/prebuilts/go/linux-x86/src/crypto/cipher/ |
ofb_test.go | 5 // OFB AES test vectors. 15 "crypto/aes" 72 c, err := aes.NewCipher(tt.key)
|
/external/mesa3d/src/gallium/drivers/swr/rasterizer/common/ |
isa.hpp | 63 bool AES(void) { return CPU_Rep.f_1_ECX_[25]; }
|
/prebuilts/go/darwin-x86/src/crypto/rsa/ |
example_test.go | 9 "crypto/aes" 22 // AES-GCM. 64 block, err := aes.NewCipher(key) 66 panic("aes.NewCipher failed: " + err.Error()) 80 // fail here because the AES-GCM key will be incorrect.
|
/prebuilts/go/linux-x86/src/crypto/rsa/ |
example_test.go | 9 "crypto/aes" 22 // AES-GCM. 64 block, err := aes.NewCipher(key) 66 panic("aes.NewCipher failed: " + err.Error()) 80 // fail here because the AES-GCM key will be incorrect.
|
/system/security/keystore/include/keystore/ |
authorization_set.h | 283 Authorization(TAG_ALGORITHM, Algorithm::AES);
|
/external/boringssl/src/fipstools/ |
run_cavp.go | 40 // directory is the name of the directory in the CAVP input, i.e. ?AES?. 59 {"gcmDecrypt128", []string{"dec", "aes-128-gcm"}, false}, 60 {"gcmDecrypt256", []string{"dec", "aes-256-gcm"}, false}, 61 {"gcmEncryptExtIV128", []string{"enc", "aes-128-gcm"}, false}, 62 {"gcmEncryptExtIV256", []string{"enc", "aes-256-gcm"}, false}, 67 "AES", 68 "aes", 71 {"CBCGFSbox128", []string{"kat", "aes-128-cbc"}, false}, 72 {"CBCGFSbox192", []string{"kat", "aes-192-cbc"}, false}, 73 {"CBCGFSbox256", []string{"kat", "aes-256-cbc"}, false} [all...] |
/compatibility/cdd/9_security-model/ |
9_10_device-integrity.md | 53 Device implementations with Advanced Encryption Standard (AES) crypto
|
/prebuilts/go/darwin-x86/src/crypto/aes/ |
const.go | 5 // Package aes implements AES encryption (formerly Rijndael), as defined in 8 // The AES operations in this package are not implemented using constant-time algorithms. 9 // An exception is when running on systems with enabled hardware support for AES 10 // that makes these operations constant-time. Examples include amd64 systems using AES-NI 14 package aes package 16 // This file contains AES constants - 8720 bytes of initialized data. 20 // AES is based on the mathematical behavior of binary polynomials
|
block.go | 12 // Optimised ANSI C code for the Rijndael cipher (now AES) 35 // http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf 37 package aes package
|
/prebuilts/go/linux-x86/src/crypto/aes/ |
const.go | 5 // Package aes implements AES encryption (formerly Rijndael), as defined in 8 // The AES operations in this package are not implemented using constant-time algorithms. 9 // An exception is when running on systems with enabled hardware support for AES 10 // that makes these operations constant-time. Examples include amd64 systems using AES-NI 14 package aes package 16 // This file contains AES constants - 8720 bytes of initialized data. 20 // AES is based on the mathematical behavior of binary polynomials
|
block.go | 12 // Optimised ANSI C code for the Rijndael cipher (now AES) 35 // http://csrc.nist.gov/archive/aes/rijndael/Rijndael-ammended.pdf 37 package aes package
|
/hardware/interfaces/keymaster/3.0/vts/functional/ |
authorization_set.h | 335 Authorization(TAG_ALGORITHM, Algorithm::AES);
|
keymaster_tags.h | 359 case Algorithm::AES: 360 return "Aes";
|
/prebuilts/go/darwin-x86/src/runtime/ |
hash_test.go | 21 // The current AES hash function passes Smhasher. Our fallback 23 // we know the AES implementation is available.
|
/prebuilts/go/linux-x86/src/runtime/ |
hash_test.go | 21 // The current AES hash function passes Smhasher. Our fallback 23 // we know the AES implementation is available.
|
/prebuilts/sdk/tools/lib/ |
signapk.jar | |
/external/ImageMagick/www/api/ |
cipher.php | 196 <p>SetAESKey() sets the key for the AES cipher. The key length is specified in bits. Valid values are 128, 192, or 256 requiring a key buffer length in bytes of 16, 24, and 32 respectively.</p>
|
/external/boringssl/src/crypto/cipher_extra/test/nist_cavp/ |
make_cavp.go | 30 cipher = flag.String("cipher", "", "The name of the cipher/mode (supported: aes, tdes, gcm). Required.") 31 cmdLineLabelStr = flag.String("extra-labels", "", "Comma-separated list of additional label pairs to add (e.g. 'Cipher=AES-128-CBC,Operation=ENCRYPT')") 212 "aes": Test{
|
/prebuilts/go/darwin-x86/src/crypto/tls/ |
handshake_server_test.go | 714 name: "RSA-AES", 724 name: "RSA-AES-GCM", 746 name: "ECDHE-ECDSA-AES", 759 name: "X25519-ECDHE-RSA-AES-GCM", [all...] |
handshake_client_test.go | 494 name: "ECDHE-RSA-AES", 504 name: "ECDHE-ECDSA-AES", 516 name: "ECDHE-ECDSA-AES-GCM", 565 name: "X25519-ECDHE-RSA-AES-GCM", [all...] |
common.go | 925 // If AES-GCM hardware is provided then prioritise AES-GCM 936 // Without AES-GCM hardware, we put the ChaCha20-Poly1305 [all...] |
/prebuilts/go/linux-x86/src/crypto/tls/ |
handshake_server_test.go | 714 name: "RSA-AES", 724 name: "RSA-AES-GCM", 746 name: "ECDHE-ECDSA-AES", 759 name: "X25519-ECDHE-RSA-AES-GCM", [all...] |
handshake_client_test.go | 494 name: "ECDHE-RSA-AES", 504 name: "ECDHE-ECDSA-AES", 516 name: "ECDHE-ECDSA-AES-GCM", 565 name: "X25519-ECDHE-RSA-AES-GCM", [all...] |
/system/security/keystore/ |
keystore_client_impl.cpp | 65 // The encryption algorithm is AES-256-CBC with PKCS #7 padding and a random 67 // cipher-text (i.e. Encrypt-then-MAC approach). This was chosen over AES-GCM 85 ALOGE("Encrypt: AES operation failed."); 144 ALOGE("Decrypt: AES operation failed."); 453 if (!algorithm.isOk() || algorithm.value() != Algorithm::AES) {
|
/prebuilts/tools/common/m2/repository/org/bouncycastle/bcprov-jdk15on/1.56/ |
bcprov-jdk15on-1.56.jar | |