/external/clang/test/SemaCXX/ |
convert-to-bool.cpp | 20 void test_conv_to_bool(ConvToBool ctb, ConvToInt cti, ExplicitConvToBool ecb) { 23 if (ecb) { } 26 for (; ecb; ) { } 29 while (ecb) { } 32 do { } while (ecb); 36 if (!ecb) { } 38 bool b1 = !ecb; 39 if (ctb && ecb) { } 40 bool b2 = ctb && ecb; 41 if (ctb || ecb) { } [all...] |
/cts/tests/tests/keystore/src/android/keystore/cts/ |
DESedeECBNoPaddingCipherTest.java | 11 return "DESede/ECB/NoPadding"; 17 fail("ECB does not use IV");
|
DESedeECBPKCS7PaddingCipherTest.java | 11 return "DESede/ECB/PKCS7Padding"; 17 fail("ECB does not use IV");
|
RSACipherTest.java | 45 "RSA/ECB/NoPadding", 59 Cipher cipher = Cipher.getInstance("RSA/ECB/NoPadding", provider); 78 "RSA/ECB/NoPadding", 89 Cipher cipher = Cipher.getInstance("RSA/ECB/NoPadding", provider); 106 "RSA/ECB/NoPadding", 115 Cipher cipher = Cipher.getInstance("RSA/ECB/NoPadding", provider); 134 "RSA/ECB/NoPadding", 144 Cipher cipher = Cipher.getInstance("RSA/ECB/NoPadding", provider); 164 "RSA/ECB/NoPadding", 176 Cipher cipher = Cipher.getInstance("RSA/ECB/NoPadding", provider) [all...] |
AESECBNoPaddingCipherTestBase.java | 22 return "AES/ECB/NoPadding";
|
AESECBPKCS7PaddingCipherTestBase.java | 22 return "AES/ECB/PKCS7Padding";
|
/external/boringssl/src/crypto/cipher_extra/test/ |
cipher_tests.txt | 33 # DES EDE3 ECB tests 109 # AES 128 ECB tests (from FIPS-197 test vectors, encrypt) 110 Cipher = AES-128-ECB 117 # AES 256 ECB tests (from FIPS-197 test vectors, encrypt) 118 Cipher = AES-256-ECB 126 # For all ECB encrypts and decrypts, the transformed sequence is 127 # AES-bits-ECB:key::plaintext:ciphertext:encdec 128 # ECB-AES128.Encrypt and ECB-AES128.Decrypt 129 Cipher = AES-128-ECB [all...] |
/libcore/luni/src/test/java/org/apache/harmony/crypto/tests/javax/crypto/func/ |
CipherRSATest.java | 24 new String[] {"ECB"}, new String[] { 36 new String[] {"ECB"}, 48 new String[] {"ECB"}, 58 new String[] {"ECB"}, new String[] {"NOPADDING"});
|
CipherDESedeTest.java | 26 "ECB", "CBC", "CFB", "CFB8", "CFB16", "CFB24", "CFB32", 43 "ECB", "CBC", "CFB", "CFB8", "CFB16", "CFB24", "CFB32",
|
CipherDesTest.java | 26 "ECB", "CBC", "CFB", "CFB8", "CFB16", "CFB24", "CFB32", 42 "ECB", "CBC", "CFB", "CFB8", "CFB16", "CFB24", "CFB32",
|
CipherAesTest.java | 26 "ECB", "CBC", "CFB", "CFB8", "CFB16", "CFB24", "CFB32", 46 "ECB", "CBC", "CFB", "CFB8", "CFB16", "CFB24", "CFB32",
|
/external/boringssl/src/decrepit/evp/ |
evp_do_all.c | 24 callback(EVP_aes_128_ecb(), "AES-128-ECB", NULL, arg); 28 callback(EVP_aes_256_ecb(), "AES-256-ECB", NULL, arg); 32 callback(EVP_des_ecb(), "DES-ECB", NULL, arg); 42 callback(EVP_aes_128_ecb(), "aes-128-ecb", NULL, arg); 46 callback(EVP_aes_256_ecb(), "aes-256-ecb", NULL, arg); 50 callback(EVP_des_ecb(), "des-ecb", NULL, arg);
