Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 85) sorted by relevance

1234

/external/openssl/crypto/des/
Ddes.pod58 Two standard encryption modes are supported by the
103 (eight bytes at a time) encryption mode.
107 Encrypt using triple encryption.
108 By default triple cbc encryption is used but if the
110 option is used then triple ECB encryption is performed.
121 This will product a more secure encryption.
161 Use the encryption
DREADME18 This kit builds a DES encryption library and a DES encryption program.
20 triple cfb, desx, and MIT's pcbc encryption modes and also has a fast
/external/wpa_supplicant_6/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/external/chromium/chrome/browser/password_manager/
Dencryptor_mac.mm31 // Prefix for cypher text returned by current encryption version. We prefix
33 // this and migrate to different encryption without data loss.
37 // in the Keychain. The generated key is for AES encryption. Ownership of the
56 // Create an encryption key from our password and salt.
/external/srtp/
Dtiming20 # plot encryption-only data
29 # plot encryption and authentication data
/external/chromium/third_party/libjingle/source/talk/session/phone/
Dmediasessionclient.cc511 for (const buzz::XmlElement* encryption = desc->FirstNamed(QN_ENCRYPTION); in ParseGingleEncryption() local
512 encryption != NULL; in ParseGingleEncryption()
513 encryption = encryption->NextNamed(QN_ENCRYPTION)) { in ParseGingleEncryption()
514 if (encryption->FirstNamed(usage) != NULL) { in ParseGingleEncryption()
516 GetXmlAttr(encryption, QN_ENCRYPTION_REQUIRED, false)); in ParseGingleEncryption()
517 for (const buzz::XmlElement* crypto = encryption->FirstNamed(QN_CRYPTO); in ParseGingleEncryption()
630 const buzz::XmlElement* encryption = in ParseJingleEncryption() local
632 if (encryption == NULL) { in ParseJingleEncryption()
637 GetXmlAttr(encryption, QN_ENCRYPTION_REQUIRED, false)); in ParseJingleEncryption()
639 for (const buzz::XmlElement* crypto = encryption->FirstNamed(QN_CRYPTO); in ParseJingleEncryption()
/external/chromium/chrome/browser/sync/protocol/
Dsync_proto.gyp18 'encryption.proto',
63 '<(protoc_out_dir)/chrome/browser/sync/protocol/encryption.pb.cc',
64 '<(protoc_out_dir)/chrome/browser/sync/protocol/encryption.pb.h',
Dautofill_specifics.proto91 // If encryption for autofill++ is not enabled, this is unused. See
95 // If encryption for autofill++ is not enabled, this field stores the
Dpassword_specifics.proto17 import "encryption.proto";
Dnigori_specifics.proto17 import "encryption.proto";
Dencryption.proto22 // change their passphrase (and thus their encryption key) at any time. When
/external/chromium/third_party/libjingle/source/
DCHANGELOG7 - Added option to examples/call to enable encryption
12 - Added support for call encryption.
/external/dropbear/libtomcrypt/notes/
Dtech0002.txt10 determine when a computation (such as a public key encryption) begins and ends but cannot observe t…
13 Consider a Diffie-Hellman encryption which requires the sender to make up a public key "y = g^x mod…
22 DH-768 encryption requires roughly 50 milliseconds. Take that time and round it up. Now place a d…
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
DDefaultCMSSignatureAlgorithmNameGenerator.java25 private void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument
28 encryptionAlgs.put(alias, encryption); in addEntries()
DCMSSignedHelper.java50 private static void addEntries(DERObjectIdentifier alias, String digest, String encryption) in addEntries() argument
53 encryptionAlgs.put(alias.getId(), encryption); in addEntries() local
/external/openssl/crypto/asn1/
Dp5_pbev2.c69 ASN1_SIMPLE(PBE2PARAM, encryption, X509_ALGOR)
111 scheme = pbe2->encryption;
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml47 hardware. It still uses RC4 for the encryption like WEP, but with
60 Group Key Handshake) for generating and exchanging data encryption
75 support for more robust encryption algorithm (CCMP: AES in Counter
/external/srtp/doc/
Drfc3711.txt132 SRTP provides a framework for encryption and message authentication
143 encryption, a keyed-hash based function for message authentication,
175 The word "encryption" includes also use of the NULL algorithm (which
319 The "Encrypted Portion" of an SRTP packet consists of the encryption
325 None of the pre-defined encryption transforms uses any padding; for
334 their padding. It is important to note that encryption transforms
345 new encryption transform needs to carefully consider and describe the
369 Portion of the SRTP packet. Thus, if both encryption and
370 authentication are applied, encryption SHALL be applied
386 cryptographic transform (e.g., encryption or message authentication),
[all …]
Ddraft-irtf-cfrg-icm-00.txt76 encryption, key derivation, or any other application requiring
87 In this section, ICM keystream generation and encryption are
109 segment. The segmentation lends itself to packet encryption, as
197 Unless otherwise specified, ICM encryption consists of bitwise
302 Section 4.2 is sufficient for most uses of ICM for encryption. This
/external/openssh/
DOVERVIEW36 - Ssh contains several encryption algorithms. These are all
48 RSA key generation, encryption, decryption
69 and the encryption routines.
145 negotiate encryption, then perform authentication, preparatory
/external/openssl/crypto/evp/
Dp5_crpt2.c207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); in PKCS5_v2_PBE_keyivgen()
218 if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { in PKCS5_v2_PBE_keyivgen()
/external/openssl/crypto/rc2/
Drrc2.doc47 *encryption* algorithm, and a *decryption* algorithm.
123 The decryption operation is simply the inverse of the encryption operation.
214 A non-US based programmer who has never seen any encryption code before will
216 knowledge of any other encryption algorithms. Stand by.
/external/openssl/crypto/des/asm/
Ddes_enc.m4142 ! parameter 6 1/2 for include encryption/decryption
293 ! parameter 6 optional address for key next encryption/decryption
514 ifelse($6,{}, {}, {ld [$6], out0}) ! key next encryption/decryption
537 ifelse($6,{}, {}, {ld [$6+4], out1}) ! key next encryption/decryption
1153 ! loads key next encryption/decryption first round from [in4]
1166 ! loads key next encryption/decryption first round from [in3]
1199 ! parameter 6 1/2 for include encryption/decryption
1216 ! parameter 6 1/2 for include encryption/decryption
1374 ! parameter 6 1/2 for include encryption/decryption
1419 ! parameter 6 1/2 for include encryption/decryption
[all …]
/external/sepolicy/
Dproperty_contexts40 # data partition encryption properties

1234