SYMBOL INDEX (11720 symbols across 1610 files) FILE: cc/aead.h function namespace (line 25) | namespace crypto { FILE: cc/aead/aead_config.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { FILE: cc/aead/aead_config.h function namespace (line 24) | namespace crypto { FILE: cc/aead/aead_config_test.cc type crypto (line 65) | namespace crypto { type tink (line 66) | namespace tink { class AeadConfigTest (line 80) | class AeadConfigTest : public Test { method SetUp (line 82) | void SetUp() override { function TEST_F (line 88) | TEST_F(AeadConfigTest, RegisterWorks) { function TEST_F (line 103) | TEST_F(AeadConfigTest, WrappersRegistered) { function TEST_F (line 122) | TEST_F(AeadConfigTest, RegisterNonFipsTemplates) { function TEST_F (line 143) | TEST_F(AeadConfigTest, RegisterFipsValidTemplates) { function TEST_F (line 164) | TEST_F(AeadConfigTest, RegisterFailsIfBoringCryptoNotAvailable) { function TEST_F (line 176) | TEST_F(AeadConfigTest, AesGcmProtoParamsSerializationRegistered) { function TEST_F (line 220) | TEST_F(AeadConfigTest, AesGcmProtoKeySerializationRegistered) { function TEST_F (line 278) | TEST_F(AeadConfigTest, AesGcmSivProtoParamsSerializationRegistered) { function TEST_F (line 317) | TEST_F(AeadConfigTest, AesGcmSivProtoKeySerializationRegistered) { function TEST_F (line 370) | TEST_F(AeadConfigTest, AesEaxProtoParamsSerializationRegistered) { function TEST_F (line 414) | TEST_F(AeadConfigTest, AesEaxProtoKeySerializationRegistered) { function TEST_F (line 473) | TEST_F(AeadConfigTest, XChaCha20Poly1305ProtoParamsSerializationRegi... function TEST_F (line 514) | TEST_F(AeadConfigTest, XChaCha20Poly1305ProtoKeySerializationRegiste... function TEST_F (line 560) | TEST_F(AeadConfigTest, AesCtrHmacAeadProtoParamsSerializationRegiste... function TEST_F (line 607) | TEST_F(AeadConfigTest, AesCtrHmacAeadProtoKeySerializationRegistered) { FILE: cc/aead/aead_factory.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { FILE: cc/aead/aead_factory.h function namespace (line 28) | namespace crypto { FILE: cc/aead/aead_factory_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { class AeadFactoryTest (line 54) | class AeadFactoryTest : public ::testing::Test { function TEST_F (line 57) | TEST_F(AeadFactoryTest, testBasic) { function TEST_F (line 67) | TEST_F(AeadFactoryTest, testPrimitive) { FILE: cc/aead/aead_key.h function namespace (line 24) | namespace crypto { FILE: cc/aead/aead_key_templates.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function KeyTemplate (line 46) | KeyTemplate* NewAesEaxKeyTemplate(int key_size_in_bytes, int iv_size... function KeyTemplate (line 58) | KeyTemplate* NewAesGcmKeyTemplate(int key_size_in_bytes, function KeyTemplate (line 70) | KeyTemplate* NewAesGcmSivKeyTemplate(int key_size_in_bytes) { function KeyTemplate (line 81) | KeyTemplate* NewAesCtrHmacAeadKeyTemplate(int aes_key_size_in_bytes, function KeyTemplate (line 102) | KeyTemplate* NewXChaCha20Poly1305KeyTemplate() { function KeyTemplate (line 113) | const KeyTemplate& AeadKeyTemplates::Aes128Eax() { function KeyTemplate (line 121) | const KeyTemplate& AeadKeyTemplates::Aes256Eax() { function KeyTemplate (line 129) | const KeyTemplate& AeadKeyTemplates::Aes128Gcm() { function KeyTemplate (line 136) | const KeyTemplate& AeadKeyTemplates::Aes128GcmNoPrefix() { function KeyTemplate (line 143) | const KeyTemplate& AeadKeyTemplates::Aes256Gcm() { function KeyTemplate (line 150) | const KeyTemplate& AeadKeyTemplates::Aes256GcmNoPrefix() { function KeyTemplate (line 157) | const KeyTemplate& AeadKeyTemplates::Aes128GcmSiv() { function KeyTemplate (line 164) | const KeyTemplate& AeadKeyTemplates::Aes256GcmSiv() { function KeyTemplate (line 171) | const KeyTemplate& AeadKeyTemplates::Aes128CtrHmacSha256() { function KeyTemplate (line 181) | const KeyTemplate& AeadKeyTemplates::Aes256CtrHmacSha256() { function KeyTemplate (line 191) | const KeyTemplate& AeadKeyTemplates::XChaCha20Poly1305() { function KeyTemplate (line 197) | KeyTemplate AeadKeyTemplates::KmsEnvelopeAead(absl::string_view kek_... FILE: cc/aead/aead_key_templates.h function namespace (line 24) | namespace crypto { FILE: cc/aead/aead_key_templates_test.cc type crypto (line 63) | namespace crypto { type tink (line 64) | namespace tink { function TEST (line 71) | TEST(AeadKeyTemplatesTest, testAesEaxKeyTemplates) { function TEST (line 121) | TEST(Aes128GcmNoPrefix, Basics) { function TEST (line 128) | TEST(Aes128GcmNoPrefix, OutputPrefixType) { function TEST (line 133) | TEST(Aes128GcmNoPrefix, MultipleCallsSameReference) { function TEST (line 138) | TEST(Aes128GcmNoPrefix, WorksWithKeyTypeManager) { function TEST (line 145) | TEST(Aes128GcmNoPrefix, CheckValues) { function TEST (line 152) | TEST(Aes256GcmNoPrefix, Basics) { function TEST (line 159) | TEST(Aes256GcmNoPrefix, OutputPrefixType) { function TEST (line 164) | TEST(Aes256GcmNoPrefix, MultipleCallsSameReference) { function TEST (line 169) | TEST(Aes256GcmNoPrefix, WorksWithKeyTypeManager) { function TEST (line 176) | TEST(Aes256GcmNoPrefix, CheckValues) { function TEST (line 183) | TEST(Aes256Gcm, Basics) { function TEST (line 190) | TEST(Aes256Gcm, OutputPrefixType) { function TEST (line 195) | TEST(Aes256Gcm, MultipleCallsSameReference) { function TEST (line 200) | TEST(Aes256Gcm, WorksWithKeyTypeManager) { function TEST (line 207) | TEST(Aes256Gcm, CheckValues) { function TEST (line 214) | TEST(Aes128Gcm, Basics) { function TEST (line 221) | TEST(Aes128Gcm, OutputPrefixType) { function TEST (line 226) | TEST(Aes128Gcm, MultipleCallsSameReference) { function TEST (line 231) | TEST(Aes128Gcm, WorksWithKeyTypeManager) { function TEST (line 238) | TEST(Aes128Gcm, CheckValues) { function TEST (line 245) | TEST(AeadKeyTemplatesTest, testAesGcmSivKeyTemplates) { function TEST (line 293) | TEST(AeadKeyTemplatesTest, testAesCtrHmacAeadKeyTemplates) { function TEST (line 350) | TEST(AeadKeyTemplatesTest, testXChaCha20Poly1305KeyTemplates) { function TEST (line 372) | TEST(AeadKeyTemplatesTest, testKmsEnvelopeAead) { function TEST (line 399) | TEST(AeadKeyTemplatesTest, testKmsEnvelopeAeadMultipleKeysSameKek) { FILE: cc/aead/aead_parameters.h function namespace (line 22) | namespace crypto { FILE: cc/aead/aead_wrapper.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { function Validate (line 45) | util::Status Validate(PrimitiveSet* aead_set) { class AeadSetWrapper (line 58) | class AeadSetWrapper : public Aead { method AeadSetWrapper (line 60) | explicit AeadSetWrapper( FILE: cc/aead/aead_wrapper.h function namespace (line 27) | namespace crypto { FILE: cc/aead/aead_wrapper_test.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { function PopulateKeyInfo (line 67) | void PopulateKeyInfo(KeysetInfo::KeyInfo* key_info, uint32_t key_id, function KeysetInfo (line 75) | KeysetInfo CreateTestKeysetInfo() { function TEST (line 89) | TEST(AeadSetWrapperTest, WrapNullptr) { function TEST (line 98) | TEST(AeadSetWrapperTest, WrapEmpty) { function TEST (line 108) | TEST(AeadSetWrapperTest, Basic) { function TEST (line 154) | TEST(AeadSetWrapperTest, DecryptNonPrimary) { class AeadSetWrapperTestWithMonitoring (line 201) | class AeadSetWrapperTestWithMonitoring : public Test { method SetUp (line 205) | void SetUp() override { method TearDown (line 235) | void TearDown() override { Registry::Reset(); } function TEST_F (line 242) | TEST_F(AeadSetWrapperTestWithMonitoring, function TEST_F (line 289) | TEST_F(AeadSetWrapperTestWithMonitoring, FILE: cc/aead/aes_ctr_hmac_aead_key.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function ComputeOutputPrefix (line 38) | util::StatusOr ComputeOutputPrefix( FILE: cc/aead/aes_ctr_hmac_aead_key.h function namespace (line 32) | namespace crypto { FILE: cc/aead/aes_ctr_hmac_aead_key_manager.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { function Status (line 109) | Status AesCtrHmacAeadKeyManager::ValidateKey( function Status (line 132) | Status AesCtrHmacAeadKeyManager::ValidateKeyFormat( FILE: cc/aead/aes_ctr_hmac_aead_key_manager.h function namespace (line 37) | namespace crypto { FILE: cc/aead/aes_ctr_hmac_aead_key_manager_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { function TEST (line 64) | TEST(AesCtrHmacAeadKeyManagerTest, Basics) { function TEST (line 72) | TEST(AesCtrHmacAeadKeyManagerTest, ValidateEmptyKey) { function AesCtrHmacAeadKey (line 77) | AesCtrHmacAeadKey CreateValidKey() { function TEST (line 90) | TEST(AesCtrHmacAeadKeyManagerTest, ValidKey) { function TEST (line 94) | TEST(AesCtrHmacAeadKeyManagerTest, AesKeySizes) { function TEST (line 108) | TEST(AesCtrHmacAeadKeyManagerTest, HmacKeySizes) { function AesCtrHmacAeadKeyFormat (line 122) | AesCtrHmacAeadKeyFormat CreateValidKeyFormat() { function TEST (line 134) | TEST(AesCtrHmacAeadKeyManagerTest, ValidateKeyFormat) { function TEST (line 141) | TEST(AesCtrHmacAeadKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 147) | TEST(AesCtrHmacAeadKeyManagerTest, ValidateKeyFormatKeySizes) { function TEST (line 173) | TEST(AesCtrHmacAeadKeyManagerTest, ValidateKeyFormatHmacKeySizes) { function TEST (line 199) | TEST(AesCtrHmacAeadKeyManagerTest, CreateKey) { function TEST (line 219) | TEST(AesCtrHmacAeadKeyManagerTest, CreateAead) { function TEST (line 247) | TEST(AesCtrHmacAeadKeyManagerTest, Derive16ByteKey) { function TEST (line 275) | TEST(AesCtrHmacAeadKeyManagerTest, Derive32ByteKey) { function TEST (line 297) | TEST(AesCtrHmacAeadKeyManagerTest, DeriveKeyNotEnoughRandomnessForAe... function TEST (line 315) | TEST(AesCtrHmacAeadKeyManagerTest, DeriveKeyNotEnoughRandomnessForHm... FILE: cc/aead/aes_ctr_hmac_aead_key_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type TestCase (line 42) | struct TestCase { function TEST_P (line 75) | TEST_P(AesCtrHmacAeadKeyTest, BuildKeySucceeds) { function TEST (line 108) | TEST(AesCtrHmacAeadKeyTest, BuildKeyWithMismatchedAesKeySizeFails) { function TEST (line 136) | TEST(AesCtrHmacAeadKeyTest, BuildKeyWithoutSettingAParametersFails) { function TEST (line 151) | TEST(AesCtrHmacAeadKeyTest, BuildKeyWithoutSettingAesKeySizeFails) { function TEST (line 175) | TEST(AesCtrHmacAeadKeyTest, BuildKeyWithoutSettingHmacKeySizeFails) { function TEST (line 200) | TEST(AesCtrHmacAeadKeyTest, BuildKeyWithMismatchedHmacKeySizeFails) { function TEST (line 228) | TEST(AesCtrHmacAeadKeyTest, BuildNoPrefixKeyWithIdRequirementFails) { function TEST (line 256) | TEST(AesCtrHmacAeadKeyTest, BuildTinkKeyWithoutIdRequirementFails) { function TEST_P (line 282) | TEST_P(AesCtrHmacAeadKeyTest, KeyEquals) { function TEST (line 323) | TEST(AesCtrHmacAeadKeyTest, DifferentParametersKeysNotEqual) { function TEST (line 373) | TEST(AesCtrHmacAeadKeyTest, DifferentAesKeyMaterialNotEqual) { function TEST (line 412) | TEST(AesCtrHmacAeadKeyTest, DifferentHmacKeyMaterialNotEqual) { function TEST (line 451) | TEST(AesCtrHmacAeadKeyTest, DifferentIdRequirementKeysNotEqual) { FILE: cc/aead/aes_ctr_hmac_aead_parameters.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { FILE: cc/aead/aes_ctr_hmac_aead_parameters.h function namespace (line 28) | namespace tink { FILE: cc/aead/aes_ctr_hmac_aead_parameters_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type BuildTestCase (line 36) | struct BuildTestCase { function TEST_P (line 66) | TEST_P(AesCtrHmacAeadParametersTest, BuildParametersSucceeds) { function TEST (line 89) | TEST(AesCtrHmacAeadParametersTest, BuildWithoutSettingAesKeySizeFail... function TEST (line 102) | TEST(AesCtrHmacAeadParametersTest, BuildWithInvalidAesKeySizeFails) { function TEST (line 117) | TEST(AesCtrHmacAeadParametersTest, BuildWithoutSettingAHmacKeySizeFa... function TEST (line 130) | TEST(AesCtrHmacAeadParametersTest, BuildWithInvalidHmacKeySizeFails) { function TEST (line 145) | TEST(AesCtrHmacAeadParametersTest, BuildWithoutSettingIvSizeFails) { function TEST (line 158) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooSmallIvSizeFails) { function TEST (line 172) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooBigIvSizeFails) { function TEST (line 186) | TEST(AesCtrHmacAeadParametersTest, BuildWithoutSettingTagSizeFails) { function TEST (line 199) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooSmallTagSizeFails) { function TEST (line 213) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooBigTagSizeSHA1Fails) { function TEST (line 228) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooBigTagSizeSHA224Fails) { function TEST (line 243) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooBigTagSizeSHA256Fails) { function TEST (line 258) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooBigTagSizeSHA384Fails) { function TEST (line 273) | TEST(AesCtrHmacAeadParametersTest, BuildWithTooBigTagSizeSHA512Fails) { function TEST (line 286) | TEST(AesCtrHmacAeadParametersTest, BuildWithoutSettingHashTypeFails) { function TEST (line 299) | TEST(AesCtrHmacAeadParametersTest, BuildWithInvalidHashTypeFails) { function TEST (line 315) | TEST(AesCtrHmacAeadParametersTest, BuildWithoutSettingVariantFails) { function TEST (line 328) | TEST(AesCtrHmacAeadParametersTest, BuildWithInvalidVariantFails) { function TEST_P (line 344) | TEST_P(AesCtrHmacAeadParametersTest, CopyConstructor) { function TEST_P (line 368) | TEST_P(AesCtrHmacAeadParametersTest, CopyAssignment) { function TEST_P (line 392) | TEST_P(AesCtrHmacAeadParametersTest, SameParametersEquals) { function TEST (line 422) | TEST(AesCtrHmacAeadParametersTest, DifferentAesKeySizeNotEqual) { function TEST (line 449) | TEST(AesCtrHmacAeadParametersTest, DifferentHmacKeySizeNotEqual) { function TEST (line 476) | TEST(AesCtrHmacAeadParametersTest, DifferentIvSizeNotEqual) { function TEST (line 503) | TEST(AesCtrHmacAeadParametersTest, DifferentTagSizeNotEqual) { function TEST (line 530) | TEST(AesCtrHmacAeadParametersTest, DifferentHashTypeNotEqual) { function TEST (line 557) | TEST(AesCtrHmacAeadParametersTest, DifferentVariantNotEqual) { FILE: cc/aead/aes_ctr_hmac_aead_proto_serialization.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { function ToVariant (line 77) | util::StatusOr ToVariant( function ToOutputPrefixType (line 95) | util::StatusOr ToOutputPrefixType( function ToHashType (line 110) | util::StatusOr ToHashType( function ToProtoHashType (line 130) | util::StatusOr ToProtoHashType( function GetHmacProtoParams (line 149) | util::StatusOr GetHmacProtoParams( function ParseParameters (line 162) | util::StatusOr ParseParameters( function SerializeParameters (line 207) | util::StatusOr SerializePara... function ParseKey (line 238) | util::StatusOr ParseKey( function SerializeKey (line 301) | util::StatusOr SerializeKey( function AesCtrHmacAeadProtoParametersParserImpl (line 358) | AesCtrHmacAeadProtoParametersParserImpl& AesCtrHmacAeadProtoParamete... function AesCtrHmacAeadProtoParametersSerializerImpl (line 364) | AesCtrHmacAeadProtoParametersSerializerImpl& function AesCtrHmacAeadProtoKeyParserImpl (line 371) | AesCtrHmacAeadProtoKeyParserImpl& AesCtrHmacAeadProtoKeyParser() { function AesCtrHmacAeadProtoKeySerializerImpl (line 377) | AesCtrHmacAeadProtoKeySerializerImpl& AesCtrHmacAeadProtoKeySerializ... function RegisterAesCtrHmacAeadProtoSerialization (line 385) | util::Status RegisterAesCtrHmacAeadProtoSerialization() { FILE: cc/aead/aes_ctr_hmac_aead_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/aead/aes_ctr_hmac_aead_proto_serialization_test.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type TestCase (line 74) | struct TestCase { class AesCtrHmacAeadProtoSerializationTest (line 87) | class AesCtrHmacAeadProtoSerializationTest : public TestWithParam ComputeOutputPrefix( FILE: cc/aead/aes_eax_key.h function namespace (line 32) | namespace crypto { FILE: cc/aead/aes_eax_key_manager.h function namespace (line 40) | namespace crypto { FILE: cc/aead/aes_eax_key_manager_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function TEST (line 50) | TEST(AesEaxKeyManagerTest, Basics) { function TEST (line 58) | TEST(AesEaxKeyManagerTest, ValidateEmptyKey) { function TEST (line 62) | TEST(AesEaxKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 67) | TEST(AesEaxKeyManagerTest, ValidKeyFormat) { function TEST (line 74) | TEST(AesEaxKeyManagerTest, ValidKeyFormatKeySize) { function TEST (line 90) | TEST(AesEaxKeyManagerTest, ValidKeyFormatIvSize) { function TEST (line 106) | TEST(AesEaxKeyManagerTest, CreateKey) { function TEST (line 116) | TEST(AesEaxKeyManagerTest, CreateKeyIsValid) { function TEST (line 125) | TEST(AesEaxKeyManagerTest, MultipleCreateCallsCreateDifferentKeys) { function TEST (line 137) | TEST(AesEaxKeyManagerTest, ValidKey) { function TEST (line 144) | TEST(AesEaxKeyManagerTest, ValidateKeyKeyLength) { function TEST (line 160) | TEST(AesEaxKeyManagerTest, ValidateKeyIvLength) { function TEST (line 176) | TEST(AesGcmKeyManagerTest, CreateAead) { FILE: cc/aead/aes_eax_key_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type TestCase (line 41) | struct TestCase { function TEST_P (line 65) | TEST_P(AesEaxKeyTest, CreateSucceeds) { function TEST (line 88) | TEST(AesEaxKeyTest, CreateKeyWithMismatchedKeySizeFails) { function TEST (line 108) | TEST(AesEaxKeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 144) | TEST_P(AesEaxKeyTest, KeyEquals) { function TEST (line 171) | TEST(AesEaxKeyTest, DifferentParametersKeysNotEqual) { function TEST (line 208) | TEST(AesEaxKeyTest, DifferentSecretDataKeysNotEqual) { function TEST (line 237) | TEST(AesEaxKeyTest, DifferentIdRequirementKeysNotEqual) { FILE: cc/aead/aes_eax_parameters.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { FILE: cc/aead/aes_eax_parameters.h function namespace (line 25) | namespace crypto { FILE: cc/aead/aes_eax_parameters_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type BuildTestCase (line 35) | struct BuildTestCase { function TEST_P (line 59) | TEST_P(AesEaxParametersTest, BuildParametersSucceeds) { function TEST (line 78) | TEST(AesEaxParametersTest, BuildWithoutSettingVariantFails) { function TEST (line 88) | TEST(AesEaxParametersTest, BuildWithInvalidVariantFails) { function TEST (line 101) | TEST(AesEaxParametersTest, BuildWithoutSettingKeySizeFails) { function TEST (line 111) | TEST(AesEaxParametersTest, BuildWithInvalidKeySizeFails) { function TEST (line 167) | TEST(AesEaxParametersTest, BuildWithoutSettingIvSizeFails) { function TEST (line 177) | TEST(AesEaxParametersTest, BuildWithInvalidIvSizeFails) { function TEST (line 233) | TEST(AesEaxParametersTest, BuildWithoutSettingTagSizeFails) { function TEST (line 243) | TEST(AesEaxParametersTest, BuildWithInvalidTagSizeFails) { function TEST_P (line 265) | TEST_P(AesEaxParametersTest, CopyConstructor) { function TEST_P (line 285) | TEST_P(AesEaxParametersTest, CopyAssignment) { function TEST_P (line 305) | TEST_P(AesEaxParametersTest, SameParametersEquals) { function TEST (line 332) | TEST(AesEaxParametersTest, DifferentKeySizeNotEqual) { function TEST (line 355) | TEST(AesEaxParametersTest, DifferentIvSizeNotEqual) { function TEST (line 378) | TEST(AesEaxParametersTest, DifferentTagSizeNotEqual) { function TEST (line 401) | TEST(AesEaxParametersTest, DifferentVariantNotEqual) { FILE: cc/aead/aes_eax_proto_serialization.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { function ToVariant (line 70) | util::StatusOr ToVariant( function ToOutputPrefixType (line 87) | util::StatusOr ToOutputPrefixType( function GetProtoParams (line 102) | util::StatusOr GetProtoParams( function ParseParameters (line 117) | util::StatusOr ParseParameters( function SerializeParameters (line 146) | util::StatusOr SerializePara... function ParseKey (line 163) | util::StatusOr ParseKey( function SerializeKey (line 204) | util::StatusOr SerializeKey( function AesEaxProtoParametersParserImpl (line 235) | AesEaxProtoParametersParserImpl* AesEaxProtoParametersParser() { function AesEaxProtoParametersSerializerImpl (line 241) | AesEaxProtoParametersSerializerImpl* AesEaxProtoParametersSerializer... function AesEaxProtoKeyParserImpl (line 247) | AesEaxProtoKeyParserImpl* AesEaxProtoKeyParser() { function AesEaxProtoKeySerializerImpl (line 252) | AesEaxProtoKeySerializerImpl* AesEaxProtoKeySerializer() { function RegisterAesEaxProtoSerialization (line 259) | util::Status RegisterAesEaxProtoSerialization() { FILE: cc/aead/aes_eax_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/aead/aes_eax_proto_serialization_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type TestCase (line 63) | struct TestCase { class AesEaxProtoSerializationTest (line 72) | class AesEaxProtoSerializationTest : public TestWithParam { method AesEaxProtoSerializationTest (line 74) | AesEaxProtoSerializationTest() { function TEST_F (line 79) | TEST_F(AesEaxProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 98) | TEST_P(AesEaxProtoSerializationTest, ParseParameters) { function TEST_F (line 130) | TEST_F(AesEaxProtoSerializationTest, function TEST_F (line 149) | TEST_F(AesEaxProtoSerializationTest, function TEST_P (line 169) | TEST_P(AesEaxProtoSerializationTest, SerializeParameters) { function TEST_F (line 208) | TEST_F(AesEaxProtoSerializationTest, function TEST_P (line 230) | TEST_P(AesEaxProtoSerializationTest, ParseKey) { function TEST_F (line 275) | TEST_F(AesEaxProtoSerializationTest, ParseLegacyKeyAsCrunchy) { function TEST_F (line 303) | TEST_F(AesEaxProtoSerializationTest, ParseKeyWithInvalidSerializatio... function TEST_F (line 323) | TEST_F(AesEaxProtoSerializationTest, ParseKeyNoSecretKeyAccessFails) { function TEST_F (line 347) | TEST_F(AesEaxProtoSerializationTest, ParseKeyWithInvalidVersionFails) { function TEST_P (line 371) | TEST_P(AesEaxProtoSerializationTest, SerializeKey) { function TEST_F (line 419) | TEST_F(AesEaxProtoSerializationTest, SerializeKeyWithDisallowedTagSi... function TEST_F (line 447) | TEST_F(AesEaxProtoSerializationTest, SerializeKeyNoSecretKeyAccessFa... FILE: cc/aead/aes_gcm_key.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function ComputeOutputPrefix (line 38) | util::StatusOr ComputeOutputPrefix( FILE: cc/aead/aes_gcm_key.h function namespace (line 32) | namespace crypto { FILE: cc/aead/aes_gcm_key_manager.h function namespace (line 47) | namespace crypto { FILE: cc/aead/aes_gcm_key_manager_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function TEST (line 57) | TEST(AesGcmKeyManagerTest, Basics) { function TEST (line 65) | TEST(AesGcmKeyManagerTest, ValidateEmptyKey) { function TEST (line 70) | TEST(AesGcmKeyManagerTest, ValidateValid16ByteKey) { function TEST (line 77) | TEST(AesGcmKeyManagerTest, ValidateValid32ByteKey) { function TEST (line 84) | TEST(AesGcmKeyManagerTest, InvalidKeySizes15Bytes) { function TEST (line 92) | TEST(AesGcmKeyManagerTest, InvalidKeySizes17Bytes) { function TEST (line 100) | TEST(AesGcmKeyManagerTest, InvalidKeySizes24Bytes) { function TEST (line 108) | TEST(AesGcmKeyManagerTest, InvalidKeySizes31Bytes) { function TEST (line 116) | TEST(AesGcmKeyManagerTest, InvalidKeySizes33Bytes) { function TEST (line 124) | TEST(AesGcmKeyManagerTest, ValidateKeyFormat) { function TEST (line 158) | TEST(AesGcmKeyManagerTest, Create16ByteKey) { function TEST (line 168) | TEST(AesGcmKeyManagerTest, Create32ByteKey) { function TEST (line 178) | TEST(AesGcmKeyManagerTest, CreateAead) { function TEST (line 199) | TEST(AesGcmKeyManagerTest, CreateCordAead) { function TEST (line 220) | TEST(AesGcmKeyManagerTest, DeriveShortKey) { function TEST (line 234) | TEST(AesGcmKeyManagerTest, DeriveLongKey) { function TEST (line 249) | TEST(AesGcmKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 261) | TEST(AesGcmKeyManagerTest, DeriveKeyWrongVersion) { FILE: cc/aead/aes_gcm_key_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type TestCase (line 44) | struct TestCase { function TEST_P (line 62) | TEST_P(AesGcmKeyTest, CreateSucceeds) { function TEST (line 87) | TEST(AesGcmKeyTest, CreateKeyWithMismatchedKeySizeFails) { function TEST (line 107) | TEST(AesGcmKeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 139) | TEST_P(AesGcmKeyTest, GetKeyBytes) { function TEST_P (line 163) | TEST_P(AesGcmKeyTest, KeyEquals) { function TEST (line 193) | TEST(AesGcmKeyTest, DifferentVariantNotEqual) { function TEST (line 230) | TEST(AesGcmKeyTest, DifferentSecretDataNotEqual) { function TEST (line 257) | TEST(AesGcmKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/aead/aes_gcm_parameters.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/aead/aes_gcm_parameters.h function namespace (line 24) | namespace crypto { FILE: cc/aead/aes_gcm_parameters_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type BuildTestCase (line 40) | struct BuildTestCase { function TEST_P (line 62) | TEST_P(AesGcmParametersBuildTest, Build) { function TEST (line 81) | TEST(AesGcmParametersTest, BuildWithoutSettingVariantFails) { function TEST (line 91) | TEST(AesGcmParametersTest, BuildWithInvalidVariantFails) { function TEST (line 104) | TEST(AesGcmParametersTest, BuildWithoutSettingKeySizeFails) { function TEST (line 114) | TEST(AesGcmParametersTest, BuildWithInvalidKeySizeFails) { function TEST (line 165) | TEST(AesGcmParametersTest, BuildWithoutSettingIvSizeFails) { function TEST (line 175) | TEST(AesGcmParametersTest, BuildWithInvalidIvSizeFails) { function TEST (line 186) | TEST(AesGcmParametersTest, BuildWithoutSettingTagSizeFails) { function TEST (line 196) | TEST(AesGcmParametersTest, BuildWithInvalidTagSizeFails) { function TEST (line 217) | TEST(AesGcmParametersTest, CopyConstructor) { function TEST (line 235) | TEST(AesGcmParametersTest, CopyAssignment) { function TEST_P (line 263) | TEST_P(AesGcmParametersVariantTest, ParametersEquals) { function TEST (line 293) | TEST(AesGcmParametersTest, KeySizeNotEqual) { function TEST (line 316) | TEST(AesGcmParametersTest, IvSizeNotEqual) { function TEST (line 339) | TEST(AesGcmParametersTest, TagSizeNotEqual) { function TEST (line 362) | TEST(AesGcmParametersTest, VariantNotEqual) { FILE: cc/aead/aes_gcm_proto_serialization.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function ToVariant (line 67) | util::StatusOr ToVariant( function ToOutputPrefixType (line 84) | util::StatusOr ToOutputPrefixType( function ValidateParamsForProto (line 101) | util::Status ValidateParamsForProto(const AesGcmParameters& params) { function ParseParameters (line 115) | util::StatusOr ParseParameters( function SerializeParameters (line 147) | util::StatusOr SerializePara... function ParseKey (line 163) | util::StatusOr ParseKey( function SerializeKey (line 205) | util::StatusOr SerializeKey( function AesGcmProtoParametersParserImpl (line 237) | AesGcmProtoParametersParserImpl* AesGcmProtoParametersParser() { function AesGcmProtoParametersSerializerImpl (line 243) | AesGcmProtoParametersSerializerImpl* AesGcmProtoParametersSerializer... function AesGcmProtoKeyParserImpl (line 249) | AesGcmProtoKeyParserImpl* AesGcmProtoKeyParser() { function AesGcmProtoKeySerializerImpl (line 254) | AesGcmProtoKeySerializerImpl* AesGcmProtoKeySerializer() { function RegisterAesGcmProtoSerialization (line 261) | util::Status RegisterAesGcmProtoSerialization() { FILE: cc/aead/aes_gcm_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/aead/aes_gcm_proto_serialization_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type TestCase (line 59) | struct TestCase { class AesGcmProtoSerializationTest (line 69) | class AesGcmProtoSerializationTest : public TestWithParam { method SetUp (line 71) | void SetUp() override { function TEST_F (line 76) | TEST_F(AesGcmProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 95) | TEST_P(AesGcmProtoSerializationTest, ParseParameters) { function TEST_F (line 124) | TEST_F(AesGcmProtoSerializationTest, ParseParametersWithInvalidSeria... function TEST_F (line 143) | TEST_F(AesGcmProtoSerializationTest, ParseParametersWithUnkownOutput... function TEST_F (line 163) | TEST_F(AesGcmProtoSerializationTest, ParseParametersWithInvalidVersi... function TEST_P (line 183) | TEST_P(AesGcmProtoSerializationTest, SerializeParameters) { function TEST_F (line 220) | TEST_F(AesGcmProtoSerializationTest, SerializeParametersWithDisallow... function TEST_F (line 240) | TEST_F(AesGcmProtoSerializationTest, SerializeParametersWithDisallow... function TEST_P (line 260) | TEST_P(AesGcmProtoSerializationTest, ParseKey) { function TEST_F (line 303) | TEST_F(AesGcmProtoSerializationTest, ParseLegacyKeyAsCrunchy) { function TEST_F (line 330) | TEST_F(AesGcmProtoSerializationTest, ParseKeyWithInvalidSerializatio... function TEST_F (line 349) | TEST_F(AesGcmProtoSerializationTest, ParseKeyNoSecretKeyAccess) { function TEST_F (line 372) | TEST_F(AesGcmProtoSerializationTest, ParseKeyWithInvalidVersion) { function TEST_P (line 395) | TEST_P(AesGcmProtoSerializationTest, SerializeKey) { function TEST_F (line 442) | TEST_F(AesGcmProtoSerializationTest, SerializeKeyWithDisallowedIvSiz... function TEST_F (line 469) | TEST_F(AesGcmProtoSerializationTest, SerializeKeyWithDisallowedTagSi... function TEST_F (line 496) | TEST_F(AesGcmProtoSerializationTest, SerializeKeyNoSecretKeyAccess) { FILE: cc/aead/aes_gcm_siv_key.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function ComputeOutputPrefix (line 38) | util::StatusOr ComputeOutputPrefix( FILE: cc/aead/aes_gcm_siv_key.h function namespace (line 32) | namespace crypto { FILE: cc/aead/aes_gcm_siv_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/aead/aes_gcm_siv_key_manager_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function TEST (line 51) | TEST(AesGcmSivKeyManagerTest, Basics) { function TEST (line 59) | TEST(AesGcmSivKeyManagerTest, ValidateEmptyKey) { function TEST (line 64) | TEST(AesGcmSivKeyManagerTest, ValidateValid16ByteKey) { function TEST (line 71) | TEST(AesGcmSivKeyManagerTest, ValidateValid32ByteKey) { function TEST (line 78) | TEST(AesGcmSivKeyManagerTest, InvalidKeySizes17Bytes) { function TEST (line 86) | TEST(AesGcmSivKeyManagerTest, InvalidKeySizes24Bytes) { function TEST (line 94) | TEST(AesGcmSivKeyManagerTest, InvalidKeySizes31Bytes) { function TEST (line 102) | TEST(AesGcmSivKeyManagerTest, InvalidKeySizes33Bytes) { function TEST (line 110) | TEST(AesGcmSivKeyManagerTest, ValidateKeyFormat) { function TEST (line 144) | TEST(AesGcmSivKeyManagerTest, Create16ByteKey) { function TEST (line 154) | TEST(AesGcmSivKeyManagerTest, Create32ByteKey) { function TEST (line 164) | TEST(AesGcmSivKeyManagerTest, CreateAeadFailsWithOpenSsl) { function TEST (line 181) | TEST(AesGcmSivKeyManagerTest, CreateAeadSucceedsWithBoringSsl) { FILE: cc/aead/aes_gcm_siv_key_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type TestCase (line 43) | struct TestCase { function TEST_P (line 61) | TEST_P(AesGcmSivKeyTest, CreateSucceeds) { function TEST (line 80) | TEST(AesGcmSivKeyTest, CreateKeyWithMismatchedKeySizeFails) { function TEST (line 96) | TEST(AesGcmSivKeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 120) | TEST_P(AesGcmSivKeyTest, GetKeyBytes) { function TEST_P (line 138) | TEST_P(AesGcmSivKeyTest, KeyEquals) { function TEST (line 162) | TEST(AesGcmSivKeyTest, DifferentVariantNotEqual) { function TEST (line 190) | TEST(AesGcmSivKeyTest, DifferentSecretDataNotEqual) { function TEST (line 212) | TEST(AesGcmSivKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/aead/aes_gcm_siv_parameters.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/aead/aes_gcm_siv_parameters.h function namespace (line 24) | namespace crypto { FILE: cc/aead/aes_gcm_siv_parameters_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type TestCase (line 39) | struct TestCase { function TEST_P (line 56) | TEST_P(AesGcmSivParametersCreateTest, Create) { function TEST (line 68) | TEST(AesGcmSivParametersTest, CreateWithInvalidVariantFails) { function TEST (line 77) | TEST(AesGcmSivParametersTest, CreateWithInvalidKeySizeFails) { function TEST (line 100) | TEST(AesGcmParametersTest, CopyConstructor) { function TEST (line 111) | TEST(AesGcmParametersTest, CopyAssignment) { function TEST_P (line 131) | TEST_P(AesGcmSivParametersVariantTest, ParametersEquals) { function TEST (line 150) | TEST(AesGcmParametersTest, KeySizeNotEqual) { function TEST (line 164) | TEST(AesGcmParametersTest, VariantNotEqual) { FILE: cc/aead/aes_gcm_siv_proto_serialization.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function ToVariant (line 63) | util::StatusOr ToVariant( function ToOutputPrefixType (line 80) | util::StatusOr ToOutputPrefixType( function ParseParameters (line 95) | util::StatusOr ParseParameters( function SerializeParameters (line 122) | util::StatusOr SerializePara... function ParseKey (line 138) | util::StatusOr ParseKey( function SerializeKey (line 177) | util::StatusOr SerializeKey( function AesGcmSivProtoParametersParserImpl (line 208) | AesGcmSivProtoParametersParserImpl* AesGcmSivProtoParametersParser() { function AesGcmSivProtoParametersSerializerImpl (line 214) | AesGcmSivProtoParametersSerializerImpl* AesGcmSivProtoParametersSeri... function AesGcmSivProtoKeyParserImpl (line 220) | AesGcmSivProtoKeyParserImpl* AesGcmSivProtoKeyParser() { function AesGcmSivProtoKeySerializerImpl (line 225) | AesGcmSivProtoKeySerializerImpl* AesGcmSivProtoKeySerializer() { function RegisterAesGcmSivProtoSerialization (line 232) | util::Status RegisterAesGcmSivProtoSerialization() { FILE: cc/aead/aes_gcm_siv_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/aead/aes_gcm_siv_proto_serialization_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type TestCase (line 59) | struct TestCase { class AesGcmSivProtoSerializationTest (line 67) | class AesGcmSivProtoSerializationTest : public TestWithParam ComputeOutputPrefix( FILE: cc/aead/chacha20_poly1305_key.h function namespace (line 32) | namespace crypto { FILE: cc/aead/chacha20_poly1305_key_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type TestCase (line 41) | struct TestCase { function TEST_P (line 58) | TEST_P(ChaCha20Poly1305KeyTest, CreateSucceeds) { function TEST (line 77) | TEST(ChaCha20Poly1305KeyTest, CreateKeyWithInvalidVariantFails) { function TEST (line 87) | TEST(ChaCha20Poly1305KeyTest, CreateKeyWithInvalidKeySizeFails) { function TEST (line 98) | TEST(ChaCha20Poly1305KeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 113) | TEST_P(ChaCha20Poly1305KeyTest, KeyEquals) { function TEST (line 134) | TEST(ChaCha20Poly1305KeyTest, DifferentVariantNotEqual) { function TEST (line 153) | TEST(ChaCha20Poly1305KeyTest, DifferentSecretDataNotEqual) { function TEST (line 173) | TEST(ChaCha20Poly1305KeyTest, DifferentIdRequirementNotEqual) { FILE: cc/aead/chacha20_poly1305_parameters.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { FILE: cc/aead/chacha20_poly1305_parameters.h function namespace (line 24) | namespace crypto { FILE: cc/aead/chacha20_poly1305_parameters_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type TestCase (line 36) | struct TestCase { function TEST_P (line 52) | TEST_P(ChaCha20Poly1305ParametersTest, Create) { function TEST (line 63) | TEST(ChaCha20Poly1305ParametersTest, CreateWithInvalidVariantFails) { function TEST (line 71) | TEST(ChaCha20Poly1305ParametersTest, CopyConstructor) { function TEST (line 83) | TEST(ChaCha20Poly1305ParametersTest, CopyAssignment) { function TEST_P (line 95) | TEST_P(ChaCha20Poly1305ParametersTest, ParametersEquals) { function TEST (line 112) | TEST(ChaCha20Poly1305ParametersTest, DifferentVariantNotEqual) { FILE: cc/aead/chacha20_poly1305_proto_serialization.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function ToVariant (line 63) | util::StatusOr ToVariant( function ToOutputPrefixType (line 81) | util::StatusOr ToOutputPrefixType( function ParseParameters (line 96) | util::StatusOr ParseParameters( function SerializeParameters (line 118) | util::StatusOr SerializePara... function ParseKey (line 129) | util::StatusOr ParseKey( function SerializeKey (line 164) | util::StatusOr SerializeKey( function ChaCha20Poly1305ProtoParametersParserImpl (line 190) | ChaCha20Poly1305ProtoParametersParserImpl* function ChaCha20Poly1305ProtoParametersSerializerImpl (line 197) | ChaCha20Poly1305ProtoParametersSerializerImpl* function ChaCha20Poly1305ProtoKeyParserImpl (line 204) | ChaCha20Poly1305ProtoKeyParserImpl* ChaCha20Poly1305ProtoKeyParser() { function ChaCha20Poly1305ProtoKeySerializerImpl (line 210) | ChaCha20Poly1305ProtoKeySerializerImpl* ChaCha20Poly1305ProtoKeySeri... function RegisterChaCha20Poly1305ProtoSerialization (line 218) | util::Status RegisterChaCha20Poly1305ProtoSerialization() { FILE: cc/aead/chacha20_poly1305_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/aead/chacha20_poly1305_proto_serialization_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type TestCase (line 63) | struct TestCase { class ChaCha20Poly1305ProtoSerializationTest (line 70) | class ChaCha20Poly1305ProtoSerializationTest : public TestWithParam<... method ChaCha20Poly1305ProtoSerializationTest (line 72) | ChaCha20Poly1305ProtoSerializationTest() { function TEST_F (line 77) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 96) | TEST_P(ChaCha20Poly1305ProtoSerializationTest, ParseParameters) { function TEST_F (line 118) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, function TEST_F (line 133) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, function TEST_P (line 149) | TEST_P(ChaCha20Poly1305ProtoSerializationTest, SerializeParameters) { function TEST_P (line 178) | TEST_P(ChaCha20Poly1305ProtoSerializationTest, ParseKey) { function TEST_F (line 217) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, ParseLegacyKeyAsCrunc... function TEST_F (line 246) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, function TEST_F (line 265) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, ParseKeyNoSecretKeyAc... function TEST_F (line 287) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, ParseKeyWithInvalidVe... function TEST_P (line 309) | TEST_P(ChaCha20Poly1305ProtoSerializationTest, SerializeKey) { function TEST_F (line 349) | TEST_F(ChaCha20Poly1305ProtoSerializationTest, SerializeKeyNoSecretK... FILE: cc/aead/config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function Configuration (line 26) | const Configuration& ConfigAeadV0() { FILE: cc/aead/config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/aead/config_v0_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function TEST_P (line 57) | TEST_P(ConfigV0Test, GetPrimitive) { function TEST_P (line 72) | TEST_P(ConfigV0BoringSslTest, GetPrimitive) { FILE: cc/aead/cord_aead.h function namespace (line 22) | namespace crypto { FILE: cc/aead/cord_aead_wrapper.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function Validate (line 36) | util::Status Validate(PrimitiveSet* aead_set) { class CordAeadSetWrapper (line 48) | class CordAeadSetWrapper : public CordAead { method CordAeadSetWrapper (line 50) | explicit CordAeadSetWrapper(std::unique_ptr... FILE: cc/aead/cord_aead_wrapper.h function namespace (line 27) | namespace crypto { FILE: cc/aead/cord_aead_wrapper_test.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { function TEST (line 51) | TEST(AeadSetWrapperTest, WrapNullptr) { function TEST (line 60) | TEST(AeadSetWrapperTest, WrapEmpty) { function setup_keyset (line 69) | std::unique_ptr> setup_keyset() { function TEST (line 89) | TEST(AeadSetWrapperTest, WrapperEncryptDecrypt) { function TEST (line 110) | TEST(AeadSetWrapperTest, WrapperEncryptDecryptMultipleKeys) { function TEST (line 153) | TEST(AeadSetWrapperTest, WrapperEncryptDecryptManyChunks) { function TEST (line 179) | TEST(AeadSetWrapperTest, WrapperEncryptBadDecrypt) { FILE: cc/aead/failing_aead.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { class AlwaysFailAead (line 35) | class AlwaysFailAead : public Aead { method AlwaysFailAead (line 37) | explicit AlwaysFailAead(std::string message) method Encrypt (line 40) | util::StatusOr Encrypt( method Decrypt (line 49) | util::StatusOr Decrypt( function CreateAlwaysFailingAead (line 64) | std::unique_ptr CreateAlwaysFailingAead(absl::string_view mess... FILE: cc/aead/failing_aead.h function namespace (line 25) | namespace crypto { FILE: cc/aead/failing_aead_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { function TEST (line 34) | TEST(AlwaysFailAead, EncryptFails) { function TEST (line 41) | TEST(AlwaysFailAead, EncryptFailsContainsMessage) { function TEST (line 51) | TEST(AlwaysFailAead, DecryptFails) { function TEST (line 58) | TEST(AlwaysFailAead, DecryptFailsContainsMessage) { FILE: cc/aead/internal/aead_from_zero_copy.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { FILE: cc/aead/internal/aead_from_zero_copy.h function namespace (line 32) | namespace crypto { FILE: cc/aead/internal/aead_from_zero_copy_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type internal (line 36) | namespace internal { function TEST (line 52) | TEST(AeadFromZeroCopyTest, EncryptSucceeds) { function TEST (line 68) | TEST(AeadFromZeroCopyTest, EncryptFailsIfZeroCopyEncryptFails) { function TEST (line 80) | TEST(AeadFromZeroCopyTest, DecryptSucceeds) { function TEST (line 96) | TEST(AeadFromZeroCopyTest, EncryptFailsIfZeroCopyDecryptFails) { FILE: cc/aead/internal/aead_util.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { function IsSupportedKmsEnvelopeAeadDekKeyType (line 32) | bool IsSupportedKmsEnvelopeAeadDekKeyType(absl::string_view key_ty... function GetAesGcmCipherForKeySize (line 44) | util::StatusOr GetAesGcmCipherForKeySize( function GetAesGcmAeadForKeySize (line 58) | util::StatusOr GetAesGcmAeadForKeySize( function GetAesGcmSivAeadCipherForKeySize (line 71) | util::StatusOr GetAesGcmSivAeadCipherForKeySize( FILE: cc/aead/internal/aead_util.h function namespace (line 27) | namespace crypto { FILE: cc/aead/internal/aead_util_test.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { type internal (line 26) | namespace internal { function TEST (line 35) | TEST(AeadUtilTest, GetAesGcmCipherForKeySize) { function TEST (line 48) | TEST(AeadUtilTest, SupportedKmsEnvelopeAeadDekKeyTypes) { function TEST (line 59) | TEST(AeadUtilTest, GetAesAeadForKeySize) { function TEST (line 72) | TEST(AeadUtilTest, GetAesGcmSivAeadCipherForKeySize) { FILE: cc/aead/internal/config_v0.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type internal (line 32) | namespace internal { function AddAeadV0 (line 34) | util::Status AddAeadV0(Configuration& config) { FILE: cc/aead/internal/config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/aead/internal/config_v0_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type internal (line 46) | namespace internal { function TEST (line 56) | TEST(AeadV0Test, PrimitiveWrappers) { function TEST (line 66) | TEST(AeadV0Test, KeyManagers) { function TEST_P (line 102) | TEST_P(AeadV0KeyTypesTest, GetPrimitive) { function TEST_P (line 122) | TEST_P(AeadV0BoringSslKeyTypesTest, GetPrimitive) { FILE: cc/aead/internal/cord_aes_gcm_boringssl.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type internal (line 40) | namespace internal { function SetIvAndDirection (line 48) | util::Status SetIvAndDirection(EVP_CIPHER_CTX* context, absl::stri... function NewContextFromPartial (line 72) | util::StatusOr> NewContextF... function NewContext (line 107) | util::StatusOr> NewContext( FILE: cc/aead/internal/cord_aes_gcm_boringssl.h function namespace (line 30) | namespace crypto { FILE: cc/aead/internal/cord_aes_gcm_boringssl_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type internal (line 45) | namespace internal { class CordAesGcmBoringSslTest (line 60) | class CordAesGcmBoringSslTest : public Test { method SetUp (line 62) | void SetUp() override { function TEST_F (line 74) | TEST_F(CordAesGcmBoringSslTest, EncryptDecryptCord) { function TEST_F (line 86) | TEST_F(CordAesGcmBoringSslTest, ChunkyCordEncrypt) { function TEST_F (line 99) | TEST_F(CordAesGcmBoringSslTest, ChunkyCordDecrypt) { function TEST_F (line 113) | TEST_F(CordAesGcmBoringSslTest, CanDecryptWithStringAead) { function TEST_F (line 135) | TEST_F(CordAesGcmBoringSslTest, ModifiedCord) { function GetError (line 173) | static std::string GetError() { function WycheproofTest (line 186) | bool WycheproofTest(const rapidjson::Document& root) { function TEST (line 238) | TEST(CordAesGcmBoringSslWycheproofTest, TestVectors) { FILE: cc/aead/internal/key_gen_config_v0.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type internal (line 31) | namespace internal { function AddAeadKeyGenV0 (line 33) | util::Status AddAeadKeyGenV0(KeyGenConfiguration& config) { FILE: cc/aead/internal/key_gen_config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/aead/internal/mock_zero_copy_aead.h function namespace (line 27) | namespace crypto { FILE: cc/aead/internal/ssl_aead.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type internal (line 46) | namespace internal { function UpdateCipher (line 57) | util::StatusOr UpdateCipher(EVP_CIPHER_CTX *context, class OpenSslOneShotAeadImpl (line 86) | class OpenSslOneShotAeadImpl : public SslOneShotAead { method OpenSslOneShotAeadImpl (line 88) | explicit OpenSslOneShotAeadImpl(const util::SecretData &key, method Encrypt (line 92) | util::StatusOr Encrypt(absl::string_view plaintext, method Decrypt (line 124) | util::StatusOr Decrypt(absl::string_view ciphertext, method CiphertextSize (line 162) | int64_t CiphertextSize(int64_t plaintext_length) const override { method PlaintextSize (line 166) | int64_t PlaintextSize(int64_t ciphertext_length) const override { method EncryptSensitive (line 174) | util::StatusOr EncryptSensitive(absl::string_view plai... method DecryptSensitive (line 212) | util::StatusOr DecryptSensitive(absl::string_view ciph... method GetContext (line 279) | util::StatusOr> GetContext( class BoringSslOneShotAeadImpl (line 325) | class BoringSslOneShotAeadImpl : public SslOneShotAead { method BoringSslOneShotAeadImpl (line 327) | explicit BoringSslOneShotAeadImpl( method Encrypt (line 331) | util::StatusOr Encrypt(absl::string_view plaintext, method EncryptSensitive (line 359) | util::StatusOr EncryptSensitive(absl::string_view plain... method Decrypt (line 380) | util::StatusOr Decrypt(absl::string_view ciphertext, method DecryptSensitive (line 413) | util::StatusOr DecryptSensitive(absl::string_view ciphe... method CiphertextSize (line 443) | int64_t CiphertextSize(int64_t plaintext_length) const override { method PlaintextSize (line 447) | int64_t PlaintextSize(int64_t ciphertext_length) const override { function CreateAesGcmOneShotCrypter (line 463) | util::StatusOr> CreateAesGcmOneSho... function CreateAesGcmSivOneShotCrypter (line 496) | util::StatusOr> CreateAesGcmSivOne... function CreateXchacha20Poly1305OneShotCrypter (line 522) | util::StatusOr> FILE: cc/aead/internal/ssl_aead.h function namespace (line 28) | namespace crypto { FILE: cc/aead/internal/ssl_aead_large_inputs_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type internal (line 47) | namespace internal { type TestParams (line 65) | struct TestParams { function CipherFromName (line 74) | util::StatusOr> CipherFromName( function TEST_P (line 92) | TEST_P(SslOneShotAeadLargeInputsTest, EncryptDecryptLargeInput) { function GetTestParams (line 129) | std::vector GetTestParams() { FILE: cc/aead/internal/ssl_aead_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type internal (line 47) | namespace internal { type CipherType (line 72) | enum CipherType { type SslOneShotAeadTestParams (line 78) | struct SslOneShotAeadTestParams { function CipherFromName (line 87) | util::StatusOr> CipherFromName( function TEST_P (line 104) | TEST_P(SslOneShotAeadTest, CiphertextPlaintextSize) { function DoTestEncrypt (line 123) | void DoTestEncrypt(SslOneShotAead* aead, absl::string_view message, function DoTestDecrypt (line 135) | void DoTestDecrypt(SslOneShotAead* aead, absl::string_view message, function TEST_P (line 147) | TEST_P(SslOneShotAeadTest, EncryptDecrypt) { function ModifyString (line 165) | std::string ModifyString(absl::string_view input_str, int position) { function DoTestEncryptDecryptWithModifiedCiphertext (line 172) | void DoTestEncryptDecryptWithModifiedCiphertext(SslOneShotAead* aead, function TEST_P (line 216) | TEST_P(SslOneShotAeadTest, TestModification) { function TEST_P (line 234) | TEST_P(SslOneShotAeadTest, TestBufferClearsIfDecryptionFails) { function TestDecryptWithEmptyAssociatedData (line 271) | void TestDecryptWithEmptyAssociatedData(SslOneShotAead* aead, function DoTestWithEmptyAssociatedData (line 287) | void DoTestWithEmptyAssociatedData(SslOneShotAead* aead, absl::str... function TEST_P (line 302) | TEST_P(SslOneShotAeadTest, EmptyAssociatedData) { function DoTestEmptyMessageEncryptDecrypt (line 317) | void DoTestEmptyMessageEncryptDecrypt( function TEST_P (line 341) | TEST_P(SslOneShotAeadTest, EmptyMessage) { function TEST_P (line 354) | TEST_P(SslOneShotAeadTest, EmptyMessageAndAssociatedData) { function TEST_P (line 374) | TEST_P(SslOneShotAeadTest, BufferOverlapEncryptFails) { function TEST_P (line 395) | TEST_P(SslOneShotAeadTest, BufferOverlapDecryptFails) { function GetSslOneShotAeadTestParams (line 419) | std::vector GetSslOneShotAeadTestParams() { function TEST (line 456) | TEST(SslOneShotAeadTest, AesGcmTestInvalidKeySizes) { function TEST (line 473) | TEST(SslOneShotAeadTest, AesGcmSivTestInvalidKeySizes) { function TEST (line 493) | TEST(SslOneShotAeadTest, Xchacha20Poly1305TestInvalidKeySizes) { function TEST (line 513) | TEST(SslOneShotAeadTest, Xchacha20Poly1305TestFipsOnly) { function TEST (line 527) | TEST(SslOneShotAeadTest, AesGcmTestFipsOnly) { function TEST (line 542) | TEST(SslOneShotAeadTest, AesGcmTestTestFipsFailWithoutBoringCrypto) { function TEST (line 559) | TEST(AesGcmSivBoringSslTest, AesGcmTestSivTestFipsOnly) { type SslOneShotAeadWycheproofTestParams (line 576) | struct SslOneShotAeadWycheproofTestParams { class SslOneShotAeadWycheproofTest (line 585) | class SslOneShotAeadWycheproofTest method SetUp (line 588) | void SetUp() override { function TEST_P (line 606) | TEST_P(SslOneShotAeadWycheproofTest, Encrypt) { function TEST_P (line 641) | TEST_P(SslOneShotAeadWycheproofTest, Decrypt) { function GetWycheproofTestParams (line 669) | std::vector GetWycheproofTestP... FILE: cc/aead/internal/wycheproof_aead.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type internal (line 28) | namespace internal { function ReadWycheproofTestVectors (line 32) | std::vector ReadWycheproofTestVectors( FILE: cc/aead/internal/wycheproof_aead.h function namespace (line 25) | namespace crypto { FILE: cc/aead/internal/zero_copy_aead.h function namespace (line 26) | namespace crypto { FILE: cc/aead/internal/zero_copy_aead_wrapper.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type internal (line 39) | namespace internal { function Validate (line 46) | util::Status Validate(PrimitiveSet* aead_set) { class ZeroCopyAeadSetWrapper (line 58) | class ZeroCopyAeadSetWrapper : public Aead { method ZeroCopyAeadSetWrapper (line 60) | explicit ZeroCopyAeadSetWrapper( FILE: cc/aead/internal/zero_copy_aead_wrapper.h function namespace (line 28) | namespace crypto { FILE: cc/aead/internal/zero_copy_aead_wrapper_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type internal (line 44) | namespace internal { function TEST (line 67) | TEST(ZeroCopyAeadWrapperEmptyTest, Nullptr) { function TEST (line 74) | TEST(ZeroCopyAeadWrapperEmptyTest, Empty) { class ZeroCopyAeadWrapperTest (line 82) | class ZeroCopyAeadWrapperTest : public testing::Test { method SetUp (line 84) | void SetUp() override { method SetUpMockZeroCopyAead (line 104) | std::unique_ptr SetUpMockZeroCopyAead() { function TEST_F (line 128) | TEST_F(ZeroCopyAeadWrapperTest, EncryptDecrypt) { function TEST_F (line 140) | TEST_F(ZeroCopyAeadWrapperTest, EncryptMultipleKeys) { function TEST_F (line 176) | TEST_F(ZeroCopyAeadWrapperTest, EncryptDecryptRawKey) { function TEST_F (line 226) | TEST_F(ZeroCopyAeadWrapperTest, EncryptBadDecrypt) { FILE: cc/aead/internal/zero_copy_aes_gcm_boringssl.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type internal (line 41) | namespace internal { FILE: cc/aead/internal/zero_copy_aes_gcm_boringssl.h function namespace (line 32) | namespace crypto { FILE: cc/aead/internal/zero_copy_aes_gcm_boringssl_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type internal (line 44) | namespace internal { class ZeroCopyAesGcmBoringSslTest (line 73) | class ZeroCopyAesGcmBoringSslTest : public testing::Test { method SetUp (line 75) | void SetUp() override { function TEST_F (line 87) | TEST_F(ZeroCopyAesGcmBoringSslTest, function TEST_F (line 94) | TEST_F(ZeroCopyAesGcmBoringSslTest, EncryptDecrypt) { function TEST_F (line 113) | TEST_F(ZeroCopyAesGcmBoringSslTest, DecryptEncodedCiphertext) { function TEST_F (line 123) | TEST_F(ZeroCopyAesGcmBoringSslTest, EncryptBufferTooSmall) { function TEST_F (line 134) | TEST_F(ZeroCopyAesGcmBoringSslTest, DecryptBufferTooSmall) { function TEST_F (line 145) | TEST_F(ZeroCopyAesGcmBoringSslTest, EncryptOverlappingPlaintextCip... function TEST_F (line 159) | TEST_F(ZeroCopyAesGcmBoringSslTest, DecryptOverlappingPlaintextCip... class ZeroCopyAesGcmBoringSslWycheproofTest (line 176) | class ZeroCopyAesGcmBoringSslWycheproofTest method SetUp (line 178) | void SetUp() override { function TEST_P (line 190) | TEST_P(ZeroCopyAesGcmBoringSslWycheproofTest, Decrypt) { FILE: cc/aead/key_gen_config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function KeyGenConfiguration (line 26) | const KeyGenConfiguration& KeyGenConfigAeadV0() { FILE: cc/aead/key_gen_config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/aead/kms_aead_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/aead/kms_aead_key_manager_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function TEST (line 53) | TEST(KmsAeadKeyManagerTest, Basics) { function TEST (line 61) | TEST(KmsAeadKeyManagerTest, ValidateEmptyKey) { function TEST (line 66) | TEST(KmsAeadKeyManagerTest, ValidateValidKey) { function TEST (line 73) | TEST(KmsAeadKeyManagerTest, ValidateWrongVersion) { function TEST (line 80) | TEST(KmsAeadKeyManagerTest, ValidateNoUri) { function TEST (line 86) | TEST(KmsAeadKeyManagerTest, ValidateKeyFormatEmptyKey) { function TEST (line 91) | TEST(KmsAeadKeyManagerTest, ValidateKeyFormatValidKey) { function TEST (line 97) | TEST(KmsAeadKeyManagerTest, ValidateKeyFormatNoUri) { function TEST (line 102) | TEST(KmsAeadKeyManagerTest, CreateKey) { class KmsAeadKeyManagerCreateTest (line 110) | class KmsAeadKeyManagerCreateTest : public ::testing::Test { method SetUpTestSuite (line 115) | static void SetUpTestSuite() { function TEST_F (line 125) | TEST_F(KmsAeadKeyManagerCreateTest, CreateAead) { function TEST_F (line 140) | TEST_F(KmsAeadKeyManagerCreateTest, CreateAeadWrongKeyName) { function TEST_F (line 149) | TEST_F(KmsAeadKeyManagerCreateTest, CreateAeadWrongPrefix) { function TEST_F (line 158) | TEST_F(KmsAeadKeyManagerCreateTest, CreateAeadUnboundKey) { FILE: cc/aead/kms_envelope_aead.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { function GetEnvelopeCiphertext (line 50) | std::string GetEnvelopeCiphertext(absl::string_view encrypted_dek, FILE: cc/aead/kms_envelope_aead.h function namespace (line 30) | namespace crypto { FILE: cc/aead/kms_envelope_aead_key_manager.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { FILE: cc/aead/kms_envelope_aead_key_manager.h function namespace (line 39) | namespace crypto { function override (line 89) | const override { FILE: cc/aead/kms_envelope_aead_key_manager_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { function TEST (line 64) | TEST(KmsEnvelopeAeadKeyManagerTest, Basics) { function TEST (line 72) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateEmptyKey) { function TEST (line 77) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateValidKey) { function TEST (line 87) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateWrongVersion) { function TEST (line 96) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateNoUri) { function TEST (line 104) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateKeyFormatEmptyKey) { function TEST (line 110) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateKeyFormatValidKey) { function TEST (line 118) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateKeyFormatNoUri) { function TEST (line 125) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateKeyFormatNoTemplate) { function TEST (line 132) | TEST(KmsEnvelopeAeadKeyManagerTest, ValidateKeyFormatInvalidDekTempl... function TEST (line 140) | TEST(KmsEnvelopeAeadKeyManagerTest, CreateKey) { class KmsEnvelopeAeadKeyManagerCreateTest (line 151) | class KmsEnvelopeAeadKeyManagerCreateTest : public ::testing::Test { method SetUpTestSuite (line 156) | static void SetUpTestSuite() { function TEST_F (line 171) | TEST_F(KmsEnvelopeAeadKeyManagerCreateTest, CreateAead) { function TEST_F (line 191) | TEST_F(KmsEnvelopeAeadKeyManagerCreateTest, CreateAeadWrongKeyName) { function TEST_F (line 202) | TEST_F(KmsEnvelopeAeadKeyManagerCreateTest, CreateAeadWrongTypeUrl) { function TEST_F (line 215) | TEST_F(KmsEnvelopeAeadKeyManagerCreateTest, CreateAeadWrongPrefix) { function TEST_F (line 226) | TEST_F(KmsEnvelopeAeadKeyManagerCreateTest, CreateAeadUnboundKey) { class KmsEnvelopeAeadKeyManagerDekTemplatesTest (line 246) | class KmsEnvelopeAeadKeyManagerDekTemplatesTest method SetUp (line 248) | void SetUp() override { ASSERT_THAT(AeadConfig::Register(), IsOk()... function TEST_P (line 251) | TEST_P(KmsEnvelopeAeadKeyManagerDekTemplatesTest, EncryptDecryp) { FILE: cc/aead/kms_envelope_aead_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { class KmsEnvelopeAeadTest (line 67) | class KmsEnvelopeAeadTest : public Test { method SetUp (line 69) | void SetUp() override { ASSERT_THAT(AeadConfig::Register(), IsOk()... function TEST_F (line 72) | TEST_F(KmsEnvelopeAeadTest, EncryptDecryptSucceed) { function TEST_F (line 97) | TEST_F(KmsEnvelopeAeadTest, NewFailsIfReamoteAeadIsNull) { function TEST_F (line 104) | TEST_F(KmsEnvelopeAeadTest, NewFailsIfDekKeyManagerIsNotRegistered) { function TEST_F (line 113) | TEST_F(KmsEnvelopeAeadTest, NewFailsIfUsingDekTemplateOfUnsupportedK... function TEST_F (line 122) | TEST_F(KmsEnvelopeAeadTest, DecryptFailsWithInvalidCiphertextOrAad) { function TEST_F (line 166) | TEST_F(KmsEnvelopeAeadTest, DekMaintainsCorrectKeyFormat) { function TEST_F (line 197) | TEST_F(KmsEnvelopeAeadTest, MultipleEncryptionsProduceDifferentDeks) { class KmsEnvelopeAeadDekTemplatesTest (line 236) | class KmsEnvelopeAeadDekTemplatesTest method SetUp (line 238) | void SetUp() override { ASSERT_THAT(AeadConfig::Register(), IsOk()... function TEST_P (line 241) | TEST_P(KmsEnvelopeAeadDekTemplatesTest, EncryptDecrypt) { function GetTestTemplates (line 266) | std::vector GetTestTemplates() { function TEST_F (line 285) | TEST_F(KmsEnvelopeAeadTest, PrimitiveFromTemplateAndFromNewAreCompat... FILE: cc/aead/mock_aead.h function namespace (line 27) | namespace crypto { FILE: cc/aead/xchacha20_poly1305_key.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function ComputeOutputPrefix (line 38) | util::StatusOr ComputeOutputPrefix( FILE: cc/aead/xchacha20_poly1305_key.h function namespace (line 32) | namespace crypto { FILE: cc/aead/xchacha20_poly1305_key_manager.h function namespace (line 42) | namespace crypto { FILE: cc/aead/xchacha20_poly1305_key_manager_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function TEST (line 54) | TEST(XChaCha20Poly1305KeyManagerTest, Basics) { function TEST (line 63) | TEST(XChaCha20Poly1305KeyManagerTest, ValidateEmptyKey) { function TEST (line 68) | TEST(XChaCha20Poly1305KeyManagerTest, ValidateValid32ByteKey) { function TEST (line 75) | TEST(XChaCha20Poly1305KeyManagerTest, ValidateInvalid16ByteKey) { function TEST (line 82) | TEST(XChaCha20Poly1305KeyManagerTest, ValidateInvalid31ByteKey) { function TEST (line 89) | TEST(XChaCha20Poly1305KeyManagerTest, ValidateInvalid33ByteKey) { function TEST (line 96) | TEST(XChaCha20Poly1305KeyManagerTest, ValidateInvalidVersion) { function TEST (line 103) | TEST(XChaCha20Poly1305KeyManagerTest, ValidateKeyFormat) { function TEST (line 109) | TEST(XChaCha20Poly1305KeyManagerTest, CreateKey) { function TEST (line 118) | TEST(XChaCha20Poly1305KeyManagerTest, DeriveKey) { function TEST (line 131) | TEST(XChaCha20Poly1305KeyManagerTest, DeriveKeyFromLongSeed) { function TEST (line 144) | TEST(XChaCha20Poly1305KeyManagerTest, DeriveKeyWithoutEnoughEntropy) { function TEST (line 157) | TEST(XChaCha20Poly1305KeyManagerTest, DeriveKeyWrongVersion) { function TEST (line 169) | TEST(XChaCha20Poly1305KeyManagerTest, CreateKeyValid) { function TEST (line 178) | TEST(XChaCha20Poly1305KeyManagerTest, CreateAeadFailsWithOpenSsl) { function TEST (line 193) | TEST(XChaCha20Poly1305KeyManagerTest, CreateAeadSucceedsWithBoringSs... FILE: cc/aead/xchacha20_poly1305_key_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type TestCase (line 41) | struct TestCase { function TEST_P (line 58) | TEST_P(XChaCha20Poly1305KeyTest, CreateSucceeds) { function TEST (line 77) | TEST(XChaCha20Poly1305KeyTest, CreateKeyWithInvalidVariantFails) { function TEST (line 87) | TEST(XChaCha20Poly1305KeyTest, CreateKeyWithInvalidKeySizeFails) { function TEST (line 98) | TEST(XChaCha20Poly1305KeyTest, CreateKeyWithInvalidIdRequirementFail... function TEST_P (line 113) | TEST_P(XChaCha20Poly1305KeyTest, KeyEquals) { function TEST (line 134) | TEST(XChaCha20Poly1305KeyTest, DifferentVariantNotEqual) { function TEST (line 153) | TEST(XChaCha20Poly1305KeyTest, DifferentSecretDataNotEqual) { function TEST (line 173) | TEST(XChaCha20Poly1305KeyTest, DifferentIdRequirementNotEqual) { FILE: cc/aead/xchacha20_poly1305_parameters.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { FILE: cc/aead/xchacha20_poly1305_parameters.h function namespace (line 24) | namespace crypto { FILE: cc/aead/xchacha20_poly1305_parameters_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type TestCase (line 36) | struct TestCase { function TEST_P (line 52) | TEST_P(XChaCha20Poly1305ParametersTest, Create) { function TEST (line 63) | TEST(XChaCha20Poly1305ParametersTest, CreateWithInvalidVariantFails) { function TEST (line 71) | TEST(XChaCha20Poly1305ParametersTest, CopyConstructor) { function TEST (line 83) | TEST(XChaCha20Poly1305ParametersTest, CopyAssignment) { function TEST_P (line 95) | TEST_P(XChaCha20Poly1305ParametersTest, ParametersEquals) { function TEST (line 112) | TEST(XChaCha20Poly1305ParametersTest, DifferentVariantNotEqual) { FILE: cc/aead/xchacha20_poly1305_proto_serialization.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function ToVariant (line 65) | util::StatusOr ToVariant( function ToOutputPrefixType (line 83) | util::StatusOr ToOutputPrefixType( function ParseParameters (line 98) | util::StatusOr ParseParameters( function SerializeParameters (line 124) | util::StatusOr SerializePara... function ParseKey (line 137) | util::StatusOr ParseKey( function SerializeKey (line 172) | util::StatusOr SerializeKey( function XChaCha20Poly1305ProtoParametersParserImpl (line 198) | XChaCha20Poly1305ProtoParametersParserImpl* function XChaCha20Poly1305ProtoParametersSerializerImpl (line 205) | XChaCha20Poly1305ProtoParametersSerializerImpl* function XChaCha20Poly1305ProtoKeyParserImpl (line 212) | XChaCha20Poly1305ProtoKeyParserImpl* XChaCha20Poly1305ProtoKeyParser... function XChaCha20Poly1305ProtoKeySerializerImpl (line 218) | XChaCha20Poly1305ProtoKeySerializerImpl* XChaCha20Poly1305ProtoKeySe... function RegisterXChaCha20Poly1305ProtoSerialization (line 226) | util::Status RegisterXChaCha20Poly1305ProtoSerialization() { FILE: cc/aead/xchacha20_poly1305_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/aead/xchacha20_poly1305_proto_serialization_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type TestCase (line 63) | struct TestCase { class XChaCha20Poly1305ProtoSerializationTest (line 70) | class XChaCha20Poly1305ProtoSerializationTest : public TestWithParam... method SetUp (line 72) | void SetUp() override { function TEST_F (line 77) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, RegisterTwiceSucceed... function TEST_P (line 96) | TEST_P(XChaCha20Poly1305ProtoSerializationTest, ParseParameters) { function TEST_F (line 121) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, function TEST_F (line 139) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, function TEST_F (line 158) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, function TEST_P (line 177) | TEST_P(XChaCha20Poly1305ProtoSerializationTest, SerializeParameters) { function TEST_P (line 207) | TEST_P(XChaCha20Poly1305ProtoSerializationTest, ParseKey) { function TEST_F (line 246) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, ParseLegacyKeyAsCrun... function TEST_F (line 275) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, function TEST_F (line 294) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, ParseKeyNoSecretKeyA... function TEST_F (line 316) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, ParseKeyWithInvalidV... function TEST_P (line 338) | TEST_P(XChaCha20Poly1305ProtoSerializationTest, SerializeKey) { function TEST_F (line 378) | TEST_F(XChaCha20Poly1305ProtoSerializationTest, SerializeKeyNoSecret... FILE: cc/big_integer.h function namespace (line 25) | namespace crypto { FILE: cc/binary_keyset_reader.h function namespace (line 29) | namespace crypto { FILE: cc/binary_keyset_writer.h function namespace (line 30) | namespace crypto { FILE: cc/chunked_mac.h function namespace (line 27) | namespace crypto { FILE: cc/cleartext_keyset_handle.h function namespace (line 33) | namespace crypto { FILE: cc/config/config_util.cc type crypto (line 21) | namespace crypto { type tink (line 22) | namespace tink { function CreateTinkKeyTypeEntry (line 24) | google::crypto::tink::KeyTypeEntry CreateTinkKeyTypeEntry( FILE: cc/config/config_util.h function namespace (line 24) | namespace crypto { FILE: cc/config/config_util_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { function TEST (line 28) | TEST(CreateKeyTypeEntry, Simple) { FILE: cc/config/fips_140_2.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function AddMac (line 46) | util::Status AddMac(Configuration& config) { function AddAead (line 62) | util::Status AddAead(Configuration& config) { function AddPrf (line 78) | util::Status AddPrf(Configuration& config) { function AddSignature (line 89) | util::Status AddSignature(Configuration& config) { function Configuration (line 120) | const Configuration& ConfigFips140_2() { FILE: cc/config/fips_140_2.h function namespace (line 22) | namespace crypto { FILE: cc/config/fips_140_2_test.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { class Fips1402Test (line 57) | class Fips1402Test : public ::testing::Test { method TearDown (line 59) | void TearDown() override { internal::UnSetFipsRestricted(); } function TEST_F (line 62) | TEST_F(Fips1402Test, PrimitiveWrappers) { function TEST_F (line 79) | TEST_F(Fips1402Test, KeyManagers) { function TEST_F (line 99) | TEST_F(Fips1402Test, FailsInNonFipsMode) { function TEST_F (line 108) | TEST_F(Fips1402Test, NonFipsTypeNotPresent) { function TEST_F (line 120) | TEST_F(Fips1402Test, GetPrimitive) { FILE: cc/config/global_registry.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { function Configuration (line 28) | const Configuration& ConfigGlobalRegistry() { function KeyGenConfiguration (line 37) | const KeyGenConfiguration& KeyGenConfigGlobalRegistry() { FILE: cc/config/global_registry.h function namespace (line 23) | namespace crypto { FILE: cc/config/global_registry_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { class FakePrimitive (line 52) | class FakePrimitive { method FakePrimitive (line 54) | explicit FakePrimitive(std::string s) : s_(s) {} method get (line 55) | std::string get() { return s_; } class FakeKeyTypeManager (line 61) | class FakeKeyTypeManager class FakePrimitiveFactory (line 64) | class FakePrimitiveFactory : public PrimitiveFactory { method Create (line 66) | util::StatusOr> Create( method FakeKeyTypeManager (line 72) | FakeKeyTypeManager() method key_material_type (line 75) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 79) | uint32_t get_version() const override { return 0; } method ValidateKey (line 83) | util::Status ValidateKey(const AesGcmKey& key) const override { method ValidateKeyFormat (line 87) | util::Status ValidateKeyFormat( method CreateKey (line 92) | util::StatusOr CreateKey( method DeriveKey (line 97) | util::StatusOr DeriveKey( class FakePrimitiveWrapper (line 108) | class FakePrimitiveWrapper method Wrap (line 111) | util::StatusOr> Wrap( function TEST (line 119) | TEST(GlobalRegistryTest, GenerateNewKeysetHandleFromKeyGenConfig) { function TEST (line 139) | TEST(GlobalRegistryTest, GetPrimitiveFromConfig) { FILE: cc/config/key_gen_fips_140_2.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function AddMac (line 40) | util::Status AddMac(KeyGenConfiguration& config) { function AddAead (line 45) | util::Status AddAead(KeyGenConfiguration& config) { function AddPrf (line 55) | util::Status AddPrf(KeyGenConfiguration& config) { function AddSignature (line 60) | util::Status AddSignature(KeyGenConfiguration& config) { function KeyGenConfiguration (line 81) | const KeyGenConfiguration& KeyGenConfigFips140_2() { FILE: cc/config/key_gen_fips_140_2.h function namespace (line 22) | namespace crypto { FILE: cc/config/key_gen_fips_140_2_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { class KeyGenFips1402Test (line 45) | class KeyGenFips1402Test : public testing::Test { method TearDown (line 47) | void TearDown() override { internal::UnSetFipsRestricted(); } function TEST_F (line 50) | TEST_F(KeyGenFips1402Test, KeyManagers) { function TEST_F (line 71) | TEST_F(KeyGenFips1402Test, FailsInNonFipsMode) { function TEST_F (line 81) | TEST_F(KeyGenFips1402Test, NonFipsTypeNotPresent) { function TEST_F (line 94) | TEST_F(KeyGenFips1402Test, GenerateNewKeysetHandle) { FILE: cc/config/key_gen_v0.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function KeyGenConfiguration (line 32) | const KeyGenConfiguration& KeyGenConfigV0() { FILE: cc/config/key_gen_v0.h function namespace (line 22) | namespace crypto { FILE: cc/config/tink_config.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function RegistryConfig (line 35) | const RegistryConfig& TinkConfig::Latest() { FILE: cc/config/tink_config.h function namespace (line 25) | namespace crypto { FILE: cc/config/tink_config_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function TEST (line 42) | TEST(TinkConfigTest, RegisterWorks) { FILE: cc/config/tink_fips.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function IsFipsModeEnabled (line 26) | bool IsFipsModeEnabled() { function RestrictToFips (line 30) | crypto::tink::util::Status RestrictToFips() { FILE: cc/config/tink_fips.h function namespace (line 24) | namespace crypto { FILE: cc/config/tink_fips_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { class FipsIncompatible (line 37) | class FipsIncompatible { class FipsCompatibleWithBoringCrypto (line 43) | class FipsCompatibleWithBoringCrypto { function TEST (line 49) | TEST(TinkFipsTest, FipsEnabledWhenBuiltInFipsMode) { function TEST (line 58) | TEST(TinkFipsTest, FipsDisabledWhenNotBuildInFipsMode) { function TEST (line 67) | TEST(TinkFipsTest, CompatibilityChecksWithBoringCrypto) { function TEST (line 90) | TEST(TinkFipsTest, CompatibilityChecksWithoutBoringCrypto) { function TEST (line 114) | TEST(TinkFipsTest, FailIfRegistryNotEmpty) { FILE: cc/config/v0.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { function Configuration (line 33) | const Configuration& ConfigV0() { FILE: cc/config/v0.h function namespace (line 22) | namespace crypto { FILE: cc/config/v0_test.cc type crypto (line 64) | namespace crypto { type tink (line 65) | namespace tink { function TEST (line 73) | TEST(V0Test, PrimitiveWrappers) { function TEST_P (line 99) | TEST_P(V0KeyTypesTest, KeyManagers) { function TEST (line 134) | TEST(V0Test, GetPrimitive) { FILE: cc/configuration.h function namespace (line 23) | namespace crypto { FILE: cc/core/big_integer.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { FILE: cc/core/big_integer_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { function TEST (line 51) | TEST(BigIntegerTest, CreateAndGet) { function TEST (line 59) | TEST(BigIntegerTest, CreateAndGetPadded) { function TEST (line 70) | TEST(BigIntegerTest, CreateAndGetEmptyStringWorks) { function TEST (line 78) | TEST(BigIntegerTest, CreateAndGetNullCharactersWorks) { function TEST (line 86) | TEST(BigIntegerTest, Equals) { function TEST (line 97) | TEST(BigIntegerTest, EqualsPadded) { function TEST (line 107) | TEST(BigIntegerTest, NotEquals) { function TEST (line 130) | TEST(BigIntegerTest, NotEqualsDifferentSize) { function TEST (line 152) | TEST(BigIntegerTest, CopyConstructor) { function TEST (line 160) | TEST(BigIntegerTest, CopyAssignment) { function TEST (line 168) | TEST(BigIntegerTest, MoveConstructor) { function TEST (line 176) | TEST(BigIntegerTest, MoveAssignment) { FILE: cc/core/binary_keyset_reader.