/external/openssl/crypto/des/ |
D | des.pod | 58 Two standard encryption modes are supported by the 103 (eight bytes at a time) encryption mode. 107 Encrypt using triple encryption. 108 By default triple cbc encryption is used but if the 110 option is used then triple ECB encryption is performed. 121 This will product a more secure encryption. 161 Use the encryption
|
D | README | 18 This kit builds a DES encryption library and a DES encryption program. 20 triple cfb, desx, and MIT's pcbc encryption modes and also has a fast
|
/external/wpa_supplicant_6/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/external/chromium/chrome/browser/password_manager/ |
D | encryptor_mac.mm | 31 // Prefix for cypher text returned by current encryption version. We prefix 33 // this and migrate to different encryption without data loss. 37 // in the Keychain. The generated key is for AES encryption. Ownership of the 56 // Create an encryption key from our password and salt.
|
/external/srtp/ |
D | timing | 20 # plot encryption-only data 29 # plot encryption and authentication data
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
D | mediasessionclient.cc | 511 for (const buzz::XmlElement* encryption = desc->FirstNamed(QN_ENCRYPTION); in ParseGingleEncryption() local 512 encryption != NULL; in ParseGingleEncryption() 513 encryption = encryption->NextNamed(QN_ENCRYPTION)) { in ParseGingleEncryption() 514 if (encryption->FirstNamed(usage) != NULL) { in ParseGingleEncryption() 516 GetXmlAttr(encryption, QN_ENCRYPTION_REQUIRED, false)); in ParseGingleEncryption() 517 for (const buzz::XmlElement* crypto = encryption->FirstNamed(QN_CRYPTO); in ParseGingleEncryption() 630 const buzz::XmlElement* encryption = in ParseJingleEncryption() local 632 if (encryption == NULL) { in ParseJingleEncryption() 637 GetXmlAttr(encryption, QN_ENCRYPTION_REQUIRED, false)); in ParseJingleEncryption() 639 for (const buzz::XmlElement* crypto = encryption->FirstNamed(QN_CRYPTO); in ParseJingleEncryption()
|
/external/chromium/chrome/browser/sync/protocol/ |
D | sync_proto.gyp | 18 'encryption.proto', 63 '<(protoc_out_dir)/chrome/browser/sync/protocol/encryption.pb.cc', 64 '<(protoc_out_dir)/chrome/browser/sync/protocol/encryption.pb.h',
|
D | autofill_specifics.proto | 91 // If encryption for autofill++ is not enabled, this is unused. See 95 // If encryption for autofill++ is not enabled, this field stores the
|
D | password_specifics.proto | 17 import "encryption.proto";
|
D | nigori_specifics.proto | 17 import "encryption.proto";
|
D | encryption.proto | 22 // change their passphrase (and thus their encryption key) at any time. When
|
/external/chromium/third_party/libjingle/source/ |
D | CHANGELOG | 7 - Added option to examples/call to enable encryption 12 - Added support for call encryption.
|
/external/dropbear/libtomcrypt/notes/ |
D | tech0002.txt | 10 determine when a computation (such as a public key encryption) begins and ends but cannot observe t… 13 Consider a Diffie-Hellman encryption which requires the sender to make up a public key "y = g^x mod… 22 DH-768 encryption requires roughly 50 milliseconds. Take that time and round it up. Now place a d…
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
D | DefaultCMSSignatureAlgorithmNameGenerator.java | 25 private void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument 28 encryptionAlgs.put(alias, encryption); in addEntries()
|
D | CMSSignedHelper.java | 50 private static void addEntries(DERObjectIdentifier alias, String digest, String encryption) in addEntries() argument 53 encryptionAlgs.put(alias.getId(), encryption); in addEntries() local
|
/external/openssl/crypto/asn1/ |
D | p5_pbev2.c | 69 ASN1_SIMPLE(PBE2PARAM, encryption, X509_ALGOR) 111 scheme = pbe2->encryption;
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 47 hardware. It still uses RC4 for the encryption like WEP, but with 60 Group Key Handshake) for generating and exchanging data encryption 75 support for more robust encryption algorithm (CCMP: AES in Counter
|
/external/srtp/doc/ |
D | rfc3711.txt | 132 SRTP provides a framework for encryption and message authentication 143 encryption, a keyed-hash based function for message authentication, 175 The word "encryption" includes also use of the NULL algorithm (which 319 The "Encrypted Portion" of an SRTP packet consists of the encryption 325 None of the pre-defined encryption transforms uses any padding; for 334 their padding. It is important to note that encryption transforms 345 new encryption transform needs to carefully consider and describe the 369 Portion of the SRTP packet. Thus, if both encryption and 370 authentication are applied, encryption SHALL be applied 386 cryptographic transform (e.g., encryption or message authentication), [all …]
|
D | draft-irtf-cfrg-icm-00.txt | 76 encryption, key derivation, or any other application requiring 87 In this section, ICM keystream generation and encryption are 109 segment. The segmentation lends itself to packet encryption, as 197 Unless otherwise specified, ICM encryption consists of bitwise 302 Section 4.2 is sufficient for most uses of ICM for encryption. This
|
/external/openssh/ |
D | OVERVIEW | 36 - Ssh contains several encryption algorithms. These are all 48 RSA key generation, encryption, decryption 69 and the encryption routines. 145 negotiate encryption, then perform authentication, preparatory
|
/external/openssl/crypto/evp/ |
D | p5_crpt2.c | 207 cipher = EVP_get_cipherbyobj(pbe2->encryption->algorithm); in PKCS5_v2_PBE_keyivgen() 218 if(EVP_CIPHER_asn1_to_param(ctx, pbe2->encryption->parameter) < 0) { in PKCS5_v2_PBE_keyivgen()
|
/external/openssl/crypto/rc2/ |
D | rrc2.doc | 47 *encryption* algorithm, and a *decryption* algorithm. 123 The decryption operation is simply the inverse of the encryption operation. 214 A non-US based programmer who has never seen any encryption code before will 216 knowledge of any other encryption algorithms. Stand by.
|
/external/openssl/crypto/des/asm/ |
D | des_enc.m4 | 142 ! parameter 6 1/2 for include encryption/decryption 293 ! parameter 6 optional address for key next encryption/decryption 514 ifelse($6,{}, {}, {ld [$6], out0}) ! key next encryption/decryption 537 ifelse($6,{}, {}, {ld [$6+4], out1}) ! key next encryption/decryption 1153 ! loads key next encryption/decryption first round from [in4] 1166 ! loads key next encryption/decryption first round from [in3] 1199 ! parameter 6 1/2 for include encryption/decryption 1216 ! parameter 6 1/2 for include encryption/decryption 1374 ! parameter 6 1/2 for include encryption/decryption 1419 ! parameter 6 1/2 for include encryption/decryption [all …]
|
/external/sepolicy/ |
D | property_contexts | 40 # data partition encryption properties
|