key = length 16, hash 9FDDEA52
/external/python/cryptography/docs/
Dglossary.rst14 encryption
26 Cryptographic operations where encryption and decryption use the same
31 Cryptographic operations where encryption and decryption use different
32 keys. There are separate encryption and decryption keys. Typically
33 encryption is performed using a :term:`public key`, and it can then be
55 individual (or program). Like encryption, authentication can be either
57 encryption.
60 This is a property of encryption systems whereby two encrypted messages
61 aren't distinguishable without knowing the encryption key. This is
62 considered a basic, necessary property for a working encryption system.
[all …]
/external/python/cryptography/.travis/downstream.d/
Ddynamodb-encryption-sdk.sh5 git clone --depth=1 https://github.com/awslabs/aws-dynamodb-encryption-python
6 cd aws-dynamodb-encryption-python
12 cd aws-dynamodb-encryption-python
Daws-encryption-sdk.sh5 git clone --depth=1 https://github.com/awslabs/aws-encryption-sdk-python
6 cd aws-encryption-sdk-python
12 cd aws-encryption-sdk-python
/external/libcups/cups/
Dusersys.c65 http_encryption_t encryption; /* Encryption setting */ member
120 if (cg->encryption == (http_encryption_t)-1) in cupsEncryption()
123 return (cg->encryption); in cupsEncryption()
286 cg->encryption = e; in cupsSetEncryption()
932 if (cg->encryption == (http_encryption_t)-1) in _cupsSetDefaults()
933 cg->encryption = cc.encryption; in _cupsSetDefaults()
1076 if (cc->encryption == (http_encryption_t)-1) in cups_finalize_client_conf()
1077 cc->encryption = HTTP_ENCRYPTION_IF_REQUESTED; in cups_finalize_client_conf()
1173 cc->encryption = (http_encryption_t)-1; in cups_init_client_conf()
1293 cc->encryption = HTTP_ENCRYPTION_NEVER; in cups_set_encryption()
[all …]
Dhttp.c53 http_encryption_t encryption,
455 http_encryption_t encryption, /* I - Type of encryption to use */ in httpConnect2() argument
463 …ocking=%d, msec=%d, cancel=%p)", host, port, (void *)addrlist, family, encryption, blocking, msec,… in httpConnect2()
469 if ((http = http_create(host, port, addrlist, family, encryption, blocking, in httpConnect2()
503 http_encryption_t encryption) /* I - Type of encryption to use */ in httpConnectEncrypt() argument
506 host, port, encryption)); in httpConnectEncrypt()
508 return (httpConnect2(host, port, NULL, AF_UNSPEC, encryption, 1, 30000, in httpConnectEncrypt()
559 http->encryption = e; in httpEncryption()
561 if ((http->encryption == HTTP_ENCRYPTION_ALWAYS && !http->tls) || in httpEncryption()
562 (http->encryption == HTTP_ENCRYPTION_NEVER && http->tls)) in httpEncryption()
[all …]
/external/scapy/test/
Dipsec.uts68 * after encryption the original packet payload should NOT be readable
120 * after encryption the original packet payload should NOT be readable
171 * after encryption the original packet payload should NOT be readable
223 * after encryption the original packet payload should NOT be readable
274 * after encryption the original packet payload should NOT be readable
325 * after encryption the original packet payload should NOT be readable
375 * after encryption packet should be encapsulated with the given ip tunnel header
408 * after encryption packet should be encapsulated with the given ip tunnel header
416 * after encryption the original packet payload should NOT be readable
443 * after encryption packet should be encapsulated with the given ip tunnel header
[all …]
/external/cros/system_api/dbus/authpolicy/
Dactive_directory_info.proto94 // Domain join failed because KDC does not support the encryption enforced in
95 // the Samba configuration, e.g. if 'kerberos encryption types' is set to
96 // 'strong' to enforce AES encryption, but KDC does not support AES.
177 // What Kerberos encryption types kinit should use.
197 // Supported Kerberos encryption types for domain join. By default, only
202 // allow strong encryption. In this case, domain join fails. Likewise, there
203 // might also be rare use cases that require legacy encryption only. If the
204 // server supports strong encryption, it is always preferred.
