/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/symmetric/ |
H A D | Blowfish.java | 27 public static class CBC class in class:Blowfish 30 public CBC() method in class:Blowfish.CBC 61 // put("Cipher.1.3.6.1.4.1.3029.1.2", "org.bouncycastle.jce.provider.symmetric.Blowfish$CBC");
|
H A D | DESede.java | 49 static public class CBC class in class:DESede 52 public CBC() method in class:DESede.CBC 276 // put("Cipher." + PKCSObjectIdentifiers.des_EDE3_CBC, "org.bouncycastle.jce.provider.symmetric.DESede$CBC"); 277 // put("Cipher." + OIWObjectIdentifiers.desCBC, "org.bouncycastle.jce.provider.symmetric.DESede$CBC");
|
/external/openssl/crypto/des/ |
H A D | rpc_des.h | 103 enum desmode { CBC, ECB }; enumerator in enum:desmode
|
H A D | rpc_enc.c | 72 if (desp->des_mode == CBC)
|
/external/chromium/crypto/ |
H A D | encryptor_mac.cc | 17 mode_(CBC) { 25 DCHECK_EQ(CBC, mode) << "Unsupported mode of operation";
|
H A D | encryptor_nss.cc | 18 mode_(CBC) { 27 DCHECK_EQ(CBC, mode);
|
H A D | encryptor_openssl.cc | 49 mode_(CBC) { 57 DCHECK_EQ(CBC, mode);
|
H A D | encryptor_unittest.cc | 24 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)); 44 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt. 46 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt. 98 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 130 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 156 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 181 EXPECT_FALSE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 193 EXPECT_FALSE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 209 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); 228 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, i [all...] |
H A D | encryptor_win.cc | 33 mode_(CBC), 42 DCHECK_EQ(CBC, mode) << "Unsupported mode of operation";
|
H A D | encryptor.h | 26 CBC enumerator in enum:crypto::Encryptor::Mode
|
/external/chromium/chrome/browser/password_manager/ |
H A D | encryptor_linux.cc | 90 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv)) 132 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv))
|
/external/chromium/chrome/browser/sync/util/ |
H A D | nigori.cc | 134 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, 176 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv)) 238 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv))
|
/external/chromium/net/socket/ |
H A D | dns_cert_provenance_checker.cc | 310 bool r = encryptor.Init(symkey.get(), crypto::Encryptor::CBC, iv);
|
/external/openssl/crypto/evp/ |
H A D | evp_locl.h | 152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \
|
/external/dropbear/libtomcrypt/ |
H A D | crypt.tex | 179 unlike libraries like OpenSSL is not tied to direct routines. For instance, in OpenSSL there are CBC block 779 \subsubsection{CBC Mode} 780 \index{CBC mode} 781 CBC or Cipher Block Chaining mode is a simple mode designed to prevent trivial forms of replay and swap attacks on ciphers. 802 CFB or Ciphertext Feedback Mode is a mode akin to CBC. It is given as: 813 OFB or Output Feedback Mode is a mode akin to CBC as well. It is given as: 834 The ECB and CBC modes process blocks of the same size as the cipher at a time. Therefore, they are less flexible than the 839 Ciphertext stealing is a method of dealing with messages in CBC mode which are not a multiple of the block length. This is accomplished 843 The more sane way to deal with partial blocks is to pad them with zeroes, and then use CBC normally. 846 \index{CBC Mod [all...] |