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { FILE: cc/core/binary_keyset_reader_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { class BinaryKeysetReaderTest (line 44) | class BinaryKeysetReaderTest : public ::testing::Test { method SetUp (line 46) | void SetUp() override { function TEST_F (line 73) | TEST_F(BinaryKeysetReaderTest, testReaderCreation) { function TEST_F (line 107) | TEST_F(BinaryKeysetReaderTest, testReadFromString) { function TEST_F (line 128) | TEST_F(BinaryKeysetReaderTest, testReadFromStream) { function TEST_F (line 153) | TEST_F(BinaryKeysetReaderTest, testReadEncryptedFromString) { function TEST_F (line 177) | TEST_F(BinaryKeysetReaderTest, testReadEncryptedFromStream) { FILE: cc/core/binary_keyset_writer.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function WriteProto (line 39) | util::Status WriteProto(const portable_proto::MessageLite& proto, FILE: cc/core/binary_keyset_writer_test.cc type crypto (line 53) | namespace crypto { type tink (line 54) | namespace tink { class BinaryKeysetWriterTest (line 57) | class BinaryKeysetWriterTest : public ::testing::Test { method SetUp (line 59) | void SetUp() override { function TEST_F (line 86) | TEST_F(BinaryKeysetWriterTest, testWriterCreation) { function TEST_F (line 102) | TEST_F(BinaryKeysetWriterTest, testWriteKeyset) { function TEST_F (line 113) | TEST_F(BinaryKeysetWriterTest, testWriteEncryptedKeyset) { function TEST_F (line 124) | TEST_F(BinaryKeysetWriterTest, testDestinationStreamErrors) { function TEST_F (line 143) | TEST_F(BinaryKeysetWriterTest, EncryptedKeysetOverhead) { FILE: cc/core/cleartext_keyset_handle.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function Keyset (line 87) | const Keyset& CleartextKeysetHandle::GetKeyset( FILE: cc/core/cleartext_keyset_handle_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { class CleartextKeysetHandleTest (line 46) | class CleartextKeysetHandleTest : public ::testing::Test { function TEST_F (line 50) | TEST_F(CleartextKeysetHandleTest, testRead) { function TEST_F (line 77) | TEST_F(CleartextKeysetHandleTest, testWrite) { FILE: cc/core/crypto_format.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function uint32_as_big_endian (line 37) | void uint32_as_big_endian(uint32_t value, char* buf) { FILE: cc/core/crypto_format_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { function TestNonRawPrefix (line 33) | void TestNonRawPrefix(const KeysetInfo::KeyInfo& key_info, int prefi... class CryptoFormatTest (line 48) | class CryptoFormatTest : public ::testing::Test { function TEST_F (line 51) | TEST_F(CryptoFormatTest, testConstants) { function TEST_F (line 59) | TEST_F(CryptoFormatTest, testTinkPrefix) { function TEST_F (line 69) | TEST_F(CryptoFormatTest, testLegacyPrefix) { function TEST_F (line 79) | TEST_F(CryptoFormatTest, testCrunchyPrefix) { function TEST_F (line 89) | TEST_F(CryptoFormatTest, testRawPrefix) { FILE: cc/core/ec_point_test.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { function TEST (line 32) | TEST(EcPointTest, Create) { function TEST (line 42) | TEST(EcPointTest, CopyConstructor) { function TEST (line 53) | TEST(EcPointTest, CopyAssignment) { function TEST (line 64) | TEST(EcPointTest, MoveConstructor) { function TEST (line 75) | TEST(EcPointTest, MoveAssignment) { function TEST (line 86) | TEST(EcPointTest, Equals) { function TEST (line 99) | TEST(EcPointTest, DifferentXNotEqual) { function TEST (line 113) | TEST(EcPointTest, DifferentYNotEqual) { FILE: cc/core/json_keyset_reader.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function ValidateEncryptedKeyset (line 53) | util::Status ValidateEncryptedKeyset(const rapidjson::Document& json... function ValidateKeysetInfo (line 64) | util::Status ValidateKeysetInfo(const rapidjson::Value& json_value) { function ValidateKeyInfo (line 75) | util::Status ValidateKeyInfo(const rapidjson::Value& json_value) { function KeyInfoFromJson (line 87) | util::StatusOr> KeyInfoFromJson( function KeysetInfoFromJson (line 101) | util::StatusOr> KeysetInfoFromJson( function EncryptedKeysetFromJson (line 115) | util::StatusOr> EncryptedKeysetFrom... function ValidateKeyset (line 138) | util::Status ValidateKeyset(const rapidjson::Document& json_doc) { function ValidateKey (line 148) | util::Status ValidateKey(const rapidjson::Value& json_value) { function ValidateKeyData (line 159) | util::Status ValidateKeyData(const rapidjson::Value& json_value) { function KeyDataFromJson (line 170) | util::StatusOr> KeyDataFromJson( function KeyFromJson (line 187) | util::StatusOr> KeyFromJson( function KeysetFromJson (line 203) | util::StatusOr> KeysetFromJson( FILE: cc/core/json_keyset_reader_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { class JsonKeysetReaderTest (line 59) | class JsonKeysetReaderTest : public ::testing::Test { method SetUp (line 61) | void SetUp() override { function TEST_F (line 147) | TEST_F(JsonKeysetReaderTest, testReaderCreation) { function TEST_F (line 181) | TEST_F(JsonKeysetReaderTest, testReadFromString) { function TEST_F (line 211) | TEST_F(JsonKeysetReaderTest, testReadFromStream) { function TEST_F (line 236) | TEST_F(JsonKeysetReaderTest, testReadEncryptedFromString) { function TEST_F (line 259) | TEST_F(JsonKeysetReaderTest, testReadEncryptedFromStream) { function TEST_F (line 288) | TEST_F(JsonKeysetReaderTest, ReadLargeKeyId) { function TEST_F (line 327) | TEST_F(JsonKeysetReaderTest, RejectsNegativeKeyIds) { function TEST_F (line 364) | TEST_F(JsonKeysetReaderTest, RejectsKeyIdLargerThanUint32) { function TEST_F (line 403) | TEST_F(JsonKeysetReaderTest, parseRecursiveJsonStringFails) { FILE: cc/core/json_keyset_writer.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function ToJson (line 53) | util::Status ToJson(const KeyData& key_data, function ToJson (line 74) | util::Status ToJson(const Keyset::Key& key, function ToJsonString (line 97) | util::StatusOr ToJsonString(const Keyset& keyset) { function ToJson (line 119) | util::Status ToJson(const KeysetInfo::KeyInfo& key_info, function ToJson (line 141) | util::Status ToJson(const KeysetInfo& keyset_info, function ToJsonString (line 159) | util::StatusOr ToJsonString(const EncryptedKeyset& keys... function WriteData (line 182) | util::Status WriteData(absl::string_view data, std::ostream* destina... FILE: cc/core/json_keyset_writer_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { class JsonKeysetWriterTest (line 58) | class JsonKeysetWriterTest : public ::testing::Test { method SetUp (line 60) | void SetUp() override { function TEST_F (line 142) | TEST_F(JsonKeysetWriterTest, testWriterCreation) { function TEST_F (line 158) | TEST_F(JsonKeysetWriterTest, testWriteKeyset) { function TEST_F (line 171) | TEST_F(JsonKeysetWriterTest, testWriteAndReadKeyset) { function TEST_F (line 189) | TEST_F(JsonKeysetWriterTest, testWriteEncryptedKeyset) { function TEST_F (line 210) | TEST_F(JsonKeysetWriterTest, testWriteAndReadEncryptedKeyset) { function TEST_F (line 229) | TEST_F(JsonKeysetWriterTest, testDestinationStreamErrors) { function TEST_F (line 248) | TEST_F(JsonKeysetWriterTest, WriteLargeKeyId) { FILE: cc/core/key_access_test.cc type crypto (line 22) | namespace crypto { type tink (line 23) | namespace tink { function TEST (line 26) | TEST(KeyAccessTest, PublicHasNoSecretAccess) { function TEST (line 31) | TEST(KeyAccessTest, SecretKeyAccessHasSecretAccess) { FILE: cc/core/key_manager.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { class AlwaysFailingKeyFactory (line 29) | class AlwaysFailingKeyFactory : public KeyFactory { method AlwaysFailingKeyFactory (line 31) | AlwaysFailingKeyFactory() = delete; method AlwaysFailingKeyFactory (line 32) | explicit AlwaysFailingKeyFactory(const crypto::tink::util::Status&... method NewKey (line 35) | crypto::tink::util::StatusOr { method Create (line 73) | crypto::tink::util::StatusOr> Create( class AeadVariantFactory (line 81) | class AeadVariantFactory : public PrimitiveFactory { method Create (line 83) | crypto::tink::util::StatusOr> Cre... method ExampleKeyTypeManager (line 89) | ExampleKeyTypeManager() method key_material_type (line 93) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method CreateKey (line 112) | crypto::tink::util::StatusOr CreateKey( function TEST (line 124) | TEST(KeyManagerImplTest, FactoryNewKeyFromMessage) { function TEST (line 136) | TEST(KeyManagerImplTest, FactoryNewKeyFromStringView) { function TEST (line 150) | TEST(KeyManagerImplTest, FactoryNewKeyFromKeyData) { function TEST (line 166) | TEST(KeyManagerImplTest, FactoryNewKeyFromMessageCallsValidate) { function TEST (line 181) | TEST(KeyManagerImplTest, FactoryNewKeyFromStringViewCallsValidate) { function TEST (line 199) | TEST(KeyManagerImplTest, FactoryNewKeyFromKeyDataCallsValidate) { function TEST (line 216) | TEST(CreateDeriverFunctionForTest, KeyMaterialAndKeyType) { function TEST (line 232) | TEST(CreateDeriverFunctionForTest, UseParametersAndReturnValue) { function TEST (line 259) | TEST(CreateDeriverFunctionForTest, ValidateKeyFormatIsCalled) { function TEST (line 274) | TEST(CreateDeriverFunctionForTest, ValidateKeyIsCalled) { function TEST (line 292) | TEST(KeyManagerImplTest, GetPrimitiveAead) { function TEST (line 310) | TEST(KeyManagerImplTest, GetPrimitiveAeadVariant) { function TEST (line 327) | TEST(KeyManagerImplTest, GetPrimitiveFromKey) { function TEST (line 344) | TEST(KeyManagerImplTest, GetKeyType) { function TEST (line 351) | TEST(KeyManagerImplTest, GetVersion) { function TEST (line 359) | TEST(KeyManagerImplTest, DoesSupport) { function TEST (line 371) | TEST(KeyManagerImplTest, GetPrimitiveCallsValidate) { function TEST (line 393) | TEST(KeyManagerImplTest, GetPrimitiveFromKeyCallsValidate) { class NotSupported (line 419) | class NotSupported {} function TEST (line 420) | TEST(KeyManagerImplTest, GetPrimitiveFails) { class ExampleKeyTypeManagerWithoutFactory (line 437) | class ExampleKeyTypeManagerWithoutFactory class AeadFactory (line 440) | class AeadFactory : public PrimitiveFactory { method Create (line 442) | crypto::tink::util::StatusOr> Create( class AeadVariantFactory (line 450) | class AeadVariantFactory : public PrimitiveFactory { method Create (line 452) | crypto::tink::util::StatusOr> Cre... method ExampleKeyTypeManagerWithoutFactory (line 458) | ExampleKeyTypeManagerWithoutFactory() method key_material_type (line 462) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 467) | uint32_t get_version() const override { return kVersion; } method ValidateKey (line 471) | util::Status ValidateKey(const AesGcmKey& key) const override { function TEST (line 483) | TEST(KeyManagerImplTest, GetPrimitiveWithoutFactoryAead) { function TEST (line 501) | TEST(KeyManagerImplTest, NonexistentFactoryNewKeyFromMessage) { function TEST (line 512) | TEST(KeyManagerImplTest, NonexistentFactoryNewKeyFromStringView) { function TEST (line 526) | TEST(KeyManagerImplTest, NonexistentFactoryNewKeyFromKeyData) { function TEST (line 539) | TEST(CreateDeriverFunctionForTest, DeriverWithoutFactory) { FILE: cc/core/key_manager_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { function TEST (line 34) | TEST(AlwaysFailingFactoryTest, NewKeyFromProtoLite) { function TEST (line 42) | TEST(AlwaysFailingFactoryTest, NewKeyFromStringView) { function TEST (line 49) | TEST(AlwaysFailingFactoryTest, NewKeyData) { FILE: cc/core/key_type_manager.h function namespace (line 37) | namespace crypto { FILE: cc/core/key_type_manager_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { class AeadVariant (line 50) | class AeadVariant { method AeadVariant (line 52) | explicit AeadVariant(std::string s) : s_(s) {} method get (line 54) | std::string get() { return s_; } class ExampleKeyTypeManager (line 60) | class ExampleKeyTypeManager : public KeyTypeManager { method Create (line 65) | crypto::tink::util::StatusOr> Create( class AeadVariantFactory (line 73) | class AeadVariantFactory : public PrimitiveFactory { method Create (line 75) | crypto::tink::util::StatusOr> Create( method ExampleKeyTypeManager (line 81) | ExampleKeyTypeManager() method key_material_type (line 85) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 90) | uint32_t get_version() const override { return kVersion; } method ValidateKey (line 94) | crypto::tink::util::Status ValidateKey(const AesGcmKey& key) const... method ValidateKeyFormat (line 98) | crypto::tink::util::Status ValidateKeyFormat( method CreateKey (line 103) | crypto::tink::util::StatusOr CreateKey( function TEST (line 115) | TEST(KeyManagerTest, CreateAead) { function TEST (line 127) | TEST(KeyManagerTest, CreateAeadVariant) { class NotRegistered (line 136) | class NotRegistered {} function TEST (line 137) | TEST(KeyManagerTest, CreateFails) { class ExampleKeyTypeManagerWithoutFactory (line 144) | class ExampleKeyTypeManagerWithoutFactory class AeadFactory (line 147) | class AeadFactory : public PrimitiveFactory { method Create (line 149) | crypto::tink::util::StatusOr> Create( class AeadVariantFactory (line 157) | class AeadVariantFactory : public PrimitiveFactory { method Create (line 159) | crypto::tink::util::StatusOr> Create( method ExampleKeyTypeManagerWithoutFactory (line 165) | ExampleKeyTypeManagerWithoutFactory() method key_material_type (line 169) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 174) | uint32_t get_version() const override { return kVersion; } method ValidateKey (line 178) | util::Status ValidateKey(const AesGcmKey& key) const override { function TEST (line 189) | TEST(KeyManagerWithoutFactoryTest, CreateAead) { function TEST (line 201) | TEST(KeyManagerWithoutFactoryTest, CreateAeadVariant) { function TEST (line 210) | TEST(KeyManagerWithoutFactoryTest, CreateFails) { FILE: cc/core/keyset_handle.cc type crypto (line 65) | namespace crypto { type tink (line 66) | namespace tink { function Encrypt (line 70) | util::StatusOr> Encrypt( function Decrypt (line 81) | util::StatusOr> Decrypt( function ValidateNoSecret (line 98) | util::Status ValidateNoSecret(const Keyset& keyset) { function ToProtoKeySerialization (line 112) | util::StatusOr ToProtoKeySerializat... function ExtractPublicKey (line 368) | util::StatusOr> ExtractPublicKey( function KeysetInfo (line 493) | KeysetInfo KeysetHandle::GetKeysetInfo() const { FILE: cc/core/keyset_handle_builder.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function SetBuilderEntryAttributes (line 50) | void SetBuilderEntryAttributes(KeyStatus status, bool is_primary, function KeysetHandleBuilder (line 123) | KeysetHandleBuilder& KeysetHandleBuilder::AddEntry( function KeysetHandleBuilder (line 135) | KeysetHandleBuilder& KeysetHandleBuilder::RemoveEntry(int index) { function KeysetHandleBuilder (line 155) | KeysetHandleBuilder& KeysetHandleBuilder::SetMonitoringAnnotations( FILE: cc/core/keyset_handle_builder_test.cc type crypto (line 63) | namespace crypto { type tink (line 64) | namespace tink { class KeysetHandleBuilderTest (line 86) | class KeysetHandleBuilderTest : public Test { method SetUp (line 88) | void SetUp() override { function CreateLegacyProtoParameters (line 96) | util::StatusOr CreateLegacyProtoPar... function TEST_F (line 105) | TEST_F(KeysetHandleBuilderTest, BuildWithSingleKey) { function TEST_F (line 127) | TEST_F(KeysetHandleBuilderTest, BuildWithMultipleKeys) { function TEST_F (line 175) | TEST_F(KeysetHandleBuilderTest, BuildCopy) { function TEST_F (line 226) | TEST_F(KeysetHandleBuilderTest, IsPrimary) { function TEST_F (line 242) | TEST_F(KeysetHandleBuilderTest, SetAndGetStatus) { function TEST_F (line 260) | TEST_F(KeysetHandleBuilderTest, BuildWithRandomId) { function TEST_F (line 290) | TEST_F(KeysetHandleBuilderTest, BuildWithRandomIdAfterFixedId) { function TEST_F (line 313) | TEST_F(KeysetHandleBuilderTest, BuildWithFixedIdAfterRandomIdFails) { function TEST_F (line 333) | TEST_F(KeysetHandleBuilderDeathTest, AddEntryToAnotherBuilderCrashes) { function TEST_F (line 350) | TEST_F(KeysetHandleBuilderDeathTest, ReAddEntryToSameBuilderCrashes) { function TEST_F (line 366) | TEST_F(KeysetHandleBuilderDeathTest, function TEST_F (line 384) | TEST_F(KeysetHandleBuilderTest, RemoveEntry) { function TEST_F (line 416) | TEST_F(KeysetHandleBuilderDeathTest, RemoveOutofRangeIndexEntryCrash... function TEST_F (line 435) | TEST_F(KeysetHandleBuilderTest, Size) { function TEST_F (line 459) | TEST_F(KeysetHandleBuilderTest, NoPrimaryFails) { function TEST_F (line 481) | TEST_F(KeysetHandleBuilderTest, RemovePrimaryFails) { function TEST_F (line 504) | TEST_F(KeysetHandleBuilderTest, AddPrimaryClearsOtherPrimary) { function TEST_F (line 523) | TEST_F(KeysetHandleBuilderTest, NoIdStrategySucceeds) { function TEST_F (line 537) | TEST_F(KeysetHandleBuilderTest, DuplicateId) { function TEST_F (line 556) | TEST_F(KeysetHandleBuilderTest, CreateBuilderEntryFromParams) { function TEST_F (line 572) | TEST_F(KeysetHandleBuilderTest, CreateBuilderEntryFromLegacyKey) { function TEST_F (line 600) | TEST_F(KeysetHandleBuilderTest, CreateBuilderEntryFromKey) { function TEST_F (line 620) | TEST_F(KeysetHandleBuilderTest, function TEST_F (line 659) | TEST_F(KeysetHandleBuilderTest, CreateBuilderEntryFromCopyableKey) { function TEST_F (line 687) | TEST_F(KeysetHandleBuilderTest, CreateBuilderEntryFromParameters) { function TEST_F (line 702) | TEST_F(KeysetHandleBuilderTest, CreateBuilderEntryFromCopyableParame... function TEST_F (line 716) | TEST_F(KeysetHandleBuilderTest, UsePrimitiveFromLegacyProtoParams) { function TEST_F (line 738) | TEST_F(KeysetHandleBuilderTest, UsePrimitiveFromParams) { function TEST_F (line 762) | TEST_F(KeysetHandleBuilderTest, UsePrimitiveFromLegacyProtoKey) { function TEST_F (line 801) | TEST_F(KeysetHandleBuilderTest, UsePrimitiveFromKey) { function TEST_F (line 829) | TEST_F(KeysetHandleBuilderTest, BuildTwiceFails) { function TEST_F (line 847) | TEST_F(KeysetHandleBuilderTest, UsePrimitivesFromSplitKeyset) { class MockAeadPrimitiveWrapper (line 900) | class MockAeadPrimitiveWrapper : public PrimitiveWrapper { class FakeAeadKeyManager (line 907) | class FakeAeadKeyManager class AeadFactory (line 910) | class AeadFactory : public PrimitiveFactory { method AeadFactory (line 912) | explicit AeadFactory(absl::string_view key_type) : key_type_(key... method Create (line 914) | util::StatusOr> Create( method FakeAeadKeyManager (line 923) | explicit FakeAeadKeyManager(absl::string_view key_type) method key_material_type (line 927) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 932) | uint32_t get_version() const override { return 0; } method ValidateKey (line 936) | crypto::tink::util::Status ValidateKey(const AesGcmKey& key) const... method ValidateKeyFormat (line 940) | crypto::tink::util::Status ValidateKeyFormat( method CreateKey (line 945) | crypto::tink::util::StatusOr CreateKey( method DeriveKey (line 950) | crypto::tink::util::StatusOr DeriveKey( function TEST_F (line 960) | TEST_F(KeysetHandleBuilderTest, BuildWithAnnotations) { FILE: cc/core/keyset_handle_test.cc type crypto (line 76) | namespace crypto { type tink (line 77) | namespace tink { class KeysetHandleTest (line 107) | class KeysetHandleTest : public ::testing::Test { method SetUp (line 109) | void SetUp() override { class FakeAeadKeyManager (line 121) | class FakeAeadKeyManager class AeadFactory (line 124) | class AeadFactory : public PrimitiveFactory { method AeadFactory (line 126) | explicit AeadFactory(absl::string_view key_type) : key_type_(key... method Create (line 128) | util::StatusOr> Create( method FakeAeadKeyManager (line 137) | explicit FakeAeadKeyManager(absl::string_view key_type) method key_material_type (line 141) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 146) | uint32_t get_version() const override { return 0; } method ValidateKey (line 150) | crypto::tink::util::Status ValidateKey(const AesGcmKey& key) const... method ValidateKeyFormat (line 154) | crypto::tink::util::Status ValidateKeyFormat( method CreateKey (line 159) | crypto::tink::util::StatusOr CreateKey( method DeriveKey (line 164) | crypto::tink::util::StatusOr DeriveKey( class MockAeadPrimitiveWrapper (line 174) | class MockAeadPrimitiveWrapper : public PrimitiveWrapper { function Keyset (line 182) | Keyset GetTestKeyset() { function Keyset (line 194) | Keyset GetPublicTestKeyset() { function TEST_F (line 205) | TEST_F(KeysetHandleTest, DefaultCtor) { function TEST_F (line 214) | TEST_F(KeysetHandleTest, CopyCtorAndAssignment) { function TEST_F (line 237) | TEST_F(KeysetHandleTest, MoveCtorAndAssignment) { function TEST_F (line 266) | TEST_F(KeysetHandleTest, ReadEncryptedKeysetBinary) { function TEST_F (line 334) | TEST_F(KeysetHandleTest, ReadEncryptedWithAnnotations) { function TEST_F (line 383) | TEST_F(KeysetHandleTest, ReadEncryptedKeysetJson) { function TEST_F (line 465) | TEST_F(KeysetHandleTest, WriteEncryptedKeyset_Json) { function TEST_F (line 506) | TEST_F(KeysetHandleTest, ReadEncryptedKeysetWithAssociatedDataGoodKe... function TEST_F (line 531) | TEST_F(KeysetHandleTest, ReadEncryptedWithAssociatedDataAndAnnotatio... function TEST_F (line 578) | TEST_F(KeysetHandleTest, ReadEncryptedKeysetWithAssociatedDataWrongA... function TEST_F (line 599) | TEST_F(KeysetHandleTest, ReadEncryptedKeysetWithAssociatedDataEmptyA... function TEST_F (line 619) | TEST_F(KeysetHandleTest, WriteEncryptedKeysetWithAssociatedData) { function TEST_F (line 661) | TEST_F(KeysetHandleTest, GenerateNew) { function TEST_F (line 678) | TEST_F(KeysetHandleTest, GenerateNewWithBespokeConfig) { function TEST_F (line 692) | TEST_F(KeysetHandleTest, GenerateNewWithGlobalRegistryConfig) { function TEST_F (line 698) | TEST_F(KeysetHandleTest, GenerateNewWithAnnotations) { function TEST_F (line 746) | TEST_F(KeysetHandleTest, GenerateNewErrors) { function TEST_F (line 757) | TEST_F(KeysetHandleTest, UnknownPrefixIsInvalid) { function CompareKeyMetadata (line 765) | void CompareKeyMetadata(const Keyset::Key& expected, function CreateEcdsaMultiKeyset (line 772) | util::StatusOr CreateEcdsaMultiKeyset() { function TEST_F (line 808) | TEST_F(KeysetHandleTest, GetPublicKeysetHandle) { function TEST_F (line 846) | TEST_F(KeysetHandleTest, GetPublicKeysetHandleErrors) { function TEST_F (line 886) | TEST_F(KeysetHandleTest, GetPublicKeysetHandleWithBespokeConfigSucce... function TEST_F (line 911) | TEST_F(KeysetHandleTest, GetPublicKeysetHandleWithBespokeConfigFails) { function TEST_F (line 923) | TEST_F(KeysetHandleTest, function TEST_F (line 944) | TEST_F(KeysetHandleTest, GetPublicKeysetHandleWithGlobalRegistryConf... function TEST_F (line 954) | TEST_F(KeysetHandleTest, GetPrimitive) { function TEST_F (line 994) | TEST_F(KeysetHandleTest, GetPrimitiveWithBespokeConfigSucceeds) { function TEST_F (line 1014) | TEST_F(KeysetHandleTest, GetPrimitiveWithBespokeConfigFailsIfEmpty) { function TEST_F (line 1028) | TEST_F(KeysetHandleTest, GetPrimitiveWithGlobalRegistryConfig) { function TEST_F (line 1037) | TEST_F(KeysetHandleTest, GetPrimitiveWithConfigFips1402) { function TEST_F (line 1049) | TEST_F(KeysetHandleTest, GetPrimitiveWithConfigFips1402FailsWithNonF... function TEST_F (line 1070) | TEST_F(KeysetHandleTest, GetPrimitiveNullptrKeyManager) { function TEST_F (line 1087) | TEST_F(KeysetHandleTest, GetPrimitiveCustomKeyManager) { function TEST_F (line 1109) | TEST_F(KeysetHandleTest, Copiable) { function TEST_F (line 1117) | TEST_F(KeysetHandleTest, ReadNoSecret) { function TEST_F (line 1138) | TEST_F(KeysetHandleTest, ReadNoSecretWithAnnotations) { function TEST_F (line 1175) | TEST_F(KeysetHandleTest, ReadNoSecretFailForTypeUnknown) { function TEST_F (line 1185) | TEST_F(KeysetHandleTest, ReadNoSecretFailForTypeSymmetric) { function TEST_F (line 1195) | TEST_F(KeysetHandleTest, ReadNoSecretFailForTypeAssymmetricPrivate) { function TEST_F (line 1205) | TEST_F(KeysetHandleTest, ReadNoSecretFailForHidden) { function TEST_F (line 1226) | TEST_F(KeysetHandleTest, ReadNoSecretFailForInvalidString) { function TEST_F (line 1232) | TEST_F(KeysetHandleTest, WriteNoSecret) { function TEST_F (line 1251) | TEST_F(KeysetHandleTest, WriteNoSecretFailForTypeUnknown) { function TEST_F (line 1268) | TEST_F(KeysetHandleTest, WriteNoSecretFailForTypeSymmetric) { function TEST_F (line 1285) | TEST_F(KeysetHandleTest, WriteNoSecretFailForTypeAssymmetricPrivate) { function TEST_F (line 1302) | TEST_F(KeysetHandleTest, WriteNoSecretFailForHidden) { function TEST_F (line 1330) | TEST_F(KeysetHandleTest, GetKeysetInfo) { function TEST_F (line 1361) | TEST_F(KeysetHandleTest, GetEntryFromSingleKeyKeyset) { function TEST_F (line 1382) | TEST_F(KeysetHandleTest, GetEntryFromMultipleKeyKeyset) { function TEST_F (line 1423) | TEST_F(KeysetHandleDeathTest, EntryWithIndexOutOfBoundsCrashes) { function TEST_F (line 1440) | TEST_F(KeysetHandleDeathTest, EntryWithUnknownStatusFails) { function TEST_F (line 1456) | TEST_F(KeysetHandleDeathTest, EntryWithUnprintableTypeUrlFails) { function TEST_F (line 1475) | TEST_F(KeysetHandleTest, GetPrimary) { function TEST_F (line 1498) | TEST_F(KeysetHandleDeathTest, NonexistentPrimaryFails) { function TEST_F (line 1512) | TEST_F(KeysetHandleDeathTest, MultiplePrimariesFail) { function TEST_F (line 1531) | TEST_F(KeysetHandleDeathTest, GetDisabledPrimaryFails) { FILE: cc/core/keyset_manager.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function Status (line 89) | Status KeysetManager::Enable(uint32_t key_id) { function Status (line 107) | Status KeysetManager::Disable(uint32_t key_id) { function Status (line 129) | Status KeysetManager::Delete(uint32_t key_id) { function Status (line 148) | Status KeysetManager::Destroy(uint32_t key_id) { function Status (line 172) | Status KeysetManager::SetPrimary(uint32_t key_id) { FILE: cc/core/keyset_manager_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { class KeysetManagerTest (line 39) | class KeysetManagerTest : public ::testing::Test { method SetUp (line 41) | void SetUp() override { method TearDown (line 45) | void TearDown() override {} function TEST_F (line 48) | TEST_F(KeysetManagerTest, testBasicOperations) { FILE: cc/core/kms_clients.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function KmsClients (line 38) | KmsClients& KmsClients::GlobalInstance() { function Status (line 43) | Status KmsClients::LocalAdd(std::unique_ptr kms_client) { FILE: cc/core/kms_clients_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { function TEST (line 40) | TEST(KmsClientsTest, Empty) { type UriData (line 52) | struct UriData { function TEST (line 57) | TEST(KmsClientsTest, AddAndGet) { FILE: cc/core/partial_key_access_token_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { function TEST (line 29) | TEST(PartialKeyAccessTokenTest, CopyConstructor) { function TEST (line 34) | TEST(PartialKeyAccessTokenTest, CopyAssignment) { function TEST (line 39) | TEST(PartialKeyAccessTokenTest, MoveConstructor) { function TEST (line 44) | TEST(PartialKeyAccessTokenTest, MoveAssignment) { FILE: cc/core/primitive_set_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { class PrimitiveSetTest (line 52) | class PrimitiveSetTest : public ::testing::Test {} function add_primitives (line 54) | void add_primitives(PrimitiveSet* primitive_set, int key_id_off... function add_primitives (line 68) | void add_primitives(PrimitiveSet::Builder* primitive_set_builder, function access_primitives (line 81) | void access_primitives(PrimitiveSet* primitive_set, int key_id_... function TEST_F (line 96) | TEST_F(PrimitiveSetTest, ConcurrentOperations) { function TEST_F (line 139) | TEST_F(PrimitiveSetTest, Basic) { function TEST_F (line 269) | TEST_F(PrimitiveSetTest, PrimaryKeyWithIdCollisions) { function TEST_F (line 345) | TEST_F(PrimitiveSetTest, DisabledKey) { function CreateKey (line 362) | KeysetInfo::KeyInfo CreateKey(uint32_t key_id, type MacIdAndTypeUrl (line 376) | struct MacIdAndTypeUrl { function TEST_F (line 387) | TEST_F(PrimitiveSetTest, GetAll) { function TEST_F (line 445) | TEST_F(PrimitiveSetTest, GetAllInKeysetOrder) { function TEST_F (line 496) | TEST_F(PrimitiveSetTest, LegacyConcurrentOperations) { function TEST_F (line 534) | TEST_F(PrimitiveSetTest, LegacyBasic) { function TEST_F (line 683) | TEST_F(PrimitiveSetTest, LegacyPrimaryKeyWithIdCollisions) { function TEST_F (line 785) | TEST_F(PrimitiveSetTest, LegacyDisabledKey) { function TEST_F (line 802) | TEST_F(PrimitiveSetTest, LegacyGetAll) { FILE: cc/core/private_key_manager_impl.h function namespace (line 33) | namespace crypto { FILE: cc/core/private_key_manager_impl_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type internal (line 43) | namespace internal { class PrivatePrimitive (line 62) | class PrivatePrimitive {} class PublicPrimitive (line 63) | class PublicPrimitive {} class ExamplePrivateKeyTypeManager (line 67) | class ExamplePrivateKeyTypeManager class PrivatePrimitiveFactory (line 71) | class PrivatePrimitiveFactory : public PrimitiveFactory... method ExamplePrivateKeyTypeManager (line 79) | ExamplePrivateKeyTypeManager() method key_material_type (line 82) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method CreateKey (line 98) | crypto::tink::util::StatusOr CreateKey( method GetPublicKey (line 107) | crypto::tink::util::StatusOr GetPublicKey( class TestPublicKeyTypeManager (line 117) | class TestPublicKeyTypeManager class PublicPrimitiveFactory (line 120) | class PublicPrimitiveFactory : public PrimitiveFactory>... method TestPublicKeyTypeManager (line 128) | TestPublicKeyTypeManager() method key_material_type (line 131) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() function TEST (line 150) | TEST(PrivateKeyManagerImplTest, FactoryNewKeyFromMessage) { function TEST (line 164) | TEST(PrivateKeyManagerImplTest, GetPublicKeyData) { function TEST (line 184) | TEST(PrivateKeyManagerImplTest, GetPublicKeyDataValidatePrivateKey) { function TEST (line 202) | TEST(PrivateKeyManagerImplTest, PublicKeyManagerCanHaveShortLifeti... FILE: cc/core/private_key_type_manager.h function namespace (line 25) | namespace crypto { FILE: cc/core/restricted_big_integer.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { FILE: cc/core/restricted_big_integer_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { function TEST (line 52) | TEST(RestrictedBigIntegerTest, CreateAndGetSecret) { function TEST (line 62) | TEST(RestrictedBigIntegerTest, CreateAndGetSecretPadded) { function TEST (line 76) | TEST(RestrictedBigIntegerTest, CreateAndGetEmptyStringWorks) { function TEST (line 86) | TEST(RestrictedBigIntegerTest, CreateAndGetNullCharactersWorks) { function TEST (line 96) | TEST(RestrictedBigIntegerTest, Equals) { function TEST (line 109) | TEST(RestricteddBigIntegerTest, EqualsPadded) { function TEST (line 121) | TEST(RestrictedRestrictedBigIntegerTest, NotEquals) { function TEST (line 146) | TEST(RestrictedRestrictedBigIntegerTest, NotEqualsDifferentSize) { function TEST (line 171) | TEST(RestrictedRestrictedBigIntegerTest, CopyConstructor) { function TEST (line 182) | TEST(RestrictedRestrictedBigIntegerTest, CopyAssignment) { function TEST (line 192) | TEST(RestrictedRestrictedBigIntegerTest, MoveConstructor) { function TEST (line 202) | TEST(RestrictedRestrictedBigIntegerTest, MoveAssignment) { FILE: cc/core/restricted_data.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/core/restricted_data_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { function TEST (line 35) | TEST(RestrictedDataTest, CreateAndGetSecret) { function TEST (line 42) | TEST(RestrictedDataTest, GenerateRandomAndSize) { function TEST (line 49) | TEST(RestrictedDataTest, GenerateRandomNegative) { function TEST (line 55) | TEST(RestrictedDataTest, Equals) { function TEST (line 66) | TEST(RestrictedDataTest, NotEquals) { function TEST (line 80) | TEST(RestrictedDataTest, CopyConstructor) { function TEST (line 89) | TEST(RestrictedDataTest, CopyAssignment) { function TEST (line 98) | TEST(RestrictedDataTest, MoveConstructor) { function TEST (line 107) | TEST(RestrictedDataTest, MoveAssignment) { FILE: cc/core/template_util.h function namespace (line 25) | namespace crypto { FILE: cc/core/template_util_test.cc type crypto (line 19) | namespace crypto { type tink (line 20) | namespace tink { type internal (line 21) | namespace internal { class C0 (line 24) | class C0 {} class C1 (line 25) | class C1 {} class C2 (line 26) | class C2 {} class C3 (line 27) | class C3 {} class C4 (line 28) | class C4 {} FILE: cc/core/version.cc type crypto (line 19) | namespace crypto { type tink (line 20) | namespace tink { FILE: cc/core/version_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { function TEST (line 32) | TEST(VersionTest, VersionHasCorrectFormat) { FILE: cc/crypto_format.h function namespace (line 28) | namespace crypto { FILE: cc/daead/aes_siv_key.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function ComputeOutputPrefix (line 38) | util::StatusOr ComputeOutputPrefix( FILE: cc/daead/aes_siv_key.h function namespace (line 32) | namespace crypto { FILE: cc/daead/aes_siv_key_manager.h function namespace (line 43) | namespace crypto { FILE: cc/daead/aes_siv_key_manager_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function TEST (line 51) | TEST(AesSivKeyManagerTest, Basics) { function TEST (line 59) | TEST(AesSivKeyManagerTest, ValidateEmptyKey) { function TEST (line 63) | TEST(AesSivKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 68) | TEST(AesSivKeyManagerTest, ValidKeyFormat) { function TEST (line 74) | TEST(AesSivKeyManagerTest, ValidateKeyFormatWithWrongSizes) { function TEST (line 89) | TEST(AesSivKeyManagerTest, CreateKey) { function TEST (line 98) | TEST(AesSivKeyManagerTest, CreateKeyIsValid) { function TEST (line 106) | TEST(AesSivKeyManagerTest, MultipleCreateCallsCreateDifferentKeys) { function TEST (line 117) | TEST(AesSivKeyManagerTest, DeriveKey) { function TEST (line 130) | TEST(AesSivKeyManagerTest, DeriveKeyFromLongSeed) { function TEST (line 145) | TEST(AesSivKeyManagerTest, DeriveKeyWithoutEnoughEntropy) { function TEST (line 156) | TEST(AesSivKeyManagerTest, DeriveKeyWrongVersion) { function TEST (line 168) | TEST(AesSivKeyManagerTest, ValidateKey) { function TEST (line 175) | TEST(AesSivKeyManagerTest, ValidateKeyStringLength) { function TEST (line 188) | TEST(AesSivKeyManagerTest, ValidateKeyVersion) { function TEST (line 195) | TEST(AesSivKeyManagerTest, GetPrimitive) { FILE: cc/daead/aes_siv_key_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type TestCase (line 43) | struct TestCase { function TEST_P (line 61) | TEST_P(AesSivKeyTest, CreateSucceeds) { function TEST (line 80) | TEST(AesSivKeyTest, CreateKeyWithMismatchedKeySizeFails) { function TEST (line 95) | TEST(AesSivKeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 117) | TEST_P(AesSivKeyTest, GetKeyBytes) { function TEST_P (line 134) | TEST_P(AesSivKeyTest, KeyEquals) { function TEST (line 158) | TEST(AesSivKeyTest, DifferentVariantNotEqual) { function TEST (line 185) | TEST(AesSivKeyTest, DifferentSecretDataNotEqual) { function TEST (line 207) | TEST(AesSivKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/daead/aes_siv_parameters.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/daead/aes_siv_parameters.h function namespace (line 24) | namespace crypto { FILE: cc/daead/aes_siv_parameters_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type CreateTestCase (line 39) | struct CreateTestCase { function TEST_P (line 56) | TEST_P(AesSivParametersBuildTest, Create) { function TEST (line 68) | TEST(AesSivParametersTest, CreateWithInvalidVariantFails) { function TEST (line 77) | TEST(AesSivParametersTest, CreateWithInvalidKeySizeFails) { function TEST (line 104) | TEST(AesSivParametersTest, CopyConstructor) { function TEST (line 115) | TEST(AesSivParametersTest, CopyAssignment) { function TEST_P (line 136) | TEST_P(AesSivParametersVariantTest, ParametersEquals) { function TEST (line 155) | TEST(AesSivParametersTest, KeySizeNotEqual) { function TEST (line 168) | TEST(AesSivParametersTest, VariantNotEqual) { FILE: cc/daead/aes_siv_proto_serialization.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function ToVariant (line 63) | util::StatusOr ToVariant( function ToOutputPrefixType (line 80) | util::StatusOr ToOutputPrefixType( function ParseParameters (line 95) | util::StatusOr ParseParameters( function SerializeParameters (line 120) | util::StatusOr SerializePara... function ParseKey (line 133) | util::StatusOr ParseKey( function SerializeKey (line 168) | util::StatusOr SerializeKey( function AesSivProtoParametersParserImpl (line 194) | AesSivProtoParametersParserImpl* AesSivProtoParametersParser() { function AesSivProtoParametersSerializerImpl (line 200) | AesSivProtoParametersSerializerImpl* AesSivProtoParametersSerializer... function AesSivProtoKeyParserImpl (line 206) | AesSivProtoKeyParserImpl* AesSivProtoKeyParser() { function AesSivProtoKeySerializerImpl (line 211) | AesSivProtoKeySerializerImpl* AesSivProtoKeySerializer() { function RegisterAesSivProtoSerialization (line 218) | util::Status RegisterAesSivProtoSerialization() { FILE: cc/daead/aes_siv_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/daead/aes_siv_proto_serialization_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type TestCase (line 59) | struct TestCase { class AesSivProtoSerializationTest (line 67) | class AesSivProtoSerializationTest : public TestWithParam { method SetUp (line 69) | void SetUp() override { function TEST_F (line 74) | TEST_F(AesSivProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 92) | TEST_P(AesSivProtoSerializationTest, ParseParameters) { function TEST_F (line 119) | TEST_F(AesSivProtoSerializationTest, ParseParametersWithInvalidSeria... function TEST_F (line 138) | TEST_F(AesSivProtoSerializationTest, ParseParametersWithUnkownOutput... function TEST_F (line 158) | TEST_F(AesSivProtoSerializationTest, ParseParametersWithInvalidVersi... function TEST_P (line 177) | TEST_P(AesSivProtoSerializationTest, SerializeParameters) { function TEST_P (line 209) | TEST_P(AesSivProtoSerializationTest, ParseKey) { function TEST_F (line 247) | TEST_F(AesSivProtoSerializationTest, ParseLegacyKeyAsCrunchy) { function TEST_F (line 274) | TEST_F(AesSivProtoSerializationTest, ParseKeyWithInvalidSerializatio... function TEST_F (line 293) | TEST_F(AesSivProtoSerializationTest, ParseKeyNoSecretKeyAccess) { function TEST_F (line 316) | TEST_F(AesSivProtoSerializationTest, ParseKeyWithInvalidVersion) { function TEST_P (line 339) | TEST_P(AesSivProtoSerializationTest, SerializeKey) { function TEST_F (line 381) | TEST_F(AesSivProtoSerializationTest, SerializeKeyNoSecretKeyAccess) { FILE: cc/daead/config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function Configuration (line 26) | const Configuration& ConfigDeterministicAeadV0() { FILE: cc/daead/config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/daead/config_v0_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { function TEST (line 39) | TEST(ConfigV0Test, GetPrimitive) { FILE: cc/daead/deterministic_aead_config.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/daead/deterministic_aead_config.h function namespace (line 24) | namespace crypto { FILE: cc/daead/deterministic_aead_config_test.cc type crypto (line 54) | namespace crypto { type tink (line 55) | namespace tink { class DeterministicAeadConfigTest (line 65) | class DeterministicAeadConfigTest : public ::testing::Test { method SetUp (line 67) | void SetUp() override { function TEST_F (line 73) | TEST_F(DeterministicAeadConfigTest, Basic) { function TEST_F (line 91) | TEST_F(DeterministicAeadConfigTest, WrappersRegistered) { function TEST_F (line 129) | TEST_F(DeterministicAeadConfigTest, RegisterFipsValidTemplates) { function TEST_F (line 148) | TEST_F(DeterministicAeadConfigTest, AesSivProtoParamsSerializationRe... function TEST_F (line 187) | TEST_F(DeterministicAeadConfigTest, AesSivProtoKeySerializationRegis... FILE: cc/daead/deterministic_aead_factory.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { FILE: cc/daead/deterministic_aead_factory.h function namespace (line 28) | namespace crypto { FILE: cc/daead/deterministic_aead_factory_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { class DeterministicAeadFactoryTest (line 47) | class DeterministicAeadFactoryTest : public ::testing::Test {} function TEST_F (line 49) | TEST_F(DeterministicAeadFactoryTest, testBasic) { function TEST_F (line 59) | TEST_F(DeterministicAeadFactoryTest, testPrimitive) { FILE: cc/daead/deterministic_aead_key.h function namespace (line 24) | namespace crypto { FILE: cc/daead/deterministic_aead_key_templates.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { function KeyTemplate (line 32) | KeyTemplate* NewAesSivKeyTemplate(int key_size_in_bytes) { function KeyTemplate (line 46) | const KeyTemplate& DeterministicAeadKeyTemplates::Aes256Siv() { FILE: cc/daead/deterministic_aead_key_templates.h function namespace (line 22) | namespace crypto { FILE: cc/daead/deterministic_aead_key_templates_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function TEST (line 37) | TEST(DeterministicAeadKeyTemplatesTest, testAesSivKeyTemplates) { FILE: cc/daead/deterministic_aead_parameters.h function namespace (line 22) | namespace crypto { FILE: cc/daead/deterministic_aead_wrapper.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function Validate (line 45) | util::Status Validate(PrimitiveSet* daead_set) { class DeterministicAeadSetWrapper (line 57) | class DeterministicAeadSetWrapper : public DeterministicAead { method DeterministicAeadSetWrapper (line 59) | explicit DeterministicAeadSetWrapper( FILE: cc/daead/deterministic_aead_wrapper.h function namespace (line 29) | namespace crypto { FILE: cc/daead/deterministic_aead_wrapper_test.cc type crypto (line 60) | namespace crypto { type tink (line 61) | namespace tink { class DeterministicAeadSetWrapperTest (line 64) | class DeterministicAeadSetWrapperTest : public ::testing::Test { method SetUp (line 66) | void SetUp() override { method TearDown (line 68) | void TearDown() override { function TEST_F (line 72) | TEST_F(DeterministicAeadSetWrapperTest, testBasic) { function PopulateKeyInfo (line 166) | KeysetInfo::KeyInfo PopulateKeyInfo(uint32_t key_id, function KeysetInfo (line 177) | KeysetInfo CreateTestKeysetInfo() { class DeterministicAeadSetWrapperWithMonitoringTest (line 192) | class DeterministicAeadSetWrapperWithMonitoringTest : public Test { method SetUp (line 196) | void SetUp() override { function TEST_F (line 238) | TEST_F(DeterministicAeadSetWrapperWithMonitoringTest, function TEST_F (line 283) | TEST_F(DeterministicAeadSetWrapperWithMonitoringTest, function TEST_F (line 337) | TEST_F(DeterministicAeadSetWrapperWithMonitoringTest, function TEST_F (line 381) | TEST_F(DeterministicAeadSetWrapperWithMonitoringTest, FILE: cc/daead/failing_daead.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { class AlwaysFailDeterministicAead (line 35) | class AlwaysFailDeterministicAead : public DeterministicAead { method AlwaysFailDeterministicAead (line 37) | explicit AlwaysFailDeterministicAead(std::string message) method EncryptDeterministically (line 40) | util::StatusOr EncryptDeterministically( method DecryptDeterministically (line 50) | util::StatusOr DecryptDeterministically( function CreateAlwaysFailingDeterministicAead (line 66) | std::unique_ptr CreateAlwaysFailingDeterministicA... FILE: cc/daead/failing_daead.h function namespace (line 25) | namespace crypto { FILE: cc/daead/failing_daead_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { function TEST (line 34) | TEST(AlwaysFailDeterministicAead, EncryptFails) { function TEST (line 44) | TEST(AlwaysFailDeterministicAead, EncryptFailsContainsMessage) { function TEST (line 55) | TEST(AlwaysFailDeterministicAead, DecryptFails) { function TEST (line 65) | TEST(AlwaysFailDeterministicAead, DecryptFailsContainsMessage) { FILE: cc/daead/internal/config_v0.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type internal (line 28) | namespace internal { function AddDeterministicAeadV0 (line 30) | util::Status AddDeterministicAeadV0(Configuration& config) { FILE: cc/daead/internal/config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/daead/internal/config_v0_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type internal (line 41) | namespace internal { function TEST (line 47) | TEST(DeterministicAeadV0Test, PrimitiveWrapper) { function TEST (line 57) | TEST(DeterministicAeadV0Test, KeyManager) { function TEST (line 75) | TEST(DeterministicAeadV0Test, GetPrimitive) { FILE: cc/daead/internal/key_gen_config_v0.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type internal (line 27) | namespace internal { function AddDeterministicAeadKeyGenV0 (line 29) | util::Status AddDeterministicAeadKeyGenV0(KeyGenConfiguration& con... FILE: cc/daead/internal/key_gen_config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/daead/key_gen_config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function KeyGenConfiguration (line 26) | const KeyGenConfiguration& KeyGenConfigDeterministicAeadV0() { FILE: cc/daead/key_gen_config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/daead/subtle/aead_or_daead.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type subtle (line 32) | namespace subtle { type EncryptFunctor (line 36) | struct EncryptFunctor { type DecryptFunctor (line 50) | struct DecryptFunctor { FILE: cc/daead/subtle/aead_or_daead.h function namespace (line 30) | namespace crypto { FILE: cc/daead/subtle/aead_or_daead_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type subtle (line 36) | namespace subtle { function EncryptThenDecrypt (line 44) | crypto::tink::util::Status EncryptThenDecrypt( function TEST (line 60) | TEST(AeadOrDaead, testWithAeadPrimitive) { function TEST (line 68) | TEST(AeadOrDaead, testWithDeterministicAeadPrimitive) { FILE: cc/deterministic_aead.h function namespace (line 25) | namespace crypto { FILE: cc/ec_point.h function namespace (line 22) | namespace crypto { FILE: cc/examples/aead/aead_cli.cc function ValidateParams (line 52) | void ValidateParams() { type tink_cc_examples (line 68) | namespace tink_cc_examples { function Status (line 71) | Status AeadCli(absl::string_view mode, const std::string& keyset_filen... function main (line 114) | int main(int argc, char** argv) { FILE: cc/examples/daead/deterministic_aead_cli.cc function ValidateParams (line 52) | void ValidateParams() { type tink_cc_examples (line 68) | namespace tink_cc_examples { function Status (line 71) | Status DeterministicAeadCli(absl::string_view mode, function main (line 115) | int main(int argc, char** argv) { FILE: cc/examples/digital_signatures/digital_signatures_cli.cc function ValidateParams (line 51) | void ValidateParams() { type tink_cc_examples (line 68) | namespace tink_cc_examples { function Status (line 71) | Status DigitalSignatureCli(absl::string_view mode, function main (line 117) | int main(int argc, char** argv) { FILE: cc/examples/hybrid_encryption/hybrid_cli.cc function ValidateParams (line 56) | void ValidateParams() { type tink_cc_examples (line 72) | namespace tink_cc_examples { function Status (line 74) | Status HybridCli(absl::string_view mode, const std::string& keyset_fil... function main (line 133) | int main(int argc, char** argv) { FILE: cc/examples/jwt/jwt_generate_public_jwk_set.cc function ValidateParams (line 44) | void ValidateParams() { type tink_cc_examples (line 55) | namespace tink_cc_examples { function Status (line 57) | Status JwtGeneratePublicJwkSet(const std::string& public_keyset_filename, function main (line 75) | int main(int argc, char** argv) { FILE: cc/examples/jwt/jwt_sign.cc function ValidateParams (line 51) | void ValidateParams() { type tink_cc_examples (line 64) | namespace tink_cc_examples { function Status (line 67) | Status JwtSign(const std::string& keyset_filename, absl::string_view a... function main (line 96) | int main(int argc, char** argv) { FILE: cc/examples/jwt/jwt_verify.cc function ValidateParams (line 50) | void ValidateParams() { type tink_cc_examples (line 63) | namespace tink_cc_examples { function Status (line 66) | Status JwtVerify(const std::string& jwk_set_filename, function main (line 97) | int main(int argc, char** argv) { FILE: cc/examples/key_derivation/key_derivation_cli.cc function ValidateParams (line 52) | void ValidateParams() { function Status (line 64) | Status VerifyDerivedAeadKeyset(const KeysetHandle& handle) { type tink_cc_examples (line 90) | namespace tink_cc_examples { function Status (line 92) | Status KeyDerivationCli(const std::string& keyset_filename, function main (line 129) | int main(int argc, char** argv) { FILE: cc/examples/mac/mac_cli.cc function ValidateParams (line 55) | void ValidateParams() { type tink_cc_examples (line 71) | namespace tink_cc_examples { function Status (line 74) | Status MacCli(absl::string_view mode, const std::string keyset_filename, function main (line 121) | int main(int argc, char** argv) { FILE: cc/examples/util/util.cc type tink_cc_examples (line 38) | namespace tink_cc_examples { function GetJsonKeysetReader (line 50) | StatusOr> GetJsonKeysetReader( function GetJsonKeysetWriter (line 57) | StatusOr> GetJsonKeysetWriter( function ReadJsonCleartextKeyset (line 66) | StatusOr> ReadJsonCleartextKeyset( function Status (line 74) | Status WriteJsonCleartextKeyset(const std::string& filename, function ReadFile (line 83) | StatusOr ReadFile(const std::string& filename) { function Status (line 95) | Status WriteToFile(const std::string& data_to_write, FILE: cc/examples/util/util.h function namespace (line 26) | namespace tink_cc_examples { FILE: cc/examples/walkthrough/create_keyset.cc type tink_walkthrough (line 28) | namespace tink_walkthrough { function CreateAead128GcmKeyset (line 38) | StatusOr> CreateAead128GcmKeyset() { FILE: cc/examples/walkthrough/create_keyset.h function namespace (line 24) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/create_keyset_test.cc type tink_walkthrough (line 33) | namespace tink_walkthrough { class CreateAead128GcmKeysetTest (line 42) | class CreateAead128GcmKeysetTest : public Test { method TearDown (line 44) | void TearDown() override { crypto::tink::Registry::Reset(); } function TEST_F (line 47) | TEST_F(CreateAead128GcmKeysetTest, function TEST_F (line 52) | TEST_F(CreateAead128GcmKeysetTest, CreateAead128GcmKeysetSucceeds) { FILE: cc/examples/walkthrough/load_cleartext_keyset.cc type tink_walkthrough (line 31) | namespace tink_walkthrough { function LoadKeyset (line 44) | StatusOr> LoadKeyset( FILE: cc/examples/walkthrough/load_cleartext_keyset.h function namespace (line 25) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/load_cleartext_keyset_test.cc type tink_walkthrough (line 33) | namespace tink_walkthrough { function TEST (line 57) | TEST(LoadKeysetTest, LoadKeysetFailsWithInvalidKeyset) { function TEST (line 62) | TEST(LoadKeysetTest, LoadKeysetSucceeds) { FILE: cc/examples/walkthrough/load_encrypted_keyset.cc type tink_walkthrough (line 33) | namespace tink_walkthrough { function LoadKeyset (line 51) | StatusOr> LoadKeyset( FILE: cc/examples/walkthrough/load_encrypted_keyset.h function namespace (line 26) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/load_encrypted_keyset_test.cc type tink_walkthrough (line 41) | namespace tink_walkthrough { class LoadKeysetTest (line 92) | class LoadKeysetTest : public Test { method SetUp (line 94) | void SetUp() override { function TEST_F (line 99) | TEST_F(LoadKeysetTest, LoadKeysetFailsWhenInvalidKeyset) { function TEST_F (line 111) | TEST_F(LoadKeysetTest, LoadKeysetSucceeds) { FILE: cc/examples/walkthrough/obtain_and_use_a_primitive.cc type tink_walkthrough (line 31) | namespace tink_walkthrough { function AeadEncrypt (line 43) | StatusOr AeadEncrypt(const KeysetHandle& keyset_handle, function AeadDecrypt (line 62) | StatusOr AeadDecrypt(const KeysetHandle& keyset_handle, FILE: cc/examples/walkthrough/obtain_and_use_a_primitive.h function namespace (line 26) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/obtain_and_use_a_primitive_test.cc type tink_walkthrough (line 33) | namespace tink_walkthrough { function TEST (line 57) | TEST(LoadKeysetTest, EncryptDecrypt) { FILE: cc/examples/walkthrough/test_util.cc type tink_walkthrough (line 30) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/test_util.h function namespace (line 28) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/write_cleartext_keyset.cc type tink_walkthrough (line 30) | namespace tink_walkthrough { function WriteKeyset (line 46) | crypto::tink::util::Status WriteKeyset( FILE: cc/examples/walkthrough/write_cleartext_keyset.h function namespace (line 25) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/write_cleartext_keyset_test.cc type tink_walkthrough (line 35) | namespace tink_walkthrough { function TEST (line 60) | TEST(WriteCleartextKeysetTest, WriteKeysetSerializesCorrectly) { FILE: cc/examples/walkthrough/write_keyset.cc type tink_walkthrough (line 34) | namespace tink_walkthrough { function WriteEncryptedKeyset (line 46) | crypto::tink::util::Status WriteEncryptedKeyset( FILE: cc/examples/walkthrough/write_keyset.h function namespace (line 26) | namespace tink_walkthrough { FILE: cc/examples/walkthrough/write_keyset_test.cc type tink_walkthrough (line 42) | namespace tink_walkthrough { class WriteKeysetTest (line 86) | class WriteKeysetTest : public testing::Test { method SetUp (line 88) | void SetUp() override { function TEST_F (line 93) | TEST_F(WriteKeysetTest, WriteEncryptedKeysetFailsWithNullOutputStream) { function TEST_F (line 109) | TEST_F(WriteKeysetTest, WriteEncryptedKeysetFailsWhenStreamFails) { function TEST_F (line 126) | TEST_F(WriteKeysetTest, WriteEncryptedKeysetWithValidInputs) { FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_dem_helper.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { class Cecpq2AeadHkdfDemHelperImpl (line 51) | class Cecpq2AeadHkdfDemHelperImpl : public Cecpq2AeadHkdfDemHelper { method Cecpq2AeadHkdfDemHelperImpl (line 53) | explicit Cecpq2AeadHkdfDemHelperImpl( method GetAeadOrDaead (line 57) | crypto::tink::util::StatusOr< method GetKeyMaterialSize (line 78) | crypto::tink::util::StatusOr GetKeyMaterialSize() const ... FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_dem_helper.h function namespace (line 30) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_dem_helper_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { function EncryptThenDecrypt (line 54) | crypto::tink::util::Status EncryptThenDecrypt( function TEST (line 69) | TEST(Cecpq2AeadHkdfDemHelperTest, InvalidKey) { function TEST (line 78) | TEST(Cecpq2AeadHkdfDemHelperTest, DemHelperWithAesGcmKeyType) { function TEST (line 106) | TEST(Cecpq2AeadHkdfDemHelperTest, DemHelperWithAesSivKeyType) { function TEST (line 136) | TEST(Cecpq2AeadHkdfDemHelperTest, DemHelperWithXchacha20Poly1305KeyT... function TEST (line 163) | TEST(Cecpq2AeadHkdfDemHelperTest, DemHelperKeyMaterialXChacha20Poly1... function TEST (line 183) | TEST(Cecpq2AeadHkdfDemHelperTest, DemHelperKeyMaterialAesGcm) { function TEST (line 203) | TEST(Cecpq2AeadHkdfDemHelperTest, DemHelperKeyMaterialAesSiv) { FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_private_key_manager.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function Status (line 50) | Status Cecpq2AeadHkdfPrivateKeyManager::ValidateKeyFormat( function Status (line 93) | Status Cecpq2AeadHkdfPrivateKeyManager::ValidateKey( FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_private_key_manager.h function namespace (line 38) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_private_key_manager_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function TEST (line 59) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, Basics) { function TEST (line 68) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateEmptyKey) { function Cecpq2AeadHkdfKeyFormat (line 74) | Cecpq2AeadHkdfKeyFormat CreateValidKeyFormat() { function TEST (line 86) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyFormat) { function TEST (line 92) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoPoint) { function TEST (line 100) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoDem) { function TEST (line 107) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoKemCurv... function TEST (line 115) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoKemHash) { function TEST (line 123) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, CreateKey) { function Cecpq2AeadHkdfPrivateKey (line 148) | Cecpq2AeadHkdfPrivateKey CreateValidKey() { function TEST (line 154) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyEmpty) { function TEST (line 160) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKey) { function TEST (line 165) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyWrongVersion) { function TEST (line 172) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyNoPoint) { function TEST (line 182) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyNoDem) { function TEST (line 192) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyNoKemCurve) { function TEST (line 202) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidateKeyNoKemHash) { function TEST (line 212) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, GetPublicKey) { function TEST (line 236) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, Create) { function TEST (line 262) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, CreateDifferentKey) { function TEST (line 288) | TEST(Cecpq2AeadHkdfPrivateKeyManagerTest, ValidatePrivateKeyVersion) { FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_public_key_manager.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { function Status (line 42) | Status Cecpq2AeadHkdfPublicKeyManager::ValidateParams( function Status (line 71) | Status Cecpq2AeadHkdfPublicKeyManager::ValidateKey( FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_public_key_manager.h function namespace (line 38) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/cecpq2_aead_hkdf_public_key_manager_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function TEST (line 52) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, Basics) { function TEST (line 61) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidateEmptyKey) { function Cecpq2AeadHkdfPublicKey (line 67) | Cecpq2AeadHkdfPublicKey CreatePublicKey() { function TEST (line 83) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidateParams) { function TEST (line 89) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidateKeyNoPoint) { function TEST (line 97) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidateKeyNoDem) { function TEST (line 104) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidateKeyNoKemCurve) { function TEST (line 111) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidateKeyNoKemHash) { function TEST (line 118) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidateGeneratedKey) { function TEST (line 123) | TEST(Cecpq2AeadHkdfPublicKeyManagerTest, ValidatePublicKeyVersion) { FILE: cc/experimental/pqcrypto/kem/cecpq2_hybrid_config.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function Cecpq2HybridConfigRegister (line 32) | util::Status Cecpq2HybridConfigRegister() { FILE: cc/experimental/pqcrypto/kem/cecpq2_hybrid_config.h function namespace (line 23) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/cecpq2_hybrid_config_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { class Cecpq2HybridConfigTest (line 52) | class Cecpq2HybridConfigTest : public ::testing::Test { method SetUp (line 54) | void SetUp() override { Registry::Reset(); } function TEST_F (line 57) | TEST_F(Cecpq2HybridConfigTest, Basic) { function TEST_F (line 83) | TEST_F(Cecpq2HybridConfigTest, EncryptWrapperRegistered) { function TEST_F (line 118) | TEST_F(Cecpq2HybridConfigTest, DecryptWrapperRegistered) { FILE: cc/experimental/pqcrypto/kem/cecpq2_hybrid_key_templates.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { function KeyTemplate (line 38) | KeyTemplate* NewCecpq2AeadHkdfKeyTemplate(EllipticCurveType curve_type, function KeyTemplate (line 63) | const KeyTemplate& Cecpq2HybridKeyTemplateX25519HkdfHmacSha256Aes256... function KeyTemplate (line 72) | const KeyTemplate& FILE: cc/experimental/pqcrypto/kem/cecpq2_hybrid_key_templates.h function namespace (line 22) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/cecpq2_hybrid_key_templates_test.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { class Cecpq2HybridKeyTemplatesTest (line 34) | class Cecpq2HybridKeyTemplatesTest : public ::testing::Test { method SetUpTestSuite (line 36) | static void SetUpTestSuite() { function TEST_F (line 42) | TEST_F(Cecpq2HybridKeyTemplatesTest, function TEST_F (line 52) | TEST_F(Cecpq2HybridKeyTemplatesTest, function TEST_F (line 62) | TEST_F(Cecpq2HybridKeyTemplatesTest, function TEST_F (line 72) | TEST_F(Cecpq2HybridKeyTemplatesTest, function TEST_F (line 85) | TEST_F(Cecpq2HybridKeyTemplatesTest, function TEST_F (line 99) | TEST_F(Cecpq2HybridKeyTemplatesTest, FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_aead_hkdf_hybrid_decrypt.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function Validate (line 44) | util::Status Validate( FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_aead_hkdf_hybrid_decrypt.h function namespace (line 32) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_aead_hkdf_hybrid_decrypt_test.cc type crypto (line 65) | namespace crypto { type tink (line 66) | namespace tink { class Cecpq2AeadHkdfHybridDecryptTest (line 69) | class Cecpq2AeadHkdfHybridDecryptTest : public ::testing::Test { type CommonHybridKeyParams (line 71) | struct CommonHybridKeyParams { method GetCommonHybridKeyParamsList (line 77) | std::vector GetCommonHybridKeyParamsList() { method CheckKeyValidity (line 94) | util::Status CheckKeyValidity( function CreateValidKey (line 186) | google::crypto::tink::Cecpq2AeadHkdfPrivateKey CreateValidKey() { function TEST_F (line 235) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, ValidKey) { function TEST_F (line 241) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, InvalidKeyNoFieldsSet) { function TEST_F (line 249) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, InvalidKeyX25519PrivKeyField... function TEST_F (line 258) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, InvalidKeyX25519PubKeyFieldM... function TEST_F (line 267) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, InvalidKeyHrssPrivKeyFieldMi... function TEST_F (line 276) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, InvalidKeyHrssPubKeyFieldMis... function TEST_F (line 285) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, InvalidKeyWrongEcType) { function TEST_F (line 298) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, InvalidKeyUnsupportedDem) { function TEST_F (line 319) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, AesGcmHybridDecryption) { function TEST_F (line 378) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, XChaCha20Poly1305HybridDecry... function TEST_F (line 435) | TEST_F(Cecpq2AeadHkdfHybridDecryptTest, AesSivHybridDecryption) { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_aead_hkdf_hybrid_encrypt.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function Validate (line 43) | util::Status Validate( FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_aead_hkdf_hybrid_encrypt.h function namespace (line 32) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_aead_hkdf_hybrid_encrypt_test.cc type crypto (line 51) | namespace crypto { type tink (line 52) | namespace tink { function CreateValidKey (line 55) | google::crypto::tink::Cecpq2AeadHkdfPublicKey CreateValidKey() { function TEST (line 74) | TEST(Cecpq2AeadHkdfHybridEncryptTest, ValidKey) { function TEST (line 80) | TEST(Cecpq2AeadHkdfHybridEncryptTest, InvalidKeyNoFieldSet) { function TEST (line 88) | TEST(Cecpq2AeadHkdfHybridEncryptTest, InvalidKeySomeFieldsSet) { function TEST (line 97) | TEST(Cecpq2AeadHkdfHybridEncryptTest, InvalidKeyUnsupportedEcType) { function TEST (line 107) | TEST(Cecpq2AeadHkdfHybridEncryptTest, InvalidKeyUnsupportedDemKeyTyp... function TEST (line 123) | TEST(Cecpq2AeadHkdfHybridEncryptTest, Basic) { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_hkdf_recipient_kem_boringssl.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { type HRSS_private_key (line 113) | struct HRSS_private_key type HRSS_private_key (line 114) | struct HRSS_private_key type HRSS_public_key (line 115) | struct HRSS_public_key FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_hkdf_recipient_kem_boringssl.h function namespace (line 33) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_hkdf_recipient_kem_boringssl_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { function TEST (line 129) | TEST(Cecpq2HkdfRecipientKemBoringSslTest, TestUnknownCurve) { function TEST (line 152) | TEST(Cecpq2HkdfRecipientKemBoringSslTest, TestUnsupportedCurve) { function TEST (line 174) | TEST(Cecpq2HkdfRecipientKemBoringSslTest, TestNotPostQuantumSecure... function TEST (line 203) | TEST(Cecpq2HkdfRecipientKemBoringSslTest, TestRecipientFlowSuccess) { function TEST (line 232) | TEST(Cecpq2HkdfRecipientKemBoringSslTest, TestRecipientFlowFailure) { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_hkdf_sender_kem_boringssl.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { type HRSS_public_key (line 143) | struct HRSS_public_key FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_hkdf_sender_kem_boringssl.h function namespace (line 34) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_hkdf_sender_kem_boringssl_test.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { type subtle (line 48) | namespace subtle { function TEST (line 54) | TEST(Cecpq2HkdfSenderKemBoringSslTest, TestUnknownCurve) { function TEST (line 80) | TEST(Cecpq2HkdfSenderKemBoringSslTest, TestUnsupportedCurve) { function TEST (line 104) | TEST(Cecpq2HkdfSenderKemBoringSslTest, TestNotPostQuantumSecureKey... function TEST (line 140) | TEST(Cecpq2HkdfSenderKemBoringSslTest, TestGenerateKey) { function TEST (line 178) | TEST(Cecpq2HkdfSenderKemBoringSslTest, TestSenderRecipientFullFlow... function TEST (line 235) | TEST(Cecpq2HkdfSenderKemBoringSslTest, TestFullFlowErasedCallersPu... function TEST (line 295) | TEST(Cecpq2HkdfSenderKemBoringSslTest, TestSenderRecipientFullFlow... FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_subtle_boringssl_util.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type pqc (line 32) | namespace pqc { function GenerateHrssKeyPair (line 34) | crypto::tink::util::StatusOr function GenerateCecpq2Keypair (line 58) | crypto::tink::util::StatusOr FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_subtle_boringssl_util.h function namespace (line 27) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/subtle/cecpq2_subtle_boringssl_util_test.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type pqc (line 31) | namespace pqc { function TEST (line 108) | TEST(CreatesNewCecpq2KeyPairTest, GeneratesDifferentKeysEveryTime) { function TEST (line 130) | TEST(CreatesNewCecpq2KeyPairTest, SuccessfullHrssKeyGen) { FILE: cc/experimental/pqcrypto/kem/util/test_util.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type test (line 41) | namespace test { function GetCecpq2AeadHkdfTestKey (line 43) | google::crypto::tink::Cecpq2AeadHkdfPrivateKey GetCecpq2AeadHkdfTe... function GetCecpq2AesGcmHkdfTestKey (line 80) | google::crypto::tink::Cecpq2AeadHkdfPrivateKey GetCecpq2AesGcmHkdf... function GetCecpq2AesCtrHmacHkdfTestKey (line 98) | google::crypto::tink::Cecpq2AeadHkdfPrivateKey GetCecpq2AesCtrHmac... function GetCecpq2XChaCha20Poly1305HkdfTestKey (line 130) | google::crypto::tink::Cecpq2AeadHkdfPrivateKey FILE: cc/experimental/pqcrypto/kem/util/test_util.h function namespace (line 24) | namespace crypto { FILE: cc/experimental/pqcrypto/kem/util/test_util_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { type CommonHybridKeyParams (line 43) | struct CommonHybridKeyParams { function GetCommonHybridKeyParamsList (line 49) | std::vector GetCommonHybridKeyParamsList() { function TEST (line 65) | TEST(TestUtilTest, GetCecpq2AeadHkdfTestKeyBasics) { function TEST (line 80) | TEST(TestUtilTest, GetCecpq2AesGcmHkdfTestKeyBasics) { function TEST (line 96) | TEST(TestUtilTest, GetCecpq2AesCtrHmacHkdfTestKeyBasics) { function TEST (line 121) | TEST(TestUtilTest, GetCecpq2XChaCha20Poly1305HkdfTestKeyBasics) { FILE: cc/experimental/pqcrypto/signature/dilithium_key_template.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function KeyTemplate (line 46) | KeyTemplate* NewDilithiumKeyTemplate(int32_t key_size, FILE: cc/experimental/pqcrypto/signature/dilithium_key_template.h function namespace (line 22) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/dilithium_key_template_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type DilithiumKeyTemplateTestCase (line 57) | struct DilithiumKeyTemplateTestCase { function TEST_P (line 67) | TEST_P(DilithiumKeyTemplateTest, CheckDilithiumInitialization) { function TEST_P (line 76) | TEST_P(DilithiumKeyTemplateTest, ValidateKeyFormat) { function TEST_P (line 88) | TEST_P(DilithiumKeyTemplateTest, SameReference) { function TEST_P (line 95) | TEST_P(DilithiumKeyTemplateTest, KeyManagerCompatibility) { FILE: cc/experimental/pqcrypto/signature/dilithium_sign_key_manager.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { function Status (line 98) | Status DilithiumSignKeyManager::ValidateKey( function Status (line 112) | Status DilithiumSignKeyManager::ValidateKeyFormat( FILE: cc/experimental/pqcrypto/signature/dilithium_sign_key_manager.h function namespace (line 38) | namespace crypto { function override (line 78) | const override { FILE: cc/experimental/pqcrypto/signature/dilithium_sign_key_manager_test.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { type DilithiumTestCase (line 67) | struct DilithiumTestCase { function CreateValidKeyFormat (line 77) | StatusOr CreateValidKeyFormat( function TEST (line 87) | TEST(DilithiumSignKeyManagerTest, Basic) { function TEST_P (line 95) | TEST_P(DilithiumSignKeyManagerTest, ValidateKeyFormat) { function TEST_P (line 105) | TEST_P(DilithiumSignKeyManagerTest, PrivateKeyWrongVersion) { function TEST_P (line 120) | TEST_P(DilithiumSignKeyManagerTest, CreateKey) { function TEST_P (line 138) | TEST_P(DilithiumSignKeyManagerTest, CreateKeyValid) { function TEST_P (line 151) | TEST_P(DilithiumSignKeyManagerTest, CreateKeyAlwaysNew) { function TEST_P (line 169) | TEST_P(DilithiumSignKeyManagerTest, GetPublicKey) { function TEST_P (line 190) | TEST_P(DilithiumSignKeyManagerTest, Create) { function TEST_P (line 220) | TEST_P(DilithiumSignKeyManagerTest, CreateDifferentKey) { FILE: cc/experimental/pqcrypto/signature/dilithium_verify_key_manager.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { function Status (line 67) | Status DilithiumVerifyKeyManager::ValidateKey( function Status (line 81) | Status DilithiumVerifyKeyManager::ValidateParams( FILE: cc/experimental/pqcrypto/signature/dilithium_verify_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/dilithium_verify_key_manager_test.cc type crypto (line 50) | namespace crypto { type tink (line 51) | namespace tink { type DilithiumTestCase (line 67) | struct DilithiumTestCase { function CreateValidPrivateKey (line 77) | StatusOr CreateValidPrivateKey( function CreateValidPublicKey (line 88) | StatusOr CreateValidPublicKey( function TEST (line 97) | TEST(DilithiumVerifyKeyManagerTest, Basics) { function TEST (line 105) | TEST(DilithiumVerifyKeyManagerTest, ValidateEmptyKey) { function TEST_P (line 110) | TEST_P(DilithiumVerifyKeyManagerTest, InvalidParams) { function TEST_P (line 121) | TEST_P(DilithiumVerifyKeyManagerTest, PublicKeyValid) { function TEST_P (line 131) | TEST_P(DilithiumVerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST_P (line 143) | TEST_P(DilithiumVerifyKeyManagerTest, PublicKeyWrongKeyLength) { function TEST_P (line 158) | TEST_P(DilithiumVerifyKeyManagerTest, Create) { function TEST_P (line 189) | TEST_P(DilithiumVerifyKeyManagerTest, CreateDifferentPublicKey) { FILE: cc/experimental/pqcrypto/signature/falcon_key_template.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function NewFalconKeyTemplate (line 38) | std::unique_ptr NewFalconKeyTemplate(int32_t key_size) { FILE: cc/experimental/pqcrypto/signature/falcon_key_template.h function namespace (line 22) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/falcon_key_template_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type FalconTestCase (line 47) | struct FalconTestCase { function TEST_P (line 55) | TEST_P(FalconKeyTemplateTest, CheckKeyTemplateValid) { function TEST_P (line 69) | TEST_P(FalconKeyTemplateTest, SameReference) { function TEST_P (line 76) | TEST_P(FalconKeyTemplateTest, KeyManagerCompatibility) { FILE: cc/experimental/pqcrypto/signature/falcon_sign_key_manager.