/external/openssl/apps/ |
pkcs12.c | 314 BIO_printf (bio_err, " encrypt PEM output with cbc aes\n"); 318 BIO_printf (bio_err, " encrypt PEM output with cbc camellia\n");
|
smime.c | 453 BIO_printf (bio_err, " encrypt PEM output with cbc aes\n"); 457 BIO_printf (bio_err, " encrypt PEM output with cbc camellia\n");
|
/external/openssl/crypto/des/ |
des.c | 344 "-b : encrypt using DES in ecb encryption mode, the default is cbc mode.", 348 " encryption. Default is triple cbc, -b makes it triple ecb.",
|
destest.c | 462 printf("Doing cbc\n"); 489 printf("Doing desx cbc\n"); 515 printf("Doing ede cbc\n");
|
/external/wpa_supplicant_8/hostapd/ |
README | 303 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC) 344 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i]
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.c | 117 * mask of zero is used per the RFC 4346, 6.2.3.2 CBC Block 568 cipher = "DES-CBC-SHA";
|
tlsv1_record.c | 183 * Use random number R per the RFC 4346, 6.2.3.2 CBC Block
|
/external/chromium_org/third_party/boringssl/src/ssl/ |
s3_pkt.c | 451 /* CBC records must have a padding length byte too. */ 590 * in its own record in order to randomise a CBC IV. */ 636 * of the data in order to randomise a CBC IV. If |is_fragment| is true then 690 /* countermeasure against known-IV weakness in CBC ciphersuites 691 * (see http://www.openssl.org/~bodo/tls-cbc.txt) */ [all...] |
t1_enc.c | 665 /* enable vulnerability countermeasure for CBC ciphers with 666 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt) [all...] |
/external/openssl/ssl/ |
d1_pkt.c | 456 /* CBC records must have a padding length byte too. */ [all...] |
s3_pkt.c | 448 /* CBC records must have a padding length byte too. */ 643 * in its own record in order to randomise a CBC IV. */ 690 * of the data in order to randomise a CBC IV. If |is_fragment| is true then 745 /* countermeasure against known-IV weakness in CBC ciphersuites 746 * (see http://www.openssl.org/~bodo/tls-cbc.txt) */ [all...] |
t1_enc.c | 648 /* enable vulnerability countermeasure for CBC ciphers with 649 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt) 1045 /* This is a CBC-encrypted record. We must avoid leaking any [all...] |
/external/chromium_org/content/child/webcrypto/ |
jwk.cc | 126 // | "A128CBC" | AES in Cipher Block Chaining Mode (CBC) with PKCS #5 | 128 // | "A192CBC" | AES CBC using 192 bit keys | 129 // | "A256CBC" | AES CBC using 256 bit keys |
|
/cts/tools/vm-tests-tf/src/dot/junit/opcodes/if_ltz/d/ |
T_if_ltz_8.dfh | 9 // parsed: offset 12, len 20: signature : 2cbc...44c1
|
/external/chromium_org/chrome/browser/chromeos/login/easy_unlock/ |
easy_unlock_create_keys_operation.cc | 287 if (!encryptor.Init(session_key.get(), crypto::Encryptor::CBC, iv)) {
|
/external/chromium_org/content/child/webcrypto/test/ |
hmac_unittest.cc | 332 // Fail: Input algorithm (AES-CBC) is inconsistent with JWK value
|
rsa_ssa_unittest.cc | 180 // * AES-CBC doesn't support PKCS8 key format 181 // * AES-CBC doesn't support "sign" usage [all...] |
/external/chromium_org/third_party/boringssl/src/ssl/test/ |
bssl_shim.cc | 493 // trip up the CBC record splitting code.
|
/external/chromium_org/third_party/libsrtp/srtp/crypto/test/ |
cipher_driver.c | 464 /* Over-alloc, for NIST CBC padding */
|
/external/chromium_org/third_party/tlslite/patches/ |
dhe_rsa.patch | 115 # RC4 is preferred as faster in Python, works in SSL3, and immune to CBC
|
/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
rijndael-api-fst.c | 253 panic("rijndael_padEncrypt(CBC)");
|
/external/openssl/crypto/pkcs7/ |
pkcs7.h | 80 Encryption_ID DES-CBC
|
/external/openssl/include/openssl/ |
pkcs7.h | 80 Encryption_ID DES-CBC
|
/frameworks/native/include/media/drm/ |
DrmAPI.h | 249 // Transforms and is case insensitive. For example "AES/CBC/PKCS5Padding".
|
/external/chromium_org/third_party/boringssl/src/crypto/aes/asm/ |
vpaes-x86.pl | 23 # Performance summary. aes-586.pl column lists large-block CBC 26 # large-block CBC] encrypt/decrypt.
|