HomeSort by relevance Sort by last modified time
    Searched full:cbc (Results 201 - 225 of 430) sorted by null

1 2 3 4 5 6 7 891011>>

  /external/openssl/apps/
pkcs12.c 314 BIO_printf (bio_err, " encrypt PEM output with cbc aes\n");
318 BIO_printf (bio_err, " encrypt PEM output with cbc camellia\n");
smime.c 453 BIO_printf (bio_err, " encrypt PEM output with cbc aes\n");
457 BIO_printf (bio_err, " encrypt PEM output with cbc camellia\n");
  /external/openssl/crypto/des/
des.c 344 "-b : encrypt using DES in ecb encryption mode, the default is cbc mode.",
348 " encryption. Default is triple cbc, -b makes it triple ecb.",
destest.c 462 printf("Doing cbc\n");
489 printf("Doing desx cbc\n");
515 printf("Doing ede cbc\n");
  /external/wpa_supplicant_8/hostapd/
README 303 robust encryption algorithm (CCMP: AES in Counter mode with CBC-MAC)
344 # CCMP = AES in Counter mode with CBC-MAC [RFC 3610, IEEE 802.11i]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.c 117 * mask of zero is used per the RFC 4346, 6.2.3.2 CBC Block
568 cipher = "DES-CBC-SHA";
tlsv1_record.c 183 * Use random number R per the RFC 4346, 6.2.3.2 CBC Block
  /external/chromium_org/third_party/boringssl/src/ssl/
s3_pkt.c 451 /* CBC records must have a padding length byte too. */
590 * in its own record in order to randomise a CBC IV. */
636 * of the data in order to randomise a CBC IV. If |is_fragment| is true then
690 /* countermeasure against known-IV weakness in CBC ciphersuites
691 * (see http://www.openssl.org/~bodo/tls-cbc.txt) */
    [all...]
t1_enc.c 665 /* enable vulnerability countermeasure for CBC ciphers with
666 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt)
    [all...]
  /external/openssl/ssl/
d1_pkt.c 456 /* CBC records must have a padding length byte too. */
    [all...]
s3_pkt.c 448 /* CBC records must have a padding length byte too. */
643 * in its own record in order to randomise a CBC IV. */
690 * of the data in order to randomise a CBC IV. If |is_fragment| is true then
745 /* countermeasure against known-IV weakness in CBC ciphersuites
746 * (see http://www.openssl.org/~bodo/tls-cbc.txt) */
    [all...]
t1_enc.c 648 /* enable vulnerability countermeasure for CBC ciphers with
649 * known-IV problem (http://www.openssl.org/~bodo/tls-cbc.txt)
1045 /* This is a CBC-encrypted record. We must avoid leaking any
    [all...]
  /external/chromium_org/content/child/webcrypto/
jwk.cc 126 // | "A128CBC" | AES in Cipher Block Chaining Mode (CBC) with PKCS #5 |
128 // | "A192CBC" | AES CBC using 192 bit keys |
129 // | "A256CBC" | AES CBC using 256 bit keys |
  /cts/tools/vm-tests-tf/src/dot/junit/opcodes/if_ltz/d/
T_if_ltz_8.dfh 9 // parsed: offset 12, len 20: signature : 2cbc...44c1
  /external/chromium_org/chrome/browser/chromeos/login/easy_unlock/
easy_unlock_create_keys_operation.cc 287 if (!encryptor.Init(session_key.get(), crypto::Encryptor::CBC, iv)) {
  /external/chromium_org/content/child/webcrypto/test/
hmac_unittest.cc 332 // Fail: Input algorithm (AES-CBC) is inconsistent with JWK value
rsa_ssa_unittest.cc 180 // * AES-CBC doesn't support PKCS8 key format
181 // * AES-CBC doesn't support "sign" usage
    [all...]
  /external/chromium_org/third_party/boringssl/src/ssl/test/
bssl_shim.cc 493 // trip up the CBC record splitting code.
  /external/chromium_org/third_party/libsrtp/srtp/crypto/test/
cipher_driver.c 464 /* Over-alloc, for NIST CBC padding */
  /external/chromium_org/third_party/tlslite/patches/
dhe_rsa.patch 115 # RC4 is preferred as faster in Python, works in SSL3, and immune to CBC
  /external/ipsec-tools/src/racoon/missing/crypto/rijndael/
rijndael-api-fst.c 253 panic("rijndael_padEncrypt(CBC)");
  /external/openssl/crypto/pkcs7/
pkcs7.h 80 Encryption_ID DES-CBC
  /external/openssl/include/openssl/
pkcs7.h 80 Encryption_ID DES-CBC
  /frameworks/native/include/media/drm/
DrmAPI.h 249 // Transforms and is case insensitive. For example "AES/CBC/PKCS5Padding".
  /external/chromium_org/third_party/boringssl/src/crypto/aes/asm/
vpaes-x86.pl 23 # Performance summary. aes-586.pl column lists large-block CBC
26 # large-block CBC] encrypt/decrypt.

Completed in 752 milliseconds

1 2 3 4 5 6 7 891011>>