type crypto/internal/fips140/aes/gcm.GCM
25 uses
crypto/internal/fips140/aes/gcm (current package)
gcm.go#L15: type GCM struct {
gcm.go#L22: func New(cipher *aes.Block, nonceSize, tagSize int) (*GCM, error) {
gcm.go#L24: return newGCM(&GCM{}, cipher, nonceSize, tagSize)
gcm.go#L31: func newGCM(g *GCM, cipher *aes.Block, nonceSize, tagSize int) (*GCM, error) {
gcm.go#L55: func (g *GCM) NonceSize() int {
gcm.go#L59: func (g *GCM) Overhead() int {
gcm.go#L63: func (g *GCM) Seal(dst, nonce, plaintext, data []byte) []byte {
gcm.go#L68: func (g *GCM) sealAfterIndicator(dst, nonce, plaintext, data []byte) []byte {
gcm.go#L93: func (g *GCM) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) {
gcm_asm.go#L59: func initGCM(g *GCM) {
gcm_asm.go#L66: func seal(out []byte, g *GCM, nonce, plaintext, data []byte) {
gcm_asm.go#L96: func open(out []byte, g *GCM, nonce, ciphertext, data []byte) error {
gcm_generic.go#L13: func sealGeneric(out []byte, g *GCM, nonce, plaintext, additionalData []byte) {
gcm_generic.go#L26: func openGeneric(out []byte, g *GCM, nonce, ciphertext, additionalData []byte) error {
gcm_nonces.go#L24: func SealWithRandomNonce(g *GCM, nonce, out, plaintext, additionalData []byte) {
gcm_nonces.go#L52: g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
gcm_nonces.go#L60: g GCM
gcm_nonces.go#L112: g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
gcm_nonces.go#L120: g GCM
gcm_nonces.go#L156: g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
gcm_nonces.go#L164: g GCM
gcm_nonces.go#L210: g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
gcm_nonces.go#L218: g GCM
crypto/cipher
gcm.go#L106: *gcm.GCM