/external/tcpdump/tests/ |
esp-secrets.txt | 3 0x12345678@192.1.2.45 3des-cbc-hmac96:0x43434545464649494a4a4c4c4f4f51515252545457575840 4 0xabcdabcd@192.0.1.1 3des-cbc-hmac96:0x434545464649494a4a4c4c4f4f5151525254545757584043 5 0xd1234567@192.1.2.45 aes256-cbc-hmac96:0xaaaabbbbccccdddd4043434545464649494a4a4c4c4f4f515152525454575758
|
esp3.gdbinit | 1 set args -t -n -E "3des-cbc-hmac96:0x43434545464649494a4a4c4c4f4f51515252545457575840" -r 08-sunrise-sunset-esp2.pcap
|
esp2.gdbinit | 1 set args -t -n -E "0x12345678@192.1.2.45 3des-cbc-hmac96:0x43434545464649494a4a4c4c4f4f51515252545457575840,0xabcdabcd@192.0.1.1 3des-cbc-hmac96:0x434545464649494a4a4c4c4f4f5151525254545757584043" -r 08-sunrise-sunset-esp2.pcap
|
esp1.gdbinit | 1 set args -t -n -E "0x12345678@192.1.2.45 3des-cbc-hmac96:0x4043434545464649494a4a4c4c4f4f515152525454575758" -r 02-sunrise-sunset-esp.pcap
|
/external/chromium_org/third_party/yasm/source/patched-yasm/modules/arch/x86/tests/ |
padlock.asm | 6 ;xcrypt-cbc
|
/external/wpa_supplicant_8/src/crypto/ |
aes-cbc.c | 2 * AES-128 CBC 17 * aes_128_cbc_encrypt - AES-128 CBC encryption 19 * @iv: Encryption IV for CBC mode (16 bytes) 27 u8 cbc[AES_BLOCK_SIZE]; local 34 os_memcpy(cbc, iv, AES_BLOCK_SIZE); 39 cbc[j] ^= pos[j]; 40 aes_encrypt(ctx, cbc, cbc); 41 os_memcpy(pos, cbc, AES_BLOCK_SIZE); 50 * aes_128_cbc_decrypt - AES-128 CBC decryptio 60 u8 cbc[AES_BLOCK_SIZE], tmp[AES_BLOCK_SIZE]; local [all...] |
crypto_internal-cipher.c | 26 u8 cbc[32]; member in struct:crypto_cipher::__anon17257::__anon17259 32 u8 cbc[8]; member in struct:crypto_cipher::__anon17257::__anon17260 37 u8 cbc[8]; member in struct:crypto_cipher::__anon17257::__anon17261 76 os_memcpy(ctx->u.aes.cbc, iv, AES_BLOCK_SIZE); 84 os_memcpy(ctx->u.des3.cbc, iv, 8); 92 os_memcpy(ctx->u.des.cbc, iv, 8); 122 ctx->u.aes.cbc[j] ^= plain[j]; 123 aes_encrypt(ctx->u.aes.ctx_enc, ctx->u.aes.cbc, 124 ctx->u.aes.cbc); 125 os_memcpy(crypt, ctx->u.aes.cbc, AES_BLOCK_SIZE) [all...] |
aes-omac1.c | 2 * One-key CBC MAC (OMAC1) hash with AES-128 30 * omac1_aes_128_vector - One-Key CBC MAC (OMAC1) hash with AES-128 46 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local 53 os_memset(cbc, 0, AES_BLOCK_SIZE); 66 cbc[i] ^= *pos++; 74 aes_encrypt(ctx, cbc, cbc); 84 cbc[i] ^= *pos++; 91 cbc[left] ^= 0x80; 96 pad[i] ^= cbc[i] [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
AES.java | 78 public static class CBC 81 public CBC() 174 * PBEWithAES-CBC 236 super("PBEWithSHA1And128BitAES-CBC-BC", null, true, PKCS12, SHA1, 128, 128); 248 super("PBEWithSHA1And192BitAES-CBC-BC", null, true, PKCS12, SHA1, 192, 128); 260 super("PBEWithSHA1And256BitAES-CBC-BC", null, true, PKCS12, SHA1, 256, 128); 272 super("PBEWithSHA256And128BitAES-CBC-BC", null, true, PKCS12, SHA256, 128, 128); 284 super("PBEWithSHA256And192BitAES-CBC-BC", null, true, PKCS12, SHA256, 192, 128); 296 super("PBEWithSHA256And256BitAES-CBC-BC", null, true, PKCS12, SHA256, 256, 128); 308 super("PBEWithMD5And128BitAES-CBC-OpenSSL", null, true, OPENSSL, MD5, 128, 128) [all...] |
