const crypto/aes.BlockSize
34 uses
crypto/aes (current package)
aes_gcm.go#L102: if uint64(len(plaintext)) > ((1<<32)-2)*BlockSize {
aes_gcm.go#L151: if uint64(len(ciphertext)) > ((1<<32)-2)*uint64(BlockSize)+uint64(g.tagSize) {
cipher.go#L14: const BlockSize = 16
cipher.go#L52: func (c *aesCipher) BlockSize() int { return BlockSize }
cipher.go#L55: if len(src) < BlockSize {
cipher.go#L58: if len(dst) < BlockSize {
cipher.go#L61: if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
cipher.go#L68: if len(src) < BlockSize {
cipher.go#L71: if len(dst) < BlockSize {
cipher.go#L74: if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
cipher_asm.go#L56: func (c *aesCipherAsm) BlockSize() int { return BlockSize }
cipher_asm.go#L59: if len(src) < BlockSize {
cipher_asm.go#L62: if len(dst) < BlockSize {
cipher_asm.go#L65: if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
cipher_asm.go#L72: if len(src) < BlockSize {
cipher_asm.go#L75: if len(dst) < BlockSize {
cipher_asm.go#L78: if subtle.InexactOverlap(dst[:BlockSize], src[:BlockSize]) {
crypto/rand
rand_unix.go#L120: time, seed, dst, key [aes.BlockSize]byte
rand_unix.go#L144: r.budget -= aes.BlockSize
rand_unix.go#L155: for i := 0; i < aes.BlockSize; i++ {
rand_unix.go#L159: for i := 0; i < aes.BlockSize; i++ {
crypto/tls
ticket.go#L124: encrypted := make([]byte, ticketKeyNameLen+aes.BlockSize+len(state)+sha256.Size)
ticket.go#L126: iv := encrypted[ticketKeyNameLen : ticketKeyNameLen+aes.BlockSize]
ticket.go#L138: cipher.NewCTR(block, iv).XORKeyStream(encrypted[ticketKeyNameLen+aes.BlockSize:], state)
ticket.go#L148: if len(encrypted) < ticketKeyNameLen+aes.BlockSize+sha256.Size {
ticket.go#L153: iv := encrypted[ticketKeyNameLen : ticketKeyNameLen+aes.BlockSize]
ticket.go#L155: ciphertext := encrypted[ticketKeyNameLen+aes.BlockSize : len(encrypted)-sha256.Size]
crypto/x509
pem_decrypt.go#L63: blockSize: aes.BlockSize,
pem_decrypt.go#L69: blockSize: aes.BlockSize,
pem_decrypt.go#L75: blockSize: aes.BlockSize,