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function Status (line 84) | Status FalconSignKeyManager::ValidateKey(const FalconPrivateKey& key... function Status (line 98) | Status FalconSignKeyManager::ValidateKeyFormat( FILE: cc/experimental/pqcrypto/signature/falcon_sign_key_manager.h function namespace (line 38) | namespace crypto { function override (line 78) | const override { FILE: cc/experimental/pqcrypto/signature/falcon_sign_key_manager_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type FalconTestCase (line 53) | struct FalconTestCase { function CreateValidKeyFormat (line 62) | StatusOr CreateValidKeyFormat(int32_t private_key_s... function TEST (line 69) | TEST(FalconSignKeyManagerTest, Basic) { function TEST_P (line 77) | TEST_P(FalconSignKeyManagerTest, ValidKeyFormat) { function TEST (line 87) | TEST(FalconSignKeyManagerTest, InvalidKeyFormat) { function TEST_P (line 95) | TEST_P(FalconSignKeyManagerTest, CreateKeyValid) { function TEST_P (line 112) | TEST_P(FalconSignKeyManagerTest, PrivateKeyWrongVersion) { function TEST_P (line 127) | TEST_P(FalconSignKeyManagerTest, CreateKeyAlwaysNew) { function TEST_P (line 145) | TEST_P(FalconSignKeyManagerTest, GetPublicKey) { function TEST_P (line 165) | TEST_P(FalconSignKeyManagerTest, CreateValid) { function TEST_P (line 195) | TEST_P(FalconSignKeyManagerTest, CreateBadPublicKey) { FILE: cc/experimental/pqcrypto/signature/falcon_verify_key_manager.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function Status (line 56) | Status FalconVerifyKeyManager::ValidateKey(const FalconPublicKey& ke... FILE: cc/experimental/pqcrypto/signature/falcon_verify_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/falcon_verify_key_manager_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type FalconTestCase (line 53) | struct FalconTestCase { function CreateValidPrivateKey (line 62) | StatusOr CreateValidPrivateKey(int32_t private_key... function CreateValidPublicKey (line 70) | StatusOr CreateValidPublicKey(int32_t private_key_s... function TEST (line 78) | TEST(FalconVerifyKeyManagerTest, Basics) { function TEST (line 86) | TEST(FalconVerifyKeyManagerTest, ValidateEmptyKey) { function TEST_P (line 91) | TEST_P(FalconVerifyKeyManagerTest, PublicKeyValid) { function TEST_P (line 101) | TEST_P(FalconVerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST_P (line 112) | TEST_P(FalconVerifyKeyManagerTest, Create) { function TEST_P (line 141) | TEST_P(FalconVerifyKeyManagerTest, CreateInvalidPublicKey) { function TEST_P (line 160) | TEST_P(FalconVerifyKeyManagerTest, CreateDifferentPublicKey) { FILE: cc/experimental/pqcrypto/signature/signature_config.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function PqSignatureConfigRegister (line 37) | util::Status PqSignatureConfigRegister() { FILE: cc/experimental/pqcrypto/signature/signature_config.h function namespace (line 22) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/signature_config_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { class PcqSignatureConfigTest (line 42) | class PcqSignatureConfigTest : public ::testing::Test { method SetUp (line 44) | void SetUp() override { Registry::Reset(); } function TEST_F (line 47) | TEST_F(PcqSignatureConfigTest, CheckDilithium) { function TEST_F (line 71) | TEST_F(PcqSignatureConfigTest, CheckSphincs) { function TEST_F (line 95) | TEST_F(PcqSignatureConfigTest, CheckFalcon) { FILE: cc/experimental/pqcrypto/signature/signature_config_util_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { class PcqSignatureConfigTest (line 48) | class PcqSignatureConfigTest : public ::testing::Test { method SetUp (line 50) | void SetUp() override { Registry::Reset(); } function TEST_F (line 53) | TEST_F(PcqSignatureConfigTest, CheckStatus) { function TEST_F (line 63) | TEST_F(PcqSignatureConfigTest, PublicKeySignWrapperRegistered) { function TEST_F (line 99) | TEST_F(PcqSignatureConfigTest, PublicKeyVerifyWrapperRegistered) { FILE: cc/experimental/pqcrypto/signature/slh_dsa_parameters.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { FILE: cc/experimental/pqcrypto/signature/slh_dsa_parameters.h function class (line 32) | class SlhDsaParameters : public SignatureParameters { FILE: cc/experimental/pqcrypto/signature/slh_dsa_parameters_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type VariantTestCase (line 36) | struct VariantTestCase { function TEST_P (line 50) | TEST_P(SlhDsaParametersTest, CreateSlhDsa128Sha2SmallSignatureWorks) { function TEST (line 66) | TEST(SlhDsaParametersTest, CreateWithInvalidVariantFails) { function TEST (line 77) | TEST(SlhDsaParametersTest, CreateWithInvalidHashTypeFails) { function TEST (line 88) | TEST(SlhDsaParametersTest, CreateWithUnsupportedHashTypeFails) { function TEST (line 98) | TEST(SlhDsaParametersTest, CreateWithInvalidSignatureTypeFails) { function TEST (line 109) | TEST(SlhDsaParametersTest, CreateWithUnsupportedSignatureTypeFails) { function TEST (line 119) | TEST(SlhDsaParametersTest, CreateWithInvalidKeySizeFails) { function TEST (line 129) | TEST(SlhDsaParametersTest, CreateWithUnsupportedKeySizeFails) { function TEST (line 139) | TEST(SlhDsaParametersTest, CopyConstructor) { function TEST (line 157) | TEST(SlhDsaParametersTest, CopyAssignment) { function TEST_P (line 174) | TEST_P(SlhDsaParametersTest, ParametersEquals) { function TEST (line 193) | TEST(SlhDsaParametersTest, DifferentVariantNotEqual) { FILE: cc/experimental/pqcrypto/signature/slh_dsa_private_key.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { FILE: cc/experimental/pqcrypto/signature/slh_dsa_private_key.h function namespace (line 27) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/slh_dsa_private_key_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type TestCase (line 49) | struct TestCase { function TEST_P (line 65) | TEST_P(SlhDsaPrivateKeyTest, CreateSucceeds) { function TEST (line 101) | TEST(SlhDsaPrivateKeyTest, CreateWithInvalidPrivateKeyLengthFails) { function TEST (line 125) | TEST(SlhDsaPrivateKeyTest, CreateWithMismatchedPairFails) { function TEST (line 161) | TEST(SlhDsaPrivateKeyTest, CreateWithModifiedPrivateKeyFails) { function TEST_P (line 196) | TEST_P(SlhDsaPrivateKeyTest, KeyEquals) { function TEST (line 234) | TEST(SlhDsaPrivateKeyTest, DifferentPublicKeyNotEqual) { FILE: cc/experimental/pqcrypto/signature/slh_dsa_proto_serialization.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function ToVariant (line 74) | util::StatusOr ToVariant( function ToOutputPrefixType (line 87) | util::StatusOr ToOutputPrefixType( function ToHashType (line 100) | util::StatusOr ToHashType( function ToProtoHashType (line 113) | util::StatusOr ToProtoHashType( function ToSignatureType (line 126) | util::StatusOr ToSignatureType( function ToProtoSignatureType (line 140) | util::StatusOr ToProtoSignatureType( function ToParameters (line 153) | util::StatusOr ToParameters( function FromParameters (line 177) | util::StatusOr FromParameters( function ParseParameters (line 200) | util::StatusOr ParseParameters( function ParsePublicKey (line 227) | util::StatusOr ParsePublicKey( function ParsePrivateKey (line 258) | util::StatusOr ParsePrivateKey( function SerializeParameters (line 298) | util::StatusOr SerializePara... function SerializePublicKey (line 319) | util::StatusOr SerializePublicKey( function SerializePrivateKey (line 344) | util::StatusOr SerializePrivateKey( function SlhDsaProtoParametersParserImpl (line 386) | SlhDsaProtoParametersParserImpl& SlhDsaProtoParametersParser() { function SlhDsaProtoParametersSerializerImpl (line 392) | SlhDsaProtoParametersSerializerImpl& SlhDsaProtoParametersSerializer... function SlhDsaProtoPublicKeyParserImpl (line 398) | SlhDsaProtoPublicKeyParserImpl& SlhDsaProtoPublicKeyParser() { function SlhDsaProtoPublicKeySerializerImpl (line 404) | SlhDsaProtoPublicKeySerializerImpl& SlhDsaProtoPublicKeySerializer() { function SlhDsaProtoPrivateKeyParserImpl (line 410) | SlhDsaProtoPrivateKeyParserImpl& SlhDsaProtoPrivateKeyParser() { function SlhDsaProtoPrivateKeySerializerImpl (line 416) | SlhDsaProtoPrivateKeySerializerImpl& SlhDsaProtoPrivateKeySerializer... function RegisterSlhDsaProtoSerialization (line 424) | util::Status RegisterSlhDsaProtoSerialization() { FILE: cc/experimental/pqcrypto/signature/slh_dsa_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/slh_dsa_proto_serialization_test.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { type TestCase (line 74) | struct TestCase { class SlhDsaProtoSerializationTest (line 81) | class SlhDsaProtoSerializationTest : public TestWithParam { method SlhDsaProtoSerializationTest (line 83) | SlhDsaProtoSerializationTest() { function TEST_F (line 88) | TEST_F(SlhDsaProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 102) | TEST_P(SlhDsaProtoSerializationTest, function TEST_F (line 137) | TEST_F(SlhDsaProtoSerializationTest, function TEST_F (line 153) | TEST_F(SlhDsaProtoSerializationTest, ParseParametersWithInvalidVersi... function TEST_F (line 177) | TEST_F(SlhDsaProtoSerializationTest, function TEST_F (line 197) | TEST_F(SlhDsaProtoSerializationTest, function TEST_F (line 222) | TEST_F(SlhDsaProtoSerializationTest, ParseParametersWithUnkownSigTyp... function TEST_F (line 247) | TEST_F(SlhDsaProtoSerializationTest, ParseParametersWithUnkownHashTy... function TEST_P (line 271) | TEST_P(SlhDsaProtoSerializationTest, function TEST_P (line 308) | TEST_P(SlhDsaProtoSerializationTest, ParsePublicKeyWorks) { function TEST_F (line 353) | TEST_F(SlhDsaProtoSerializationTest, function TEST_F (line 375) | TEST_F(SlhDsaProtoSerializationTest, ParsePublicKeyWithInvalidVersio... function TEST_P (line 406) | TEST_P(SlhDsaProtoSerializationTest, SerializePublicKeyWorks) { function TEST_P (line 454) | TEST_P(SlhDsaProtoSerializationTest, ParsePrivateKeyWorks) { function TEST_F (line 520) | TEST_F(SlhDsaProtoSerializationTest, ParsePrivateKeyWithInvalidSeria... function TEST_F (line 541) | TEST_F(SlhDsaProtoSerializationTest, ParsePrivateKeyWithInvalidVersi... function TEST_F (line 585) | TEST_F(SlhDsaProtoSerializationTest, ParsePrivateKeyNoSecretKeyAcces... function TEST_P (line 627) | TEST_P(SlhDsaProtoSerializationTest, SerializePrivateKey) { function TEST_F (line 692) | TEST_F(SlhDsaProtoSerializationTest, SerializePrivateKeyNoSecretKeyA... FILE: cc/experimental/pqcrypto/signature/slh_dsa_public_key.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function ComputeOutputPrefix (line 37) | util::StatusOr ComputeOutputPrefix( FILE: cc/experimental/pqcrypto/signature/slh_dsa_public_key.h function namespace (line 31) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/slh_dsa_public_key_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type TestCase (line 42) | struct TestCase { function TEST_P (line 58) | TEST_P(SlhDsaPublicKeyTest, CreatePublicKeyWorks) { function TEST (line 79) | TEST(SlhDsaPublicKeyTest, CreateWithInvalidPublicKeyLengthFails) { function TEST (line 96) | TEST(SlhDsaPublicKeyTest, CreateKeyWithNoIdRequirementWithTinkParams... function TEST (line 114) | TEST(SlhDsaPublicKeyTest, CreateKeyWithIdRequirementWithNoPrefixPara... function TEST_P (line 133) | TEST_P(SlhDsaPublicKeyTest, PublicKeyEquals) { function TEST (line 159) | TEST(SlhDsaPublicKeyTest, DifferentPublicKeyBytesNotEqual) { function TEST (line 185) | TEST(SlhDsaPublicKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/experimental/pqcrypto/signature/sphincs_key_template.cc type crypto (line 65) | namespace crypto { type tink (line 66) | namespace tink { function KeyTemplate (line 78) | KeyTemplate* NewSphincsKeyTemplate(int32_t private_key_size, FILE: cc/experimental/pqcrypto/signature/sphincs_key_template.h function namespace (line 22) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/sphincs_key_template_test.cc type crypto (line 75) | namespace crypto { type tink (line 76) | namespace tink { type SphincsTestCase (line 89) | struct SphincsTestCase { function TEST_P (line 100) | TEST_P(SphincsKeyTemplateTest, CheckKeyTemplateValid) { function TEST_P (line 117) | TEST_P(SphincsKeyTemplateTest, SameReference) { function TEST_P (line 124) | TEST_P(SphincsKeyTemplateTest, KeyManagerCompatibility) { FILE: cc/experimental/pqcrypto/signature/sphincs_sign_key_manager.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function Status (line 102) | Status SphincsSignKeyManager::ValidateKey(const SphincsPrivateKey& k... function Status (line 116) | Status SphincsSignKeyManager::ValidateKeyFormat( FILE: cc/experimental/pqcrypto/signature/sphincs_sign_key_manager.h function namespace (line 38) | namespace crypto { function override (line 78) | const override { FILE: cc/experimental/pqcrypto/signature/sphincs_sign_key_manager_test.cc type crypto (line 80) | namespace crypto { type tink (line 81) | namespace tink { type SphincsTestCase (line 100) | struct SphincsTestCase { function CreateValidKeyFormat (line 112) | StatusOr CreateValidKeyFormat(int32_t private_key_... function TEST (line 126) | TEST(SphincsSignKeyManagerTest, Basic) { function TEST_P (line 134) | TEST_P(SphincsSignKeyManagerTest, ValidKeyFormat) { function TEST (line 145) | TEST(SphincsSignKeyManagerTest, InvalidKeyFormat) { function TEST_P (line 156) | TEST_P(SphincsSignKeyManagerTest, CreateKeyValid) { function TEST_P (line 174) | TEST_P(SphincsSignKeyManagerTest, PrivateKeyWrongVersion) { function TEST (line 190) | TEST(SphincsSignKeyManagerTest, CreateKeyInvalidParams) { function TEST_P (line 202) | TEST_P(SphincsSignKeyManagerTest, CreateKeyAlwaysNew) { function TEST_P (line 221) | TEST_P(SphincsSignKeyManagerTest, GetPublicKey) { function TEST_P (line 243) | TEST_P(SphincsSignKeyManagerTest, CreateValid) { function TEST_P (line 279) | TEST_P(SphincsSignKeyManagerTest, CreateBadPublicKey) { FILE: cc/experimental/pqcrypto/signature/sphincs_verify_key_manager.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function Status (line 64) | Status SphincsVerifyKeyManager::ValidateKey(const SphincsPublicKey& ... function Status (line 78) | Status SphincsVerifyKeyManager::ValidateParams( FILE: cc/experimental/pqcrypto/signature/sphincs_verify_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/sphincs_verify_key_manager_test.cc type crypto (line 80) | namespace crypto { type tink (line 81) | namespace tink { type SphincsTestCase (line 98) | struct SphincsTestCase { function CreateValidPrivateKey (line 110) | StatusOr CreateValidPrivateKey(int32_t private_ke... function CreateValidPublicKey (line 125) | StatusOr CreateValidPublicKey(int32_t private_key_... function TEST (line 136) | TEST(SphincsVerifyKeyManagerTest, Basics) { function TEST (line 144) | TEST(SphincsVerifyKeyManagerTest, ValidateEmptyKey) { function TEST_P (line 149) | TEST_P(SphincsVerifyKeyManagerTest, InvalidParam) { function TEST_P (line 162) | TEST_P(SphincsVerifyKeyManagerTest, PublicKeyValid) { function TEST (line 173) | TEST(SphincsVerifyKeyManagerTest, PublicKeyInvalidParams) { function TEST_P (line 181) | TEST_P(SphincsVerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST_P (line 193) | TEST_P(SphincsVerifyKeyManagerTest, Create) { function TEST_P (line 229) | TEST_P(SphincsVerifyKeyManagerTest, CreateInvalidPublicKey) { function TEST_P (line 249) | TEST_P(SphincsVerifyKeyManagerTest, CreateDifferentPublicKey) { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_avx2_sign.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { type subtle (line 48) | namespace subtle { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_avx2_sign.h function namespace (line 31) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_avx2_sign_test.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type subtle (line 49) | namespace subtle { type DilithiumTestCase (line 52) | struct DilithiumTestCase { function TEST (line 65) | TEST(DilithiumAvx2SignTest, InvalidPrivateKeys) { function TEST_P (line 88) | TEST_P(DilithiumAvx2SignTest, SignatureLength) { function TEST_P (line 118) | TEST_P(DilithiumAvx2SignTest, Determinism) { function TEST_P (line 163) | TEST_P(DilithiumAvx2SignTest, FipsMode) { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_avx2_verify.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { type subtle (line 48) | namespace subtle { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_avx2_verify.h function namespace (line 30) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_avx2_verify_test.cc type crypto (line 51) | namespace crypto { type tink (line 52) | namespace tink { type subtle (line 53) | namespace subtle { type DilithiumTestCase (line 56) | struct DilithiumTestCase { function TEST (line 68) | TEST(DilithiumAvx2VerifyTest, InvalidPublicKeys) { function TEST_P (line 97) | TEST_P(DilithiumAvx2VerifyTest, BasicSignVerify) { function TEST_P (line 132) | TEST_P(DilithiumAvx2VerifyTest, FailsWithWrongMessage) { function TEST_P (line 167) | TEST_P(DilithiumAvx2VerifyTest, FailsWithWrongSignature) { function TEST_P (line 203) | TEST_P(DilithiumAvx2VerifyTest, FailsWithByteFlipped) { function TEST_P (line 241) | TEST_P(DilithiumAvx2VerifyTest, FipsMode) { type TestVector (line 260) | struct TestVector { function TEST (line 268) | TEST(DilithiumAvx2VerifyTest, Vectors) { function TEST (line 879) | TEST(DilithiumAvx2VerifyTest, AesVectors) { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_key.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { function DilithiumSeedExpansion (line 162) | const DilithiumSeedExpansion& DilithiumPrivateKeyPqclean::GetSeedE... function DilithiumSeedExpansion (line 178) | const DilithiumSeedExpansion& DilithiumPublicKeyPqclean::GetSeedEx... FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_key.h function namespace (line 32) | namespace subtle { FILE: cc/experimental/pqcrypto/signature/subtle/dilithium_key_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { type DilithiumTestCase (line 47) | struct DilithiumTestCase { function TEST_P (line 56) | TEST_P(DilithiumKeyTest, DilithiumKeysLength) { function TEST_P (line 72) | TEST_P(DilithiumKeyTest, DifferentContent) { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_sign.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_sign.h function namespace (line 31) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_sign_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { type FalconTestCase (line 47) | struct FalconTestCase { function TEST_P (line 55) | TEST_P(FalconSignTest, ValidSignatureLength) { function TEST_P (line 82) | TEST_P(FalconSignTest, NonDeterminism) { function TEST_P (line 118) | TEST_P(FalconSignTest, FipsMode) { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_subtle_utils.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { function GenerateFalconKeyPair (line 63) | crypto::tink::util::StatusOr GenerateFalconKeyPair( function ValidateFalconPrivateKeySize (line 115) | crypto::tink::util::Status ValidateFalconPrivateKeySize(int32_t ke... function ValidateFalconPublicKeySize (line 129) | crypto::tink::util::Status ValidateFalconPublicKeySize(int32_t key... FILE: cc/experimental/pqcrypto/signature/subtle/falcon_subtle_utils.h function namespace (line 31) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_subtle_utils_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type subtle (line 35) | namespace subtle { type FalconTestCase (line 41) | struct FalconTestCase { function TEST_P (line 49) | TEST_P(FalconUtilsTest, FalconKeyGeneration) { function TEST_P (line 64) | TEST_P(FalconUtilsTest, DifferentContent) { function TEST (line 77) | TEST(FalconUtilsTest, ValidPrivateKeySize) { function TEST (line 82) | TEST(FalconUtilsTest, InvalidPrivateKeySize) { function TEST (line 94) | TEST(FalconUtilsTest, ValidPublicKeySize) { function TEST (line 99) | TEST(FalconUtilsTest, InvalidPublicKeySize) { function TEST (line 111) | TEST(FalconUtilsTest, InvalidPrivateKey) { function TEST (line 120) | TEST(FalconUtilsTest, InvalidPubliceKey) { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_verify.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_verify.h function namespace (line 32) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/falcon_verify_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type subtle (line 46) | namespace subtle { type FalconTestCase (line 53) | struct FalconTestCase { function TEST_P (line 61) | TEST_P(FalconVerifyTest, BasicSignVerify) { function TEST_P (line 93) | TEST_P(FalconVerifyTest, FailsWithWrongSignature) { function TEST_P (line 126) | TEST_P(FalconVerifyTest, FailsWithWrongMessage) { function TEST_P (line 158) | TEST_P(FalconVerifyTest, FailsWithBytesFlipped) { function TEST_P (line 193) | TEST_P(FalconVerifyTest, FipsMode) { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_helper_pqclean.cc type crypto (line 69) | namespace crypto { type tink (line 70) | namespace tink { type subtle (line 71) | namespace subtle { class SphincsHaraka128FRobustPqclean (line 73) | class SphincsHaraka128FRobustPqclean : public SphincsHelperPqclean { method SphincsHaraka128FRobustPqclean (line 75) | SphincsHaraka128FRobustPqclean() method Sign (line 82) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 88) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 94) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka128SRobustPqclean (line 99) | class SphincsHaraka128SRobustPqclean : public SphincsHelperPqclean { method SphincsHaraka128SRobustPqclean (line 101) | SphincsHaraka128SRobustPqclean() method Sign (line 108) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 114) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 120) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka128FSimplePqclean (line 125) | class SphincsHaraka128FSimplePqclean : public SphincsHelperPqclean { method SphincsHaraka128FSimplePqclean (line 127) | SphincsHaraka128FSimplePqclean() method Sign (line 134) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 140) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 146) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka128SSimplePqclean (line 151) | class SphincsHaraka128SSimplePqclean : public SphincsHelperPqclean { method SphincsHaraka128SSimplePqclean (line 153) | SphincsHaraka128SSimplePqclean() method Sign (line 160) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 166) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 172) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka192FRobustPqclean (line 177) | class SphincsHaraka192FRobustPqclean : public SphincsHelperPqclean { method SphincsHaraka192FRobustPqclean (line 179) | SphincsHaraka192FRobustPqclean() method Sign (line 186) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 192) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 198) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka192SRobustPqclean (line 203) | class SphincsHaraka192SRobustPqclean : public SphincsHelperPqclean { method SphincsHaraka192SRobustPqclean (line 205) | SphincsHaraka192SRobustPqclean() method Sign (line 212) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 218) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 224) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka192FSimplePqclean (line 229) | class SphincsHaraka192FSimplePqclean : public SphincsHelperPqclean { method SphincsHaraka192FSimplePqclean (line 231) | SphincsHaraka192FSimplePqclean() method Sign (line 238) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 244) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 250) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka192SSimplePqclean (line 255) | class SphincsHaraka192SSimplePqclean : public SphincsHelperPqclean { method SphincsHaraka192SSimplePqclean (line 257) | SphincsHaraka192SSimplePqclean() method Sign (line 264) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 270) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 276) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka256FRobustPqclean (line 281) | class SphincsHaraka256FRobustPqclean : public SphincsHelperPqclean { method SphincsHaraka256FRobustPqclean (line 283) | SphincsHaraka256FRobustPqclean() method Sign (line 290) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 296) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 302) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka256SRobustPqclean (line 307) | class SphincsHaraka256SRobustPqclean : public SphincsHelperPqclean { method SphincsHaraka256SRobustPqclean (line 309) | SphincsHaraka256SRobustPqclean() method Sign (line 316) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 322) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 328) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka256FSimplePqclean (line 333) | class SphincsHaraka256FSimplePqclean : public SphincsHelperPqclean { method SphincsHaraka256FSimplePqclean (line 335) | SphincsHaraka256FSimplePqclean() method Sign (line 342) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 348) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 354) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsHaraka256SSimplePqclean (line 359) | class SphincsHaraka256SSimplePqclean : public SphincsHelperPqclean { method SphincsHaraka256SSimplePqclean (line 361) | SphincsHaraka256SSimplePqclean() method Sign (line 368) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 374) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 380) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256128FRobustPqclean (line 385) | class SphincsSHA256128FRobustPqclean : public SphincsHelperPqclean { method SphincsSHA256128FRobustPqclean (line 387) | SphincsSHA256128FRobustPqclean() method Sign (line 394) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 400) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 406) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256128SRobustPqclean (line 411) | class SphincsSHA256128SRobustPqclean : public SphincsHelperPqclean { method SphincsSHA256128SRobustPqclean (line 413) | SphincsSHA256128SRobustPqclean() method Sign (line 420) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 426) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 432) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256128FSimplePqclean (line 437) | class SphincsSHA256128FSimplePqclean : public SphincsHelperPqclean { method SphincsSHA256128FSimplePqclean (line 439) | SphincsSHA256128FSimplePqclean() method Sign (line 446) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 452) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 458) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256128SSimplePqclean (line 463) | class SphincsSHA256128SSimplePqclean : public SphincsHelperPqclean { method SphincsSHA256128SSimplePqclean (line 465) | SphincsSHA256128SSimplePqclean() method Sign (line 472) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 478) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 484) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256192FRobustPqclean (line 489) | class SphincsSHA256192FRobustPqclean : public SphincsHelperPqclean { method SphincsSHA256192FRobustPqclean (line 491) | SphincsSHA256192FRobustPqclean() method Sign (line 498) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 504) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 510) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256192SRobustPqclean (line 515) | class SphincsSHA256192SRobustPqclean : public SphincsHelperPqclean { method SphincsSHA256192SRobustPqclean (line 517) | SphincsSHA256192SRobustPqclean() method Sign (line 524) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 530) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 536) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256192FSimplePqclean (line 541) | class SphincsSHA256192FSimplePqclean : public SphincsHelperPqclean { method SphincsSHA256192FSimplePqclean (line 543) | SphincsSHA256192FSimplePqclean() method Sign (line 550) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 556) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 562) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256192SSimplePqclean (line 567) | class SphincsSHA256192SSimplePqclean : public SphincsHelperPqclean { method SphincsSHA256192SSimplePqclean (line 569) | SphincsSHA256192SSimplePqclean() method Sign (line 576) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 582) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 588) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256256FRobustPqclean (line 593) | class SphincsSHA256256FRobustPqclean : public SphincsHelperPqclean { method SphincsSHA256256FRobustPqclean (line 595) | SphincsSHA256256FRobustPqclean() method Sign (line 602) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 608) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 614) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256256SRobustPqclean (line 619) | class SphincsSHA256256SRobustPqclean : public SphincsHelperPqclean { method SphincsSHA256256SRobustPqclean (line 621) | SphincsSHA256256SRobustPqclean() method Sign (line 628) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 634) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 640) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256256FSimplePqclean (line 645) | class SphincsSHA256256FSimplePqclean : public SphincsHelperPqclean { method SphincsSHA256256FSimplePqclean (line 647) | SphincsSHA256256FSimplePqclean() method Sign (line 654) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 660) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 666) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHA256256SSimplePqclean (line 671) | class SphincsSHA256256SSimplePqclean : public SphincsHelperPqclean { method SphincsSHA256256SSimplePqclean (line 673) | SphincsSHA256256SSimplePqclean() method Sign (line 680) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 686) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 692) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256128FRobustPqclean (line 697) | class SphincsSHAKE256128FRobustPqclean : public SphincsHelperPqcle... method SphincsSHAKE256128FRobustPqclean (line 699) | SphincsSHAKE256128FRobustPqclean() method Sign (line 706) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 712) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 718) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256128SRobustPqclean (line 723) | class SphincsSHAKE256128SRobustPqclean : public SphincsHelperPqcle... method SphincsSHAKE256128SRobustPqclean (line 725) | SphincsSHAKE256128SRobustPqclean() method Sign (line 732) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 738) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 744) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256128FSimplePqclean (line 749) | class SphincsSHAKE256128FSimplePqclean : public SphincsHelperPqcle... method SphincsSHAKE256128FSimplePqclean (line 751) | SphincsSHAKE256128FSimplePqclean() method Sign (line 758) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 764) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 770) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256128SSimplePqclean (line 775) | class SphincsSHAKE256128SSimplePqclean : public SphincsHelperPqcle... method SphincsSHAKE256128SSimplePqclean (line 777) | SphincsSHAKE256128SSimplePqclean() method Sign (line 784) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 790) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 796) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256192FRobustPqclean (line 801) | class SphincsSHAKE256192FRobustPqclean : public SphincsHelperPqcle... method SphincsSHAKE256192FRobustPqclean (line 803) | SphincsSHAKE256192FRobustPqclean() method Sign (line 810) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 816) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 822) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256192SRobustPqclean (line 827) | class SphincsSHAKE256192SRobustPqclean : public SphincsHelperPqcle... method SphincsSHAKE256192SRobustPqclean (line 829) | SphincsSHAKE256192SRobustPqclean() method Sign (line 836) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 842) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 848) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256192FSimplePqclean (line 853) | class SphincsSHAKE256192FSimplePqclean : public SphincsHelperPqcle... method SphincsSHAKE256192FSimplePqclean (line 855) | SphincsSHAKE256192FSimplePqclean() method Sign (line 862) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 868) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 874) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256192SSimplePqclean (line 879) | class SphincsSHAKE256192SSimplePqclean : public SphincsHelperPqcle... method SphincsSHAKE256192SSimplePqclean (line 881) | SphincsSHAKE256192SSimplePqclean() method Sign (line 888) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 894) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 900) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256256FRobustPqclean (line 905) | class SphincsSHAKE256256FRobustPqclean : public SphincsHelperPqcle... method SphincsSHAKE256256FRobustPqclean (line 907) | SphincsSHAKE256256FRobustPqclean() method Sign (line 914) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 920) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 926) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256256SRobustPqclean (line 931) | class SphincsSHAKE256256SRobustPqclean : public SphincsHelperPqcle... method SphincsSHAKE256256SRobustPqclean (line 933) | SphincsSHAKE256256SRobustPqclean() method Sign (line 940) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 946) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 952) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256256FSimplePqclean (line 957) | class SphincsSHAKE256256FSimplePqclean : public SphincsHelperPqcle... method SphincsSHAKE256256FSimplePqclean (line 959) | SphincsSHAKE256256FSimplePqclean() method Sign (line 966) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 972) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 978) | int Keygen(uint8_t *pk, uint8_t *sk) const override { class SphincsSHAKE256256SSimplePqclean (line 983) | class SphincsSHAKE256256SSimplePqclean : public SphincsHelperPqcle... method SphincsSHAKE256256SSimplePqclean (line 985) | SphincsSHAKE256256SSimplePqclean() method Sign (line 992) | int Sign(uint8_t *sig, size_t *siglen, const uint8_t *m, size_t ... method Verify (line 998) | int Verify(const uint8_t *sig, size_t siglen, const uint8_t *m, ... method Keygen (line 1004) | int Keygen(uint8_t *pk, uint8_t *sk) const override { function GetSphincsPqcleanHelperArray (line 1009) | std::vector> function SphincsHelperPqclean (line 1091) | const SphincsHelperPqclean &GetSphincsHelperPqclean(int hash_type,... FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_helper_pqclean.h function namespace (line 27) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_sign.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_sign.h function namespace (line 31) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_sign_test.cc type crypto (line 76) | namespace crypto { type tink (line 77) | namespace tink { type subtle (line 78) | namespace subtle { type SphincsTestCase (line 82) | struct SphincsTestCase { function TEST_P (line 97) | TEST_P(SphincsSignTest, SignatureLength) { function TEST_P (line 130) | TEST_P(SphincsSignTest, NonDeterminism) { function TEST_P (line 177) | TEST_P(SphincsSignTest, FipsMode) { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_subtle_utils.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type subtle (line 33) | namespace subtle { function GenerateSphincsKeyPair (line 35) | crypto::tink::util::StatusOr GenerateSphincsKeyPair( function ValidatePrivateKeySize (line 73) | crypto::tink::util::Status ValidatePrivateKeySize(int32_t key_size) { function ValidatePublicKeySize (line 89) | crypto::tink::util::Status ValidatePublicKeySize(int32_t key_size) { function SphincsKeySizeToIndex (line 105) | crypto::tink::util::StatusOr SphincsKeySizeToIndex(int32_... function ValidateParams (line 119) | crypto::tink::util::Status ValidateParams(SphincsParamsPqclean par... FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_subtle_utils.h function namespace (line 30) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_subtle_utils_test.cc type crypto (line 71) | namespace crypto { type tink (line 72) | namespace tink { type subtle (line 73) | namespace subtle { type SphincsUtilsTestCase (line 78) | struct SphincsUtilsTestCase { function TEST_P (line 89) | TEST_P(SphincsUtilsTest, SphincsKeysLength) { function TEST_P (line 110) | TEST_P(SphincsUtilsTest, DifferentContent) { function TEST (line 129) | TEST(SphincsUtilsTest, InvalidPrivateKeySize) { function TEST (line 141) | TEST(SphincsUtilsTest, InvalidPublicKeySize) { function TEST_P (line 153) | TEST_P(SphincsUtilsTest, ValidParams) { function TEST (line 166) | TEST(SphincsUtilsTest, InvalidHashType) { function TEST (line 177) | TEST(SphincsUtilsTest, InvalidVariant) { function TEST (line 188) | TEST(SphincsUtilsTest, InvalidSignatureType) { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_verify.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type subtle (line 38) | namespace subtle { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_verify.h function namespace (line 32) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/subtle/sphincs_verify_test.cc type crypto (line 78) | namespace crypto { type tink (line 79) | namespace tink { type subtle (line 80) | namespace subtle { type SphincsTestCase (line 84) | struct SphincsTestCase { function TEST_P (line 99) | TEST_P(SphincsVerifyTest, BasicSignVerify) { function TEST_P (line 137) | TEST_P(SphincsVerifyTest, FailsWithWrongSignature) { function TEST_P (line 176) | TEST_P(SphincsVerifyTest, FailsWithWrongMessage) { function TEST_P (line 214) | TEST_P(SphincsVerifyTest, FailsWithBytesFlipped) { function TEST_P (line 255) | TEST_P(SphincsVerifyTest, FipsMode) { FILE: cc/experimental/pqcrypto/signature/util/enums.cc type crypto (line 22) | namespace crypto { type tink (line 23) | namespace tink { type util (line 24) | namespace util { FILE: cc/experimental/pqcrypto/signature/util/enums.h function namespace (line 28) | namespace crypto { FILE: cc/experimental/pqcrypto/signature/util/enums_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { class EnumsTest (line 32) | class EnumsTest : public ::testing::Test {} function TEST_F (line 34) | TEST_F(EnumsTest, DilithiumSeedExpansion) { function TEST_F (line 71) | TEST_F(EnumsTest, SphincsHashType) { function TEST_F (line 106) | TEST_F(EnumsTest, SphincsVariant) { function TEST_F (line 137) | TEST_F(EnumsTest, SphincsSignatureType) { FILE: cc/hybrid/config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function Configuration (line 26) | const Configuration& ConfigHybridV0() { FILE: cc/hybrid/config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/hybrid/config_v0_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function TEST_P (line 56) | TEST_P(ConfigV0Test, GetPrimitive) { FILE: cc/hybrid/ecies_aead_hkdf_dem_helper.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { function Wrap (line 61) | crypto::tink::util::StatusOr> Wrap( function Wrap (line 69) | crypto::tink::util::StatusOr> Wrap( FILE: cc/hybrid/ecies_aead_hkdf_dem_helper.h function namespace (line 33) | namespace tink { FILE: cc/hybrid/ecies_aead_hkdf_dem_helper_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function EncryptThenDecrypt (line 49) | crypto::tink::util::Status EncryptThenDecrypt( function TEST (line 64) | TEST(EciesAeadHkdfDemHelperTest, InvalidKey) { function TEST (line 73) | TEST(EciesAeadHkdfDemHelperTest, DemHelperWithSomeAeadKeyType) { function TEST (line 98) | TEST(EciesAeadHkdfDemHelperTest, DemHelperWithSomeDeterministicAeadK... FILE: cc/hybrid/ecies_aead_hkdf_hybrid_decrypt.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function Validate (line 43) | util::Status Validate(const EciesAeadHkdfPrivateKey& key) { FILE: cc/hybrid/ecies_aead_hkdf_hybrid_decrypt.h function namespace (line 31) | namespace crypto { FILE: cc/hybrid/ecies_aead_hkdf_hybrid_decrypt_test.cc type crypto (line 57) | namespace crypto { type tink (line 58) | namespace tink { class EciesAeadHkdfHybridDecryptTest (line 61) | class EciesAeadHkdfHybridDecryptTest : public ::testing::Test { method SetUp (line 63) | void SetUp() override {} method TearDown (line 64) | void TearDown() override {} type CommonHybridKeyParams (line 66) | struct CommonHybridKeyParams { method GetCommonHybridKeyParamsList (line 72) | std::vector GetCommonHybridKeyParamsList() { method EciesAeadHkdfPrivateKey (line 95) | EciesAeadHkdfPrivateKey GetEciesPrivateKeyFromHexString( method TestValidKey (line 104) | void TestValidKey(const EciesAeadHkdfPrivateKey& ecies_key) { function TEST_F (line 167) | TEST_F(EciesAeadHkdfHybridDecryptTest, testInvalidKeys) { function TEST_F (line 225) | TEST_F(EciesAeadHkdfHybridDecryptTest, testAesGcmHybridDecryption) { function TEST_F (line 246) | TEST_F(EciesAeadHkdfHybridDecryptTest, testAesCtrAeadHybridDecryptio... function TEST_F (line 272) | TEST_F(EciesAeadHkdfHybridDecryptTest, testXChaCha20Poly1305HybridDe... function TEST_F (line 290) | TEST_F(EciesAeadHkdfHybridDecryptTest, testAesSivHybridDecryption) { type TestVector (line 305) | struct TestVector { function TEST_F (line 312) | TEST_F(EciesAeadHkdfHybridDecryptTest, FILE: cc/hybrid/ecies_aead_hkdf_hybrid_encrypt.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function Validate (line 44) | util::Status Validate(const EciesAeadHkdfPublicKey& key) { FILE: cc/hybrid/ecies_aead_hkdf_hybrid_encrypt.h function namespace (line 31) | namespace crypto { FILE: cc/hybrid/ecies_aead_hkdf_hybrid_encrypt_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { class EciesAeadHkdfHybridEncryptTest (line 46) | class EciesAeadHkdfHybridEncryptTest : public ::testing::Test { method SetUp (line 48) | void SetUp() override { method TearDown (line 50) | void TearDown() override { function TEST_F (line 54) | TEST_F(EciesAeadHkdfHybridEncryptTest, testInvalidKeys) { function TEST_F (line 110) | TEST_F(EciesAeadHkdfHybridEncryptTest, testBasic) { FILE: cc/hybrid/ecies_aead_hkdf_private_key_manager.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function Status (line 49) | Status EciesAeadHkdfPrivateKeyManager::ValidateKeyFormat( function Status (line 86) | Status EciesAeadHkdfPrivateKeyManager::ValidateKey( FILE: cc/hybrid/ecies_aead_hkdf_private_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/hybrid/ecies_aead_hkdf_private_key_manager_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function TEST (line 59) | TEST(EciesAeadHkdfPrivateKeyManagerTest, Basics) { function TEST (line 68) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateEmptyKey) { function EciesAeadHkdfKeyFormat (line 74) | EciesAeadHkdfKeyFormat CreateValidKeyFormat() { function TEST (line 86) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyFormat) { function TEST (line 92) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoPoint) { function TEST (line 100) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoDem) { function TEST (line 107) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoKemCurve) { function TEST (line 115) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyFormatNoKemHash) { function TEST (line 123) | TEST(EciesAeadHkdfPrivateKeyManagerTest, CreateKey) { function EciesAeadHkdfPrivateKey (line 146) | EciesAeadHkdfPrivateKey CreateValidKey() { function TEST (line 152) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyEmpty) { function TEST (line 158) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKey) { function TEST (line 163) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyWrongVersion) { function TEST (line 170) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyNoPoint) { function TEST (line 178) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyNoDem) { function TEST (line 188) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyNoKemCurve) { function TEST (line 198) | TEST(EciesAeadHkdfPrivateKeyManagerTest, ValidateKeyNoKemHash) { function TEST (line 208) | TEST(EciesAeadHkdfPrivateKeyManagerTest, GetPublicKey) { function TEST (line 233) | TEST(EciesAeadHkdfPrivateKeyManagerTest, Create) { function TEST (line 253) | TEST(EciesAeadHkdfPrivateKeyManagerTest, CreateDifferentKey) { FILE: cc/hybrid/ecies_aead_hkdf_public_key_manager.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function Status (line 43) | Status EciesAeadHkdfPublicKeyManager::ValidateParams( function Status (line 70) | Status EciesAeadHkdfPublicKeyManager::ValidateKey( FILE: cc/hybrid/ecies_aead_hkdf_public_key_manager.h function namespace (line 38) | namespace crypto { FILE: cc/hybrid/ecies_aead_hkdf_public_key_manager_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function TEST (line 51) | TEST(EciesAeadHkdfPublicKeyManagerTest, Basics) { function TEST (line 60) | TEST(EciesAeadHkdfPublicKeyManagerTest, ValidateEmptyKey) { function EciesAeadHkdfPublicKey (line 66) | EciesAeadHkdfPublicKey CreatePublicKey() { function TEST (line 81) | TEST(EciesAeadHkdfPublicKeyManagerTest, ValidateParams) { function TEST (line 87) | TEST(EciesAeadHkdfPublicKeyManagerTest, ValidateKeyNoPoint) { function TEST (line 94) | TEST(EciesAeadHkdfPublicKeyManagerTest, ValidateKeyNoDem) { function TEST (line 101) | TEST(EciesAeadHkdfPublicKeyManagerTest, ValidateKeyNoKemCurve) { function TEST (line 108) | TEST(EciesAeadHkdfPublicKeyManagerTest, ValidateKeyNoKemHash) { function TEST (line 115) | TEST(EciesAeadHkdfPublicKeyManagerTest, ValidateGeneratedKey) { FILE: cc/hybrid/ecies_parameters.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function IsNistCurve (line 40) | bool IsNistCurve(EciesParameters::CurveType curve_type) { FILE: cc/hybrid/ecies_parameters.h type class (line 36) | enum class type class (line 48) | enum class function HashType (line 57) | enum class HashType : int { FILE: cc/hybrid/ecies_parameters_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type VariantWithIdRequirement (line 52) | struct VariantWithIdRequirement { function TEST_P (line 88) | TEST_P(EciesParametersTest, Build) { function TEST (line 117) | TEST(EciesParametersTest, BuildWithX25519Curve) { function TEST (line 140) | TEST(EciesParametersTest, BuildWithInvalidCurveTypeFails) { function TEST (line 157) | TEST(EciesParametersTest, BuildWithoutCurveTypeFails) { function TEST (line 171) | TEST(EciesParametersTest, BuildWithInvalidHashTypeFails) { function TEST (line 188) | TEST(EciesParametersTest, BuildWithoutHashTypeFails) { function TEST (line 202) | TEST(EciesParametersTest, BuildWithInvalidPointFormatFails) { function TEST (line 219) | TEST(EciesParametersTest, BuildWithNistCurveWithoutPointFormatFails) { function TEST (line 233) | TEST(EciesParametersTest, BuildWithX25519WithPointFormatFails) { function TEST (line 248) | TEST(EciesParametersTest, BuildWithInvalidDemIdFails) { function TEST (line 264) | TEST(EciesParametersTest, BuildWithoutDemIdFails) { function TEST (line 278) | TEST(EciesParametersTest, BuildWithEmptySaltSucceeds) { function TEST (line 293) | TEST(EciesParametersTest, BuildWithoutSaltSucceeds) { function TEST (line 307) | TEST(EciesParametersTest, BuildWithInvalidVariantFails) { function TEST (line 323) | TEST(EciesParametersTest, BuildWithoutVariantFails) { function TEST (line 337) | TEST(Ed25519ParametersTest, CopyConstructor) { function TEST (line 361) | TEST(Ed25519ParametersTest, CopyAssignment) { function TEST_P (line 385) | TEST_P(EciesParametersTest, ParametersEqual) { function TEST (line 422) | TEST(EciesParametersTest, CurveTypeNotEqual) { function TEST (line 449) | TEST(EciesParametersTest, HashTypeNotEqual) { function TEST (line 476) | TEST(EciesParametersTest, PointFormatNotEqual) { function TEST (line 503) | TEST(EciesParametersTest, DemIdNotEqual) { function TEST (line 530) | TEST(EciesParametersTest, SaltNotEqual) { function TEST (line 557) | TEST(EciesParametersTest, EmptySaltAndNoSaltEqual) { function TEST (line 583) | TEST(EciesParametersTest, VariantNotEqual) { type AesGcmDemTestCase (line 610) | struct AesGcmDemTestCase { function TEST_P (line 624) | TEST_P(AesGcmDemTest, CreateAesGcmRawDemParameters) { function TEST (line 653) | TEST(EciesParametersTest, CreateAes256SivRawDemParameters) { function TEST (line 677) | TEST(EciesParametersTest, CreateXChaCha20Poly1305RawDemParameters) { type AesCtrHmacDemTestCase (line 701) | struct AesCtrHmacDemTestCase { function TEST_P (line 719) | TEST_P(AesCtrHmacDemTest, CreateAesCtrHmacSha256RawDemParameters) { FILE: cc/hybrid/ecies_private_key.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { function SubtleCurveType (line 53) | util::StatusOr SubtleCurveType( function ValidateNistKeyPair (line 70) | util::Status ValidateNistKeyPair(const EciesPublicKey& public_key, function ValidateX25519KeyPair (line 129) | util::Status ValidateX25519KeyPair(const EciesPublicKey& public_key, FILE: cc/hybrid/ecies_private_key.h function namespace (line 29) | namespace crypto { FILE: cc/hybrid/ecies_private_key_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { type TestCase (line 59) | struct TestCase { function TEST_P (line 103) | TEST_P(EciesPrivateKeyTest, CreateNistCurvePrivateKey) { function TEST (line 146) | TEST(EciesPublicKeyTest, CreateX25519PublicKey) { function TEST_P (line 189) | TEST_P(EciesPrivateKeyTest, CreateMismatchedNistCurveKeyPairFails) { function TEST (line 226) | TEST(EciesPrivateKeyTest, CreateMismatchedX25519KeyPairFails) { function TEST (line 252) | TEST(EciesPrivateKeyTest, CreateX25519PrivateKeyWithInvalidKeyLength... function TEST_P (line 289) | TEST_P(EciesPrivateKeyTest, NistCurvePrivateKeyEquals) { function TEST (line 333) | TEST(EciesPrivateKeyTest, X25519PrivateKeyEquals) { function TEST (line 377) | TEST(EciesPrivateKeyTest, DifferentPublicKeyNotEqual) { function TEST (line 427) | TEST(EciesPrivateKeyTest, DifferentKeyTypesNotEqual) { FILE: cc/hybrid/ecies_proto_serialization.cc type crypto (line 55) | namespace crypto { type tink (line 56) | namespace tink { function ToVariant (line 101) | util::StatusOr ToVariant( function ToOutputPrefixType (line 118) | util::StatusOr ToOutputPrefixType( function IsNistCurve (line 133) | bool IsNistCurve(EciesParameters::CurveType curve) { function FromProtoCurveType (line 139) | util::StatusOr FromProtoCurveType( function ToProtoCurveType (line 156) | util::StatusOr ToProtoCurveType( function FromProtoHashType (line 173) | util::StatusOr FromProtoHashType(HashType... function ToProtoHashType (line 191) | util::StatusOr ToProtoHashType(EciesParameters::HashType h... function FromProtoPointFormat (line 209) | util::StatusOr FromProtoPointFormat( function ToProtoPointFormat (line 224) | util::StatusOr ToProtoPointFormat( function ValidateAesCtrHmacAeadKeyFormat (line 239) | absl::Status ValidateAesCtrHmacAeadKeyFormat( function FromProtoDemParams (line 282) | util::StatusOr FromProtoDemParams( function EciesAeadDemParams (line 358) | EciesAeadDemParams CreateEciesAeadDemParams( function ToProtoDemParams (line 369) | util::StatusOr ToProtoDemParams( function ToParameters (line 419) | util::StatusOr ToParameters( function FromParameters (line 476) | util::StatusOr FromParameters( function ToPublicKey (line 519) | util::StatusOr ToPublicKey( function GetEncodingLength (line 531) | util::StatusOr GetEncodingLength(EciesParameters::CurveType cur... function FromPublicKey (line 547) | util::StatusOr FromPublicKey( function ParseParameters (line 584) | util::StatusOr ParseParameters( function ParsePublicKey (line 607) | util::StatusOr ParsePublicKey( function ParsePrivateKey (line 637) | util::StatusOr ParsePrivateKey( function SerializeParameters (line 689) | util::StatusOr SerializePara... function SerializePublicKey (line 709) | util::StatusOr SerializePublicKey( function SerializePrivateKey (line 736) | util::StatusOr SerializePrivateKey( function EciesProtoParametersParserImpl (line 802) | EciesProtoParametersParserImpl* EciesProtoParametersParser() { function EciesProtoParametersSerializerImpl (line 808) | EciesProtoParametersSerializerImpl* EciesProtoParametersSerializer() { function EciesProtoPublicKeyParserImpl (line 814) | EciesProtoPublicKeyParserImpl* EciesProtoPublicKeyParser() { function EciesProtoPublicKeySerializerImpl (line 820) | EciesProtoPublicKeySerializerImpl* EciesProtoPublicKeySerializer() { function EciesProtoPrivateKeyParserImpl (line 826) | EciesProtoPrivateKeyParserImpl* EciesProtoPrivateKeyParser() { function EciesProtoPrivateKeySerializerImpl (line 832) | EciesProtoPrivateKeySerializerImpl* EciesProtoPrivateKeySerializer() { function RegisterEciesProtoSerialization (line 840) | util::Status RegisterEciesProtoSerialization() { FILE: cc/hybrid/ecies_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/hybrid/ecies_proto_serialization_test.cc type crypto (line 59) | namespace crypto { type tink (line 60) | namespace tink { type TestCase (line 94) | struct TestCase { class EciesProtoSerializationTest (line 109) | class EciesProtoSerializationTest : public TestWithParam { method EciesProtoSerializationTest (line 111) | EciesProtoSerializationTest() { function TEST_F (line 116) | TEST_F(EciesProtoSerializationTest, RegisterTwiceSucceeds) { function EciesHkdfKemParams (line 121) | EciesHkdfKemParams CreateKemParams(EllipticCurveType curve_type, function EciesAeadDemParams (line 130) | EciesAeadDemParams CreateAesGcmDemParams(int key_size_in_bytes) { function EciesAeadDemParams (line 145) | EciesAeadDemParams CreateAes256SivDemParams() { function EciesAeadDemParams (line 160) | EciesAeadDemParams CreateXChaCha20Poly1305DemParams() { function EciesAeadDemParams (line 175) | EciesAeadDemParams CreateAesCtrHmacDemParams( function EciesAeadDemParams (line 213) | EciesAeadDemParams CreateAesCtrHmacDemParams(int key_size) { function TEST_P (line 289) | TEST_P(EciesProtoSerializationTest, ParseParametersSucceeds) { function TEST_F (line 324) | TEST_F(EciesProtoSerializationTest, ParseLegacyAsCrunchySucceeds) { function TEST_F (line 353) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 371) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 398) | TEST_F(EciesProtoSerializationTest, ParseParametersWithMissingKemFai... function TEST_F (line 422) | TEST_F(EciesProtoSerializationTest, ParseParametersWithMissingDemFai... function TEST_F (line 447) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 473) | TEST_F(EciesProtoSerializationTest, ParseParametersWithMissingSaltSu... function TEST_F (line 502) | TEST_F(EciesProtoSerializationTest, ParseParametersWithMissingParams... function TEST_F (line 523) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 550) | TEST_F(EciesProtoSerializationTest, ParseParametersWithUnkownCurveTy... function TEST_F (line 576) | TEST_F(EciesProtoSerializationTest, ParseParametersWithUnkownHashTyp... function TEST_F (line 602) | TEST_F(EciesProtoSerializationTest, ParseParametersWithUnkownPointFo... function TEST_F (line 628) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 657) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 687) | TEST_F(EciesProtoSerializationTest, ParseAesCtrHmacParamsWithInvalid... function TEST_F (line 716) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 745) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 775) | TEST_F(EciesProtoSerializationTest, function TEST_F (line 803) | TEST_F(EciesProtoSerializationTest, ParseAesCtrHmacParamsWithInvalid... function TEST_F (line 832) | TEST_F(EciesProtoSerializationTest, ParseAesCtrHmacParamsWithInvalid... function TEST_F (line 861) | TEST_F(EciesProtoSerializationTest, ParseAesCtrHmacParamsWithMismatc... function TEST_P (line 892) | TEST_P(EciesProtoSerializationTest, SerializeParameters) { type KeyPair (line 953) | struct KeyPair { function GenerateKeyPair (line 960) | util::StatusOr GenerateKeyPair(subtle::EllipticCurveType cu... function TEST_P (line 986) | TEST_P(EciesProtoSerializationTest, ParsePublicKey) { function TEST_F (line 1052) | TEST_F(EciesProtoSerializationTest, ParsePublicKeyWithInvalidSeriali... function TEST_F (line 1074) | TEST_F(EciesProtoSerializationTest, ParsePublicKeyWithInvalidVersion) { function TEST_P (line 1113) | TEST_P(EciesProtoSerializationTest, SerializePublicKey) { function TEST_P (line 1199) | TEST_P(EciesProtoSerializationTest, ParsePrivateKey) { function TEST_F (line 1288) | TEST_F(EciesProtoSerializationTest, ParsePrivateKeyWithInvalidSerial... function TEST_F (line 1310) | TEST_F(EciesProtoSerializationTest, ParsePrivateKeyWithInvalidVersio... function TEST_F (line 1357) | TEST_F(EciesProtoSerializationTest, ParsePrivateKeyNoSecretKeyAccess) { function TEST_P (line 1400) | TEST_P(EciesProtoSerializationTest, SerializePrivateKey) { function TEST_F (line 1516) | TEST_F(EciesProtoSerializationTest, SerializePrivateKeyNoSecretKeyAc... function TEST (line 1555) | TEST(AeadDemTypeUrlExceptionTest, ParseWithInvalidUrl) { FILE: cc/hybrid/ecies_public_key.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function ValidateNistCurvePublicKey (line 48) | util::Status ValidateNistCurvePublicKey(EciesParameters::CurveType c... function ComputeOutputPrefix (line 88) | util::StatusOr ComputeOutputPrefix( function ValidateIdRequirement (line 114) | util::Status ValidateIdRequirement(const EciesParameters& parameters, FILE: cc/hybrid/ecies_public_key.h function namespace (line 31) | namespace crypto { FILE: cc/hybrid/ecies_public_key_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type TestCase (line 52) | struct TestCase { function TEST_P (line 96) | TEST_P(EciesPublicKeyTest, CreateNistCurvePublicKey) { function TEST (line 129) | TEST(EciesPublicKeyTest, CreateX25519PublicKey) { function TEST (line 156) | TEST(EciesPublicKeyTest, CreateX25519PublicKeyWithInvalidLength) { function TEST (line 176) | TEST(EciesPublicKeyTest, CreateNistCurvePublicKeyWithInvalidPoint) { function TEST (line 218) | TEST(EciesPublicKeyTest, function TEST (line 253) | TEST(EciesPublicKeyTest, function TEST_P (line 294) | TEST_P(EciesPublicKeyTest, NistCurvePublicKeyEquals) { function TEST (line 330) | TEST(EciesPublicKeyTest, X25519PublicKeyEquals) { function TEST (line 360) | TEST(EciesPublicKeyTest, DifferentParametersNotEqual) { function TEST (line 399) | TEST(EciesPublicKeyTest, DifferentPublicPointsNotEqual) { function TEST (line 438) | TEST(EciesPublicKeyTest, DifferentPublicKeyBytesNotEqual) { function TEST (line 469) | TEST(EciesPublicKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/hybrid/failing_hybrid.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { class AlwaysFailHybridEncrypt (line 36) | class AlwaysFailHybridEncrypt : public HybridEncrypt { method AlwaysFailHybridEncrypt (line 38) | explicit AlwaysFailHybridEncrypt(std::string message) method Encrypt (line 41) | util::StatusOr Encrypt( class AlwaysFailHybridDecrypt (line 56) | class AlwaysFailHybridDecrypt : public HybridDecrypt { method AlwaysFailHybridDecrypt (line 58) | explicit AlwaysFailHybridDecrypt(std::string message) method Decrypt (line 61) | util::StatusOr Decrypt( function CreateAlwaysFailingHybridEncrypt (line 77) | std::unique_ptr CreateAlwaysFailingHybridEncrypt( function CreateAlwaysFailingHybridDecrypt (line 82) | std::unique_ptr CreateAlwaysFailingHybridDecrypt( FILE: cc/hybrid/failing_hybrid.h function namespace (line 26) | namespace crypto { FILE: cc/hybrid/failing_hybrid_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { function TEST (line 35) | TEST(AlwaysFailHybridEncrypt, EncryptFails) { function TEST (line 44) | TEST(AlwaysFailHybridEncrypt, EncryptFailsContainsMessage) { function TEST (line 54) | TEST(AlwaysFailHybridDecrypt, DecryptFails) { function TEST (line 63) | TEST(AlwaysFailHybridDecrypt, DecryptFailsContainsMessage) { FILE: cc/hybrid/hpke_config.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { function RegisterHpke (line 33) | util::Status RegisterHpke() { FILE: cc/hybrid/hpke_config.h function namespace (line 22) | namespace crypto { FILE: cc/hybrid/hpke_config_test.cc type crypto (line 54) | namespace crypto { type tink (line 55) | namespace tink { class HpkeConfigTest (line 68) | class HpkeConfigTest : public ::testing::Test { method SetUp (line 70) | void SetUp() override { function TEST_F (line 76) | TEST_F(HpkeConfigTest, Basic) { function TEST_F (line 100) | TEST_F(HpkeConfigTest, HpkeProtoParamsSerializationRegistered) { function TEST_F (line 144) | TEST_F(HpkeConfigTest, HpkeProtoPublicKeySerializationRegistered) { function TEST_F (line 207) | TEST_F(HpkeConfigTest, HpkeProtoPrivateKeySerializationRegistered) { function TEST_F (line 294) | TEST_F(HpkeConfigTest, RegisterNonFipsTemplates) { FILE: cc/hybrid/hpke_parameters.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { FILE: cc/hybrid/hpke_parameters.h type class (line 30) | enum class function KemId (line 43) | enum class KemId : int { FILE: cc/hybrid/hpke_parameters_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type VariantWithIdRequirement (line 39) | struct VariantWithIdRequirement { function TEST_P (line 67) | TEST_P(HpkeParametersTest, Build) { function TEST (line 89) | TEST(HpkeParametersTest, BuildWithInvalidVariantFails) { function TEST (line 102) | TEST(HpkeParametersTest, BuildWithoutVariantFails) { function TEST (line 113) | TEST(HpkeParametersTest, BuildWithInvalidKemIdFails) { function TEST (line 126) | TEST(HpkeParametersTest, BuildWithoutKemIdFails) { function TEST (line 137) | TEST(HpkeParametersTest, BuildWithInvalidKdfIdFails) { function TEST (line 150) | TEST(HpkeParametersTest, BuildWithoutKdfIdFails) { function TEST (line 161) | TEST(HpkeParametersTest, BuildWithInvalidAeadIdFails) { function TEST (line 174) | TEST(HpkeParametersTest, BuildWithoutAeadIdFails) { function TEST (line 185) | TEST(HpkeParametersTest, CopyConstructor) { function TEST (line 201) | TEST(HpkeParametersTest, CopyAssignment) { function TEST_P (line 217) | TEST_P(HpkeParametersTest, ParametersEquals) { function TEST (line 247) | TEST(HpkeParametersTest, VariantNotEqual) { function TEST (line 270) | TEST(HpkeParametersTest, KemIdNotEqual) { function TEST (line 293) | TEST(HpkeParametersTest, KdfIdNotEqual) { function TEST (line 316) | TEST(HpkeParametersTest, AeadIdNotEqual) { FILE: cc/hybrid/hpke_private_key.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { function CurveTypeFromKemId (line 50) | util::StatusOr CurveTypeFromKemId( function ValidatePrivateKeyLength (line 67) | util::Status ValidatePrivateKeyLength(HpkeParameters::KemId kem_id, function IsNistKem (line 102) | bool IsNistKem(HpkeParameters::KemId kem_id) { function ValidateNistEcKeyPair (line 108) | util::Status ValidateNistEcKeyPair(subtle::EllipticCurveType curve, function ValidateX25519KeyPair (line 154) | util::Status ValidateX25519KeyPair(absl::string_view public_key_bytes, function ValidateKeyPair (line 172) | util::Status ValidateKeyPair(const HpkePublicKey& public_key, FILE: cc/hybrid/hpke_private_key.h function namespace (line 27) | namespace crypto { FILE: cc/hybrid/hpke_private_key_test.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { type TestCase (line 56) | struct TestCase { function TEST_P (line 92) | TEST_P(HpkePrivateKeyTest, CreateNistCurvePrivateKey) { function TEST (line 133) | TEST(HpkePublicKeyTest, CreateX25519PublicKey) { function TEST_P (line 172) | TEST_P(HpkePrivateKeyTest, CreateMismatchedNistCurveKeyPairFails) { function TEST (line 210) | TEST(HpkePrivateKeyTest, CreateMismatchedX25519KeyPairFails) { function TEST_P (line 235) | TEST_P(HpkePrivateKeyTest, CreateNistPrivateKeyWithInvalidKeyLengthF... function TEST (line 272) | TEST(HpkePrivateKeyTest, CreateX25519PrivateKeyWithInvalidKeyLengthF... function TEST_P (line 307) | TEST_P(HpkePrivateKeyTest, NistCurvePrivateKeyEquals) { function TEST (line 350) | TEST(HpkePrivateKeyTest, X25519PrivateKeyEquals) { function TEST (line 391) | TEST(HpkePrivateKeyTest, DifferentPublicKeyNotEqual) { function TEST (line 437) | TEST(HpkePrivateKeyTest, DifferentKeyTypesNotEqual) { FILE: cc/hybrid/hpke_proto_serialization.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function ToVariant (line 77) | util::StatusOr ToVariant( function ToOutputPrefixType (line 94) | util::StatusOr ToOutputPrefixType( function ToKemId (line 109) | util::StatusOr ToKemId(HpkeKem kem) { function FromKemId (line 125) | util::StatusOr FromKemId(HpkeParameters::KemId kem_id) { function ToKdfId (line 141) | util::StatusOr ToKdfId(HpkeKdf kdf) { function FromKdfId (line 155) | util::StatusOr FromKdfId(HpkeParameters::KdfId kdf_id) { function ToAeadId (line 169) | util::StatusOr ToAeadId(HpkeAead aead) { function FromAeadId (line 183) | util::StatusOr FromAeadId(HpkeParameters::AeadId aead_id) { function ToParameters (line 197) | util::StatusOr ToParameters(OutputPrefixType output_... function FromParameters (line 228) | util::StatusOr FromParameters(HpkeParameters parameters) { function ParseParameters (line 252) | util::StatusOr ParseParameters( function ParsePublicKey (line 274) | util::StatusOr ParsePublicKey( function ParsePrivateKey (line 305) | util::StatusOr ParsePrivateKey( function SerializeParameters (line 351) | util::StatusOr SerializePara... function SerializePublicKey (line 371) | util::StatusOr SerializePublicKey( function SerializePrivateKey (line 398) | util::StatusOr SerializePrivateKey( function HpkeProtoParametersParserImpl (line 443) | HpkeProtoParametersParserImpl* HpkeProtoParametersParser() { function HpkeProtoParametersSerializerImpl (line 449) | HpkeProtoParametersSerializerImpl* HpkeProtoParametersSerializer() { function HpkeProtoPublicKeyParserImpl (line 455) | HpkeProtoPublicKeyParserImpl* HpkeProtoPublicKeyParser() { function HpkeProtoPublicKeySerializerImpl (line 461) | HpkeProtoPublicKeySerializerImpl* HpkeProtoPublicKeySerializer() { function HpkeProtoPrivateKeyParserImpl (line 467) | HpkeProtoPrivateKeyParserImpl* HpkeProtoPrivateKeyParser() { function HpkeProtoPrivateKeySerializerImpl (line 473) | HpkeProtoPrivateKeySerializerImpl* HpkeProtoPrivateKeySerializer() { function RegisterHpkeProtoSerialization (line 481) | util::Status RegisterHpkeProtoSerialization() { FILE: cc/hybrid/hpke_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/hybrid/hpke_proto_serialization_test.cc type crypto (line 54) | namespace crypto { type tink (line 55) | namespace tink { type TestCase (line 78) | struct TestCase { class HpkeProtoSerializationTest (line 92) | class HpkeProtoSerializationTest : public TestWithParam { method SetUp (line 94) | void SetUp() override { function TEST_F (line 99) | TEST_F(HpkeProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 141) | TEST_P(HpkeProtoSerializationTest, ParseParameters) { function TEST_F (line 173) | TEST_F(HpkeProtoSerializationTest, ParseLegacyAsCrunchy) { function TEST_F (line 208) | TEST_F(HpkeProtoSerializationTest, ParseParametersWithInvalidSeriali... function TEST_F (line 222) | TEST_F(HpkeProtoSerializationTest, ParseParametersWithUnkownOutputPr... function TEST_F (line 245) | TEST_F(HpkeProtoSerializationTest, ParseParametersWithUnkownKem) { function TEST_F (line 268) | TEST_F(HpkeProtoSerializationTest, ParseParametersWithUnkownKdf) { function TEST_F (line 291) | TEST_F(HpkeProtoSerializationTest, ParseParametersWithUnkownAead) { function TEST_P (line 314) | TEST_P(HpkeProtoSerializationTest, SerializeParameters) { type KeyPair (line 352) | struct KeyPair { function GenerateKeyPair (line 357) | util::StatusOr GenerateKeyPair(subtle::EllipticCurveType cu... function TEST_P (line 387) | TEST_P(HpkeProtoSerializationTest, ParsePublicKey) { function TEST_F (line 437) | TEST_F(HpkeProtoSerializationTest, ParsePublicKeyWithInvalidSerializ... function TEST_F (line 456) | TEST_F(HpkeProtoSerializationTest, ParsePublicKeyWithInvalidVersion) { function TEST_P (line 488) | TEST_P(HpkeProtoSerializationTest, SerializePublicKey) { function TEST_P (line 538) | TEST_P(HpkeProtoSerializationTest, ParsePrivateKey) { function TEST_F (line 599) | TEST_F(HpkeProtoSerializationTest, ParsePrivateKeyWithInvalidSeriali... function TEST_F (line 618) | TEST_F(HpkeProtoSerializationTest, ParsePrivateKeyWithInvalidVersion) { function TEST_F (line 656) | TEST_F(HpkeProtoSerializationTest, ParsePrivateKeyNoSecretKeyAccess) { function TEST_P (line 694) | TEST_P(HpkeProtoSerializationTest, SerializePrivateKey) { function TEST_F (line 754) | TEST_F(HpkeProtoSerializationTest, SerializePrivateKeyNoSecretKeyAcc... FILE: cc/hybrid/hpke_public_key.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function ValidatePublicKey (line 40) | util::Status ValidatePublicKey(HpkeParameters::KemId kem_id, function ComputeOutputPrefix (line 94) | util::StatusOr ComputeOutputPrefix( FILE: cc/hybrid/hpke_public_key.h function namespace (line 30) | namespace crypto { FILE: cc/hybrid/hpke_public_key_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type TestCase (line 50) | struct TestCase { function TEST_P (line 86) | TEST_P(HpkePublicKeyTest, CreateNistCurvePublicKey) { function TEST (line 118) | TEST(HpkePublicKeyTest, CreateX25519PublicKey) { function TEST_P (line 142) | TEST_P(HpkePublicKeyTest, CreateNistCurvePublicKeyWithInvalidLength) { function TEST (line 169) | TEST(HpkePublicKeyTest, CreateX25519PublicKeyWithInvalidLength) { function TEST (line 188) | TEST(HpkePublicKeyTest, CreateNistCurvePublicKeyWithInvalidPoint) { function TEST (line 222) | TEST(HpkePublicKeyTest, CreatePublicKeyWithInvalidIdRequirementFails) { function TEST_P (line 256) | TEST_P(HpkePublicKeyTest, NistCurvePublicKeyEquals) { function TEST (line 292) | TEST(HpkePublicKeyTest, X25519PublicKeyEquals) { function TEST (line 320) | TEST(HpkePublicKeyTest, DifferentVariantNotEqual) { function TEST (line 357) | TEST(HpkePublicKeyTest, DifferentPublicKeyBytesNotEqual) { function TEST (line 386) | TEST(HpkePublicKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/hybrid/hybrid_config.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { FILE: cc/hybrid/hybrid_config.h function namespace (line 24) | namespace crypto { FILE: cc/hybrid/hybrid_config_test.cc type crypto (line 64) | namespace crypto { type tink (line 65) | namespace tink { class HybridConfigTest (line 85) | class HybridConfigTest : public ::testing::Test { method SetUp (line 87) | void SetUp() override { function TEST_F (line 93) | TEST_F(HybridConfigTest, Basic) { function TEST_F (line 119) | TEST_F(HybridConfigTest, EncryptWrapperRegistered) { function TEST_F (line 154) | TEST_F(HybridConfigTest, DecryptWrapperRegistered) { function TEST_F (line 187) | TEST_F(HybridConfigTest, EciesProtoParamsSerializationRegistered) { function EciesAeadHkdfParams (line 231) | EciesAeadHkdfParams CreateParams() { function TEST_F (line 254) | TEST_F(HybridConfigTest, EciesProtoPublicKeySerializationRegistered) { function TEST_F (line 316) | TEST_F(HybridConfigTest, EciesProtoPrivateKeySerializationRegistered) { function TEST_F (line 399) | TEST_F(HybridConfigTest, RegisterNonFipsTemplates) { FILE: cc/hybrid/hybrid_decrypt_factory.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { FILE: cc/hybrid/hybrid_decrypt_factory.h function namespace (line 28) | namespace crypto { FILE: cc/hybrid/hybrid_decrypt_factory_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { class HybridDecryptFactoryTest (line 53) | class HybridDecryptFactoryTest : public ::testing::Test { function EciesAeadHkdfPrivateKey (line 56) | EciesAeadHkdfPrivateKey GetNewEciesPrivateKey() { function TEST_F (line 62) | TEST_F(HybridDecryptFactoryTest, testBasic) { function TEST_F (line 73) | TEST_F(HybridDecryptFactoryTest, testPrimitive) { FILE: cc/hybrid/hybrid_decrypt_wrapper.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { class HybridDecryptSetWrapper (line 44) | class HybridDecryptSetWrapper : public HybridDecrypt { method HybridDecryptSetWrapper (line 46) | explicit HybridDecryptSetWrapper( function Validate (line 109) | util::Status Validate(PrimitiveSet* hybrid_decrypt_se... FILE: cc/hybrid/hybrid_decrypt_wrapper.h function namespace (line 29) | namespace crypto { FILE: cc/hybrid/hybrid_decrypt_wrapper_test.cc type crypto (line 61) | namespace crypto { type tink (line 62) | namespace tink { class HybridDecryptSetWrapperTest (line 65) | class HybridDecryptSetWrapperTest : public ::testing::Test { method SetUp (line 67) | void SetUp() override { method TearDown (line 69) | void TearDown() override { function TEST_F (line 73) | TEST_F(HybridDecryptSetWrapperTest, Basic) { function PopulateKeyInfo (line 189) | KeysetInfo::KeyInfo PopulateKeyInfo(uint32_t key_id, function KeysetInfo (line 200) | KeysetInfo CreateTestKeysetInfo() { class HybridDecryptSetWrapperWithMonitoringTest (line 215) | class HybridDecryptSetWrapperWithMonitoringTest : public Test { method SetUp (line 219) | void SetUp() override { function TEST_F (line 252) | TEST_F(HybridDecryptSetWrapperWithMonitoringTest, function TEST_F (line 299) | TEST_F(HybridDecryptSetWrapperWithMonitoringTest, FILE: cc/hybrid/hybrid_encrypt_factory.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { FILE: cc/hybrid/hybrid_encrypt_factory.h function namespace (line 28) | namespace crypto { FILE: cc/hybrid/hybrid_encrypt_factory_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { class HybridEncryptFactoryTest (line 49) | class HybridEncryptFactoryTest : public ::testing::Test { function EciesAeadHkdfPublicKey (line 52) | EciesAeadHkdfPublicKey GetNewEciesPublicKey() { function TEST_F (line 59) | TEST_F(HybridEncryptFactoryTest, testBasic) { function TEST_F (line 70) | TEST_F(HybridEncryptFactoryTest, testPrimitive) { FILE: cc/hybrid/hybrid_encrypt_wrapper.