/toolchain/binutils/binutils-2.25/gas/testsuite/gas/i386/ |
aes.d | 2 #name: i386 AES
|
x86-64-aes-intel.d | 1 #source: x86-64-aes.s 4 #name: x86-64 AES (Intel mode)
|
x86-64-aes.d | 3 #name: x86-64 AES
|
/toolchain/binutils/binutils-2.25/gas/testsuite/gas/i386/ilp32/ |
x86-64-aes-intel.d | 1 #source: ../x86-64-aes.s 4 #name: x86-64 (ILP32) AES (Intel mode)
|
x86-64-aes.d | 1 #source: ../x86-64-aes.s 4 #name: x86-64 (ILP32) AES
|
/prebuilts/go/darwin-x86/src/crypto/aes/ |
aes_gcm.go | 7 package aes package 54 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only 64 // the AES key.
|
cipher_s390x.go | 5 package aes package 28 // the given function code. This is equivalent to AES in ECB 63 panic("crypto/aes: input not full block") 66 panic("crypto/aes: output not full block") 73 panic("crypto/aes: input not full block") 76 panic("crypto/aes: output not full block")
|
aes_test.go | 5 package aes package 260 // Appendix C.1. AES-128 266 // Appendix C.2. AES-192 274 // Appendix C.3. AES-256 329 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(1), bytes(1)) }) 330 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(1), bytes(1)) }) 331 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(100), bytes(1)) }) 332 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(100), bytes(1)) }) 333 mustPanic(t, "crypto/aes: output not full block", func() { c.Encrypt(bytes(1), bytes(100)) }) 334 mustPanic(t, "crypto/aes: output not full block", func() { c.Decrypt(bytes(1), bytes(100)) } [all...] |
gcm_s390x.go | 5 package aes package 69 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only 126 // cryptBlocksGCM encrypts src using AES in counter mode using the given 138 // counterCrypt encrypts src using AES in counter mode and places the result
|
/prebuilts/go/darwin-x86/src/crypto/rand/ |
rand_unix.go | 14 "crypto/aes" 93 // The generator uses the X9.31 algorithm with AES-128, 107 time, seed, dst, key [aes.BlockSize]byte 125 r.cipher, err = aes.NewCipher(r.key[0:]) 131 r.budget -= aes.BlockSize 133 // ANSI X9.31 (== X9.17) algorithm, but using AES in place of 3DES. 149 for i := 0; i < aes.BlockSize; i++ { 153 for i := 0; i < aes.BlockSize; i++ {
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
aes_gcm.go | 7 package aes package 54 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only 64 // the AES key.
|
cipher_s390x.go | 5 package aes package 28 // the given function code. This is equivalent to AES in ECB 63 panic("crypto/aes: input not full block") 66 panic("crypto/aes: output not full block") 73 panic("crypto/aes: input not full block") 76 panic("crypto/aes: output not full block")
|
aes_test.go | 5 package aes package 260 // Appendix C.1. AES-128 266 // Appendix C.2. AES-192 274 // Appendix C.3. AES-256 329 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(1), bytes(1)) }) 330 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(1), bytes(1)) }) 331 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(100), bytes(1)) }) 332 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(100), bytes(1)) }) 333 mustPanic(t, "crypto/aes: output not full block", func() { c.Encrypt(bytes(1), bytes(100)) }) 334 mustPanic(t, "crypto/aes: output not full block", func() { c.Decrypt(bytes(1), bytes(100)) } [all...] |
gcm_s390x.go | 5 package aes package 69 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only 126 // cryptBlocksGCM encrypts src using AES in counter mode using the given 138 // counterCrypt encrypts src using AES in counter mode and places the result
|
/prebuilts/go/linux-x86/src/crypto/rand/ |
rand_unix.go | 14 "crypto/aes" 93 // The generator uses the X9.31 algorithm with AES-128, 107 time, seed, dst, key [aes.BlockSize]byte 125 r.cipher, err = aes.NewCipher(r.key[0:]) 131 r.budget -= aes.BlockSize 133 // ANSI X9.31 (== X9.17) algorithm, but using AES in place of 3DES. 149 for i := 0; i < aes.BlockSize; i++ { 153 for i := 0; i < aes.BlockSize; i++ {
|
/system/security/keystore/ |
auth_token_table.cpp | 106 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES); 112 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES);
|
/prebuilts/go/darwin-x86/src/crypto/x509/ |
pem_decrypt.go | 12 "crypto/aes" 60 name: "AES-128-CBC", 61 cipherFunc: aes.NewCipher, 63 blockSize: aes.BlockSize, 66 name: "AES-192-CBC", 67 cipherFunc: aes.NewCipher, 69 blockSize: aes.BlockSize, 72 name: "AES-256-CBC", 73 cipherFunc: aes.NewCipher, 75 blockSize: aes.BlockSize [all...] |
/prebuilts/go/linux-x86/src/crypto/x509/ |
pem_decrypt.go | 12 "crypto/aes" 60 name: "AES-128-CBC", 61 cipherFunc: aes.NewCipher, 63 blockSize: aes.BlockSize, 66 name: "AES-192-CBC", 67 cipherFunc: aes.NewCipher, 69 blockSize: aes.BlockSize, 72 name: "AES-256-CBC", 73 cipherFunc: aes.NewCipher, 75 blockSize: aes.BlockSize [all...] |
/external/boringssl/ |
rules.mk | 63 MODULE_STATIC_ARMCAP += $(call toarmcap,AES,$(USE_ARM_V8_AES))
|
/hardware/interfaces/keymaster/3.0/ |
types.hal | 163 AES = 32, 257 ENCRYPT = 0, /** Usable with RSA, EC and AES keys. */ 258 DECRYPT = 1, /** Usable with RSA, EC and AES keys. */
|
/prebuilts/go/darwin-x86/src/crypto/cipher/ |
cbc_aes_test.go | 5 // CBC AES test vectors. 15 "crypto/aes" 68 c, err := aes.NewCipher(test.key) 88 c, err := aes.NewCipher(test.key)
|
ctr_aes_test.go | 5 // CTR AES test vectors. 15 "crypto/aes" 72 c, err := aes.NewCipher(tt.key)
|
ofb_test.go | 5 // OFB AES test vectors. 15 "crypto/aes" 72 c, err := aes.NewCipher(tt.key)
|
/prebuilts/go/linux-x86/src/crypto/cipher/ |
cbc_aes_test.go | 5 // CBC AES test vectors. 15 "crypto/aes" 68 c, err := aes.NewCipher(test.key) 88 c, err := aes.NewCipher(test.key)
|
ctr_aes_test.go | 5 // CTR AES test vectors. 15 "crypto/aes" 72 c, err := aes.NewCipher(tt.key)
|