/prebuilts/go/darwin-x86/src/vendor/golang_org/x/crypto/chacha20poly1305/ |
chacha20poly1305_noasm.go | 9 func (c *chacha20poly1305) seal(dst, nonce, plaintext, additionalData []byte) []byte { 10 return c.sealGeneric(dst, nonce, plaintext, additionalData) 13 func (c *chacha20poly1305) open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 14 return c.openGeneric(dst, nonce, ciphertext, additionalData)
|
chacha20poly1305_generic.go | 18 func (c *chacha20poly1305) sealGeneric(dst, nonce, plaintext, additionalData []byte) []byte { 29 polyInput := make([]byte, roundTo16(len(additionalData))+roundTo16(len(plaintext))+8+8) 30 copy(polyInput, additionalData) 31 copy(polyInput[roundTo16(len(additionalData)):], out[:len(plaintext)]) 32 binary.LittleEndian.PutUint64(polyInput[len(polyInput)-16:], uint64(len(additionalData))) 42 func (c *chacha20poly1305) openGeneric(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 53 polyInput := make([]byte, roundTo16(len(additionalData))+roundTo16(len(ciphertext))+8+8) 54 copy(polyInput, additionalData) 55 copy(polyInput[roundTo16(len(additionalData)):], ciphertext) 56 binary.LittleEndian.PutUint64(polyInput[len(polyInput)-16:], uint64(len(additionalData))) [all...] |
chacha20poly1305_amd64.go | 49 func (c *chacha20poly1305) seal(dst, nonce, plaintext, additionalData []byte) []byte { 51 return c.sealGeneric(dst, nonce, plaintext, additionalData) 58 chacha20Poly1305Seal(out[:], state[:], plaintext, additionalData) 62 func (c *chacha20poly1305) open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 64 return c.openGeneric(dst, nonce, ciphertext, additionalData) 72 if !chacha20Poly1305Open(out, state[:], ciphertext, additionalData) {
|
chacha20poly1305.go | 42 func (c *chacha20poly1305) Seal(dst, nonce, plaintext, additionalData []byte) []byte { 51 return c.seal(dst, nonce, plaintext, additionalData) 56 func (c *chacha20poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 67 return c.open(dst, nonce, ciphertext, additionalData)
|
/prebuilts/go/linux-x86/src/vendor/golang_org/x/crypto/chacha20poly1305/ |
chacha20poly1305_noasm.go | 9 func (c *chacha20poly1305) seal(dst, nonce, plaintext, additionalData []byte) []byte { 10 return c.sealGeneric(dst, nonce, plaintext, additionalData) 13 func (c *chacha20poly1305) open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 14 return c.openGeneric(dst, nonce, ciphertext, additionalData)
|
chacha20poly1305_generic.go | 18 func (c *chacha20poly1305) sealGeneric(dst, nonce, plaintext, additionalData []byte) []byte { 29 polyInput := make([]byte, roundTo16(len(additionalData))+roundTo16(len(plaintext))+8+8) 30 copy(polyInput, additionalData) 31 copy(polyInput[roundTo16(len(additionalData)):], out[:len(plaintext)]) 32 binary.LittleEndian.PutUint64(polyInput[len(polyInput)-16:], uint64(len(additionalData))) 42 func (c *chacha20poly1305) openGeneric(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 53 polyInput := make([]byte, roundTo16(len(additionalData))+roundTo16(len(ciphertext))+8+8) 54 copy(polyInput, additionalData) 55 copy(polyInput[roundTo16(len(additionalData)):], ciphertext) 56 binary.LittleEndian.PutUint64(polyInput[len(polyInput)-16:], uint64(len(additionalData))) [all...] |
chacha20poly1305_amd64.go | 49 func (c *chacha20poly1305) seal(dst, nonce, plaintext, additionalData []byte) []byte { 51 return c.sealGeneric(dst, nonce, plaintext, additionalData) 58 chacha20Poly1305Seal(out[:], state[:], plaintext, additionalData) 62 func (c *chacha20poly1305) open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 64 return c.openGeneric(dst, nonce, ciphertext, additionalData) 72 if !chacha20Poly1305Open(out, state[:], ciphertext, additionalData) {
|
chacha20poly1305.go | 42 func (c *chacha20poly1305) Seal(dst, nonce, plaintext, additionalData []byte) []byte { 51 return c.seal(dst, nonce, plaintext, additionalData) 56 func (c *chacha20poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 67 return c.open(dst, nonce, ciphertext, additionalData)
|
/external/boringssl/src/ssl/test/runner/ |
chacha20_poly1305.go | 139 func (c *chaCha20Poly1305) poly1305(tag *[16]byte, nonce, ciphertext, additionalData []byte) { 140 input := make([]byte, 0, len(additionalData)+15+len(ciphertext)+15+8+8) 141 input = append(input, additionalData...) 151 binary.LittleEndian.PutUint64(out, uint64(len(additionalData))) 161 func (c *chaCha20Poly1305) Seal(dst, nonce, plaintext, additionalData []byte) []byte { 170 c.poly1305(&tag, nonce, out[:len(plaintext)], additionalData) 176 func (c *chaCha20Poly1305) Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) { 186 c.poly1305(&tag, nonce, ciphertext[:plaintextLen], additionalData)
|
cipher_suites.go | 261 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 263 return f.aead.Seal(out, f.sealNonce, plaintext, additionalData) 266 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 268 return f.aead.Open(out, f.openNonce, plaintext, additionalData) 311 func (x *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 313 ret := x.aead.Seal(out, x.sealNonce, plaintext, additionalData) 318 func (x *xorNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 320 ret, err := x.aead.Open(out, x.openNonce, plaintext, additionalData)
|
