/external/chromium_org/third_party/openssl/openssl/crypto/des/ |
rpc_des.h | 103 enum desmode { CBC, ECB };
|
/external/openssl/crypto/des/ |
rpc_des.h | 103 enum desmode { CBC, ECB };
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/rpc/ |
rpc_des.h | 49 CBC, ECB
|
/prebuilts/gcc/linux-x86/host/i686-linux-glibc2.7-4.6/sysroot/usr/include/rpc/ |
rpc_des.h | 49 CBC, ECB
|
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.7-4.6/sysroot/usr/include/rpc/ |
rpc_des.h | 49 CBC, ECB
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
Blowfish.java | 18 public static class ECB 21 public ECB() 66 provider.addAlgorithm("Cipher.BLOWFISH", PREFIX + "$ECB");
|
AES.java | 53 public static class ECB 56 public ECB() 386 provider.addAlgorithm("Cipher.AES", PREFIX + "$ECB"); 391 // provider.addAlgorithm("Cipher." + NISTObjectIdentifiers.id_aes128_ECB, PREFIX + "$ECB"); 392 // provider.addAlgorithm("Cipher." + NISTObjectIdentifiers.id_aes192_ECB, PREFIX + "$ECB"); 393 // provider.addAlgorithm("Cipher." + NISTObjectIdentifiers.id_aes256_ECB, PREFIX + "$ECB");
|
DESede.java | 54 static public class ECB 57 public ECB() 383 provider.addAlgorithm("Cipher.DESEDE", PREFIX + "$ECB");
|
DES.java | 55 static public class ECB 58 public ECB() 451 provider.addAlgorithm("Cipher.DES", PREFIX + "$ECB");
|
/libcore/crypto/src/main/java/org/conscrypt/ |
OpenSSLCipher.java | 56 ECB, 79 private Mode mode = Mode.ECB; 581 public static class ECB extends AES { 582 public ECB(Padding padding) { 583 super(Mode.ECB, padding); 586 public static class NoPadding extends ECB { 592 public static class PKCS5Padding extends ECB { 638 case ECB: 716 public static class ECB extends DESEDE { 717 public ECB(Padding padding) [all...] |
/libcore/benchmarks/src/benchmarks/regression/ |
CipherBenchmark.java | 67 ECB, 126 if (mode != Mode.ECB) {
|
/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_locl.h | 172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \
|
e_aes.c | 489 BLOCK_CIPHER_generic(nid,keylen,16,0,ecb,ecb,ECB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ [all...] |
/external/openssl/crypto/evp/ |
evp_locl.h | 172 BLOCK_CIPHER_def1(cname, ecb, ecb, ECB, kstruct, nid, block_size, key_len, \
|
e_aes.c | 489 BLOCK_CIPHER_generic(nid,keylen,16,0,ecb,ecb,ECB,flags|EVP_CIPH_FLAG_DEFAULT_ASN1) \ [all...] |
/external/dropbear/libtomcrypt/ |
crypt.tex | 183 the key setup, ECB decrypt and encrypt and test vector routines. After that all five chaining mode routines 403 LibTomCrypt provides several block ciphers with an ECB block mode interface. It is important to first note that you 404 should never use the ECB modes directly to encrypt data. Instead you should use the ECB functions to make a chaining mode, 405 or use one of the provided chaining modes. All of the ciphers are written as ECB interfaces since it allows the rest of 431 \subsection{ECB Encryption and Decryption} 432 To encrypt or decrypt a block in ECB mode there are these two functions per cipher: 496 An example snippet that encodes a block with Blowfish in ECB mode. [all...] |
/prebuilts/devtools/tools/lib/ |
bcprov-jdk15on-1.48.jar | |
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.48/ |
bcprov-jdk15on-1.48.jar | |
/external/chromium_org/third_party/icu/source/data/sprep/ |
rfc3491.txt | 1007 1ECA; 1ECB; MAP [all...] |
rfc3530csci.txt | 1006 1ECA; 1ECB; MAP [all...] |
rfc3722.txt | 1007 1ECA; 1ECB; MAP [all...] |
rfc3920node.txt | 1007 1ECA; 1ECB; MAP [all...] |
rfc4518ci.txt | 974 1ECA; 1ECB; MAP [all...] |
/external/chromium_org/third_party/icu/source/test/testdata/ |
nfs4_cis_prep.txt | 997 1ECA; 1ECB; MAP [all...] |
nfs4_cs_prep_ci.txt | 997 1ECA; 1ECB; MAP [all...] |