206 // DeviceKerberosEncryptionTypes policy is used to determine encryption types.
/external/u-boot/board/xilinx/zynqmp/
DKconfig14 either authentication or encryption or both encryption
/external/python/cryptography/vectors/cryptography_vectors/asymmetric/RSA/pkcs-1v2-1d2-vec/
Dreadme.txt11 oaep-vect.txt Test vectors for RSA-OAEP encryption.
13 encryption and RSA decryption with CRT.
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/external/libcups/filter/
Dtestclient.c38 http_encryption_t encryption; /* Use encryption? */ member
85 http_encryption_t encryption; /* Encryption mode */ in main() local
205 encryption = HTTP_ENCRYPTION_ALWAYS; in main()
207 encryption = HTTP_ENCRYPTION_IF_REQUESTED; in main()
209 if ((http = httpConnect2(hostname, port, NULL, AF_UNSPEC, encryption, 1, 0, NULL)) == NULL) in main()
289 monitor.encryption = encryption; in main()
756 …http = httpConnect2(monitor->hostname, monitor->port, NULL, AF_UNSPEC, monitor->encryption, 1, 0, … in monitor_printer()
/external/apache-commons-compress/
DREADME.txt24 possession, use, and/or re-export to another country, of encryption
25 software. BEFORE using any encryption software, please check your
27 possession, or use, and re-export of encryption software, to see if
/external/u-boot/board/xilinx/zynq/
DKconfig29 either authentication or encryption or both encryption
/external/openssh/
DPROTOCOL.chacha20poly13052 encryption cipher supported by OpenSSH.
17 authenticated encryption mode. The construction used is based on that
25 The chacha20-poly1305@openssh.com offers both encryption and
60 for encryption of the packet payload.
87 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
/external/wycheproof/doc/
Drsa.md36 ## RSA PKCS #1 v1.5 encryption
40 PKCS #1 v1.5 encryption often depends on the amount of information leaked after
46 chosen ciphertexts [S10], though in this case the encryption did not use PKCS #1
102 the RSA encryption standard PKCS# 1" Crypto 98
105 encryption padding (OAEP) as standardized in PKCS# 1 v2.0", Crypto 2001 This
108 "Errors matter: Breaking RSA-based PIN encryption with thirty ciphertext
/external/python/cryptography/vectors/cryptography_vectors/asymmetric/PEM_Serialization/
DREADME.txt10 "123456" with DES3 encryption.
14 dsaparam.pem, protected by the secret "123456" with DES3 encryption.
/external/python/cryptography/docs/hazmat/primitives/
Dsymmetric-encryption.rst4 Symmetric encryption
9 Symmetric encryption is a way to `encrypt`_ or hide the contents of material
11 encryption is **not** sufficient for most applications because it only
16 For this reason it is **strongly** recommended to combine encryption with a
50 :ref:`below <symmetric-encryption-algorithms>`.
53 :ref:`below <symmetric-encryption-modes>`.
82 .. _symmetric-encryption-algorithms:
93 choice for encryption.
255 .. _symmetric-encryption-modes:
378 AEAD (authenticated encryption with additional data) mode is a type of
[all …]
Dkeywrap.rst8 Key wrapping is a cryptographic construct that uses symmetric encryption to
12 :doc:`symmetric encryption </hazmat/primitives/symmetric-encryption>`.
Daead.rst4 Authenticated encryption
9 Authenticated encryption with associated data (AEAD) are encryption schemes
78 ``None`` if none was passed during encryption.
152 ``None`` if none was passed during encryption.
241 ``None`` if none was passed during encryption.
/external/libsrtp2/
Dtiming20 # plot encryption-only data
29 # plot encryption and authentication data
/external/u-boot/tools/
Dzynqimage.c74 uint32_t encryption; /* 0x28 */ member
99 checksum += le32_to_cpu(ptr->encryption); in zynqimage_checksum()
121 ptr->encryption = cpu_to_le32(ENCRYPTION_NONE); in zynqimage_default_header()

123456789