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function Validate (line 44) | util::Status Validate(PrimitiveSet* hybrid_encrypt_se... class HybridEncryptSetWrapper (line 59) | class HybridEncryptSetWrapper : public HybridEncrypt { method HybridEncryptSetWrapper (line 61) | explicit HybridEncryptSetWrapper( FILE: cc/hybrid/hybrid_encrypt_wrapper.h function namespace (line 29) | namespace crypto { FILE: cc/hybrid/hybrid_encrypt_wrapper_test.cc type crypto (line 59) | namespace crypto { type tink (line 60) | namespace tink { class HybridEncryptSetWrapperTest (line 63) | class HybridEncryptSetWrapperTest : public ::testing::Test { method SetUp (line 65) | void SetUp() override { method TearDown (line 67) | void TearDown() override { function TEST_F (line 71) | TEST_F(HybridEncryptSetWrapperTest, testBasic) { function PopulateKeyInfo (line 153) | KeysetInfo::KeyInfo PopulateKeyInfo(uint32_t key_id, function KeysetInfo (line 164) | KeysetInfo CreateTestKeysetInfo() { class HybridEncryptSetWrapperWithMonitoringTest (line 179) | class HybridEncryptSetWrapperWithMonitoringTest : public Test { method SetUp (line 183) | void SetUp() override { function TEST_F (line 216) | TEST_F(HybridEncryptSetWrapperWithMonitoringTest, function TEST_F (line 260) | TEST_F(HybridEncryptSetWrapperWithMonitoringTest, FILE: cc/hybrid/hybrid_key_templates.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function KeyTemplate (line 45) | KeyTemplate* NewEciesAeadHkdfKeyTemplate( function KeyTemplate (line 68) | KeyTemplate* NewHpkeKeyTemplate(HpkeKem kem, HpkeKdf kdf, HpkeAead a... function KeyTemplate (line 86) | const KeyTemplate& HybridKeyTemplates::EciesP256HkdfHmacSha256Aes128... function KeyTemplate (line 98) | const KeyTemplate& HybridKeyTemplates::EciesP256HkdfHmacSha512Aes128... function KeyTemplate (line 108) | const KeyTemplate& function KeyTemplate (line 121) | const KeyTemplate& function KeyTemplate (line 134) | const KeyTemplate& function KeyTemplate (line 145) | const KeyTemplate& function KeyTemplate (line 156) | const KeyTemplate& function KeyTemplate (line 167) | const KeyTemplate& HybridKeyTemplates::EciesX25519HkdfHmacSha256Aes1... function KeyTemplate (line 177) | const KeyTemplate& HybridKeyTemplates::EciesX25519HkdfHmacSha256Aes2... function KeyTemplate (line 187) | const KeyTemplate& function KeyTemplate (line 198) | const KeyTemplate& function KeyTemplate (line 209) | const KeyTemplate& function KeyTemplate (line 220) | const KeyTemplate& HybridKeyTemplates::HpkeX25519HkdfSha256Aes128Gcm... function KeyTemplate (line 228) | const KeyTemplate& HybridKeyTemplates::HpkeX25519HkdfSha256Aes128Gcm... function KeyTemplate (line 236) | const KeyTemplate& HybridKeyTemplates::HpkeX25519HkdfSha256Aes256Gcm... function KeyTemplate (line 244) | const KeyTemplate& HybridKeyTemplates::HpkeX25519HkdfSha256Aes256Gcm... function KeyTemplate (line 252) | const KeyTemplate& function KeyTemplate (line 261) | const KeyTemplate& FILE: cc/hybrid/hybrid_key_templates.h function namespace (line 22) | namespace crypto { FILE: cc/hybrid/hybrid_key_templates_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { class HybridKeyTemplatesTest (line 52) | class HybridKeyTemplatesTest : public ::testing::Test { method SetUpTestSuite (line 54) | static void SetUpTestSuite() { function TEST_F (line 60) | TEST_F(HybridKeyTemplatesTest, EciesP256HkdfHmacSha256Aes128Gcm) { function TEST_F (line 93) | TEST_F(HybridKeyTemplatesTest, EciesP256HkdfHmacSha512Aes128Gcm) { function TEST_F (line 126) | TEST_F(HybridKeyTemplatesTest, function TEST_F (line 160) | TEST_F(HybridKeyTemplatesTest, EciesP256HkdfHmacSha256Aes128CtrHmacS... function TEST_F (line 193) | TEST_F(HybridKeyTemplatesTest, EciesP256HkdfHmacSha512Aes128CtrHmacS... function TEST_F (line 226) | TEST_F(HybridKeyTemplatesTest, EciesP256CompressedHkdfHmacSha256Aes1... function TEST_F (line 259) | TEST_F(HybridKeyTemplatesTest, function TEST_F (line 293) | TEST_F(HybridKeyTemplatesTest, EciesX25519HkdfHmacSha256Aes128Gcm) { function TEST_F (line 326) | TEST_F(HybridKeyTemplatesTest, EciesX25519HkdfHmacSha256Aes256Gcm) { function TEST_F (line 359) | TEST_F(HybridKeyTemplatesTest, function TEST_F (line 393) | TEST_F(HybridKeyTemplatesTest, EciesX25519HkdfHmacSha256XChaCha20Pol... function TEST_F (line 426) | TEST_F(HybridKeyTemplatesTest, EciesX25519HkdfHmacSha256Deterministi... function TEST_F (line 459) | TEST_F(HybridKeyTemplatesTest, HpkeX25519HkdfSha256Aes128Gcm) { function TEST_F (line 485) | TEST_F(HybridKeyTemplatesTest, HpkeX25519HkdfSha256Aes128GcmRaw) { function TEST_F (line 511) | TEST_F(HybridKeyTemplatesTest, HpkeX25519HkdfSha256Aes256Gcm) { function TEST_F (line 537) | TEST_F(HybridKeyTemplatesTest, HpkeX25519HkdfSha256Aes256GcmRaw) { function TEST_F (line 563) | TEST_F(HybridKeyTemplatesTest, HpkeX25519HkdfSha256ChaCha20Poly1305) { function TEST_F (line 589) | TEST_F(HybridKeyTemplatesTest, HpkeX25519HkdfSha256ChaCha20Poly1305R... FILE: cc/hybrid/hybrid_parameters.h function namespace (line 22) | namespace crypto { FILE: cc/hybrid/hybrid_private_key.h function namespace (line 27) | namespace crypto { FILE: cc/hybrid/hybrid_public_key.h function namespace (line 24) | namespace crypto { FILE: cc/hybrid/internal/config_v0.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type internal (line 34) | namespace internal { function AddHybridV0 (line 36) | util::Status AddHybridV0(Configuration& config) { FILE: cc/hybrid/internal/config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/hybrid/internal/config_v0_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type internal (line 45) | namespace internal { function TEST (line 54) | TEST(HybridV0Test, PrimitiveWrappers) { function TEST (line 65) | TEST(HybridV0Test, KeyManagers) { function TEST_P (line 100) | TEST_P(HybridV0KeyTypesTest, GetPrimitive) { FILE: cc/hybrid/internal/hpke_context.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type internal (line 35) | namespace internal { function ConcatenatePayload (line 39) | std::string ConcatenatePayload(absl::string_view encapsulated_key, function SplitPayload (line 44) | util::StatusOr SplitPayload(const HpkeKem& kem, FILE: cc/hybrid/internal/hpke_context.h function namespace (line 32) | namespace crypto { FILE: cc/hybrid/internal/hpke_context_boringssl.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type internal (line 40) | namespace internal { FILE: cc/hybrid/internal/hpke_context_boringssl.h function namespace (line 35) | namespace crypto { FILE: cc/hybrid/internal/hpke_context_boringssl_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type internal (line 35) | namespace internal { class HpkeContextBoringSslTest (line 43) | class HpkeContextBoringSslTest : public testing::TestWithParam {} function TEST_P (line 56) | TEST_P(HpkeContextTest, SealAndOpen) { function TEST_P (line 92) | TEST_P(HpkeContextTest, Export) { function TEST_P (line 128) | TEST_P(HpkeContextTest, OpenTruncatedCiphertextFails) { function TEST_P (line 153) | TEST_P(HpkeContextTest, OpenModifiedCiphertextFails) { function TEST_P (line 178) | TEST_P(HpkeContextTest, OpenModifiedAssociatedDataFails) { class HpkeContextWithBadHpkeParamTest (line 203) | class HpkeContextWithBadHpkeParamTest : public TestWithParam Encrypt(HpkeParams params, class HpkeDecryptTest (line 71) | class HpkeDecryptTest : public testing::TestWithParam {} function TEST_P (line 81) | TEST_P(HpkeDecryptTest, SetupRecipientContextAndDecrypt) { class HpkeDecryptWithBadParamTest (line 107) | class HpkeDecryptWithBadParamTest : public testing::TestWithParam {} function TEST_P (line 68) | TEST_P(HpkeEncryptTest, SetupSenderContextAndEncrypt) { class HpkeEncryptWithBadParamTest (line 98) | class HpkeEncryptWithBadParamTest : public testing::TestWithParam CreateKey(HpkeKem kem, HpkeKdf kdf, function TEST (line 68) | TEST(HpkePrivateKeyManagerTest, BasicAccessors) { function TEST (line 76) | TEST(HpkePrivateKeyManagerTest, ValidateEmptyKeyFormatFails) { function TEST (line 81) | TEST(HpkePrivateKeyManagerTest, ValidateKeyFormatSucceeds) { function TEST (line 88) | TEST(HpkePrivateKeyManagerTest, ValidateKeyFormatWithInvalidKemFai... function TEST (line 95) | TEST(HpkePrivateKeyManagerTest, ValidateKeyFormatWithInvalidKdfFai... function TEST (line 102) | TEST(HpkePrivateKeyManagerTest, ValidateKeyFormatWithInvalidAeadFa... function TEST (line 109) | TEST(HpkePrivateKeyManagerTest, CreateKeySucceeds) { function TEST (line 128) | TEST(HpkePrivateKeyManagerTest, CreateP256KeySucceeds) { function TEST (line 161) | TEST(HpkePrivateKeyManagerTest, CreateP384KeySucceeds) { function TEST (line 194) | TEST(HpkePrivateKeyManagerTest, CreateP521KeySucceeds) { function TEST (line 227) | TEST(HpkePrivateKeyManagerTest, CreateKeyWithInvalidKemFails) { function TEST (line 235) | TEST(HpkePrivateKeyManagerTest, ValidateEmptyKeyFails) { function TEST (line 240) | TEST(HpkePrivateKeyManagerTest, ValidateKeySucceeds) { function TEST (line 249) | TEST(HpkePrivateKeyManagerTest, ValidateKeyWithWrongVersionFails) { function TEST (line 260) | TEST(HpkePrivateKeyManagerTest, ValidateKeyWithInvalidKemFails) { function TEST (line 271) | TEST(HpkePrivateKeyManagerTest, ValidateKeyWithInvalidKdfFails) { function TEST (line 281) | TEST(HpkePrivateKeyManagerTest, ValidateKeyWithInvalidAeadFails) { function TEST (line 291) | TEST(HpkePrivateKeyManagerTest, GetPublicKeySucceeds) { function TEST (line 311) | TEST(HpkePrivateKeyManagerTest, GetPublicKeyP256Succeeds) { function TEST (line 332) | TEST(HpkePrivateKeyManagerTest, GetPublicKey384Succeeds) { function TEST (line 353) | TEST(HpkePrivateKeyManagerTest, GetPublicKey521Succeeds) { function TEST (line 374) | TEST(HpkePrivateKeyManagerTest, EncryptThenDecryptSucceeds) { function TEST (line 394) | TEST(HpkePrivateKeyManagerTest, GetPrimitiveP256Fails) { function TEST (line 410) | TEST(HpkePrivateKeyManagerTest, GetPrimitiveP384Fails) { function TEST (line 426) | TEST(HpkePrivateKeyManagerTest, GetPrimitiveP521Fails) { function TEST (line 442) | TEST(HpkePrivateKeyManagerTest, EncryptThenDecryptWithDifferentKey... FILE: cc/hybrid/internal/hpke_public_key_manager.cc type crypto (line 22) | namespace crypto { type tink (line 23) | namespace tink { type internal (line 24) | namespace internal { FILE: cc/hybrid/internal/hpke_public_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/hybrid/internal/hpke_public_key_manager_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { function TEST (line 44) | TEST(HpkePublicKeyManagerTest, BasicAccessors) { function TEST (line 52) | TEST(HpkePublicKeyManagerTest, ValidateEmptyKeyFails) { function TEST (line 57) | TEST(HpkePublicKeyManagerTest, ValidateKeySucceeds) { function TEST (line 65) | TEST(HpkePublicKeyManagerTest, ValidateKeyWithInvalidKemFails) { function TEST (line 73) | TEST(HpkePublicKeyManagerTest, ValidateKeyWithInvalidKdfFails) { function TEST (line 81) | TEST(HpkePublicKeyManagerTest, ValidateKeyWithInvalidAeadFails) { FILE: cc/hybrid/internal/hpke_test_util.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type internal (line 31) | namespace internal { function HpkeTestParams (line 100) | HpkeTestParams DefaultHpkeTestParams() { function CreateHpkeTestParams (line 104) | util::StatusOr CreateHpkeTestParams( function CreateHpkeTestParams (line 130) | util::StatusOr CreateHpkeTestParams(const HpkePara... function CreateHpkeParams (line 155) | google::crypto::tink::HpkeParams CreateHpkeParams( function CreateHpkePublicKey (line 166) | google::crypto::tink::HpkePublicKey CreateHpkePublicKey( function CreateHpkePrivateKey (line 176) | google::crypto::tink::HpkePrivateKey CreateHpkePrivateKey( FILE: cc/hybrid/internal/hpke_util.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type internal (line 31) | namespace internal { function HpkeKemProtoToEnum (line 34) | util::StatusOr HpkeKemProtoToEnum(google::crypto::tink::H... function HpkeKdfProtoToEnum (line 45) | util::StatusOr HpkeKdfProtoToEnum(google::crypto::tink::H... function HpkeAeadProtoToEnum (line 56) | util::StatusOr HpkeAeadProtoToEnum( function HpkeParamsProtoToStruct (line 74) | util::StatusOr HpkeParamsProtoToStruct( function HpkeEncapsulatedKeyLength (line 85) | util::StatusOr HpkeEncapsulatedKeyLength( FILE: cc/hybrid/internal/hpke_util.h function HpkeKem (line 30) | enum class HpkeKem { FILE: cc/hybrid/internal/hpke_util_boringssl.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { function KemParam (line 32) | util::StatusOr KemParam(const HpkeParams& par... function KemParam (line 43) | util::StatusOr KemParam( function KemParam (line 55) | util::StatusOr KemParam( function KdfParam (line 60) | util::StatusOr KdfParam(const HpkeParams& par... function KdfParam (line 71) | util::StatusOr KdfParam( function AeadParam (line 83) | util::StatusOr AeadParam(const HpkeParams& p... function AeadParam (line 98) | util::StatusOr AeadParam( FILE: cc/hybrid/internal/hpke_util_boringssl.h function namespace (line 25) | namespace crypto { FILE: cc/hybrid/internal/hpke_util_boringssl_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type internal (line 34) | namespace internal { function TEST (line 41) | TEST(HpkeUtilBoringSslTest, ValidParamsFromProto) { function TEST (line 67) | TEST(HpkeUtilBoringSslTest, ValidParamsFromStruct) { function TEST (line 85) | TEST(HpkeUtilBoringSslTest, UnknownKemParamFromProto) { function TEST (line 95) | TEST(HpkeUtilBoringSslTest, UnknownKemParamFromStruct) { function TEST (line 103) | TEST(HpkeUtilBoringSslTest, UnknownKdfParamFromProto) { function TEST (line 113) | TEST(HpkeUtilBoringSslTest, UnknownKdfParamFromStruct) { function TEST (line 121) | TEST(HpkeUtilBoringSslTest, UnknownAeadParamFromProto) { function TEST (line 131) | TEST(HpkeUtilBoringSslTest, UnknownAeadParamFromStruct) { FILE: cc/hybrid/internal/hpke_util_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type internal (line 29) | namespace internal { type HpkeParamsConversionTestCase (line 38) | struct HpkeParamsConversionTestCase { function TEST_P (line 68) | TEST_P(HpkeParamsConversionTest, HpkeParamsProtoToStruct) { function TEST_P (line 93) | TEST_P(HpkeBadParamsTest, HpkeParamsProtoToStruct) { function TEST (line 99) | TEST(HpkeKemEncodingSizeTest, HpkeEncapsulatedKeyLength) { FILE: cc/hybrid/internal/key_gen_config_v0.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type internal (line 32) | namespace internal { function AddHybridKeyGenV0 (line 34) | util::Status AddHybridKeyGenV0(KeyGenConfiguration& config) { FILE: cc/hybrid/internal/key_gen_config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/hybrid/internal/test_hpke_context_boringssl.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type internal (line 38) | namespace internal { FILE: cc/hybrid/internal/test_hpke_context_boringssl.h function namespace (line 34) | namespace crypto { FILE: cc/hybrid/key_gen_config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function KeyGenConfiguration (line 26) | const KeyGenConfiguration& KeyGenConfigHybridV0() { FILE: cc/hybrid/key_gen_config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/hybrid_decrypt.h function namespace (line 25) | namespace crypto { FILE: cc/hybrid_encrypt.h function namespace (line 25) | namespace crypto { FILE: cc/input_stream.h function namespace (line 25) | namespace crypto { FILE: cc/insecure_secret_key_access.h function namespace (line 22) | namespace crypto { FILE: cc/integration/awskms/aws_kms_aead.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type integration (line 40) | namespace integration { type awskms (line 41) | namespace awskms { function AwsErrorToString (line 44) | std::string AwsErrorToString(Aws::Client::AWSError ReadFile(const std::string& filename) { function GetValue (line 123) | util::StatusOr GetValue(absl::string_view name, function TEST (line 134) | TEST(AwsKmsAeadTest, AwsKmsAeadNewWorks) { FILE: cc/integration/awskms/aws_kms_client.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type integration (line 44) | namespace integration { type awskms (line 45) | namespace awskms { function GetKeyArn (line 53) | util::StatusOr GetKeyArn(absl::string_view key_uri) { function GetAwsClientConfig (line 65) | util::StatusOr GetAwsClientCon... function ReadFile (line 82) | util::StatusOr ReadFile(const std::string& filename) { function GetValue (line 97) | util::StatusOr GetValue(absl::string_view name, function GetAwsCredentials (line 133) | util::StatusOr GetAwsCredentials( function InitAwsApi (line 173) | void InitAwsApi() { FILE: cc/integration/awskms/aws_kms_client.h function namespace (line 32) | namespace crypto { FILE: cc/integration/awskms/aws_kms_client_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type integration (line 38) | namespace integration { type awskms (line 39) | namespace awskms { function TEST (line 56) | TEST(AwsKmsClientTest, CreateClientNotBoundToSpecificKeySupports... function TEST (line 69) | TEST(AwsKmsClientTest, CreateClientBoundToSpecificKeySupportOnly... function TEST (line 80) | TEST(AwsKmsClientTest, RegisterKmsClient) { function TEST (line 88) | TEST(AwsKmsClientTest, RegisterKmsClientFailsWhenKeyIsInvalid) { function TEST (line 97) | TEST(AwsKmsClientTest, RegisterKmsClientFailsWhenCredentialsDoNo... function TEST (line 105) | TEST(AwsKmsClientTest, RegisterKmsClientFailsWhenMalformedCreden... FILE: cc/integration/awskms/internal/test_file_util.h function namespace (line 21) | namespace crypto { FILE: cc/integration/awskms/internal/test_file_util_bazel.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { type integration (line 25) | namespace integration { type awskms (line 26) | namespace awskms { type internal (line 27) | namespace internal { function RunfilesPath (line 31) | std::string RunfilesPath(absl::string_view path) { FILE: cc/integration/gcpkms/gcp_kms_aead.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { type integration (line 37) | namespace integration { type gcpkms (line 38) | namespace gcpkms { function NewGcpKmsAead (line 49) | util::StatusOr> NewGcpKmsAead( FILE: cc/integration/gcpkms/gcp_kms_aead.h function namespace (line 29) | namespace crypto { FILE: cc/integration/gcpkms/gcp_kms_aead_integration_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type integration (line 41) | namespace integration { type gcpkms (line 42) | namespace gcpkms { function RunfilesPath (line 60) | std::string RunfilesPath(absl::string_view path) { class GcpKmsAeadIntegrationTestEnvironment (line 70) | class GcpKmsAeadIntegrationTestEnvironment : public Environment { method SetUp (line 74) | void SetUp() override { function TEST (line 89) | TEST(GcpKmsAeadIntegrationTest, EncryptDecrypt) { function ReadFile (line 112) | util::StatusOr ReadFile(const std::string& filename) { function TEST (line 125) | TEST(GcpKmsAeadIntegrationTest, GcpKmsAeadNewWorks) { FILE: cc/integration/gcpkms/gcp_kms_aead_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type integration (line 36) | namespace integration { type gcpkms (line 37) | namespace gcpkms { class TestGcpKmsAead (line 56) | class TestGcpKmsAead : public testing::Test { method TestGcpKmsAead (line 58) | TestGcpKmsAead() method ExpectEncrypt (line 65) | void ExpectEncrypt(const DummyAead& aead, int times) { method ExpectDecrypt (line 78) | void ExpectDecrypt(const DummyAead& aead, int times) { function TEST_F (line 101) | TEST_F(TestGcpKmsAead, FailsWithNullKmsClient) { function TEST_F (line 107) | TEST_F(TestGcpKmsAead, FailsWithEmptyKeyName) { function TEST_F (line 113) | TEST_F(TestGcpKmsAead, FailsWithWrongKeyName) { function TEST_F (line 119) | TEST_F(TestGcpKmsAead, EncryptionDecryptionWorks) { FILE: cc/integration/gcpkms/gcp_kms_client.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type integration (line 43) | namespace integration { type gcpkms (line 44) | namespace gcpkms { function ReadFile (line 54) | util::StatusOr ReadFile(absl::string_view filename) { function GetCredentials (line 67) | util::StatusOr> GetCre... function GetKeyName (line 100) | util::StatusOr GetKeyName(absl::string_view key_uri) { FILE: cc/integration/gcpkms/gcp_kms_client.h function namespace (line 32) | namespace crypto { FILE: cc/integration/gcpkms/gcp_kms_client_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type integration (line 34) | namespace integration { type gcpkms (line 35) | namespace gcpkms { function TEST (line 41) | TEST(GcpKmsClientTest, ClientNotBoundToAKey) { function TEST (line 56) | TEST(GcpKmsClientTest, ClientBoundToASpecificKey) { function TEST (line 71) | TEST(GcpKmsClientTest, ClientCreationAndRegistry) { function TEST (line 84) | TEST(GcpKmsClientTest, ClientCreationInvalidRegistry) { FILE: cc/integration/gcpkms/gcp_kms_public_key_sign.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type integration (line 40) | namespace integration { type gcpkms (line 41) | namespace gcpkms { function RequiresDataForSign (line 63) | bool RequiresDataForSign(CryptoKeyVersion::CryptoKeyVersionAlgor... function GetDigestFromAlgorithm (line 88) | StatusOr GetDigestFromAlgorithm( function ComputeDigest (line 113) | StatusOr ComputeDigest(absl::string_view data, function BuildAsymmetricSignRequest (line 144) | StatusOr BuildAsymmetricSignRequest( class GcpKmsPublicKeySign (line 190) | class GcpKmsPublicKeySign : public PublicKeySign { method GcpKmsPublicKeySign (line 195) | GcpKmsPublicKeySign( function CreateGcpKmsPublicKeySign (line 260) | StatusOr> CreateGcpKmsPublicKeySign( FILE: cc/integration/gcpkms/gcp_kms_public_key_sign.h function namespace (line 28) | namespace crypto { FILE: cc/integration/gcpkms/gcp_kms_public_key_sign_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type integration (line 36) | namespace integration { type gcpkms (line 37) | namespace gcpkms { class TestGcpKmsPublicKeySign (line 71) | class TestGcpKmsPublicKeySign : public testing::Test { method TestGcpKmsPublicKeySign (line 73) | TestGcpKmsPublicKeySign() method ExpectSign (line 79) | void ExpectSign(const DummyPublicKeySign& signer, int times) { method ExpectGetPublicKey (line 121) | void ExpectGetPublicKey(int times) { function TEST_F (line 159) | TEST_F(TestGcpKmsPublicKeySign, NullKmsClientFails) { function TEST_F (line 166) | TEST_F(TestGcpKmsPublicKeySign, EmptyKeyNameFails) { function TEST_F (line 172) | TEST_F(TestGcpKmsPublicKeySign, WrongKeyNameFails) { function TEST_F (line 178) | TEST_F(TestGcpKmsPublicKeySign, GetPublicKeyFails) { function TEST_F (line 187) | TEST_F(TestGcpKmsPublicKeySign, AsymmetricSignFails) { function TEST_F (line 199) | TEST_F(TestGcpKmsPublicKeySign, WrongInputCrc32cFails) { function TEST_F (line 212) | TEST_F(TestGcpKmsPublicKeySign, WrongSignatureCrc32cFails) { function TEST_F (line 223) | TEST_F(TestGcpKmsPublicKeySign, LargeInputDataFails) { function TEST_F (line 234) | TEST_F(TestGcpKmsPublicKeySign, WrongKeyNameInTheResponseFails) { function TEST_F (line 246) | TEST_F(TestGcpKmsPublicKeySign, PublicKeySignDataOnAlgorithmSucc... function TEST_F (line 256) | TEST_F(TestGcpKmsPublicKeySign, PublicKeySignDataOnProtectionLev... function TEST_F (line 266) | TEST_F(TestGcpKmsPublicKeySign, PublicKeySignDigestSuccess) { FILE: cc/internal/aes_util.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type internal (line 39) | namespace internal { function AesCtr128Crypt (line 41) | util::Status AesCtr128Crypt(absl::string_view data, uint8_t iv[Aes... function GetAesCtrCipherForKeySize (line 76) | util::StatusOr GetAesCtrCipherForKeySize( function GetAesCbcCipherForKeySize (line 89) | util::StatusOr GetAesCbcCipherForKeySize( FILE: cc/internal/aes_util.h function namespace (line 29) | namespace crypto { FILE: cc/internal/aes_util_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type internal (line 38) | namespace internal { type NistAesCtrTestVector (line 47) | struct NistAesCtrTestVector { class AesCtrTest (line 54) | class AesCtrTest : public testing::Test { method AesCtrTest (line 56) | AesCtrTest() : aes_key_(util::MakeSecretUniquePtr()) {} method SetUp (line 58) | void SetUp() override { function TEST_F (line 82) | TEST_F(AesCtrTest, AesCtrInvalidOutSize) { function TEST_F (line 94) | TEST_F(AesCtrTest, AesCtrPartiallyOverlappingFails) { function TEST_F (line 117) | TEST_F(AesCtrTest, AesCtrEncrypt) { function TEST_F (line 127) | TEST_F(AesCtrTest, AesCtrEncryptInPlace) { function TEST_F (line 136) | TEST_F(AesCtrTest, AesCtrDecrypt) { function TEST_F (line 146) | TEST_F(AesCtrTest, AesCtrDecryptInPlace) { function TEST (line 155) | TEST(AesUtilTest, GetAesCtrCipherForKeySize) { function TEST (line 168) | TEST(AesUtilTest, GetAesCbcCipherForKeySize) { FILE: cc/internal/bn_encoding_util.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type internal (line 29) | namespace internal { function GetValueOfFixedLength (line 31) | util::StatusOr GetValueOfFixedLength( FILE: cc/internal/bn_encoding_util.h function namespace (line 26) | namespace crypto { FILE: cc/internal/bn_encoding_util_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type internal (line 35) | namespace internal { function TEST (line 43) | TEST(BnEncodingUtilTest, GetValueOfFixedLength) { function TEST (line 57) | TEST(BnEncodingUtilTest, GetValueOfFixedLengthIntegerTooBig) { function TEST (line 67) | TEST(BnEncodingUtilTest, GetValueOfFixedLengthSameLength) { function TEST (line 77) | TEST(BnEncodingUtilTest, CreateBigIntegerObjectOfFixedLength) { FILE: cc/internal/bn_util.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type internal (line 36) | namespace internal { function BignumToBinaryPadded (line 38) | util::Status BignumToBinaryPadded(absl::Span buffer, function BignumToString (line 59) | util::StatusOr BignumToString(const BIGNUM *bn, size_... function BignumToSecretData (line 72) | util::StatusOr BignumToSecretData(const BIGNUM *bn, function StringToBignum (line 88) | util::StatusOr> StringToBignum( function CompareBignumWithWord (line 100) | int CompareBignumWithWord(const BIGNUM *bignum, BN_ULONG word) { FILE: cc/internal/bn_util.h function namespace (line 31) | namespace crypto { FILE: cc/internal/bn_util_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type internal (line 39) | namespace internal { function HexToBignum (line 45) | util::StatusOr> HexToBignum( function TEST (line 52) | TEST(BnUtil, StringToBignum) { function TEST (line 68) | TEST(StringToBignum, IgnoresLeadingZeros) { function TEST (line 83) | TEST(BnUtil, BignumToString) { function TEST (line 99) | TEST(BignumToStringWithBNNumBytes, NoLeadingZeros) { function TEST (line 157) | TEST(BignumToString, PadsWithLeadingZeros) { function TEST (line 176) | TEST(BignumToString, RejectsNegativeNumbers) { function TEST (line 187) | TEST(BnUtil, BignumToSecretData) { function TEST (line 205) | TEST(BnUtil, BignumToBinaryPadded) { function TEST (line 226) | TEST(BnUtil, BufferToSmall) { function TEST (line 253) | TEST(BnUtil, CompareBignumWithWord) { FILE: cc/internal/call_with_core_dump_protection.h function namespace (line 20) | namespace crypto { FILE: cc/internal/call_with_core_dump_protection_test.cc type crypto (line 20) | namespace crypto { type tink (line 21) | namespace tink { type internal (line 22) | namespace internal { function TEST (line 25) | TEST(CallWithCoreDumpProtectionTest, Basic) { function TEST (line 31) | TEST(CallWithCoreDumpProtectionTest, WithCapture) { FILE: cc/internal/configuration_impl.h function namespace (line 33) | namespace crypto { FILE: cc/internal/configuration_impl_test.cc type crypto (line 53) | namespace crypto { type tink (line 54) | namespace tink { type internal (line 55) | namespace internal { class FakePrimitive (line 71) | class FakePrimitive { method FakePrimitive (line 73) | explicit FakePrimitive(std::string s) : s_(s) {} method get (line 74) | std::string get() { return s_; } class FakePrimitive2 (line 80) | class FakePrimitive2 { method FakePrimitive2 (line 82) | explicit FakePrimitive2(std::string s) : s_(s) {} method get (line 83) | std::string get() { return s_ + "2"; } class FakeKeyTypeManager (line 90) | class FakeKeyTypeManager class FakePrimitiveFactory (line 93) | class FakePrimitiveFactory : public PrimitiveFactory> Create( method FakeKeyTypeManager (line 101) | FakeKeyTypeManager() method key_material_type (line 104) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 108) | uint32_t get_version() const override { return 0; } method ValidateKey (line 112) | util::Status ValidateKey(const AesGcmKey& key) const override { method ValidateKeyFormat (line 116) | util::Status ValidateKeyFormat( method CreateKey (line 121) | util::StatusOr CreateKey( method DeriveKey (line 126) | util::StatusOr DeriveKey( class FakePrimitiveWrapper (line 138) | class FakePrimitiveWrapper method Wrap (line 141) | util::StatusOr> Wrap( class FakePrimitiveWrapper2 (line 150) | class FakePrimitiveWrapper2 method Wrap (line 153) | util::StatusOr> Wrap( function AddAesGcmKeyToKeyset (line 161) | std::string AddAesGcmKeyToKeyset(Keyset& keyset, uint32_t key_id, function TEST (line 175) | TEST(ConfigurationImplTest, AddPrimitiveWrapper) { function TEST (line 182) | TEST(ConfigurationImplTest, AddKeyTypeManager) { function TEST (line 189) | TEST(ConfigurationImplTest, AddLegacyKeyManager) { function TEST (line 197) | TEST(ConfigurationImplTest, GetKeyTypeInfoStore) { function TEST (line 206) | TEST(ConfigurationImplTest, GetKeyTypeManager) { function TEST (line 225) | TEST(ConfigurationImplTest, GetLegacyKeyManager) { function TEST (line 245) | TEST(ConfigurationImplTest, GetMissingKeyManagerFails) { function TEST (line 254) | TEST(ConfigurationImplTest, GetKeysetWrapperStoreAndWrap) { function TEST (line 281) | TEST(ConfigurationImplTest, KeysetWrapperWrapMissingKeyTypeInfoFai... function TEST (line 303) | TEST(ConfigurationImplTest, KeysetWrapperWrapMissingKeyManagerFail... class FakeSignKeyManager (line 334) | class FakeSignKeyManager class PublicKeySignFactory (line 338) | class PublicKeySignFactory : public PrimitiveFactory> Create( method FakeSignKeyManager (line 346) | explicit FakeSignKeyManager() method key_material_type (line 349) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 353) | uint32_t get_version() const override { return 0; } method ValidateKey (line 357) | util::Status ValidateKey(const RsaSsaPssPrivateKey& key) const o... method ValidateKeyFormat (line 361) | util::Status ValidateKeyFormat( method CreateKey (line 366) | util::StatusOr CreateKey( method DeriveKey (line 371) | util::StatusOr DeriveKey( method GetPublicKey (line 377) | util::StatusOr GetPublicKey( class FakeVerifyKeyManager (line 386) | class FakeVerifyKeyManager class PublicKeyVerifyFactory (line 389) | class PublicKeyVerifyFactory : public PrimitiveFactory> Create( method FakeVerifyKeyManager (line 398) | explicit FakeVerifyKeyManager() method key_material_type (line 401) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 405) | uint32_t get_version() const override { return 0; } method ValidateKey (line 409) | util::Status ValidateKey(const RsaSsaPssPublicKey& key) const ov... method ValidateParams (line 413) | util::Status ValidateParams(const RsaSsaPssParams& params) const { function TEST (line 421) | TEST(ConfigurationImplTest, AddAsymmetricKeyManagers) { function TEST (line 429) | TEST(ConfigurationImplTest, GetAsymmetricKeyManagers) { function TEST (line 466) | TEST(ConfigurationImplTest, GlobalRegistryMode) { function TEST (line 511) | TEST(ConfigurationImplTest, GlobalRegistryModeWithNonEmptyConfigFa... FILE: cc/internal/ec_util.cc type crypto (line 52) | namespace crypto { type tink (line 53) | namespace tink { type internal (line 54) | namespace internal { function SslEcPointEncode (line 61) | util::StatusOr SslEcPointEncode( function SslGetEcPointFromCoordinates (line 88) | util::StatusOr> SslGetEcPointFromCoordinates( function SslGetEcPointFromEncoded (line 111) | util::StatusOr> SslGetEcPointFromEncoded( type EcPointCoordinates (line 165) | struct EcPointCoordinates { function SslGetEcPointCoordinates (line 172) | util::StatusOr SslGetEcPointCoordinates( function ScalarSizeInBytes (line 190) | size_t ScalarSizeInBytes(const EC_GROUP *group) { function SslEcFieldSizeInBytes (line 194) | size_t SslEcFieldSizeInBytes(const EC_GROUP *group) { type SslEvpPkeyType (line 199) | enum SslEvpPkeyType { function SslNewEvpKey (line 205) | util::StatusOr> SslNewEvpKey(SslEvpPkeyType... function SslNewKeyPairFromEcKey (line 226) | util::Status SslNewKeyPairFromEcKey(SslEvpPkeyType key_type, function SslEcdsaSignatureToBytes (line 255) | util::StatusOr SslEcdsaSignatureToBytes( function EcKeyFromSslEcKey (line 273) | util::StatusOr EcKeyFromSslEcKey(EllipticCurveType curve, function EcFieldSizeInBytes (line 314) | util::StatusOr EcFieldSizeInBytes(EllipticCurveType curve... function EcPointEncodingSizeInBytes (line 326) | util::StatusOr EcPointEncodingSizeInBytes(EllipticCurveTy... function NewEcKey (line 355) | util::StatusOr NewEcKey(EllipticCurveType curve_type) { function NewEcKey (line 378) | util::StatusOr NewEcKey(EllipticCurveType curve_type, function NewX25519Key (line 417) | util::StatusOr> NewX25519Key() { function EcKey (line 435) | EcKey EcKeyFromX25519Key(const X25519Key *x25519_key) { function NewEd25519Key (line 447) | util::StatusOr> NewEd25519Key() { function NewEd25519Key (line 453) | util::StatusOr> NewEd25519Key( function X25519KeyFromEcKey (line 489) | util::StatusOr> X25519KeyFromEcKey( function ComputeX25519SharedSecret (line 508) | util::StatusOr ComputeX25519SharedSecret( function X25519KeyFromPrivateKey (line 533) | util::StatusOr> X25519KeyFromPrivateKey( function EcPointEncode (line 554) | util::StatusOr EcPointEncode(EllipticCurveType curve, function EcPointDecode (line 606) | util::StatusOr> EcPointDecode( function EcGroupFromCurveType (line 636) | util::StatusOr> EcGroupFromCurveType( function CurveTypeFromEcGroup (line 663) | util::StatusOr CurveTypeFromEcGroup(const EC_GR... function GetEcPoint (line 681) | util::StatusOr> GetEcPoint(EllipticCurveTyp... function ComputeEcdhSharedSecret (line 691) | util::StatusOr ComputeEcdhSharedSecret( function EcSignatureIeeeToDer (line 730) | util::StatusOr EcSignatureIeeeToDer(const EC_GROUP *g... FILE: cc/internal/ec_util.h function namespace (line 31) | namespace crypto { FILE: cc/internal/ec_util_test.cc type crypto (line 52) | namespace crypto { type tink (line 53) | namespace tink { type internal (line 54) | namespace internal { function TEST (line 79) | TEST(EcUtilTest, NewEd25519KeyWithWycheproofTestVectors) { function TEST (line 97) | TEST(EcUtilTest, NewEd25519KeyInvalidSeed) { function TEST (line 116) | TEST(EcUtilTest, NewEcKeyReturnsWellFormedX25519Key) { function EqualsEcKey (line 131) | Matcher EqualsEcKey(const EcKey& expected) { function TEST_P (line 138) | TEST_P(EcUtilNewEcKeyWithSeed, KeysFromDifferentSeedAreDifferent) { function TEST_P (line 159) | TEST_P(EcUtilNewEcKeyWithSeed, SameSeedGivesSameKey) { function TEST (line 182) | TEST(EcUtilTest, GenerationWithSeedFailsWithWrongCurve) { function TEST (line 196) | TEST(EcUtilTest, NewEcKeyFromSeedUnimplementedIfOpenSsl) { function TEST (line 211) | TEST(EcUtilTest, NewX25519KeyGeneratesNewKeyEveryTime) { function TEST (line 229) | TEST(EcUtilTest, X25519KeyToEcKeyAndBack) { function TEST (line 248) | TEST(EcUtilTest, X25519KeyFromRandomPrivateKey) { type X25519FunctionTestVector (line 267) | struct X25519FunctionTestVector { function GetX25519FunctionTestVectors (line 274) | std::vector GetX25519FunctionTestVectors... function TEST_P (line 316) | TEST_P(X25519FunctionTest, ComputeX25519PublicKey) { type X25519SharedSecretTestVector (line 329) | struct X25519SharedSecretTestVector { function GetX25519SharedSecretTestVectors (line 337) | std::vector GetX25519SharedSecretTes... function TEST_P (line 366) | TEST_P(X25519SharedSecretTest, ComputeX25519SharedSecret) { function TEST (line 389) | TEST(EcUtilTest, ComputeX25519SharedSecretInvalidKeyType) { type EncodingTestVector (line 429) | struct EncodingTestVector { function GetEncodingTestVectors (line 437) | std::vector GetEncodingTestVectors() { function TEST_P (line 471) | TEST_P(EcUtilEncodeDecodePointTest, EcPointEncode) { function TEST_P (line 484) | TEST_P(EcUtilEncodeDecodePointTest, EcPointDecode) { function TEST (line 530) | TEST(EcUtilTest, EcFieldSizeInBytes) { function TEST (line 543) | TEST(EcUtilTest, EcPointEncodingSizeInBytes) { function TEST (line 572) | TEST(EcUtilTest, CurveTypeFromEcGroupSuccess) { function TEST (line 589) | TEST(EcUtilTest, CurveTypeFromEcGroupUnimplemented) { function TEST (line 595) | TEST(EcUtilTest, EcGroupFromCurveTypeSuccess) { function TEST (line 624) | TEST(EcUtilTest, EcGroupFromCurveTypeUnimplemented) { function TEST (line 629) | TEST(EcUtilTest, GetEcPointReturnsAValidPoint) { function TEST (line 665) | TEST(EcUtilTest, EcSignatureIeeeToDer) { function TEST_P (line 716) | TEST_P(EcKeyFromSslEcKeyTestWithParam, EcKeyFromSslEcKeySucceeds) { function TEST (line 733) | TEST(EcKeyFromSSLEcKeyTest, EcKeyFromSslKeyFailsWrongCurveType) { type EcdhWycheproofTestVector (line 753) | struct EcdhWycheproofTestVector { function HasFlag (line 766) | bool HasFlag(const rapidjson::Value& flags, absl::string_view valu... function ReadEcdhWycheproofTestVectors (line 779) | std::vector ReadEcdhWycheproofTestVectors( function TEST_P (line 830) | TEST_P(EcUtilComputeEcdhSharedSecretTest, ComputeEcdhSharedSecretW... function GetEcUtilComputeEcdhSharedSecretParams (line 867) | std::vector GetEcUtilComputeEcdhSharedSe... FILE: cc/internal/err_util.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { type internal (line 26) | namespace internal { function GetSslErrors (line 28) | std::string GetSslErrors() { FILE: cc/internal/err_util.h function namespace (line 21) | namespace crypto { FILE: cc/internal/err_util_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { function TEST (line 38) | TEST(GetSslErrorsTest, ReturnsExpectedErrorrs) { FILE: cc/internal/fips_utils.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type internal (line 28) | namespace internal { function SetFipsRestricted (line 38) | void SetFipsRestricted() { is_fips_restricted = true; } function UnSetFipsRestricted (line 40) | void UnSetFipsRestricted() { is_fips_restricted = false; } function IsFipsModeEnabled (line 42) | bool IsFipsModeEnabled() { return kUseOnlyFips || is_fips_restrict... function IsFipsEnabledInSsl (line 44) | bool IsFipsEnabledInSsl() { function ChecksFipsCompatibility (line 52) | util::Status ChecksFipsCompatibility(FipsCompatibility fips_status) { FILE: cc/internal/fips_utils.h function namespace (line 24) | namespace tink { FILE: cc/internal/fips_utils_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type internal (line 27) | namespace internal { class FipsIncompatible (line 33) | class FipsIncompatible { class FipsCompatibleWithBoringCrypto (line 38) | class FipsCompatibleWithBoringCrypto { function TEST (line 44) | TEST(FipsUtilsTest, CompatibilityInNonFipsMode) { function TEST (line 53) | TEST(FipsUtilsTest, CompatibilityInFipsMode) { function TEST (line 64) | TEST(TinkFipsTest, CompatibilityInFipsModeWithoutBoringCrypto) { FILE: cc/internal/key_gen_configuration_impl.h function namespace (line 30) | namespace crypto { FILE: cc/internal/key_gen_configuration_impl_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { type internal (line 50) | namespace internal { class FakePrimitive (line 63) | class FakePrimitive { method FakePrimitive (line 65) | explicit FakePrimitive(std::string s) : s_(s) {} method get (line 66) | std::string get() { return s_; } class FakeKeyTypeManager (line 72) | class FakeKeyTypeManager class FakePrimitiveFactory (line 75) | class FakePrimitiveFactory : public PrimitiveFactory> Create( method FakeKeyTypeManager (line 83) | FakeKeyTypeManager() method key_material_type (line 86) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 90) | uint32_t get_version() const override { return 0; } method ValidateKey (line 94) | util::Status ValidateKey(const AesGcmKey& key) const override { method ValidateKeyFormat (line 98) | util::Status ValidateKeyFormat( method CreateKey (line 103) | util::StatusOr CreateKey( method DeriveKey (line 108) | util::StatusOr DeriveKey( function TEST (line 119) | TEST(KeyGenConfigurationImplTest, AddKeyTypeManager) { function TEST (line 126) | TEST(KeyGenConfigurationImplTest, AddLegacyKeyManager) { function TEST (line 134) | TEST(KeyGenConfigurationImplTest, GetKeyTypeInfoStore) { function TEST (line 143) | TEST(KeyGenConfigurationImplTest, GetKeyTypeManager) { function TEST (line 162) | TEST(KeyGenConfigurationImplTest, GetLegacyKeyManager) { function TEST (line 182) | TEST(KeyGenConfigurationImplTest, GetMissingKeyManagerFails) { class FakeSignKeyManager (line 191) | class FakeSignKeyManager class PublicKeySignFactory (line 195) | class PublicKeySignFactory : public PrimitiveFactory> Create( method FakeSignKeyManager (line 203) | explicit FakeSignKeyManager() method key_material_type (line 206) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 210) | uint32_t get_version() const override { return 0; } method ValidateKey (line 214) | util::Status ValidateKey(const RsaSsaPssPrivateKey& key) const o... method ValidateKeyFormat (line 218) | util::Status ValidateKeyFormat( method CreateKey (line 223) | util::StatusOr CreateKey( method DeriveKey (line 228) | util::StatusOr DeriveKey( method GetPublicKey (line 234) | util::StatusOr GetPublicKey( class FakeVerifyKeyManager (line 243) | class FakeVerifyKeyManager class PublicKeyVerifyFactory (line 246) | class PublicKeyVerifyFactory : public PrimitiveFactory> Create( method FakeVerifyKeyManager (line 255) | explicit FakeVerifyKeyManager() method key_material_type (line 258) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 262) | uint32_t get_version() const override { return 0; } method ValidateKey (line 266) | util::Status ValidateKey(const RsaSsaPssPublicKey& key) const ov... method ValidateParams (line 270) | util::Status ValidateParams(const RsaSsaPssParams& params) const { function TEST (line 278) | TEST(KeyGenConfigurationImplTest, AddAsymmetricKeyManagers) { function TEST (line 286) | TEST(KeyGenConfigurationImplTest, GetAsymmetricKeyManagers) { function TEST (line 323) | TEST(KeyGenConfigurationImplTest, GlobalRegistryMode) { function TEST (line 357) | TEST(KeyGenConfigurationImplTest, GlobalRegistryModeWithNonEmptyCo... FILE: cc/internal/key_info.cc type crypto (line 21) | namespace crypto { type tink (line 22) | namespace tink { function KeyInfoFromKey (line 27) | KeysetInfo::KeyInfo KeyInfoFromKey(const Keyset::Key& key) { function KeysetInfo (line 36) | KeysetInfo KeysetInfoFromKeyset(const Keyset& keyset) { FILE: cc/internal/key_info.h function namespace (line 21) | namespace crypto { FILE: cc/internal/key_info_test.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function TEST (line 31) | TEST(KeyInfoFromKeyTest, Basic) { function TEST (line 45) | TEST(KeyInfoFromKeyTest, Status) { function TEST (line 53) | TEST(KeyInfoFromKeyTest, OutputPrefixType) { function TEST (line 63) | TEST(KeySetInfoForKeySetTest, Basic) { FILE: cc/internal/key_parser.h function namespace (line 38) | namespace crypto { FILE: cc/internal/key_parser_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type internal (line 39) | namespace internal { function TEST (line 46) | TEST(KeyParserTest, Create) { function TEST (line 57) | TEST(KeyParserTest, ParseKey) { function TEST (line 71) | TEST(KeyParserTest, ParsePublicKeyNoAccessToken) { function TEST (line 85) | TEST(KeyParserTest, ParseKeyWithInvalidSerializationType) { function TEST (line 96) | TEST(KeyParserTest, ParseKeyWithInvalidObjectIdentifier) { FILE: cc/internal/key_serializer.h function namespace (line 36) | namespace crypto { FILE: cc/internal/key_serializer_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type internal (line 38) | namespace internal { function TEST (line 45) | TEST(KeySerializerTest, Create) { function TEST (line 54) | TEST(KeySerializerTest, SerializeKey) { function TEST (line 66) | TEST(KeySerializerTest, SerializePublicKeyNoAccessToken) { function TEST (line 78) | TEST(KeySerializerTest, SerializeKeyWithInvalidKeyType) { FILE: cc/internal/key_status_util.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type internal (line 29) | namespace internal { function FromKeyStatusType (line 33) | util::StatusOr FromKeyStatusType(KeyStatusType status_t... function ToKeyStatusType (line 47) | util::StatusOr ToKeyStatusType(KeyStatus status) { function ToKeyStatusName (line 61) | std::string ToKeyStatusName(KeyStatus status) { FILE: cc/internal/key_status_util.h function namespace (line 26) | namespace crypto { FILE: cc/internal/key_status_util_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type internal (line 29) | namespace internal { function TEST (line 36) | TEST(KeyStatusUtilTest, FromKeyStatusType) { function TEST (line 53) | TEST(KeyStatusUtilTest, ToKeyStatusType) { function TEST (line 70) | TEST(KeyStatusUtilTest, ToKeyStatusName) { FILE: cc/internal/key_type_info_store.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type internal (line 31) | namespace internal { FILE: cc/internal/key_type_info_store.h function namespace (line 47) | namespace crypto { FILE: cc/internal/key_type_info_store_test.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { type internal (line 48) | namespace internal { function TEST (line 63) | TEST(KeyTypeInfoStoreTest, AddKeyTypeManager) { function TEST (line 80) | TEST(KeyTypeInfoStoreTest, AddKeyTypeManagerNoBoringCrypto) { function TEST (line 92) | TEST(KeyTypeInfoStoreTest, AddKeyTypeManagerAndChangeNewKeyAllowed) { function TEST (line 133) | TEST(KeyTypeInfoStoreTest, AddAsymmetricKeyTypeManagers) { function TEST (line 163) | TEST(KeyTypeInfoStoreTest, AddAsymmetricKeyTypeManagersAlreadyExis... function TEST (line 203) | TEST(KeyTypeInfoStoreTest, AddAsymmetricKeyTypeManagersAndChangeNe... function TEST (line 270) | TEST(KeyTypeInfoStoreTest, AddKeyManager) { function TEST (line 287) | TEST(KeyTypeInfoStoreTest, AddKeyManagerAndChangeNewKeyAllowed) { function TEST (line 329) | TEST(KeyTypeInfoStoreTest, Get) { function TEST (line 342) | TEST(KeyTypeInfoStoreTest, IsEmpty) { function TEST (line 352) | TEST(KeyTypeInfoStoreInfoTest, KeyTypeManager) { function TEST (line 382) | TEST(KeyTypeInfoStoreInfoTest, AsymmetricKeyTypeManagers) { function TEST (line 414) | TEST(KeyTypeInfoStoreInfoTest, KeyManager) { function TEST (line 446) | TEST(KeyTypeInfoStoreInfoTest, GetPrimitive) { FILE: cc/internal/keyset_handle_builder_entry.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type internal (line 45) | namespace internal { function ToKeysetKey (line 53) | SecretProto ToKeysetKey( function SerializeParameters (line 67) | util::StatusOr SerializeParameters( function SerializeLegacyParameters (line 84) | util::StatusOr SerializeLegacyParame... function SerializeKey (line 95) | util::StatusOr SerializeKey(const Key& key) { function SerializeLegacyKey (line 112) | util::StatusOr SerializeLegacyKey(const Key... function CreateKeysetKeyFromProtoParametersSerialization (line 125) | util::StatusOr> function CreateKeysetKeyFromProtoKeySerialization (line 143) | util::StatusOr> FILE: cc/internal/keyset_handle_builder_entry.h function namespace (line 33) | namespace internal { FILE: cc/internal/keyset_handle_builder_entry_test.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { type internal (line 51) | namespace internal { function CreateLegacyProtoParameters (line 65) | util::StatusOr CreateLegacyProtoParameters() { function TEST (line 73) | TEST(KeysetHandleBuilderEntryTest, Status) { function TEST (line 91) | TEST(KeysetHandleBuilderEntryTest, IdStrategy) { function TEST (line 112) | TEST(KeysetHandleBuilderEntryTest, Primary) { class CreateKeysetKeyTest (line 127) | class CreateKeysetKeyTest : public Test { method SetUp (line 129) | void SetUp() override { ASSERT_THAT(TinkConfig::Register(), IsOk... function TEST_F (line 132) | TEST_F(CreateKeysetKeyTest, CreateKeysetKeyFromParameters) { function TEST_F (line 154) | TEST_F(CreateKeysetKeyTest, CreateKeysetKeyFromParametersWithDiffe... function TEST_F (line 169) | TEST_F(CreateKeysetKeyTest, CreateKeysetKeyFromKey) { function TEST_F (line 198) | TEST_F(CreateKeysetKeyTest, CreateKeysetKeyFromKeyWithDifferentEnt... function TEST_F (line 220) | TEST_F(CreateKeysetKeyTest, function TEST_F (line 242) | TEST_F(CreateKeysetKeyTest, CreateKeysetFromNonLegacyParameters) { function TEST_F (line 258) | TEST_F(CreateKeysetKeyTest, function TEST_F (line 275) | TEST_F(CreateKeysetKeyTest, CreateKeysetFromNonLegacyKey) { FILE: cc/internal/keyset_wrapper.h function namespace (line 26) | namespace crypto { FILE: cc/internal/keyset_wrapper_impl.h function namespace (line 35) | namespace crypto { FILE: cc/internal/keyset_wrapper_impl_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type internal (line 40) | namespace internal { class Wrapper (line 60) | class Wrapper : public PrimitiveWrapper> W... function CreateIn (line 77) | crypto::tink::util::StatusOr> Crea... function OnlyTypeUrlKeyData (line 87) | google::crypto::tink::KeyData OnlyTypeUrlKeyData(absl::string_view... function CreateKeyset (line 93) | google::crypto::tink::Keyset CreateKeyset( function TEST (line 104) | TEST(KeysetWrapperImplTest, Basic) { function TEST (line 123) | TEST(KeysetWrapperImplTest, FailingGetPrimitive) { function TEST (line 142) | TEST(KeysetWrapperImplTest, ValidatesKeyset) { function TEST (line 154) | TEST(KeysetWrapperImplTest, OnlyEnabled) { class MockWrapper (line 176) | class MockWrapper : public PrimitiveWrapper { function GetOutputPrimitiveForTesting (line 184) | std::unique_ptr GetOutputPrimitiveForTesting() { function TEST (line 194) | TEST(KeysetWrapperImplTest, WrapWithAnnotationCorrectlyWrittenToPr... FILE: cc/internal/keyset_wrapper_store.h function namespace (line 35) | namespace crypto { FILE: cc/internal/keyset_wrapper_store_test.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { type internal (line 48) | namespace internal { class FakePrimitive (line 62) | class FakePrimitive { method FakePrimitive (line 64) | explicit FakePrimitive(std::string s) : s_(s) {} method get (line 65) | std::string get() { return s_; } class FakeKeyTypeManager (line 71) | class FakeKeyTypeManager class FakePrimitiveFactory (line 74) | class FakePrimitiveFactory : public PrimitiveFactory> Create( method FakeKeyTypeManager (line 82) | FakeKeyTypeManager() method key_material_type (line 85) | KeyData::KeyMaterialType key_material_type() const override { method get_version (line 89) | uint32_t get_version() const override { return 0; } method ValidateKey (line 93) | util::Status ValidateKey(const AesGcmKey& key) const override { method ValidateKeyFormat (line 97) | util::Status ValidateKeyFormat( method CreateKey (line 102) | util::StatusOr CreateKey( method DeriveKey (line 107) | util::StatusOr DeriveKey( class FakePrimitiveWrapper (line 118) | class FakePrimitiveWrapper method Wrap (line 121) | util::StatusOr> Wrap( class FakePrimitiveWrapper2 (line 129) | class FakePrimitiveWrapper2 method Wrap (line 132) | util::StatusOr> Wrap( function AddAesGcmKeyToKeyset (line 140) | std::string AddAesGcmKeyToKeyset(Keyset& keyset, uint32_t key_id, function TEST (line 172) | TEST(KeysetWrapperStoreTest, Add) { function TEST (line 186) | TEST(KeysetWrapperStoreTest, AddNull) { function TEST (line 199) | TEST(KeysetWrapperStoreTest, AddWrappersForDifferentPrimitivesSucc... function TEST (line 221) | TEST(KeysetWrapperStoreTest, AddSameWrapperTwiceSucceeds) { function TEST (line 239) | TEST(KeysetWrapperStoreTest, AddDifferentWrappersForSamePrimitiveF... function TEST (line 257) | TEST(KeysetWrapperStoreTest, GetPrimitiveWrapper) { function TEST (line 297) | TEST(KeysetWrapperStoreTest, GetPrimitiveWrapperNonexistentWrapper... function TEST (line 314) | TEST(KeysetWrapperStoreTest, Get) { function TEST (line 342) | TEST(KeysetWrapperStoreTest, GetNonexistentWrapperFails) { function TEST (line 358) | TEST(KeysetWrapperStoreTest, IsEmpty) { function TEST (line 374) | TEST(KeysetWrapperStoreTest, Move) { FILE: cc/internal/legacy_proto_key.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type internal (line 33) | namespace internal { function CheckKeyAccess (line 38) | util::Status CheckKeyAccess(KeyData::KeyMaterialType key_material_... FILE: cc/internal/legacy_proto_key.h function namespace (line 31) | namespace crypto { FILE: cc/internal/legacy_proto_key_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type internal (line 38) | namespace internal { class LegacyProtoKeyTest (line 49) | class LegacyProtoKeyTest : public ::testing::Test { method Equals (line 54) | bool Equals(ProtoKeySerialization serialization, function TEST_F (line 60) | TEST_F(LegacyProtoKeyTest, CreateAndSerialization) { function TEST_F (line 83) | TEST_F(LegacyProtoKeyTest, Equals) { function TEST_F (line 113) | TEST_F(LegacyProtoKeyTest, TypeUrlNotEqual) { function TEST_F (line 143) | TEST_F(LegacyProtoKeyTest, SerializedKeyNotEqual) { function TEST_F (line 175) | TEST_F(LegacyProtoKeyTest, KeyMaterialTypeNotEqual) { function TEST_F (line 205) | TEST_F(LegacyProtoKeyTest, OutputPrefixTypeNotEqual) { function TEST_F (line 236) | TEST_F(LegacyProtoKeyTest, IdRequirementNotEqual) { function TEST_P (line 276) | TEST_P(AllOutputPrefixTypesTest, GetIdRequirement) { function TEST_P (line 302) | TEST_P(AllKeyMaterialTypesTest, CreateAndSerializationWithSecretAc... function TEST_P (line 330) | TEST_P(SecretKeyMaterialTypesTest, CreateWithoutSecretAccessToken) { function TEST_P (line 347) | TEST_P(SecretKeyMaterialTypesTest, SerializationWithoutSecretAcces... function TEST_P (line 376) | TEST_P(NonSecretKeyMaterialTypesTest, CreateWithoutSecretAccessTok... function TEST_P (line 393) | TEST_P(NonSecretKeyMaterialTypesTest, SerializationWithoutSecretAc... FILE: cc/internal/legacy_proto_parameters.cc type crypto (line 22) | namespace crypto { type tink (line 23) | namespace tink { type internal (line 24) | namespace internal { FILE: cc/internal/legacy_proto_parameters.h function namespace (line 26) | namespace crypto { FILE: cc/internal/legacy_proto_parameters_test.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type internal (line 32) | namespace internal { class LegacyProtoParametersTest (line 40) | class LegacyProtoParametersTest : public ::testing::Test { method Equals (line 45) | bool Equals(ProtoParametersSerialization serialization, function TEST_F (line 51) | TEST_F(LegacyProtoParametersTest, CreateWithIdRequirement) { function TEST_F (line 65) | TEST_F(LegacyProtoParametersTest, CreateWithoutIdRequirement) { function TEST_F (line 79) | TEST_F(LegacyProtoParametersTest, Equals) { function TEST_F (line 102) | TEST_F(LegacyProtoParametersTest, TypeUrlNotEqual) { function TEST_F (line 126) | TEST_F(LegacyProtoParametersTest, OutputPrefixTypeNotEqual) { function TEST_F (line 149) | TEST_F(LegacyProtoParametersTest, DifferentValueNotEqual) { FILE: cc/internal/md_util.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type internal (line 35) | namespace internal { function EvpHashFromHashType (line 37) | util::StatusOr EvpHashFromHashType(subtle::HashTyp... function IsHashTypeSafeForSignature (line 56) | util::Status IsHashTypeSafeForSignature(subtle::HashType sig_hash) { function ComputeHash (line 74) | util::StatusOr ComputeHash(absl::string_view input, FILE: cc/internal/md_util.h function namespace (line 28) | namespace crypto { FILE: cc/internal/md_util_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type internal (line 33) | namespace internal { function TEST (line 43) | TEST(MdUtil, EvpHashFromHashType) { function TEST (line 57) | TEST(MdUtil, IsHashTypeSafeForSignature) { function TEST (line 66) | TEST(MdUtil, ComputeHashAcceptsNullStringView) { type MdUtilComputeHashSamplesTestParam (line 81) | struct MdUtilComputeHashSamplesTestParam { function GetMdUtilComputeHashSamplesTestParams (line 92) | std::vector function TEST_P (line 121) | TEST_P(MdUtilComputeHashSamplesTest, ComputesHash) { FILE: cc/internal/monitoring_util.h function namespace (line 33) | namespace crypto { FILE: cc/internal/monitoring_util_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type internal (line 41) | namespace internal { function TEST (line 52) | TEST(MonitoringUtilTest, function TEST (line 59) | TEST(MonitoringUtilTest, MonitoringKeySetInfoFromPrimitiveSetNullP... type PrimitiveSetInputPrimitive (line 77) | struct PrimitiveSetInputPrimitive { function NewPrimitiveSetInputPrimitive (line 82) | PrimitiveSetInputPrimitive NewPrimitiveSetInputPrimit... function TEST (line 103) | TEST(MonitoringUtilTest, MonitoringKeySetInfoFromPrimitiveSetValid) { FILE: cc/internal/mutable_serialization_registry.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type internal (line 43) | namespace internal { function MutableSerializationRegistry (line 45) | MutableSerializationRegistry& MutableSerializationRegistry::Global... FILE: cc/internal/mutable_serialization_registry.h function namespace (line 37) | namespace crypto { FILE: cc/internal/mutable_serialization_registry_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type internal (line 46) | namespace internal { function TEST (line 56) | TEST(MutableSerializationRegistryTest, ParseParameters) { function TEST (line 80) | TEST(MutableSerializationRegistryTest, ParseParametersWithoutRegis... function TEST (line 87) | TEST(MutableSerializationRegistryTest, RegisterSameParametersParse... function TEST (line 96) | TEST(MutableSerializationRegistryTest, function TEST (line 109) | TEST(MutableSerializationRegistryTest, SerializeParameters) { function TEST (line 129) | TEST(MutableSerializationRegistryTest, SerializeParametersWithoutR... function TEST (line 137) | TEST(MutableSerializationRegistryTest, RegisterSameParametersSeria... function TEST (line 146) | TEST(MutableSerializationRegistryTest, function TEST (line 159) | TEST(MutableSerializationRegistryTest, ParseKey) { function TEST (line 180) | TEST(MutableSerializationRegistryTest, ParseKeyNoSecretAccess) { function TEST (line 192) | TEST(MutableSerializationRegistryTest, ParseKeyWithLegacyFallback) { function TEST (line 222) | TEST(MutableSerializationRegistryTest, ParseKeyWithoutRegistration) { function TEST (line 231) | TEST(MutableSerializationRegistryTest, RegisterSameKeyParser) { function TEST (line 239) | TEST(MutableSerializationRegistryTest, function TEST (line 250) | TEST(MutableSerializationRegistryTest, SerializeKey) { function TEST (line 270) | TEST(MutableSerializationRegistryTest, SerializeKeyNoSecretAccess) { function TEST (line 281) | TEST(MutableSerializationRegistryTest, SerializeKeyWithoutRegistra... function TEST (line 291) | TEST(MutableSerializationRegistryTest, RegisterSameKeySerializer) { function TEST (line 299) | TEST(MutableSerializationRegistryTest, function TEST (line 310) | TEST(MutableSerializationRegistryTest, Reset) { function TEST (line 359) | TEST(MutableSerializationRegistryTest, GlobalInstance) { FILE: cc/internal/parameters_parser.h function namespace (line 34) | namespace crypto { FILE: cc/internal/parameters_parser_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type internal (line 35) | namespace internal { function TEST (line 43) | TEST(ParametersParserTest, Create) { function TEST (line 53) | TEST(ParametersParserTest, ParseParameters) { function TEST (line 65) | TEST(ParametersParserTest, ParseParametersWithInvalidSerialization... function TEST (line 76) | TEST(ParametersParserTest, ParseParametersWithInvalidObjectIdentif... FILE: cc/internal/parameters_serializer.h function namespace (line 34) | namespace crypto { FILE: cc/internal/parameters_serializer_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type internal (line 35) | namespace internal { function TEST (line 42) | TEST(ParametersSerializerTest, Create) { function TEST (line 52) | TEST(ParametersSerializerTest, SerializeParameters) { function TEST (line 64) | TEST(ParametersSerializerTest, SerializeParametersWithInvalidParam... FILE: cc/internal/parser_index.h function namespace (line 26) | namespace crypto { FILE: cc/internal/parser_index_test.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type internal (line 28) | namespace internal { class ExampleSerialization (line 33) | class ExampleSerialization : public Serialization { method ExampleSerialization (line 35) | explicit ExampleSerialization(absl::string_view object_identifier) method ObjectIdentifier (line 38) | absl::string_view ObjectIdentifier() const override { class DifferentSerialization (line 46) | class DifferentSerialization : public ExampleSerialization { method DifferentSerialization (line 48) | explicit DifferentSerialization(absl::string_view object_identif... function TEST (line 52) | TEST(ParserIndex, CreateEquivalent) { function TEST (line 61) | TEST(ParserIndex, CreateWithDifferentObjectIdentifier) { function TEST (line 70) | TEST(ParserIndex, CreateWithDifferentSerializationType) { FILE: cc/internal/proto_key_serialization.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type internal (line 33) | namespace internal { FILE: cc/internal/proto_key_serialization.h function namespace (line 30) | namespace crypto { FILE: cc/internal/proto_key_serialization_test.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type internal (line 32) | namespace internal { class ProtoKeySerializationTest (line 42) | class ProtoKeySerializationTest : public ::testing::Test { method Equals (line 44) | bool Equals(ProtoKeySerialization serialization, function TEST_F (line 50) | TEST_F(ProtoKeySerializationTest, CreateWithIdRequirement) { function TEST_F (line 67) | TEST_F(ProtoKeySerializationTest, CreateWithoutIdRequirement) { function TEST_F (line 84) | TEST_F(ProtoKeySerializationTest, OutputPrefixIncompatibleWithIdRe... function TEST_F (line 102) | TEST_F(ProtoKeySerializationTest, Equals) { function TEST_F (line 120) | TEST_F(ProtoKeySerializationTest, TypeUrlAndObjectIdentifierNotEqu... function TEST_F (line 138) | TEST_F(ProtoKeySerializationTest, SerializedKeyNotEqual) { function TEST_F (line 158) | TEST_F(ProtoKeySerializationTest, KeyMaterialTypeNotEqual) { function TEST_F (line 176) | TEST_F(ProtoKeySerializationTest, OutputPrefixTypeNotEqual) { function TEST_F (line 194) | TEST_F(ProtoKeySerializationTest, IdRequirementNotEqual) { function TEST_F (line 212) | TEST_F(ProtoKeySerializationTest, AssignSecretToStringView) { FILE: cc/internal/proto_parameters_serialization.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { FILE: cc/internal/proto_parameters_serialization.h function namespace (line 27) | namespace crypto { FILE: cc/internal/proto_parameters_serialization_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { class ProtoParametersSerializationTest (line 40) | class ProtoParametersSerializationTest : public ::testing::Test { method Equals (line 42) | bool Equals(ProtoParametersSerialization serialization, function TEST_F (line 48) | TEST_F(ProtoParametersSerializationTest, CreateFromIndividualCompo... function TEST_F (line 67) | TEST_F(ProtoParametersSerializationTest, CreateFromKeyTemplate) { function TEST_F (line 89) | TEST_F(ProtoParametersSerializationTest, Equals) { function TEST_F (line 106) | TEST_F(ProtoParametersSerializationTest, TypeUrlNotEqual) { function TEST_F (line 124) | TEST_F(ProtoParametersSerializationTest, OutputPrefixTypeNotEqual) { function TEST_F (line 141) | TEST_F(ProtoParametersSerializationTest, DifferentValueNotEqual) { FILE: cc/internal/registry_impl.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type internal (line 39) | namespace internal { FILE: cc/internal/registry_impl.h function namespace (line 49) | namespace crypto { FILE: cc/internal/registry_impl_test.cc type crypto (line 71) | namespace crypto { type tink (line 72) | namespace tink { type internal (line 73) | namespace internal { class RegistryTest (line 107) | class RegistryTest : public ::testing::Test { method SetUp (line 109) | void SetUp() override { Registry::Reset(); } method TearDown (line 111) | void TearDown() override { class TestKeyFactory (line 117) | class TestKeyFactory : public KeyFactory { method TestKeyFactory (line 119) | explicit TestKeyFactory(const std::string& key_type) : key_type_... method NewKey (line 121) | util::StatusOr> New... method NewKey (line 127) | util::StatusOr> New... method NewKeyData (line 133) | util::StatusOr> NewKeyData( class TestAeadKeyManager (line 145) | class TestAeadKeyManager : public KeyManager { method TestAeadKeyManager (line 147) | explicit TestAeadKeyManager(const std::string& key_type) method GetPrimitive (line 150) | util::StatusOr> GetPrimitive( method GetPrimitive (line 156) | util::StatusOr> GetPrimitive( method get_version (line 162) | uint32_t get_version() const override { return 0; } method KeyFactory (line 166) | const KeyFactory& get_key_factory() const override { return key_... class AeadVariant (line 176) | class AeadVariant { method AeadVariant (line 178) | explicit AeadVariant(std::string s) : s_(s) {} method get (line 180) | std::string get() { return s_; } class ExampleKeyTypeManager (line 186) | class ExampleKeyTypeManager : public KeyTypeManager { method Create (line 191) | crypto::tink::util::StatusOr> Create( class AeadVariantFactory (line 199) | class AeadVariantFactory : public PrimitiveFactory { method Create (line 201) | crypto::tink::util::StatusOr> Cre... method ExampleKeyTypeManager (line 207) | ExampleKeyTypeManager() method key_material_type (line 211) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 216) | uint32_t get_version() const override { return kVersion; } method ValidateKey (line 220) | crypto::tink::util::Status ValidateKey(const AesGcmKey& key) con... method ValidateKeyFormat (line 224) | crypto::tink::util::Status ValidateKeyFormat( method CreateKey (line 229) | crypto::tink::util::StatusOr CreateKey( method DeriveKey (line 236) | crypto::tink::util::StatusOr DeriveKey( class TestWrapper (line 260) | class TestWrapper : public PrimitiveWrapper { method TestWrapper (line 262) | TestWrapper() = default; method Wrap (line 263) | crypto::tink::util::StatusOr> Wrap( class AeadVariantWrapper (line 270) | class AeadVariantWrapper : public PrimitiveWrapper> Wrap( class AeadVariantToStringWrapper (line 279) | class AeadVariantToStringWrapper method Wrap (line 282) | crypto::tink::util::StatusOr> Wrap( function register_test_managers (line 289) | void register_test_managers(const std::string& key_type_prefix, function verify_test_managers (line 300) | void verify_test_managers(const std::string& key_type_prefix, function TEST_F (line 311) | TEST_F(RegistryTest, testRegisterKeyManagerMoreRestrictiveNewKeyAl... function TEST_F (line 342) | TEST_F(RegistryTest, testRegisterKeyManagerLessRestrictiveNewKeyAl... function TEST_F (line 377) | TEST_F(RegistryTest, testConcurrentRegistration) { function TEST_F (line 414) | TEST_F(RegistryTest, testBasic) { function TEST_F (line 443) | TEST_F(RegistryTest, testRegisterKeyManager) { function TEST_F (line 478) | TEST_F(RegistryTest, GetKeyManagerRemainsValid) { function TEST_F (line 493) | TEST_F(RegistryTest, testGettingPrimitives) { function TEST_F (line 556) | TEST_F(RegistryTest, testNewKeyData) { function TEST_F (line 623) | TEST_F(RegistryTest, testGetPublicKeyData) { function TEST_F (line 679) | TEST_F(RegistryTest, RegisterWrapperTwice) { function TEST_F (line 690) | TEST_F(RegistryTest, RegisterTransformingWrapperTwice) { function TEST_F (line 701) | TEST_F(RegistryTest, RegisterTransformingWrapperTwiceMixing) { function TEST_F (line 717) | TEST_F(RegistryTest, RegisterTransformingWrapperTwiceMixingBackwar... function TEST_F (line 729) | TEST_F(RegistryTest, RegisterDifferentWrappers) { function TEST_F (line 741) | TEST_F(RegistryTest, RegisterDifferentWrappersDifferentPrimitives) { function TEST_F (line 753) | TEST_F(RegistryTest, NoWrapperRegistered) { function TEST_F (line 768) | TEST_F(RegistryTest, WrapperFails) { function TEST_F (line 781) | TEST_F(RegistryTest, UsualWrappingTest) { function AddAesGcmKey (line 839) | std::string AddAesGcmKey(uint32_t key_id, OutputPrefixType output_... function TEST_F (line 854) | TEST_F(RegistryTest, KeysetWrappingTest) { function TEST_F (line 884) | TEST_F(RegistryTest, TransformingKeysetWrappingTest) { function TEST_F (line 911) | TEST_F(RegistryTest, TransformingPrimitiveWrapperCustomKeyManager) { function TEST_F (line 945) | TEST_F(RegistryTest, GetKeyManagerErrorMessage) { function TEST_F (line 962) | TEST_F(RegistryTest, RegisterKeyTypeManager) { function TEST_F (line 972) | TEST_F(RegistryTest, RegisterFipsKeyTypeManager) { function TEST_F (line 987) | TEST_F(RegistryTest, RegisterFipsKeyTypeManagerNoBoringCrypto) { function TEST_F (line 1003) | TEST_F(RegistryTest, KeyTypeManagerGetFirstKeyManager) { function TEST_F (line 1024) | TEST_F(RegistryTest, KeyTypeManagerGetSecondKeyManager) { function TEST_F (line 1043) | TEST_F(RegistryTest, KeyTypeManagerNotSupportedPrimitive) { function TEST_F (line 1061) | TEST_F(RegistryTest, GetKeyManagerRemainsValidForKeyTypeManagers) { function TEST_F (line 1080) | TEST_F(RegistryTest, KeyTypeManagerNewKey) { function TEST_F (line 1105) | TEST_F(RegistryTest, KeyTypeManagerNewKeyInvalidSize) { function TEST_F (line 1123) | TEST_F(RegistryTest, KeyTypeManagerDeriveKey) { function TEST_F (line 1154) | TEST_F(RegistryTest, KeyTypeManagerDeriveKeyRegisterTwice) { function TEST_F (line 1188) | TEST_F(RegistryTest, KeyManagerDeriveKeyFail) { function TEST_F (line 1203) | TEST_F(RegistryTest, KeyManagerDeriveNotRegistered) { function TEST_F (line 1212) | TEST_F(RegistryTest, RegisterKeyTypeManagerTwiceMoreRestrictive) { function TEST_F (line 1225) | TEST_F(RegistryTest, RegisterKeyTypeManagerTwice) { function TEST_F (line 1244) | TEST_F(RegistryTest, RegisterKeyTypeManagerLessRestrictive) { function TEST_F (line 1257) | TEST_F(RegistryTest, RegisterKeyTypeManagerBeforeKeyManager) { function TEST_F (line 1272) | TEST_F(RegistryTest, RegisterKeyTypeManagerAfterKeyManager) { class PrivatePrimitiveA (line 1291) | class PrivatePrimitiveA {} class PrivatePrimitiveB (line 1292) | class PrivatePrimitiveB {} class TestPrivateKeyTypeManager (line 1296) | class TestPrivateKeyTypeManager class PrivatePrimitiveAFactory (line 1301) | class PrivatePrimitiveAFactory : public PrimitiveFactory CreateKey( method GetPublicKey (line 1346) | crypto::tink::util::StatusOr GetPublicKey( class PublicPrimitiveA (line 1362) | class PublicPrimitiveA {} class PublicPrimitiveB (line 1363) | class PublicPrimitiveB {} class TestPublicKeyTypeManager (line 1367) | class TestPublicKeyTypeManager class PublicPrimitiveAFactory (line 1371) | class PublicPrimitiveAFactory : public PrimitiveFactory... class PublicPrimitiveBFactory (line 1378) | class PublicPrimitiveBFactory : public PrimitiveFactory... method TestPublicKeyTypeManager (line 1386) | TestPublicKeyTypeManager() method key_material_type (line 1390) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 1395) | uint32_t get_version() const override { return 0; } method ValidateKey (line 1396) | crypto::tink::util::Status ValidateKey( function CreateTestPrivateKeyManagerFipsCompatible (line 1410) | std::unique_ptr function CreateTestPublicKeyManagerFipsCompatible (line 1418) | std::unique_ptr function TEST_F (line 1426) | TEST_F(RegistryTest, RegisterAsymmetricKeyManagers) { function TEST_F (line 1438) | TEST_F(RegistryTest, AsymmetricMoreRestrictiveNewKey) { function TEST_F (line 1455) | TEST_F(RegistryTest, AsymmetricSameNewKey) { function TEST_F (line 1480) | TEST_F(RegistryTest, AsymmetricLessRestrictiveGivesError) { function TEST_F (line 1501) | TEST_F(RegistryTest, RegisterAsymmetricKeyManagersGetKeyManagerSta... function TEST_F (line 1530) | TEST_F(RegistryTest, AsymmetricPrivateRegisterAlone) { function TEST_F (line 1557) | TEST_F(RegistryTest, AsymmetricGetPrimitiveA) { function TEST_F (line 1575) | TEST_F(RegistryTest, AsymmetricGetPrimitiveB) { function TEST_F (line 1593) | TEST_F(RegistryTest, AsymmetricGetPublicPrimitiveA) { function TEST_F (line 1611) | TEST_F(RegistryTest, AsymmetricGetPublicPrimitiveB) { function TEST_F (line 1629) | TEST_F(RegistryTest, AsymmetricGetWrongPrimitiveError) { class PrivateKeyManagerImplTest (line 1647) | class PrivateKeyManagerImplTest : public testing::Test { method SetUp (line 1648) | void SetUp() override { Registry::Reset(); } method TearDown (line 1650) | void TearDown() override { function TEST_F (line 1656) | TEST_F(PrivateKeyManagerImplTest, AsymmetricFactoryNewKeyFromMessa... function TEST_F (line 1683) | TEST_F(PrivateKeyManagerImplTest, AsymmetricNewKeyDisallowed) { function TEST_F (line 1705) | TEST_F(RegistryTest, AsymmetricGetPublicKeyData) { class TestPrivateKeyTypeManager2 (line 1729) | class TestPrivateKeyTypeManager2 : public TestPrivateKeyTypeManage... class TestPublicKeyTypeManager2 (line 1730) | class TestPublicKeyTypeManager2 : public TestPublicKeyTypeManager {} function TEST_F (line 1732) | TEST_F(RegistryTest, RegisterAssymmetricReregistrationWithWrongCla... class TestPublicKeyTypeManagerWithDifferentKeyType (line 1766) | class TestPublicKeyTypeManagerWithDifferentKeyType function TEST_F (line 1774) | TEST_F(RegistryTest, RegisterAssymmetricReregistrationWithNewKeyTy... class DelegatingKeyTypeManager (line 1793) | class DelegatingKeyTypeManager method DelegatingKeyTypeManager (line 1797) | DelegatingKeyTypeManager() : PrivateKeyTypeManager() {} method set_registry (line 1799) | void set_registry(RegistryImpl* registry) { registry_ = registry; } method key_material_type (line 1801) | google::crypto::tink::KeyData::KeyMaterialType key_material_type() method get_version (line 1806) | uint32_t get_version() const override { return kVersion; } method ValidateKey (line 1810) | crypto::tink::util::Status ValidateKey( method ValidateKeyFormat (line 1815) | crypto::tink::util::Status ValidateKeyFormat( method CreateKey (line 1820) | crypto::tink::util::StatusOr CreateKey( method DeriveKey (line 1834) | crypto::tink::util::StatusOr DeriveKey( method GetPublicKey (line 1850) | crypto::tink::util::StatusOr GetPublicKey( class RegistryImplTest (line 1872) | class RegistryImplTest : public ::testing::Test { method TearDown (line 1874) | void TearDown() override { function TEST_F (line 1882) | TEST_F(RegistryImplTest, CanDelegateCreateKey) { function TEST_F (line 1911) | TEST_F(RegistryImplTest, CanDelegateDeriveKey) { function TEST_F (line 1939) | TEST_F(RegistryImplTest, CanDelegateGetPublicKey) { function TEST_F (line 1968) | TEST_F(RegistryImplTest, FipsRestrictionSucceedsOnEmptyRegistry) { function TEST_F (line 1973) | TEST_F(RegistryImplTest, FipsRestrictionSucceedsWhenSettingMultipl... function TEST_F (line 1980) | TEST_F(RegistryImplTest, FipsRestrictionSucceedsIfBuildInFipsMode) { function TEST_F (line 1988) | TEST_F(RegistryImplTest, FipsFailsIfNotEmpty) { function TEST_F (line 2006) | TEST_F(RegistryImplTest, CanRegisterOnlyOneMonitoringFactory) { function TEST_F (line 2022) | TEST_F(RegistryImplTest, CannotRegisterNullFactory) { FILE: cc/internal/rsa_util.