HomeSort by relevance Sort by last modified time
    Searched full:derivation (Results 76 - 100 of 151) sorted by null

1 2 34 5 6 7

  /external/guava/guava/src/com/google/common/util/concurrent/
Futures.java 182 * that the derivation runs in depends on whether the input {@code Future} is
184 * {@code chain} will run the derivation in the thread that called {@code
245 * caveats: First, the thread that the derivation runs in depends on whether
247 * particular, if called late, {@code chain} will run the derivation in the
    [all...]
  /external/icu4c/common/
uprops.cpp 569 // For the derivation, see Unicode's DerivedNormalizationProps.txt.
  /external/openssh/
jpake.c 347 /* Shared parts of key derivation and confirmation calculation */
PROTOCOL.agent 427 the response derivation, the decrypted challenge is represented as an
  /external/srtp/doc/
draft-irtf-cfrg-icm-00.txt 76 Crypto Forum Research Group David A. McGrew Internet Draft Cisco Systems, Inc. Expires April, 2003 October, 2002 Integer Counter Mode <draft-irtf-cfrg-icm-00.txt> Status of this Memo This document is an Internet Draft and is in full conformance with all provisions of Section 10 of RFC-2026. Internet Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and working groups. Note that other groups may also distribute working documents as Internet Drafts. Internet Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. 1. Abstract This document specifies Integer Counter Mode (ICM), a mode of operation of a block cipher which defines an indexed keystream generator (which generates a keystream segment given an index). This mode is efficient, parallelizable, and has been proven secure given realistic assumptions about the block cipher. Test vectors are provided for AES. Counter Mode admits many variations. The variant specified in this document is secure and flexible, yet it enables a single implementation of a keystream generator to suffice in different application domains. McGrew [Page 1] Internet Draft Integer Counter Mode October, 2002 2. Notational Conventions The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in RFC-2119 [B97]. 3. Introduction Counter Mode is a way to define a pseudorandom keystream generator using a block cipher [CTR]. The keystream can be used for additive encryption, key derivation, or any other application requiring pseudorandom data. In ICM, the keystream is logically bro (…)
intro.txt 86 \item key derivation rates other than zero,
  /external/wpa_supplicant_8/src/eap_server/
eap_server_pax.c 388 "key derivation");
eap_server_aka.c 802 * needed 6-octet SQN ^AK for CK',IK' derivation */
832 wpa_hexdump_ascii(MSG_DEBUG, "EAP-AKA: Identity for MK derivation",
    [all...]
eap_server_sim.c 544 wpa_hexdump_ascii(MSG_DEBUG, "EAP-SIM: Identity for MK derivation",
  /external/wpa_supplicant_8/src/rsn_supp/
pmksa_cache.c 115 * @akmp: WPA_KEY_MGMT_* used in key derivation
wpa_ft.c 30 "derivation");
  /external/wpa_supplicant_8/src/wps/
wps_common.c 112 wps_kdf(kdk, NULL, 0, "Wi-Fi Easy and Secure Key Derivation",
wps_registrar.c     [all...]
  /frameworks/base/docs/html/guide/topics/resources/
layout-resource.jd 72 <p>You should not assume that any derivation of {@link android.view.ViewGroup}
  /external/clang/lib/CodeGen/
CGRTTI.cpp 937 // __pointee is a pointer to the std::type_info derivation for the
    [all...]
  /external/wpa_supplicant_8/src/common/
wpa_common.c 71 * @label: Label to use in derivation
123 wpa_printf(MSG_DEBUG, "WPA: PTK derivation - A1=" MACSTR " A2=" MACSTR,
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_sim.c 666 "derivation", identity, identity_len);
874 * used in MK derivation. */
eap_peap.c 89 "derivation");
1099 "key derivation", label);
    [all...]
eap_config.h 322 * encryption", to be used during key derivation when PEAPv1 or newer.
eap_mschapv2.c 11 * derivation. This encapsulates MS-CHAP-v2 protocol which is defined in
  /external/libxml2/
xmlschemas.c     [all...]
  /external/antlr/antlr-3.4/runtime/C/src/
antlr3baserecognizer.c 915 /// For input input "i=(3);", here is the derivation:
929 /// as you can see by looking at the derivation of this specific
    [all...]
  /external/antlr/antlr-3.4/runtime/Python/antlr3/
recognizers.py 622 For input input "i=(3);", here is the derivation:
636 as you can see by looking at the derivation of this specific
689 derivation:
    [all...]
  /external/antlr/antlr-3.4/runtime/Ruby/lib/antlr3/
recognizers.rb 752 # For input input "i=(3);", here is the derivation:
766 # as you can see by looking at the derivation of this specific
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_gnutls.c 37 * derivation in EAP-{TLS,TTLS,PEAP,FAST}. Workaround for now is a horrible

Completed in 475 milliseconds

1 2 34 5 6 7