HomeSort by relevance Sort by last modified time
    Searched refs:AES (Results 76 - 100 of 134) sorted by null

1 2 34 5 6

  /prebuilts/go/linux-x86/src/crypto/cipher/
ofb_test.go 5 // OFB AES test vectors.
15 "crypto/aes"
72 c, err := aes.NewCipher(tt.key)
  /external/mesa3d/src/gallium/drivers/swr/rasterizer/common/
isa.hpp 63 bool AES(void) { return CPU_Rep.f_1_ECX_[25]; }
  /prebuilts/go/darwin-x86/src/crypto/rsa/
example_test.go 9 "crypto/aes"
22 // AES-GCM.
64 block, err := aes.NewCipher(key)
66 panic("aes.NewCipher failed: " + err.Error())
80 // fail here because the AES-GCM key will be incorrect.
  /prebuilts/go/linux-x86/src/crypto/rsa/
example_test.go 9 "crypto/aes"
22 // AES-GCM.
64 block, err := aes.NewCipher(key)
66 panic("aes.NewCipher failed: " + err.Error())
80 // fail here because the AES-GCM key will be incorrect.
  /system/security/keystore/include/keystore/
authorization_set.h 283 Authorization(TAG_ALGORITHM, Algorithm::AES);
  /external/boringssl/src/fipstools/
run_cavp.go 40 // directory is the name of the directory in the CAVP input, i.e. ?AES?.
59 {"gcmDecrypt128", []string{"dec", "aes-128-gcm"}, false},
60 {"gcmDecrypt256", []string{"dec", "aes-256-gcm"}, false},
61 {"gcmEncryptExtIV128", []string{"enc", "aes-128-gcm"}, false},
62 {"gcmEncryptExtIV256", []string{"enc", "aes-256-gcm"}, false},
67 "AES",
68 "aes",
71 {"CBCGFSbox128", []string{"kat", "aes-128-cbc"}, false},
72 {"CBCGFSbox192", []string{"kat", "aes-192-cbc"}, false},
73 {"CBCGFSbox256", []string{"kat", "aes-256-cbc"}, false}
    [all...]
  /compatibility/cdd/9_security-model/
9_10_device-integrity.md 53 Device implementations with Advanced Encryption Standard (AES) crypto
  /prebuilts/go/darwin-x86/src/crypto/aes/
const.go 5 // Package aes implements AES encryption (formerly Rijndael), as defined in
8 // The AES operations in this package are not implemented using constant-time algorithms.
9 // An exception is when running on systems with enabled hardware support for AES
10 // that makes these operations constant-time. Examples include amd64 systems using AES-NI
14 package aes package
16 // This file contains AES constants - 8720 bytes of initialized data.
20 // AES is based on the mathematical behavior of binary polynomials
block.go 12 // Optimised ANSI C code for the Rijndael cipher (now AES)
35 // http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf
37 package aes package
  /prebuilts/go/linux-x86/src/crypto/aes/
const.go 5 // Package aes implements AES encryption (formerly Rijndael), as defined in
8 // The AES operations in this package are not implemented using constant-time algorithms.
9 // An exception is when running on systems with enabled hardware support for AES
10 // that makes these operations constant-time. Examples include amd64 systems using AES-NI
14 package aes package
16 // This file contains AES constants - 8720 bytes of initialized data.
20 // AES is based on the mathematical behavior of binary polynomials
block.go 12 // Optimised ANSI C code for the Rijndael cipher (now AES)
35 // http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf
37 package aes package
  /hardware/interfaces/keymaster/3.0/vts/functional/
authorization_set.h 335 Authorization(TAG_ALGORITHM, Algorithm::AES);
keymaster_tags.h 359 case Algorithm::AES:
360 return "Aes";
  /prebuilts/go/darwin-x86/src/runtime/
hash_test.go 21 // The current AES hash function passes Smhasher. Our fallback
23 // we know the AES implementation is available.
  /prebuilts/go/linux-x86/src/runtime/
hash_test.go 21 // The current AES hash function passes Smhasher. Our fallback
23 // we know the AES implementation is available.
  /prebuilts/sdk/tools/lib/
signapk.jar 
  /external/ImageMagick/www/api/
cipher.php 196 <p>SetAESKey() sets the key for the AES cipher. The key length is specified in bits. Valid values are 128, 192, or 256 requiring a key buffer length in bytes of 16, 24, and 32 respectively.</p>
  /external/boringssl/src/crypto/cipher_extra/test/nist_cavp/
make_cavp.go 30 cipher = flag.String("cipher", "", "The name of the cipher/mode (supported: aes, tdes, gcm). Required.")
31 cmdLineLabelStr = flag.String("extra-labels", "", "Comma-separated list of additional label pairs to add (e.g. 'Cipher=AES-128-CBC,Operation=ENCRYPT')")
212 "aes": Test{
  /prebuilts/go/darwin-x86/src/crypto/tls/
handshake_server_test.go 714 name: "RSA-AES",
724 name: "RSA-AES-GCM",
746 name: "ECDHE-ECDSA-AES",
759 name: "X25519-ECDHE-RSA-AES-GCM",
    [all...]
handshake_client_test.go 494 name: "ECDHE-RSA-AES",
504 name: "ECDHE-ECDSA-AES",
516 name: "ECDHE-ECDSA-AES-GCM",
565 name: "X25519-ECDHE-RSA-AES-GCM",
    [all...]
common.go 925 // If AES-GCM hardware is provided then prioritise AES-GCM
936 // Without AES-GCM hardware, we put the ChaCha20-Poly1305
    [all...]
  /prebuilts/go/linux-x86/src/crypto/tls/
handshake_server_test.go 714 name: "RSA-AES",
724 name: "RSA-AES-GCM",
746 name: "ECDHE-ECDSA-AES",
759 name: "X25519-ECDHE-RSA-AES-GCM",
    [all...]
handshake_client_test.go 494 name: "ECDHE-RSA-AES",
504 name: "ECDHE-ECDSA-AES",
516 name: "ECDHE-ECDSA-AES-GCM",
565 name: "X25519-ECDHE-RSA-AES-GCM",
    [all...]
  /system/security/keystore/
keystore_client_impl.cpp 65 // The encryption algorithm is AES-256-CBC with PKCS #7 padding and a random
67 // cipher-text (i.e. Encrypt-then-MAC approach). This was chosen over AES-GCM
85 ALOGE("Encrypt: AES operation failed.");
144 ALOGE("Decrypt: AES operation failed.");
453 if (!algorithm.isOk() || algorithm.value() != Algorithm::AES) {
  /prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.56/
bcprov-jdk15on-1.56.jar 

Completed in 1019 milliseconds

1 2 34 5 6