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type internal (line 43) | namespace internal { function ValidateRsaModulusSize (line 57) | util::Status ValidateRsaModulusSize(size_t modulus_size) { function ValidateRsaPublicExponent (line 81) | util::Status ValidateRsaPublicExponent(const BIGNUM *exponent) { function ValidateRsaPublicExponent (line 106) | util::Status ValidateRsaPublicExponent(absl::string_view exponent) { function NewRsaKeyPair (line 115) | util::Status NewRsaKeyPair(int modulus_size_in_bits, const BIGNUM *e, function GetRsaModAndExponents (line 206) | util::Status GetRsaModAndExponents(const RsaPrivateKey &key, RSA *... function GetRsaPrimeFactors (line 234) | util::Status GetRsaPrimeFactors(const RsaPrivateKey &key, RSA *rsa) { function GetRsaCrtParams (line 255) | util::Status GetRsaCrtParams(const RsaPrivateKey &key, RSA *rsa) { function RsaPrivateKeyToRsa (line 282) | util::StatusOr> RsaPrivateKeyToRsa( function RsaPublicKeyToRsa (line 330) | util::StatusOr> RsaPublicKeyToRsa( function RsaCheckPublicKey (line 358) | util::Status RsaCheckPublicKey(const RSA *key) { FILE: cc/internal/rsa_util.h function namespace (line 32) | namespace crypto { FILE: cc/internal/rsa_util_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type internal (line 45) | namespace internal { function GetKeyPair (line 65) | util::StatusOr> GetKeyPair( function TEST (line 79) | TEST(RsaUtilTest, BasicSanityChecks) { function TEST (line 103) | TEST(RsaUtilTest, FailsOnLargeE) { function TEST (line 115) | TEST(RsaUtilTest, KeyIsWellFormed) { function TEST (line 172) | TEST(RsaUtilTest, GeneratesDifferentPrivateKeys) { function TEST (line 201) | TEST(RsaUtilTest, ValidateRsaModulusSize) { function TEST (line 223) | TEST(RsaUtilTest, ValidateRsaPublicExponent) { function ExpectBignumEquals (line 245) | void ExpectBignumEquals(const BIGNUM* bn, absl::string_view data) { function ExpectBignumEquals (line 253) | void ExpectBignumEquals(const BIGNUM* bn, const util::SecretData& ... function TEST (line 257) | TEST(RsaUtilTest, GetRsaModAndExponents) { function TEST (line 274) | TEST(RsaUtilTest, GetRsaPrimeFactors) { function TEST (line 289) | TEST(RsaUtilTest, GetRsaCrtParams) { function TEST (line 306) | TEST(RsaUtilTest, CopiesRsaPrivateKey) { function TEST (line 330) | TEST(RsaUtilTest, CopiesRsaPublicKey) { function NewRsaPublicKey (line 350) | util::StatusOr> NewRsaPublicKey( function TEST (line 370) | TEST(RsaUtilTest, RsaCheckPublicKeyNullKey) { function TEST (line 374) | TEST(RsaUtilTest, RsaCheckPublicKeyMissingExponentAndModule) { function TEST (line 379) | TEST(RsaUtilTest, RsaCheckPublicKeyValid) { function TEST (line 386) | TEST(RsaUtilTest, RsaCheckPublicKeyExponentTooLarge) { function TEST (line 395) | TEST(RsaUtilTest, RsaCheckPublicKeyExponentTooSmall) { function TEST (line 403) | TEST(RsaUtilTest, RsaCheckPublicKeyExponentNotOdd) { function TEST (line 411) | TEST(RsaUtilTest, RsaCheckPublicKeyModulusTooLarge) { function TEST (line 423) | TEST(RsaUtilTest, RsaCheckPublicKeyModulusSmallerThanExp) { FILE: cc/internal/safe_stringops.h function namespace (line 25) | namespace crypto { FILE: cc/internal/safe_stringops_test.cc type crypto (line 22) | namespace crypto { type tink (line 23) | namespace tink { type internal (line 24) | namespace internal { function TEST (line 29) | TEST(MemCopyTest, Regular) { function TEST (line 38) | TEST(MemMoveTest, Regular) { function TEST (line 47) | TEST(MemMoveTest, NoMove) { function TEST (line 54) | TEST(MemmoveTest, OverlapSuffix) { function TEST (line 61) | TEST(MemMoveTest, OverlapPrefix) { function TEST (line 68) | TEST(MemEqualsTest, Equal) { function TEST (line 77) | TEST(MemEqualsTest, Unequal) { FILE: cc/internal/serialization.h function namespace (line 22) | namespace crypto { FILE: cc/internal/serialization_registry.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type internal (line 43) | namespace internal { function SerializationRegistry (line 106) | SerializationRegistry SerializationRegistry::Builder::Build() && { FILE: cc/internal/serialization_registry.h function namespace (line 44) | namespace crypto { FILE: cc/internal/serialization_registry_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type internal (line 44) | namespace internal { function TEST (line 52) | TEST(SerializationRegistryTest, ParseParameters) { function TEST (line 78) | TEST(SerializationRegistryTest, ParseParametersWithoutRegistration) { function TEST (line 85) | TEST(SerializationRegistryTest, RegisterSameParametersParser) { function TEST (line 94) | TEST(SerializationRegistryTest, function TEST (line 107) | TEST(SerializationRegistryTest, SerializeParameters) { function TEST (line 129) | TEST(SerializationRegistryTest, SerializeParametersWithoutRegistra... function TEST (line 137) | TEST(SerializationRegistryTest, RegisterSameParametersSerializer) { function TEST (line 146) | TEST(SerializationRegistryTest, function TEST (line 159) | TEST(SerializationRegistryTest, ParseKey) { function TEST (line 182) | TEST(SerializationRegistryTest, ParseKeyNoSecretAccess) { function TEST (line 196) | TEST(SerializationRegistryTest, ParseKeyWithoutRegistration) { function TEST (line 205) | TEST(SerializationRegistryTest, RegisterSameKeyParser) { function TEST (line 213) | TEST(SerializationRegistryTest, RegisterDifferentKeyParserWithSame... function TEST (line 223) | TEST(SerializationRegistryTest, SerializeKey) { function TEST (line 245) | TEST(SerializationRegistryTest, SerializeKeyNoSecretAccess) { function TEST (line 259) | TEST(SerializationRegistryTest, SerializeKeyWithoutRegistration) { function TEST (line 270) | TEST(SerializationRegistryTest, RegisterSameKeySerializer) { function TEST (line 278) | TEST(SerializationRegistryTest, RegisterDifferentKeySerializerWith... function TEST (line 288) | TEST(SerializationRegistryTest, BuiltFromAnotherRegistry) { function TEST (line 331) | TEST(SerializationRegistryTest, RegistryCopy) { function TEST (line 371) | TEST(SerializationRegistryTest, RegistryMove) { FILE: cc/internal/serialization_test_util.h function namespace (line 30) | namespace crypto { FILE: cc/internal/serialization_test_util_test.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type internal (line 31) | namespace internal { function TEST (line 40) | TEST(SerializationTest, Create) { function TEST (line 51) | TEST(NoIdParamsTest, Create) { function TEST (line 59) | TEST(NoIdParamsTest, ParseAndSerialize) { function TEST (line 65) | TEST(IdParamsTest, Create) { function TEST (line 73) | TEST(IdParamsTest, ParseAndSerialize) { function TEST (line 79) | TEST(NoIdKeyTest, Create) { function TEST (line 88) | TEST(NoIdKeyTest, ParseAndSerialize) { function TEST (line 95) | TEST(IdKeyTest, Create) { function TEST (line 105) | TEST(IdKeyTest, ParseAndSerialize) { FILE: cc/internal/serializer_index.h function namespace (line 27) | namespace crypto { FILE: cc/internal/serializer_index_test.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { type internal (line 25) | namespace internal { function TEST (line 30) | TEST(SerializerIndex, CreateEquivalentFromParameters) { function TEST (line 40) | TEST(SerializerIndex, CreateFromDifferentParametersType) { function TEST (line 50) | TEST(SerializerIndex, CreateFromSameParametersTypeWithDifferentSer... function TEST (line 60) | TEST(SerializerIndex, CreateEquivalentFromKey) { function TEST (line 70) | TEST(SerializerIndex, CreateFromDifferentKeyType) { function TEST (line 79) | TEST(SerializerIndex, CreateFromSameKeyTypeWithDifferentSerializat... FILE: cc/internal/ssl_unique_ptr.h function namespace (line 35) | namespace crypto { FILE: cc/internal/ssl_util.h function namespace (line 24) | namespace crypto { FILE: cc/internal/test_file_util.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { type internal (line 37) | namespace internal { function CreateTestFile (line 39) | util::Status CreateTestFile(absl::string_view filename, function GetTestFileNamePrefix (line 50) | std::string GetTestFileNamePrefix() { FILE: cc/internal/test_file_util.h function namespace (line 25) | namespace crypto { FILE: cc/internal/test_file_util_bazel.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type internal (line 28) | namespace internal { function RunfilesPath (line 32) | std::string RunfilesPath(absl::string_view path) { FILE: cc/internal/test_file_util_cmake.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { type internal (line 26) | namespace internal { function RunfilesPath (line 28) | std::string RunfilesPath(absl::string_view path) { FILE: cc/internal/test_random_access_stream.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type internal (line 32) | namespace internal { function ReadAllFromRandomAccessStream (line 75) | util::Status ReadAllFromRandomAccessStream( FILE: cc/internal/test_random_access_stream.h function namespace (line 31) | namespace crypto { FILE: cc/internal/test_random_access_stream_test.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type internal (line 32) | namespace internal { function TEST (line 37) | TEST(TestRandomAccessStreamTest, ReadAllSucceeds) { function TEST (line 55) | TEST(TestRandomAccessStreamTest, PreadAllInOnePread) { function TEST (line 68) | TEST(TestRandomAccessStreamTest, PreadCountLargerThanBufferFails) { function TEST (line 80) | TEST(TestRandomAccessStreamTest, InvalidPosition) { function TEST (line 91) | TEST(TestRandomAccessStreamTest, PreadWithNullBufferFails) { function TEST (line 101) | TEST(TestRandomAccessStreamTest, PreadWithEmptyStreamEof) { function TEST (line 114) | TEST(TestRandomAccessStreamTest, PreadTheLastPartialBlockReturnsEo... function TEST (line 130) | TEST(TestRandomAccessStreamTest, ReadAllFromRandomAccessStreamSucc... function TEST (line 142) | TEST(TestRandomAccessStreamTest, FILE: cc/internal/util.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type internal (line 27) | namespace internal { function EnsureStringNonNull (line 29) | absl::string_view EnsureStringNonNull(absl::string_view str) { function BuffersOverlap (line 36) | bool BuffersOverlap(absl::string_view first, absl::string_view sec... function BuffersAreIdentical (line 54) | bool BuffersAreIdentical(absl::string_view first, absl::string_vie... function IsPrintableAscii (line 62) | bool IsPrintableAscii(absl::string_view input) { function LogFatal (line 71) | void LogFatal(absl::string_view msg) { FILE: cc/internal/util.h function namespace (line 22) | namespace crypto { FILE: cc/internal/util_test.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { type internal (line 26) | namespace internal { function TEST (line 35) | TEST(UtilTest, EnsureStringNonNull) { function TEST (line 45) | TEST(BuffersOverlapTest, BufferOverlapEmpty) { function TEST (line 51) | TEST(BuffersOverlapTest, BufferOverlapSeparate) { function TEST (line 58) | TEST(BuffersOverlapTest, BufferOverlap) { function TEST (line 74) | TEST(BuffersAreIdenticalTest, EmptyString) { function TEST (line 84) | TEST(BuffersAreIdenticalTest, BuffersAreIdentical) { function TEST (line 94) | TEST(BuffersAreIdenticalTest, PartialOverlapFails) { function TEST (line 103) | TEST(UtilTest, IsPrintableAscii) { function TEST (line 111) | TEST(UtilTest, IsNotPrintableAscii) { FILE: cc/json_keyset_reader.h function namespace (line 30) | namespace crypto { FILE: cc/json_keyset_writer.h function namespace (line 30) | namespace crypto { FILE: cc/jwt/internal/json_util.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type jwt_internal (line 30) | namespace jwt_internal { function JsonStringToProtoStruct (line 38) | util::StatusOr JsonStringToProtoStruct(absl::string_view j... function JsonStringToProtoList (line 49) | util::StatusOr JsonStringToProtoList(absl::string_view ... function ProtoStructToJsonString (line 60) | util::StatusOr ProtoStructToJsonString(const Struct& ... function ProtoListToJsonString (line 69) | util::StatusOr ProtoListToJsonString(const ListValue&... FILE: cc/jwt/internal/json_util.h function namespace (line 28) | namespace crypto { FILE: cc/jwt/internal/json_util_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type jwt_internal (line 34) | namespace jwt_internal { function TEST (line 36) | TEST(JsonUtil, ParseThenSerializeStructWtihStringListOk) { function TEST (line 45) | TEST(JsonUtil, ParseThenSerializeStructWtihNumberOk) { function TEST (line 54) | TEST(JsonUtil, ParseThenSerializeStructWtihBoolOk) { function TEST (line 63) | TEST(JsonUtil, ParseThenSerializeListOk) { function TEST (line 72) | TEST(JsonUtil, ParseInvalidStructTokenNotOk) { function TEST (line 78) | TEST(JsonUtil, ParseInvalidListTokenNotOk) { function TEST (line 83) | TEST(JsonUtil, parseRecursiveJsonStringFails) { function TEST (line 96) | TEST(JsonUtil, ParseStructWithoutQuotesOk) { function TEST (line 104) | TEST(JsonUtil, ParseListWithoutQuotesNotOk) { function TEST (line 109) | TEST(JsonUtil, ParseStructWithCommentNotOk) { function TEST (line 115) | TEST(JsonUtil, ParseListWithCommentNotOk) { FILE: cc/jwt/internal/jwt_ecdsa_sign_key_manager.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type jwt_internal (line 36) | namespace jwt_internal { function Status (line 85) | Status JwtEcdsaSignKeyManager::ValidateKey( function Status (line 90) | Status JwtEcdsaSignKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/jwt_ecdsa_sign_key_manager.h function namespace (line 37) | namespace jwt_internal { FILE: cc/jwt/internal/jwt_ecdsa_sign_verify_key_manager_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type jwt_internal (line 45) | namespace jwt_internal { function TEST (line 62) | TEST(JwtEcdsaSignVerifyKeyManagerTest, BasicsSign) { function TEST (line 70) | TEST(JwtEcdsaSignVerifyKeyManagerTest, BasicsVerify) { function TEST (line 78) | TEST(JwtEcdsaSignVerifyKeyManagerTest, ValidateEmptyPrivateKey) { function TEST (line 83) | TEST(JwtEcdsaSignVerifyKeyManagerTest, ValidateEmptyPublicKey) { function TEST (line 88) | TEST(JwtEcdsaSignVerifyKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 93) | TEST(JwtEcdsaSignVerifyKeyManagerTest, ValidKeyFormatES256) { function TEST (line 99) | TEST(JwtEcdsaSignVerifyKeyManagerTest, ValidateKeyFormatES384) { function TEST (line 105) | TEST(JwtEcdsaSignVerifyKeyManagerTest, ValidateKeyFormatES512) { function TEST (line 111) | TEST(JwtEcdsaSignVerifyKeyManagerTest, CreatePrivateKeyAndValidate) { function TEST (line 126) | TEST(JwtEcdsaSignVerifyKeyManagerTest, CreatePublicKeyAndValidate) { function TEST (line 141) | TEST(JwtEcdsaSignVerifyKeyManagerTest, GetAndUsePrimitive) { function TEST (line 211) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, GetAndUsePrimitivesWi... function TEST (line 285) | TEST(JwtEcdsaSignVerifyKeyManagerTest, VerifyFailsWithDifferentKey) { FILE: cc/jwt/internal/jwt_ecdsa_verify_key_manager.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type jwt_internal (line 36) | namespace jwt_internal { function Status (line 78) | Status JwtEcdsaVerifyKeyManager::ValidateKey( FILE: cc/jwt/internal/jwt_ecdsa_verify_key_manager.h function namespace (line 36) | namespace tink { FILE: cc/jwt/internal/jwt_format.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { type jwt_internal (line 37) | namespace jwt_internal { function isValidUrlsafeBase64Char (line 43) | bool isValidUrlsafeBase64Char(char c) { function StrictWebSafeBase64Unescape (line 48) | bool StrictWebSafeBase64Unescape(absl::string_view src, std::strin... function ValidateKidInHeader (line 57) | util::Status ValidateKidInHeader(const google::protobuf::Value& ki... function EncodeHeader (line 72) | std::string EncodeHeader(absl::string_view json_header) { function DecodeHeader (line 76) | bool DecodeHeader(absl::string_view header, std::string* json_head... function GetKid (line 80) | absl::optional GetKid(uint32_t key_id, function GetKeyId (line 90) | absl::optional GetKeyId(absl::string_view kid) { function CreateHeader (line 102) | util::StatusOr CreateHeader( function ValidateHeader (line 122) | util::Status ValidateHeader(const google::protobuf::Struct& header, function GetTypeHeader (line 171) | absl::optional GetTypeHeader( function EncodePayload (line 184) | std::string EncodePayload(absl::string_view json_payload) { function DecodePayload (line 188) | bool DecodePayload(absl::string_view payload, std::string* json_pa... function EncodeSignature (line 192) | std::string EncodeSignature(absl::string_view signature) { function DecodeSignature (line 196) | bool DecodeSignature(absl::string_view encoded_signature, FILE: cc/jwt/internal/jwt_format.h function namespace (line 31) | namespace crypto { FILE: cc/jwt/internal/jwt_format_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type jwt_internal (line 42) | namespace jwt_internal { function TEST (line 44) | TEST(JwtFormat, EncodeDecodeHeader) { function TEST (line 51) | TEST(JwtFormat, EncodeFixedHeader) { function TEST (line 60) | TEST(JwtFormat, DecodedHeaderWithLineFeedFails) { function TEST (line 66) | TEST(JwtFormat, EncodeDecodePayload) { function TEST (line 73) | TEST(JwtFormat, EncodeFixedPayload) { function TEST (line 86) | TEST(JwtFormat, DecodeInvalidPayload_fails) { function TEST (line 91) | TEST(JwtFormat, DecodeAndValidateFixedHeaderHS256) { function TEST (line 109) | TEST(JwtFormat, DecodeAndValidateFixedHeaderRS256) { function TEST (line 127) | TEST(JwtFormat, CreateValidateHeader) { function TEST (line 145) | TEST(JwtFormat, CreateValidateHeaderWithTypeAndKid) { function TEST (line 170) | TEST(JwtFormat, ValidateEmptyHeaderFails) { function TEST (line 176) | TEST(JwtFormat, ValidateHeaderWithUnknownTypeOk) { function TEST (line 186) | TEST(JwtFormat, ValidateHeaderRejectsCrit) { function TEST (line 197) | TEST(JwtFormat, ValidateHeaderWithUnknownEntry) { function TEST (line 206) | TEST(JwtFormat, ValidateHeaderWithInvalidAlgTypFails) { function TEST (line 215) | TEST(JwtFormat, ValidateHeaderWithTinkKid) { function TEST (line 226) | TEST(JwtFormat, ValidateHeaderWithTinkKidMissingFails) { function TEST (line 236) | TEST(JwtFormat, ValidateHeaderWithCustomKid) { function TEST (line 247) | TEST(JwtFormat, ValidateHeaderWithCustomKidMissingFails) { function TEST (line 257) | TEST(JwtFormat, ValidateHeaderWithTinkAndCustomKidFails) { function TEST (line 265) | TEST(JwtFormat, GetKidWithTinkOutputPrefixType) { function TEST (line 272) | TEST(JwtFormat, GetKeyId) { function TEST (line 278) | TEST(JwtFormat, GetKidWithRawOutputPrefixTypeIsNotPresent) { function TEST (line 283) | TEST(JwtFormat, KeyIdKidConversion) { function TEST (line 294) | TEST(JwtFormat, GetKeyIdFromInvalidKidIsNotPresent) { function TEST (line 300) | TEST(JwtFormat, DecodeFixedPayload) { function TEST (line 314) | TEST(JwtFormat, DecodePayloadWithLineFeedFails) { function TEST (line 325) | TEST(JwtFormat, EncodeFixedSignature) { function TEST (line 332) | TEST(JwtFormat, DecodeSignatureWithLineFeedFails) { function TEST (line 338) | TEST(RawJwt, FromJson) { function TEST (line 352) | TEST(RawJwt, FromJsonWithTypeHeader) { function TEST (line 361) | TEST(RawJwt, FromJsonExpExpiration) { function TEST (line 370) | TEST(RawJwt, FromJsonExpirationTooLarge) { function TEST (line 376) | TEST(RawJwt, FromJsonNegativeExpirationAreInvalid) { function TEST (line 382) | TEST(RawJwt, FromJsonPreservesStringAud) { function TEST (line 394) | TEST(RawJwt, FromJsonPreservesListAud) { function TEST (line 406) | TEST(RawJwt, FromJsonWithBadRegisteredTypes) { FILE: cc/jwt/internal/jwt_hmac_key_manager.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type jwt_internal (line 42) | namespace jwt_internal { function Status (line 73) | Status JwtHmacKeyManager::ValidateKey(const JwtHmacKey& key) const { function Status (line 77) | Status JwtHmacKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/jwt_hmac_key_manager.h function namespace (line 47) | namespace crypto { FILE: cc/jwt/internal/jwt_hmac_key_manager_test.cc type crypto (line 51) | namespace crypto { type tink (line 52) | namespace tink { type jwt_internal (line 53) | namespace jwt_internal { function TEST (line 69) | TEST(JwtHmacKeyManagerTest, Basics) { function TEST (line 77) | TEST(JwtHmacKeyManagerTest, ValidateEmptyKey) { function TEST (line 81) | TEST(JwtHmacKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 86) | TEST(RawJwtHmacKeyManagerTest, ValidateHS256KeyFormat) { function TEST (line 95) | TEST(RawJwtHmacKeyManagerTest, ValidateHS384KeyFormat) { function TEST (line 104) | TEST(RawJwtHmacKeyManagerTest, ValidateHS512KeyFormat) { function TEST (line 113) | TEST(JwtHmacKeyManagerTest, CreateKey) { function TEST (line 127) | TEST(JwtHmacKeyManagerTest, ValidateKeyWithUnknownAlgorithm_fails) { function TEST (line 136) | TEST(JwtHmacKeyManagerTest, ValidateHS256Key) { function TEST (line 146) | TEST(JwtHmacKeyManagerTest, ValidateHS384Key) { function TEST (line 158) | TEST(JwtHmacKeyManagerTest, ValidateHS512Key) { function TEST (line 170) | TEST(JwtHmacKeyManagerTest, DeriveKeyIsNotImplemented) { function TEST (line 183) | TEST(JwtHmacKeyManagerTest, GetAndUsePrimitive) { function TEST (line 216) | TEST(JwtHmacKeyManagerTest, GetAndUsePrimitiveWithKid) { function TEST (line 275) | TEST(JwtHmacKeyManagerTest, GetAndUsePrimitiveWithCustomKid) { function TEST (line 329) | TEST(JwtHmacKeyManagerTest, ValidateTokenWithFixedKey) { FILE: cc/jwt/internal/jwt_mac_impl.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type jwt_internal (line 41) | namespace jwt_internal { FILE: cc/jwt/internal/jwt_mac_impl.h function namespace (line 35) | namespace crypto { FILE: cc/jwt/internal/jwt_mac_impl_test.cc type crypto (line 60) | namespace crypto { type tink (line 61) | namespace tink { type jwt_internal (line 62) | namespace jwt_internal { function CreateJwtMac (line 66) | util::StatusOr> CreateJwtMac() { function TEST (line 87) | TEST(JwtMacImplTest, CreateAndValidateToken) { function TEST (line 127) | TEST(JwtMacImplTest, CreateAndValidateTokenWithKid) { function TEST (line 184) | TEST(JwtMacImplTest, ValidateFixedToken) { function TEST (line 229) | TEST(JwtMacImplTest, ValidateInvalidTokens) { FILE: cc/jwt/internal/jwt_mac_internal.h function namespace (line 30) | namespace crypto { FILE: cc/jwt/internal/jwt_mac_wrapper.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type jwt_internal (line 40) | namespace jwt_internal { class JwtMacSetWrapper (line 46) | class JwtMacSetWrapper : public JwtMac { method JwtMacSetWrapper (line 48) | explicit JwtMacSetWrapper( function Validate (line 65) | util::Status Validate(PrimitiveSet* jwt_mac_set) { FILE: cc/jwt/internal/jwt_mac_wrapper.h function namespace (line 28) | namespace crypto { FILE: cc/jwt/internal/jwt_mac_wrapper_test.cc type crypto (line 57) | namespace crypto { type tink (line 58) | namespace tink { type jwt_internal (line 59) | namespace jwt_internal { function KeyTemplate (line 69) | KeyTemplate createTemplate(OutputPrefixType output_prefix) { function KeysetHandleWithNewKeyId (line 81) | std::unique_ptr KeysetHandleWithNewKeyId( function KeysetHandleWithTinkPrefix (line 90) | std::unique_ptr KeysetHandleWithTinkPrefix( class JwtMacWrapperTest (line 97) | class JwtMacWrapperTest : public ::testing::Test { method SetUp (line 99) | void SetUp() override { function TEST_F (line 109) | TEST_F(JwtMacWrapperTest, WrapNullptr) { function TEST_F (line 115) | TEST_F(JwtMacWrapperTest, WrapEmpty) { function TEST_F (line 122) | TEST_F(JwtMacWrapperTest, CannotWrapPrimitivesFromNonRawOrTinkKeys) { function TEST_F (line 136) | TEST_F(JwtMacWrapperTest, GenerateRawComputeVerifySuccess) { function TEST_F (line 190) | TEST_F(JwtMacWrapperTest, GenerateTinkComputeVerifySuccess) { function TEST_F (line 246) | TEST_F(JwtMacWrapperTest, KeyRotation) { FILE: cc/jwt/internal/jwt_public_key_sign_impl.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type jwt_internal (line 34) | namespace jwt_internal { FILE: cc/jwt/internal/jwt_public_key_sign_impl.h function namespace (line 32) | namespace crypto { FILE: cc/jwt/internal/jwt_public_key_sign_internal.h function namespace (line 28) | namespace crypto { FILE: cc/jwt/internal/jwt_public_key_sign_verify_impl_test.cc type crypto (line 53) | namespace crypto { type tink (line 54) | namespace tink { type jwt_internal (line 55) | namespace jwt_internal { class JwtSignatureImplTest (line 59) | class JwtSignatureImplTest : public ::testing::Test { method SetUp (line 61) | void SetUp() override { function TEST_F (line 87) | TEST_F(JwtSignatureImplTest, CreateAndValidateToken) { function TEST_F (line 141) | TEST_F(JwtSignatureImplTest, CreateAndValidateTokenWithKid) { function TEST_F (line 184) | TEST_F(JwtSignatureImplTest, FailsWithModifiedCompact) { function TEST_F (line 223) | TEST_F(JwtSignatureImplTest, FailsWithInvalidTokens) { FILE: cc/jwt/internal/jwt_public_key_sign_wrapper.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type jwt_internal (line 36) | namespace jwt_internal { class JwtPublicKeySignSetWrapper (line 42) | class JwtPublicKeySignSetWrapper : public JwtPublicKeySign { method JwtPublicKeySignSetWrapper (line 44) | explicit JwtPublicKeySignSetWrapper( function Validate (line 57) | util::Status Validate(PrimitiveSet* jwt_... FILE: cc/jwt/internal/jwt_public_key_sign_wrapper.h function namespace (line 27) | namespace crypto { FILE: cc/jwt/internal/jwt_public_key_verify_impl.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type jwt_internal (line 40) | namespace jwt_internal { FILE: cc/jwt/internal/jwt_public_key_verify_impl.h function namespace (line 34) | namespace crypto { FILE: cc/jwt/internal/jwt_public_key_verify_internal.h function namespace (line 27) | namespace crypto { FILE: cc/jwt/internal/jwt_public_key_verify_wrapper.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type jwt_internal (line 39) | namespace jwt_internal { class JwtPublicKeyVerifySetWrapper (line 45) | class JwtPublicKeyVerifySetWrapper : public JwtPublicKeyVerify { method JwtPublicKeyVerifySetWrapper (line 47) | explicit JwtPublicKeyVerifySetWrapper( function Validate (line 61) | util::Status Validate( FILE: cc/jwt/internal/jwt_public_key_verify_wrapper.h function namespace (line 27) | namespace crypto { FILE: cc/jwt/internal/jwt_public_key_wrappers_test.cc type crypto (line 64) | namespace crypto { type tink (line 65) | namespace tink { type jwt_internal (line 66) | namespace jwt_internal { function KeyTemplate (line 72) | KeyTemplate CreateTemplate(OutputPrefixType output_prefix) { function KeysetHandleWithNewKeyId (line 85) | std::unique_ptr KeysetHandleWithNewKeyId( function KeysetHandleWithTinkPrefix (line 97) | std::unique_ptr KeysetHandleWithTinkPrefix( class JwtPublicKeyWrappersTest (line 104) | class JwtPublicKeyWrappersTest : public ::testing::Test { method SetUp (line 106) | void SetUp() override { function TEST_F (line 118) | TEST_F(JwtPublicKeyWrappersTest, WrapNullptrSign) { function TEST_F (line 122) | TEST_F(JwtPublicKeyWrappersTest, WrapNullptrVerify) { function TEST_F (line 126) | TEST_F(JwtPublicKeyWrappersTest, WrapEmptySign) { function TEST_F (line 133) | TEST_F(JwtPublicKeyWrappersTest, CannotWrapPrimitivesFromNonRawOrT... function TEST_F (line 156) | TEST_F(JwtPublicKeyWrappersTest, GenerateRawSignVerifySuccess) { function TEST_F (line 217) | TEST_F(JwtPublicKeyWrappersTest, GenerateTinkSignVerifySuccess) { function TEST_F (line 282) | TEST_F(JwtPublicKeyWrappersTest, KeyRotation) { FILE: cc/jwt/internal/jwt_rsa_ssa_pkcs1_sign_key_manager.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type jwt_internal (line 35) | namespace jwt_internal { function Status (line 86) | Status JwtRsaSsaPkcs1SignKeyManager::ValidateKey( function Status (line 91) | Status JwtRsaSsaPkcs1SignKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/jwt_rsa_ssa_pkcs1_sign_key_manager.h function namespace (line 37) | namespace jwt_internal { FILE: cc/jwt/internal/jwt_rsa_ssa_pkcs1_sign_verify_key_manager_test.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type jwt_internal (line 49) | namespace jwt_internal { function JwtRsaSsaPkcs1KeyFormat (line 65) | JwtRsaSsaPkcs1KeyFormat CreateKeyFormat(JwtRsaSsaPkcs1Algorithm al... function TEST (line 78) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, BasicsSign) { function TEST (line 86) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, BasicsVerify) { function TEST (line 94) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, ValidateEmptyPrivateK... function TEST (line 100) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, ValidateEmptyPublicKe... function TEST (line 106) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, ValidateEmptyKeyForma... function TEST (line 112) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, ValidKeyFormatRS256) { function TEST (line 119) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, ValidateKeyFormatRS38... function TEST (line 126) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, ValidateKeyFormatRS51... function TEST (line 133) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, CreatePrivateKeyAndVa... function TEST (line 148) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, CreatePublicKeyAndVal... function TEST (line 164) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, GetAndUsePrimitives) { function TEST (line 234) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, GetAndUsePrimitivesWi... function TEST (line 309) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, VerifyFailsWithDiffer... FILE: cc/jwt/internal/jwt_rsa_ssa_pkcs1_verify_key_manager.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type jwt_internal (line 35) | namespace jwt_internal { function Status (line 79) | Status JwtRsaSsaPkcs1VerifyKeyManager::ValidateKey( FILE: cc/jwt/internal/jwt_rsa_ssa_pkcs1_verify_key_manager.h function namespace (line 36) | namespace tink { FILE: cc/jwt/internal/jwt_rsa_ssa_pss_sign_key_manager.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type jwt_internal (line 35) | namespace jwt_internal { function Status (line 84) | Status JwtRsaSsaPssSignKeyManager::ValidateKey( function Status (line 89) | Status JwtRsaSsaPssSignKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/jwt_rsa_ssa_pss_sign_key_manager.h function namespace (line 37) | namespace jwt_internal { FILE: cc/jwt/internal/jwt_rsa_ssa_pss_sign_verify_key_manager_test.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type jwt_internal (line 49) | namespace jwt_internal { function JwtRsaSsaPssKeyFormat (line 65) | JwtRsaSsaPssKeyFormat CreateKeyFormat(JwtRsaSsaPssAlgorithm algori... function TEST (line 78) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, BasicsSign) { function TEST (line 86) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, BasicsVerify) { function TEST (line 94) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, ValidateEmptyPrivateKey) { function TEST (line 100) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, ValidateEmptyPublicKey) { function TEST (line 106) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 112) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, ValidKeyFormatPS256) { function TEST (line 119) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, ValidateKeyFormatRS384) { function TEST (line 126) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, ValidateKeyFormatRS512) { function TEST (line 133) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, CreatePrivateKeyAndVali... function TEST (line 148) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, CreatePublicKeyAndValid... function TEST (line 163) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, GetAndUsePrimitives) { function TEST (line 234) | TEST(JwtRsaSsaPkcs1SignVerifyKeyManagerTest, GetAndUsePrimitivesWi... function TEST (line 308) | TEST(JwtRsaSsaPssSignVerifyKeyManagerTest, VerifyFailsWithDifferen... FILE: cc/jwt/internal/jwt_rsa_ssa_pss_verify_key_manager.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type jwt_internal (line 35) | namespace jwt_internal { function Status (line 79) | Status JwtRsaSsaPssVerifyKeyManager::ValidateKey( FILE: cc/jwt/internal/jwt_rsa_ssa_pss_verify_key_manager.h function namespace (line 36) | namespace tink { FILE: cc/jwt/internal/raw_jwt_ecdsa_sign_key_manager.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type jwt_internal (line 42) | namespace jwt_internal { function Status (line 107) | Status RawJwtEcdsaSignKeyManager::ValidateKey( function Status (line 114) | Status RawJwtEcdsaSignKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/raw_jwt_ecdsa_sign_key_manager.h function namespace (line 37) | namespace crypto { FILE: cc/jwt/internal/raw_jwt_ecdsa_sign_key_manager_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type jwt_internal (line 42) | namespace jwt_internal { function TEST (line 62) | TEST(RawJwtEcdsaSignKeyManagerTest, Basic) { function TEST (line 70) | TEST(RawJwtEcdsaSignKeyManagerTest, ValidateEmptyKeyFormat) { function JwtEcdsaKeyFormat (line 76) | JwtEcdsaKeyFormat CreateValidEs256KeyFormat() { function TEST (line 82) | TEST(RawJwtEcdsaSignKeyManagerTest, ValidateKeyFormat) { function TEST (line 87) | TEST(RawJwtEcdsaSignKeyManagerTest, ValidateKeyFormatUnknownAlgori... function TEST (line 94) | TEST(RawJwtEcdsaSignKeyManagerTest, CreateKey) { function TEST (line 112) | TEST(RawJwtEcdsaSignKeyManagerTest, CreateKeyValid) { function JwtEcdsaPrivateKey (line 121) | JwtEcdsaPrivateKey CreateValidEs256Key() { function TEST (line 126) | TEST(RawJwtEcdsaSignKeyManagerTest, ValidateKey) { function TEST (line 131) | TEST(RawJwtEcdsaSignKeyManagerTest, ValidateKeyUnknownAlgorithm) { function TEST (line 139) | TEST(RawJwtEcdsaSignKeyManagerTest, GetPublicKey) { function TEST (line 154) | TEST(RawJwtEcdsaSignKeyManagerTest, Create) { function TEST (line 180) | TEST(RawJwtEcdsaSignKeyManagerTest, CreateDifferentKey) { FILE: cc/jwt/internal/raw_jwt_ecdsa_verify_key_manager.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type jwt_internal (line 38) | namespace jwt_internal { function Status (line 103) | Status RawJwtEcdsaVerifyKeyManager::ValidateAlgorithm( function Status (line 117) | Status RawJwtEcdsaVerifyKeyManager::ValidateKey( FILE: cc/jwt/internal/raw_jwt_ecdsa_verify_key_manager.h function namespace (line 38) | namespace crypto { FILE: cc/jwt/internal/raw_jwt_ecdsa_verify_key_manager_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type jwt_internal (line 43) | namespace jwt_internal { function TEST (line 60) | TEST(RawJwtEcdsaVerifyKeyManagerTest, Basics) { function TEST (line 68) | TEST(RawJwtEcdsaVerifyKeyManagerTest, ValidateEmptyKey) { function JwtEcdsaPrivateKey (line 73) | JwtEcdsaPrivateKey CreateValidEs256PrivateKey() { function JwtEcdsaPublicKey (line 79) | JwtEcdsaPublicKey CreateValidPublicKey() { function TEST (line 86) | TEST(RawJwtEcdsaVerifyKeyManagerTest, PublicKeyValid) { function TEST (line 91) | TEST(EcdsaSignKeyManagerTest, ValidateKeyUnknownAlgorithm) { function TEST (line 100) | TEST(EcdsaSignKeyManagerTest, Create) { function TEST (line 127) | TEST(EcdsaSignKeyManagerTest, CreateDifferentPrivateKey) { FILE: cc/jwt/internal/raw_jwt_hmac_key_manager.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type jwt_internal (line 40) | namespace jwt_internal { function MinimumKeySize (line 50) | StatusOr MinimumKeySize(const JwtHmacAlgorithm& algorithm) { function Status (line 83) | Status RawJwtHmacKeyManager::ValidateKey(const JwtHmacKey& key) co... function Status (line 98) | Status RawJwtHmacKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/raw_jwt_hmac_key_manager.h function namespace (line 42) | namespace crypto { FILE: cc/jwt/internal/raw_jwt_hmac_key_manager_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type jwt_internal (line 43) | namespace jwt_internal { function TEST (line 60) | TEST(RawJwtHmacKeyManagerTest, Basics) { function TEST (line 68) | TEST(RawJwtHmacKeyManagerTest, ValidateEmptyKey) { function TEST (line 72) | TEST(RawJwtHmacKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 79) | TEST(RawJwtHmacKeyManagerTest, ValidateHS256KeyFormat) { function TEST (line 91) | TEST(RawJwtHmacKeyManagerTest, ValidateHS384KeyFormat) { function TEST (line 103) | TEST(RawJwtHmacKeyManagerTest, ValidateHS512KeyFormat) { function TEST (line 115) | TEST(RawJwtHmacKeyManagerTest, Sha1IsInvalidKeyFormat) { function TEST (line 123) | TEST(RawJwtHmacKeyManagerTest, CreateKeyWithSha256) { function TEST (line 136) | TEST(RawJwtHmacKeyManagerTest, CreateKeyWithSha384) { function TEST (line 149) | TEST(RawJwtHmacKeyManagerTest, CreateKeyWithSha512) { function TEST (line 162) | TEST(RawJwtHmacKeyManagerTest, ValidateHS256Key) { function TEST (line 172) | TEST(RawJwtHmacKeyManagerTest, ValidateHS384Key) { function TEST (line 184) | TEST(RawJwtHmacKeyManagerTest, ValidateHS512Key) { function TEST (line 195) | TEST(RawJwtHmacKeyManagerTest, Sha1KeyIsInvalid) { function TEST (line 203) | TEST(RawJwtHmacKeyManagerTest, DeriveKeyIsNotImplemented) { function TEST (line 216) | TEST(RawJwtHmacKeyManagerTest, GetPrimitiveFromNewKeysetHandle) { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pkcs1_sign_key_manager.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { function JwtRsaSsaPkcs1PrivateKey (line 54) | JwtRsaSsaPkcs1PrivateKey RsaPrivateKeySubtleToProto( function RsaPrivateKeyProtoToSubtle (line 72) | internal::RsaPrivateKey RsaPrivateKeyProtoToSubtle( function Status (line 143) | Status RawJwtRsaSsaPkcs1SignKeyManager::ValidateKey( function Status (line 150) | Status RawJwtRsaSsaPkcs1SignKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pkcs1_sign_key_manager.h function namespace (line 37) | namespace crypto { function override (line 77) | const override { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pkcs1_sign_key_manager_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function TEST (line 57) | TEST(JwtRsaSsaPkcsSignKeyManagerTest, Basic) { function JwtRsaSsaPkcs1KeyFormat (line 66) | JwtRsaSsaPkcs1KeyFormat CreateKeyFormat(JwtRsaSsaPkcs1Algorithm algo... function TEST (line 79) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatRs256) { function TEST (line 86) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatRs384) { function TEST (line 93) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatRs512) { function TEST (line 100) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, KeyFormatWithUnknownAlgorithm... function TEST (line 107) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, KeyFormatWithSmallModulusIsIn... function CheckNewKey (line 115) | void CheckNewKey(const JwtRsaSsaPkcs1PrivateKey& private_key, function TEST (line 171) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, CreateRs256Key) { function TEST (line 182) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, CreateSmallRs256Key) { function TEST (line 194) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, CreateKeyLargeRs512Key) { function TEST (line 207) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, CreateKeyAlwaysNewRsaPair) { function TEST (line 223) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, GetPublicKey) { function TEST (line 238) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, Create) { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pkcs1_verify_key_manager.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function Status (line 70) | Status RawJwtRsaSsaPkcs1VerifyKeyManager::ValidateKey( function Status (line 91) | Status RawJwtRsaSsaPkcs1VerifyKeyManager::ValidateAlgorithm( FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pkcs1_verify_key_manager.h function namespace (line 41) | namespace crypto { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pkcs1_verify_key_manager_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function TEST (line 61) | TEST(RawJwtRsaSsaPkcs1VerifyKeyManagerTest, Basics) { function TEST (line 70) | TEST(RawJwtRsaSsaPkcs1VerifyKeyManagerTest, ValidateEmptyKey) { function JwtRsaSsaPkcs1KeyFormat (line 76) | JwtRsaSsaPkcs1KeyFormat CreateKeyFormat(JwtRsaSsaPkcs1Algorithm algo... function JwtRsaSsaPkcs1KeyFormat (line 89) | JwtRsaSsaPkcs1KeyFormat ValidKeyFormat() { function JwtRsaSsaPkcs1PrivateKey (line 93) | JwtRsaSsaPkcs1PrivateKey CreateValidPrivateKey() { function JwtRsaSsaPkcs1PublicKey (line 97) | JwtRsaSsaPkcs1PublicKey CreateValidPublicKey() { function TEST (line 104) | TEST(RawJwtRsaSsaPkcs1VerifyKeyManagerTest, PublicKeyValid) { function TEST (line 109) | TEST(RawJwtRsaSsaPkcs1VerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST (line 116) | TEST(RawJwtRsaSsaPkcs1VerifyKeyManagerTest, KeyWithUnkownAlgorithmIn... function TEST (line 123) | TEST(RawJwtRsaSsaPkcs1VerifyKeyManagerTest, KeyFormatWithSmallModulu... function TEST (line 132) | TEST(JwtRsaSsaPkcs1SignKeyManagerTest, Create) { function TEST (line 167) | TEST(RawJwtRsaSsaPkcs1VerifyKeyManagerTest, NistTestVector) { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pss_sign_key_manager.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { function RsaPrivateKeySubtleToProto (line 58) | std::unique_ptr RsaPrivateKeySubtleToProto( function RsaPrivateKeyProtoToSubtle (line 76) | internal::RsaPrivateKey RsaPrivateKeyProtoToSubtle( function Status (line 152) | Status RawJwtRsaSsaPssSignKeyManager::ValidateKey( function Status (line 159) | Status RawJwtRsaSsaPssSignKeyManager::ValidateKeyFormat( FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pss_sign_key_manager.h function namespace (line 37) | namespace crypto { function override (line 77) | const override { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pss_sign_key_manager_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function TEST (line 56) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, Basic) { function JwtRsaSsaPssKeyFormat (line 65) | JwtRsaSsaPssKeyFormat CreateKeyFormat(JwtRsaSsaPssAlgorithm algorithm, function TEST (line 80) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, ValidatePs256KeyFormat) { function TEST (line 87) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, ValidatePs512KeyFormat) { function TEST (line 94) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, KeyWithSmallModulusIsInvalid) { function TEST (line 102) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, ValidateKeyFormatUnkownHashD... function CheckNewKey (line 110) | void CheckNewKey(const JwtRsaSsaPssPrivateKey& private_key, function TEST (line 164) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, CreatePs256KeyValid) { function TEST (line 175) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, CreatePs384KeyValid) { function TEST (line 186) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, CreatePs512KeyValid) { function TEST (line 198) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, CreateKeyAlwaysNewRsaPair) { function TEST (line 214) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, GetPublicKey) { function TEST (line 228) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, Create) { function TEST (line 254) | TEST(RawJwtRsaSsaPssSignKeyManagerTest, CreateWrongKey) { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pss_verify_key_manager.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function Status (line 78) | Status RawJwtRsaSsaPssVerifyKeyManager::ValidateKey( function Status (line 101) | Status RawJwtRsaSsaPssVerifyKeyManager::ValidateAlgorithm( FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pss_verify_key_manager.h function namespace (line 38) | namespace crypto { FILE: cc/jwt/internal/raw_jwt_rsa_ssa_pss_verify_key_manager_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function TEST (line 58) | TEST(RawJwtRsaSsaPssVerifyKeyManagerTest, Basics) { function TEST (line 67) | TEST(RawJwtRsaSsaPssVerifyKeyManagerTest, ValidateEmptyKey) { function JwtRsaSsaPssKeyFormat (line 73) | JwtRsaSsaPssKeyFormat CreateKeyFormat(JwtRsaSsaPssAlgorithm algorithm, function JwtRsaSsaPssPublicKey (line 88) | JwtRsaSsaPssPublicKey CreateValidPublicKey() { function TEST (line 98) | TEST(RawJwtRsaSsaPssVerifyKeyManagerTest, PublicKeyValid) { function TEST (line 103) | TEST(RawJwtRsaSsaPssVerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST (line 109) | TEST(RawJwtRsaSsaPssVerifyKeyManagerTest, PublicKeyUnknownAlgorithmI... function TEST (line 115) | TEST(RawJwtRsaSsaPssVerifyKeyManagerTest, PublicKeyWithSmallModulusI... function TEST (line 124) | TEST(RsaSsaPssSignKeyManagerTest, Create) { type NistTestVector (line 162) | struct NistTestVector { function TEST (line 199) | TEST(RawJwtRsaSsaPssVerifyKeyManagerTest, TestVector) { FILE: cc/jwt/jwk_set_converter.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { function HasItem (line 68) | bool HasItem(const Struct& key_struct, absl::string_view name) { function GetStringItem (line 73) | util::StatusOr GetStringItem(const Struct& key_struct, function ExpectStringItem (line 85) | util::Status ExpectStringItem(const Struct& key_struct, absl::string... function ValidateUseIsSig (line 97) | util::Status ValidateUseIsSig(const Struct& key_struct) { function ValidateKeyOpsIsVerify (line 104) | util::Status ValidateKeyOpsIsVerify(const Struct& key_struct) { function RsPublicKeyDataFromKeyStruct (line 134) | util::StatusOr RsPublicKeyDataFromKeyStruct(const Struct& k... function PsPublicKeyDataFromKeyStruct (line 208) | util::StatusOr PsPublicKeyDataFromKeyStruct(const Struct& k... function EsPublicKeyDataFromKeyStruct (line 282) | util::StatusOr EsPublicKeyDataFromKeyStruct(const Struct& k... function Sec1EncodeCoordinates (line 372) | util::StatusOr> Sec1EncodeCoordi... function JwkSetToPublicKeysetHandle (line 399) | util::StatusOr> JwkSetToPublicKeysetHa... function AddStringEntry (line 471) | void AddStringEntry(Struct* key, absl::string_view name, function AddKeyOpsVerifyEntry (line 477) | void AddKeyOpsVerifyEntry(Struct* key) { function EsPublicKeyToKeyStruct (line 483) | util::StatusOr EsPublicKeyToKeyStruct(const Keyset_Key& key) { function RsPublicKeyToKeyStruct (line 537) | util::StatusOr RsPublicKeyToKeyStruct(const Keyset_Key& key) { function PsPublicKeyToKeyStruct (line 577) | util::StatusOr PsPublicKeyToKeyStruct(const Keyset_Key& key) { function JwkSetFromPublicKeysetHandle (line 617) | util::StatusOr JwkSetFromPublicKeysetHandle( FILE: cc/jwt/jwk_set_converter.h function namespace (line 27) | namespace crypto { FILE: cc/jwt/jwk_set_converter_test.cc type crypto (line 50) | namespace crypto { type tink (line 51) | namespace tink { class JwkSetConverterTest (line 516) | class JwkSetConverterTest : public testing::TestWithParam ToKidStrategy( function ToOutputPrefixType (line 80) | util::StatusOr ToOutputPrefixType( function FromProtoAlgorithm (line 96) | util::StatusOr FromProtoAlgorithm( function ToProtoAlgorithm (line 111) | util::StatusOr ToProtoAlgorithm( function ToParameters (line 126) | util::StatusOr ToParameters( function ParseParameters (line 143) | util::StatusOr ParseParameters( function SerializeParameters (line 166) | util::StatusOr SerializePara... function ParseKey (line 193) | util::StatusOr ParseKey( function SerializeKey (line 237) | util::StatusOr SerializeKey( function JwtHmacProtoParametersParserImpl (line 276) | JwtHmacProtoParametersParserImpl* JwtHmacProtoParametersParser() { function JwtHmacProtoParametersSerializerImpl (line 282) | JwtHmacProtoParametersSerializerImpl* JwtHmacProtoParametersSerializ... function JwtHmacProtoKeyParserImpl (line 288) | JwtHmacProtoKeyParserImpl* JwtHmacProtoKeyParser() { function JwtHmacProtoKeySerializerImpl (line 293) | JwtHmacProtoKeySerializerImpl* JwtHmacProtoKeySerializer() { function RegisterJwtHmacProtoSerialization (line 300) | util::Status RegisterJwtHmacProtoSerialization() { FILE: cc/jwt/jwt_hmac_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/jwt/jwt_hmac_proto_serialization_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type TestCase (line 67) | struct TestCase { class JwtHmacProtoSerializationTest (line 78) | class JwtHmacProtoSerializationTest : public TestWithParam { method SetUp (line 80) | void SetUp() override { function TEST_F (line 85) | TEST_F(JwtHmacProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 110) | TEST_P(JwtHmacProtoSerializationTest, ParseParameters) { function TEST_F (line 136) | TEST_F(JwtHmacProtoSerializationTest, ParseParametersWithInvalidSeri... function TEST_F (line 152) | TEST_F(JwtHmacProtoSerializationTest, ParseParametersWithInvalidVers... function TEST_F (line 173) | TEST_F(JwtHmacProtoSerializationTest, ParseParametersWithUnknownAlgo... function TEST_P (line 201) | TEST_P(JwtHmacParsePrefixTest, ParseParametersWithInvalidPrefix) { function TEST_P (line 225) | TEST_P(JwtHmacProtoSerializationTest, SerializeParameters) { function TEST_F (line 257) | TEST_F(JwtHmacProtoSerializationTest, SerializeParametersWithCustomK... function TEST_P (line 277) | TEST_P(JwtHmacProtoSerializationTest, ParseKeyWithoutCustomKid) { function TEST_F (line 322) | TEST_F(JwtHmacProtoSerializationTest, ParseKeyWithCustomKid) { function TEST_F (line 364) | TEST_F(JwtHmacProtoSerializationTest, ParseTinkKeyWithCustomKidFails) { function TEST_F (line 390) | TEST_F(JwtHmacProtoSerializationTest, ParseKeyWithInvalidSerializati... function TEST_F (line 415) | TEST_F(JwtHmacProtoSerializationTest, ParseKeyWithInvalidVersion) { function TEST_P (line 442) | TEST_P(JwtHmacParsePrefixTest, ParseKeyWithInvalidPrefix) { function TEST_F (line 471) | TEST_F(JwtHmacProtoSerializationTest, ParseKeyWithUnknownAlgorithm) { function TEST_F (line 496) | TEST_F(JwtHmacProtoSerializationTest, ParseKeyWithoutSecretKeyAccess) { function TEST_P (line 520) | TEST_P(JwtHmacProtoSerializationTest, SerializeKeyWithoutCustomKid) { function TEST_F (line 568) | TEST_F(JwtHmacProtoSerializationTest, SerializeKeyWithCustomKid) { function TEST_F (line 615) | TEST_F(JwtHmacProtoSerializationTest, SerializeKeyWithoutSecretKeyAc... FILE: cc/jwt/jwt_key_templates.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { function KeyTemplate (line 50) | KeyTemplate* NewJwtHmacKeyTemplate(JwtHmacAlgorithm algorithm, function KeyTemplate (line 64) | KeyTemplate* NewJwtEcdsaKeyTemplate(JwtEcdsaAlgorithm algorithm, function KeyTemplate (line 76) | KeyTemplate* NewJwtRsaSsaPkcs1KeyTemplate(JwtRsaSsaPkcs1Algorithm al... function KeyTemplate (line 96) | KeyTemplate* NewJwtRsaSsaPssKeyTemplate(JwtRsaSsaPssAlgorithm algori... function KeyTemplate (line 118) | const KeyTemplate& JwtHs256Template() { function KeyTemplate (line 124) | const KeyTemplate& RawJwtHs256Template() { function KeyTemplate (line 130) | const KeyTemplate& JwtHs384Template() { function KeyTemplate (line 136) | const KeyTemplate& RawJwtHs384Template() { function KeyTemplate (line 142) | const KeyTemplate& JwtHs512Template() { function KeyTemplate (line 148) | const KeyTemplate& RawJwtHs512Template() { function KeyTemplate (line 154) | const KeyTemplate& JwtEs256Template() { function KeyTemplate (line 160) | const KeyTemplate& RawJwtEs256Template() { function KeyTemplate (line 166) | const KeyTemplate& JwtEs384Template() { function KeyTemplate (line 172) | const KeyTemplate& RawJwtEs384Template() { function KeyTemplate (line 178) | const KeyTemplate& JwtEs512Template() { function KeyTemplate (line 184) | const KeyTemplate& RawJwtEs512Template() { function KeyTemplate (line 190) | const KeyTemplate& JwtRs256_2048_F4_Template() { function KeyTemplate (line 196) | const KeyTemplate& RawJwtRs256_2048_F4_Template() { function KeyTemplate (line 202) | const KeyTemplate& JwtRs256_3072_F4_Template() { function KeyTemplate (line 208) | const KeyTemplate& RawJwtRs256_3072_F4_Template() { function KeyTemplate (line 214) | const KeyTemplate& JwtRs384_3072_F4_Template() { function KeyTemplate (line 220) | const KeyTemplate& RawJwtRs384_3072_F4_Template() { function KeyTemplate (line 226) | const KeyTemplate& JwtRs512_4096_F4_Template() { function KeyTemplate (line 232) | const KeyTemplate& RawJwtRs512_4096_F4_Template() { function KeyTemplate (line 238) | const KeyTemplate& JwtPs256_2048_F4_Template() { function KeyTemplate (line 244) | const KeyTemplate& RawJwtPs256_2048_F4_Template() { function KeyTemplate (line 250) | const KeyTemplate& JwtPs256_3072_F4_Template() { function KeyTemplate (line 256) | const KeyTemplate& RawJwtPs256_3072_F4_Template() { function KeyTemplate (line 262) | const KeyTemplate& JwtPs384_3072_F4_Template() { function KeyTemplate (line 268) | const KeyTemplate& RawJwtPs384_3072_F4_Template() { function KeyTemplate (line 274) | const KeyTemplate& JwtPs512_4096_F4_Template() { function KeyTemplate (line 280) | const KeyTemplate& RawJwtPs512_4096_F4_Template() { FILE: cc/jwt/jwt_key_templates.h function namespace (line 22) | namespace crypto { FILE: cc/jwt/jwt_key_templates_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { class JwtMacKeyTemplatesTest (line 48) | class JwtMacKeyTemplatesTest : public testing::TestWithParam ... function RawJwtBuilder (line 543) | RawJwtBuilder& RawJwtBuilder::AddAudience(absl::string_view audience) { function RawJwtBuilder (line 560) | RawJwtBuilder& RawJwtBuilder::SetJwtId(absl::string_view jwid) { function RawJwtBuilder (line 568) | RawJwtBuilder& RawJwtBuilder::WithoutExpiration() { function RawJwtBuilder (line 573) | RawJwtBuilder& RawJwtBuilder::SetExpiration(absl::Time expiration) { function RawJwtBuilder (line 589) | RawJwtBuilder& RawJwtBuilder::SetNotBefore(absl::Time not_before) { function RawJwtBuilder (line 605) | RawJwtBuilder& RawJwtBuilder::SetIssuedAt(absl::Time issued_at) { function RawJwtBuilder (line 621) | RawJwtBuilder& RawJwtBuilder::AddNullClaim(absl::string_view name) { function RawJwtBuilder (line 636) | RawJwtBuilder& RawJwtBuilder::AddBooleanClaim(absl::string_view name, function RawJwtBuilder (line 652) | RawJwtBuilder& RawJwtBuilder::AddStringClaim(absl::string_view name, function RawJwtBuilder (line 668) | RawJwtBuilder& RawJwtBuilder::AddNumberClaim(absl::string_view name, function RawJwtBuilder (line 684) | RawJwtBuilder& RawJwtBuilder::AddJsonObjectClaim( function RawJwtBuilder (line 708) | RawJwtBuilder& RawJwtBuilder::AddJsonArrayClaim(absl::string_view name, FILE: cc/jwt/raw_jwt.h function namespace (line 31) | namespace crypto { FILE: cc/jwt/raw_jwt_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { function TEST (line 40) | TEST(RawJwt, GetTypeHeaderIssuerSubjectJwtIdOK) { function TEST (line 60) | TEST(RawJwt, TimestampsOK) { function TEST (line 81) | TEST(RawJwt, ExpWithMillisAlwaysRoundDown) { function TEST (line 91) | TEST(RawJwt, NbfWithMillisAlwaysRoundDown) { function TEST (line 103) | TEST(RawJwt, IatWithMillisAlwaysRoundDown) { function TEST (line 115) | TEST(RawJwt, LargeExpirationWorks) { function TEST (line 135) | TEST(RawJwt, TooLargeTimestampsFail) { function TEST (line 144) | TEST(RawJwt, NegativeTimestampsFail) { function TEST (line 153) | TEST(RawJwt, SetExpirationAndWithoutExpirationFail) { function TEST (line 159) | TEST(RawJwt, NeitherSetExpirationNorWithoutExpirationFail) { function TEST (line 163) | TEST(RawJwt, SetAudienceAndGetAudiencesOK) { function TEST (line 173) | TEST(RawJwt, SetAudiencesAndGetAudiencesOK) { function TEST (line 185) | TEST(RawJwt, AddGetAudiencesOK) { function TEST (line 198) | TEST(RawJwt, SetAudienceStringAud) { function TEST (line 206) | TEST(RawJwt, AddAudienceListAud) { function TEST (line 214) | TEST(RawJwt, SetAndAddAudienceFail) { function TEST (line 229) | TEST(RawJwt, GetCustomClaimOK) { function TEST (line 263) | TEST(RawJwt, HasCustomClaimIsFalseForWrongType) { function TEST (line 279) | TEST(RawJwt, HasAlwaysReturnsFalseForRegisteredClaims) { function TEST (line 301) | TEST(RawJwt, GetRegisteredCustomClaimNotOK) { function TEST (line 321) | TEST(RawJwt, SetRegisteredCustomClaimNotOK) { function TEST (line 371) | TEST(RawJwt, SetInvalidJsonObjectClaimNotOK) { function TEST (line 394) | TEST(RawJwt, SetInvalidJsonArrayClaimNotOK) { function TEST (line 417) | TEST(RawJwt, EmptyTokenHasAndIsReturnsFalse) { function TEST (line 437) | TEST(RawJwt, EmptyTokenGetReturnsNotOK) { function TEST (line 457) | TEST(RawJwt, BuildCanBeCalledTwice) { function TEST (line 475) | TEST(RawJwt, GetJsonPayload) { function TEST (line 483) | TEST(RawJwt, IntegerIsEncodedAsInteger) { function TEST (line 491) | TEST(RawJwt, GetExpirationJsonPayload) { function TEST (line 499) | TEST(RawJwt, GetNanoExpirationJsonPayload) { FILE: cc/jwt/verified_jwt.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { FILE: cc/jwt/verified_jwt.h function namespace (line 31) | namespace crypto { FILE: cc/jwt/verified_jwt_test.cc type crypto (line 53) | namespace crypto { type tink (line 54) | namespace tink { function CreateVerifiedJwt (line 58) | util::StatusOr CreateVerifiedJwt(const RawJwt& raw_jwt) { function TEST (line 101) | TEST(VerifiedJwt, GetTypeIssuerSubjectJwtIdOK) { function TEST (line 124) | TEST(VerifiedJwt, TimestampsOK) { function TEST (line 156) | TEST(VerifiedJwt, GetAudiencesOK) { function TEST (line 171) | TEST(VerifiedJwt, GetCustomClaimOK) { function TEST (line 207) | TEST(VerifiedJwt, HasCustomClaimIsFalseForWrongType) { function TEST (line 226) | TEST(VerifiedJwt, HasAlwaysReturnsFalseForRegisteredClaims) { function TEST (line 251) | TEST(VerifiedJwt, GetRegisteredCustomClaimNotOK) { function TEST (line 274) | TEST(VerifiedJwt, EmptyTokenHasAndIsReturnsFalse) { function TEST (line 297) | TEST(VerifiedJwt, EmptyTokenGetReturnsNotOK) { function TEST (line 320) | TEST(VerifiedJwt, GetJsonPayload) { function TEST (line 330) | TEST(VerifiedJwt, MoveMakesCopy) { FILE: cc/kem/internal/raw_kem_decapsulate.h function namespace (line 24) | namespace crypto { FILE: cc/kem/internal/raw_kem_encapsulate.h function namespace (line 25) | namespace crypto { FILE: cc/key.h function namespace (line 23) | namespace crypto { FILE: cc/key_access.h function namespace (line 20) | namespace crypto { FILE: cc/key_gen_configuration.h function namespace (line 22) | namespace crypto { FILE: cc/key_manager.h function namespace (line 33) | namespace crypto { FILE: cc/key_status.h function namespace (line 21) | namespace tink { FILE: cc/keyderivation/internal/config_prf_for_deriver.h function namespace (line 26) | namespace crypto { FILE: cc/keyderivation/internal/config_prf_for_deriver_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type internal (line 35) | namespace internal { function TEST (line 43) | TEST(ConfigPrfForDeriverTest, KeyManager) { function TEST (line 51) | TEST(ConfigPrfForDeriverTest, GetUnwrappedPrimitive) { FILE: cc/keyderivation/internal/key_derivers.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type internal (line 49) | namespace internal { function DeriveAesGcmKey (line 55) | util::StatusOr> DeriveAesGcmKey( function KeyDeriverFnMap (line 77) | const KeyDeriverFnMap& ParametersToKeyDeriver() { function DeriveKey (line 88) | util::StatusOr> DeriveKey(const Parameters& p... FILE: cc/keyderivation/internal/key_derivers.h function namespace (line 28) | namespace crypto { FILE: cc/keyderivation/internal/key_derivers_test.cc type crypto (line 63) | namespace crypto { type tink (line 64) | namespace tink { type internal (line 65) | namespace internal { class KeyDeriversTest (line 80) | class KeyDeriversTest : public Test { method SetUp (line 82) | void SetUp() override { function TEST_F (line 94) | TEST_F(KeyDeriversTest, DeriveKey) { function TEST_F (line 122) | TEST_F(KeyDeriversTest, MissingKeyDeriverFn) { function TEST_F (line 136) | TEST_F(KeyDeriversTest, InsufficientRandomness) { class KeyDeriversRfcVectorTest (line 153) | class KeyDeriversRfcVectorTest : public Test { method SetUp (line 155) | void SetUp() override { function TEST_F (line 203) | TEST_F(KeyDeriversRfcVectorTest, AesGcm) { FILE: cc/keyderivation/internal/prf_based_deriver.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type internal (line 47) | namespace internal { function DeriveWithGlobalRegistry (line 55) | util::StatusOr> DeriveWithGlobalRegi... function DeriveWithHardCodedMap (line 82) | util::StatusOr> DeriveWithHardCodedMap( function DeriveKeysetHandle (line 119) | util::StatusOr> DeriveKeysetHandle( function RegisterProtoSerializations (line 129) | util::Status RegisterProtoSerializations() { function GetUnwrappedStreamingPrf (line 133) | util::StatusOr> GetUnwrappedStreamin... FILE: cc/keyderivation/internal/prf_based_deriver.h function namespace (line 29) | namespace crypto { FILE: cc/keyderivation/internal/prf_based_deriver_key_manager.h function namespace (line 40) | namespace crypto { FILE: cc/keyderivation/internal/prf_based_deriver_key_manager_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type internal (line 45) | namespace internal { function TEST (line 63) | TEST(PrfBasedDeriverKeyManagerTest, Basics) { function TEST (line 71) | TEST(PrfBasedDeriverKeyManagerTest, ValidateKeyEmpty) { function TEST (line 76) | TEST(PrfBasedDeriverKeyManagerTest, ValidateKey) { function TEST (line 91) | TEST(PrfBasedDeriverKeyManagerTest, ValidateKeyWithWrongVersion) { function TEST (line 107) | TEST(PrfBasedDeriverKeyManagerTest, ValidateKeyFormat) { function TEST (line 124) | TEST(PrfBasedDeriverKeyManagerTest, ValidateKeyFormatEmpty) { function TEST (line 130) | TEST(PrfBasedDeriverKeyManagerTest, CreateKey) { function TEST (line 172) | TEST(PrfBasedDeriverKeyManagerTest, CreateKeyWithInvalidPrfKey) { function TEST (line 200) | TEST(PrfBasedDeriverKeyManagerTest, CreateKeyWithInvalidDerivedKey... function TEST (line 231) | TEST(PrfBasedDeriverKeyManagerTest, GetPrimitive) { FILE: cc/keyderivation/internal/prf_based_deriver_test.cc type crypto (line 53) | namespace crypto { type tink (line 54) | namespace tink { type internal (line 55) | namespace internal { class PrfBasedDeriverTest (line 75) | class PrfBasedDeriverTest : public Test { method HkdfPrfKey (line 81) | HkdfPrfKey PrfKey() { method KeyData (line 90) | KeyData PrfKeyData() { return test::AsKeyData(PrfKey(), KeyData:... function TEST_F (line 93) | TEST_F(PrfBasedDeriverTest, New) { function TEST_F (line 99) | TEST_F(PrfBasedDeriverTest, NewWithInvalidPrfKey) { function TEST_F (line 109) | TEST_F(PrfBasedDeriverTest, NewWithInvalidDerivedKeyTemplate) { function TEST_F (line 119) | TEST_F(PrfBasedDeriverTest, DeriveKeysetPlaceholders) { function TEST_F (line 144) | TEST_F(PrfBasedDeriverTest, DeriveKeysetPlaceholdersWithGlobalRegi... function TEST_F (line 173) | TEST_F(PrfBasedDeriverTest, DeriveKeysetWithDifferentPrfKeys) { function TEST_F (line 209) | TEST_F(PrfBasedDeriverTest, DeriveKeysetWithDifferentSalts) { class PrfBasedDeriverRfcVectorTest (line 238) | class PrfBasedDeriverRfcVectorTest : public Test { method KeyData (line 253) | KeyData PrfKeyData() { function TEST_F (line 273) | TEST_F(PrfBasedDeriverRfcVectorTest, AesGcm) { type PrfBasedDeriverJavaVector (line 314) | struct PrfBasedDeriverJavaVector { function GetPrfBasedDeriverJavaVectors (line 321) | std::vector GetPrfBasedDeriverJavaVecto... function TEST_P (line 354) | TEST_P(PrfBasedDeriverJavaVectorsTest, AesGcm) { FILE: cc/keyderivation/key_derivation_config.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/keyderivation/key_derivation_config.h function namespace (line 22) | namespace crypto { FILE: cc/keyderivation/key_derivation_config_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function TEST (line 47) | TEST(KeyDerivationConfigTest, Register) { FILE: cc/keyderivation/key_derivation_key_templates.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { FILE: cc/keyderivation/key_derivation_key_templates.h function namespace (line 23) | namespace crypto { FILE: cc/keyderivation/key_derivation_key_templates_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type internal (line 39) | namespace internal { class KeyDerivationKeyTemplatesTest (line 50) | class KeyDerivationKeyTemplatesTest : public ::testing::Test { method TearDown (line 52) | void TearDown() override { Registry::Reset(); } function TEST_F (line 55) | TEST_F(KeyDerivationKeyTemplatesTest, CreatePrfBasedKeyTemplate) { function TEST_F (line 97) | TEST_F(KeyDerivationKeyTemplatesTest, CreatePrfBasedKeyTemplateInv... function TEST_F (line 120) | TEST_F(KeyDerivationKeyTemplatesTest, function TEST_F (line 148) | TEST_F(KeyDerivationKeyTemplatesTest, function TEST_F (line 167) | TEST_F(KeyDerivationKeyTemplatesTest, FILE: cc/keyderivation/keyset_deriver.h function namespace (line 26) | namespace crypto { FILE: cc/keyderivation/keyset_deriver_test.cc type crypto (line 55) | namespace crypto { type tink (line 56) | namespace tink { function KeyData (line 77) | KeyData PrfKeyFromRfcVector() { function SaltFromRfcVector (line 96) | std::string SaltFromRfcVector() { function CreateAesGcmKey (line 105) | std::unique_ptr CreateAesGcmKey(int key_size, function CreatePrfBasedDeriverHandle (line 152) | util::StatusOr> CreatePrfBasedDeriverH... function TEST_P (line 200) | TEST_P(KeysetDeriverTest, DeriveKeyset) { FILE: cc/keyderivation/keyset_deriver_wrapper.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function Validate (line 41) | util::Status Validate(PrimitiveSet* deriver_set) { class KeysetDeriverSetWrapper (line 53) | class KeysetDeriverSetWrapper : public KeysetDeriver { method KeysetDeriverSetWrapper (line 55) | explicit KeysetDeriverSetWrapper( function DeriveAndGetKeyData (line 68) | crypto::tink::util::StatusOr DeriveAndGetKeyData( FILE: cc/keyderivation/keyset_deriver_wrapper.h function namespace (line 27) | namespace crypto { FILE: cc/keyderivation/keyset_deriver_wrapper_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function TEST (line 52) | TEST(KeysetDeriverWrapperTest, WrapNullptr) { function TEST (line 57) | TEST(KeysetDeriverWrapperTest, WrapEmpty) { function TEST (line 65) | TEST(KeysetDeriverWrapperTest, WrapNoPrimary) { function TEST (line 83) | TEST(KeysetDeriverWrapperTest, WrapSingle) { function TEST (line 117) | TEST(KeysetDeriverWrapperTest, WrapMultiple) { FILE: cc/keyset_handle.h function namespace (line 55) | namespace crypto { FILE: cc/keyset_handle_builder.h function namespace (line 38) | namespace tink { FILE: cc/keyset_manager.h function namespace (line 29) | namespace crypto { FILE: cc/keyset_reader.h function namespace (line 25) | namespace crypto { FILE: cc/keyset_writer.h function namespace (line 23) | namespace crypto { FILE: cc/kms_client.h function namespace (line 26) | namespace crypto { FILE: cc/kms_clients.h function namespace (line 31) | namespace crypto { FILE: cc/mac.h function namespace (line 26) | namespace crypto { FILE: cc/mac/aes_cmac_key.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { FILE: cc/mac/aes_cmac_key.h function namespace (line 32) | namespace crypto { FILE: cc/mac/aes_cmac_key_manager.h function namespace (line 44) | namespace crypto { function class (line 61) | class ChunkedMacFactory : public PrimitiveFactory { FILE: cc/mac/aes_cmac_key_manager_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function TEST (line 46) | TEST(AesCmacKeyManagerTest, Basics) { function TEST (line 54) | TEST(AesCmacKeyManagerTest, ValidateEmptyKey) { function AesCmacParams (line 58) | AesCmacParams ValidParams() { function AesCmacKeyFormat (line 64) | AesCmacKeyFormat ValidKeyFormat() { function TEST (line 71) | TEST(AesCmacKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 76) | TEST(AesCmacKeyManagerTest, ValidateSimpleKeyFormat) { function TEST (line 80) | TEST(AesCmacKeyManagerTest, ValidateKeyFormatKeySizes) { function TEST (line 108) | TEST(AesCmacKeyManagerTest, ValidateKeyFormatTagSizes) { function TEST (line 139) | TEST(AesCmacKeyManagerTest, CreateKey) { function TEST (line 148) | TEST(AesCmacKeyManagerTest, ValidateKey) { function TEST (line 154) | TEST(AesCmacKeyManagerTest, ValidateKeyInvalidVersion) { function TEST (line 161) | TEST(AesCmacKeyManagerTest, ValidateKeyShortKey) { function TEST (line 168) | TEST(AesCmacKeyManagerTest, ValidateKeyLongTagSize) { function TEST (line 176) | TEST(AesCmacKeyManagerTest, ValidateKeyTooShortTagSize) { function TEST (line 183) | TEST(AesCmacKeyManagerTest, GetMacPrimitive) { function TEST (line 199) | TEST(AesCmacKeyManagerTest, GetChunkedMacPrimitive) { function TEST (line 223) | TEST(AesCmacKeyManagerTest, MixPrimitives) { FILE: cc/mac/aes_cmac_key_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type TestCase (line 46) | struct TestCase { function TEST_P (line 66) | TEST_P(AesCmacKeyTest, CreateSucceeds) { function TEST (line 86) | TEST(AesCmacKeyTest, CreateKeyWithMismatchedKeySizeFails) { function TEST (line 103) | TEST(AesCmacKeyTest, CreateKeyWithWrongIdRequirementFails) { function TEST_P (line 129) | TEST_P(AesCmacKeyTest, GetAesCmacKey) { function TEST_P (line 148) | TEST_P(AesCmacKeyTest, KeyEquals) { function TEST (line 173) | TEST(AesCmacKeyTest, DifferentFormatNotEqual) { function TEST (line 204) | TEST(AesCmacKeyTest, DifferentSecretDataNotEqual) { function TEST (line 228) | TEST(AesCmacKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/mac/aes_cmac_parameters.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { FILE: cc/mac/aes_cmac_parameters.h function namespace (line 26) | namespace crypto { FILE: cc/mac/aes_cmac_parameters_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type CreateTestCase (line 40) | struct CreateTestCase { function TEST_P (line 66) | TEST_P(AesCmacParametersCreateTest, Create) { function TEST (line 81) | TEST(AesCmacParametersTest, CreateWithInvalidVariantFails) { function TEST (line 91) | TEST(AesCmacParametersTest, CreateWithInvalidKeySizeFails) { function TEST (line 114) | TEST(AesCmacParametersTest, CreateWithInvalidTagSizeFails) { function TEST (line 149) | TEST(AesCmacParametersTest, CopyConstructor) { function TEST (line 165) | TEST(AesCmacParametersTest, CopyAssignment) { function TEST_P (line 192) | TEST_P(AesCmacParametersVariantTest, ParametersEquals) { function TEST (line 212) | TEST(AesCmacParametersTest, KeySizeNotEqual) { function TEST (line 229) | TEST(AesCmacParametersTest, TagSizeNotEqual) { function TEST (line 246) | TEST(AesCmacParametersTest, VariantNotEqual) { FILE: cc/mac/aes_cmac_proto_serialization.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function ToVariant (line 63) | util::StatusOr ToVariant( function ToOutputPrefixType (line 80) | util::StatusOr ToOutputPrefixType( function ParseParameters (line 97) | util::StatusOr ParseParameters( function SerializeParameters (line 120) | util::StatusOr SerializePara... function ParseKey (line 136) | util::StatusOr ParseKey( function SerializeKey (line 174) | util::StatusOr SerializeKey( function AesCmacProtoParametersParserImpl (line 202) | AesCmacProtoParametersParserImpl* AesCmacProtoParametersParser() { function AesCmacProtoParametersSerializerImpl (line 208) | AesCmacProtoParametersSerializerImpl* AesCmacProtoParametersSerializ... function AesCmacProtoKeyParserImpl (line 214) | AesCmacProtoKeyParserImpl* AesCmacProtoKeyParser() { function AesCmacProtoKeySerializerImpl (line 219) | AesCmacProtoKeySerializerImpl* AesCmacProtoKeySerializer() { function RegisterAesCmacProtoSerialization (line 226) | util::Status RegisterAesCmacProtoSerialization() { FILE: cc/mac/aes_cmac_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/mac/aes_cmac_proto_serialization_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type TestCase (line 59) | struct TestCase { class AesCmacProtoSerializationTest (line 69) | class AesCmacProtoSerializationTest : public TestWithParam { method SetUp (line 71) | void SetUp() override { function TEST_F (line 76) | TEST_F(AesCmacProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 101) | TEST_P(AesCmacProtoSerializationTest, ParseParameters) { function TEST_F (line 131) | TEST_F(AesCmacProtoSerializationTest, ParseParametersWithInvalidSeri... function TEST_F (line 150) | TEST_F(AesCmacProtoSerializationTest, ParseParametersWithUnkownOutpu... function TEST_P (line 170) | TEST_P(AesCmacProtoSerializationTest, SerializeParameters) { function TEST_P (line 203) | TEST_P(AesCmacProtoSerializationTest, ParseKey) { function TEST_F (line 248) | TEST_F(AesCmacProtoSerializationTest, ParseKeyWithInvalidSerializati... function TEST_F (line 267) | TEST_F(AesCmacProtoSerializationTest, ParseKeyNoSecretKeyAccess) { function TEST_F (line 291) | TEST_F(AesCmacProtoSerializationTest, ParseKeyWithInvalidVersion) { function TEST_P (line 315) | TEST_P(AesCmacProtoSerializationTest, SerializeKey) { function TEST_F (line 358) | TEST_F(AesCmacProtoSerializationTest, SerializeKeyNoSecretKeyAccess) { FILE: cc/mac/config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function Configuration (line 26) | const Configuration& ConfigMacV0() { FILE: cc/mac/config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/mac/config_v0_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function TEST_P (line 49) | TEST_P(ConfigV0Test, GetPrimitive) { function TEST_P (line 64) | TEST_P(ConfigV0Test, GetPrimitiveChunkedMac) { FILE: cc/mac/failing_mac.