HomeSort by relevance Sort by last modified time
    Searched refs:AES (Results 51 - 75 of 134) sorted by null

1 23 4 5 6

  /toolchain/binutils/binutils-2.25/gas/testsuite/gas/i386/
aes.d 2 #name: i386 AES
x86-64-aes-intel.d 1 #source: x86-64-aes.s
4 #name: x86-64 AES (Intel mode)
x86-64-aes.d 3 #name: x86-64 AES
  /toolchain/binutils/binutils-2.25/gas/testsuite/gas/i386/ilp32/
x86-64-aes-intel.d 1 #source: ../x86-64-aes.s
4 #name: x86-64 (ILP32) AES (Intel mode)
x86-64-aes.d 1 #source: ../x86-64-aes.s
4 #name: x86-64 (ILP32) AES
  /prebuilts/go/darwin-x86/src/crypto/aes/
aes_gcm.go 7 package aes package
54 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only
64 // the AES key.
cipher_s390x.go 5 package aes package
28 // the given function code. This is equivalent to AES in ECB
63 panic("crypto/aes: input not full block")
66 panic("crypto/aes: output not full block")
73 panic("crypto/aes: input not full block")
76 panic("crypto/aes: output not full block")
aes_test.go 5 package aes package
260 // Appendix C.1. AES-128
266 // Appendix C.2. AES-192
274 // Appendix C.3. AES-256
329 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(1), bytes(1)) })
330 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(1), bytes(1)) })
331 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(100), bytes(1)) })
332 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(100), bytes(1)) })
333 mustPanic(t, "crypto/aes: output not full block", func() { c.Encrypt(bytes(1), bytes(100)) })
334 mustPanic(t, "crypto/aes: output not full block", func() { c.Decrypt(bytes(1), bytes(100)) }
    [all...]
gcm_s390x.go 5 package aes package
69 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only
126 // cryptBlocksGCM encrypts src using AES in counter mode using the given
138 // counterCrypt encrypts src using AES in counter mode and places the result
  /prebuilts/go/darwin-x86/src/crypto/rand/
rand_unix.go 14 "crypto/aes"
93 // The generator uses the X9.31 algorithm with AES-128,
107 time, seed, dst, key [aes.BlockSize]byte
125 r.cipher, err = aes.NewCipher(r.key[0:])
131 r.budget -= aes.BlockSize
133 // ANSI X9.31 (== X9.17) algorithm, but using AES in place of 3DES.
149 for i := 0; i < aes.BlockSize; i++ {
153 for i := 0; i < aes.BlockSize; i++ {
  /prebuilts/go/linux-x86/src/crypto/aes/
aes_gcm.go 7 package aes package
54 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only
64 // the AES key.
cipher_s390x.go 5 package aes package
28 // the given function code. This is equivalent to AES in ECB
63 panic("crypto/aes: input not full block")
66 panic("crypto/aes: output not full block")
73 panic("crypto/aes: input not full block")
76 panic("crypto/aes: output not full block")
aes_test.go 5 package aes package
260 // Appendix C.1. AES-128
266 // Appendix C.2. AES-192
274 // Appendix C.3. AES-256
329 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(1), bytes(1)) })
330 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(1), bytes(1)) })
331 mustPanic(t, "crypto/aes: input not full block", func() { c.Encrypt(bytes(100), bytes(1)) })
332 mustPanic(t, "crypto/aes: input not full block", func() { c.Decrypt(bytes(100), bytes(1)) })
333 mustPanic(t, "crypto/aes: output not full block", func() { c.Encrypt(bytes(1), bytes(100)) })
334 mustPanic(t, "crypto/aes: output not full block", func() { c.Decrypt(bytes(1), bytes(100)) }
    [all...]
gcm_s390x.go 5 package aes package
69 // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only
126 // cryptBlocksGCM encrypts src using AES in counter mode using the given
138 // counterCrypt encrypts src using AES in counter mode and places the result
  /prebuilts/go/linux-x86/src/crypto/rand/
rand_unix.go 14 "crypto/aes"
93 // The generator uses the X9.31 algorithm with AES-128,
107 time, seed, dst, key [aes.BlockSize]byte
125 r.cipher, err = aes.NewCipher(r.key[0:])
131 r.budget -= aes.BlockSize
133 // ANSI X9.31 (== X9.17) algorithm, but using AES in place of 3DES.
149 for i := 0; i < aes.BlockSize; i++ {
153 for i := 0; i < aes.BlockSize; i++ {
  /system/security/keystore/
auth_token_table.cpp 106 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES);
112 auto algorithm = defaultOr(key_info.GetTagValue(TAG_ALGORITHM), Algorithm::AES);
  /prebuilts/go/darwin-x86/src/crypto/x509/
pem_decrypt.go 12 "crypto/aes"
60 name: "AES-128-CBC",
61 cipherFunc: aes.NewCipher,
63 blockSize: aes.BlockSize,
66 name: "AES-192-CBC",
67 cipherFunc: aes.NewCipher,
69 blockSize: aes.BlockSize,
72 name: "AES-256-CBC",
73 cipherFunc: aes.NewCipher,
75 blockSize: aes.BlockSize
    [all...]
  /prebuilts/go/linux-x86/src/crypto/x509/
pem_decrypt.go 12 "crypto/aes"
60 name: "AES-128-CBC",
61 cipherFunc: aes.NewCipher,
63 blockSize: aes.BlockSize,
66 name: "AES-192-CBC",
67 cipherFunc: aes.NewCipher,
69 blockSize: aes.BlockSize,
72 name: "AES-256-CBC",
73 cipherFunc: aes.NewCipher,
75 blockSize: aes.BlockSize
    [all...]
  /external/boringssl/
rules.mk 63 MODULE_STATIC_ARMCAP += $(call toarmcap,AES,$(USE_ARM_V8_AES))
  /hardware/interfaces/keymaster/3.0/
types.hal 163 AES = 32,
257 ENCRYPT = 0, /** Usable with RSA, EC and AES keys. */
258 DECRYPT = 1, /** Usable with RSA, EC and AES keys. */
  /prebuilts/go/darwin-x86/src/crypto/cipher/
cbc_aes_test.go 5 // CBC AES test vectors.
15 "crypto/aes"
68 c, err := aes.NewCipher(test.key)
88 c, err := aes.NewCipher(test.key)
ctr_aes_test.go 5 // CTR AES test vectors.
15 "crypto/aes"
72 c, err := aes.NewCipher(tt.key)
ofb_test.go 5 // OFB AES test vectors.
15 "crypto/aes"
72 c, err := aes.NewCipher(tt.key)
  /prebuilts/go/linux-x86/src/crypto/cipher/
cbc_aes_test.go 5 // CBC AES test vectors.
15 "crypto/aes"
68 c, err := aes.NewCipher(test.key)
88 c, err := aes.NewCipher(test.key)
ctr_aes_test.go 5 // CTR AES test vectors.
15 "crypto/aes"
72 c, err := aes.NewCipher(tt.key)

Completed in 1872 milliseconds

1 23 4 5 6