Searched
full:protocols (Results
851 -
875 of
1555) sorted by null
<<31323334353637383940>>
/external/curl/lib/ |
file.c | 411 * from the connect-phase above. Other protocols merely setup the transfer in
|
pingpong.c | 410 /* we keep 40 bytes since all our pingpong protocols are only
|
/external/curl/packages/OS400/ |
README.OS400 | 181 Protocols currently implemented on OS/400:
|
/external/dbus/ |
HACKING | 54 - All external interfaces (network protocols, file formats, etc.)
|
/external/dnsmasq/ |
setup.html | 54 The two protocols most used for automatic IP network configuration
|
/external/google-breakpad/src/common/mac/ |
GTMDefines.h | 430 // the Snow Leopard protocols that we need here.
|
/external/icu/icu4c/source/i18n/unicode/ |
utmscale.h | 20 * platforms and protocols. Some of these have severe drawbacks. For example, people using
|
/external/kernel-headers/modified/scsi/ |
scsi.h | 345 /* SCSI protocols; these are taken from SPC-3 section 7.5 */
|
/external/kernel-headers/original/scsi/ |
scsi.h | 339 /* SCSI protocols; these are taken from SPC-3 section 7.5 */
|
/external/libbrillo/brillo/http/ |
http_request.h | 119 // Server has switched protocols in upgrade header
|
/external/libnfc-nci/src/nfa/dm/ |
nfa_dm_discover.c | [all...] |
/external/okhttp/okhttp/src/main/java/com/squareup/okhttp/ |
Connection.java | 68 * (443) to be used for different HTTP and SPDY protocols.
|
/external/rmi4utils/rmi4update/ |
rmi4update.cpp | 477 * this will be true for HID, but other protocols will need to revert polling. Polling
|
/external/srtp/doc/ |
draft-irtf-cfrg-icm-00.txt | 82
Crypto Forum Research Group David A. McGrew
Internet Draft Cisco Systems, Inc.
Expires April, 2003 October, 2002
Integer Counter Mode
<draft-irtf-cfrg-icm-00.txt>
Status of this Memo
This document is an Internet Draft and is in full conformance with
all provisions of Section 10 of RFC-2026. Internet Drafts are working
documents of the Internet Engineering Task Force (IETF), its areas,
and working groups. Note that other groups may also distribute
working documents as Internet Drafts.
Internet Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
1. Abstract
This document specifies Integer Counter Mode (ICM), a mode of
operation of a block cipher which defines an indexed keystream
generator (which generates a keystream segment given an index).
This mode is efficient, parallelizable, and has been proven secure
given realistic assumptions about the block cipher. Test vectors
are provided for AES.
Counter Mode admits many variations. The variant specified in
this document is secure and flexible, yet it enables a single
implementation of a keystream generator to suffice in different
application domains.
McGrew [Page 1]
Internet Draft Integer Counter Mode October, 2002
2. Notational Conventions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in RFC-2119 [B97].
3. Introduction
Counter Mode is a way to define a pseudorandom keystream generator
using a block cipher [CTR]. The keystream can be used for additive
encryption, key derivation, or any other application requiring
pseudorandom data.
In ICM, the keystream is logically broken into segments. Each
segment is identified with a segment index, and the segments have
equal lengths. This segmentation makes ICM especially appropriate
for securing packet-based protocols.
4. ICM
In this section, ICM keystream generation and encryption are
defined.
4.1. ICM Pa (…)
|
/external/tcpdump/ |
CHANGES | 22 Add a routine to print "text protocols", and add FTP/HTTP/SMTP/RTSP support. 25 formatting fixes for a bunch of protocols 26 new bounds checks for a number of protocols 294 Print basic info about a few more Cisco LAN protocols. [all...] |
Makefile.in | 287 /usr/include/protocols/routed.h
|
README.md | 57 Richard Stevens gives an excellent treatment of the Internet protocols
|
print-cfm.c | 15 * Support for the IEEE Connectivity Fault Management Protocols as per 802.1ag.
|
print-slow.c | 15 * support for the IEEE "slow protocols" LACP, MARKER as per 802.3ad
|
/external/toybox/toys/pending/ |
lsof.c | 234 // TODO: other protocols (packet).
|
/external/valgrind/docs/internals/ |
xml-output.txt | 4 format (called Protocols 1, 2 and 3 respectively). As of 11 May 09
|
/frameworks/av/include/ndk/ |
NdkMediaDrm.h | 402 * delivery protocols.
|
/frameworks/base/core/java/android/nfc/cardemulation/ |
HostApduService.java | 44 * <h3>NFC Protocols</h3>
|
/frameworks/base/docs/html/training/connect-devices-wirelessly/ |
nsd.jd | 90 authoritative list of service types used by service discovery protocols such as NSD and Bonjour.
|
/libcore/ojluni/src/main/java/java/net/ |
URL.java | 281 * <p>Protocol handlers for the following protocols are guaranteed 286 * Protocol handlers for additional protocols may also be 541 * This means protocols cannot start w/ '#', but we must parse 559 // Only use our context if the protocols match. [all...] |
Completed in 4898 milliseconds
<<31323334353637383940>>