type crypto/internal/fips140/aes/gcm.GCM

25 uses

	crypto/internal/fips140/aes/gcm (current package)
		gcm.go#L15: type GCM struct {
		gcm.go#L22: func New(cipher *aes.Block, nonceSize, tagSize int) (*GCM, error) {
		gcm.go#L24: 	return newGCM(&GCM{}, cipher, nonceSize, tagSize)
		gcm.go#L31: func newGCM(g *GCM, cipher *aes.Block, nonceSize, tagSize int) (*GCM, error) {
		gcm.go#L55: func (g *GCM) NonceSize() int {
		gcm.go#L59: func (g *GCM) Overhead() int {
		gcm.go#L63: func (g *GCM) Seal(dst, nonce, plaintext, data []byte) []byte {
		gcm.go#L68: func (g *GCM) sealAfterIndicator(dst, nonce, plaintext, data []byte) []byte {
		gcm.go#L93: func (g *GCM) Open(dst, nonce, ciphertext, data []byte) ([]byte, error) {
		gcm_asm.go#L59: func initGCM(g *GCM) {
		gcm_asm.go#L66: func seal(out []byte, g *GCM, nonce, plaintext, data []byte) {
		gcm_asm.go#L96: func open(out []byte, g *GCM, nonce, ciphertext, data []byte) error {
		gcm_generic.go#L13: func sealGeneric(out []byte, g *GCM, nonce, plaintext, additionalData []byte) {
		gcm_generic.go#L26: func openGeneric(out []byte, g *GCM, nonce, ciphertext, additionalData []byte) error {
		gcm_nonces.go#L24: func SealWithRandomNonce(g *GCM, nonce, out, plaintext, additionalData []byte) {
		gcm_nonces.go#L52: 	g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
		gcm_nonces.go#L60: 	g         GCM
		gcm_nonces.go#L112: 	g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
		gcm_nonces.go#L120: 	g    GCM
		gcm_nonces.go#L156: 	g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
		gcm_nonces.go#L164: 	g     GCM
		gcm_nonces.go#L210: 	g, err := newGCM(&GCM{}, cipher, gcmStandardNonceSize, gcmTagSize)
		gcm_nonces.go#L218: 	g     GCM

	crypto/cipher
		gcm.go#L106: 	*gcm.GCM