DESede.java | 63 static public class CBC 66 public CBC() 215 * PBEWithSHAAnd3-KeyTripleDES-CBC 227 * PBEWithSHAAnd2-KeyTripleDES-CBC 239 * PBEWithSHAAnd3-KeyTripleDES-CBC 246 super("PBEwithSHAandDES3Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd3_KeyTripleDES_CBC, true, PKCS12, SHA1, 192, 64); 251 * PBEWithSHAAnd2-KeyTripleDES-CBC 258 super("PBEwithSHAandDES2Key-CBC", PKCSObjectIdentifiers.pbeWithSHAAnd2_KeyTripleDES_CBC, true, PKCS12, SHA1, 128, 64); 385 // provider.addAlgorithm("Cipher." + PKCSObjectIdentifiers.des_EDE3_CBC, PREFIX + "$CBC"); 406 provider.addAlgorithm("Cipher.PBEWITHSHAAND3-KEYTRIPLEDES-CBC", PREFIX + "$PBEWithSHAAndDES3Key") [all...] |
Twofish.java | 86 * PBEWithSHAAndTwofish-CBC 93 super("PBEwithSHAandTwofish-CBC", null, true, PKCS12, SHA1, 256, 128); 98 * PBEWithSHAAndTwofish-CBC 138 provider.addAlgorithm("Alg.Alias.AlgorithmParameters.PBEWITHSHAANDTWOFISH-CBC", "PKCS12PBE"); 139 provider.addAlgorithm("Cipher.PBEWITHSHAANDTWOFISH-CBC", PREFIX + "$PBEWithSHA"); 140 provider.addAlgorithm("SecretKeyFactory.PBEWITHSHAANDTWOFISH-CBC", PREFIX + "$PBEWithSHAKeyFactory");
|
/external/openssl/apps/ |
progs.pl | 67 "aes-128-cbc", "aes-128-ecb", 68 "aes-192-cbc", "aes-192-ecb", 69 "aes-256-cbc", "aes-256-ecb", 70 "camellia-128-cbc", "camellia-128-ecb", 71 "camellia-192-cbc", "camellia-192-ecb", 72 "camellia-256-cbc", "camellia-256-ecb", 77 "des-cbc", "des-ede-cbc","des-ede3-cbc", 80 "idea-cbc","idea-ecb", "idea-cfb", "idea-ofb" [all...] |
progs.h | 178 {FUNC_TYPE_CIPHER,"aes-128-cbc",enc_main}, 184 {FUNC_TYPE_CIPHER,"aes-192-cbc",enc_main}, 190 {FUNC_TYPE_CIPHER,"aes-256-cbc",enc_main}, 196 {FUNC_TYPE_CIPHER,"camellia-128-cbc",enc_main}, 202 {FUNC_TYPE_CIPHER,"camellia-192-cbc",enc_main}, 208 {FUNC_TYPE_CIPHER,"camellia-256-cbc",enc_main}, 260 {FUNC_TYPE_CIPHER,"des-cbc",enc_main}, 263 {FUNC_TYPE_CIPHER,"des-ede-cbc",enc_main}, 266 {FUNC_TYPE_CIPHER,"des-ede3-cbc",enc_main}, 287 {FUNC_TYPE_CIPHER,"idea-cbc",enc_main} [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherPBETest.java | 26 "PBEWithMD5AndDES", new int[] {56}, new String[] {"CBC"}, 38 "PBEWITHSHAAND3-KEYTRIPLEDES-CBC", new int[] {112, 168}, 39 new String[] {"CBC"}, new String[] {"PKCS5Padding"}); 50 "PBEWITHSHAAND40BITRC2-CBC", new int[] {40}, 51 new String[] {"CBC"}, new String[] {"PKCS5Padding"}); 64 new String[] {"CBC"}, new String[] {"PKCS5Padding"}); 76 new String[] {"CBC"}, new String[] {"PKCS5Padding"}); 87 "PBEWithSHA1AndRC2_40", new int[] {40}, new String[] {"CBC"},
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