|
/external/llvm/lib/Support/ |
IntEqClasses.cpp | 35 unsigned ecb = EC[b]; local 39 while (eca != ecb) 40 if (eca < ecb) { 42 b = ecb; 43 ecb = EC[b]; 45 EC[a] = ecb;
|
/external/swiftshader/third_party/LLVM/lib/Support/ |
IntEqClasses.cpp | 35 unsigned ecb = EC[b]; local 39 while (eca != ecb) 40 if (eca < ecb) 41 EC[b] = eca, b = ecb, ecb = EC[b]; 43 EC[a] = ecb, a = eca, eca = EC[a];
|
/frameworks/base/keystore/java/android/security/keystore/ |
AndroidKeyStoreBCWorkaroundProvider.java | 85 putSymmetricCipherImpl("AES/ECB/NoPadding", 86 PACKAGE_NAME + ".AndroidKeyStoreUnauthenticatedAESCipherSpi$ECB$NoPadding"); 87 putSymmetricCipherImpl("AES/ECB/PKCS7Padding", 88 PACKAGE_NAME + ".AndroidKeyStoreUnauthenticatedAESCipherSpi$ECB$PKCS7Padding"); 104 putSymmetricCipherImpl("DESede/ECB/NoPadding", 105 PACKAGE_NAME + ".AndroidKeyStore3DESCipherSpi$ECB$NoPadding"); 106 putSymmetricCipherImpl("DESede/ECB/PKCS7Padding", 107 PACKAGE_NAME + ".AndroidKeyStore3DESCipherSpi$ECB$PKCS7Padding"); 113 putAsymmetricCipherImpl("RSA/ECB/NoPadding", 115 put("Alg.Alias.Cipher.RSA/None/NoPadding", "RSA/ECB/NoPadding") [all...] |
/external/conscrypt/openjdk-integ-tests/src/test/resources/crypto/ |
build_test_files.sh | 18 cat "$1"/ECB*.rsp | ./parse_records.py > aes-ecb.csv 23 cat "$1"/TECB*.rsp | ./parse_records.py > desede-ecb.csv
|
/toolchain/binutils/binutils-2.27/gas/testsuite/gas/i386/ |
padlock.d | 11 7:[ ]*f3 0f a7 c8 [ ]*repz xcrypt-ecb 12 b:[ ]*f3 0f a7 c8 [ ]*repz xcrypt-ecb
|
/cts/tests/tests/media/src/android/media/cts/ |
MediaPlayer2TestBase.java | 114 MediaPlayer2.MediaPlayer2EventCallback ecb = local 123 mp.setMediaPlayer2EventCallback(executor, ecb); 169 MediaPlayer2.MediaPlayer2EventCallback ecb = local 178 mp.setMediaPlayer2EventCallback(executor, ecb); 250 for (MediaPlayer2.MediaPlayer2EventCallback ecb : ecbs) { 251 ecb.onVideoSizeChanged(mp, dsd, w, h); 259 for (MediaPlayer2.MediaPlayer2EventCallback ecb : ecbs) { 260 ecb.onTimedText(mp, dsd, text); 269 for (MediaPlayer2.MediaPlayer2EventCallback ecb : ecbs) { 270 ecb.onTimedMetaDataAvailable(mp, dsd, data) [all...] |
/frameworks/support/media/src/androidTest/java/androidx/media/ |
MediaPlayer2TestBase.java | 130 MediaPlayer2.MediaPlayer2EventCallback ecb = local 140 mp.setMediaPlayer2EventCallback(executor, ecb); 186 MediaPlayer2.MediaPlayer2EventCallback ecb = local 196 mp.setMediaPlayer2EventCallback(executor, ecb); 344 for (MediaPlayer2.MediaPlayer2EventCallback ecb : ecbs) { 345 ecb.onVideoSizeChanged(mp, dsd, w, h); 354 for (MediaPlayer2.MediaPlayer2EventCallback ecb : ecbs) { 355 ecb.onTimedMetaDataAvailable(mp, dsd, data); 363 for (MediaPlayer2.MediaPlayer2EventCallback ecb : ecbs) { 364 ecb.onError(mp, dsd, what, extra) [all...] |
