HomeSort by relevance Sort by last modified time
    Searched full:meaning (Results 601 - 625 of 1775) sorted by null

<<21222324252627282930>>

  /external/doclava/src/com/google/doclava/
FieldInfo.java 73 * constantValues as meaning that the field is not a constant,
  /external/ganymed-ssh2/examples/
SwingShell.java 326 * the meaning of the TAB key - and I want to use it in bash.
  /external/guava/guava/src/com/google/common/util/concurrent/
AtomicLongMap.java 340 * - Introduce a special-value private static final AtomicLong that would have the meaning of
  /external/icu4c/common/
rbbinode.cpp 101 // is common for all references to the variable, meaning
  /external/icu4c/i18n/
regexst.cpp 49 // "Rule Char" Characters are those with no special meaning, and therefore do not
  /external/icu4c/i18n/unicode/
dcfmtsym.h 56 * Symbol Meaning
ucsdet.h 239 * A confidence value of ten does have a general meaning - it is used
  /external/iproute2/man/man8/
ip.8 748 is a special family identifier meaning that no networking protocol
    [all...]
  /external/kernel-headers/original/asm-mips/sgi/
hpc3.h 42 * copletely different meaning for read
  /external/libffi/src/ia64/
ffi.c 240 /* Leave FFI_TYPE_LONGDOUBLE as meaning double extended precision,
  /external/libpcap/
pcap-snoop.c 296 ll_hdrlen = 0; /* DLT_RAW meaning "no PPP header, just the IP packet"? */
  /external/llvm/docs/CommandGuide/
lit.pod 63 string if not given). The meaning and use of these parameters is test suite
  /external/llvm/docs/tutorial/
LangImpl1.html 133 from "meaning beautiful, form, and view").
  /external/llvm/lib/Analysis/
ProfileEstimatorPass.cpp 112 // The algorithm preserves the flow condition, meaning that the sum of the
  /external/llvm/lib/Target/CellSPU/
SPUInstrInfo.cpp 132 // types have no specific meaning.
  /external/llvm/lib/Target/X86/Disassembler/
X86DisassemblerDecoderCommon.h 106 "operands' meaning") \
  /external/openssl/crypto/modes/asm/
ghash-alpha.pl 20 # Meaning that it could have been even faster, yet 12 cycles is ~60%
  /external/protobuf/src/google/protobuf/compiler/
command_line_interface.h 300 // True if --include_imports was given, meaning that we should
  /external/qemu/distrib/zlib-1.2.3/
zlib.h 137 memory management. The compression library attaches no meaning to the
637 specific input data. Read the deflate.c source code for the meaning of the
    [all...]
  /external/regex-re2/doc/
syntax.txt 65 U ungreedy: swap meaning of «x*» and «x*?», «x+» and «x+?», etc (default false)
  /external/skia/include/core/
SkDevice.h 256 * relaxed in the future. The meaning of config kARGB_8888_Config is
  /external/skia/src/ports/
SkFontHost_simple.cpp 414 meaning element[0] should be used first, then element[1], etc. When we hit
  /external/skia/tests/
WritePixelsTest.cpp 291 {kGpu_DevType, true}, // row bytes has no meaning on gpu devices
  /external/srec/tools/parseStringTest/
parseStringTest.c 486 //get the key (meaning)
  /external/srtp/doc/
draft-irtf-cfrg-icm-00.txt 96 Crypto Forum Research Group David A. McGrew Internet Draft Cisco Systems, Inc. Expires April, 2003 October, 2002 Integer Counter Mode <draft-irtf-cfrg-icm-00.txt> Status of this Memo This document is an Internet Draft and is in full conformance with all provisions of Section 10 of RFC-2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and working groups. Note that other groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. 1. Abstract This document specifies Integer Counter Mode (ICM), a mode of operation of a block cipher which defines an indexed keystream generator (which generates a keystream segment given an index). This mode is efficient, parallelizable, and has been proven secure given realistic assumptions about the block cipher. Test vectors are provided for AES. Counter Mode admits many variations. The variant specified in this document is secure and flexible, yet it enables a single implementation of a keystream generator to suffice in different application domains. McGrew [Page 1] Internet Draft Integer Counter Mode October, 2002 2. Notational Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [B97]. 3. Introduction Counter Mode is a way to define a pseudorandom keystream generator using a block cipher [CTR]. The keystream can be used for additive encryption, key derivation, or any other application requiring pseudorandom data. In ICM, the keystream is logically broken into segments. Each segment is identified with a segment index, and the segments have equal lengths. This segmentation makes ICM especially appropriate for securing packet-based protocols. 4. ICM In this section, ICM keystream generation and encryption are defined. 4.1. ICM Parameters The following parameters are used in ICM. These parameters MUST remain fixed for any given use of a key. Parameter Meaning ----------------------------------------------------------------- BLOCK_LENGTH the n (…)

Completed in 1318 milliseconds

<<21222324252627282930>>