conn.go | 428 var additionalData []byte 430 additionalData = make([]byte, 13) 431 copy(additionalData, seq) 432 copy(additionalData[8:], b.data[:3]) 434 additionalData[11] = byte(n >> 8) 435 additionalData[12] = byte(n) 438 payload, err = c.Open(payload[:0], nonce, payload, additionalData) 593 var additionalData []byte 595 additionalData = make([]byte, 13) 596 copy(additionalData, hc.outSeq[:] [all...] |
/packages/apps/Contacts/src/com/android/contacts/ |
SplitAggregateView.java | 218 TextView additionalData; 244 cache.additionalData = (TextView)convertView.findViewById(R.id.additionalData); 251 cache.additionalData.setText(info.getAdditionalData());
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
cipher_suites.go | 173 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 175 return f.aead.Seal(out, f.nonce[:], plaintext, additionalData) 178 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 180 return f.aead.Open(out, f.nonce[:], plaintext, additionalData) 194 func (f *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 198 result := f.aead.Seal(out, f.nonceMask[:], plaintext, additionalData) 206 func (f *xorNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 210 result, err := f.aead.Open(out, f.nonceMask[:], plaintext, additionalData)
|
conn.go | 150 additionalData [13]byte // to avoid allocs; interface method args escape 300 copy(hc.additionalData[:], hc.seq[:]) 301 copy(hc.additionalData[8:], b.data[:3]) 303 hc.additionalData[11] = byte(n >> 8) 304 hc.additionalData[12] = byte(n) 306 payload, err = c.Open(payload[:0], nonce, payload, hc.additionalData[:]) 415 copy(hc.additionalData[:], hc.seq[:]) 416 copy(hc.additionalData[8:], b.data[:3]) 417 hc.additionalData[11] = byte(payloadLen >> 8) 418 hc.additionalData[12] = byte(payloadLen [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
cipher_suites.go | 173 func (f *fixedNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 175 return f.aead.Seal(out, f.nonce[:], plaintext, additionalData) 178 func (f *fixedNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 180 return f.aead.Open(out, f.nonce[:], plaintext, additionalData) 194 func (f *xorNonceAEAD) Seal(out, nonce, plaintext, additionalData []byte) []byte { 198 result := f.aead.Seal(out, f.nonceMask[:], plaintext, additionalData) 206 func (f *xorNonceAEAD) Open(out, nonce, plaintext, additionalData []byte) ([]byte, error) { 210 result, err := f.aead.Open(out, f.nonceMask[:], plaintext, additionalData)
|
conn.go | 150 additionalData [13]byte // to avoid allocs; interface method args escape 300 copy(hc.additionalData[:], hc.seq[:]) 301 copy(hc.additionalData[8:], b.data[:3]) 303 hc.additionalData[11] = byte(n >> 8) 304 hc.additionalData[12] = byte(n) 306 payload, err = c.Open(payload[:0], nonce, payload, hc.additionalData[:]) 415 copy(hc.additionalData[:], hc.seq[:]) 416 copy(hc.additionalData[8:], b.data[:3]) 417 hc.additionalData[11] = byte(payloadLen >> 8) 418 hc.additionalData[12] = byte(payloadLen [all...] |
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
gcm.go | 31 Seal(dst, nonce, plaintext, additionalData []byte) []byte 44 Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) 371 // auth calculates GHASH(ciphertext, additionalData), masks the result with 373 func (g *gcm) auth(out, ciphertext, additionalData []byte, tagMask *[gcmTagSize]byte) { 375 g.update(&y, additionalData) 378 y.low ^= uint64(len(additionalData)) * 8
|
gcm_test.go | 428 t.Errorf(" additionalData alignment: %v", a.align) 429 t.Fatalf(" additionalData length: %v", a.length)
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
gcm.go | 31 Seal(dst, nonce, plaintext, additionalData []byte) []byte 44 Open(dst, nonce, ciphertext, additionalData []byte) ([]byte, error) 371 // auth calculates GHASH(ciphertext, additionalData), masks the result with 373 func (g *gcm) auth(out, ciphertext, additionalData []byte, tagMask *[gcmTagSize]byte) { 375 g.update(&y, additionalData) 378 y.low ^= uint64(len(additionalData)) * 8
|
gcm_test.go | 428 t.Errorf(" additionalData alignment: %v", a.align) 429 t.Fatalf(" additionalData length: %v", a.length)
|
/prebuilts/go/darwin-x86/src/crypto/aes/ |
gcm_s390x.go | 191 // auth calculates GHASH(ciphertext, additionalData), masks the result with 193 func (g *gcmAsm) auth(out, ciphertext, additionalData []byte, tagMask *[gcmTagSize]byte) { 195 g.paddedGHASH(&hash, additionalData) 197 lens := gcmLengths(uint64(len(additionalData))*8, uint64(len(ciphertext))*8)
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
gcm_s390x.go | 191 // auth calculates GHASH(ciphertext, additionalData), masks the result with 193 func (g *gcmAsm) auth(out, ciphertext, additionalData []byte, tagMask *[gcmTagSize]byte) { 195 g.paddedGHASH(&hash, additionalData) 197 lens := gcmLengths(uint64(len(additionalData))*8, uint64(len(ciphertext))*8)
|
/frameworks/base/services/core/jni/ |
com_android_server_location_ContextHubService.cpp | 119 const int8_t *additionalData, 715 const int8_t *additionalData, 728 if (!additionalData) { 754 if (additionalData) { 755 memcpy(&msg[1], additionalData, additionalDataLen); [all...] |
/device/linaro/bootloader/edk2/EdkCompatibilityPkg/Foundation/Include/IndustryStandard/ |
Tpm12.h | [all...] |
/device/linaro/bootloader/edk2/MdePkg/Include/IndustryStandard/ |
Tpm12.h | [all...] |