/external/wpa_supplicant_8/wpa_supplicant/ |
D | eap_testing.txt | 120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP 121 encryption", during key derivation (requires phase1="peaplabel=1" in the 175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption" 363 - uses label "client EAP encryption" 369 - uses label "client EAP encryption" 375 - uses label "client PEAP encryption" 380 - uses label "client PEAP encryption" [all …]
|
/external/openssh/ |
D | PROTOCOL.chacha20poly1305 | 2 encryption cipher supported by OpenSSH. 17 authenticated encryption mode. The construction used is based on that 25 The chacha20-poly1305@openssh.com offers both encryption and 58 for encryption of the packet payload. 85 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
|
D | OVERVIEW | 36 - Ssh contains several encryption algorithms. These are all 48 RSA key generation, encryption, decryption 69 and the encryption routines. 145 negotiate encryption, then perform authentication, preparatory
|
D | PROTOCOL.key | 62 5. No encryption
|
/external/srtp/ |
D | timing | 20 # plot encryption-only data 29 # plot encryption and authentication data
|
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/ |
D | DefaultCMSSignatureAlgorithmNameGenerator.java | 26 private void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument 29 encryptionAlgs.put(alias, encryption); in addEntries()
|
D | CMSSignedHelper.java | 45 private static void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument 48 encryptionAlgs.put(alias.getId(), encryption); in addEntries() local
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_background.sgml | 47 hardware. It still uses RC4 for the encryption like WEP, but with 60 Group Key Handshake) for generating and exchanging data encryption 75 support for more robust encryption algorithm (CCMP: AES in Counter
|
D | wpa_supplicant.sgml | 37 Link-layer encryption can be used to provide a layer of security for 39 included a simple encryption mechanism, WEP. However, that proved to 43 security issues due to the use of WEP for encryption. Wi-Fi Protected 46 enabled networks that are using CCMP (encryption mechanism based on strong 122 <para><command>wpa_supplicant</command> configures encryption
|
/external/srtp/doc/ |
D | rfc3711.txt | 132 SRTP provides a framework for encryption and message authentication 143 encryption, a keyed-hash based function for message authentication, 175 The word "encryption" includes also use of the NULL algorithm (which 319 The "Encrypted Portion" of an SRTP packet consists of the encryption 325 None of the pre-defined encryption transforms uses any padding; for 334 their padding. It is important to note that encryption transforms 345 new encryption transform needs to carefully consider and describe the 369 Portion of the SRTP packet. Thus, if both encryption and 370 authentication are applied, encryption SHALL be applied 386 cryptographic transform (e.g., encryption or message authentication), [all …]
|
D | draft-irtf-cfrg-icm-00.txt | 76 encryption, key derivation, or any other application requiring 87 In this section, ICM keystream generation and encryption are 109 segment. The segmentation lends itself to packet encryption, as 197 Unless otherwise specified, ICM encryption consists of bitwise 302 Section 4.2 is sufficient for most uses of ICM for encryption. This
|
D | header.template | 95 AES ICM implementation can be used for ISMA media encryption. Steve
|
D | intro.txt | 274 for encryption by only a single sender. In other words, the key is 379 is an alternative to SRTP encryption, which is potentially 384 libSRTP provides the encryption and decryption functions needed for ISMAcryp 392 streams while using ISMAcryp encryption to protect the media itself.
|
/external/boringssl/src/crypto/pkcs8/ |
D | p5_pbev2.c | 73 ASN1_SIMPLE(PBE2PARAM, encryption, X509_ALGOR) 135 scheme = pbe2->encryption; in PKCS5_pbe2_set_iv()
|
/external/scrypt/lib/ |
D | README | 5 included here which is not actually used by the scrypt file encryption
|
/external/libvpx/libvpx/third_party/libwebm/ |
D | mkvparser.cpp | 4137 ContentEncryption* const encryption = in ParseContentEncodingEntry() local 4139 if (!encryption) in ParseContentEncodingEntry() 4142 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry() 4144 delete encryption; in ParseContentEncodingEntry() 4147 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry() 4217 ContentEncryption* encryption) { in ParseEncryptionEntry() argument 4219 assert(encryption); in ParseEncryptionEntry() 4232 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry() 4233 if (encryption->algo != 5) in ParseEncryptionEntry() 4237 delete[] encryption->key_id; in ParseEncryptionEntry() [all …]
|
/external/libvpx/libwebm/ |
D | mkvparser.cpp | 4223 ContentEncryption* const encryption = in ParseContentEncodingEntry() local 4225 if (!encryption) in ParseContentEncodingEntry() 4228 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry() 4230 delete encryption; in ParseContentEncodingEntry() 4233 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry() 4305 ContentEncryption* encryption) { in ParseEncryptionEntry() argument 4307 assert(encryption); in ParseEncryptionEntry() 4320 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry() 4321 if (encryption->algo != 5) in ParseEncryptionEntry() 4325 delete[] encryption->key_id; in ParseEncryptionEntry() [all …]
|
/external/wpa_supplicant_8/hostapd/ |
D | README | 270 hardware. It still uses RC4 for the encryption like WEP, but with 282 Handshake) for generating and exchanging data encryption keys between 297 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 336 # Set of accepted cipher suites (encryption algorithms) for pairwise keys 340 # Group cipher suite (encryption algorithm for broadcast and multicast frames) 346 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
|
/external/sepolicy/ |
D | vold.te | 128 # Handle wake locks (used for device encryption) 141 # Access metadata block device used for encryption meta-data.
|
D | device.te | 92 # Metadata block device used for encryption metadata.
|
D | property_contexts | 51 # data partition encryption properties
|
/external/srtp/googlepatches/ |
D | google-7-srtp-security-fix.patch | 78 enc_start = NULL; /* this indicates that there's no encryption */
|
/external/ipsec-tools/ |
D | setup.c | 300 int auth, int hash, int encryption, int length) in add_proposal() argument 305 p->enctype = encryption; in add_proposal()
|
/external/zlib/src/ |
D | FAQ | 316 zlib doesn't support encryption. The original PKZIP encryption is very 318 encryption, use GnuPG, http://www.gnupg.org/ , which already includes zlib 319 compression. For PKZIP compatible "encryption", look at
|
/external/v8/benchmarks/ |
D | README.txt | 20 encryption stage as input. The result is checked against the original
|