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { class AlwaysFailMac (line 35) | class AlwaysFailMac : public Mac { method AlwaysFailMac (line 37) | explicit AlwaysFailMac(std::string message) : message_(std::move(m... method ComputeMac (line 39) | util::StatusOr ComputeMac( method VerifyMac (line 47) | util::Status VerifyMac(absl::string_view /*mac_value*/, function CreateAlwaysFailingMac (line 61) | std::unique_ptr CreateAlwaysFailingMac(std::string message) { FILE: cc/mac/failing_mac.h function namespace (line 25) | namespace crypto { FILE: cc/mac/failing_mac_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { function TEST (line 34) | TEST(AlwaysFailMac, ComputeMacFails) { function TEST (line 41) | TEST(AlwaysFailMac, ComputeMacFailsContainsMessage) { function TEST (line 51) | TEST(AlwaysFailMac, VerifyMacFails) { function TEST (line 58) | TEST(AlwaysFailMac, VerifyMacFailsContainsMessage) { FILE: cc/mac/hmac_key.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { FILE: cc/mac/hmac_key.h function namespace (line 33) | namespace crypto { FILE: cc/mac/hmac_key_manager.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function Status (line 92) | Status HmacKeyManager::ValidateParams(const HmacParams& params) const { function Status (line 118) | Status HmacKeyManager::ValidateKey(const HmacKey& key) const { function Status (line 129) | Status HmacKeyManager::ValidateKeyFormat( FILE: cc/mac/hmac_key_manager.h function namespace (line 43) | namespace crypto { function class (line 61) | class ChunkedMacFactory : public PrimitiveFactory { FILE: cc/mac/hmac_key_manager_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function TEST (line 57) | TEST(HmacKeyManagerTest, Basics) { function TEST (line 65) | TEST(HmacKeyManagerTest, ValidateEmptyKey) { function TEST (line 69) | TEST(HmacKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 73) | TEST(HmacKeyManagerTest, ValidKeyFormat) { function TEST (line 81) | TEST(HmacKeyManagerTest, ValidateKeyFormatSmallTagSizes) { function TEST (line 92) | TEST(HmacKeyManagerTest, ValidateKeyFormatTagSizesSha1) { function TEST (line 103) | TEST(HmacKeyManagerTest, ValidateKeyFormatTagSizesSha224) { function TEST (line 114) | TEST(HmacKeyManagerTest, ValidateKeyFormatTagSizesSha256) { function TEST (line 125) | TEST(HmacKeyManagerTest, ValidateKeyFormatTagSizesSha384) { function TEST (line 136) | TEST(HmacKeyManagerTest, ValidateKeyFormatTagSizesSha512) { function TEST (line 147) | TEST(HmacKeyManagerTest, ValidateKeyFormatKeySizes) { function TEST (line 159) | TEST(HmacKeyManagerTest, CreateKey) { function TEST (line 175) | TEST(HmacKeyManagerTest, ValidKey) { function TEST (line 186) | TEST(HmacKeyManagerTest, ValidateKeyTagSizesSha1) { function TEST (line 198) | TEST(HmacKeyManagerTest, ValidateKeyTagSizesSha224) { function TEST (line 210) | TEST(HmacKeyManagerTest, ValidateKeyTagSizesSha256) { function TEST (line 222) | TEST(HmacKeyManagerTest, ValidateKeyTagSizesSha384) { function TEST (line 234) | TEST(HmacKeyManagerTest, ValidateKeyTagSizesSha512) { function TEST (line 246) | TEST(HmacKeyManagerTest, ValidateKeyShortKey) { function TEST (line 257) | TEST(HmacKeyManagerTest, DeriveKey) { function TEST (line 274) | TEST(HmacKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 288) | TEST(HmacKeyManagerTest, DeriveKeyWrongVersion) { function TEST (line 303) | TEST(HmacKeyManagerTest, GetMacPrimitive) { function TEST (line 323) | TEST(HmacKeyManagerTest, GetChunkedMacPrimitive) { function TEST (line 350) | TEST(HmacKeyManagerTest, MixPrimitives) { FILE: cc/mac/hmac_key_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type TestCase (line 46) | struct TestCase { function TEST_P (line 72) | TEST_P(HmacKeyTest, CreateSucceeds) { function TEST (line 93) | TEST(HmacKeyTest, CreateKeyWithMismatchedKeySizeFails) { function TEST (line 109) | TEST(HmacKeyTest, CreateKeyWithWrongIdRequirementFails) { function TEST_P (line 133) | TEST_P(HmacKeyTest, GetKeyBytes) { function TEST_P (line 153) | TEST_P(HmacKeyTest, KeyEquals) { function TEST (line 179) | TEST(HmacKeyTest, DifferentFormatNotEqual) { function TEST (line 208) | TEST(HmacKeyTest, DifferentSecretDataNotEqual) { function TEST (line 231) | TEST(HmacKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/mac/hmac_parameters.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function ValidateTagSizeBytes (line 40) | util::Status ValidateTagSizeBytes(int cryptographic_tag_size_in_bytes, FILE: cc/mac/hmac_parameters.h function namespace (line 27) | namespace tink { FILE: cc/mac/hmac_parameters_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type CreateTestCase (line 40) | struct CreateTestCase { function TEST_P (line 75) | TEST_P(HmacParametersCreateTest, Create) { function TEST (line 92) | TEST(HmacParametersTest, CreateWithInvalidVariantFails) { function TEST (line 103) | TEST(HmacParametersTest, CreateWithInvalidHashTypeFails) { function TEST (line 114) | TEST(HmacParametersTest, CreateWithInvalidKeySizeFails) { function TEST (line 123) | TEST(HmacParametersTest, CreateWithInvalidTagSizeFails) { function TEST (line 168) | TEST(HmacParametersTest, CopyConstructor) { function TEST (line 185) | TEST(HmacParametersTest, CopyAssignment) { function TEST_P (line 218) | TEST_P(HmacParametersVariantTest, ParametersEquals) { function TEST (line 239) | TEST(HmacParametersTest, KeySizeNotEqual) { function TEST (line 256) | TEST(HmacParametersTest, HashTypeNotEqual) { function TEST (line 273) | TEST(HmacParametersTest, TagSizeNotEqual) { function TEST (line 290) | TEST(HmacParametersTest, VariantNotEqual) { FILE: cc/mac/hmac_proto_serialization.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function ToVariant (line 65) | util::StatusOr ToVariant( function ToOutputPrefixType (line 82) | util::StatusOr ToOutputPrefixType( function ToHashType (line 99) | util::StatusOr ToHashType(HashType hash_ty... function ToProtoHashType (line 117) | util::StatusOr ToProtoHashType(HmacParameters::HashType ha... function ParseParameters (line 135) | util::StatusOr ParseParameters( function SerializeParameters (line 167) | util::StatusOr SerializePara... function ParseKey (line 188) | util::StatusOr ParseKey( function SerializeKey (line 228) | util::StatusOr SerializeKey( function HmacProtoParametersParserImpl (line 260) | HmacProtoParametersParserImpl* HmacProtoParametersParser() { function HmacProtoParametersSerializerImpl (line 266) | HmacProtoParametersSerializerImpl* HmacProtoParametersSerializer() { function HmacProtoKeyParserImpl (line 272) | HmacProtoKeyParserImpl* HmacProtoKeyParser() { function HmacProtoKeySerializerImpl (line 277) | HmacProtoKeySerializerImpl* HmacProtoKeySerializer() { function RegisterHmacProtoSerialization (line 284) | util::Status RegisterHmacProtoSerialization() { FILE: cc/mac/hmac_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/mac/hmac_proto_serialization_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type TestCase (line 61) | struct TestCase { class HmacProtoSerializationTest (line 73) | class HmacProtoSerializationTest : public TestWithParam { method SetUp (line 75) | void SetUp() override { function TEST_F (line 80) | TEST_F(HmacProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 114) | TEST_P(HmacProtoSerializationTest, ParseParameters) { function TEST_F (line 143) | TEST_F(HmacProtoSerializationTest, ParseParametersWithInvalidSeriali... function TEST_F (line 158) | TEST_F(HmacProtoSerializationTest, ParseParametersWithInvalidVersion) { function TEST_F (line 179) | TEST_F(HmacProtoSerializationTest, ParseParametersWithUnknownHashTyp... function TEST_F (line 200) | TEST_F(HmacProtoSerializationTest, ParseParametersWithUnkownOutputPr... function TEST_P (line 220) | TEST_P(HmacProtoSerializationTest, SerializeParameters) { function TEST_P (line 255) | TEST_P(HmacProtoSerializationTest, ParseKey) { function TEST_F (line 295) | TEST_F(HmacProtoSerializationTest, ParseKeyWithInvalidSerialization) { function TEST_F (line 320) | TEST_F(HmacProtoSerializationTest, ParseKeyWithInvalidVersion) { function TEST_F (line 345) | TEST_F(HmacProtoSerializationTest, ParseKeyWithUnknownOutputPrefixTy... function TEST_F (line 370) | TEST_F(HmacProtoSerializationTest, ParseKeyWithUnknownHashType) { function TEST_F (line 395) | TEST_F(HmacProtoSerializationTest, ParseKeyWithoutSecretKeyAccess) { function TEST_P (line 420) | TEST_P(HmacProtoSerializationTest, SerializeKey) { function TEST_F (line 465) | TEST_F(HmacProtoSerializationTest, SerializeKeyWithoutSecretKeyAcces... FILE: cc/mac/internal/chunked_mac_impl.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type internal (line 41) | namespace internal { function NewChunkedCmac (line 102) | util::StatusOr> NewChunkedCmac( function NewChunkedHmac (line 117) | util::StatusOr> NewChunkedHmac(const H... FILE: cc/mac/internal/chunked_mac_impl.h function namespace (line 32) | namespace crypto { FILE: cc/mac/internal/chunked_mac_impl_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type internal (line 39) | namespace internal { class MockStatefulMac (line 54) | class MockStatefulMac : public subtle::StatefulMac { class MockStatefulMacFactory (line 60) | class MockStatefulMacFactory : public subtle::StatefulMacFactory { function TEST (line 66) | TEST(ChunkedMacFactoryTest, NewChunkedCmacSucceeds) { function TEST (line 75) | TEST(ChunkedMacFactoryTest, NewChunkedCmacWithMissingKeyParamsFail... function TEST (line 80) | TEST(ChunkedMacFactoryTest, NewChunkedHmacSucceeds) { function TEST (line 90) | TEST(ChunkedMacFactoryTest, NewChunkedHmacWithMissingKeyParamsFail... function TEST (line 95) | TEST(ChunkedMacImplTest, CreateComputationSucceeds) { function TEST (line 107) | TEST(ChunkedMacImplTest, CreateComputationWithFactoryErrorFails) { function TEST (line 119) | TEST(ChunkedMacImplTest, CreateVerificationSucceeds) { function TEST (line 131) | TEST(ChunkedMacImplTest, CreateVerificationWithFactoryErrorFails) { function TEST (line 143) | TEST(ChunkedMacComputationImplTest, UpdateSucceeds) { function TEST (line 151) | TEST(ChunkedMacComputationImplTest, UpdateFails) { function TEST (line 161) | TEST(ChunkedMacComputationImplTest, OperationsFailAfterComputeMac) { function TEST (line 175) | TEST(ChunkedMacComputationImplTest, ComputeMacSucceeds) { function TEST (line 184) | TEST(ChunkedMacComputationImplTest, ComputeMacFails) { function TEST (line 195) | TEST(ChunkedMacVerificationImplTest, UpdateSucceeds) { function TEST (line 203) | TEST(ChunkedMacVerificationImplTest, UpdateFails) { function TEST (line 213) | TEST(ChunkedMacVerificationImplTest, VerifyMacSucceeds) { function TEST (line 222) | TEST(ChunkedMacVerificationImplTest, VerifyMacFailsWithInvalidSame... function TEST (line 233) | TEST(ChunkedMacVerificationImplTest, VerifyMacFailsWithDifferentLe... function TEST (line 244) | TEST(ChunkedMacVerificationImplTest, VerifyMacFailsWithFinalizeErr... function TEST (line 254) | TEST(ChunkedMacVerificationImplTest, OperationsFailAfterVerifyMac) { FILE: cc/mac/internal/chunked_mac_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type internal (line 38) | namespace internal { class ChunkedMacCompatibilityTest (line 51) | class ChunkedMacCompatibilityTest function TEST_P (line 61) | TEST_P(ChunkedMacCompatibilityTest, ComputeAndVerify) { function TEST (line 107) | TEST(ChunkedMacSlicingTest, DifferentChunkSizes) { function TEST (line 137) | TEST(ChunkedMacTest, VerifyPrefixFails) { function TEST (line 163) | TEST(ChunkedMacTest, UpdateWrongOrderFails) { function TEST (line 191) | TEST(ChunkedMacTest, OperationsFailAfterComputeVerifyMac) { FILE: cc/mac/internal/chunked_mac_wrapper.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type internal (line 38) | namespace internal { class ChunkedMacComputationSetWrapper (line 43) | class ChunkedMacComputationSetWrapper : public ChunkedMacComputati... method ChunkedMacComputationSetWrapper (line 45) | explicit ChunkedMacComputationSetWrapper( class ChunkedMacVerificationWithPrefixType (line 76) | class ChunkedMacVerificationWithPrefixType : public ChunkedMacVeri... method ChunkedMacVerificationWithPrefixType (line 78) | explicit ChunkedMacVerificationWithPrefixType( class ChunkedMacVerificationSetWrapper (line 106) | class ChunkedMacVerificationSetWrapper : public ChunkedMacVerifica... method ChunkedMacVerificationSetWrapper (line 108) | explicit ChunkedMacVerificationSetWrapper( class ChunkedMacSetWrapper (line 148) | class ChunkedMacSetWrapper : public ChunkedMac { method ChunkedMacSetWrapper (line 150) | explicit ChunkedMacSetWrapper( function Validate (line 166) | util::Status Validate(PrimitiveSet* mac_set) { FILE: cc/mac/internal/chunked_mac_wrapper.h function namespace (line 29) | namespace crypto { FILE: cc/mac/internal/chunked_mac_wrapper_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type internal (line 41) | namespace internal { class FakeStatefulMac (line 52) | class FakeStatefulMac : public subtle::StatefulMac { method FakeStatefulMac (line 54) | explicit FakeStatefulMac(absl::string_view name) : name_(name) {} method Update (line 56) | util::Status Update(absl::string_view data) override { method Finalize (line 61) | util::StatusOr Finalize() override { class FakeStatefulMacFactory (line 70) | class FakeStatefulMacFactory : public subtle::StatefulMacFactory { method FakeStatefulMacFactory (line 72) | explicit FakeStatefulMacFactory(absl::string_view name) : name_(... method Create (line 74) | util::StatusOr> Create() co... function TEST (line 83) | TEST(ChunkedMacWrapperTest, WrapNullptr) { function TEST (line 88) | TEST(ChunkedMacWrapperTest, WrapEmpty) { function CreateFakeChunkedMac (line 95) | std::unique_ptr CreateFakeChunkedMac(absl::string_view... function AddPrimitiveToSet (line 100) | util::Status AddPrimitiveToSet(uint32_t key_id, bool set_primary, function TEST (line 125) | TEST(ChunkedMacWrapperTest, ComputeMac) { function TEST (line 161) | TEST(ChunkedMacWrapperTest, VerifyMacWithUniquePrefix) { function TEST (line 197) | TEST(ChunkedMacWrapperTest, VerifyMacWithDuplicatePrefix) { function TEST (line 233) | TEST(ChunkedMacWrapperTest, VerifyMacWithRawTagStartingWithKeyId) { class ChunkedMacWrapperOutputPrefixTest (line 265) | class ChunkedMacWrapperOutputPrefixTest function TEST_P (line 273) | TEST_P(ChunkedMacWrapperOutputPrefixTest, ComputeVerifyMac) { FILE: cc/mac/internal/config_v0.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { function AddMacV0 (line 32) | util::Status AddMacV0(Configuration& config) { FILE: cc/mac/internal/config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/mac/internal/config_v0_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type internal (line 43) | namespace internal { function TEST (line 51) | TEST(MacV0Test, PrimitiveWrappers) { function TEST (line 62) | TEST(MacV0Test, KeyManagers) { function TEST_P (line 87) | TEST_P(MacV0KeyTypesTest, GetPrimitive) { function TEST_P (line 107) | TEST_P(MacV0KeyTypesTest, GetPrimitiveChunkedMac) { FILE: cc/mac/internal/key_gen_config_v0.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type internal (line 28) | namespace internal { function AddMacKeyGenV0 (line 30) | util::Status AddMacKeyGenV0(KeyGenConfiguration& config) { FILE: cc/mac/internal/key_gen_config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/mac/key_gen_config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function KeyGenConfiguration (line 26) | const KeyGenConfiguration& KeyGenConfigMacV0() { FILE: cc/mac/key_gen_config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/mac/mac_config.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { FILE: cc/mac/mac_config.h function namespace (line 24) | namespace crypto { FILE: cc/mac/mac_config_test.cc type crypto (line 61) | namespace crypto { type tink (line 62) | namespace tink { class MacConfigTest (line 76) | class MacConfigTest : public ::testing::Test { method SetUp (line 78) | void SetUp() override { function TEST_F (line 84) | TEST_F(MacConfigTest, Basic) { function TEST_F (line 124) | TEST_F(MacConfigTest, MacWrappersRegistered) { function TEST_F (line 156) | TEST_F(MacConfigTest, AesCmacProtoParamsSerializationRegistered) { function TEST_F (line 196) | TEST_F(MacConfigTest, AesCmacProtoKeySerializationRegistered) { function TEST_F (line 251) | TEST_F(MacConfigTest, HmacProtoParamsSerializationRegistered) { function TEST_F (line 294) | TEST_F(MacConfigTest, HmacProtoKeySerializationRegistered) { class ChunkedMacConfigTest (line 351) | class ChunkedMacConfigTest : public ::testing::TestWithParam* mac_set) { FILE: cc/mac/mac_wrapper.h function namespace (line 30) | namespace crypto { FILE: cc/mac/mac_wrapper_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { function TEST (line 65) | TEST(MacWrapperTest, WrapNullptr) { function TEST (line 73) | TEST(MacWrapperTest, WrapEmpty) { function TEST (line 82) | TEST(MacWrapperTest, Basic) { function TEST (line 141) | TEST(MacWrapperTest, testLegacyAuthentication) { class TryBreakLegacyMac (line 185) | class TryBreakLegacyMac : public Mac { method ComputeMac (line 187) | crypto::tink::util::StatusOr ComputeMac( method VerifyMac (line 192) | crypto::tink::util::Status VerifyMac(absl::string_view mac, function TEST (line 203) | TEST(MacWrapperTest, VerifyRawAfterLegacy) { function PopulateKeyInfo (line 234) | KeysetInfo::KeyInfo PopulateKeyInfo(uint32_t key_id, function KeysetInfo (line 245) | KeysetInfo CreateTestKeysetInfo() { class MacSetWrapperWithMonitoringTest (line 260) | class MacSetWrapperWithMonitoringTest : public Test { method SetUp (line 264) | void SetUp() override { function TEST_F (line 304) | TEST_F(MacSetWrapperWithMonitoringTest, function TEST_F (line 343) | TEST_F(MacSetWrapperWithMonitoringTest, function TEST_F (line 385) | TEST_F(MacSetWrapperWithMonitoringTest, function TEST_F (line 423) | TEST_F(MacSetWrapperWithMonitoringTest, FILE: cc/monitoring/monitoring.h function namespace (line 30) | namespace crypto { function class (line 95) | class MonitoringContext { function class (line 121) | class MonitoringClient { function class (line 144) | class MonitoringClientFactory { FILE: cc/monitoring/monitoring_client_mocks.h function namespace (line 26) | namespace crypto { FILE: cc/output_stream.h function namespace (line 25) | namespace crypto { FILE: cc/output_stream_with_result.h function namespace (line 27) | namespace crypto { FILE: cc/parameters.h function namespace (line 20) | namespace crypto { FILE: cc/partial_key_access.h function namespace (line 22) | namespace crypto { FILE: cc/partial_key_access_token.h function namespace (line 20) | namespace crypto { FILE: cc/prf/aes_cmac_prf_key_manager.h function namespace (line 48) | namespace crypto { FILE: cc/prf/aes_cmac_prf_key_manager_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function GetInputStreamForString (line 49) | std::unique_ptr GetInputStreamForString(const std::stri... function AesCmacPrfKeyFormat (line 54) | AesCmacPrfKeyFormat ValidKeyFormat() { function TEST (line 60) | TEST(AesCmacPrfKeyManagerTest, Basics) { function TEST (line 68) | TEST(AesCmacPrfKeyManagerTest, ValidateEmptyKey) { function TEST (line 72) | TEST(AesCmacPrfKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 77) | TEST(AesCmacPrfKeyManagerTest, ValidateSimpleKeyFormat) { function TEST (line 82) | TEST(AesCmacPrfKeyManagerTest, ValidateKeyFormatKeySizes) { function TEST (line 110) | TEST(AesCmacPrfKeyManagerTest, CreateKey) { function TEST (line 118) | TEST(AesCmacPrfKeyManagerTest, ValidateKey) { function TEST (line 124) | TEST(AesCmacPrfKeyManagerTest, ValidateKeyInvalidVersion) { function TEST (line 131) | TEST(AesCmacPrfKeyManagerTest, ValidateKeyShortKey) { function TEST (line 138) | TEST(AesCmacPrfKeyManagerTest, GetPrimitive) { function TEST (line 155) | TEST(AesCmacPrfKeyManagerTest, DeriveKeyValid) { function TEST (line 166) | TEST(AesCmacPrfKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 174) | TEST(AesCmacPrfKeyManagerTest, DeriveKeyInvalidFormat) { function TEST (line 183) | TEST(AesCmacPrfKeyManagerTest, DeriveKeyInvalidVersion) { FILE: cc/prf/config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function Configuration (line 26) | const Configuration& ConfigPrfV0() { FILE: cc/prf/config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/prf/config_v0_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function TEST_P (line 50) | TEST_P(PrfV0KeyTypesTest, GetPrimitive) { FILE: cc/prf/failing_prfset.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { class AlwaysFailPrf (line 38) | class AlwaysFailPrf : public Prf { method AlwaysFailPrf (line 40) | explicit AlwaysFailPrf(std::string message) : message_(std::move(m... method Compute (line 42) | util::StatusOr Compute(absl::string_view /*input*/, class AlwaysFailPrfSet (line 55) | class AlwaysFailPrfSet : public PrfSet { method AlwaysFailPrfSet (line 57) | explicit AlwaysFailPrfSet(std::string message) method GetPrimaryId (line 66) | uint32_t GetPrimaryId() const override { return 0; } method ComputePrimary (line 72) | util::StatusOr ComputePrimary(absl::string_view /*inp... function CreateAlwaysFailingPrf (line 90) | std::unique_ptr CreateAlwaysFailingPrf(std::string message) { function CreateAlwaysFailingPrfSet (line 94) | std::unique_ptr CreateAlwaysFailingPrfSet(std::string messag... FILE: cc/prf/failing_prfset.h function namespace (line 25) | namespace crypto { FILE: cc/prf/failing_prfset_test.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function TEST (line 36) | TEST(AlwaysFailPrf, ComputePrimaryFails) { function TEST (line 43) | TEST(AlwaysFailPrf, ComputePrimaryFailsContainsMessage) { function TEST (line 52) | TEST(AlwaysFailPrfSet, ComputePrimaryFails) { function TEST (line 59) | TEST(AlwaysFailPrfSet, ComputePrimaryFailsContainsMessage) { function TEST (line 69) | TEST(AlwaysFailPrfSet, GetPrfsReturnsFailingPrfs) { FILE: cc/prf/hkdf_prf_key_manager.h function namespace (line 47) | namespace crypto { function class (line 64) | class PrfSetFactory : public PrimitiveFactory { FILE: cc/prf/hkdf_prf_key_manager_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { function TEST (line 58) | TEST(HkdfPrfKeyManagerTest, Basics) { function TEST (line 66) | TEST(HkdfPrfKeyManagerTest, ValidateEmptyKey) { function TEST (line 71) | TEST(HkdfPrfKeyManagerTest, ValidateValid32ByteKey) { function TEST (line 79) | TEST(HkdfPrfKeyManagerTest, ValidateValidSha512Key) { function TEST (line 87) | TEST(HkdfPrfKeyManagerTest, ValidateValid33ByteKey) { function TEST (line 95) | TEST(HkdfPrfKeyManagerTest, ValidateValidKeyWithSalt) { function TEST (line 104) | TEST(HkdfPrfKeyManagerTest, InvalidKeySizes31Bytes) { function TEST (line 112) | TEST(HkdfPrfKeyManagerTest, InvalidKeySha1) { function TEST (line 121) | TEST(HkdfPrfKeyManagerTest, InvalidKeyVersion) { function TEST (line 130) | TEST(HkdfPrfKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 135) | TEST(HkdfPrfKeyManagerTest, ValidateValid32ByteKeyFormat) { function TEST (line 142) | TEST(HkdfPrfKeyManagerTest, ValidateValidSha512KeyFormat) { function TEST (line 149) | TEST(HkdfPrfKeyManagerTest, ValidateValid33ByteKeyFormat) { function TEST (line 156) | TEST(HkdfPrfKeyManagerTest, ValidateValidKeyFormatWithSalt) { function TEST (line 164) | TEST(HkdfPrfKeyManagerTest, InvalidKeyFormatSha1) { function TEST (line 172) | TEST(HkdfPrfKeyManagerTest, ValidateInvalid31ByteKeyFormat) { function TEST (line 180) | TEST(HkdfPrfKeyManagerTest, CreateKey) { function TEST (line 193) | TEST(HkdfPrfKeyManagerTest, CreateKeyDifferetSize) { function TEST (line 202) | TEST(HkdfPrfKeyManagerTest, CreateKeyDifferetHash) { function TEST (line 212) | TEST(HkdfPrfKeyManagerTest, CreateKeyDifferetSalt) { function TEST (line 222) | TEST(HkdfPrfKeyManagerTest, CreatePrf) { function TEST (line 256) | TEST(HkdfPrfKeyManagerTest, DeriveKey) { function TEST (line 273) | TEST(HmacPrfKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 286) | TEST(HmacPrfKeyManagerTest, DeriveKeyWrongVersion) { function TEST (line 300) | TEST(HkdfPrfKeyManagerTest, CreatePrfSet) { FILE: cc/prf/hmac_prf_key_manager.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { function Status (line 99) | Status HmacPrfKeyManager::ValidateParams(const HmacPrfParams& params... FILE: cc/prf/hmac_prf_key_manager.h function namespace (line 52) | namespace crypto { function override (line 103) | const override { FILE: cc/prf/hmac_prf_key_manager_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function TEST (line 56) | TEST(HmacPrfKeyManagerTest, Basics) { function TEST (line 64) | TEST(HmacPrfKeyManagerTest, ValidateEmptyKey) { function TEST (line 68) | TEST(HmacPrfKeyManagerTest, ValidateEmptyKeyFormat) { function TEST (line 73) | TEST(HmacPrfKeyManagerTest, ValidKeyFormat) { function TEST (line 80) | TEST(HmacPrfKeyManagerTest, InvalidKeyFormatShortKey) { function TEST (line 88) | TEST(HmacPrfKeyManagerTest, CreateKey) { function TEST (line 101) | TEST(HmacPrfKeyManagerTest, ValidKey) { function TEST (line 111) | TEST(HmacPrfKeyManagerTest, ValidateKeyShortKey) { function TEST (line 121) | TEST(HmacPrfKeyManagerTest, DeriveKey) { function TEST (line 137) | TEST(HmacPrfKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 150) | TEST(HmacPrfKeyManagerTest, DeriveKeyWrongVersion) { function TEST (line 164) | TEST(HmacPrfKeyManagerTest, GetPrimitive) { function TEST (line 184) | TEST(HmacPrfKeyManagerTest, GetPrimitiveAllHashTypes) { function TEST (line 199) | TEST(HmacPrfKeyManagerTest, GetPrimitiveUnknownHash) { FILE: cc/prf/internal/config_v0.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { type internal (line 30) | namespace internal { function AddPrfV0 (line 32) | util::Status AddPrfV0(Configuration& config) { FILE: cc/prf/internal/config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/prf/internal/config_v0_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type internal (line 44) | namespace internal { function TEST (line 53) | TEST(PrfV0Test, PrimitiveWrapper) { function TEST (line 63) | TEST(PrfV0Test, KeyManagers) { function TEST_P (line 90) | TEST_P(PrfV0KeyTypesTest, GetPrimitive) { FILE: cc/prf/internal/key_gen_config_v0.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type internal (line 29) | namespace internal { function AddPrfKeyGenV0 (line 31) | util::Status AddPrfKeyGenV0(KeyGenConfiguration& config) { FILE: cc/prf/internal/key_gen_config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/prf/key_gen_config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function KeyGenConfiguration (line 26) | const KeyGenConfiguration& KeyGenConfigPrfV0() { FILE: cc/prf/key_gen_config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/prf/prf_config.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/prf/prf_config.h function namespace (line 27) | namespace crypto { FILE: cc/prf/prf_config_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { class PrfConfigTest (line 42) | class PrfConfigTest : public ::testing::Test { method SetUp (line 44) | void SetUp() override { Registry::Reset(); } function TEST_F (line 47) | TEST_F(PrfConfigTest, RegisterWorks) { function TEST_F (line 62) | TEST_F(PrfConfigTest, RegisterNonFipsTemplates) { function TEST_F (line 81) | TEST_F(PrfConfigTest, RegisterFipsValidTemplates) { FILE: cc/prf/prf_key_templates.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function NewHkdfSha256Template (line 38) | std::unique_ptr NewHkdfSha256Temp... function NewHmacTemplate (line 52) | std::unique_ptr NewHmacTemplate( function NewAesCmacTemplate (line 67) | std::unique_ptr NewAesCmacTemplat... FILE: cc/prf/prf_key_templates.h function namespace (line 22) | namespace crypto { FILE: cc/prf/prf_key_templates_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function TEST (line 41) | TEST(HkdfSha256HkdfTest, Basics) { function TEST (line 48) | TEST(HkdfSha256HkdfTest, OutputPrefixType) { function TEST (line 53) | TEST(HkdfSha256HkdfTest, MultipleCallsSameReference) { function TEST (line 58) | TEST(HkdfSha256HkdfTest, WorksWithKeyTypeManager) { function TEST (line 66) | TEST(HmacPrfTest, Basics) { function TEST (line 81) | TEST(HmacPrfTest, OutputPrefixType) { function TEST (line 88) | TEST(HmacPrfTest, MultipleCallsSameReference) { function TEST (line 95) | TEST(CmacPrfTest, Basics) { function TEST (line 106) | TEST(CmacPrfTest, OutputPrefixType) { function TEST (line 111) | TEST(CmacPrfTest, MultipleCallsSameReference) { FILE: cc/prf/prf_set.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { FILE: cc/prf/prf_set.h function namespace (line 28) | namespace crypto { FILE: cc/prf/prf_set_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { class DummyPrf (line 53) | class DummyPrf : public Prf { method Compute (line 54) | util::StatusOr Compute(absl::string_view input, class DummyPrfSet (line 60) | class DummyPrfSet : public PrfSet { method GetPrimaryId (line 62) | uint32_t GetPrimaryId() const override { return 1; } class BrokenDummyPrfSet (line 73) | class BrokenDummyPrfSet : public PrfSet { method GetPrimaryId (line 75) | uint32_t GetPrimaryId() const override { return 1; } function TEST (line 83) | TEST(PrfSetTest, ComputePrimary) { function TEST (line 93) | TEST(PrfSetWrapperTest, TestPrimitivesEndToEnd) { FILE: cc/prf/prf_set_wrapper.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { class MonitoredPrf (line 49) | class MonitoredPrf : public Prf { method MonitoredPrf (line 51) | explicit MonitoredPrf(uint32_t key_id, const Prf* prf, method MonitoredPrf (line 56) | MonitoredPrf(MonitoredPrf&& other) = default; method MonitoredPrf (line 57) | MonitoredPrf& operator=(MonitoredPrf&& other) = default; method MonitoredPrf (line 59) | MonitoredPrf(const MonitoredPrf&) = delete; method MonitoredPrf (line 60) | MonitoredPrf& operator=(const MonitoredPrf&) = delete; method Compute (line 62) | util::StatusOr Compute(absl::string_view input, class PrfSetPrimitiveWrapper (line 84) | class PrfSetPrimitiveWrapper : public PrfSet { method PrfSetPrimitiveWrapper (line 86) | explicit PrfSetPrimitiveWrapper( method GetPrimaryId (line 102) | uint32_t GetPrimaryId() const override { function Validate (line 116) | util::Status Validate(PrimitiveSet* prf_set) { FILE: cc/prf/prf_set_wrapper.h function namespace (line 27) | namespace crypto { FILE: cc/prf/prf_set_wrapper_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function MakeKey (line 60) | KeysetInfo::KeyInfo MakeKey(uint32_t id) { class FakePrf (line 68) | class FakePrf : public Prf { method FakePrf (line 70) | explicit FakePrf(const std::string& output) : output_(output) {} method Compute (line 71) | util::StatusOr Compute(absl::string_view input, class PrfSetWrapperTest (line 80) | class PrfSetWrapperTest : public ::testing::Test { method SetUp (line 82) | void SetUp() override { prf_set_ = absl::make_unique::Entry*> AddPrf( function TEST_F (line 96) | TEST_F(PrfSetWrapperTest, NullPrfSet) { function TEST_F (line 101) | TEST_F(PrfSetWrapperTest, EmptyPrfSet) { function TEST_F (line 107) | TEST_F(PrfSetWrapperTest, NonRawKeyType) { function TEST_F (line 117) | TEST_F(PrfSetWrapperTest, WrapOkay) { function TEST_F (line 128) | TEST_F(PrfSetWrapperTest, WrapTwo) { class PrfSetWrapperWithMonitoringTest (line 152) | class PrfSetWrapperWithMonitoringTest : public Test { method SetUp (line 155) | void SetUp() override { class AlwaysFailingPrf (line 185) | class AlwaysFailingPrf : public Prf { method AlwaysFailingPrf (line 187) | AlwaysFailingPrf() = default; method Compute (line 189) | util::StatusOr Compute(absl::string_view input, function TEST_F (line 195) | TEST_F(PrfSetWrapperWithMonitoringTest, WrapKeysetWithMonitoringFail... function TEST_F (line 217) | TEST_F(PrfSetWrapperWithMonitoringTest, WrapKeysetWithMonitoringVeri... FILE: cc/primitive_set.h function namespace (line 40) | namespace crypto { function annotations_ (line 267) | annotations_(annotations) {} function Entry (line 317) | const Entry

* get_primary() const { FILE: cc/primitive_wrapper.h function namespace (line 25) | namespace crypto { FILE: cc/private_key.h function namespace (line 22) | namespace crypto { FILE: cc/proto_keyset_format.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function ParseKeysetFromProtoKeysetFormat (line 44) | crypto::tink::util::StatusOr ParseKeysetFromProtoKeyse... function SerializeKeysetToProtoKeysetFormat (line 62) | crypto::tink::util::StatusOr function ParseKeysetWithoutSecretFromProtoKeysetFormat (line 75) | crypto::tink::util::StatusOr function SerializeKeysetWithoutSecretToProtoKeysetFormat (line 87) | crypto::tink::util::StatusOr FILE: cc/proto_keyset_format.h function namespace (line 28) | namespace crypto { FILE: cc/proto_keyset_format_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { class SerializeKeysetToProtoKeysetFormatTest (line 53) | class SerializeKeysetToProtoKeysetFormatTest : public ::testing::Test { method SetUp (line 55) | void SetUp() override { function CmacParameters (line 61) | util::StatusOr CmacParameters() { function EcdsaParameters (line 69) | util::StatusOr EcdsaParameters() { function TEST_F (line 77) | TEST_F(SerializeKeysetToProtoKeysetFormatTest, SerializeAndParseSing... function TEST_F (line 106) | TEST_F(SerializeKeysetToProtoKeysetFormatTest, SerializeAndParseMult... function TEST_F (line 149) | TEST_F(SerializeKeysetToProtoKeysetFormatTest, SerializeNoAccessFail... function TEST_F (line 167) | TEST_F(SerializeKeysetToProtoKeysetFormatTest, ParseNoAccessFails) { function TEST_F (line 191) | TEST_F(SerializeKeysetToProtoKeysetFormatTest, TestVector) { function TEST_F (line 211) | TEST_F(SerializeKeysetToProtoKeysetFormatTest, SerializeAndParsePubl... FILE: cc/public_key_sign.h function namespace (line 25) | namespace crypto { FILE: cc/public_key_verify.h function namespace (line 23) | namespace crypto { FILE: cc/random_access_stream.h function namespace (line 26) | namespace crypto { FILE: cc/registry.h function namespace (line 31) | namespace crypto { function crypto (line 118) | static crypto::tink::util::StatusOr< function crypto (line 128) | static crypto::tink::util::StatusOr< function Reset (line 148) | static void Reset() { FILE: cc/restricted_big_integer.h function namespace (line 26) | namespace crypto { FILE: cc/restricted_data.h function namespace (line 26) | namespace crypto { FILE: cc/secret_key_access.h function namespace (line 22) | namespace crypto { FILE: cc/secret_key_access_token.h function namespace (line 20) | namespace crypto { FILE: cc/signature/config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function Configuration (line 26) | const Configuration& ConfigSignatureV0() { FILE: cc/signature/config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/signature/config_v0_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { function TEST_P (line 50) | TEST_P(ConfigV0Test, GetPrimitive) { FILE: cc/signature/ecdsa_parameters.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { FILE: cc/signature/ecdsa_parameters.h type class (line 31) | enum class function CurveType (line 45) | enum class CurveType : int { FILE: cc/signature/ecdsa_parameters_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type TestCase (line 37) | struct TestCase { function TEST_P (line 70) | TEST_P(EcdsaParametersTest, BuildWorks) { function TEST (line 90) | TEST(EcdsaParametersTest, BuildWithInvalidVariantFails) { function TEST (line 104) | TEST(EcdsaParametersTest, BuildWithoutVariantFails) { function TEST (line 116) | TEST(EcdsaParametersTest, BuildWithInvalidCurveTypeFails) { function TEST (line 131) | TEST(EcdsaParametersTest, BuildWithoutCurveTypeFails) { function TEST (line 143) | TEST(EcdsaParametersTest, BuildWithInvalidHashTypeFails) { function TEST (line 158) | TEST(EcdsaParametersTest, BuildWithoutHashTypeFails) { function TEST (line 170) | TEST(EcdsaParametersTest, BuildWithInvalidSignatureEncodingFails) { function TEST (line 184) | TEST(EcdsaParametersTest, BuildWithoutSignatureEncodingFails) { function TEST (line 195) | TEST(EcdsaParametersTest, BuildWithIncompatibleHashTypeForCurveP256F... function TEST (line 209) | TEST(EcdsaParametersTest, BuildWithIncompatibleHashTypeForCurveP384F... function TEST (line 223) | TEST(EcdsaParametersTest, BuildWithIncompatibleHashTypeForCurveP521F... function TEST (line 237) | TEST(EcdsaParametersTest, CopyConstructor) { function TEST (line 257) | TEST(EcdsaParametersTest, CopyAssignment) { function TEST_P (line 277) | TEST_P(EcdsaParametersTest, ParametersEquals) { function TEST (line 304) | TEST(EcdsaParametersTest, DifferentVariantNotEqual) { function TEST (line 327) | TEST(EcdsaParametersTest, DifferentCurveTypeNotEqual) { function TEST (line 350) | TEST(EcdsaParametersTest, DifferentHashTypeNotEqual) { function TEST (line 373) | TEST(EcdsaParametersTest, DifferentSignatureEncodingNotEqual) { FILE: cc/signature/ecdsa_private_key.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function SubtleCurveType (line 48) | util::StatusOr SubtleCurveType( function ValidateKeyPair (line 63) | util::Status ValidateKeyPair(const EcdsaPublicKey& public_key, FILE: cc/signature/ecdsa_private_key.h function namespace (line 27) | namespace crypto { FILE: cc/signature/ecdsa_private_key_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type TestCase (line 53) | struct TestCase { function TEST_P (line 96) | TEST_P(EcdsaPrivateKeyTest, CreatePrivateKeyWorks) { function TEST_P (line 134) | TEST_P(EcdsaPrivateKeyTest, CreateMismatchedKeyPairFails) { function TEST_P (line 170) | TEST_P(EcdsaPrivateKeyTest, PrivateKeyEquals) { function TEST (line 210) | TEST(EcdsaPrivateKeyTest, DifferentPublicKeyNotEqual) { function TEST (line 254) | TEST(EcdsaPrivateKeyTest, DifferentKeyTypesNotEqual) { FILE: cc/signature/ecdsa_proto_serialization.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { function ToVariant (line 81) | util::StatusOr ToVariant( function ToOutputPrefixType (line 98) | util::StatusOr ToOutputPrefixType( function ToHashType (line 115) | util::StatusOr ToHashType(HashType hash_t... function ToProtoHashType (line 129) | util::StatusOr ToProtoHashType(EcdsaParameters::HashType h... function ToCurveType (line 143) | util::StatusOr ToCurveType( function ToProtoCurveType (line 158) | util::StatusOr ToProtoCurveType( function ToSignatureEncoding (line 173) | util::StatusOr ToSignatureEncoding( function ToProtoSignatureEncoding (line 186) | util::StatusOr ToProtoSignatureEncoding( function getEncodingLength (line 200) | util::StatusOr getEncodingLength(EcdsaParameters::CurveType cur... function ToParameters (line 216) | util::StatusOr ToParameters( function FromParameters (line 250) | util::StatusOr FromParameters(const EcdsaParameters& pa... function ParseParameters (line 277) | util::StatusOr ParseParameters( function ParsePublicKey (line 303) | util::StatusOr ParsePublicKey( function ParsePrivateKey (line 335) | util::StatusOr ParsePrivateKey( function SerializeParameters (line 381) | util::StatusOr SerializePara... function SerializePublicKey (line 402) | util::StatusOr SerializePublicKey( function SerializePrivateKey (line 448) | util::StatusOr SerializePrivateKey( function EcdsaProtoParametersParserImpl (line 507) | EcdsaProtoParametersParserImpl& EcdsaProtoParametersParser() { function EcdsaProtoParametersSerializerImpl (line 513) | EcdsaProtoParametersSerializerImpl& EcdsaProtoParametersSerializer() { function EcdsaProtoPublicKeyParserImpl (line 519) | EcdsaProtoPublicKeyParserImpl& EcdsaProtoPublicKeyParser() { function EcdsaProtoPublicKeySerializerImpl (line 525) | EcdsaProtoPublicKeySerializerImpl& EcdsaProtoPublicKeySerializer() { function EcdsaProtoPrivateKeyParserImpl (line 531) | EcdsaProtoPrivateKeyParserImpl& EcdsaProtoPrivateKeyParser() { function EcdsaProtoPrivateKeySerializerImpl (line 537) | EcdsaProtoPrivateKeySerializerImpl& EcdsaProtoPrivateKeySerializer() { function RegisterEcdsaProtoSerialization (line 544) | util::Status RegisterEcdsaProtoSerialization() { FILE: cc/signature/ecdsa_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/signature/ecdsa_proto_serialization_test.cc type crypto (line 57) | namespace crypto { type tink (line 58) | namespace tink { type TestCase (line 82) | struct TestCase { class EcdsaProtoSerializationTest (line 98) | class EcdsaProtoSerializationTest : public TestWithParam { method EcdsaProtoSerializationTest (line 100) | EcdsaProtoSerializationTest() { function TEST_F (line 105) | TEST_F(EcdsaProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 149) | TEST_P(EcdsaProtoSerializationTest, ParseParametersWorks) { function TEST_F (line 181) | TEST_F(EcdsaProtoSerializationTest, function TEST_F (line 197) | TEST_F(EcdsaProtoSerializationTest, ParseParametersWithInvalidVersio... function TEST_F (line 221) | TEST_F(EcdsaProtoSerializationTest, function TEST_F (line 245) | TEST_F(EcdsaProtoSerializationTest, function TEST_F (line 265) | TEST_F(EcdsaProtoSerializationTest, ParseParametersWithUnkownCurveTy... function TEST_F (line 288) | TEST_F(EcdsaProtoSerializationTest, ParseParametersWithUnkownHashTyp... function TEST_F (line 311) | TEST_F(EcdsaProtoSerializationTest, ParseParametersWithUnkownEncodin... function TEST_P (line 335) | TEST_P(EcdsaProtoSerializationTest, SerializeParametersWorks) { function TEST_P (line 374) | TEST_P(EcdsaProtoSerializationTest, ParsePublicKeyWorks) { function TEST_F (line 427) | TEST_F(EcdsaProtoSerializationTest, function TEST_F (line 449) | TEST_F(EcdsaProtoSerializationTest, ParsePublicKeyWithInvalidVersion... function TEST_P (line 483) | TEST_P(EcdsaProtoSerializationTest, SerializePublicKeyWorks) { function TEST_P (line 540) | TEST_P(EcdsaProtoSerializationTest, ParsePrivateKeyWorks) { function TEST_F (line 606) | TEST_F(EcdsaProtoSerializationTest, function TEST_F (line 628) | TEST_F(EcdsaProtoSerializationTest, ParsePrivateKeyWithInvalidVersio... function TEST_F (line 669) | TEST_F(EcdsaProtoSerializationTest, ParsePrivateKeyNoSecretKeyAccess... function TEST_P (line 710) | TEST_P(EcdsaProtoSerializationTest, SerializePrivateKeyWorks) { function TEST_F (line 780) | TEST_F(EcdsaProtoSerializationTest, SerializePrivateKeyNoSecretKeyAc... FILE: cc/signature/ecdsa_public_key.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function ValidatePublicPoint (line 48) | util::Status ValidatePublicPoint(EcdsaParameters::CurveType curve_type, function ComputeOutputPrefix (line 88) | util::StatusOr ComputeOutputPrefix( function ValidateIdRequirement (line 117) | util::Status ValidateIdRequirement(const EcdsaParameters& parameters, FILE: cc/signature/ecdsa_public_key.h function namespace (line 31) | namespace crypto { FILE: cc/signature/ecdsa_public_key_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type TestCase (line 58) | struct TestCase { function TEST_P (line 101) | TEST_P(EcdsaPublicKeyTest, CreatePublicKeyWorks) { function TEST (line 130) | TEST(EcdsaPublicKeyTest, CreatePublicKeyWithInvalidIdRequirementFail... function TEST (line 166) | TEST(EcdsaPublicKeyTest, CreatePublicKeyWithInvalidPointFails) { function TEST_P (line 189) | TEST_P(EcdsaPublicKeyTest, PublicKeyEquals) { function TEST (line 222) | TEST(EcdsaPublicKeyTest, DifferentParametersNotEqual) { function TEST (line 257) | TEST(EcdsaPublicKeyTest, DifferentPublicPointsNotEqual) { function TEST (line 293) | TEST(EcdsaPublicKeyTest, DifferentIdRequirementsNotEqual) { FILE: cc/signature/ecdsa_sign_key_manager.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function Status (line 159) | Status EcdsaSignKeyManager::ValidateKey(const EcdsaPrivateKey& key) ... function Status (line 165) | Status EcdsaSignKeyManager::ValidateKeyFormat( FILE: cc/signature/ecdsa_sign_key_manager.h function namespace (line 38) | namespace crypto { function override (line 80) | const override { FILE: cc/signature/ecdsa_sign_key_manager_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function TEST (line 66) | TEST(EcdsaSignKeyManagerTest, Basic) { function TEST (line 74) | TEST(EcdsaSignKeyManagerTest, ValidateEmptyKeyFormat) { function EcdsaKeyFormat (line 79) | EcdsaKeyFormat CreateValidKeyFormat() { function TEST (line 88) | TEST(EcdsaSignKeyManagerTest, ValidateKeyFormat) { function TEST (line 93) | TEST(EcdsaSignKeyManagerTest, ValidateKeyFormatUnknownCurve) { function TEST (line 100) | TEST(EcdsaSignKeyManagerTest, ValidateKeyFormatBadHashP256) { function TEST (line 110) | TEST(EcdsaSignKeyManagerTest, ValidateKeyFormatBadHashP384) { function TEST (line 120) | TEST(EcdsaSignKeyManagerTest, ValidateKeyFormatBadHashP521) { function TEST (line 130) | TEST(EcdsaSignKeyManagerTest, CreateKey) { function TEST (line 151) | TEST(EcdsaSignKeyManagerTest, CreateKeyValid) { function EcdsaPrivateKey (line 158) | EcdsaPrivateKey CreateValidKey() { function TEST (line 163) | TEST(EcdsaSignKeyManagerTest, ValidateKey) { function TEST (line 168) | TEST(EcdsaSignKeyManagerTest, ValidateKeyBadHashP256) { function TEST (line 178) | TEST(EcdsaSignKeyManagerTest, ValidateKeyBadHashP384) { function TEST (line 188) | TEST(EcdsaSignKeyManagerTest, ValidateKeyBadHashP521) { function TEST (line 198) | TEST(EcdsaSignKeyManagerTest, GetPublicKey) { function TEST (line 218) | TEST(EcdsaSignKeyManagerTest, Create) { function TEST (line 242) | TEST(EcdsaSignKeyManagerTest, CreateDifferentKey) { function TEST (line 267) | TEST(EcdsaSignKeyManagerTest, DeriveKeyFailsWithOpenSsl) { function TEST (line 279) | TEST(EcdsaSignKeyManagerTest, DeriveKeySignVerifySucceedsWithBoringS... function TEST (line 307) | TEST(EcdsaSignKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 321) | TEST(EcdsaSignKeyManagerTest, DeriveKeyWithInvalidKeyTemplateVersion... function TEST (line 340) | TEST(EcdsaSignKeyManagerTest, DeriveKeyInvalidCurve) { function TEST_P (line 400) | TEST_P(NistCurveParamsDeriveTest, TestVectors) { FILE: cc/signature/ecdsa_verify_key_manager.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function Status (line 61) | Status EcdsaVerifyKeyManager::ValidateParams(const EcdsaParams& para... function Status (line 101) | Status EcdsaVerifyKeyManager::ValidateKey(const EcdsaPublicKey& key)... FILE: cc/signature/ecdsa_verify_key_manager.h function namespace (line 37) | namespace crypto { FILE: cc/signature/ecdsa_verify_key_manager_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function TEST (line 57) | TEST(EcdsaVerifyKeyManagerTest, Basics) { function TEST (line 65) | TEST(EcdsaVerifyKeyManagerTest, ValidateEmptyKey) { function EcdsaPrivateKey (line 70) | EcdsaPrivateKey CreateValidPrivateKey() { function EcdsaPublicKey (line 79) | EcdsaPublicKey CreateValidPublicKey() { function TEST (line 84) | TEST(EcdsaVerifyKeyManagerTest, PublicKeyValid) { function TEST (line 89) | TEST(EcdsaSignKeyManagerTest, ValidateKeyBadHashP256) { function TEST (line 99) | TEST(EcdsaSignKeyManagerTest, ValidateKeyBadHashP384) { function TEST (line 109) | TEST(EcdsaSignKeyManagerTest, ValidateKeyBadHashP521) { function TEST (line 119) | TEST(EcdsaSignKeyManagerTest, ValidateParams) { function TEST (line 127) | TEST(EcdsaSignKeyManagerTest, ValidateParamsHashP384) { function TEST (line 135) | TEST(EcdsaSignKeyManagerTest, ValidateParamsBadHashP256) { function TEST (line 145) | TEST(EcdsaSignKeyManagerTest, ValidateParamsBadHashP384) { function TEST (line 155) | TEST(EcdsaSignKeyManagerTest, ValidateParamsBadHashP521) { function TEST (line 165) | TEST(EcdsaSignKeyManagerTest, Create) { function TEST (line 191) | TEST(EcdsaSignKeyManagerTest, CreateDifferentPrivateKey) { FILE: cc/signature/ed25519_parameters.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { FILE: cc/signature/ed25519_parameters.h function namespace (line 24) | namespace crypto { FILE: cc/signature/ed25519_parameters_test.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { type TestCase (line 36) | struct TestCase { function TEST_P (line 53) | TEST_P(Ed25519ParametersTest, Create) { function TEST (line 64) | TEST(Ed25519ParametersTest, CreateWithInvalidVariantFails) { function TEST (line 72) | TEST(Ed25519ParametersTest, CopyConstructor) { function TEST (line 83) | TEST(Ed25519ParametersTest, CopyAssignment) { function TEST_P (line 94) | TEST_P(Ed25519ParametersTest, ParametersEquals) { function TEST (line 111) | TEST(Ed25519ParametersTest, VariantNotEqual) { FILE: cc/signature/ed25519_private_key.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { FILE: cc/signature/ed25519_private_key.h function namespace (line 27) | namespace crypto { FILE: cc/signature/ed25519_private_key_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type TestCase (line 46) | struct TestCase { function TEST_P (line 64) | TEST_P(Ed25519PrivateKeyTest, CreateSucceeds) { function TEST (line 95) | TEST(Ed25519PrivateKeyTest, CreateWithMismatchedPublicKeyFails) { function TEST (line 119) | TEST(Ed25519PrivateKeyTest, CreateWithInvalidPrivateKeyLengthFails) { function TEST_P (line 142) | TEST_P(Ed25519PrivateKeyTest, KeyEquals) { function TEST (line 176) | TEST(Ed25519PrivateKeyTest, DifferentPublicKeyNotEqual) { FILE: cc/signature/ed25519_proto_serialization.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { function ToVariant (line 73) | util::StatusOr ToVariant( function ToOutputPrefixType (line 90) | util::StatusOr ToOutputPrefixType( function ParseParameters (line 107) | util::StatusOr ParseParameters( function ParsePublicKey (line 134) | util::StatusOr ParsePublicKey( function ParsePrivateKey (line 171) | util::StatusOr ParsePrivateKey( function SerializeParameters (line 217) | util::StatusOr SerializePara... function SerializePublicKey (line 233) | util::StatusOr SerializePublicKey( function SerializePrivateKey (line 254) | util::StatusOr SerializePrivateKey( function Ed25519ProtoParametersParserImpl (line 292) | Ed25519ProtoParametersParserImpl* Ed25519ProtoParametersParser() { function Ed25519ProtoParametersSerializerImpl (line 298) | Ed25519ProtoParametersSerializerImpl* Ed25519ProtoParametersSerializ... function Ed25519ProtoPublicKeyParserImpl (line 304) | Ed25519ProtoPublicKeyParserImpl* Ed25519ProtoPublicKeyParser() { function Ed25519ProtoPublicKeySerializerImpl (line 310) | Ed25519ProtoPublicKeySerializerImpl* Ed25519ProtoPublicKeySerializer... function Ed25519ProtoPrivateKeyParserImpl (line 316) | Ed25519ProtoPrivateKeyParserImpl* Ed25519ProtoPrivateKeyParser() { function Ed25519ProtoPrivateKeySerializerImpl (line 322) | Ed25519ProtoPrivateKeySerializerImpl* Ed25519ProtoPrivateKeySerializ... function RegisterEd25519ProtoSerialization (line 330) | util::Status RegisterEd25519ProtoSerialization() { FILE: cc/signature/ed25519_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/signature/ed25519_proto_serialization_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type TestCase (line 61) | struct TestCase { class Ed25519ProtoSerializationTest (line 68) | class Ed25519ProtoSerializationTest : public TestWithParam { method SetUp (line 70) | void SetUp() override { function TEST_F (line 75) | TEST_F(Ed25519ProtoSerializationTest, RegisterTwiceSucceeds) { function TEST_P (line 95) | TEST_P(Ed25519ProtoSerializationTest, ParseParameters) { function TEST_F (line 120) | TEST_F(Ed25519ProtoSerializationTest, ParseParametersWithInvalidSeri... function TEST_F (line 135) | TEST_F(Ed25519ProtoSerializationTest, ParseParametersWithUnkownOutpu... function TEST_F (line 154) | TEST_F(Ed25519ProtoSerializationTest, ParseParametersWithInvalidVers... function TEST_P (line 172) | TEST_P(Ed25519ProtoSerializationTest, SerializeParameters) { function TEST_P (line 204) | TEST_P(Ed25519ProtoSerializationTest, ParsePublicKey) { function TEST_F (line 241) | TEST_F(Ed25519ProtoSerializationTest, ParsePublicKeyWithInvalidSeria... function TEST_F (line 260) | TEST_F(Ed25519ProtoSerializationTest, ParsePublicKeyWithInvalidVersi... function TEST_P (line 283) | TEST_P(Ed25519ProtoSerializationTest, SerializePublicKey) { function TEST_P (line 325) | TEST_P(Ed25519ProtoSerializationTest, ParsePrivateKey) { function TEST_F (line 379) | TEST_F(Ed25519ProtoSerializationTest, ParsePrivateKeyWithInvalidSeri... function TEST_F (line 398) | TEST_F(Ed25519ProtoSerializationTest, ParsePrivateKeyWithInvalidVers... function TEST_F (line 430) | TEST_F(Ed25519ProtoSerializationTest, ParsePrivateKeyNoSecretKeyAcce... function TEST_P (line 462) | TEST_P(Ed25519ProtoSerializationTest, SerializePrivateKey) { function TEST_F (line 517) | TEST_F(Ed25519ProtoSerializationTest, SerializePrivateKeyNoSecretKey... FILE: cc/signature/ed25519_public_key.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { function ComputeOutputPrefix (line 38) | util::StatusOr ComputeOutputPrefix( FILE: cc/signature/ed25519_public_key.h function namespace (line 30) | namespace crypto { FILE: cc/signature/ed25519_public_key_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type TestCase (line 41) | struct TestCase { function TEST_P (line 59) | TEST_P(Ed25519PublicKeyTest, CreateSucceeds) { function TEST (line 79) | TEST(Ed25519PublicKeyTest, CreateWithInvalidPublicKeyLength) { function TEST (line 93) | TEST(Ed25519PublicKeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 117) | TEST_P(Ed25519PublicKeyTest, KeyEquals) { function TEST (line 142) | TEST(Ed25519PublicKeyTest, DifferentVariantNotEqual) { function TEST (line 169) | TEST(Ed25519PublicKeyTest, DifferentPublicKeyBytesNotEqual) { function TEST (line 193) | TEST(Ed25519PublicKeyTest, DifferentIdRequirementNotEqual) { FILE: cc/signature/ed25519_sign_key_manager.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function Status (line 79) | Status Ed25519SignKeyManager::ValidateKey(const Ed25519PrivateKey& k... function Status (line 119) | Status Ed25519SignKeyManager::ValidateKeyFormat( FILE: cc/signature/ed25519_sign_key_manager.h function namespace (line 38) | namespace crypto { function override (line 77) | const override { FILE: cc/signature/ed25519_sign_key_manager_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function TEST (line 57) | TEST(Ed25519SignKeyManagerTest, Basic) { function TEST (line 65) | TEST(Ed25519SignKeyManagerTest, ValidateKeyFormat) { function TEST (line 70) | TEST(Ed25519SignKeyManagerTest, CreateKey) { function TEST (line 84) | TEST(Ed25519SignKeyManagerTest, CreateKeyValid) { function TEST (line 91) | TEST(Ed25519SignKeyManagerTest, CreateKeyAlwaysNew) { function TEST (line 103) | TEST(Ed25519SignKeyManagerTest, GetPublicKey) { function TEST (line 116) | TEST(Ed25519SignKeyManagerTest, Create) { function TEST (line 137) | TEST(Ed25519SignKeyManagerTest, CreateDifferentKey) { function TEST (line 158) | TEST(Ed25519SignKeyManagerTest, DeriveKey) { function TEST (line 171) | TEST(Ed25519SignKeyManagerTest, DeriveKeySignVerify) { function TEST (line 191) | TEST(Ed25519SignKeyManagerTest, DeriveKeyNotEnoughRandomness) { FILE: cc/signature/ed25519_verify_key_manager.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { function Status (line 45) | Status Ed25519VerifyKeyManager::ValidateKey(const Ed25519PublicKey& ... FILE: cc/signature/ed25519_verify_key_manager.h function namespace (line 36) | namespace crypto { FILE: cc/signature/ed25519_verify_key_manager_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function TEST (line 51) | TEST(Ed25519VerifyKeyManagerTest, Basics) { function TEST (line 59) | TEST(Ed25519VerifyKeyManagerTest, ValidateEmptyKey) { function Ed25519PrivateKey (line 64) | Ed25519PrivateKey CreateValidPrivateKey() { function Ed25519PublicKey (line 68) | Ed25519PublicKey CreateValidPublicKey() { function TEST (line 73) | TEST(Ed25519VerifyKeyManagerTest, PublicKeyValid) { function TEST (line 78) | TEST(Ed25519VerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST (line 84) | TEST(Ed25519VerifyKeyManagerTest, PublicKeyWrongKeyLength31) { function TEST (line 90) | TEST(Ed25519VerifyKeyManagerTest, PublicKeyWrongKeyLength64) { function TEST (line 96) | TEST(Ed25519SignKeyManagerTest, Create) { function TEST (line 116) | TEST(Ed25519SignKeyManagerTest, CreateDifferentPrivateKey) { FILE: cc/signature/failing_signature.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { class AlwaysFailPublicKeySign (line 36) | class AlwaysFailPublicKeySign : public PublicKeySign { method AlwaysFailPublicKeySign (line 38) | explicit AlwaysFailPublicKeySign(std::string message) method Sign (line 41) | util::StatusOr Sign( class AlwaysFailPublicKeyVerify (line 54) | class AlwaysFailPublicKeyVerify : public PublicKeyVerify { method AlwaysFailPublicKeyVerify (line 56) | explicit AlwaysFailPublicKeyVerify(std::string message) method Verify (line 59) | util::Status Verify(absl::string_view /*signature*/, function CreateAlwaysFailingPublicKeySign (line 73) | std::unique_ptr CreateAlwaysFailingPublicKeySign( function CreateAlwaysFailingPublicKeyVerify (line 78) | std::unique_ptr CreateAlwaysFailingPublicKeyVerify( FILE: cc/signature/failing_signature.h function namespace (line 26) | namespace crypto { FILE: cc/signature/failing_signature_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { function TEST (line 35) | TEST(AlwaysFailPublicKeySign, SignFails) { function TEST (line 43) | TEST(AlwaysFailPublicKeySign, SignFailsContainsMessage) { function TEST (line 53) | TEST(AlwaysFailPublicKeyVerify, VerifyFails) { function TEST (line 61) | TEST(AlwaysFailPublicKeyVerify, VerifyFailsContainsMessage) { FILE: cc/signature/internal/config_fips_140_2.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type internal (line 36) | namespace internal { function AddSignatureFips140_2 (line 38) | util::Status AddSignatureFips140_2(Configuration& config) { FILE: cc/signature/internal/config_fips_140_2.h function namespace (line 23) | namespace crypto { FILE: cc/signature/internal/config_fips_140_2_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type internal (line 45) | namespace internal { function TEST (line 54) | TEST(SignatureV0Test, Fips) { function TEST (line 62) | TEST(SignatureV0Test, PrimitiveWrappers) { function TEST (line 77) | TEST(SignatureV0Test, KeyManagers) { function TEST_P (line 106) | TEST_P(SignatureV0Test, GetPrimitive) { function TEST (line 136) | TEST(SignatureV0Test, GetPrimitiveNonFips1402KeyTypeFails) { FILE: cc/signature/internal/config_v0.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type internal (line 36) | namespace internal { function AddSignatureV0 (line 38) | util::Status AddSignatureV0(Configuration& config) { FILE: cc/signature/internal/config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/signature/internal/config_v0_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type internal (line 45) | namespace internal { function TEST (line 53) | TEST(SignatureV0Test, PrimitiveWrappers) { function TEST (line 64) | TEST(SignatureV0Test, KeyManagers) { function TEST_P (line 93) | TEST_P(SignatureV0KeyTypesTest, GetPrimitive) { FILE: cc/signature/internal/ecdsa_raw_sign_boringssl.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type internal (line 49) | namespace internal { function DerToIeee (line 62) | crypto::tink::util::StatusOr DerToIeee(absl::string_v... FILE: cc/signature/internal/ecdsa_raw_sign_boringssl.h function namespace (line 35) | namespace crypto { FILE: cc/signature/internal/ecdsa_raw_sign_boringssl_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type internal (line 42) | namespace internal { function ComputeDigest (line 52) | util::StatusOr ComputeDigest(subtle::HashType hash_type, function TEST (line 68) | TEST(EcdsaRawSignBoringSslTest, VerifySignature) { function TEST (line 100) | TEST(EcdsaRawSignBoringSslTest, VerifySignatureWithEmptyMessage) { function TEST (line 135) | TEST(EcdsaRawSignBoringSslTest, VerifyFailsWithInvalidMessageOrSig... function TEST (line 172) | TEST(EcdsaRawSignBoringSslTest, VerifyFailsWhenEncodingDoesNotMatc... function TEST (line 207) | TEST(EcdsaRawSignBoringSslTest, function TEST (line 248) | TEST(EcdsaRawSignBoringSslTest, CreateFailsWithBadPublicKey) { function TEST (line 266) | TEST(EcdsaRawSignBoringSslTest, FipsFailWithoutBoringCrypto) { FILE: cc/signature/internal/key_gen_config_v0.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type internal (line 34) | namespace internal { function AddSignatureKeyGenV0 (line 36) | util::Status AddSignatureKeyGenV0(KeyGenConfiguration& config) { FILE: cc/signature/internal/key_gen_config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/signature/key_gen_config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function KeyGenConfiguration (line 26) | const KeyGenConfiguration& KeyGenConfigSignatureV0() { FILE: cc/signature/key_gen_config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/signature/public_key_sign_factory.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { FILE: cc/signature/public_key_sign_factory.h function namespace (line 28) | namespace crypto { FILE: cc/signature/public_key_sign_factory_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { class PublicKeySignFactoryTest (line 50) | class PublicKeySignFactoryTest : public ::testing::Test { method SetUp (line 52) | void SetUp() override { function EcdsaPrivateKey (line 58) | EcdsaPrivateKey GetNewEcdsaPrivateKey() { function TEST_F (line 64) | TEST_F(PublicKeySignFactoryTest, testBasic) { function TEST_F (line 75) | TEST_F(PublicKeySignFactoryTest, testPrimitive) { FILE: cc/signature/public_key_sign_wrapper.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { function Validate (line 47) | util::Status Validate(PrimitiveSet* public_key_sign_s... class PublicKeySignSetWrapper (line 59) | class PublicKeySignSetWrapper : public PublicKeySign { method PublicKeySignSetWrapper (line 61) | explicit PublicKeySignSetWrapper( FILE: cc/signature/public_key_sign_wrapper.h function namespace (line 29) | namespace crypto { FILE: cc/signature/public_key_sign_wrapper_test.cc type crypto (line 62) | namespace crypto { type tink (line 63) | namespace tink { function TEST (line 66) | TEST(PublicKeySignSetWrapperTest, TestBasic) { function TEST (line 148) | TEST(PublicKeySignSetWrapperTest, TestLegacySignatures) { function PopulateKeyInfo (line 192) | KeysetInfo::KeyInfo PopulateKeyInfo(uint32_t key_id, function KeysetInfo (line 203) | KeysetInfo CreateTestKeysetInfo() { class PublicKeySignSetWrapperWithMonitoringTest (line 218) | class PublicKeySignSetWrapperWithMonitoringTest : public Test { method SetUp (line 222) | void SetUp() override { function TEST_F (line 255) | TEST_F(PublicKeySignSetWrapperWithMonitoringTest, function TEST_F (line 295) | TEST_F(PublicKeySignSetWrapperWithMonitoringTest, FILE: cc/signature/public_key_verify_factory.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { FILE: cc/signature/public_key_verify_factory.h function namespace (line 28) | namespace crypto { FILE: cc/signature/public_key_verify_factory_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { class PublicKeyVerifyFactoryTest (line 50) | class PublicKeyVerifyFactoryTest : public ::testing::Test { method SetUp (line 52) | void SetUp() override { function EcdsaPublicKey (line 58) | EcdsaPublicKey GetNewEcdsaPublicKey() { function TEST_F (line 65) | TEST_F(PublicKeyVerifyFactoryTest, testBasic) { function TEST_F (line 76) | TEST_F(PublicKeyVerifyFactoryTest, testPrimitive) { FILE: cc/signature/public_key_verify_wrapper.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function Validate (line 48) | util::Status Validate(PrimitiveSet* public_key_veri... class PublicKeyVerifySetWrapper (line 60) | class PublicKeyVerifySetWrapper : public PublicKeyVerify { method PublicKeyVerifySetWrapper (line 62) | explicit PublicKeyVerifySetWrapper( FILE: cc/signature/public_key_verify_wrapper.h function namespace (line 30) | namespace crypto { FILE: cc/signature/public_key_verify_wrapper_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { class PublicKeyVerifySetWrapperTest (line 66) | class PublicKeyVerifySetWrapperTest : public ::testing::Test { method SetUp (line 68) | void SetUp() override { method TearDown (line 70) | void TearDown() override { function TEST_F (line 74) | TEST_F(PublicKeyVerifySetWrapperTest, testBasic) { function PopulateKeyInfo (line 156) | KeysetInfo::KeyInfo PopulateKeyInfo(uint32_t key_id, function KeysetInfo (line 167) | KeysetInfo CreateTestKeysetInfo() { class PublicKeyVerifySetWrapperWithMonitoringTest (line 182) | class PublicKeyVerifySetWrapperWithMonitoringTest : public Test { method SetUp (line 186) | void SetUp() override { function TEST_F (line 219) | TEST_F(PublicKeyVerifySetWrapperWithMonitoringTest, function TEST_F (line 265) | TEST_F(PublicKeyVerifySetWrapperWithMonitoringTest, FILE: cc/signature/rsa_ssa_pkcs1_parameters.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function BigInteger (line 147) | BigInteger RsaSsaPkcs1Parameters::Builder::CreateDefaultPublicExpone... FILE: cc/signature/rsa_ssa_pkcs1_parameters.h function namespace (line 29) | namespace tink { FILE: cc/signature/rsa_ssa_pkcs1_parameters_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type TestCase (line 47) | struct TestCase { function PublicExponentToString (line 56) | std::string PublicExponentToString(int64_t public_exponent) { function TEST_P (line 84) | TEST_P(RsaSsaPkcs1ParametersTest, Build) { function TEST (line 104) | TEST(RsaSsaPkcs1ParametersTest, BuildWithInvalidVariantFails) { function TEST (line 117) | TEST(RsaSsaPkcs1ParametersTest, BuildWithoutVariantFails) { function TEST (line 128) | TEST(RsaSsaPkcs1ParametersTest, BuildWithInvalidHashTypeFails) { function TEST (line 142) | TEST(RsaSsaPkcs1ParametersTest, BuildWithoutHashTypeFails) { function TEST (line 153) | TEST(RsaSsaPkcs1ParametersTest, BuildWithLargeModulusSize) { function TEST (line 165) | TEST(RsaSsaPkcs1ParametersTest, BuildWithTooSmallModulusSize) { function TEST (line 177) | TEST(RsaSsaPkcs1ParametersTest, BuildWithoutModulusSize) { function TEST (line 188) | TEST(RsaSsaPkcs1ParametersTest, BuildWithValidNonF4PublicExponent) { function TEST (line 202) | TEST(RsaSsaPkcs1ParametersTest, BuildWithoutPublicExponentDefaultsTo... function TEST (line 213) | TEST(RsaSsaPkcs1ParametersTest, BuildWithSmallPublicExponentFails) { function TEST (line 226) | TEST(RsaSsaPkcs1ParametersTest, BuildWithEvenPublicExponentFails) { function TEST (line 239) | TEST(RsaSsaPkcs1ParametersTest, BuildWithLargePublicExponent) { function TEST (line 253) | TEST(RsaSsaPkcs1ParametersTest, BuildWithTooLargePublicExponent) { function TEST (line 268) | TEST(RsaSsaPkcs1ParametersTest, CopyConstructor) { function TEST (line 288) | TEST(RsaSsaPkcs1ParametersTest, CopyAssignment) { function TEST_P (line 308) | TEST_P(RsaSsaPkcs1ParametersTest, ParametersEquals) { function TEST (line 335) | TEST(RsaSsaPkcs1ParametersTest, VariantNotEqual) { function TEST (line 358) | TEST(RsaSsaPkcs1ParametersTest, HashTypeNotEqual) { function TEST (line 381) | TEST(RsaSsaPkcs1ParametersTest, ModulusSizeNotEqual) { function TEST (line 404) | TEST(RsaSsaPkcs1ParametersTest, PublicExponentNotEqual) { FILE: cc/signature/rsa_ssa_pkcs1_private_key.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function ValidateKeyPair (line 39) | util::Status ValidateKeyPair( FILE: cc/signature/rsa_ssa_pkcs1_private_key.h function namespace (line 28) | namespace crypto { FILE: cc/signature/rsa_ssa_pkcs1_private_key_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type TestCase (line 55) | struct TestCase { type PrivateValues (line 62) | struct PrivateValues { function Base64WebSafeDecode (line 119) | std::string Base64WebSafeDecode(absl::string_view base64_string) { function PrivateValues (line 127) | PrivateValues GetValidPrivateValues() { function RsaSsaPkcs1PublicKey (line 148) | RsaSsaPkcs1PublicKey GetValidPublicKey() { function FlipFirstByte (line 167) | std::string FlipFirstByte(absl::string_view str) { function TEST_P (line 194) | TEST_P(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeySucceeds) { function TEST (line 240) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyFromBoringSsl) { function TEST (line 339) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyValidatesModulus) { function TEST (line 365) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyValidatesPrimeP) { function TEST (line 386) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyValidatesPrimeQ) { function TEST (line 407) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyValidatesPrimeExponen... function TEST (line 428) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyValidatesPrimeExponen... function TEST (line 449) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyValidatesPrivateExpon... function TEST (line 470) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateKeyValidatesCrtCoefficie... function TEST (line 491) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPublicKeyNotSetFails) { function TEST (line 508) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrimePNotSetFails) { function TEST (line 525) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrimeQNotSetFails) { function TEST (line 542) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrimeExponentPNotSetFails) { function TEST (line 559) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrimeExponentQNotSetFails) { function TEST (line 576) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildPrivateExponentNotSetFails) { function TEST (line 593) | TEST(RsaSsaPkcs1PrivateKeyTest, BuildCrtCoefficientNotSetFails) { function TEST (line 610) | TEST(RsaSsaPkcs1PrivateKeyTest, CreateMismatchedKeyPairFails) { function TEST_P (line 653) | TEST_P(RsaSsaPkcs1PrivateKeyTest, PrivateKeyEquals) { function TEST (line 705) | TEST(RsaSsaPkcs1PrivateKeyTest, DifferentPublicKeyNotEqual) { function TEST (line 762) | TEST(RsaSsaPkcs1PrivateKeyTest, DifferentKeyTypesNotEqual) { FILE: cc/signature/rsa_ssa_pkcs1_proto_serialization.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { function ToVariant (line 81) | util::StatusOr ToVariant( function ToOutputPrefixType (line 98) | util::StatusOr ToOutputPrefixType( function ToEnumHashType (line 115) | util::StatusOr ToEnumHashType( function ToProtoHashType (line 130) | util::StatusOr ToProtoHashType( function ToParameters (line 146) | util::StatusOr ToParameters( function ParseParameters (line 169) | util::StatusOr ParseParameters( function ParsePublicKey (line 193) | util::StatusOr ParsePublicKey( function ParsePrivateKey (line 227) | util::StatusOr ParsePrivateKey( function SerializeParameters (line 278) | util::StatusOr SerializePara... function SerializePublicKey (line 306) | util::StatusOr SerializePublicKey( function SerializePrivateKey (line 340) | util::StatusOr SerializePrivateKey( function RsaSsaPkcs1ProtoParametersParserImpl (line 396) | RsaSsaPkcs1ProtoParametersParserImpl* RsaSsaPkcs1ProtoParametersPars... function RsaSsaPkcs1ProtoParametersSerializerImpl (line 402) | RsaSsaPkcs1ProtoParametersSerializerImpl* function RsaSsaPkcs1ProtoPublicKeyParserImpl (line 409) | RsaSsaPkcs1ProtoPublicKeyParserImpl* RsaSsaPkcs1ProtoPublicKeyParser... function RsaSsaPkcs1ProtoPublicKeySerializerImpl (line 415) | RsaSsaPkcs1ProtoPublicKeySerializerImpl* RsaSsaPkcs1ProtoPublicKeySe... function RsaSsaPkcs1ProtoPrivateKeyParserImpl (line 421) | RsaSsaPkcs1ProtoPrivateKeyParserImpl* RsaSsaPkcs1ProtoPrivateKeyPars... function RsaSsaPkcs1ProtoPrivateKeySerializerImpl (line 427) | RsaSsaPkcs1ProtoPrivateKeySerializerImpl* function RegisterRsaSsaPkcs1ProtoSerialization (line 436) | util::Status RegisterRsaSsaPkcs1ProtoSerialization() { FILE: cc/signature/rsa_ssa_pkcs1_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/signature/rsa_ssa_pkcs1_proto_serialization_test.cc type crypto (line 54) | namespace crypto { type tink (line 55) | namespace tink { type TestCase (line 71) | struct TestCase { class RsaSsaPkcs1ProtoSerializationTest (line 88) | class RsaSsaPkcs1ProtoSerializationTest : public TestWithParam ComputeOutputPrefix( FILE: cc/signature/rsa_ssa_pkcs1_public_key.h function namespace (line 31) | namespace crypto { FILE: cc/signature/rsa_ssa_pkcs1_public_key_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type TestCase (line 43) | struct TestCase { function TEST_P (line 89) | TEST_P(RsaSsaPkcs1PublicKeyTest, CreatePublicKeySucceeds) { function TEST (line 114) | TEST(RsaSsaPkcs1PublicKeyTest, CreateWithNonMatchingModulusSizeFails) { function TEST (line 133) | TEST(Ed25519PublicKeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 167) | TEST_P(RsaSsaPkcs1PublicKeyTest, KeyEquals) { function TEST (line 198) | TEST(RsaSsaPkcs1PublicKeyTest, DifferentParametersNotEqual) { function TEST (line 235) | TEST(RsaSsaPkcs1PublicKeyTest, DifferentModulusNotEqual) { function TEST (line 275) | TEST(RsaSsaPkcs1PublicKeyTest, DifferentIdRequirementNotEqual) { function TEST (line 303) | TEST(RsaSsaPkcs1PublicKeyTest, PaddedWithZerosModulusEqual) { FILE: cc/signature/rsa_ssa_pkcs1_sign_key_manager.