Searched refs:CBC (Results 1 - 15 of 15) sorted by relevance

/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/symmetric/
H A DBlowfish.java27 public static class CBC class in class:Blowfish
30 public CBC() method in class:Blowfish.CBC
61 // put("Cipher.1.3.6.1.4.1.3029.1.2", "org.bouncycastle.jce.provider.symmetric.Blowfish$CBC");
H A DDESede.java49 static public class CBC class in class:DESede
52 public CBC() method in class:DESede.CBC
276 // put("Cipher." + PKCSObjectIdentifiers.des_EDE3_CBC, "org.bouncycastle.jce.provider.symmetric.DESede$CBC");
277 // put("Cipher." + OIWObjectIdentifiers.desCBC, "org.bouncycastle.jce.provider.symmetric.DESede$CBC");
/external/openssl/crypto/des/
H A Drpc_des.h103 enum desmode { CBC, ECB }; enumerator in enum:desmode
H A Drpc_enc.c72 if (desp->des_mode == CBC)
/external/chromium/crypto/
H A Dencryptor_mac.cc17 mode_(CBC) {
25 DCHECK_EQ(CBC, mode) << "Unsupported mode of operation";
H A Dencryptor_nss.cc18 mode_(CBC) {
27 DCHECK_EQ(CBC, mode);
H A Dencryptor_openssl.cc49 mode_(CBC) {
57 DCHECK_EQ(CBC, mode);
H A Dencryptor_unittest.cc24 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv));
44 // NIST SP 800-38A test vector F.2.5 CBC-AES256.Encrypt.
46 // From NIST SP 800-38a test cast F.2.5 CBC-AES256.Encrypt.
98 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv));
130 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv));
156 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv));
181 EXPECT_FALSE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv));
193 EXPECT_FALSE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv));
209 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv));
228 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, i
[all...]
H A Dencryptor_win.cc33 mode_(CBC),
42 DCHECK_EQ(CBC, mode) << "Unsupported mode of operation";
H A Dencryptor.h26 CBC enumerator in enum:crypto::Encryptor::Mode
/external/chromium/chrome/browser/password_manager/
H A Dencryptor_linux.cc90 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv))
132 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv))
/external/chromium/chrome/browser/sync/util/
H A Dnigori.cc134 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC,
176 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv))
238 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv))
/external/chromium/net/socket/
H A Ddns_cert_provenance_checker.cc310 bool r = encryptor.Init(symkey.get(), crypto::Encryptor::CBC, iv);
/external/openssl/crypto/evp/
H A Devp_locl.h152 BLOCK_CIPHER_def1(cname, cbc, cbc, CBC, kstruct, nid, block_size, key_len, \
/external/dropbear/libtomcrypt/
H A Dcrypt.tex179 unlike libraries like OpenSSL is not tied to direct routines. For instance, in OpenSSL there are CBC block
779 \subsubsection{CBC Mode}
780 \index{CBC mode}
781 CBC or Cipher Block Chaining mode is a simple mode designed to prevent trivial forms of replay and swap attacks on ciphers.
802 CFB or Ciphertext Feedback Mode is a mode akin to CBC. It is given as:
813 OFB or Output Feedback Mode is a mode akin to CBC as well. It is given as:
834 The ECB and CBC modes process blocks of the same size as the cipher at a time. Therefore, they are less flexible than the
839 Ciphertext stealing is a method of dealing with messages in CBC mode which are not a multiple of the block length. This is accomplished
843 The more sane way to deal with partial blocks is to pad them with zeroes, and then use CBC normally.
846 \index{CBC Mod
[all...]

Completed in 206 milliseconds