cipher_test.txt | 9 # DES EDE3 CBC tests (from destest) 10 DES-EDE3-CBC:0123456789abcdeff1e0d3c2b5a49786fedcba9876543210:fedcba9876543210:37363534333231204E6F77206973207468652074696D6520666F722000000000:3FE301C962AC01D02213763C1CBD4CDC799657C064ECF5D41C673812CFDE9675 18 # AES 128 CBC tests (from NIST test vectors, decrypt) 33 # For all CBC encrypts and decrypts, the transformed sequence is 34 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 35 # CBC-AES128.Encrypt and CBC-AES128.Decrypt 36 AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:000102030405060708090A0B0C0D0E0F:6BC1BEE22E409F96E93D7E117393172A:7649ABAC8119B246CEE98E9B12E9197D 37 AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:7649ABAC8119B246CEE98E9B12E9197D:AE2D8A571E03AC9C9EB76FAC45AF8E51:5086CB9B507219EE95DB113A917678B2 38 AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:5086CB9B507219EE95DB113A917678B2:30C81C46A35CE411E5FBC1191A0A52EF (…) [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/ |
CipherTest.java | 92 Cipher cipher = Cipher.getInstance("DESede/CBC/PKCS5Padding"); 188 final String algorithm = "DESede/CBC/PKCS5Padding"; 199 final String algorithm = "DESede/CBC/PKCS5Padding"; 237 cipher = Cipher.getInstance("DES/CBC/NoPadding"); 253 cipher = Cipher.getInstance("DES/CBC/NoPadding"); 268 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "/CBC/PKCS5Padding"); 273 cipher = Cipher.getInstance("DES/CBC/NoPadding"); 280 cipher = Cipher.getInstance("DES/CBC/NoPadding"); 297 Cipher cipher = Cipher.getInstance(ALGORITHM_3DES + "/CBC/PKCS5Padding"); 302 cipher = Cipher.getInstance("DES/CBC/NoPadding") [all...] |
/external/apache-harmony/crypto/src/test/impl/java/org/apache/harmony/crypto/tests/javax/crypto/ |
Cipher_ImplTest.java | 102 Cipher c = Cipher.getInstance("DES/CBC/PKCS5Padding"); 107 c = Cipher.getInstance("DES/CBC/PKCS5Padding"); 118 Cipher.getInstance("DES/CBC/"); 130 Cipher.getInstance("DES/CBC/IncorrectPadding"); 144 Cipher.getInstance("DES/CBC/", "MyProvider2"); 156 Cipher.getInstance("DES/CBC/IncorrectPadding", "MyProvider2"); 162 Cipher.getInstance("DES/CBC/PKCS5Padding", "IncorrectProvider"); 177 c = Cipher.getInstance("DES/CBC/PKCS5Padding", "MyProvider2"); 188 Cipher.getInstance("DES/CBC/", p2); 200 Cipher.getInstance("DES/CBC/IncorrectPadding", p2) [all...] |
/external/openssl/crypto/evp/ |
evptests.txt | 44 # AES 128 CBC tests (from NIST test vectors, encrypt) 46 #AES-128-CBC:00000000000000000000000000000000:00000000000000000000000000000000:00000000000000000000000000000000:8A05FC5E095AF4848A08D328D3688E3D:1 48 # AES 192 CBC tests (from NIST test vectors, encrypt) 50 #AES-192-CBC:000000000000000000000000000000000000000000000000:00000000000000000000000000000000:00000000000000000000000000000000:7BD966D53AD8C1BB85D2ADFAE87BB104:1 52 # AES 256 CBC tests (from NIST test vectors, encrypt) 54 #AES-256-CBC:0000000000000000000000000000000000000000000000000000000000000000:00000000000000000000000000000000:00000000000000000000000000000000:FE3C53653E2F45B56FCD88B2CC898FF0:1 56 # AES 128 CBC tests (from NIST test vectors, decrypt) 58 #AES-128-CBC:00000000000000000000000000000000:00000000000000000000000000000000:FACA37E0B0C85373DF706E73F7C9AF86:00000000000000000000000000000000:0 78 # For all CBC encrypts and decrypts, the transformed sequence is 79 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encde [all...] |
/external/chromium_org/third_party/tlslite/tlslite/utils/ |
tripledes.py | 19 #CBC-Mode encryption, returns ciphertext 24 #CBC-Mode decryption, returns plaintext
|
/external/openssl/crypto/pem/ |
message | 6 DEK-Info: DES-CBC,0123456789abcdef
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/asn1/ntt/ |
NTTObjectIdentifiers.java | 12 /** id-camellia128-cbc; OID 1.2.392.200011.61.1.1.1.2 */ 14 /** id-camellia192-cbc; OID 1.2.392.200011.61.1.1.1.3 */ 16 /** id-camellia256-cbc; OID 1.2.392.200011.61.1.1.1.4 */
|
/external/openssl/patches/ |
0016-ecdhe_psk_part2.patch | 4 Subject: ECDHE-PSK_AES-CBC-SHA_cipher_suites 6 Add ECDHE-PSK AES-CBC-SHA cipher suites from RFC 5489. 7 Remove ECDHE-PSK AES-CBC-SHA2 cipher suites from RFC 5489 because 91 -#define TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256 "ECDHE-PSK-WITH-AES-128-CBC-SHA256" 92 -#define TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384 "ECDHE-PSK-WITH-AES-256-CBC-SHA384" 94 +#define TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA "ECDHE-PSK-AES128-CBC-SHA" 95 +#define TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA "ECDHE-PSK-AES256-CBC-SHA"
|
/libcore/luni/src/test/java/org/apache/harmony/security/tests/ |
AlgNameMapperTest.java | 35 {"1.2.840.113549.1.5.3", "pbeWithMD5AndDES-CBC"}, 36 {"1.2.840.113549.1.12.1.3", "pbeWithSHAAnd3-KeyTripleDES-CBC"}, 37 {"1.2.840.113549.1.12.1.6", "pbeWithSHAAnd40BitRC2-CBC"}, 38 {"1.2.840.113549.3.2", "RC2-CBC"}, 42 {"1.2.840.113549.3.6", "DESx-CBC"}, 43 {"1.2.840.113549.3.7", "TripleDES-CBC"}, 45 {"1.2.840.113549.3.9", "RC5-CBC"},
|
/external/chromium_org/third_party/boringssl/src/crypto/perlasm/ |
readme | 102 There is also a cbc mode function generator in cbc.pl 104 &cbc( $name, 120 &cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",1,4,5,3,-1,-1); 122 &cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",0,4,5,3,5,-1); 123 &cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",0,6,7,3,4,5);
|
/external/openssl/crypto/perlasm/ |
readme | 102 There is also a cbc mode function generator in cbc.pl 104 &cbc( $name, 120 &cbc("BF_cbc_encrypt","BF_encrypt","BF_encrypt",1,4,5,3,-1,-1); 122 &cbc("des_ncbc_encrypt","des_encrypt","des_encrypt",0,4,5,3,5,-1); 123 &cbc("des_ede3_cbc_encrypt","des_encrypt3","des_decrypt3",0,6,7,3,4,5);
|