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function RsaSsaPkcs1PrivateKey (line 53) | RsaSsaPkcs1PrivateKey RsaPrivateKeySubtleToProto( function RsaPrivateKeyProtoToSubtle (line 70) | internal::RsaPrivateKey RsaPrivateKeyProtoToSubtle( function Status (line 134) | Status RsaSsaPkcs1SignKeyManager::ValidateKey( function Status (line 141) | Status RsaSsaPkcs1SignKeyManager::ValidateKeyFormat( FILE: cc/signature/rsa_ssa_pkcs1_sign_key_manager.h function namespace (line 37) | namespace crypto { function override (line 77) | const override { FILE: cc/signature/rsa_ssa_pkcs1_sign_key_manager_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function TEST (line 53) | TEST(RsaSsaPkcsSignKeyManagerTest, Basic) { function RsaSsaPkcs1KeyFormat (line 62) | RsaSsaPkcs1KeyFormat CreateKeyFormat(HashType hash_type, function RsaSsaPkcs1KeyFormat (line 76) | RsaSsaPkcs1KeyFormat ValidKeyFormat() { function TEST (line 80) | TEST(RsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormat) { function TEST (line 85) | TEST(RsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatSha384Allowed) { function TEST (line 92) | TEST(RsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatSha512Allowed) { function TEST (line 99) | TEST(RsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatSha1Disallowed) { function TEST (line 106) | TEST(RsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatUnkownHashDisal... function TEST (line 113) | TEST(RsaSsaPkcs1SignKeyManagerTest, ValidateKeyFormatSmallModulusDis... function CheckNewKey (line 121) | void CheckNewKey(const RsaSsaPkcs1PrivateKey& private_key, function TEST (line 176) | TEST(RsaSsaPkcs1SignKeyManagerTest, CreateKey) { function TEST (line 185) | TEST(RsaSsaPkcs1SignKeyManagerTest, CreateKeySmallKey) { function TEST (line 195) | TEST(RsaSsaPkcs1SignKeyManagerTest, CreateKeyLargeKey) { function TEST (line 205) | TEST(RsaSsaPkcs1SignKeyManagerTest, CreateKeyValid) { function TEST (line 213) | TEST(RsaSsaPkcs1SignKeyManagerTest, CreateKeyAlwaysNewRsaPair) { function TEST (line 227) | TEST(RsaSsaPkcs1SignKeyManagerTest, GetPublicKey) { function TEST (line 242) | TEST(EcdsaSignKeyManagerTest, Create) { FILE: cc/signature/rsa_ssa_pkcs1_verify_key_manager.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { FILE: cc/signature/rsa_ssa_pkcs1_verify_key_manager.h function namespace (line 40) | namespace crypto { FILE: cc/signature/rsa_ssa_pkcs1_verify_key_manager_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { function TEST (line 60) | TEST(RsaSsaPkcs1VerifyKeyManagerTest, Basics) { function TEST (line 69) | TEST(RsaSsaPkcs1VerifyKeyManagerTest, ValidateEmptyKey) { function RsaSsaPkcs1KeyFormat (line 74) | RsaSsaPkcs1KeyFormat CreateKeyFormat(HashType hash_type, function RsaSsaPkcs1KeyFormat (line 88) | RsaSsaPkcs1KeyFormat ValidKeyFormat() { function RsaSsaPkcs1PrivateKey (line 92) | RsaSsaPkcs1PrivateKey CreateValidPrivateKey() { function RsaSsaPkcs1PublicKey (line 96) | RsaSsaPkcs1PublicKey CreateValidPublicKey() { function TEST (line 103) | TEST(RsaSsaPkcs1VerifyKeyManagerTest, PublicKeyValid) { function TEST (line 108) | TEST(RsaSsaPkcs1VerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST (line 114) | TEST(RsaSsaPkcs1VerifyKeyManagerTest, PublicKeyUnkownHashDisallowed) { function TEST (line 120) | TEST(RsaSsaPkcs1VerifyKeyManagerTest, ValidateKeyFormatSmallModulusD... function TEST (line 129) | TEST(RsaSsaPkcs1SignKeyManagerTest, Create) { function TEST (line 162) | TEST(RsaSsaPkcs1VerifyKeyManagerTest, NistTestVector) { FILE: cc/signature/rsa_ssa_pss_parameters.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { function BigInteger (line 194) | BigInteger RsaSsaPssParameters::Builder::CreateDefaultPublicExponent... FILE: cc/signature/rsa_ssa_pss_parameters.h function namespace (line 29) | namespace tink { FILE: cc/signature/rsa_ssa_pss_parameters_test.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type TestCase (line 47) | struct TestCase { function PublicExponentToString (line 57) | std::string PublicExponentToString(int64_t public_exponent) { function TEST_P (line 86) | TEST_P(RsaSsaPssParametersTest, Build) { function TEST (line 109) | TEST(RsaSsaPssParametersTest, BuildWithInvalidVariantFails) { function TEST (line 124) | TEST(RsaSsaPssParametersTest, BuildWithoutVariantFails) { function TEST (line 137) | TEST(RsaSsaPssParametersTest, BuildWithInvalidSigHashTypeFails) { function TEST (line 153) | TEST(RsaSsaPssParametersTest, BuildWithInvalidMgf1gHashTypeFails) { function TEST (line 169) | TEST(RsaSsaPssParametersTest, BuildWithDifferentSigAndMgf1HashTypesF... function TEST (line 183) | TEST(RsaSsaPssParametersTest, BuildWithoutSigHashTypeFails) { function TEST (line 196) | TEST(RsaSsaPssParametersTest, BuildWithoutMgf1HashTypeFails) { function TEST (line 209) | TEST(RsaSsaPssParametersTest, BuildWithLargeModulusSizeWorks) { function TEST (line 223) | TEST(RsaSsaPssParametersTest, BuildWithTooSmallModulusSizeFails) { function TEST (line 237) | TEST(RsaSsaPssParametersTest, BuildWithoutModulusSizeFails) { function TEST (line 250) | TEST(RsaSsaPssParametersTest, BuildWithoutSaltLengthFails) { function TEST (line 263) | TEST(RsaSsaPssParametersTest, BuildWithNegativeSaltLengthFails) { function TEST (line 277) | TEST(RsaSsaPssParametersTest, BuildWithValidNonF4PublicExponent) { function TEST (line 293) | TEST(RsaSsaPssParametersTest, BuildWithoutPublicExponentDefaultsToF4) { function TEST (line 306) | TEST(RsaSsaPssParametersTest, BuildWithSmallPublicExponentFails) { function TEST (line 321) | TEST(RsaSsaPssParametersTest, BuildWithEvenPublicExponentFails) { function TEST (line 336) | TEST(RsaSsaPssParametersTest, BuildWithLargePublicExponent) { function TEST (line 352) | TEST(RsaSsaPssParametersTest, BuildWithTooLargePublicExponent) { function TEST (line 369) | TEST(RsaSsaPssParametersTest, CopyConstructor) { function TEST (line 394) | TEST(RsaSsaPssParametersTest, CopyAssignment) { function TEST_P (line 419) | TEST_P(RsaSsaPssParametersTest, ParametersEquals) { function TEST (line 450) | TEST(RsaSsaPssParametersTest, VariantNotEqual) { function TEST (line 477) | TEST(RsaSsaPssParametersTest, HashTypeNotEqual) { function TEST (line 504) | TEST(RsaSsaPssParametersTest, SaltLengthNotEqual) { function TEST (line 531) | TEST(RsaSsaPssParametersTest, ModulusSizeNotEqual) { function TEST (line 558) | TEST(RsaSsaPssParametersTest, PublicExponentNotEqual) { FILE: cc/signature/rsa_ssa_pss_private_key.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function ValidateKeyPair (line 39) | util::Status ValidateKeyPair( FILE: cc/signature/rsa_ssa_pss_private_key.h function namespace (line 28) | namespace crypto { FILE: cc/signature/rsa_ssa_pss_private_key_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type TestCase (line 55) | struct TestCase { type PrivateValues (line 63) | struct PrivateValues { function Base64WebSafeDecode (line 118) | std::string Base64WebSafeDecode(absl::string_view base64_string) { function PrivateValues (line 126) | PrivateValues GetValidPrivateValues() { function RsaSsaPssPublicKey (line 147) | RsaSsaPssPublicKey GetValidPublicKey() { function FlipFirstByte (line 167) | std::string FlipFirstByte(absl::string_view str) { function TEST_P (line 198) | TEST_P(RsaSsaPssPrivateKeyTest, BuildPrivateKeySucceeds) { function TEST (line 244) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyFromBoringSsl) { function TEST (line 344) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyValidatesModulus) { function TEST (line 370) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyValidatesPrimeP) { function TEST (line 391) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyValidatesPrimeQ) { function TEST (line 412) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyValidatesPrimeExponentP) { function TEST (line 433) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyValidatesPrimeExponentQ) { function TEST (line 454) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyValidatesPrivateExponen... function TEST (line 475) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateKeyValidatesCrtCoefficient) { function TEST (line 496) | TEST(RsaSsaPssPrivateKeyTest, BuildPublicKeyNotSetFails) { function TEST (line 513) | TEST(RsaSsaPssPrivateKeyTest, BuildPrimePNotSetFails) { function TEST (line 530) | TEST(RsaSsaPssPrivateKeyTest, BuildPrimeQNotSetFails) { function TEST (line 547) | TEST(RsaSsaPssPrivateKeyTest, BuildPrimeExponentPNotSetFails) { function TEST (line 564) | TEST(RsaSsaPssPrivateKeyTest, BuildPrimeExponentQNotSetFails) { function TEST (line 581) | TEST(RsaSsaPssPrivateKeyTest, BuildPrivateExponentNotSetFails) { function TEST (line 598) | TEST(RsaSsaPssPrivateKeyTest, BuildCrtCoefficientNotSetFails) { function TEST (line 615) | TEST(RsaSsaPssPrivateKeyTest, CreateMismatchedKeyPairFails) { function TEST_P (line 660) | TEST_P(RsaSsaPssPrivateKeyTest, PrivateKeyEquals) { function TEST (line 713) | TEST(RsaSsaPssPrivateKeyTest, DifferentPublicKeyNotEqual) { function TEST (line 770) | TEST(RsaSsaPssPrivateKeyTest, DifferentKeyTypesNotEqual) { FILE: cc/signature/rsa_ssa_pss_proto_serialization.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { function ToVariant (line 81) | util::StatusOr ToVariant( function ToOutputPrefixType (line 98) | util::StatusOr ToOutputPrefixType( function ToEnumHashType (line 115) | util::StatusOr ToEnumHashType( function ToProtoHashType (line 130) | util::StatusOr ToProtoHashType( function ToParameters (line 145) | util::StatusOr ToParameters( function FromParameters (line 176) | util::StatusOr FromParameters(RsaSsaPssParameters p... function ParseParameters (line 197) | util::StatusOr ParseParameters( function ParsePublicKey (line 221) | util::StatusOr ParsePublicKey( function ParsePrivateKey (line 255) | util::StatusOr ParsePrivateKey( function SerializeParameters (line 305) | util::StatusOr SerializePara... function SerializePublicKey (line 330) | util::StatusOr SerializePublicKey( function SerializePrivateKey (line 359) | util::StatusOr SerializePrivateKey( function RsaSsaPssProtoParametersParserImpl (line 412) | RsaSsaPssProtoParametersParserImpl* RsaSsaPssProtoParametersParser() { function RsaSsaPssProtoParametersSerializerImpl (line 418) | RsaSsaPssProtoParametersSerializerImpl* RsaSsaPssProtoParametersSeri... function RsaSsaPssProtoPublicKeyParserImpl (line 424) | RsaSsaPssProtoPublicKeyParserImpl* RsaSsaPssProtoPublicKeyParser() { function RsaSsaPssProtoPublicKeySerializerImpl (line 430) | RsaSsaPssProtoPublicKeySerializerImpl* RsaSsaPssProtoPublicKeySerial... function RsaSsaPssProtoPrivateKeyParserImpl (line 436) | RsaSsaPssProtoPrivateKeyParserImpl* RsaSsaPssProtoPrivateKeyParser() { function RsaSsaPssProtoPrivateKeySerializerImpl (line 442) | RsaSsaPssProtoPrivateKeySerializerImpl* RsaSsaPssProtoPrivateKeySeri... function RegisterRsaSsaPssProtoSerialization (line 450) | util::Status RegisterRsaSsaPssProtoSerialization() { FILE: cc/signature/rsa_ssa_pss_proto_serialization.h function namespace (line 22) | namespace crypto { FILE: cc/signature/rsa_ssa_pss_proto_serialization_test.cc type crypto (line 54) | namespace crypto { type tink (line 55) | namespace tink { type TestCase (line 71) | struct TestCase { class RsaSsaPssProtoSerializationTest (line 89) | class RsaSsaPssProtoSerializationTest : public TestWithParam ComputeOutputPrefix( FILE: cc/signature/rsa_ssa_pss_public_key.h function namespace (line 31) | namespace crypto { FILE: cc/signature/rsa_ssa_pss_public_key_test.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type TestCase (line 43) | struct TestCase { function TEST_P (line 91) | TEST_P(RsaSsaPssPublicKeyTest, CreatePublicKeySucceeds) { function TEST (line 116) | TEST(RsaSsaPssPublicKeyTest, CreateWithNonMatchingModulusSizeFails) { function TEST (line 136) | TEST(Ed25519PublicKeyTest, CreateKeyWithInvalidIdRequirementFails) { function TEST_P (line 174) | TEST_P(RsaSsaPssPublicKeyTest, KeyEquals) { function TEST (line 204) | TEST(RsaSsaPssPublicKeyTest, DifferentParametersNotEqual) { function TEST (line 244) | TEST(RsaSsaPssPublicKeyTest, DifferentModulusNotEqual) { function TEST (line 285) | TEST(RsaSsaPssPublicKeyTest, DifferentIdRequirementNotEqual) { function TEST (line 314) | TEST(RsaSsaPssPublicKeyTest, PaddedWithZerosModulusEqual) { FILE: cc/signature/rsa_ssa_pss_sign_key_manager.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { function RsaPrivateKeySubtleToProto (line 55) | std::unique_ptr RsaPrivateKeySubtleToProto( function RsaPrivateKeyProtoToSubtle (line 73) | internal::RsaPrivateKey RsaPrivateKeyProtoToSubtle( function Status (line 137) | Status RsaSsaPssSignKeyManager::ValidateKey( function Status (line 144) | Status RsaSsaPssSignKeyManager::ValidateKeyFormat( FILE: cc/signature/rsa_ssa_pss_sign_key_manager.h function namespace (line 38) | namespace crypto { function override (line 78) | const override { FILE: cc/signature/rsa_ssa_pss_sign_key_manager_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function TEST (line 56) | TEST(RsaSsaPssSignKeyManagerTest, Basic) { function RsaSsaPssKeyFormat (line 64) | RsaSsaPssKeyFormat CreateKeyFormat(HashType sig_hash, HashType mgf1_... function RsaSsaPssKeyFormat (line 82) | RsaSsaPssKeyFormat ValidKeyFormat() { function TEST (line 86) | TEST(RsaSsaPssSignKeyManagerTest, ValidateKeyFormat) { function TEST (line 91) | TEST(RsaSsaPssSignKeyManagerTest, ValidateKeyFormatSha512Allowed) { function TEST (line 99) | TEST(RsaSsaPssSignKeyManagerTest, ValidateKeyFormatSha1Disallowed) { function TEST (line 106) | TEST(RsaSsaPssSignKeyManagerTest, ValidateKeyFormatSmallModulusDisal... function TEST (line 113) | TEST(RsaSsaPssSignKeyManagerTest, ValidateKeyFormatHashMismatchDisal... function TEST (line 121) | TEST(RsaSsaPssSignKeyManagerTest, ValidateKeyFormatHashMismatchDisal... function TEST (line 129) | TEST(RsaSsaPssSignKeyManagerTest, ValidateKeyFormatUnkownHashDisallo... function CheckNewKey (line 138) | void CheckNewKey(const RsaSsaPssPrivateKey& private_key, function TEST (line 199) | TEST(RsaSsaPssSignKeyManagerTest, CreateKey) { function TEST (line 207) | TEST(RsaSsaPssSignKeyManagerTest, CreateKeySmallKey) { function TEST (line 217) | TEST(RsaSsaPssSignKeyManagerTest, CreateKeyLargeKey) { function TEST (line 227) | TEST(RsaSsaPssSignKeyManagerTest, CreateKeyValid) { function TEST (line 235) | TEST(RsaSsaPssSignKeyManagerTest, CreateKeyAlwaysNewRsaPair) { function TEST (line 249) | TEST(RsaSsaPssSignKeyManagerTest, GetPublicKey) { function TEST (line 262) | TEST(RsaSsaPssSignKeyManagerTest, Create) { function TEST (line 288) | TEST(RsaSsaPssSignKeyManagerTest, CreateWrongKey) { FILE: cc/signature/rsa_ssa_pss_verify_key_manager.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function Status (line 68) | Status RsaSsaPssVerifyKeyManager::ValidateKey( function Status (line 89) | Status RsaSsaPssVerifyKeyManager::ValidateParams( FILE: cc/signature/rsa_ssa_pss_verify_key_manager.h function namespace (line 39) | namespace crypto { FILE: cc/signature/rsa_ssa_pss_verify_key_manager_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function TEST (line 58) | TEST(RsaSsaPssVerifyKeyManagerTest, Basics) { function TEST (line 66) | TEST(RsaSsaPssVerifyKeyManagerTest, ValidateEmptyKey) { function RsaSsaPssKeyFormat (line 71) | RsaSsaPssKeyFormat CreateKeyFormat(HashType sig_hash, HashType mgf1_... function RsaSsaPssKeyFormat (line 89) | RsaSsaPssKeyFormat ValidKeyFormat() { function RsaSsaPssPrivateKey (line 93) | RsaSsaPssPrivateKey CreateValidPrivateKey() { function RsaSsaPssPublicKey (line 97) | RsaSsaPssPublicKey CreateValidPublicKey() { function TEST (line 104) | TEST(RsaSsaPssVerifyKeyManagerTest, PublicKeyValid) { function TEST (line 109) | TEST(RsaSsaPssVerifyKeyManagerTest, PublicKeyWrongVersion) { function TEST (line 115) | TEST(RsaSsaPssVerifyKeyManagerTest, PublicKeyHashMismatchDisallowed) { function TEST (line 122) | TEST(RsaSsaPssVerifyKeyManagerTest, PublicKeyHashMismatchDisallowed2) { function TEST (line 129) | TEST(RsaSsaPssVerifyKeyManagerTest, PublicKeyUnkownHashDisallowed) { function TEST (line 136) | TEST(RsaSsaPssVerifyKeyManagerTest, ValidateKeyFormatSmallModulusDis... function TEST (line 145) | TEST(RsaSsaPssVerifyKeyManagerTest, NegativeSaltLengthFails) { function TEST (line 151) | TEST(RsaSsaPssSignKeyManagerTest, Create) { type NistTestVector (line 187) | struct NistTestVector { function TEST (line 228) | TEST(RsaSsaPssVerifyKeyManagerTest, TestVector) { FILE: cc/signature/sig_util.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function SignAndVerify (line 26) | crypto::tink::util::Status SignAndVerify(const PublicKeySign* signer, FILE: cc/signature/sig_util.h function namespace (line 23) | namespace crypto { FILE: cc/signature/signature_config.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { FILE: cc/signature/signature_config.h function namespace (line 24) | namespace crypto { FILE: cc/signature/signature_config_test.cc type crypto (line 85) | namespace crypto { type tink (line 86) | namespace tink { class SignatureConfigTest (line 100) | class SignatureConfigTest : public ::testing::Test { method SetUp (line 102) | void SetUp() override { function TEST_F (line 108) | TEST_F(SignatureConfigTest, testBasic) { function TEST_F (line 135) | TEST_F(SignatureConfigTest, PublicKeySignWrapperRegistered) { function TEST_F (line 170) | TEST_F(SignatureConfigTest, PublicKeyVerifyWrapperRegistered) { function TEST_F (line 201) | TEST_F(SignatureConfigTest, RegisterNonFipsTemplates) { function TEST_F (line 228) | TEST_F(SignatureConfigTest, RegisterFipsValidTemplates) { function TEST_F (line 255) | TEST_F(SignatureConfigTest, RsaSsaPkcs1ProtoParamsSerializationRegis... type RsaKeyValues (line 300) | struct RsaKeyValues { function RsaKeyValues (line 312) | RsaKeyValues GenerateRsaKeyValues(int modulus_size_in_bits) { function TEST_F (line 364) | TEST_F(SignatureConfigTest, RsaSsaPkcs1ProtoPublicKeySerializationRe... function TEST_F (line 426) | TEST_F(SignatureConfigTest, RsaSsaPkcs1ProtoPrivateKeySerializationR... function TEST_F (line 515) | TEST_F(SignatureConfigTest, RsaSsaPssProtoParamsSerializationRegiste... function TEST_F (line 562) | TEST_F(SignatureConfigTest, RsaSsaPssProtoPublicKeySerializationRegi... function TEST_F (line 631) | TEST_F(SignatureConfigTest, RsaSsaPssProtoPrivateKeySerializationReg... function TEST_F (line 726) | TEST_F(SignatureConfigTest, EcdsaProtoParamsSerializationRegistered) { function TEST_F (line 771) | TEST_F(SignatureConfigTest, EcdsaProtoPublicKeySerializationRegister... function TEST_F (line 835) | TEST_F(SignatureConfigTest, EcdsaProtoPrivateKeySerializationRegiste... FILE: cc/signature/signature_key_templates.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function NewEcdsaKeyTemplate (line 52) | std::unique_ptr NewEcdsaKeyTemplate( function NewEcdsaKeyTemplate (line 68) | std::unique_ptr NewEcdsaKeyTemplate( function NewRsaSsaPkcs1KeyTemplate (line 75) | std::unique_ptr NewRsaSsaPkcs1KeyTemplate(HashType hash... function NewRsaSsaPssKeyTemplate (line 94) | std::unique_ptr NewRsaSsaPssKeyTemplate(HashType sig_hash, function KeyTemplate (line 120) | const KeyTemplate& SignatureKeyTemplates::EcdsaP256() { function KeyTemplate (line 130) | const KeyTemplate& SignatureKeyTemplates::EcdsaP384() { function KeyTemplate (line 139) | const KeyTemplate& SignatureKeyTemplates::EcdsaP384Sha384() { function KeyTemplate (line 148) | const KeyTemplate& SignatureKeyTemplates::EcdsaP384Sha512() { function KeyTemplate (line 157) | const KeyTemplate& SignatureKeyTemplates::EcdsaP521() { function KeyTemplate (line 166) | const KeyTemplate& SignatureKeyTemplates::EcdsaP256Raw() { function KeyTemplate (line 176) | const KeyTemplate& SignatureKeyTemplates::EcdsaP256Ieee() { function KeyTemplate (line 185) | const KeyTemplate& SignatureKeyTemplates::EcdsaP384Ieee() { function KeyTemplate (line 194) | const KeyTemplate& SignatureKeyTemplates::EcdsaP521Ieee() { function KeyTemplate (line 203) | const KeyTemplate& SignatureKeyTemplates::RsaSsaPkcs13072Sha256F4() { function KeyTemplate (line 210) | const KeyTemplate& SignatureKeyTemplates::RsaSsaPkcs14096Sha512F4() { function KeyTemplate (line 217) | const KeyTemplate& SignatureKeyTemplates::RsaSsaPss3072Sha256Sha256F... function KeyTemplate (line 226) | const KeyTemplate& SignatureKeyTemplates::RsaSsaPss4096Sha512Sha512F... function KeyTemplate (line 235) | const KeyTemplate& SignatureKeyTemplates::RsaSsaPss4096Sha384Sha384F... FILE: cc/signature/signature_key_templates.h function namespace (line 24) | namespace crypto { FILE: cc/signature/signature_key_templates_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { function TEST (line 60) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithDerEncoding) { function TEST (line 218) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithIeeeEncoding) { function TEST (line 301) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithRsaSsaPkcs13072Sha25... function TEST (line 332) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithRsaSsaPkcs14096Sha51... function TEST (line 362) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithRsaSsaPss3072Sha256S... function TEST (line 395) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithRsaSsaPss4096Sha384S... function TEST (line 428) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithRsaSsaPss4096Sha512S... function TEST (line 462) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithEd25519) { function TEST (line 485) | TEST(SignatureKeyTemplatesTest, KeyTemplatesWithEd25519WithRawOutput) { FILE: cc/signature/signature_parameters.h function namespace (line 22) | namespace crypto { FILE: cc/signature/signature_pem_keyset_reader.cc type crypto (line 50) | namespace crypto { type tink (line 51) | namespace tink { function SetRsaSsaPssParameters (line 72) | util::Status SetRsaSsaPssParameters(const PemKeyParams& pem_parameters, function SetEcdsaParameters (line 89) | util::Status SetEcdsaParameters(const PemKeyParams& pem_parameters, function NewKeysetKey (line 132) | Keyset::Key NewKeysetKey(uint32_t key_id, absl::string_view key_type, function NewRsaSsaPrivateKey (line 151) | util::StatusOr NewRsaSsaPrivateKey( function RsaSsaPkcs1PrivateKey (line 190) | RsaSsaPkcs1PrivateKey NewRsaSsaPkcs1PrivateKey( function AddRsaSsaPrivateKey (line 224) | util::Status AddRsaSsaPrivateKey(const PemKey& pem_key, Keyset* keys... function AddEcdsaPublicKey (line 285) | util::Status AddEcdsaPublicKey(const PemKey& pem_key, Keyset* keyset) { function AddRsaSsaPublicKey (line 319) | util::Status AddRsaSsaPublicKey(const PemKey& pem_key, Keyset* keyse... FILE: cc/signature/signature_pem_keyset_reader.h function namespace (line 31) | namespace crypto { FILE: cc/signature/signature_pem_keyset_reader_test.cc type crypto (line 51) | namespace crypto { type tink (line 52) | namespace tink { function EcdsaPublicKey (line 150) | EcdsaPublicKey GetExpectedEcdsaPublicKeyProto(EcdsaSignatureEncoding... function GetRsaSsaPssPublicKeyProto (line 164) | util::StatusOr GetRsaSsaPssPublicKeyProto( function GetRsaSsaPssPrivateKeyProto (line 189) | util::StatusOr GetRsaSsaPssPrivateKeyProto( function PemKey (line 232) | PemKey CreatePemKey(absl::string_view serialized_key, function TEST (line 245) | TEST(SignaturePemKeysetReaderTest, BuildEmptyPemArray) { function TEST (line 254) | TEST(SignaturePemKeysetReaderTest, ReadEncryptedUnsupported) { function TEST (line 271) | TEST(SignaturePemKeysetReaderTest, ReadRsaCorrectPublicKey) { function TEST (line 337) | TEST(SignaturePemKeysetReaderTest, ReadRsaCorrectPrivateKey) { function TEST (line 403) | TEST(SignaturePemKeysetReaderTest, ReadRsaPrivateKeyKeyTypeMismatch) { function TEST (line 421) | TEST(SignaturePemKeysetReaderTest, ReadRsaPublicKeyKeyTypeMismatch) { function TEST (line 439) | TEST(SignaturePemKeysetReaderTest, ReadRsaPublicKeyTooSmall) { function TEST (line 458) | TEST(SignaturePemKeysetReaderTest, ReadRsaPublicKeySizeMismatch) { function TEST (line 476) | TEST(SignaturePemKeysetReaderTest, ReadRsaPublicKeyInvalidHashType) { function TEST (line 493) | TEST(SignaturePemKeysetReaderTest, ReadECDSACorrectPublicKey) { function TEST (line 552) | TEST(SignaturePemKeysetReaderTest, ReadECDSAWrongHashType) { function TEST (line 567) | TEST(SignaturePemKeysetReaderTest, ReadECDSAWrongKeySize) { function TEST (line 582) | TEST(SignaturePemKeysetReaderTest, ReadECDSAWrongAlgorithm) { function TEST (line 597) | TEST(SignaturePemKeysetReaderTest, ReadEd25519ShouldFail) { function TEST (line 612) | TEST(SignaturePemKeysetReaderTest, ReadSecp256k1ShouldFail) { function TEST (line 641) | TEST(SignaturePemKeysetReaderTest, ReadEcdsaP384ShouldFail) { FILE: cc/signature/signature_private_key.h function namespace (line 27) | namespace crypto { FILE: cc/signature/signature_public_key.h function namespace (line 24) | namespace crypto { FILE: cc/streaming_aead.h function namespace (line 28) | namespace crypto { FILE: cc/streaming_mac.h function namespace (line 28) | namespace crypto { FILE: cc/streamingaead/aes_ctr_hmac_streaming_key_manager.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function Status (line 44) | Status ValidateParams(const AesCtrHmacStreamingParams& params) { function Status (line 117) | Status AesCtrHmacStreamingKeyManager::ValidateKey( function Status (line 128) | Status AesCtrHmacStreamingKeyManager::ValidateKeyFormat( FILE: cc/streamingaead/aes_ctr_hmac_streaming_key_manager.h function namespace (line 42) | namespace crypto { FILE: cc/streamingaead/aes_ctr_hmac_streaming_key_manager_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { function TEST (line 59) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKey) { function TEST (line 71) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyDerivedKeySizes) { function TEST (line 91) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyDerivedKeyWrongVe... function TEST (line 104) | TEST(AesCtrHmacStreamingKeyManagerTest, GetPrimitive) { function TEST (line 143) | TEST(AesCtrHmacStreamingKeyManagerTest, Version) { function TEST (line 147) | TEST(AesCtrHmacStreamingKeyManagerTest, KeyMaterialType) { function TEST (line 152) | TEST(AesCtrHmacStreamingKeyManagerTest, KeyType) { function TEST (line 158) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyFormatEmpty) { function TEST (line 164) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyFormat) { function TEST (line 177) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyFormatSmallKey) { function TEST (line 191) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyFormatWrongHash) { function TEST (line 204) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyFormatWrongHmacHa... function TEST (line 216) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyFormatSmallSegmen... function TEST (line 230) | TEST(AesCtrHmacStreamingKeyManagerTest, ValidateKeyFormatTooLargeSeg... function TEST (line 244) | TEST(AesCtrHmacStreamingKeyManagerTest, CreateKey) { function TEST (line 269) | TEST(AesCtrHmacStreamingKeyManagerTest, DeriveKey) { function TEST (line 293) | TEST(AesCtrHmacStreamingKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 310) | TEST(AesCtrHmacStreamingKeyManagerTest, DeriveKeyWrongVersion) { FILE: cc/streamingaead/aes_gcm_hkdf_streaming_key_manager.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function Status (line 44) | Status ValidateParams(const AesGcmHkdfStreamingParams& params) { function Status (line 94) | Status AesGcmHkdfStreamingKeyManager::ValidateKey( function Status (line 105) | Status AesGcmHkdfStreamingKeyManager::ValidateKeyFormat( FILE: cc/streamingaead/aes_gcm_hkdf_streaming_key_manager.h function namespace (line 42) | namespace crypto { FILE: cc/streamingaead/aes_gcm_hkdf_streaming_key_manager_test.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { function TEST (line 62) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKey) { function TEST (line 72) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKeyDerivedKeySizes) { function TEST (line 90) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKeyDerivedKeyWrongVe... function TEST (line 101) | TEST(AesGcmHkdfStreamingKeyManagerTest, GetPrimitive) { function TEST (line 139) | TEST(AesGcmHkdfStreamingKeyManagerTest, Version) { function TEST (line 143) | TEST(AesGcmHkdfStreamingKeyManagerTest, KeyMaterialType) { function TEST (line 148) | TEST(AesGcmHkdfStreamingKeyManagerTest, KeyType) { function TEST (line 154) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKeyFormatEmpty) { function TEST (line 160) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKeyFormat) { function TEST (line 170) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKeyFormatSmallKey) { function TEST (line 181) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKeyFormatWrongHash) { function TEST (line 191) | TEST(AesGcmHkdfStreamingKeyManagerTest, ValidateKeyFormatSmallSegmen... function TEST (line 202) | TEST(AesGcmHkdfStreamingKeyManagerTest, CreateKey) { function TEST (line 220) | TEST(AesGcmHkdfStreamingKeyManagerTest, DeriveKey) { function TEST (line 244) | TEST(AesGcmHkdfStreamingKeyManagerTest, DeriveKeyNotEnoughRandomness) { function TEST (line 261) | TEST(AesGcmHkdfStreamingKeyManagerTest, DeriveKeyWrongVersion) { FILE: cc/streamingaead/buffered_input_stream.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type streamingaead (line 35) | namespace streamingaead { FILE: cc/streamingaead/buffered_input_stream.h function namespace (line 28) | namespace crypto { FILE: cc/streamingaead/buffered_input_stream_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type streamingaead (line 40) | namespace streamingaead { function GetInputStream (line 52) | std::unique_ptr GetInputStream(absl::string_view cont... function ReadFromStream (line 64) | util::Status ReadFromStream(InputStream* input_stream, int count, function TEST (line 92) | TEST(BufferedInputStreamTest, ReadingAndRewinding) { function TEST (line 141) | TEST(BufferedInputStreamTest, SingleBackup) { function TEST (line 216) | TEST(BufferedInputStreamTest, MultipleBackups) { function TEST (line 249) | TEST(BufferedInputStreamTest, DisableRewindingInitially) { function TEST (line 288) | TEST(BufferedInputStreamTest, DisableRewindingAfterRewind) { FILE: cc/streamingaead/config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function Configuration (line 26) | const Configuration& ConfigStreamingAeadV0() { FILE: cc/streamingaead/config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/streamingaead/config_v0_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { function TEST_P (line 58) | TEST_P(ConfigV0Test, GetPrimitive) { FILE: cc/streamingaead/decrypting_input_stream.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type streamingaead (line 41) | namespace streamingaead { FILE: cc/streamingaead/decrypting_input_stream.h function namespace (line 32) | namespace crypto { FILE: cc/streamingaead/decrypting_input_stream_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type streamingaead (line 47) | namespace streamingaead { function GetInputStream (line 64) | std::unique_ptr GetInputStream(absl::string_view cont... function GetCiphertextSource (line 76) | std::unique_ptr GetCiphertextSource(StreamingAead* sa... type StreamingAeadSpec (line 103) | struct StreamingAeadSpec { function GetTestStreamingAeadSet (line 111) | std::shared_ptr> GetTestStreamingAeadSet( function TEST (line 133) | TEST(DecryptingInputStreamTest, BasicDecryption) { function TEST (line 176) | TEST(DecryptingInputStreamTest, WrongAssociatedData) { function TEST (line 206) | TEST(DecryptingInputStreamTest, WrongCiphertext) { FILE: cc/streamingaead/decrypting_random_access_stream.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type streamingaead (line 39) | namespace streamingaead { FILE: cc/streamingaead/decrypting_random_access_stream.h function namespace (line 36) | namespace crypto { FILE: cc/streamingaead/decrypting_random_access_stream_test.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { type streamingaead (line 51) | namespace streamingaead { function GetCiphertextSource (line 66) | std::unique_ptr GetCiphertextSource( type StreamingAeadSpec (line 87) | struct StreamingAeadSpec { function GetTestStreamingAeadSet (line 95) | std::shared_ptr> GetTestStreamingAeadSet( function TEST (line 117) | TEST(DecryptingRandomAccessStreamTest, BasicDecryption) { function TEST (line 164) | TEST(DecryptingRandomAccessStreamTest, SelectiveDecryption) { function TEST (line 222) | TEST(DecryptingRandomAccessStreamTest, OutOfRangeDecryption) { function TEST (line 281) | TEST(DecryptingRandomAccessStreamTest, WrongAssociatedData) { function TEST (line 312) | TEST(DecryptingRandomAccessStreamTest, WrongCiphertext) { function TEST (line 343) | TEST(DecryptingRandomAccessStreamTest, NullPrimitiveSet) { function TEST (line 353) | TEST(DecryptingRandomAccessStreamTest, NullCiphertextSource) { function TEST (line 365) | TEST(DecryptingRandomAccessStreamTest, CallSizeBeforePReadWorks) { FILE: cc/streamingaead/internal/config_v0.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type internal (line 29) | namespace internal { function AddStreamingAeadV0 (line 31) | util::Status AddStreamingAeadV0(Configuration& config) { FILE: cc/streamingaead/internal/config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/streamingaead/internal/config_v0_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { type internal (line 50) | namespace internal { function TEST (line 58) | TEST(StreamingAeadV0Test, PrimitiveWrappers) { function TEST (line 68) | TEST(StreamingAeadV0Test, KeyManagers) { function TEST (line 87) | TEST(StreamingAeadV0Test, GetPrimitive) { FILE: cc/streamingaead/internal/key_gen_config_v0.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type internal (line 28) | namespace internal { function AddStreamingAeadKeyGenV0 (line 30) | util::Status AddStreamingAeadKeyGenV0(KeyGenConfiguration& config) { FILE: cc/streamingaead/internal/key_gen_config_v0.h function namespace (line 23) | namespace crypto { FILE: cc/streamingaead/key_gen_config_v0.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function KeyGenConfiguration (line 26) | const KeyGenConfiguration& KeyGenConfigStreamingAeadV0() { FILE: cc/streamingaead/key_gen_config_v0.h function namespace (line 22) | namespace crypto { FILE: cc/streamingaead/shared_input_stream.h function namespace (line 25) | namespace crypto { FILE: cc/streamingaead/shared_input_stream_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type streamingaead (line 41) | namespace streamingaead { function GetInputStream (line 51) | std::unique_ptr GetInputStream(absl::string_view cont... function ReadFromStream (line 63) | util::Status ReadFromStream(InputStream* input_stream, int count, function TEST (line 91) | TEST(SharedInputStreamTest, BasicOperations) { function TEST (line 138) | TEST(SharedInputStreamTest, SingleBackup) { function TEST (line 192) | TEST(SharedInputStreamTest, MultipleBackups) { FILE: cc/streamingaead/shared_random_access_stream.h function namespace (line 27) | namespace crypto { FILE: cc/streamingaead/shared_random_access_stream_test.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type streamingaead (line 32) | namespace streamingaead { function TEST (line 35) | TEST(SharedRandomAccessStreamTest, ReadingStreams) { FILE: cc/streamingaead/streaming_aead_config.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { FILE: cc/streamingaead/streaming_aead_config.h function namespace (line 24) | namespace crypto { FILE: cc/streamingaead/streaming_aead_config_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { class StreamingAeadConfigTest (line 49) | class StreamingAeadConfigTest : public ::testing::Test { method SetUp (line 51) | void SetUp() override { Registry::Reset(); } function TEST_F (line 54) | TEST_F(StreamingAeadConfigTest, Basic) { function TEST_F (line 80) | TEST_F(StreamingAeadConfigTest, WrappersRegistered) { function TEST_F (line 105) | TEST_F(StreamingAeadConfigTest, RegisterNonFipsTemplates) { FILE: cc/streamingaead/streaming_aead_key_templates.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { function KeyTemplate (line 36) | KeyTemplate* NewAesGcmHkdfStreamingKeyTemplate(int ikm_size_in_bytes, function KeyTemplate (line 52) | KeyTemplate* NewAesCtrHmacStreamingKeyTemplate(int ikm_size_in_bytes, function KeyTemplate (line 74) | const KeyTemplate& StreamingAeadKeyTemplates::Aes128GcmHkdf4KB() { function KeyTemplate (line 81) | const KeyTemplate& StreamingAeadKeyTemplates::Aes256GcmHkdf4KB() { function KeyTemplate (line 88) | const KeyTemplate& StreamingAeadKeyTemplates::Aes256GcmHkdf1MB() { function KeyTemplate (line 95) | const KeyTemplate& StreamingAeadKeyTemplates::Aes128CtrHmacSha256Seg... function KeyTemplate (line 102) | const KeyTemplate& StreamingAeadKeyTemplates::Aes128CtrHmacSha256Seg... function KeyTemplate (line 109) | const KeyTemplate& StreamingAeadKeyTemplates::Aes256CtrHmacSha256Seg... function KeyTemplate (line 116) | const KeyTemplate& StreamingAeadKeyTemplates::Aes256CtrHmacSha256Seg... FILE: cc/streamingaead/streaming_aead_key_templates.h function namespace (line 22) | namespace crypto { FILE: cc/streamingaead/streaming_aead_key_templates_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { function TEST (line 43) | TEST(Aes128GcmHkdf4KBTest, TypeUrl) { function TEST (line 51) | TEST(Aes128GcmHkdf4KBTest, OutputPrefixType) { function TEST (line 57) | TEST(Aes128GcmHkdf4KBTest, SameReference) { function TEST (line 63) | TEST(Aes128GcmHkdf4KBTest, WorksWithKeyTypeManager) { function TEST (line 72) | TEST(Aes128GcmHkdf4KBTest, CheckValues) { function TEST (line 83) | TEST(Aes256GcmHkdf4KBTest, TypeUrl) { function TEST (line 91) | TEST(Aes256GcmHkdf4KBTest, OutputPrefixType) { function TEST (line 97) | TEST(Aes256GcmHkdf4KBTest, SameReference) { function TEST (line 103) | TEST(Aes256GcmHkdf4KBTest, WorksWithKeyTypeManager) { function TEST (line 112) | TEST(Aes256GcmHkdf4KBTest, CheckValues) { function TEST (line 123) | TEST(Aes256GcmHkdf1MBTest, TypeUrl) { function TEST (line 131) | TEST(Aes256GcmHkdf1MBTest, OutputPrefixType) { function TEST (line 137) | TEST(Aes256GcmHkdf1MBTest, SameReference) { function TEST (line 143) | TEST(Aes256GcmHkdf1MBTest, WorksWithKeyTypeManager) { function TEST (line 152) | TEST(Aes256GcmHkdf1MBTest, CheckValues) { function TEST (line 163) | TEST(Aes128CtrHmacSha256Segment4KBTest, TypeUrl) { function TEST (line 172) | TEST(Aes128CtrHmacSha256Segment4KBTest, OutputPrefixType) { function TEST (line 178) | TEST(Aes128CtrHmacSha256Segment4KBTest, SameReference) { function TEST (line 184) | TEST(Aes128CtrHmacSha256Segment4KBTest, WorksWithKeyTypeManager) { function TEST (line 193) | TEST(Aes128CtrHmacSha256Segment4KBTest, CheckValues) { function TEST (line 206) | TEST(Aes128CtrHmacSha256Segment1MBTest, TypeUrl) { function TEST (line 215) | TEST(Aes128CtrHmacSha256Segment1MBTest, OutputPrefixType) { function TEST (line 221) | TEST(Aes128CtrHmacSha256Segment1MBTest, SameReference) { function TEST (line 227) | TEST(Aes128CtrHmacSha256Segment1MBTest, WorksWithKeyTypeManager) { function TEST (line 236) | TEST(Aes128CtrHmacSha256Segment1MBTest, CheckValues) { function TEST (line 249) | TEST(Aes256CtrHmacSha256Segment4KBTest, TypeUrl) { function TEST (line 258) | TEST(Aes256CtrHmacSha256Segment4KBTest, OutputPrefixType) { function TEST (line 264) | TEST(Aes256CtrHmacSha256Segment4KBTest, SameReference) { function TEST (line 270) | TEST(Aes256CtrHmacSha256Segment4KBTest, WorksWithKeyTypeManager) { function TEST (line 279) | TEST(Aes256CtrHmacSha256Segment4KBTest, CheckValues) { function TEST (line 292) | TEST(Aes256CtrHmacSha256Segment1MBTest, TypeUrl) { function TEST (line 301) | TEST(Aes256CtrHmacSha256Segment1MBTest, OutputPrefixType) { function TEST (line 307) | TEST(Aes256CtrHmacSha256Segment1MBTest, SameReference) { function TEST (line 313) | TEST(Aes256CtrHmacSha256Segment1MBTest, WorksWithKeyTypeManager) { function TEST (line 322) | TEST(Aes256CtrHmacSha256Segment1MBTest, CheckValues) { FILE: cc/streamingaead/streaming_aead_wrapper.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { function Status (line 45) | Status Validate(PrimitiveSet* primitives) { class StreamingAeadSetWrapper (line 57) | class StreamingAeadSetWrapper: public StreamingAead { method StreamingAeadSetWrapper (line 59) | explicit StreamingAeadSetWrapper( FILE: cc/streamingaead/streaming_aead_wrapper.h function namespace (line 29) | namespace crypto { FILE: cc/streamingaead/streaming_aead_wrapper_test.cc type crypto (line 59) | namespace crypto { type tink (line 60) | namespace tink { type StreamingAeadSpec (line 77) | struct StreamingAeadSpec { function GetTestStreamingAeadSet (line 86) | std::unique_ptr> GetTestStreamingAeadSet( function TEST (line 107) | TEST(StreamingAeadSetWrapperTest, WrapNullptr) { function TEST (line 116) | TEST(StreamingAeadSetWrapperTest, WrapEmpty) { function TEST (line 125) | TEST(StreamingAeadSetWrapperTest, BasicEncryptionAndDecryption) { function TEST (line 181) | TEST(StreamingAeadSetWrapperTest, DecryptionWithRandomAccessStream) { function TEST (line 237) | TEST(StreamingAeadSetWrapperTest, DecryptionAfterWrapperIsDestroyed) { function TEST (line 295) | TEST(StreamingAeadSetWrapperTest, EncryptWithTink) { function TEST (line 355) | TEST(StreamingAeadSetWrapperTest, DecryptOldKeyWorks) { function TEST (line 448) | TEST(StreamingAeadSetWrapperTest, DecryptOldKeyWorksWithRandomAccess) { FILE: cc/subtle/aead_test_util.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { function EncryptThenDecrypt (line 33) | crypto::tink::util::Status EncryptThenDecrypt(const Aead& encrypter, function EncryptThenDecrypt (line 49) | crypto::tink::util::Status EncryptThenDecrypt(const CordAead& encryp... FILE: cc/subtle/aead_test_util.h function namespace (line 24) | namespace crypto { FILE: cc/subtle/aead_test_util_test.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function TEST (line 31) | TEST(EncryptThenDecrypt, Basic) { function TEST (line 36) | TEST(EncryptThenDecrypt, DifferentAeads) { FILE: cc/subtle/aes_cmac_boringssl.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type subtle (line 44) | namespace subtle { FILE: cc/subtle/aes_cmac_boringssl.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/aes_cmac_boringssl_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { function TEST (line 56) | TEST(AesCmacBoringSslTest, Basic) { function TEST (line 83) | TEST(AesCmacBoringSslTest, Modification) { function TEST (line 106) | TEST(AesCmacBoringSslTest, Truncation) { function TEST (line 127) | TEST(AesCmacBoringSslTest, BasicSmallTag) { function TEST (line 155) | TEST(AesCmacBoringSslTest, ModificationSmallTag) { function TEST (line 179) | TEST(AesCmacBoringSslTest, TruncationOrAdditionSmallTag) { function TEST (line 206) | TEST(AesCmacBoringSslTest, InvalidKeySizes) { function TEST (line 223) | TEST(AesCmacBoringSslTest, InvalidTagSizes) { class AesCmacBoringSslTestVectorTest (line 240) | class AesCmacBoringSslTestVectorTest method ExpectCmacVerifyHex (line 245) | void ExpectCmacVerifyHex(absl::string_view key_hex, absl::string... function TEST_P (line 258) | TEST_P(AesCmacBoringSslTestVectorTest, RfcTestVectors) { function TEST (line 278) | TEST(AesCmacBoringSslTest, TestFipsOnly) { FILE: cc/subtle/aes_ctr_boringssl.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { FILE: cc/subtle/aes_ctr_boringssl.h function namespace (line 31) | namespace crypto { FILE: cc/subtle/aes_ctr_boringssl_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type subtle (line 36) | namespace subtle { function TEST (line 42) | TEST(AesCtrBoringSslTest, TestEncryptDecrypt) { function TEST (line 63) | TEST(AesCtrBoringSslTest, TestEncryptDecrypt_randomMessage) { function TEST (line 86) | TEST(AesCtrBoringSslTest, TestEncryptDecrypt_randomKey_randomMessa... function TEST (line 108) | TEST(AesCtrBoringSslTest, TestEncryptDecrypt_invalidIvSize) { function TEST (line 125) | TEST(AesCtrBoringSslTest, TestNistTestVector) { function TEST (line 146) | TEST(AesCtrBoringSslTest, TestMultipleEncrypt) { function TEST (line 163) | TEST(AesCtrBoringSslTest, TestFipsOnly) { function TEST (line 178) | TEST(AesCtrBoringSslTest, TestFipsFailWithoutBoringCrypto) { FILE: cc/subtle/aes_ctr_hmac_streaming.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { type subtle (line 51) | namespace subtle { function NonceForSegment (line 53) | static std::string NonceForSegment(absl::string_view nonce_prefix, function DeriveKeys (line 62) | static util::Status DeriveKeys(const util::SecretData& ikm, HashTy... function Validate (line 80) | static util::Status Validate(const AesCtrHmacStreaming::Params& pa... function MakeHeader (line 150) | static std::string MakeHeader(absl::string_view salt, FILE: cc/subtle/aes_ctr_hmac_streaming.h function namespace (line 38) | namespace crypto { FILE: cc/subtle/aes_ctr_hmac_streaming_test.cc type crypto (line 51) | namespace crypto { type tink (line 52) | namespace tink { type subtle (line 53) | namespace subtle { function ValidParams (line 56) | AesCtrHmacStreaming::Params ValidParams() { function TEST (line 68) | TEST(AesCtrHmacStreamSegmentEncrypterTest, Basic) { function TEST (line 139) | TEST(AesCtrHmacStreamSegmentEncrypterTest, EncryptLongPlaintext) { function TEST (line 158) | TEST(AesCtrHmacStreamSegmentEncrypterTest, EncryptNullCtBuffer) { function TEST (line 176) | TEST(AesCtrHmacStreamSegmentDecrypterTest, Basic) { function TEST (line 259) | TEST(AesCtrHmacStreamSegmentDecrypterTest, AlreadyInit) { function TEST (line 280) | TEST(AesCtrHmacStreamSegmentDecrypterTest, InitWrongHeaderSize) { function TEST (line 301) | TEST(AesCtrHmacStreamSegmentDecrypterTest, InitCorruptedHeader) { function TEST (line 322) | TEST(AesCtrHmacStreamSegmentDecrypterTest, DecryptNotInit) { function TEST (line 345) | TEST(AesCtrHmacStreamSegmentDecrypterTest, DecryptLongCiphertext) { function TEST (line 369) | TEST(AesCtrHmacStreamSegmentDecrypterTest, DecryptNullPtBuffer) { function TEST (line 392) | TEST(AesCtrHmacStreamingTest, Basic) { function TEST (line 444) | TEST(ValidateTest, ValidParams) { function TEST (line 452) | TEST(ValidateTest, WrongIkm) { function TEST (line 463) | TEST(ValidateTest, WrongHkdfAlgo) { function TEST (line 474) | TEST(ValidateTest, WrongKeySize) { function TEST (line 486) | TEST(ValidateTest, WrongCtSegmentSize) { function TEST (line 502) | TEST(ValidateTest, WrongCtOffset) { function TEST (line 513) | TEST(ValidateTest, WrongTagSize) { function TEST (line 543) | TEST(AesCtrHmacStreamingTest, SizeIsNotAuthenticated) { function TEST (line 570) | TEST(ValidateTest, WrongTagAlgo) { function TEST (line 582) | TEST(AesCtrHmacStreamingTest, TestFipsOnly) { FILE: cc/subtle/aes_eax_boringssl.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type subtle (line 49) | namespace subtle { function Load64 (line 55) | uint64_t Load64(const uint8_t src[8]) { function Store64 (line 61) | void Store64(uint64_t val, uint8_t dst[8]) { std::memcpy(dst, &val... function ByteSwap (line 63) | uint64_t ByteSwap(uint64_t val) { function BigEndianLoad64 (line 70) | uint64_t BigEndianLoad64(const uint8_t src[8]) { function BigEndianStore64 (line 80) | void BigEndianStore64(uint64_t val, uint8_t dst[8]) { function InitAesKey (line 90) | crypto::tink::util::StatusOr> InitA... FILE: cc/subtle/aes_eax_boringssl.h function namespace (line 37) | namespace crypto { FILE: cc/subtle/aes_eax_boringssl_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { function TEST (line 47) | TEST(AesEaxBoringSslTest, TestBasic) { function TEST (line 68) | TEST(AesEaxBoringSslTest, TestMessageSize) { function TEST (line 91) | TEST(AesEaxBoringSslTest, TestAssociatedDataSize) { function TEST (line 114) | TEST(AesEaxBoringSslTest, TestLongNonce) { function TEST (line 135) | TEST(AesEaxBoringSslTest, TestModification) { function TEST (line 168) | TEST(AesEaxBoringSslTest, TestInvalidKeySizes) { function TEST (line 184) | TEST(AesEaxBoringSslTest, TestEmpty) { function GetError (line 244) | static std::string GetError() { function WycheproofTest (line 262) | bool WycheproofTest(const rapidjson::Document& root) { function TEST (line 316) | TEST(AesEaxBoringSslTest, TestVectors) { function TEST (line 326) | TEST(AesEaxBoringSslTest, TestFipsOnly) { FILE: cc/subtle/aes_gcm_boringssl.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type subtle (line 34) | namespace subtle { FILE: cc/subtle/aes_gcm_boringssl.h function namespace (line 30) | namespace crypto { FILE: cc/subtle/aes_gcm_boringssl_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { class AesGcmBoringSslTest (line 58) | class AesGcmBoringSslTest : public Test { method SetUp (line 60) | void SetUp() override { function TEST_F (line 75) | TEST_F(AesGcmBoringSslTest, BasicEncryptDecrypt) { function TEST_F (line 86) | TEST_F(AesGcmBoringSslTest, ModifyMessageAndAssociatedData) { function TestDecryptWithEmptyAssociatedData (line 115) | void TestDecryptWithEmptyAssociatedData(Aead* cipher, absl::string... function TEST_F (line 137) | TEST_F(AesGcmBoringSslTest, AssociatedDataEmptyVersusNullStringVie... function TEST_F (line 157) | TEST_F(AesGcmBoringSslTest, MessageEmptyVersusNullStringView) { function TEST_F (line 186) | TEST_F(AesGcmBoringSslTest, BothMessageAndAssociatedDataEmpty) { function TEST_F (line 217) | TEST_F(AesGcmBoringSslTest, InvalidKeySizes) { function TEST (line 230) | TEST(AesGcmBoringSslFipsTest, FipsOnly) { function TEST (line 245) | TEST(AesGcmBoringSslFipsTest, FipsFailWithoutBoringCrypto) { class AesGcmBoringSslWycheproofTest (line 262) | class AesGcmBoringSslWycheproofTest method SetUp (line 264) | void SetUp() override { function TEST_P (line 280) | TEST_P(AesGcmBoringSslWycheproofTest, Decrypt) { FILE: cc/subtle/aes_gcm_hkdf_stream_segment_decrypter.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type subtle (line 46) | namespace subtle { function ByteSwap (line 50) | uint32_t ByteSwap(uint32_t val) { function BigEndianStore32 (line 55) | void BigEndianStore32(uint8_t dst[4], uint32_t val) { function Validate (line 64) | util::Status Validate(const AesGcmHkdfStreamSegmentDecrypter::Para... FILE: cc/subtle/aes_gcm_hkdf_stream_segment_decrypter.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/aes_gcm_hkdf_stream_segment_decrypter_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type subtle (line 41) | namespace subtle { function GetEncrypter (line 44) | util::StatusOr> GetEncrypter( function TEST (line 60) | TEST(AesGcmHkdfStreamSegmentDecrypterTest, testBasic) { function TEST (line 156) | TEST(AesGcmHkdfStreamSegmentDecrypterTest, testWrongDerivedKeySize) { function TEST (line 181) | TEST(AesGcmHkdfStreamSegmentDecrypterTest, testWrongIkmSize) { function TEST (line 207) | TEST(AesGcmHkdfStreamSegmentDecrypterTest, testWrongCiphertextOffs... function TEST (line 232) | TEST(AesGcmHkdfStreamSegmentDecrypterTest, testWrongCiphertextSegm... FILE: cc/subtle/aes_gcm_hkdf_stream_segment_encrypter.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type subtle (line 44) | namespace subtle { function ByteSwap (line 48) | uint32_t ByteSwap(uint32_t val) { function BigEndianStore32 (line 53) | void BigEndianStore32(uint8_t dst[4], uint32_t val) { function Validate (line 62) | util::Status Validate(const AesGcmHkdfStreamSegmentEncrypter::Para... function CreateHeader (line 86) | std::vector CreateHeader(absl::string_view salt, function ConstructNonce (line 100) | std::string ConstructNonce(absl::string_view nonce_prefix, FILE: cc/subtle/aes_gcm_hkdf_stream_segment_encrypter.h function namespace (line 31) | namespace crypto { FILE: cc/subtle/aes_gcm_hkdf_stream_segment_encrypter_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type subtle (line 36) | namespace subtle { function TEST (line 41) | TEST(AesGcmHkdfStreamSegmentEncrypterTest, testBasic) { function TEST (line 104) | TEST(AesGcmHkdfStreamSegmentEncrypterTest, testWrongKeySize) { function TEST (line 127) | TEST(AesGcmHkdfStreamSegmentEncrypterTest, testWrongSaltSize) { function TEST (line 147) | TEST(AesGcmHkdfStreamSegmentEncrypterTest, testWrongCiphertextOffs... function TEST (line 167) | TEST(AesGcmHkdfStreamSegmentEncrypterTest, testWrongCiphertextSegm... FILE: cc/subtle/aes_gcm_hkdf_streaming.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { function Validate (line 42) | util::Status Validate(const AesGcmHkdfStreaming::Params& params) { FILE: cc/subtle/aes_gcm_hkdf_streaming.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/aes_gcm_hkdf_streaming_test.cc type crypto (line 45) | namespace crypto { type tink (line 46) | namespace tink { type subtle (line 47) | namespace subtle { function TEST (line 55) | TEST(AesGcmHkdfStreamingTest, testBasic) { function TEST (line 108) | TEST(AesGcmHkdfStreamingTest, testIkmSmallerThanDerivedKey) { function TEST (line 126) | TEST(AesGcmHkdfStreamingTest, testIkmSize) { function TEST (line 146) | TEST(AesGcmHkdfStreamingTest, testWrongHkdfHash) { function TEST (line 165) | TEST(AesGcmHkdfStreamingTest, testWrongDerivedKeySize) { function TEST (line 184) | TEST(AesGcmHkdfStreamingTest, testWrongCiphertextOffset) { function TEST (line 203) | TEST(AesGcmHkdfStreamingTest, testWrongCiphertextSegmentSize) { function TEST (line 222) | TEST(AesGcmHkdfStreamingTest, SizeIsUnauthenticated) { function TEST (line 255) | TEST(AesGcmHkdfStreamingTest, TestFipsOnly) { FILE: cc/subtle/aes_gcm_siv_boringssl.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type subtle (line 41) | namespace subtle { FILE: cc/subtle/aes_gcm_siv_boringssl.h function namespace (line 31) | namespace crypto { FILE: cc/subtle/aes_gcm_siv_boringssl_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { function TEST (line 60) | TEST(AesGcmSivBoringSslTest, EncryptDecrypt) { function TEST (line 86) | TEST(AesGcmSivBoringSslTest, DecryptFailsIfCiphertextTooSmall) { function TEST (line 107) | TEST(AesGcmSivBoringSslTest, TestFipsOnly) { class AesGcmSivBoringSslWycheproofTest (line 127) | class AesGcmSivBoringSslWycheproofTest method SetUp (line 129) | void SetUp() override { function TEST_P (line 148) | TEST_P(AesGcmSivBoringSslWycheproofTest, Decrypt) { FILE: cc/subtle/aes_siv_boringssl.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type subtle (line 45) | namespace subtle { function InitializeAesKey (line 48) | crypto::tink::util::StatusOr> Initi... FILE: cc/subtle/aes_siv_boringssl.h function namespace (line 36) | namespace crypto { FILE: cc/subtle/aes_siv_boringssl_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { function TEST (line 45) | TEST(AesSivBoringSslTest, testCarryComputation) { function TEST (line 61) | TEST(AesSivBoringSslTest, testEncryptDecrypt) { function TEST (line 80) | TEST(AesSivBoringSslTest, testNullPtrStringView) { function TEST (line 113) | TEST(AesSivBoringSslTest, testEncryptDecryptKeySizes) { function TEST (line 136) | TEST(AesSivBoringSslTest, testEncryptDecryptMessageSize) { function TEST (line 166) | TEST(AesSivBoringSslTest, testEncryptDecryptAssociatedDataSize) { function TEST (line 187) | TEST(AesSivBoringSslTest, testDecryptModification) { function WycheproofTest (line 216) | void WycheproofTest(const rapidjson::Document& root) { function TEST (line 265) | TEST(AesSivBoringSslTest, TestVectors) { function TEST (line 274) | TEST(AesEaxBoringSslTest, TestFipsOnly) { FILE: cc/subtle/common_enums.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { type subtle (line 25) | namespace subtle { function EnumToString (line 27) | std::string EnumToString(EllipticCurveType type) { function EnumToString (line 44) | std::string EnumToString(EcPointFormat format) { function EnumToString (line 59) | std::string EnumToString(HashType type) { FILE: cc/subtle/common_enums.h function namespace (line 22) | namespace crypto { FILE: cc/subtle/common_enums_test.cc type crypto (line 20) | namespace crypto { type tink (line 21) | namespace tink { type subtle (line 22) | namespace subtle { class CommonEnumsTest (line 25) | class CommonEnumsTest : public ::testing::Test {} function TEST_F (line 27) | TEST_F(CommonEnumsTest, testEllipticCurveTypeToString) { function TEST_F (line 34) | TEST_F(CommonEnumsTest, testHashTypeToString) { function TEST_F (line 43) | TEST_F(CommonEnumsTest, testEcPointFormatToString) { FILE: cc/subtle/decrypting_random_access_stream.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type subtle (line 41) | namespace subtle { function ABSL_EXCLUSIVE_LOCKS_REQUIRED (line 127) | ABSL_EXCLUSIVE_LOCKS_REQUIRED(status_mutex_) { FILE: cc/subtle/decrypting_random_access_stream.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/decrypting_random_access_stream_test.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type subtle (line 49) | namespace subtle { class DummyRandomAccessStream (line 61) | class DummyRandomAccessStream : public RandomAccessStream { method DummyRandomAccessStream (line 63) | explicit DummyRandomAccessStream(int64_t size, int ct_offset) method PRead (line 66) | crypto::tink::util::Status PRead( method size (line 79) | crypto::tink::util::StatusOr size() override { return s... function GetCiphertext (line 88) | std::string GetCiphertext(StreamingAead* saead, absl::string_view pt, function GetCiphertextSource (line 110) | std::unique_ptr GetCiphertextSource(StreamingA... function TEST (line 118) | TEST(DecryptingRandomAccessStreamTest, NegativeCiphertextOffset) { function TEST (line 135) | TEST(DecryptingRandomAccessStreamTest, function TEST (line 155) | TEST(DecryptingRandomAccessStreamTest, TooManySegments) { function TEST (line 183) | TEST(DecryptingRandomAccessStreamTest, BasicDecryption) { function TEST (line 216) | TEST(DecryptingRandomAccessStreamTest, SelectiveDecryption) { function TEST (line 264) | TEST(DecryptingRandomAccessStreamTest, TruncatedCiphertextDecrypti... function TEST (line 310) | TEST(DecryptingRandomAccessStreamTest, OutOfRangeDecryption) { function TEST (line 353) | TEST(DecryptingRandomAccessStreamTest, WrongCiphertext) { function TEST (line 377) | TEST(DecryptingRandomAccessStreamTest, NullSegmentDecrypter) { function TEST (line 387) | TEST(DecryptingRandomAccessStreamTest, NullCiphertextSource) { FILE: cc/subtle/ec_util.h function namespace (line 29) | namespace crypto { FILE: cc/subtle/ecdsa_sign_boringssl.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { FILE: cc/subtle/ecdsa_sign_boringssl.h function namespace (line 33) | namespace crypto { FILE: cc/subtle/ecdsa_sign_boringssl_test.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { class EcdsaSignBoringSslTest (line 46) | class EcdsaSignBoringSslTest : public ::testing::Test {} function TEST_F (line 48) | TEST_F(EcdsaSignBoringSslTest, testBasicSigning) { function TEST_F (line 89) | TEST_F(EcdsaSignBoringSslTest, testEncodingsMismatch) { function TEST_F (line 120) | TEST_F(EcdsaSignBoringSslTest, testSignatureSizesWithIEEE_P1364Enc... function TEST_F (line 154) | TEST_F(EcdsaSignBoringSslTest, testNewErrors) { function TEST_F (line 169) | TEST_F(EcdsaSignBoringSslTest, TestFipsFailWithoutBoringCrypto) { FILE: cc/subtle/ecdsa_verify_boringssl.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type subtle (line 45) | namespace subtle { FILE: cc/subtle/ecdsa_verify_boringssl.h function namespace (line 34) | namespace crypto { FILE: cc/subtle/ecdsa_verify_boringssl_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { class EcdsaVerifyBoringSslTest (line 48) | class EcdsaVerifyBoringSslTest : public ::testing::Test {} function TEST_F (line 50) | TEST_F(EcdsaVerifyBoringSslTest, BasicSigning) { function TEST_F (line 92) | TEST_F(EcdsaVerifyBoringSslTest, EncodingsMismatch) { function TEST_F (line 128) | TEST_F(EcdsaVerifyBoringSslTest, NewErrors) { function GetVerifier (line 140) | static util::StatusOr> GetVe... function TestSignatures (line 160) | bool TestSignatures(const std::string& filename, bool allow_skipping, function TEST_F (line 225) | TEST_F(EcdsaVerifyBoringSslTest, WycheproofCurveP256) { function TEST_F (line 234) | TEST_F(EcdsaVerifyBoringSslTest, WycheproofCurveP384) { function TEST_F (line 243) | TEST_F(EcdsaVerifyBoringSslTest, WycheproofCurveP521) { function TEST_F (line 252) | TEST_F(EcdsaVerifyBoringSslTest, WycheproofWithIeeeP1363Encoding) { function TEST_F (line 262) | TEST_F(EcdsaVerifyBoringSslTest, TestFipsFailWithoutBoringCrypto) { FILE: cc/subtle/ecies_hkdf_recipient_kem_boringssl.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type subtle (line 41) | namespace subtle { FILE: cc/subtle/ecies_hkdf_recipient_kem_boringssl.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/ecies_hkdf_recipient_kem_boringssl_test.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type subtle (line 36) | namespace subtle { class EciesHkdfRecipientKemBoringSslTest (line 41) | class EciesHkdfRecipientKemBoringSslTest : public ::testing::Test {} type TestVector (line 43) | struct TestVector { function TEST_F (line 81) | TEST_F(EciesHkdfRecipientKemBoringSslTest, TestBasic) { function TEST_F (line 102) | TEST_F(EciesHkdfRecipientKemBoringSslTest, TestNewUnimplementedCur... class EciesHkdfNistPCurveRecipientKemBoringSslTest (line 112) | class EciesHkdfNistPCurveRecipientKemBoringSslTest : public ::test... function TEST_F (line 114) | TEST_F(EciesHkdfNistPCurveRecipientKemBoringSslTest, TestNew) { function TEST_F (line 125) | TEST_F(EciesHkdfNistPCurveRecipientKemBoringSslTest, TestNewInvali... function TEST_F (line 137) | TEST_F(EciesHkdfNistPCurveRecipientKemBoringSslTest, TestNewEmptyP... function TEST_F (line 147) | TEST_F(EciesHkdfNistPCurveRecipientKemBoringSslTest, TestGenerateK... class EciesHkdfX25519RecipientKemBoringSslTest (line 169) | class EciesHkdfX25519RecipientKemBoringSslTest : public ::testing:... function TEST_F (line 171) | TEST_F(EciesHkdfX25519RecipientKemBoringSslTest, TestNew) { function TEST_F (line 182) | TEST_F(EciesHkdfX25519RecipientKemBoringSslTest, TestNewInvalidCur... function TEST_F (line 194) | TEST_F(EciesHkdfX25519RecipientKemBoringSslTest, TestNewShortKey) { function TEST_F (line 208) | TEST_F(EciesHkdfNistPCurveRecipientKemBoringSslTest, TestFipsOnly) { function TEST_F (line 220) | TEST_F(EciesHkdfX25519RecipientKemBoringSslTest, TestFipsOnly) { FILE: cc/subtle/ecies_hkdf_sender_kem_boringssl.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { FILE: cc/subtle/ecies_hkdf_sender_kem_boringssl.h function namespace (line 33) | namespace crypto { FILE: cc/subtle/ecies_hkdf_sender_kem_boringssl_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { class EciesHkdfSenderKemBoringSslTest (line 48) | class EciesHkdfSenderKemBoringSslTest : public ::testing::Test {} type TestVector (line 50) | struct TestVector { function TEST_F (line 85) | TEST_F(EciesHkdfSenderKemBoringSslTest, TestSenderRecipientBasic) { function TEST_F (line 118) | TEST_F(EciesHkdfSenderKemBoringSslTest, TestNewUnknownCurve) { class EciesHkdfNistPCurveSendKemBoringSslTest (line 128) | class EciesHkdfNistPCurveSendKemBoringSslTest : public ::testing::... function TEST_F (line 130) | TEST_F(EciesHkdfNistPCurveSendKemBoringSslTest, TestNew) { function TEST_F (line 143) | TEST_F(EciesHkdfNistPCurveSendKemBoringSslTest, TestNewInvalidCurv... function TEST_F (line 157) | TEST_F(EciesHkdfNistPCurveSendKemBoringSslTest, TestGenerateKey) { class EciesHkdfX25519SendKemBoringSslTest (line 180) | class EciesHkdfX25519SendKemBoringSslTest : public ::testing::Test {} function TEST_F (line 182) | TEST_F(EciesHkdfX25519SendKemBoringSslTest, TestNew) { function TEST_F (line 195) | TEST_F(EciesHkdfX25519SendKemBoringSslTest, TestNewInvalidCurve) { function TEST_F (line 209) | TEST_F(EciesHkdfX25519SendKemBoringSslTest, TestNewPubxTooLong) { function TEST_F (line 224) | TEST_F(EciesHkdfX25519SendKemBoringSslTest, TestNewPubyNotEmpty) { function TEST_F (line 239) | TEST_F(EciesHkdfX25519SendKemBoringSslTest, TestGenerateKey) { function TEST_F (line 262) | TEST_F(EciesHkdfX25519SendKemBoringSslTest, TestGenerateKeyUncompr... function TEST_F (line 283) | TEST_F(EciesHkdfNistPCurveSendKemBoringSslTest, TestFipsOnly) { function TEST_F (line 297) | TEST_F(EciesHkdfX25519SendKemBoringSslTest, TestFipsOnly) { FILE: cc/subtle/ed25519_sign_boringssl.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { FILE: cc/subtle/ed25519_sign_boringssl.h function namespace (line 33) | namespace crypto { FILE: cc/subtle/ed25519_sign_boringssl_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { class Ed25519SignBoringSslTest (line 51) | class Ed25519SignBoringSslTest : public ::testing::Test {} type Ed25519KeyPair (line 53) | struct Ed25519KeyPair { function NewKeyPair (line 58) | util::StatusOr NewKeyPair() { function TEST_F (line 69) | TEST_F(Ed25519SignBoringSslTest, testBasicSign) { function TEST_F (line 115) | TEST_F(Ed25519SignBoringSslTest, testInvalidPrivateKeys) { function TEST_F (line 133) | TEST_F(Ed25519SignBoringSslTest, testMessageEmptyVersusNullStringV... type TestVector (line 175) | struct TestVector { function TEST_F (line 182) | TEST_F(Ed25519SignBoringSslTest, testWithTestVectors) { function TEST_F (line 340) | TEST_F(Ed25519SignBoringSslTest, testFipsMode) { FILE: cc/subtle/ed25519_verify_boringssl.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { FILE: cc/subtle/ed25519_verify_boringssl.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/ed25519_verify_boringssl_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { class Ed25519VerifyBoringSslTest (line 54) | class Ed25519VerifyBoringSslTest : public Test { method SetUp (line 56) | void SetUp() override { type TestVector (line 65) | struct TestVector { function GetTestVectors (line 73) | std::vector GetTestVectors() { function TEST_F (line 171) | TEST_F(Ed25519VerifyBoringSslTest, InvalidPublicKey) { function TEST_F (line 190) | TEST_F(Ed25519VerifyBoringSslTest, MessageEmptyVersusNullStringVie... function TEST_P (line 216) | TEST_P(Ed25519VerifyBoringSslParamsTest, VerifiesCorrectly) { function GetVerifier (line 233) | static util::StatusOr> GetVerifier( function TestSignatures (line 248) | bool TestSignatures(const std::string& filename, bool allow_skippi... function TEST_F (line 312) | TEST_F(Ed25519VerifyBoringSslTest, WycheproofCurve25519) { function TEST (line 316) | TEST(Ed25519VerifyBoringSslFipsTest, testFipsMode) { FILE: cc/subtle/encrypt_then_authenticate.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type subtle (line 38) | namespace subtle { function longToBigEndianStr (line 40) | static std::string longToBigEndianStr(uint64_t value) { FILE: cc/subtle/encrypt_then_authenticate.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/encrypt_then_authenticate_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { type TestVector (line 47) | struct TestVector { function createAead2 (line 94) | util::StatusOr> createAead2( function createAead (line 115) | util::StatusOr> createAead(int encryption_ke... function TEST (line 126) | TEST(AesGcmBoringSslTest, testRfcVectors) { function TEST (line 143) | TEST(EncryptThenAuthenticateTest, testEncryptDecrypt) { function TEST (line 163) | TEST(EncryptThenAuthenticateTest, testEncryptDecrypt_randomMessage) { function TEST (line 185) | TEST(AesCtrBoringSslTest, testMultipleEncrypt) { function TEST (line 202) | TEST(EncryptThenAuthenticateTest, testEncryptDecrypt_invalidTagSiz... function TEST (line 212) | TEST(EncryptThenAuthenticateTest, testDecrypt_modifiedCiphertext) { function TEST (line 248) | TEST(EncryptThenAuthenticateTest, testParamsEmptyVersusNullStringV... function TEST (line 280) | TEST(EncryptThenAuthenticateTest, testAuthBypassShouldNotWork) { FILE: cc/subtle/hkdf.cc type crypto (line 47) | namespace crypto { type tink (line 48) | namespace tink { type subtle (line 49) | namespace subtle { function SslHkdf (line 54) | util::Status SslHkdf(const EVP_MD *evp_md, absl::string_view ikm, FILE: cc/subtle/hkdf.h function namespace (line 29) | namespace crypto { FILE: cc/subtle/hkdf_test.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type subtle (line 32) | namespace subtle { class HkdfTest (line 35) | class HkdfTest : public ::testing::Test {} type TestVector (line 37) | struct TestVector { function TEST_F (line 98) | TEST_F(HkdfTest, testBasic) { function TEST_F (line 109) | TEST_F(HkdfTest, testBasicSecretData) { function TEST_F (line 123) | TEST_F(HkdfTest, testLongOutput) { function TEST_F (line 134) | TEST_F(HkdfTest, ComputeEciesHkdfSecretData) { FILE: cc/subtle/hmac_boringssl.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { FILE: cc/subtle/hmac_boringssl.h function namespace (line 35) | namespace crypto { FILE: cc/subtle/hmac_boringssl_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { class HmacBoringSslTest (line 44) | class HmacBoringSslTest : public ::testing::Test { method HmacVerifyHex (line 48) | bool HmacVerifyHex(HashType hash, uint32_t tag_size, function TEST_F (line 63) | TEST_F(HmacBoringSslTest, testBasic) { function TEST_F (line 99) | TEST_F(HmacBoringSslTest, testModification) { function TEST_F (line 124) | TEST_F(HmacBoringSslTest, testTruncation) { function TEST_F (line 147) | TEST_F(HmacBoringSslTest, testInvalidKeySizes) { function TEST_F (line 166) | TEST_F(HmacBoringSslTest, TestFipsFailWithoutBoringCrypto) { FILE: cc/subtle/hybrid_test_util.cc type crypto (line 25) | namespace crypto { type tink (line 26) | namespace tink { function HybridEncryptThenDecrypt (line 28) | crypto::tink::util::Status HybridEncryptThenDecrypt( FILE: cc/subtle/hybrid_test_util.h function namespace (line 28) | namespace crypto { FILE: cc/subtle/hybrid_test_util_test.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function TEST (line 33) | TEST(EncryptThenDecrypt, Basic) { function TEST (line 41) | TEST(EncryptThenDecrypt, Failing) { FILE: cc/subtle/ind_cpa_cipher.h function namespace (line 25) | namespace crypto { FILE: cc/subtle/mac/stateful_mac.h function namespace (line 37) | namespace crypto { FILE: cc/subtle/nonce_based_streaming_aead.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type subtle (line 36) | namespace subtle { FILE: cc/subtle/nonce_based_streaming_aead.h function namespace (line 31) | namespace crypto { FILE: cc/subtle/pem_parser_boringssl.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type subtle (line 46) | namespace subtle { function VerifyRsaKey (line 52) | util::Status VerifyRsaKey(const RSA* rsa_key) { function VerifyEcdsaKey (line 67) | util::Status VerifyEcdsaKey(const EC_KEY* ecdsa_key) { function EcKeyToSslEcPublicKey (line 82) | util::Status EcKeyToSslEcPublicKey( function EcKeyToSslEcPrivateKey (line 120) | util::Status EcKeyToSslEcPrivateKey( function ConvertBioToString (line 147) | util::StatusOr ConvertBioToString(BIO* bio) { function ScalarSizeInBytes (line 161) | size_t ScalarSizeInBytes(const EC_GROUP* group) { function FieldElementSizeInBytes (line 165) | size_t FieldElementSizeInBytes(const EC_GROUP* group) { function FailingPassphraseCallback (line 172) | static int FailingPassphraseCallback(char* buf, int buf_size, int ... FILE: cc/subtle/pem_parser_boringssl.h function namespace (line 27) | namespace crypto { FILE: cc/subtle/pem_parser_boringssl_test.cc type crypto (line 49) | namespace crypto { type tink (line 50) | namespace tink { type subtle (line 51) | namespace subtle { type EcKeyTestVector (line 80) | struct EcKeyTestVector { function GetEcKeyTestVectors (line 92) | std::vector GetEcKeyTestVectors() { type RsaKeyTestVector (line 285) | struct RsaKeyTestVector { function GetRsaKeyTestVectors (line 302) | std::vector GetRsaKeyTestVectors() { class PemParserRsaTest (line 389) | class PemParserRsaTest : public Test { method PemParserRsaTest (line 391) | PemParserRsaTest() : rsa_(RSA_new()) {} method SetUp (line 393) | void SetUp() override { method ExpectBnEqual (line 430) | void ExpectBnEqual(absl::string_view bn_str, const BIGNUM *bn) { function Corrupt (line 447) | void Corrupt(ContainerType *container) { function TEST_F (line 458) | TEST_F(PemParserRsaTest, ReadRsaPublicKey) { function TEST_F (line 471) | TEST_F(PemParserRsaTest, ReadRsaPrivatekey) { function TEST_P (line 501) | TEST_P(ParametrizedPemParserRsaTest, WriteRsaPrivateKey) { function TEST_P (line 525) | TEST_P(ParametrizedPemParserRsaTest, WriteRsaPublicKey) { function TEST_F (line 540) | TEST_F(PemParserRsaTest, ReadRsaPublicKeyInvalid) { function TEST_F (line 549) | TEST_F(PemParserRsaTest, ReadRsaPrivateKeyInvalid) { function TEST_P (line 560) | TEST_P(ParametrizedPemParserEcTest, ReadEcPublicKeySuccess) { function TEST_P (line 574) | TEST_P(ParametrizedPemParserEcTest, ReadEcPrivateKeySuccess) { function TEST_P (line 592) | TEST_P(ParametrizedPemParserEcTest, ReadEcPublicKeyInvalid) { function TEST_P (line 603) | TEST_P(ParametrizedPemParserEcTest, ReadEcPrivateKeyInvalid) { function TEST_P (line 613) | TEST_P(ParametrizedPemParserEcTest, WriteEcPublicKeySucceeds) { function TEST_P (line 631) | TEST_P(ParametrizedPemParserEcTest, WriteEcPrivateKeySucceeds) { function TEST (line 653) | TEST(PemParserEcTest, NewKeyWriteAndReadPublicKeySuccess) { function TEST (line 668) | TEST(PemParserEcTest, NewKeyWriteAndReadPrivateKeySuccess) { function TEST (line 686) | TEST(PemParserEcTest, ReadEcPublicKeyP224_Unimplemented) { function TEST (line 699) | TEST(PemParserEcTest, ReadInvalidEcPublicKey) { function TEST (line 706) | TEST(PemParserEcTest, ReadInvalidEcPrivateKey) { function TEST (line 715) | TEST(PemParserEcTest, ReadEcPublicKeyFailsBecauseSecp256k1Unsuppor... function TEST (line 748) | TEST(PemParserEcTest, ReadEcPrivateKeyFailsBecauseSecp256k1Unsuppo... function TEST (line 775) | TEST(PemParserEcTest, ParseEncryptedEcPrivateKey_Invalid) { function TEST (line 794) | TEST(PemParserEcTest, WriteEcPublicKeyWithBadXFails) { function TEST (line 805) | TEST(PemParserEcTest, WriteEcPublicKeyWithBadYFails) { function TEST (line 815) | TEST(PemParserEcTest, WriteEcPrivateKeyWithBadPrivFails) { FILE: cc/subtle/prf/hkdf_streaming_prf.