type crypto/internal/fips140/aes.Block
51 uses
crypto/internal/fips140/aes (current package)
aes.go#L18: type Block struct {
aes.go#L64: func New(key []byte) (*Block, error) {
aes.go#L66: return newOutlined(&Block{}, key)
aes.go#L73: func newOutlined(b *Block, key []byte) (*Block, error) {
aes.go#L94: func (c *Block) BlockSize() int { return BlockSize }
aes.go#L96: func (c *Block) Encrypt(dst, src []byte) {
aes.go#L111: func (c *Block) Decrypt(dst, src []byte) {
aes.go#L129: func EncryptBlockInternal(c *Block, dst, src []byte) {
aes_asm.go#L59: func newBlock(c *Block, key []byte) *Block {
aes_asm.go#L78: func EncryptionKeySchedule(c *Block) []uint32 {
aes_asm.go#L82: func encryptBlock(c *Block, dst, src []byte) {
aes_asm.go#L90: func decryptBlock(c *Block, dst, src []byte) {
cbc.go#L14: b Block
cbc.go#L20: func NewCBCEncrypter(b *Block, iv [BlockSize]byte) *CBCEncrypter {
cbc.go#L50: func cryptBlocksEncGeneric(b *Block, civ *[BlockSize]byte, dst, src []byte) {
cbc.go#L68: b Block
cbc.go#L74: func NewCBCDecrypter(b *Block, iv [BlockSize]byte) *CBCDecrypter {
cbc.go#L104: func cryptBlocksDecGeneric(b *Block, civ *[BlockSize]byte, dst, src []byte) {
cbc_noasm.go#L9: func cryptBlocksEnc(b *Block, civ *[BlockSize]byte, dst, src []byte) {
cbc_noasm.go#L13: func cryptBlocksDec(b *Block, civ *[BlockSize]byte, dst, src []byte) {
ctr.go#L16: b Block
ctr.go#L21: func NewCTR(b *Block, iv []byte) *CTR {
ctr.go#L28: func newCTR(b *Block, iv []byte) CTR {
ctr.go#L131: func ctrBlocks(b *Block, dst, src []byte, ivlo, ivhi uint64) {
ctr_asm.go#L23: func ctrBlocks1(b *Block, dst, src *[BlockSize]byte, ivlo, ivhi uint64) {
ctr_asm.go#L31: func ctrBlocks2(b *Block, dst, src *[2 * BlockSize]byte, ivlo, ivhi uint64) {
ctr_asm.go#L39: func ctrBlocks4(b *Block, dst, src *[4 * BlockSize]byte, ivlo, ivhi uint64) {
ctr_asm.go#L47: func ctrBlocks8(b *Block, dst, src *[8 * BlockSize]byte, ivlo, ivhi uint64) {
crypto/internal/fips140/aes/gcm
cmac.go#L19: b aes.Block
cmac.go#L24: func NewCMAC(b *aes.Block) *CMAC {
ctrkdf.go#L27: func NewCounterKDF(b *aes.Block) *CounterKDF {
gcm.go#L16: cipher aes.Block
gcm.go#L22: func New(cipher *aes.Block, nonceSize, tagSize int) (*GCM, error) {
gcm.go#L31: func newGCM(g *GCM, cipher *aes.Block, nonceSize, tagSize int) (*GCM, error) {
gcm_generic.go#L69: func gcmCounterCryptGeneric(b *aes.Block, out, src []byte, counter *[gcmBlockSize]byte) {
gcm_nonces.go#L51: func NewGCMWithCounterNonce(cipher *aes.Block) (*GCMWithCounterNonce, error) {
gcm_nonces.go#L111: func NewGCMForTLS12(cipher *aes.Block) (*GCMForTLS12, error) {
gcm_nonces.go#L155: func NewGCMForTLS13(cipher *aes.Block) (*GCMForTLS13, error) {
gcm_nonces.go#L209: func NewGCMForSSH(cipher *aes.Block) (*GCMForSSH, error) {
crypto/cipher
cbc.go#L54: if b, ok := b.(*aes.Block); ok {
cbc.go#L89: if _, ok := x.b.(*aes.Block); ok {
cbc.go#L133: if b, ok := b.(*aes.Block); ok {
cbc.go#L168: if _, ok := x.b.(*aes.Block); ok {
ctr.go#L42: if block, ok := block.(*aes.Block); ok {
ctr.go#L103: if _, ok := x.b.(*aes.Block); ok {
gcm.go#L67: c, ok := cipher.(*aes.Block)
gcm.go#L94: c, ok := cipher.(*aes.Block)
crypto/tls
cipher_suites.go#L526: aead, err = gcm.NewGCMForTLS12(aes.(*fipsaes.Block))
cipher_suites.go#L560: aead, err = gcm.NewGCMForTLS13(aes.(*fipsaes.Block))