/external/openssl/crypto/evp/ |
D | evptests.txt | 44 # AES 128 CBC tests (from NIST test vectors, encrypt) 46 #AES-128-CBC:00000000000000000000000000000000:00000000000000000000000000000000:00000000000000000000… 48 # AES 192 CBC tests (from NIST test vectors, encrypt) 50 #AES-192-CBC:000000000000000000000000000000000000000000000000:00000000000000000000000000000000:0000… 52 # AES 256 CBC tests (from NIST test vectors, encrypt) 54 #AES-256-CBC:0000000000000000000000000000000000000000000000000000000000000000:000000000000000000000… 56 # AES 128 CBC tests (from NIST test vectors, decrypt) 58 #AES-128-CBC:00000000000000000000000000000000:00000000000000000000000000000000:FACA37E0B0C85373DF70… 78 # For all CBC encrypts and decrypts, the transformed sequence is 79 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec [all …]
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
D | cipher_test.txt | 9 # DES EDE3 CBC tests (from destest) 10 DES-EDE3-CBC:0123456789abcdeff1e0d3c2b5a49786fedcba9876543210:fedcba9876543210:37363534333231204E6F… 18 # AES 128 CBC tests (from NIST test vectors, decrypt) 33 # For all CBC encrypts and decrypts, the transformed sequence is 34 # AES-bits-CBC:key:IV/ciphertext':plaintext:ciphertext:encdec 35 # CBC-AES128.Encrypt and CBC-AES128.Decrypt 36 AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:000102030405060708090A0B0C0D0E0F:6BC1BEE22E409F96E93D7… 37 AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:7649ABAC8119B246CEE98E9B12E9197D:AE2D8A571E03AC9C9EB76… 38 AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:5086CB9B507219EE95DB113A917678B2:30C81C46A35CE411E5FBC… 39 AES-128-CBC:2B7E151628AED2A6ABF7158809CF4F3C:73BED6B8E3C1743B7116E69E22229516:F69F2445DF4F9B17AD2B4… [all …]
|
/external/openssl/patches/ |
D | 0016-ecdhe_psk_part2.patch | 4 Subject: ECDHE-PSK_AES-CBC-SHA_cipher_suites 6 Add ECDHE-PSK AES-CBC-SHA cipher suites from RFC 5489. 7 Remove ECDHE-PSK AES-CBC-SHA2 cipher suites from RFC 5489 because 91 -#define TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA256 "ECDHE-PSK-WITH-AES-128-CBC-SHA256" 92 -#define TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA384 "ECDHE-PSK-WITH-AES-256-CBC-SHA384" 94 +#define TLS1_TXT_ECDHE_PSK_WITH_AES_128_CBC_SHA "ECDHE-PSK-AES128-CBC-SHA" 95 +#define TLS1_TXT_ECDHE_PSK_WITH_AES_256_CBC_SHA "ECDHE-PSK-AES256-CBC-SHA"
|
D | 0009-cbc_record_splitting.patch | 34 + BIO_printf(bio_err," -no_record_splitting - disable 1/n-1 record splitting in CBC mode\n"); 132 - /* countermeasure against known-IV weakness in CBC ciphersuites 193 + /* enable vulnerability countermeasure for CBC ciphers with 197 - /* enable vulnerability countermeasure for CBC ciphers with 247 + * in its own record in order to randomise a CBC IV. */ 298 + * of the data in order to randomise a CBC IV. If |is_fragment| is true then 345 /* countermeasure against known-IV weakness in CBC ciphersuites 449 -/* Disable SSL 3.0/TLS 1.0 CBC vulnerability workaround that was added 455 + * insertion of empty records in CBC mode, but the empty records were commonly 470 +/* When set, TLS 1.0 and SSLv3, multi-byte, CBC records will be split in two: [all …]
|
/external/chromium_org/crypto/ |
D | encryptor_nss.cc | 20 case Encryptor::CBC: in GetMechanism() 37 mode_(CBC) { in Encryptor() 48 DCHECK(CBC == mode || CTR == mode) << "Unsupported mode of operation"; in Init() 53 if (mode == CBC && iv.size() != AES_BLOCK_SIZE) in Init() 57 case CBC: in Init() 76 CHECK(!plaintext.empty() || (mode_ == CBC)); in Encrypt()
|
D | encryptor_unittest.cc | 24 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)); in TEST() 68 EXPECT_TRUE(encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)); in TEST() 97 EXPECT_TRUE(decryptor.Init(wrong_key.get(), crypto::Encryptor::CBC, iv)); in TEST() 105 EXPECT_TRUE(decryptor2.Init(wrong_key2.get(), crypto::Encryptor::CBC, iv)); in TEST() 111 EXPECT_TRUE(decryptor3.Init(wrong_key3.get(), crypto::Encryptor::CBC, iv)); in TEST() 415 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); in TEST() 447 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); in TEST() 472 EXPECT_FALSE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); in TEST() 483 EXPECT_FALSE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); in TEST() 499 EXPECT_TRUE(encryptor.Init(sym_key.get(), crypto::Encryptor::CBC, iv)); in TEST() [all …]
