Home
last modified time | relevance | path

Searched refs:encryption (Results 1 – 25 of 71) sorted by relevance

123

/external/wpa_supplicant_8/wpa_supplicant/
Deap_testing.txt120 1) PEAPv1 required new label, "client PEAP encryption" instead of "client EAP
121 encryption", during key derivation (requires phase1="peaplabel=1" in the
175 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
202 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
224 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
294 Note: PEAPv1 requires TLS key derivation to use label "client EAP encryption"
363 - uses label "client EAP encryption"
369 - uses label "client EAP encryption"
375 - uses label "client PEAP encryption"
380 - uses label "client PEAP encryption"
[all …]
/external/openssh/
DPROTOCOL.chacha20poly13052 encryption cipher supported by OpenSSH.
17 authenticated encryption mode. The construction used is based on that
25 The chacha20-poly1305@openssh.com offers both encryption and
58 for encryption of the packet payload.
85 ChaCha20 must never reuse a {key, nonce} for encryption nor may it be
DOVERVIEW36 - Ssh contains several encryption algorithms. These are all
48 RSA key generation, encryption, decryption
69 and the encryption routines.
145 negotiate encryption, then perform authentication, preparatory
DPROTOCOL.key62 5. No encryption
/external/srtp/
Dtiming20 # plot encryption-only data
29 # plot encryption and authentication data
/external/bouncycastle/bcpkix/src/main/java/org/bouncycastle/cms/
DDefaultCMSSignatureAlgorithmNameGenerator.java26 private void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument
29 encryptionAlgs.put(alias, encryption); in addEntries()
DCMSSignedHelper.java45 private static void addEntries(ASN1ObjectIdentifier alias, String digest, String encryption) in addEntries() argument
48 encryptionAlgs.put(alias.getId(), encryption); in addEntries() local
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/
Dwpa_background.sgml47 hardware. It still uses RC4 for the encryption like WEP, but with
60 Group Key Handshake) for generating and exchanging data encryption
75 support for more robust encryption algorithm (CCMP: AES in Counter
Dwpa_supplicant.sgml37 Link-layer encryption can be used to provide a layer of security for
39 included a simple encryption mechanism, WEP. However, that proved to
43 security issues due to the use of WEP for encryption. Wi-Fi Protected
46 enabled networks that are using CCMP (encryption mechanism based on strong
122 <para><command>wpa_supplicant</command> configures encryption
/external/srtp/doc/
Drfc3711.txt132 SRTP provides a framework for encryption and message authentication
143 encryption, a keyed-hash based function for message authentication,
175 The word "encryption" includes also use of the NULL algorithm (which
319 The "Encrypted Portion" of an SRTP packet consists of the encryption
325 None of the pre-defined encryption transforms uses any padding; for
334 their padding. It is important to note that encryption transforms
345 new encryption transform needs to carefully consider and describe the
369 Portion of the SRTP packet. Thus, if both encryption and
370 authentication are applied, encryption SHALL be applied
386 cryptographic transform (e.g., encryption or message authentication),
[all …]
Ddraft-irtf-cfrg-icm-00.txt76 encryption, key derivation, or any other application requiring
87 In this section, ICM keystream generation and encryption are
109 segment. The segmentation lends itself to packet encryption, as
197 Unless otherwise specified, ICM encryption consists of bitwise
302 Section 4.2 is sufficient for most uses of ICM for encryption. This
Dheader.template95 AES ICM implementation can be used for ISMA media encryption. Steve
Dintro.txt274 for encryption by only a single sender. In other words, the key is
379 is an alternative to SRTP encryption, which is potentially
384 libSRTP provides the encryption and decryption functions needed for ISMAcryp
392 streams while using ISMAcryp encryption to protect the media itself.
/external/boringssl/src/crypto/pkcs8/
Dp5_pbev2.c73 ASN1_SIMPLE(PBE2PARAM, encryption, X509_ALGOR)
135 scheme = pbe2->encryption; in PKCS5_pbe2_set_iv()
/external/scrypt/lib/
DREADME5 included here which is not actually used by the scrypt file encryption
/external/libvpx/libvpx/third_party/libwebm/
Dmkvparser.cpp4137 ContentEncryption* const encryption = in ParseContentEncodingEntry() local
4139 if (!encryption) in ParseContentEncodingEntry()
4142 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry()
4144 delete encryption; in ParseContentEncodingEntry()
4147 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry()
4217 ContentEncryption* encryption) { in ParseEncryptionEntry() argument
4219 assert(encryption); in ParseEncryptionEntry()
4232 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry()
4233 if (encryption->algo != 5) in ParseEncryptionEntry()
4237 delete[] encryption->key_id; in ParseEncryptionEntry()
[all …]
/external/libvpx/libwebm/
Dmkvparser.cpp4223 ContentEncryption* const encryption = in ParseContentEncodingEntry() local
4225 if (!encryption) in ParseContentEncodingEntry()
4228 status = ParseEncryptionEntry(pos, size, pReader, encryption); in ParseContentEncodingEntry()
4230 delete encryption; in ParseContentEncodingEntry()
4233 *encryption_entries_end_++ = encryption; in ParseContentEncodingEntry()
4305 ContentEncryption* encryption) { in ParseEncryptionEntry() argument
4307 assert(encryption); in ParseEncryptionEntry()
4320 encryption->algo = UnserializeUInt(pReader, pos, size); in ParseEncryptionEntry()
4321 if (encryption->algo != 5) in ParseEncryptionEntry()
4325 delete[] encryption->key_id; in ParseEncryptionEntry()
[all …]
/external/wpa_supplicant_8/hostapd/
DREADME270 hardware. It still uses RC4 for the encryption like WEP, but with
282 Handshake) for generating and exchanging data encryption keys between
297 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
336 # Set of accepted cipher suites (encryption algorithms) for pairwise keys
340 # Group cipher suite (encryption algorithm for broadcast and multicast frames)
346 # Time interval for rekeying GTK (broadcast/multicast encryption keys) in
/external/sepolicy/
Dvold.te128 # Handle wake locks (used for device encryption)
141 # Access metadata block device used for encryption meta-data.
Ddevice.te92 # Metadata block device used for encryption metadata.
Dproperty_contexts51 # data partition encryption properties
/external/srtp/googlepatches/
Dgoogle-7-srtp-security-fix.patch78 enc_start = NULL; /* this indicates that there's no encryption */
/external/ipsec-tools/
Dsetup.c300 int auth, int hash, int encryption, int length) in add_proposal() argument
305 p->enctype = encryption; in add_proposal()
/external/zlib/src/
DFAQ316 zlib doesn't support encryption. The original PKZIP encryption is very
318 encryption, use GnuPG, http://www.gnupg.org/ , which already includes zlib
319 compression. For PKZIP compatible "encryption", look at
/external/v8/benchmarks/
DREADME.txt20 encryption stage as input. The result is checked against the original

123