Searched
full:identified (Results
451 -
475 of
1001) sorted by null
<<11121314151617181920>>
/external/pcre/dist/doc/html/ |
pcrecallout.html | 48 function is to be called. Different callout points can be identified by putting
|
/external/pdfium/third_party/freetype/include/internal/ |
ftserv.h | 21 /* identified by a constant string and modeled by a pointer; the latter */ [all...] |
/external/protobuf/src/google/protobuf/compiler/ |
importer.cc | 433 // identified by file name.
|
/external/squashfs-tools/kernel/Documentation/filesystems/ |
squashfs.txt | 99 boundaries, therefore inodes overlap compressed blocks. Inodes are identified
|
/external/srtp/doc/ |
draft-irtf-cfrg-icm-00.txt | 80
Crypto Forum Research Group David A. McGrew
Internet Draft Cisco Systems, Inc.
Expires April, 2003 October, 2002
Integer Counter Mode
<draft-irtf-cfrg-icm-00.txt>
Status of this Memo
This document is an Internet Draft and is in full conformance with
all provisions of Section 10 of RFC-2026. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and working groups. Note that other groups may also distribute
working documents as Internet Drafts.
Internet Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
1. Abstract
This document specifies Integer Counter Mode (ICM), a mode of
operation of a block cipher which defines an indexed keystream
generator (which generates a keystream segment given an index).
This mode is efficient, parallelizable, and has been proven secure
given realistic assumptions about the block cipher. Test vectors
are provided for AES.
Counter Mode admits many variations. The variant specified in
this document is secure and flexible, yet it enables a single
implementation of a keystream generator to suffice in different
application domains.
McGrew [Page 1]
Internet Draft Integer Counter Mode October, 2002
2. Notational Conventions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in RFC-2119 [B97].
3. Introduction
Counter Mode is a way to define a pseudorandom keystream generator
using a block cipher [CTR]. The keystream can be used for additive
encryption, key derivation, or any other application requiring
pseudorandom data.
In ICM, the keystream is logically broken into segments. Each
segment is identified with a segment index, and the segments have
equal lengths. This segmentation makes ICM especial (…)
|
/external/svox/pico/lib/ |
picoklex.c | 322 the same grapheme search prefix (identified by search index). */
|
/external/valgrind/coregrind/m_gdbserver/ |
target.h | 206 module identified by 'lm'.
|
/external/valgrind/coregrind/ |
m_translate.c | 83 VG_(message)(Vg_DebugMsg, "translate: no SP updates identified\n"); 86 "translate: fast SP updates identified: %'llu (%3.1f%%)\n", 90 "translate: generic_known SP updates identified: %'llu (%3.1f%%)\n", 95 "translate: generic_unknown SP updates identified: %'llu (%3.1f%%)\n", [all...] |
/frameworks/base/cmds/uiautomator/library/core-src/com/android/uiautomator/core/ |
QueryController.java | 209 * node where the CONTAINER and its child PATTERN have identified.
|
/frameworks/base/core/java/android/content/ |
SyncRequest.java | 272 * Syncs are identified by target {@link android.provider} and by the
|
/frameworks/base/core/java/android/provider/ |
AlarmClock.java | 169 * This extra is only used when the alarm is not already identified by a deeplink as
|
/frameworks/base/docs/html/distribute/essentials/quality/ |
wear.jd | 451 Yes. The requirements described above only determine whether your app will be identified as an
|
/frameworks/base/docs/html/distribute/googleplay/families/ |
faq.jd | 192 Play. You can then address the identified issue(s) and resubmit the app for
|
/frameworks/base/docs/html/tools/ |
device.jd | 113 is identified by a unique vendor ID, as specified by the
|
/frameworks/base/docs/html/training/gestures/ |
detector.jd | 74 that is ultimately identified as a gesture,
|
/frameworks/base/docs/html/training/implementing-navigation/ |
nav-drawer.jd | 171 {@link android.widget.FrameLayout} element identified by the {@code R.id.content_frame} ID):</p>
|
/frameworks/base/docs/html/training/wearables/data-layer/ |
messages.jd | 193 <p>Once you?ve identified the best node to use, send the message using the
|
/hardware/broadcom/wlan/bcmdhd/firmware/ |
LICENSE.TXT | 124 information is identified as confidential or should be recognized as
|
/hardware/intel/common/omx-components/videocodec/libvpx_internal/libvpx/vp8/encoder/ |
onyx_int.h | 328 /* frame in src_buffers has been identified to be encoded as an alt ref */
|
/hardware/invensense/6515/libsensors_iio/ |
License.txt | 124 information is identified as confidential or should be recognized as
|
/hardware/ti/omap3/dspbridge/inc/ |
mem.h | 349 * Calls kernel services to map the set of pages identified by a private
|
/hardware/ti/omap3/dspbridge/libbridge/inc/ |
mem.h | 349 * Calls kernel services to map the set of pages identified by a private
|
/libcore/luni/src/main/java/java/security/ |
KeyStoreSpi.java | 148 * Deletes the entry identified with the given alias from this {@code
|
/libcore/xml/src/main/java/org/xmlpull/v1/ |
XmlSerializer.java | 38 * Set feature identified by name (recommended to be URI for uniqueness).
|
/ndk/sources/cxx-stl/stlport/src/ |
c_locale.h | 439 * Returns a string, identified by a set index and a message index,
|
Completed in 312 milliseconds
<<11121314151617181920>>