Hot Search : Source embeded web remote control p2p game More...
Location : Home Search - hash function
Search - hash function - List
DL : 0
This document specifies EAP-IKEv2, an Extensible Authentication Protocol (EAP) method that is based on the Internet Key Exchange (IKEv2) protocol. EAP-IKEv2 provides mutual authentication and session key establishment between an EAP peer and an EAP server. It supports authentication techniques that are based on passwords, high-entropy shared keys, and public key certificates. EAP-IKEv2 further provides support for cryptographic ciphersuite negotiation, hash function agility, identity confidentiality (in certain modes of operation), fragmentation, and an optional "fast reconnect" mode. Tschofenig, et al. Experimental [Page 1]
Date : 2025-12-16 Size : 37kb User : 歪歪

DL : 4
通过单片机实现哈希函数SHA-1,C源程序完全可用,已经测试,外部加密芯片采用DS28E01-1-MCU hash function SHA-1, C source code fully available, and has been tested external encryption chip uses DS28E01-100
Date : 2025-12-16 Size : 27kb User : 张赫轩
CodeBus is one of the largest source code repositories on the Internet!
Contact us :
1999-2046 CodeBus All Rights Reserved.