/external/boringssl/src/fipstools/ |
run_cavp.go | 105 {"ECBGFSbox128", []string{"kat", "aes-128-ecb"}, false}, 106 {"ECBGFSbox192", []string{"kat", "aes-192-ecb"}, false}, 107 {"ECBGFSbox256", []string{"kat", "aes-256-ecb"}, false}, 108 {"ECBKeySbox128", []string{"kat", "aes-128-ecb"}, false}, 109 {"ECBKeySbox192", []string{"kat", "aes-192-ecb"}, false}, 110 {"ECBKeySbox256", []string{"kat", "aes-256-ecb"}, false}, 111 {"ECBMMT128", []string{"kat", "aes-128-ecb"}, false}, 112 {"ECBMMT192", []string{"kat", "aes-192-ecb"}, false}, 113 {"ECBMMT256", []string{"kat", "aes-256-ecb"}, false}, 114 {"ECBVarKey128", []string{"kat", "aes-128-ecb"}, false} [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
Blowfish.java | 23 public static class ECB 26 public ECB() 85 provider.addAlgorithm("Cipher.BLOWFISH", PREFIX + "$ECB");
|
/external/conscrypt/common/src/main/java/org/conscrypt/ |
OpenSSLProvider.java | 309 putRSACipherImplClass("RSA/ECB/NoPadding", "OpenSSLCipherRSA$Raw"); 310 put("Alg.Alias.Cipher.RSA/None/NoPadding", "RSA/ECB/NoPadding"); 311 putRSACipherImplClass("RSA/ECB/PKCS1Padding", "OpenSSLCipherRSA$PKCS1"); 312 put("Alg.Alias.Cipher.RSA/None/PKCS1Padding", "RSA/ECB/PKCS1Padding"); 314 putRSACipherImplClass("RSA/ECB/OAEPPadding", "OpenSSLCipherRSA$OAEP$SHA1"); 315 put("Alg.Alias.Cipher.RSA/None/OAEPPadding", "RSA/ECB/OAEPPadding"); 316 putRSACipherImplClass("RSA/ECB/OAEPWithSHA-1AndMGF1Padding", "OpenSSLCipherRSA$OAEP$SHA1"); 318 "RSA/ECB/OAEPWithSHA-1AndMGF1Padding"); 320 "RSA/ECB/OAEPWithSHA-224AndMGF1Padding", "OpenSSLCipherRSA$OAEP$SHA224"); 322 "RSA/ECB/OAEPWithSHA-224AndMGF1Padding") [all...] |
/external/icu/icu4c/source/test/perf/normperf/ |
dtfmtrtperf.vcxproj.filters | 9 <UniqueIdentifier>{a9db56b6-4bbd-4fb7-8ecb-0869de47c890}</UniqueIdentifier>
|
/external/conscrypt/benchmark-base/src/main/java/org/conscrypt/ |
Transformation.java | 32 AES_ECB_PKCS5("AES", "ECB", "PKCS5Padding", new AesKeyGen()), 34 RSA_ECB_PKCS1("RSA", "ECB", "PKCS1Padding", new RsaKeyGen());
|
/system/nfc/src/nfa/ee/ |
nfa_ee_main.cc | 102 nfa_ee_cb.ecb[xx].nfcee_id = NFA_EE_INVALID; 103 nfa_ee_cb.ecb[xx].ee_status = NFC_NFCEE_STATUS_INACTIVE; 106 nfa_ee_cb.ecb[NFA_EE_CB_4_DH].ee_status = NFC_NFCEE_STATUS_ACTIVE; 107 nfa_ee_cb.ecb[NFA_EE_CB_4_DH].nfcee_id = NFC_DH_ID; 228 p_cb = nfa_ee_cb.ecb; 288 p_cb = nfa_ee_cb.ecb; 373 ** Description Given a ecb, return the bit mask to be used in 376 ** Returns the bitmask for the given ecb. 383 index = (uint8_t)(p_cb - nfa_ee_cb.ecb); 393 ** Description Return the ecb associated with the given nfcee_i [all...] |