|
D | encryptor_openssl.cc | 48 mode_(CBC) { in Encryptor() 58 DCHECK(mode == CBC || mode == CTR); in Init() 61 if (mode == CBC && iv.size() != AES_BLOCK_SIZE) in Init() 75 CHECK(!plaintext.empty() || (mode_ == CBC)); in Encrypt()
|
D | encryptor.h | 28 CBC, enumerator
|
/external/conscrypt/src/main/java/org/conscrypt/ |
D | OpenSSLCipher.java | 52 CBC, enumConstant 537 public static class CBC extends AES { class in OpenSSLCipher.AES 538 public CBC(Padding padding) { in CBC() method in OpenSSLCipher.AES.CBC 539 super(Mode.CBC, padding); in CBC() 542 public static class NoPadding extends CBC { 548 public static class PKCS5Padding extends CBC { 606 case CBC: in checkSupportedMode() 654 public static class CBC extends DESEDE { class in OpenSSLCipher.DESEDE 655 public CBC(Padding padding) { in CBC() method in OpenSSLCipher.DESEDE.CBC 656 super(Mode.CBC, padding); in CBC() [all …]
|
/external/openssl/crypto/objects/ |
D | objects.txt | 145 ISO-US 113533 7 66 10 : CAST5-CBC : cast5-cbc 151 !Cname pbeWithMD5AndCast5-CBC 182 pkcs5 1 : PBE-MD2-DES : pbeWithMD2AndDES-CBC 183 pkcs5 3 : PBE-MD5-DES : pbeWithMD5AndDES-CBC 184 pkcs5 4 : PBE-MD2-RC2-64 : pbeWithMD2AndRC2-CBC 185 pkcs5 6 : PBE-MD5-RC2-64 : pbeWithMD5AndRC2-CBC 186 pkcs5 10 : PBE-SHA1-DES : pbeWithSHA1AndDES-CBC 187 pkcs5 11 : PBE-SHA1-RC2-64 : pbeWithSHA1AndRC2-CBC 341 !Cname pbe-WithSHA1And3_Key_TripleDES-CBC 342 pkcs12-pbeids 3 : PBE-SHA1-3DES : pbeWithSHA1And3-KeyTripleDES-CBC [all …]
|
/external/chromium_org/third_party/boringssl/src/crypto/obj/ |
D | objects.txt | 145 ISO-US 113533 7 66 10 : CAST5-CBC : cast5-cbc 151 !Cname pbeWithMD5AndCast5-CBC 183 pkcs5 1 : PBE-MD2-DES : pbeWithMD2AndDES-CBC 184 pkcs5 3 : PBE-MD5-DES : pbeWithMD5AndDES-CBC 185 pkcs5 4 : PBE-MD2-RC2-64 : pbeWithMD2AndRC2-CBC 186 pkcs5 6 : PBE-MD5-RC2-64 : pbeWithMD5AndRC2-CBC 187 pkcs5 10 : PBE-SHA1-DES : pbeWithSHA1AndDES-CBC 188 pkcs5 11 : PBE-SHA1-RC2-64 : pbeWithSHA1AndRC2-CBC 342 !Cname pbe-WithSHA1And3_Key_TripleDES-CBC 343 pkcs12-pbeids 3 : PBE-SHA1-3DES : pbeWithSHA1And3-KeyTripleDES-CBC [all …]
|
/external/chromium_org/content/test/data/webcrypto/ |
D | aes_cbc.json | 2 // F.2.1 (CBC-AES128.Encrypt) 13 // F.2.6 CBC-AES256.Decrypt [*]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/symmetric/ |
D | Blowfish.java | 27 public static class CBC class in Blowfish 30 public CBC() in CBC() method in Blowfish.CBC
|
D | DESede.java | 63 static public class CBC class in DESede 66 public CBC() in CBC() method in DESede.CBC
|
D | DES.java | 64 static public class CBC class in DES 67 public CBC() in CBC() method in DES.CBC
|
D | AES.java | 78 public static class CBC class in AES 81 public CBC() in CBC() method in AES.CBC
|
/external/chromium_org/components/os_crypt/ |
D | os_crypt_posix.cc | 90 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv)) in EncryptString() 132 if (!encryptor.Init(encryption_key.get(), crypto::Encryptor::CBC, iv)) in DecryptString()
|
D | os_crypt_mac.mm | 119 if (!encryptor.Init(encryption_key, crypto::Encryptor::CBC, iv)) 157 if (!encryptor.Init(encryption_key, crypto::Encryptor::CBC, iv))
|
/external/chromium_org/sync/util/ |
D | nigori.cc | 129 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, in Permute() 166 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv)) in Encrypt() 229 if (!encryptor.Init(encryption_key_.get(), Encryptor::CBC, iv)) in Decrypt()
|
/external/openssl/crypto/des/ |
D | rpc_des.h | 103 enum desmode { CBC, ECB }; enumerator
|
D | rpc_enc.c | 72 if (desp->des_mode == CBC) in _des_crypt()
|
/external/openssl/crypto/pem/ |
D | message | 6 DEK-Info: DES-CBC,0123456789abcdef
|
/external/openssl/apps/ |
D | privkey.pem | 3 DEK-Info: DES-EDE3-CBC,BA26229A1653B7FF
|
/external/chromium_org/chrome/browser/signin/ |
D | easy_unlock_auth_attempt.cc | 41 if (!encryptor.Init(key.get(), crypto::Encryptor::CBC, iv)) in UnwrapSecret()
|
/external/chromium_org/third_party/tlslite/ |
D | README.chromium | 28 - patches/ssl3_padding.patch: SSL3 requires minimal padding in CBC mode.
|