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type subtle (line 45) | namespace subtle { class HkdfInputStream (line 49) | class HkdfInputStream : public InputStream { method HkdfInputStream (line 51) | HkdfInputStream(const EVP_MD *digest, const util::SecretData &se... method Next (line 57) | crypto::tink::util::StatusOr Next(const void **data) overri... method BackUp (line 76) | void BackUp(int count) override { method Position (line 80) | int64_t Position() const override { method Init (line 86) | util::Status Init(const EVP_MD *digest, const util::SecretData &... method returnDataFromPosition (line 124) | int returnDataFromPosition(const void **data) { method UpdateTi (line 136) | util::Status UpdateTi() { FILE: cc/subtle/prf/hkdf_streaming_prf.h function namespace (line 33) | namespace crypto { FILE: cc/subtle/prf/hkdf_streaming_prf_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { function TEST (line 60) | TEST(HkdfStreamingPrf, Basic) { function TEST (line 76) | TEST(HkdfStreamingPrf, EmptySalt) { function TEST (line 113) | TEST(HkdfStreamingPrf, DifferentInputsGiveDifferentvalues) { function TEST (line 134) | TEST(HkdfStreamingPrf, SameInputTwice) { function TEST (line 161) | TEST(HkdfStreamingPrf, BackupFullStream) { function TEST (line 194) | TEST(HkdfStreamingPrf, BackupHalf) { function TEST (line 229) | TEST(HkdfStreamingPrf, PositionOneRead) { function TEST (line 244) | TEST(HkdfStreamingPrf, PositionSingleRead) { function TEST (line 262) | TEST(HkdfStreamingPrf, PositionTwoReads) { function TEST (line 284) | TEST(HkdfStreamingPrf, BackupSingleRead) { function TEST (line 303) | TEST(HkdfStreamingPrf, BackupSecondRead) { function TEST (line 327) | TEST(HkdfStreamingPrf, PartialBackup) { function TEST (line 349) | TEST(HkdfStreamingPrf, ExhaustInput) { function TEST (line 370) | TEST(HkdfStreamingPrf, TestVector1) { function ComputeWithHkdfStreamingPrf (line 394) | crypto::tink::util::StatusOr ComputeWithHkdfStreaming... function TEST (line 406) | TEST(HkdfStreamingPrf, TestVector2) { function TEST (line 444) | TEST(HkdfStreamingPrf, TestVector3) { function TEST (line 465) | TEST(HkdfStreamingPrf, TestVector4) { function TEST (line 486) | TEST(HkdfStreamingPrf, TestVector5) { function TEST (line 524) | TEST(HkdfStreamingPrf, TestVector6) { function TEST (line 545) | TEST(HkdfStreamingPrf, TestVector7) { function TEST (line 567) | TEST(HkdfStreamingPrf, TestAgainstHkdfUtil) { function TEST (line 589) | TEST(HkdfStreamingPrf, TestFipsOnly) { FILE: cc/subtle/prf/prf_set_util.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type subtle (line 36) | namespace subtle { class PrfFromStreamingPrf (line 39) | class PrfFromStreamingPrf : public Prf { method PrfFromStreamingPrf (line 41) | explicit PrfFromStreamingPrf(std::unique_ptr strea... method Compute (line 43) | util::StatusOr Compute(absl::string_view input, class PrfFromStatefulMacFactory (line 58) | class PrfFromStatefulMacFactory : public Prf { method PrfFromStatefulMacFactory (line 60) | explicit PrfFromStatefulMacFactory( method Compute (line 63) | util::StatusOr Compute(absl::string_view input, function CreatePrfFromStreamingPrf (line 94) | std::unique_ptr CreatePrfFromStreamingPrf( function CreatePrfFromStatefulMacFactory (line 99) | std::unique_ptr CreatePrfFromStatefulMacFactory( FILE: cc/subtle/prf/prf_set_util.h function namespace (line 25) | namespace crypto { FILE: cc/subtle/prf/prf_set_util_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type subtle (line 41) | namespace subtle { class MockPrf (line 54) | class MockPrf : public Prf { class MockStatefulMac (line 60) | class MockStatefulMac : public StatefulMac { class FakeStatefulMacFactory (line 66) | class FakeStatefulMacFactory : public StatefulMacFactory { method FakeStatefulMacFactory (line 68) | FakeStatefulMacFactory(util::Status update_status, method Create (line 71) | util::StatusOr> Create() const over... class MockStreamingPrf (line 84) | class MockStreamingPrf : public StreamingPrf { function GetInputStreamForString (line 90) | std::unique_ptr GetInputStreamForString(const std::st... class PrfFromStatefulMacFactoryTest (line 95) | class PrfFromStatefulMacFactoryTest : public ::testing::Test { method SetUpWithResult (line 97) | void SetUpWithResult(util::Status update_status, method Prf (line 103) | Prf* prf() { return prf_.get(); } function TEST_F (line 109) | TEST_F(PrfFromStatefulMacFactoryTest, ComputePrf) { function TEST_F (line 116) | TEST_F(PrfFromStatefulMacFactoryTest, ComputePrfUpdateFails) { function TEST_F (line 124) | TEST_F(PrfFromStatefulMacFactoryTest, ComputePrfFinalizeFails) { function TEST_F (line 132) | TEST_F(PrfFromStatefulMacFactoryTest, ComputePrfTooMuchOutputReque... class PrfFromStreamingPrfTest (line 138) | class PrfFromStreamingPrfTest : public ::testing::Test { method SetUp (line 140) | void SetUp() override { method Prf (line 147) | Prf* prf() { return prf_.get(); } function TEST_F (line 153) | TEST_F(PrfFromStreamingPrfTest, ComputePrfBasic) { function TEST_F (line 159) | TEST_F(PrfFromStreamingPrfTest, ComputeTwice) { function TEST_F (line 168) | TEST_F(PrfFromStreamingPrfTest, ComputeSubstring) { function TEST_F (line 180) | TEST_F(PrfFromStreamingPrfTest, ComputeTooMuch) { FILE: cc/subtle/prf/streaming_prf.h function namespace (line 24) | namespace crypto { FILE: cc/subtle/prf/streaming_prf_wrapper.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { class StreamingPrfSetWrapper (line 36) | class StreamingPrfSetWrapper : public StreamingPrf { method StreamingPrfSetWrapper (line 38) | explicit StreamingPrfSetWrapper( method ComputePrf (line 42) | std::unique_ptr ComputePrf( FILE: cc/subtle/prf/streaming_prf_wrapper.h function namespace (line 27) | namespace crypto { FILE: cc/subtle/prf/streaming_prf_wrapper_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { class DummyStreamingPrf (line 51) | class DummyStreamingPrf : public StreamingPrf { method DummyStreamingPrf (line 53) | explicit DummyStreamingPrf(absl::string_view name) : name_(name) {} method ComputePrf (line 54) | std::unique_ptr ComputePrf( function TEST (line 65) | TEST(AeadSetWrapperTest, WrapNullptr) { function TEST (line 72) | TEST(KeysetDeriverWrapperTest, WrapEmpty) { function TEST (line 80) | TEST(KeysetDeriverWrapperTest, WrapSingle) { function TEST (line 102) | TEST(KeysetDeriverWrapperTest, WrapNonRaw) { function TEST (line 120) | TEST(KeysetDeriverWrapperTest, WrapMultiple) { FILE: cc/subtle/random.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type subtle (line 33) | namespace subtle { function UintType (line 38) | UintType GetRandomUint() { FILE: cc/subtle/random.h function namespace (line 29) | namespace crypto { FILE: cc/subtle/random_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type subtle (line 33) | namespace subtle { function TEST (line 44) | TEST(RandomTest, MultipleFilledBuffersAreUnique) { function TEST (line 55) | TEST(RandomTest, MultipleGeneratedRandomStringAreUnique) { function TEST (line 67) | TEST(RandomTest, MultipleGeneratedSecretDataAreUnique) { function TEST (line 78) | TEST(RandomTest, KeyBytesRandomGenerationIsUniform) { function TEST (line 95) | TEST(RandomTest, UInt8RandomGenerationIsUniform) { function TEST (line 112) | TEST(RandomTest, UInt16RandomGenerationIsUniform) { function TEST (line 129) | TEST(RandomTest, UInt32RandomGenerationIsUniform) { FILE: cc/subtle/rsa_ssa_pkcs1_sign_boringssl.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type subtle (line 45) | namespace subtle { FILE: cc/subtle/rsa_ssa_pkcs1_sign_boringssl.h function namespace (line 34) | namespace crypto { FILE: cc/subtle/rsa_ssa_pkcs1_sign_boringssl_test.cc type crypto (line 35) | namespace crypto { type tink (line 36) | namespace tink { type subtle (line 37) | namespace subtle { class RsaPkcs1SignBoringsslTest (line 45) | class RsaPkcs1SignBoringsslTest : public ::testing::Test { method RsaPkcs1SignBoringsslTest (line 47) | RsaPkcs1SignBoringsslTest() : rsa_f4_(BN_new()) { function TEST_F (line 61) | TEST_F(RsaPkcs1SignBoringsslTest, EncodesPkcs1) { function TEST_F (line 81) | TEST_F(RsaPkcs1SignBoringsslTest, EncodesPkcs1WithSeparateHashes) { function TEST_F (line 101) | TEST_F(RsaPkcs1SignBoringsslTest, RejectsUnsafeHash) { function TEST_F (line 111) | TEST_F(RsaPkcs1SignBoringsslTest, RejectsInvalidCrtParams) { function TEST_F (line 146) | TEST_F(RsaPkcs1SignBoringsslTest, TestFipsFailWithoutBoringCrypto) { function TEST_F (line 157) | TEST_F(RsaPkcs1SignBoringsslTest, TestRestrictedFipsModuli) { function TEST_F (line 174) | TEST_F(RsaPkcs1SignBoringsslTest, TestAllowedFipsModuli) { FILE: cc/subtle/rsa_ssa_pkcs1_verify_boringssl.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { FILE: cc/subtle/rsa_ssa_pkcs1_verify_boringssl.h function namespace (line 35) | namespace crypto { FILE: cc/subtle/rsa_ssa_pkcs1_verify_boringssl_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type subtle (line 46) | namespace subtle { class RsaSsaPkcs1VerifyBoringSslTest (line 52) | class RsaSsaPkcs1VerifyBoringSslTest : public ::testing::Test {} type NistTestVector (line 56) | struct NistTestVector { function TEST_F (line 91) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, BasicVerify) { function TEST_F (line 107) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, NewErrors) { function TEST_F (line 137) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, Modification) { function GetVerifier (line 173) | static util::StatusOr>... function TestSignatures (line 195) | bool TestSignatures(const std::string& filename, bool allow_skippi... function TEST_F (line 262) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, WycheproofRsaPkcs12048SHA25... function TEST_F (line 270) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, WycheproofRsaPkcs13072SHA25... function TEST_F (line 279) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, WycheproofRsaPkcs13072SHA51... function TEST_F (line 288) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, WycheproofRsaPkcs14096SHA51... function TEST_F (line 297) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, TestFipsFailWithoutBoringCr... function TEST_F (line 309) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, TestAllowedFipsModuli) { function TEST_F (line 328) | TEST_F(RsaSsaPkcs1VerifyBoringSslTest, TestRestrictedFipsModuli) { FILE: cc/subtle/rsa_ssa_pss_sign_boringssl.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type subtle (line 45) | namespace subtle { function SslRsaSsaPssSign (line 63) | util::StatusOr SslRsaSsaPssSign(RSA* rsa_private_key, FILE: cc/subtle/rsa_ssa_pss_sign_boringssl.h function namespace (line 35) | namespace crypto { FILE: cc/subtle/rsa_ssa_pss_sign_boringssl_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { type subtle (line 34) | namespace subtle { class RsaPssSignBoringsslTest (line 42) | class RsaPssSignBoringsslTest : public ::testing::Test { method RsaPssSignBoringsslTest (line 44) | RsaPssSignBoringsslTest() : rsa_f4_(BN_new()) { function TEST_F (line 58) | TEST_F(RsaPssSignBoringsslTest, EncodesPss) { function TEST_F (line 80) | TEST_F(RsaPssSignBoringsslTest, EncodesPssWithSeparateHashes) { function TEST_F (line 102) | TEST_F(RsaPssSignBoringsslTest, RejectsInvalidPaddingHash) { function TEST_F (line 114) | TEST_F(RsaPssSignBoringsslTest, RejectsUnsafePaddingHash) { function TEST_F (line 126) | TEST_F(RsaPssSignBoringsslTest, RejectsInvalidCrtParams) { function TEST_F (line 163) | TEST_F(RsaPssSignBoringsslTest, TestFipsFailWithoutBoringCrypto) { function TEST_F (line 176) | TEST_F(RsaPssSignBoringsslTest, TestRestrictedFipsModuli) { function TEST_F (line 194) | TEST_F(RsaPssSignBoringsslTest, TestAllowedFipsModuli) { FILE: cc/subtle/rsa_ssa_pss_verify_boringssl.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type subtle (line 44) | namespace subtle { function SslRsaSsaPssVerify (line 63) | util::Status SslRsaSsaPssVerify(RSA* rsa_public_key, FILE: cc/subtle/rsa_ssa_pss_verify_boringssl.h function namespace (line 34) | namespace crypto { FILE: cc/subtle/rsa_ssa_pss_verify_boringssl_test.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { type subtle (line 50) | namespace subtle { type NistTestVector (line 60) | struct NistTestVector { function NistTestVector (line 70) | NistTestVector GetNistTestVector() { function TEST (line 103) | TEST(RsaSsaPssVerifyBoringSslTest, BasicVerify) { function TEST (line 123) | TEST(RsaSsaPssVerifyBoringSslTest, NewErrors) { function TEST (line 157) | TEST(RsaSsaPssVerifyBoringSslTest, Modification) { type RsaSsaPssWycheproofTestVector (line 198) | struct RsaSsaPssWycheproofTestVector { function ReadTestVectors (line 213) | std::vector ReadTestVectors( function GetVerifier (line 242) | util::StatusOr> GetVerif... function TEST_P (line 257) | TEST_P(RsaSsaPssWycheproofTest, SignatureVerify) { function GetTestParameters (line 280) | std::vector GetTestParameters() { function TEST (line 309) | TEST(RsaSsaPssVerifyBoringSslTest, TestFipsFailWithoutBoringCrypto) { function TEST (line 325) | TEST(RsaSsaPssVerifyBoringSslTest, TestAllowedFipsModuli) { function TEST (line 346) | TEST(RsaSsaPssVerifyBoringSslTest, TestRestrictedFipsModuli) { FILE: cc/subtle/stateful_cmac_boringssl.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { FILE: cc/subtle/stateful_cmac_boringssl.h function namespace (line 36) | namespace crypto { FILE: cc/subtle/stateful_cmac_boringssl_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { function TEST (line 64) | TEST(StatefulCmacBoringSslTest, CmacEmptyInputRegularTagSize) { function TEST (line 75) | TEST(StatefulCmacBoringSslTest, CmacEmptyInputSmallTag) { function TEST (line 86) | TEST(StatefulCmacBoringSslTest, CmacSomeDataRegularTagSize) { function TEST (line 98) | TEST(StatefulCmacBoringSslTest, CmacSomeDataSmallTag) { function TEST (line 109) | TEST(StatefulCmacBoringSslTest, function TEST (line 124) | TEST(StatefulCmacBoringSslTest, function TEST (line 138) | TEST(StatefulCmacFactoryTest, FactoryGeneratesValidInstances) { type StatefulCmacTestVector (line 150) | struct StatefulCmacTestVector { function GetWycheproofCmakeTestVectors (line 159) | std::vector GetWycheproofCmakeTestVectors() { function TEST_P (line 185) | TEST_P(StatefulCmacBoringSslWycheproofTest, WycheproofTest) { FILE: cc/subtle/stateful_hmac_boringssl.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { FILE: cc/subtle/stateful_hmac_boringssl.h function namespace (line 36) | namespace crypto { FILE: cc/subtle/stateful_hmac_boringssl_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { type subtle (line 43) | namespace subtle { type TestVector (line 57) | struct TestVector { method TestVector (line 58) | TestVector(std::string test_name, std::string hex_key, HashType ... function GetTestVectors (line 76) | std::vector GetTestVectors() { function TEST_P (line 147) | TEST_P(StatefulHmacBoringSslTest, OnlyEmptyMessages) { function TEST_P (line 165) | TEST_P(StatefulHmacBoringSslTest, SingleUpdate) { function TEST_P (line 180) | TEST_P(StatefulHmacBoringSslTest, MultipleUpdates) { function TEST_P (line 206) | TEST_P(StatefulHmacBoringSslTest, MultipleUpdatesObjectFromFactory) { function TEST (line 237) | TEST(StatefulHmacBoringSslTest, InvalidKeySizes) { class StatefulHmacBoringSslTestVectorTest (line 254) | class StatefulHmacBoringSslTestVectorTest method StatefulHmacVerifyHex (line 259) | void StatefulHmacVerifyHex(const std::string &key_hex, FILE: cc/subtle/stream_segment_decrypter.h function namespace (line 25) | namespace crypto { FILE: cc/subtle/stream_segment_encrypter.h function namespace (line 25) | namespace crypto { FILE: cc/subtle/streaming_aead_decrypting_stream.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { function ReadFromStream (line 52) | util::Status ReadFromStream(InputStream* input_stream, int count, FILE: cc/subtle/streaming_aead_decrypting_stream.h function namespace (line 29) | namespace crypto { FILE: cc/subtle/streaming_aead_decrypting_stream_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type subtle (line 46) | namespace subtle { type ValidationRefs (line 51) | struct ValidationRefs { function GetDecryptingStream (line 57) | std::unique_ptr GetDecryptingStream( class StreamingAeadDecryptingStreamTest (line 77) | class StreamingAeadDecryptingStreamTest : public ::testing::Test { function TEST_F (line 80) | TEST_F(StreamingAeadDecryptingStreamTest, WritingStreams) { function TEST_F (line 129) | TEST_F(StreamingAeadDecryptingStreamTest, EmptyCiphertext) { function TEST_F (line 147) | TEST_F(StreamingAeadDecryptingStreamTest, InvalidStreamHeader) { function TEST_F (line 166) | TEST_F(StreamingAeadDecryptingStreamTest, TruncatedLastSegment) { function TEST_F (line 191) | TEST_F(StreamingAeadDecryptingStreamTest, OneSegmentPlaintext) { function TEST_F (line 223) | TEST_F(StreamingAeadDecryptingStreamTest, OneSegmentAndOneBytePlai... function TEST_F (line 263) | TEST_F(StreamingAeadDecryptingStreamTest, NextAfterBackUp) { function TEST_F (line 319) | TEST_F(StreamingAeadDecryptingStreamTest, BackupAndPosition) { FILE: cc/subtle/streaming_aead_encrypting_stream.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { type subtle (line 39) | namespace subtle { function WriteToStream (line 47) | util::Status WriteToStream(const std::vector& contents, function Status (line 164) | Status StreamingAeadEncryptingStream::Close() { FILE: cc/subtle/streaming_aead_encrypting_stream.h function namespace (line 29) | namespace crypto { FILE: cc/subtle/streaming_aead_encrypting_stream_test.cc type crypto (line 40) | namespace crypto { type tink (line 41) | namespace tink { type subtle (line 42) | namespace subtle { type ValidationRefs (line 52) | struct ValidationRefs { function GetEncryptingStream (line 59) | std::unique_ptr GetEncryptingStream( class StreamingAeadEncryptingStreamTest (line 79) | class StreamingAeadEncryptingStreamTest : public ::testing::Test { function TEST_F (line 82) | TEST_F(StreamingAeadEncryptingStreamTest, WritingStreams) { function TEST_F (line 133) | TEST_F(StreamingAeadEncryptingStreamTest, EmptyPlaintext) { function TEST_F (line 160) | TEST_F(StreamingAeadEncryptingStreamTest, EmptyPlaintextWithBackup) { function TEST_F (line 197) | TEST_F(StreamingAeadEncryptingStreamTest, OneSegmentPlaintext) { function TEST_F (line 230) | TEST_F(StreamingAeadEncryptingStreamTest, NextAfterBackup) { function TEST_F (line 277) | TEST_F(StreamingAeadEncryptingStreamTest, OneSegmentPlaintextWithB... function TEST_F (line 316) | TEST_F(StreamingAeadEncryptingStreamTest, ManySegmentsPlaintext) { function TEST_F (line 367) | TEST_F(StreamingAeadEncryptingStreamTest, ManySegmentsPlaintextWit... function TEST_F (line 422) | TEST_F(StreamingAeadEncryptingStreamTest, ManySegmentsPlaintextWit... function TEST_F (line 475) | TEST_F(StreamingAeadEncryptingStreamTest, BackupAndPosition) { FILE: cc/subtle/streaming_aead_test_util.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { function Status (line 52) | Status ReadAndVerifyFragment(RandomAccessStream* ras, int pos, int c... function EncryptThenDecrypt (line 85) | crypto::tink::util::Status EncryptThenDecrypt(StreamingAead* encrypter, FILE: cc/subtle/streaming_aead_test_util.h function namespace (line 24) | namespace crypto { FILE: cc/subtle/streaming_aead_test_util_test.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { function TEST (line 33) | TEST(EncryptThenDecrypt, Basic) { function TEST (line 41) | TEST(EncryptThenDecrypt, DifferentAeads) { FILE: cc/subtle/streaming_mac_impl.cc type crypto (line 36) | namespace crypto { type tink (line 37) | namespace tink { type subtle (line 38) | namespace subtle { class ComputeMacOutputStream (line 44) | class ComputeMacOutputStream : public OutputStreamWithResult mac) method Position (line 58) | int64_t Position() const override { return position_; } class VerifyMacOutputStream (line 123) | class VerifyMacOutputStream : public OutputStreamWithResult> Create() const over... function GetComputeMacOutputStream (line 62) | std::unique_ptr> function GetVerifyMacOutputStream (line 76) | std::unique_ptr> GetVerifyMac... function TEST (line 88) | TEST(StreamingMacImplTest, ComputeEmptyMac) { function TEST (line 98) | TEST(StreamingMacImplTest, ComputeSmallMac) { function TEST (line 115) | TEST(StreamingMacImplTest, ComputeRandMac) { function TEST (line 136) | TEST(StreamingMacImplTest, ComputeCheckStreamPosition) { function TEST (line 152) | TEST(StreamingMacImplTest, ComputeCloseTwiceError) { function TEST (line 164) | TEST(StreamingMacImplTest, VerifyEmptyMac) { function TEST (line 173) | TEST(StreamingMacImplTest, VerifySmallMac) { function TEST (line 189) | TEST(StreamingMacImplTest, VerifyEmptyMacFail) { function TEST (line 199) | TEST(StreamingMacImplTest, VerifySmallMacFail) { function TEST (line 215) | TEST(StreamingMacImplTest, VerifyRandMac) { function TEST (line 235) | TEST(StreamingMacImplTest, VerifyCheckStreamPosition) { function TEST (line 252) | TEST(StreamingMacImplTest, VerifyCloseTwiceError) { FILE: cc/subtle/subtle_util.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { type subtle (line 26) | namespace subtle { function BigEndian32 (line 28) | std::string BigEndian32(uint32_t val) { function ResizeStringUninitialized (line 37) | void ResizeStringUninitialized(std::string* s, size_t new_size) { FILE: cc/subtle/subtle_util.h function namespace (line 24) | namespace crypto { FILE: cc/subtle/subtle_util_boringssl.h function namespace (line 46) | namespace crypto { FILE: cc/subtle/subtle_util_test.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { type subtle (line 26) | namespace subtle { function TEST (line 30) | TEST(SubtleUtilTest, Basic) { function TEST (line 38) | TEST(SubtleUtilTest, ResizeStringUninitialized) { FILE: cc/subtle/test_util.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type subtle (line 31) | namespace subtle { type test (line 32) | namespace test { function WriteToStream (line 38) | util::Status WriteToStream(OutputStream* output_stream, function ReadFromStream (line 60) | util::Status ReadFromStream(InputStream* input_stream, std::stri... FILE: cc/subtle/test_util.h function namespace (line 38) | namespace crypto { FILE: cc/subtle/wycheproof_util.cc type crypto (line 38) | namespace crypto { type tink (line 39) | namespace tink { type subtle (line 40) | namespace subtle { function HexDecode (line 45) | util::StatusOr HexDecode(absl::string_view hex) { function HexDecodeOrDie (line 68) | std::string HexDecodeOrDie(absl::string_view hex) { function HashType (line 97) | HashType WycheproofUtil::GetHashType(const rapidjson::Value &val) { function EllipticCurveType (line 112) | EllipticCurveType WycheproofUtil::GetEllipticCurveType( FILE: cc/subtle/wycheproof_util.h function namespace (line 26) | namespace crypto { FILE: cc/subtle/xchacha20_poly1305_boringssl.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { type subtle (line 44) | namespace subtle { FILE: cc/subtle/xchacha20_poly1305_boringssl.h function namespace (line 32) | namespace crypto { FILE: cc/subtle/xchacha20_poly1305_boringssl_test.cc type crypto (line 39) | namespace crypto { type tink (line 40) | namespace tink { type subtle (line 41) | namespace subtle { function TEST (line 61) | TEST(XChacha20Poly1305BoringSslTest, EncryptDecrypt) { function TEST (line 92) | TEST(XChacha20Poly1305BoringSslTest, SimpleDecrypt) { function TEST (line 128) | TEST(XChacha20Poly1305BoringSslTest, DecryptFailsIfCiphertextTooSm... function TEST (line 150) | TEST(XChacha20Poly1305BoringSslTest, FailisOnFipsOnlyMode) { class XChacha20Poly1305BoringSslWycheproofTest (line 165) | class XChacha20Poly1305BoringSslWycheproofTest method SetUp (line 167) | void SetUp() override { function TEST_P (line 186) | TEST_P(XChacha20Poly1305BoringSslWycheproofTest, Decrypt) { FILE: cc/util/buffer.cc type crypto (line 26) | namespace crypto { type tink (line 27) | namespace tink { type util (line 28) | namespace util { class OwningBuffer (line 31) | class OwningBuffer : public Buffer { method OwningBuffer (line 37) | explicit OwningBuffer(int allocated_size) method allocated_size (line 46) | int allocated_size() const override { return allocated_size_; } method size (line 48) | int size() const override { return size_; } method set_size (line 50) | util::Status set_size(int new_size) override { class NonOwningBuffer (line 68) | class NonOwningBuffer : public Buffer { method NonOwningBuffer (line 77) | NonOwningBuffer(char* mem_block, int allocated_size) method allocated_size (line 83) | int allocated_size() const override { return allocated_size_; } method size (line 85) | int size() const override { return size_; } method set_size (line 87) | util::Status set_size(int new_size) override { FILE: cc/util/buffer.h function namespace (line 26) | namespace crypto { FILE: cc/util/buffer_test.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type util (line 33) | namespace util { function TEST (line 40) | TEST(BufferTest, ExternalMemoryBlock) { function TEST (line 63) | TEST(BufferTest, InternalMemoryBlock) { function TEST (line 83) | TEST(BufferTest, NullMemoryBlock) { function TEST (line 89) | TEST(BufferTest, BadAllocatedSize_ExternalMemoryBlock) { function TEST (line 100) | TEST(BufferTest, BadAllocatedSize_InternalMemoryBlock) { function TEST (line 110) | TEST(BufferTest, BadNewSize_ExternalMemoryBlock) { function TEST (line 123) | TEST(BufferTest, BadNewSize_InternalMemoryBlock) { FILE: cc/util/constants.cc type crypto (line 20) | namespace crypto { type tink (line 21) | namespace tink { FILE: cc/util/constants.h function namespace (line 19) | namespace crypto { FILE: cc/util/enums.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { type util (line 31) | namespace util { FILE: cc/util/enums.h function namespace (line 27) | namespace crypto { FILE: cc/util/enums_test.cc type crypto (line 29) | namespace crypto { type tink (line 33) | namespace tink { class EnumsTest (line 36) | class EnumsTest : public ::testing::Test {} function TEST_F (line 38) | TEST_F(EnumsTest, testEllipticCurveType) { function TEST_F (line 74) | TEST_F(EnumsTest, testHashType) { function TEST_F (line 112) | TEST_F(EnumsTest, testHashSize) { function TEST_F (line 120) | TEST_F(EnumsTest, testEcPointFormat) { function TEST_F (line 156) | TEST_F(EnumsTest, testEcdsaSignatureEncoding) { function TEST_F (line 185) | TEST_F(EnumsTest, testKeyStatusName) { function TEST_F (line 217) | TEST_F(EnumsTest, testHashName) { function TEST_F (line 246) | TEST_F(EnumsTest, testKeyMaterialName) { function TEST_F (line 289) | TEST_F(EnumsTest, testOutputPrefixName) { FILE: cc/util/errors.h function namespace (line 24) | namespace crypto { FILE: cc/util/errors_test.cc type crypto (line 23) | namespace crypto { type tink (line 24) | namespace tink { function TEST (line 27) | TEST(ErrorsTest, ToStatusFAbslStatusCodeTest) { FILE: cc/util/fake_kms_client.cc type crypto (line 48) | namespace crypto { type tink (line 49) | namespace tink { type test (line 50) | namespace test { function GetEncodedKeyset (line 63) | std::string GetEncodedKeyset(absl::string_view key_uri) { function Status (line 123) | Status FakeKmsClient::RegisterNewClient(absl::string_view key_uri, FILE: cc/util/fake_kms_client.h function namespace (line 31) | namespace crypto { FILE: cc/util/fake_kms_client_test.cc type crypto (line 44) | namespace crypto { type tink (line 45) | namespace tink { type test (line 46) | namespace test { function KeyTemplate (line 50) | KeyTemplate NewKmsAeadKeyTemplate(std::string key_uri) { function KeyTemplate (line 62) | KeyTemplate NewKmsEnvelopeKeyTemplate(std::string key_uri, class FakeKmsClientTest (line 75) | class FakeKmsClientTest : public ::testing::Test { method SetUpTestSuite (line 77) | static void SetUpTestSuite() { ASSERT_TRUE(AeadConfig::Register(... function TEST_F (line 80) | TEST_F(FakeKmsClientTest, CreateNewAeadSuccess) { function TEST_F (line 104) | TEST_F(FakeKmsClientTest, ClientIsBound) { function TEST_F (line 123) | TEST_F(FakeKmsClientTest, ClientIsUnbound) { function TEST_F (line 146) | TEST_F(FakeKmsClientTest, RegisterAndEncryptDecryptWithKmsAead) { function TEST_F (line 172) | TEST_F(FakeKmsClientTest, RegisterAndEncryptDecryptWithKmsEnvelope... FILE: cc/util/file_input_stream.cc type crypto (line 31) | namespace crypto { type tink (line 32) | namespace tink { type util (line 33) | namespace util { function close_ignoring_eintr (line 40) | int close_ignoring_eintr(int fd) { function read_ignoring_eintr (line 50) | int read_ignoring_eintr(int fd, void *buf, size_t count) { FILE: cc/util/file_input_stream.h function namespace (line 28) | namespace crypto { FILE: cc/util/file_input_stream_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function OpenTestFileToRead (line 52) | util::StatusOr OpenTestFileToRead(absl::string_view filename) { function ReadAll (line 66) | util::Status ReadAll(util::FileInputStream* input_stream, function TEST_P (line 80) | TEST_P(FileInputStreamTestDefaultBufferSize, ReadAllfFromInputStream... function TEST_P (line 105) | TEST_P(FileInputStreamTestCustomBufferSizes, function TEST (line 131) | TEST(FileInputStreamTest, NextFailsIfFdIsInvalid) { function TEST (line 139) | TEST(FileInputStreamTest, NextFailsIfDataIsNull) { function TEST (line 156) | TEST(FileInputStreamTest, NextReadsExactlyOneBlockOfData) { function TEST (line 180) | TEST(FileInputStreamTest, BackupForNegativeOrZeroBytesIsANoop) { function TEST (line 219) | TEST(FileInputStreamTest, BackupForLessThanOneBlockOfData) { function TEST (line 270) | TEST(FileInputStreamTest, BackupAtMostOfOneBlock) { FILE: cc/util/file_output_stream.cc type crypto (line 33) | namespace crypto { type tink (line 34) | namespace tink { type util (line 35) | namespace util { function close_ignoring_eintr (line 41) | int close_ignoring_eintr(int fd) { function write_ignoring_eintr (line 52) | int write_ignoring_eintr(int fd, const void *buf, size_t count) { function Status (line 137) | Status FileOutputStream::Close() { FILE: cc/util/file_output_stream.h function namespace (line 27) | namespace crypto { FILE: cc/util/file_output_stream_test.cc type crypto (line 41) | namespace crypto { type tink (line 42) | namespace tink { function OpenTestFileToWrite (line 48) | util::StatusOr OpenTestFileToWrite(absl::string_view filename) { function WriteToStream (line 63) | util::Status WriteToStream(util::FileOutputStream* output_stream, class FileOutputStreamTest (line 85) | class FileOutputStreamTest : public ::testing::Test { function TEST_F (line 88) | TEST_F(FileOutputStreamTest, WritingStreams) { function TEST_F (line 106) | TEST_F(FileOutputStreamTest, CustomBufferSizes) { function TEST_F (line 132) | TEST_F(FileOutputStreamTest, BackupAndPosition) { FILE: cc/util/file_random_access_stream.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type util (line 36) | namespace util { function close_ignoring_eintr (line 45) | int close_ignoring_eintr(int fd) { function Status (line 59) | Status FileRandomAccessStream::PRead(int64_t position, int count, type stat (line 97) | struct stat FILE: cc/util/file_random_access_stream.h function namespace (line 28) | namespace crypto { FILE: cc/util/file_random_access_stream_test.cc type crypto (line 46) | namespace crypto { type tink (line 47) | namespace tink { type util (line 48) | namespace util { function OpenTestFileToRead (line 54) | util::StatusOr OpenTestFileToRead(absl::string_view filename) { function ReadAll (line 68) | util::Status ReadAll(RandomAccessStream* ra_stream, int chunk_size, function ReadAndVerifyChunk (line 87) | void ReadAndVerifyChunk(RandomAccessStream* ra_stream, function TEST (line 109) | TEST(FileRandomAccessStreamTest, ReadingStreams) { function TEST (line 132) | TEST(FileRandomAccessStreamTest, ReadingStreamsTillLastByte) { function TEST (line 157) | TEST(FileRandomAccessStreamTest, ConcurrentReads) { function TEST (line 184) | TEST(FileRandomAccessStreamTest, NegativeReadPosition) { function TEST (line 207) | TEST(FileRandomAccessStreamTest, NotPositiveReadCount) { function TEST (line 229) | TEST(FileRandomAccessStreamTest, ReadPositionAfterEof) { FILE: cc/util/input_stream_util.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function ReadBytesFromStreamImpl (line 34) | util::StatusOr ReadBytesFromStreamImpl(int num_bytes, function ReadBytesFromStream (line 60) | util::StatusOr ReadBytesFromStream(int num_bytes, function ReadSecretBytesFromStream (line 65) | util::StatusOr ReadSecretBytesFromStream( FILE: cc/util/input_stream_util.h function namespace (line 26) | namespace crypto { FILE: cc/util/input_stream_util_test.cc type crypto (line 32) | namespace crypto { type tink (line 33) | namespace tink { function TEST (line 42) | TEST(ReadBytesTest, ReadExact) { function TEST (line 52) | TEST(ReadBytesTest, ShortRead) { function TEST (line 59) | TEST(ReadBytesTest, ReadLess) { function TEST (line 67) | TEST(ReadBytesTest, ReadTwice) { function TEST (line 79) | TEST(ReadBytesTest, ReadMoreThanBlockSize) { function TEST (line 93) | TEST(ReadBytesTest, Request0) { function TEST (line 110) | TEST(ReadBytesTest, RequestNegative) { function TEST (line 118) | TEST(ReadBytesTest, EmptyInput) { function TEST (line 127) | TEST(ReadSecretBytesTest, ReadExact) { function TEST (line 137) | TEST(ReadSecretBytesTest, ShortRead) { function TEST (line 144) | TEST(ReadSecretBytesTest, ReadLess) { function TEST (line 153) | TEST(ReadSecretBytesTest, ReadTwice) { function TEST (line 166) | TEST(ReadSecretBytesTest, ReadMoreThanBlockSize) { function TEST (line 182) | TEST(ReadSecretBytesTest, Request0) { function TEST (line 203) | TEST(ReadSecretBytesTest, RequestNegative) { function TEST (line 212) | TEST(ReadSecretBytesTest, EmptyInput) { FILE: cc/util/istream_input_stream.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type util (line 36) | namespace util { FILE: cc/util/istream_input_stream.h function namespace (line 29) | namespace crypto { FILE: cc/util/istream_input_stream_test.cc type crypto (line 42) | namespace crypto { type tink (line 43) | namespace tink { function GetTestIstream (line 49) | std::unique_ptr GetTestIstream(absl::string_view filen... function ReadTillEnd (line 71) | util::Status ReadTillEnd(util::IstreamInputStream* input_stream, class IstreamInputStreamTest (line 83) | class IstreamInputStreamTest : public ::testing::Test { function TEST_F (line 86) | TEST_F(IstreamInputStreamTest, testReadingStreams) { function TEST_F (line 103) | TEST_F(IstreamInputStreamTest, testCustomBufferSizes) { function TEST_F (line 122) | TEST_F(IstreamInputStreamTest, testBackupAndPosition) { FILE: cc/util/keyset_util.cc type crypto (line 24) | namespace crypto { type tink (line 25) | namespace tink { function NewKeyId (line 31) | uint32_t NewKeyId() { function GenerateUnusedKeyId (line 40) | uint32_t GenerateUnusedKeyId(const Keyset& keyset) { FILE: cc/util/keyset_util.h function namespace (line 24) | namespace crypto { FILE: cc/util/ostream_output_stream.cc type crypto (line 34) | namespace crypto { type tink (line 35) | namespace tink { type util (line 36) | namespace util { function Status (line 112) | Status OstreamOutputStream::Close() { FILE: cc/util/ostream_output_stream.h function namespace (line 28) | namespace crypto { FILE: cc/util/ostream_output_stream_test.cc type crypto (line 37) | namespace crypto { type tink (line 38) | namespace tink { function GetTestOstream (line 42) | std::unique_ptr GetTestOstream(absl::string_view filen... function WriteToStream (line 53) | util::Status WriteToStream(util::OstreamOutputStream* output_stream, class OstreamOutputStreamTest (line 75) | class OstreamOutputStreamTest : public ::testing::Test { function TEST_F (line 78) | TEST_F(OstreamOutputStreamTest, WritingStreams) { function TEST_F (line 95) | TEST_F(OstreamOutputStreamTest, CustomBufferSizes) { function TEST_F (line 118) | TEST_F(OstreamOutputStreamTest, BackupAndPosition) { FILE: cc/util/secret_data.h function namespace (line 30) | namespace crypto { function SafeZeroMemory (line 156) | inline void SafeZeroMemory(void* ptr, std::size_t size) { function SafeZeroString (line 160) | inline void SafeZeroString(std::string* str) { FILE: cc/util/secret_data_internal.h function namespace (line 29) | namespace crypto { FILE: cc/util/secret_data_test.cc type crypto (line 27) | namespace crypto { type tink (line 28) | namespace tink { type util (line 29) | namespace util { type TwoMbAlignedStruct (line 38) | struct alignas(kEightKb) TwoMbAlignedStruct { function TEST (line 46) | TEST(SecretUniqueptrTest, Alignment) { function TEST (line 54) | TEST(SecretDataTest, OneByOneInsertion) { function TEST (line 64) | TEST(SecretDataTest, SecretDataFromStringViewConstructor) { function TEST (line 75) | TEST(SecretDataTest, StringViewFromSecretData) { function TEST (line 87) | TEST(SecretDataTest, SecretDataCopy) { function TEST (line 98) | TEST(SecretValueTest, DefaultConstructor) { function TEST (line 103) | TEST(SecretValueTest, Constructor) { function TEST (line 108) | TEST(SecretValueTest, CopyConstructor) { function TEST (line 114) | TEST(SecretValueTest, AssignmentOperator) { function TEST (line 121) | TEST(SecretValueTest, MoveConstructor) { function TEST (line 129) | TEST(SecretValueTest, MoveAssignment) { FILE: cc/util/secret_proto.h function namespace (line 31) | namespace crypto { FILE: cc/util/secret_proto_test.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { type util (line 32) | namespace util { class SecretProtoTest (line 40) | class SecretProtoTest : public testing::Test {} function TestProto (line 49) | TestProto CreateProto() { function NestedTestProto (line 57) | NestedTestProto CreateProto() { function TYPED_TEST (line 68) | TYPED_TEST(SecretProtoTest, DefaultConstructor) { function TYPED_TEST (line 73) | TYPED_TEST(SecretProtoTest, Constructor) { function TYPED_TEST (line 79) | TYPED_TEST(SecretProtoTest, CopyConstructor) { function TYPED_TEST (line 87) | TYPED_TEST(SecretProtoTest, SourceDestroyedAfterCopyConstructor) { function TYPED_TEST (line 98) | TYPED_TEST(SecretProtoTest, AssignmentOperator) { function TYPED_TEST (line 111) | TYPED_TEST(SecretProtoTest, MoveConstructor) { function TYPED_TEST (line 121) | TYPED_TEST(SecretProtoTest, MoveAssignment) { function TYPED_TEST (line 136) | TYPED_TEST(SecretProtoTest, FromSecretData) { function TYPED_TEST (line 147) | TYPED_TEST(SecretProtoTest, AsSecretData) { FILE: cc/util/status.h function namespace (line 27) | namespace crypto { FILE: cc/util/statusor.h function namespace (line 25) | namespace crypto { FILE: cc/util/test_keyset_handle.cc type crypto (line 29) | namespace crypto { type tink (line 30) | namespace tink { function Keyset (line 41) | const Keyset& TestKeysetHandle::GetKeyset(const KeysetHandle& keyset... FILE: cc/util/test_keyset_handle.h function namespace (line 25) | namespace crypto { FILE: cc/util/test_matchers.h function namespace (line 31) | namespace crypto { FILE: cc/util/test_util.cc type crypto (line 74) | namespace crypto { type tink (line 75) | namespace tink { type test (line 76) | namespace test { function ReadTestFile (line 78) | std::string ReadTestFile(absl::string_view filename) { function HexDecode (line 90) | util::StatusOr HexDecode(absl::string_view hex) { function HexDecodeOrDie (line 113) | std::string HexDecodeOrDie(absl::string_view hex) { function HexEncode (line 117) | std::string HexEncode(absl::string_view bytes) { function TmpDir (line 128) | std::string TmpDir() { function AddKeyData (line 144) | void AddKeyData(const google::crypto::tink::KeyData& key_data, uin... function AddKey (line 155) | void AddKey(const std::string& key_type, uint32_t key_id, function AddTinkKey (line 168) | void AddTinkKey(const std::string& key_type, uint32_t key_id, function AddLegacyKey (line 177) | void AddLegacyKey(const std::string& key_type, uint32_t key_id, function AddRawKey (line 186) | void AddRawKey(const std::string& key_type, uint32_t key_id, function EciesAeadHkdfPrivateKey (line 195) | EciesAeadHkdfPrivateKey GetEciesAesGcmHkdfTestKey( function EciesAeadHkdfPrivateKey (line 207) | EciesAeadHkdfPrivateKey GetEciesAeadHkdfTestKey( function EciesAeadHkdfPrivateKey (line 228) | EciesAeadHkdfPrivateKey GetEciesAesGcmHkdfTestKey( function EciesAeadHkdfPrivateKey (line 246) | EciesAeadHkdfPrivateKey GetEciesAesCtrHmacHkdfTestKey( function EciesAeadHkdfPrivateKey (line 277) | EciesAeadHkdfPrivateKey GetEciesXChaCha20Poly1305HkdfTestKey( function GetEciesAesSivHkdfTestKey (line 294) | google::crypto::tink::EciesAeadHkdfPrivateKey GetEciesAesSivHkdfTe... function EcdsaPrivateKey (line 312) | EcdsaPrivateKey GetEcdsaTestPrivateKey( function EcdsaPrivateKey (line 320) | EcdsaPrivateKey GetEcdsaTestPrivateKey( function Ed25519PrivateKey (line 340) | Ed25519PrivateKey GetEd25519TestPrivateKey() { function ZTestUniformString (line 353) | util::Status ZTestUniformString(absl::string_view bytes) { function Rotate (line 377) | std::string Rotate(absl::string_view bytes) { function ZTestCrosscorrelationUniformStrings (line 386) | util::Status ZTestCrosscorrelationUniformStrings(absl::string_view... function ZTestAutocorrelationUniformString (line 399) | util::Status ZTestAutocorrelationUniformString(absl::string_view b... FILE: cc/util/test_util.h function namespace (line 65) | namespace tink { function class (line 301) | class DummyDeterministicAead : public DeterministicAead { function class (line 327) | class DummyStreamingAead : public StreamingAead { FILE: cc/util/test_util_test.cc type crypto (line 43) | namespace crypto { type tink (line 44) | namespace tink { type test (line 45) | namespace test { function TEST (line 55) | TEST(AsKeyDataTest, Basic) { function TEST (line 69) | TEST(DummyTests, Aead) { function TEST (line 74) | TEST(DummyTests, AeadCord) { function TEST (line 84) | TEST(DummyTests, AeadCordMultipleChunks) { function TEST (line 98) | TEST(ZTests, UniformString) { function TEST (line 104) | TEST(ZTests, CrossCorrelationUniformString) { function TEST (line 117) | TEST(ZTests, AutocorrelationUniformString) { function TEST (line 130) | TEST(DummyStreamingAead, DummyDecryptingStreamPreadAllAtOnceSuccee... function TEST (line 164) | TEST(DummyStreamingAead, DummyDecryptingStreamPreadInChunksSucceed... function TEST (line 207) | TEST(DummyStreamingAead, DummyDecryptingStreamPreadWithSmallerHead... function TEST (line 252) | TEST(DummyStreamingAead, DummyDecryptingStreamPreadWithCorruptedAa... function TEST (line 294) | TEST(FakeKeysetDeriver, DeriveKeyset) { FILE: cc/util/validation.cc type crypto (line 30) | namespace crypto { type tink (line 31) | namespace tink { function ValidateAesKeySize (line 33) | util::Status ValidateAesKeySize(uint32_t key_size) { function ValidateKey (line 42) | util::Status ValidateKey(const Keyset::Key& key) { function ValidateKeyset (line 61) | util::Status ValidateKeyset(const Keyset& keyset) { function ValidateVersion (line 116) | util::Status ValidateVersion(uint32_t candidate, uint32_t max_expect... FILE: cc/util/validation.h function namespace (line 25) | namespace crypto { FILE: cc/util/validation_test.cc type crypto (line 28) | namespace crypto { type tink (line 29) | namespace tink { function TEST (line 38) | TEST(ValidateKey, ValidKey) { function TEST (line 47) | TEST(ValidateKey, MissingOutputPrefixType) { function TEST (line 56) | TEST(ValidateKey, MissingKeyData) { function TEST (line 65) | TEST(ValidateKey, MissingStatus) { function TEST (line 74) | TEST(ValidateKeyset, Valid) { function TEST (line 85) | TEST(ValidateKeyset, ValidMultipleKeys) { function TEST (line 107) | TEST(ValidateKeyset, DuplicatePrimaryId) { function TEST (line 124) | TEST(ValidateKeyset, OnlyPublicKeys) { function TEST (line 147) | TEST(ValidateKeyset, PrimaryIdNonExistent) { function TEST (line 159) | TEST(ValidateKeyset, ValidHighId) { FILE: go/aead/aead.go function init (line 27) | func init() { FILE: go/aead/aead_benchmark_test.go function BenchmarkEncryptDecrypt (line 28) | func BenchmarkEncryptDecrypt(b *testing.B) { FILE: go/aead/aead_factory.go function New (line 30) | func New(handle *keyset.Handle) (tink.AEAD, error) { type wrappedAead (line 40) | type wrappedAead struct method Encrypt (line 99) | func (a *wrappedAead) Encrypt(plaintext, associatedData []byte) ([]byt... method Decrypt (line 123) | func (a *wrappedAead) Decrypt(ciphertext, associatedData []byte) ([]by... function newWrappedAead (line 46) | func newWrappedAead(ps *primitiveset.PrimitiveSet) (*wrappedAead, error) { function createLoggers (line 69) | func createLoggers(ps *primitiveset.PrimitiveSet) (monitoring.Logger, mo... FILE: go/aead/aead_factory_test.go function TestFactoryMultipleKeys (line 46) | func TestFactoryMultipleKeys(t *testing.T) { function TestFactoryRawKeyAsPrimary (line 108) | func TestFactoryRawKeyAsPrimary(t *testing.T) { function validateAEADFactoryCipher (line 127) | func validateAEADFactoryCipher(encryptCipher, decryptCipher tink.AEAD, e... function TestFactoryWithInvalidPrimitiveSetType (line 168) | func TestFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestFactoryWithValidPrimitiveSetType (line 180) | func TestFactoryWithValidPrimitiveSetType(t *testing.T) { function TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecryptionWithPrefix (line 192) | func TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecrypti... function TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecryptionWithoutPrefix (line 261) | func TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecrypti... function TestPrimitiveFactoryMonitoringWithAnnotatiosMultipleKeysLogsEncryptionDecryption (line 327) | func TestPrimitiveFactoryMonitoringWithAnnotatiosMultipleKeysLogsEncrypt... function TestPrimitiveFactoryWithMonitoringAnnotationsEncryptionFailureIsLogged (line 434) | func TestPrimitiveFactoryWithMonitoringAnnotationsEncryptionFailureIsLog... function TestPrimitiveFactoryWithMonitoringAnnotationsDecryptionFailureIsLogged (line 505) | func TestPrimitiveFactoryWithMonitoringAnnotationsDecryptionFailureIsLog... function TestFactoryWithMonitoringMultiplePrimitivesLogOperations (line 558) | func TestFactoryWithMonitoringMultiplePrimitivesLogOperations(t *testing... function TestPrimitiveFactoryEncryptDecryptWithoutAnnotationsDoesNothing (line 654) | func TestPrimitiveFactoryEncryptDecryptWithoutAnnotationsDoesNothing(t *... FILE: go/aead/aead_init_test.go function TestAEADInit (line 24) | func TestAEADInit(t *testing.T) { FILE: go/aead/aead_key_templates.go function AES128GCMKeyTemplate (line 38) | func AES128GCMKeyTemplate() *tinkpb.KeyTemplate { function AES256GCMKeyTemplate (line 45) | func AES256GCMKeyTemplate() *tinkpb.KeyTemplate { function AES256GCMNoPrefixKeyTemplate (line 52) | func AES256GCMNoPrefixKeyTemplate() *tinkpb.KeyTemplate { function AES128GCMSIVKeyTemplate (line 59) | func AES128GCMSIVKeyTemplate() *tinkpb.KeyTemplate { function AES256GCMSIVKeyTemplate (line 66) | func AES256GCMSIVKeyTemplate() *tinkpb.KeyTemplate { function AES256GCMSIVNoPrefixKeyTemplate (line 73) | func AES256GCMSIVNoPrefixKeyTemplate() *tinkpb.KeyTemplate { function AES128CTRHMACSHA256KeyTemplate (line 83) | func AES128CTRHMACSHA256KeyTemplate() *tinkpb.KeyTemplate { function AES256CTRHMACSHA256KeyTemplate (line 93) | func AES256CTRHMACSHA256KeyTemplate() *tinkpb.KeyTemplate { function ChaCha20Poly1305KeyTemplate (line 98) | func ChaCha20Poly1305KeyTemplate() *tinkpb.KeyTemplate { function XChaCha20Poly1305KeyTemplate (line 107) | func XChaCha20Poly1305KeyTemplate() *tinkpb.KeyTemplate { function CreateKMSEnvelopeAEADKeyTemplate (line 145) | func CreateKMSEnvelopeAEADKeyTemplate(uri string, dekTemplate *tinkpb.Ke... function KMSEnvelopeAEADKeyTemplate (line 174) | func KMSEnvelopeAEADKeyTemplate(uri string, dekTemplate *tinkpb.KeyTempl... function createAESGCMKeyTemplate (line 184) | func createAESGCMKeyTemplate(keySize uint32, outputPrefixType tinkpb.Out... function createAESGCMSIVKeyTemplate (line 201) | func createAESGCMSIVKeyTemplate(keySize uint32, outputPrefixType tinkpb.... function createAESCTRHMACAEADKeyTemplate (line 216) | func createAESCTRHMACAEADKeyTemplate(aesKeySize, ivSize, hmacKeySize, ta... FILE: go/aead/aead_key_templates_test.go function TestKeyTemplates (line 31) | func TestKeyTemplates(t *testing.T) { function TestKMSEnvelopeAEADKeyTemplate (line 77) | func TestKMSEnvelopeAEADKeyTemplate(t *testing.T) { function TestKMSEnvelopeAEADKeyTemplateMultipleKeysSameKEK (line 124) | func TestKMSEnvelopeAEADKeyTemplateMultipleKeysSameKEK(t *testing.T) { function TestMigrateFromCreateKMSEnvelopeAEADKeyTemplateToNewKMSEnvelopeAEAD2 (line 176) | func TestMigrateFromCreateKMSEnvelopeAEADKeyTemplateToNewKMSEnvelopeAEAD... function TestCreateKMSEnvelopeAEADKeyTemplateCompatibleWithKMSEnevelopeAEADKeyTemplate (line 222) | func TestCreateKMSEnvelopeAEADKeyTemplateCompatibleWithKMSEnevelopeAEADK... function TestKMSEnvelopeAEADKeyTemplateFails (line 271) | func TestKMSEnvelopeAEADKeyTemplateFails(t *testing.T) { function TestCreateKMSEnvelopeAEADKeyTemplateFails (line 290) | func TestCreateKMSEnvelopeAEADKeyTemplateFails(t *testing.T) { function TestCreateKMSEnvelopeAEADKeyTemplateWithUnsupportedTemplateFails (line 304) | func TestCreateKMSEnvelopeAEADKeyTemplateWithUnsupportedTemplateFails(t ... function testEncryptDecrypt (line 315) | func testEncryptDecrypt(template *tinkpb.KeyTemplate) error { FILE: go/aead/aead_test.go function Example (line 29) | func Example() { FILE: go/aead/aes_ctr_hmac_aead_key_manager.go constant aesCTRHMACAEADKeyVersion (line 34) | aesCTRHMACAEADKeyVersion = 0 constant aesCTRHMACAEADTypeURL (line 35) | aesCTRHMACAEADTypeURL = "type.googleapis.com/google.crypto.tink.AesCt... constant minHMACKeySizeInBytes (line 36) | minHMACKeySizeInBytes = 16 constant minTagSizeInBytes (line 37) | minTagSizeInBytes = 10 type aesCTRHMACAEADKeyManager (line 46) | type aesCTRHMACAEADKeyManager struct method Primitive (line 49) | func (km *aesCTRHMACAEADKeyManager) Primitive(serializedKey []byte) (a... method NewKey (line 80) | func (km *aesCTRHMACAEADKeyManager) NewKey(serializedKeyFormat []byte)... method NewKeyData (line 109) | func (km *aesCTRHMACAEADKeyManager) NewKeyData(serializedKeyFormat []b... method DoesSupport (line 126) | func (km *aesCTRHMACAEADKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 131) | func (km *aesCTRHMACAEADKeyManager) TypeURL() string { method validateKey (line 136) | func (km *aesCTRHMACAEADKeyManager) validateKey(key *aeadpb.AesCtrHmac... method validateKeyFormat (line 159) | func (km *aesCTRHMACAEADKeyManager) validateKeyFormat(format *aeadpb.A... FILE: go/aead/aes_ctr_hmac_aead_key_manager_test.go function TestAESCTRHMACNewKeyMultipleTimes (line 31) | func TestAESCTRHMACNewKeyMultipleTimes(t *testing.T) { function TestAESCTRHMACNewKeyWithInvalidSerializedKeyFormat (line 72) | func TestAESCTRHMACNewKeyWithInvalidSerializedKeyFormat(t *testing.T) { function TestAESCTRHMACPrimitive (line 132) | func TestAESCTRHMACPrimitive(t *testing.T) { function TestAESCTRHMACPrimitiveWithInvalidKey (line 162) | func TestAESCTRHMACPrimitiveWithInvalidKey(t *testing.T) { FILE: go/aead/aes_gcm_key_manager.go constant aesGCMKeyVersion (line 31) | aesGCMKeyVersion = 0 constant aesGCMTypeURL (line 32) | aesGCMTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmKey" type aesGCMKeyManager (line 41) | type aesGCMKeyManager struct method Primitive (line 47) | func (km *aesGCMKeyManager) Primitive(serializedKey []byte) (any, erro... method NewKey (line 66) | func (km *aesGCMKeyManager) NewKey(serializedKeyFormat []byte) (proto.... method NewKeyData (line 87) | func (km *aesGCMKeyManager) NewKeyData(serializedKeyFormat []byte) (*t... method DoesSupport (line 104) | func (km *aesGCMKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 109) | func (km *aesGCMKeyManager) TypeURL() string { method KeyMaterialType (line 114) | func (km *aesGCMKeyManager) KeyMaterialType() tinkpb.KeyData_KeyMateri... method DeriveKey (line 119) | func (km *aesGCMKeyManager) DeriveKey(serializedKeyFormat []byte, pseu... method validateKey (line 146) | func (km *aesGCMKeyManager) validateKey(key *gcmpb.AesGcmKey) error { method validateKeyFormat (line 158) | func (km *aesGCMKeyManager) validateKeyFormat(format *gcmpb.AesGcmKeyF... FILE: go/aead/aes_gcm_key_manager_test.go function TestAESGCMGetPrimitiveBasic (line 35) | func TestAESGCMGetPrimitiveBasic(t *testing.T) { function TestAESGCMGetPrimitiveWithInvalidInput (line 56) | func TestAESGCMGetPrimitiveWithInvalidInput(t *testing.T) { function TestAESGCMNewKeyMultipleTimes (line 82) | func TestAESGCMNewKeyMultipleTimes(t *testing.T) { function TestAESGCMNewKeyBasic (line 117) | func TestAESGCMNewKeyBasic(t *testing.T) { function TestAESGCMNewKeyWithInvalidInput (line 139) | func TestAESGCMNewKeyWithInvalidInput(t *testing.T) { function TestAESGCMNewKeyDataBasic (line 165) | func TestAESGCMNewKeyDataBasic(t *testing.T) { function TestAESGCMNewKeyDataWithInvalidInput (line 196) | func TestAESGCMNewKeyDataWithInvalidInput(t *testing.T) { function TestAESGCMDoesSupport (line 221) | func TestAESGCMDoesSupport(t *testing.T) { function TestAESGCMTypeURL (line 234) | func TestAESGCMTypeURL(t *testing.T) { function TestAESGCMKeyMaterialType (line 244) | func TestAESGCMKeyMaterialType(t *testing.T) { function TestAESGCMDeriveKey (line 258) | func TestAESGCMDeriveKey(t *testing.T) { function TestAESGCMDeriveKeyFailsWithInvalidKeyFormats (line 307) | func TestAESGCMDeriveKeyFailsWithInvalidKeyFormats(t *testing.T) { function TestAESGCMDeriveKeyFailsWithMalformedSerializedKeyFormat (line 360) | func TestAESGCMDeriveKeyFailsWithMalformedSerializedKeyFormat(t *testing... function TestAESGCMDeriveKeyFailsWithInsufficientRandomness (line 377) | func TestAESGCMDeriveKeyFailsWithInsufficientRandomness(t *testing.T) { function genInvalidAESGCMKeys (line 405) | func genInvalidAESGCMKeys() []proto.Message { function genInvalidAESGCMKeyFormats (line 418) | func genInvalidAESGCMKeyFormats() []proto.Message { function validateAESGCMKey (line 429) | func validateAESGCMKey(key *gcmpb.AesGcmKey, format *gcmpb.AesGcmKeyForm... function validateAESGCMPrimitive (line 444) | func validateAESGCMPrimitive(p any, key *gcmpb.AesGcmKey) error { FILE: go/aead/aes_gcm_siv_key_manager.go constant aesGCMSIVKeyVersion (line 30) | aesGCMSIVKeyVersion = 0 constant aesGCMSIVTypeURL (line 31) | aesGCMSIVTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmSivKey" type aesGCMSIVKeyManager (line 40) | type aesGCMSIVKeyManager struct method Primitive (line 46) | func (km *aesGCMSIVKeyManager) Primitive(serializedKey []byte) (any, e... method NewKey (line 65) | func (km *aesGCMSIVKeyManager) NewKey(serializedKeyFormat []byte) (pro... method NewKeyData (line 86) | func (km *aesGCMSIVKeyManager) NewKeyData(serializedKeyFormat []byte) ... method DoesSupport (line 103) | func (km *aesGCMSIVKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 108) | func (km *aesGCMSIVKeyManager) TypeURL() string { method validateKey (line 113) | func (km *aesGCMSIVKeyManager) validateKey(key *gcmsivpb.AesGcmSivKey)... method validateKeyFormat (line 126) | func (km *aesGCMSIVKeyManager) validateKeyFormat(format *gcmsivpb.AesG... FILE: go/aead/aes_gcm_siv_key_manager_test.go function TestAESGCMSIVGetPrimitiveBasic (line 33) | func TestAESGCMSIVGetPrimitiveBasic(t *testing.T) { function TestAESGCMSIVGetPrimitiveWithInvalidInput (line 57) | func TestAESGCMSIVGetPrimitiveWithInvalidInput(t *testing.T) { function TestAESGCMSIVNewKeyMultipleTimes (line 83) | func TestAESGCMSIVNewKeyMultipleTimes(t *testing.T) { function TestAESGCMSIVNewKeyBasic (line 118) | func TestAESGCMSIVNewKeyBasic(t *testing.T) { function TestAESGCMSIVNewKeyWithInvalidInput (line 142) | func TestAESGCMSIVNewKeyWithInvalidInput(t *testing.T) { function TestAESGCMSIVNewKeyDataBasic (line 168) | func TestAESGCMSIVNewKeyDataBasic(t *testing.T) { function TestAESGCMSIVNewKeyDataWithInvalidInput (line 210) | func TestAESGCMSIVNewKeyDataWithInvalidInput(t *testing.T) { function TestAESGCMSIVDoesSupport (line 236) | func TestAESGCMSIVDoesSupport(t *testing.T) { function TestAESGCMSIVTypeURL (line 249) | func TestAESGCMSIVTypeURL(t *testing.T) { function genInvalidAESGCMSIVKeys (line 259) | func genInvalidAESGCMSIVKeys() []proto.Message { function genInvalidAESGCMSIVKeyFormats (line 272) | func genInvalidAESGCMSIVKeyFormats() []proto.Message { function validateAESGCMSIVKey (line 283) | func validateAESGCMSIVKey(key *gcmsivpb.AesGcmSivKey, format *gcmsivpb.A... function validateAESGCMSIVPrimitive (line 298) | func validateAESGCMSIVPrimitive(p any, key *gcmsivpb.AesGcmSivKey) error { FILE: go/aead/chacha20poly1305_key_manager.go constant chaCha20Poly1305KeyVersion (line 31) | chaCha20Poly1305KeyVersion = 0 constant chaCha20Poly1305TypeURL (line 32) | chaCha20Poly1305TypeURL = "type.googleapis.com/google.crypto.tink.Cha... type chaCha20Poly1305KeyManager (line 41) | type chaCha20Poly1305KeyManager struct method Primitive (line 44) | func (km *chaCha20Poly1305KeyManager) Primitive(serializedKey []byte) ... method NewKey (line 64) | func (km *chaCha20Poly1305KeyManager) NewKey(serializedKeyFormat []byt... method NewKeyData (line 71) | func (km *chaCha20Poly1305KeyManager) NewKeyData(serializedKeyFormat [... method DoesSupport (line 85) | func (km *chaCha20Poly1305KeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 90) | func (km *chaCha20Poly1305KeyManager) TypeURL() string { method newChaCha20Poly1305Key (line 94) | func (km *chaCha20Poly1305KeyManager) newChaCha20Poly1305Key() *cppb.C... method validateKey (line 103) | func (km *chaCha20Poly1305KeyManager) validateKey(key *cppb.ChaCha20Po... FILE: go/aead/chacha20poly1305_key_manager_test.go function TestChaCha20Poly1305GetPrimitive (line 33) | func TestChaCha20Poly1305GetPrimitive(t *testing.T) { function TestChaCha20Poly1305GetPrimitiveWithInvalidKeys (line 59) | func TestChaCha20Poly1305GetPrimitiveWithInvalidKeys(t *testing.T) { function TestChaCha20Poly1305NewKey (line 76) | func TestChaCha20Poly1305NewKey(t *testing.T) { function TestChaCha20Poly1305NewKeyData (line 94) | func TestChaCha20Poly1305NewKeyData(t *testing.T) { function TestChaCha20Poly1305DoesSupport (line 126) | func TestChaCha20Poly1305DoesSupport(t *testing.T) { function TestChaCha20Poly1305TypeURL (line 139) | func TestChaCha20Poly1305TypeURL(t *testing.T) { function genInvalidChaCha20Poly1305Keys (line 149) | func genInvalidChaCha20Poly1305Keys() []*cppb.ChaCha20Poly1305Key { function validateChaCha20Poly1305Primitive (line 172) | func validateChaCha20Poly1305Primitive(p any, key *cppb.ChaCha20Poly1305... function validateChaCha20Poly1305Key (line 195) | func validateChaCha20Poly1305Key(key *cppb.ChaCha20Poly1305Key) error { FILE: go/aead/internal/testing/kmsaead/key_manager.go constant kmsAEADTypeURL (line 32) | kmsAEADTypeURL = "type.googleapis.com/google.crypto.tink.KmsAeadKey" type keyManager (line 34) | type keyManager struct method Primitive (line 36) | func (km *keyManager) Primitive(protoSerializedKey []byte) (any, error) { method NewKey (line 56) | func (km *keyManager) NewKey(serializedKeyFormat []byte) (proto.Messag... method NewKeyData (line 70) | func (km *keyManager) NewKeyData(serializedKeyFormat []byte) (*tinkpb.... method DoesSupport (line 86) | func (km *keyManager) DoesSupport(typeURL string) bool { method TypeURL (line 90) | func (km *keyManager) TypeURL() string { function NewKeyManager (line 95) | func NewKeyManager() registry.KeyManager { return new(keyManager) } function CreateKeyTemplate (line 98) | func CreateKeyTemplate(uri string) (*tinkpb.KeyTemplate, error) { FILE: go/aead/internal/testing/kmsaead/key_manager_test.go constant keyURI (line 29) | keyURI = "fake-kms://CM2b3_MDElQKSAowdHlwZS5nb29nbGVhcGlzLmNvbS9nb29nbGU... function TestCreateEncryptDecrypt (line 31) | func TestCreateEncryptDecrypt(t *testing.T) { FILE: go/aead/kms_envelope_aead.go constant lenDEK (line 28) | lenDEK = 4 constant maxUint32Size (line 29) | maxUint32Size = 4294967295 type KMSEnvelopeAEAD (line 33) | type KMSEnvelopeAEAD struct method Encrypt (line 79) | func (a *KMSEnvelopeAEAD) Encrypt(pt, aad []byte) ([]byte, error) { method Decrypt (line 119) | func (a *KMSEnvelopeAEAD) Decrypt(ct, aad []byte) ([]byte, error) { function isSupporedKMSEnvelopeDEK (line 49) | func isSupporedKMSEnvelopeDEK(dekKeyTypeURL string) bool { function NewKMSEnvelopeAEAD2 (line 63) | func NewKMSEnvelopeAEAD2(dekTemplate *tinkpb.KeyTemplate, remote tink.AE... FILE: go/aead/kms_envelope_aead_example_test.go constant keyURI (line 28) | keyURI = "fake-kms://CM2b3_MDElQKSAowdHlwZS5nb29nbGVhcGlzLmNvbS9nb29nbGU... function Example_kmsEnvelopeAEAD (line 30) | func Example_kmsEnvelopeAEAD() { FILE: go/aead/kms_envelope_aead_key_manager.go constant kmsEnvelopeAEADKeyVersion (line 29) | kmsEnvelopeAEADKeyVersion = 0 constant kmsEnvelopeAEADTypeURL (line 30) | kmsEnvelopeAEADTypeURL = "type.googleapis.com/google.crypto.tink.KmsE... type kmsEnvelopeAEADKeyManager (line 35) | type kmsEnvelopeAEADKeyManager struct method Primitive (line 38) | func (km *kmsEnvelopeAEADKeyManager) Primitive(serializedKey []byte) (... method NewKey (line 63) | func (km *kmsEnvelopeAEADKeyManager) NewKey(serializedKeyFormat []byte... method NewKeyData (line 83) | func (km *kmsEnvelopeAEADKeyManager) NewKeyData(serializedKeyFormat []... method DoesSupport (line 100) | func (km *kmsEnvelopeAEADKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 105) | func (km *kmsEnvelopeAEADKeyManager) TypeURL() string { method validateKey (line 110) | func (km *kmsEnvelopeAEADKeyManager) validateKey(key *kmsepb.KmsEnvelo... method validateKeyFormat (line 120) | func (km *kmsEnvelopeAEADKeyManager) validateKeyFormat(keyFormat *kmse... FILE: go/aead/kms_envelope_aead_key_manager_test.go function TestNewKMSEnvelopeAEADKeyWithInvalidDEK (line 36) | func TestNewKMSEnvelopeAEADKeyWithInvalidDEK(t *testing.T) { function TestNewKMSEnvelopeAEADKeyWithInvalidSerializedKeyFormat (line 63) | func TestNewKMSEnvelopeAEADKeyWithInvalidSerializedKeyFormat(t *testing.... function TestKMSEnvelopeAEADWithTinkPrefix (line 131) | func TestKMSEnvelopeAEADWithTinkPrefix(t *testing.T) { FILE: go/aead/kms_envelope_aead_test.go function TestKMSEnvelopeWorksWithTinkKeyTemplatesAsDekTemplate (line 26) | func TestKMSEnvelopeWorksWithTinkKeyTemplatesAsDekTemplate(t *testing.T) { function TestKMSEnvelopeWithKmsEnvelopeKeyTemplatesAsDekTemplate_fails (line 97) | func TestKMSEnvelopeWithKmsEnvelopeKeyTemplatesAsDekTemplate_fails(t *te... function TestKMSEnvelopeShortCiphertext (line 123) | func TestKMSEnvelopeShortCiphertext(t *testing.T) { type invalidAEAD (line 139) | type invalidAEAD struct method Encrypt (line 142) | func (a *invalidAEAD) Encrypt(plaintext, associatedData []byte) ([]byt... method Decrypt (line 146) | func (a *invalidAEAD) Decrypt(ciphertext, associatedData []byte) ([]by... function TestKMSEnvelopeEncryptWithInvalidAEADFails (line 150) | func TestKMSEnvelopeEncryptWithInvalidAEADFails(t *testing.T) { FILE: go/aead/subtle/aes_ctr.go constant AESCTRMinIVSize (line 28) | AESCTRMinIVSize = 12 type AESCTR (line 32) | type AESCTR struct method Encrypt (line 55) | func (a *AESCTR) Encrypt(plaintext []byte) ([]byte, error) { method Decrypt (line 75) | func (a *AESCTR) Decrypt(ciphertext []byte) ([]byte, error) { method newIV (line 92) | func (a *AESCTR) newIV() []byte { function NewAESCTR (line 41) | func NewAESCTR(key []byte, ivSize int) (*AESCTR, error) { function newCipher (line 97) | func newCipher(key, iv []byte) (cipher.Stream, error) { FILE: go/aead/subtle/aes_ctr_test.go function TestNewAESCTR (line 28) | func TestNewAESCTR(t *testing.T) { function TestNistTestVector (line 74) | func TestNistTestVector(t *testing.T) { function TestMultipleEncrypt (line 118) | func TestMultipleEncrypt(t *testing.T) { function TestEncryptDecrypt (line 153) | func TestEncryptDecrypt(t *testing.T) { function TestEncryptRandomMessage (line 184) | func TestEncryptRandomMessage(t *testing.T) { function TestEncryptRandomKeyAndMessage (line 213) | func TestEncryptRandomKeyAndMessage(t *testing.T) { FILE: go/aead/subtle/aes_gcm.go constant AESGCMIVSize (line 27) | AESGCMIVSize = 12 constant AESGCMTagSize (line 29) | AESGCMTagSize = 16 type AESGCM (line 33) | type AESGCM struct method Encrypt (line 52) | func (a *AESGCM) Encrypt(plaintext, associatedData []byte) ([]byte, er... method Decrypt (line 58) | func (a *AESGCM) Decrypt(ciphertext, associatedData []byte) ([]byte, e... function NewAESGCM (line 42) | func NewAESGCM(key []byte) (*AESGCM, error) { FILE: go/aead/subtle/aes_gcm_siv.go constant AESGCMSIVNonceSize (line 31) | AESGCMSIVNonceSize = 12 constant aesgcmsivBlockSize (line 36) | aesgcmsivBlockSize = 16 constant aesgcmsivTagSize (line 40) | aesgcmsivTagSize = aesgcmsivBlockSize constant aesgcmsivPolyvalSize (line 44) | aesgcmsivPolyvalSize = aesgcmsivBlockSize type AESGCMSIV (line 48) | type AESGCMSIV struct method Encrypt (line 69) | func (a *AESGCMSIV) Encrypt(plaintext, associatedData []byte) ([]byte,... method Decrypt (line 106) | func (a *AESGCMSIV) Decrypt(ciphertext, associatedData []byte) ([]byte... method deriveKeys (line 150) | func (a *AESGCMSIV) deriveKeys(nonce []byte) ([]byte, []byte, error) { method computePolyval (line 184) | func (a *AESGCMSIV) computePolyval(authKey, pt, ad []byte) ([]byte, er... method computeTag (line 202) | func (a *AESGCMSIV) computeTag(polyval, nonce, encKey []byte) ([]byte,... method aesCTR (line 225) | func (a *AESGCMSIV) aesCTR(key, tag, in []byte) ([]byte, error) { function NewAESGCMSIV (line 55) | func NewAESGCMSIV(key []byte) (*AESGCMSIV, error) { function xorBytes (line 259) | func xorBytes(dst, a, b []byte) int { FILE: go/aead/subtle/aes_gcm_siv_test.go function TestAESGCMSIVRejectsInvalidKeyLength (line 28) | func TestAESGCMSIVRejectsInvalidKeyLength(t *testing.T) { function TestAESGCMSIVRandomNonceProducesDifferentCiphertexts (line 40) | func TestAESGCMSIVRandomNonceProducesDifferentCiphertexts(t *testing.T) { function TestAESGCMSIVModifyCiphertext (line 65) | func TestAESGCMSIVModifyCiphertext(t *testing.T) { function TestAESGCMSIVWycheproofCases (line 107) | func TestAESGCMSIVWycheproofCases(t *testing.T) { function runWycheproofDecryptOnly (line 122) | func runWycheproofDecryptOnly(t *testing.T, testCase *AEADCase) { function runWycheproofEncryptDecrypt (line 151) | func runWycheproofEncryptDecrypt(t *testing.T, testCase *AEADCase) { FILE: go/aead/subtle/aes_gcm_test.go function TestAESGCMTagLength (line 35) | func TestAESGCMTagLength(t *testing.T) { function TestAESGCMKeySize (line 55) | func TestAESGCMKeySize(t *testing.T) { function TestAESGCMEncryptDecrypt (line 66) | func TestAESGCMEncryptDecrypt(t *testing.T) { function TestAESGCMLongMessages (line 91) | func TestAESGCMLongMessages(t *testing.T) { function TestAESGCMModifyCiphertext (line 118) | func TestAESGCMModifyCiphertext(t *testing.T) { function TestAESGCMRandomNonce (line 173) | func TestAESGCMRandomNonce(t *testing.T) { function TestAESGCMWycheproofCases (line 197) | func TestAESGCMWycheproofCases(t *testing.T) { function runAESGCMWycheproofCase (line 218) | func runAESGCMWycheproofCase(t *testing.T, tc *AEADCase) { FILE: go/aead/subtle/chacha20poly1305.go constant poly1305TagSize (line 27) | poly1305TagSize = 16 type ChaCha20Poly1305 (line 31) | type ChaCha20Poly1305 struct method Encrypt (line 53) | func (ca *ChaCha20Poly1305) Encrypt(plaintext []byte, associatedData [... method Decrypt (line 75) | func (ca *ChaCha20Poly1305) Decrypt(ciphertext []byte, associatedData ... function NewChaCha20Poly1305 (line 40) | func NewChaCha20Poly1305(key []byte) (*ChaCha20Poly1305, error) { FILE: go/aead/subtle/chacha20poly1305_test.go function TestChaCha20Poly1305EncryptDecrypt (line 30) | func TestChaCha20Poly1305EncryptDecrypt(t *testing.T) { function TestChaCha20Poly1305EmptyAssociatedData (line 78) | func TestChaCha20Poly1305EmptyAssociatedData(t *testing.T) { function TestChaCha20Poly1305LongMessages (line 128) | func TestChaCha20Poly1305LongMessages(t *testing.T) { function TestChaCha20Poly1305ModifyCiphertext (line 155) | func TestChaCha20Poly1305ModifyCiphertext(t *testing.T) { function TestChaCha20Poly1305RandomNonce (line 203) | func TestChaCha20Poly1305RandomNonce(t *testing.T) { function TestChaCha20Poly1305WycheproofCases (line 223) | func TestChaCha20Poly1305WycheproofCases(t *testing.T) { function runChaCha20Poly1305WycheproofCase (line 244) | func runChaCha20Poly1305WycheproofCase(t *testing.T, tc *AEADCase) { FILE: go/aead/subtle/encrypt_then_authenticate.go type EncryptThenAuthenticate (line 29) | type EncryptThenAuthenticate struct method Encrypt (line 65) | func (e *EncryptThenAuthenticate) Encrypt(plaintext, associatedData []... method Decrypt (line 91) | func (e *EncryptThenAuthenticate) Decrypt(ciphertext, associatedData [... constant minTagSizeInBytes (line 36) | minTagSizeInBytes = 10 function uint64ToByte (line 43) | func uint64ToByte(n uint64) []byte { function NewEncryptThenAuthenticate (line 50) | func NewEncryptThenAuthenticate(indCPACipher INDCPACipher, mac tink.MAC,... FILE: go/aead/subtle/encrypt_then_authenticate_test.go function createAEADWithKeys (line 28) | func createAEADWithKeys(encryptionKey []byte, ivSize int, hashAlgo strin... function createAEAD (line 46) | func createAEAD(keySize, ivSize int, hashAlgo string, macKeySize int, ta... function hexDecode (line 130) | func hexDecode(t *testing.T, data string) []byte { function TestETARFCTestVectors (line 139) | func TestETARFCTestVectors(t *testing.T) { function TestETAEncryptDecrypt (line 157) | func TestETAEncryptDecrypt(t *testing.T) { function TestETAWithAssociatedDataSlice (line 190) | func TestETAWithAssociatedDataSlice(t *testing.T) { function TestETAEncryptDecryptRandomMessage (line 215) | func TestETAEncryptDecryptRandomMessage(t *testing.T) { function TestETAMultipleEncrypt (line 250) | func TestETAMultipleEncrypt(t *testing.T) { function TestETAInvalidTagSize (line 279) | func TestETAInvalidTagSize(t *testing.T) { function TestETADecryptModifiedCiphertext (line 290) | func TestETADecryptModifiedCiphertext(t *testing.T) { function TestETAEmptyParams (line 353) | func TestETAEmptyParams(t *testing.T) { FILE: go/aead/subtle/ind_cpa.go type INDCPACipher (line 21) | type INDCPACipher interface FILE: go/aead/subtle/polyval.go constant PolyvalBlockSize (line 24) | PolyvalBlockSize = 16 constant u32Sel0 (line 26) | u32Sel0 uint32 = 0x11111111 constant u32Sel1 (line 27) | u32Sel1 uint32 = 0x22222222 constant u32Sel2 (line 28) | u32Sel2 uint32 = 0x44444444 constant u32Sel3 (line 29) | u32Sel3 uint32 = 0x88888888 constant u64Sel0 (line 31) | u64Sel0 uint64 = 0x1111111111111111 constant u64Sel1 (line 32) | u64Sel1 uint64 = 0x2222222222222222 constant u64Sel2 (line 33) | u64Sel2 uint64 = 0x4444444444444444 constant u64Sel3 (line 34) | u64Sel3 uint64 = 0x8888888888888888 type Polyval (line 40) | type Polyval interface type fieldElement (line 57) | type fieldElement struct type polyval (line 62) | type polyval struct method Update (line 173) | func (p *polyval) Update(data []byte) { method Finish (line 192) | func (p *polyval) Finish() (hash [PolyvalBlockSize]byte) { function mul32 (line 71) | func mul32(a uint32, b uint32) uint64 { function mul64 (line 91) | func mul64(a uint64, b uint64) fieldElement { function polyvalDot (line 111) | func polyvalDot(a fieldElement, b fieldElement) fieldElement { function NewPolyval (line 160) | func NewPolyval(key []byte) (Polyval, error) { FILE: go/aead/subtle/polyval_test.go function TestPolyval (line 87) | func TestPolyval(t *testing.T) { function TestPolyvalRejectsInvalidKeyLength (line 122) | func TestPolyvalRejectsInvalidKeyLength(t *testing.T) { FILE: go/aead/subtle/subtle.go constant intSize (line 21) | intSize = 32 << (^uint(0) >> 63) constant maxInt (line 22) | maxInt = 1<<(intSize-1) - 1 function ValidateAESKeySize (line 26) | func ValidateAESKeySize(sizeInBytes uint32) error { FILE: go/aead/subtle/subtle_test.go type AEADSuite (line 24) | type AEADSuite struct type AEADGroup (line 29) | type AEADGroup struct type AEADCase (line 38) | type AEADCase struct function TestValidateAESKeySize (line 48) | func TestValidateAESKeySize(t *testing.T) { FILE: go/aead/subtle/xchacha20poly1305.go type XChaCha20Poly1305 (line 27) | type XChaCha20Poly1305 struct method Encrypt (line 49) | func (x *XChaCha20Poly1305) Encrypt(plaintext []byte, associatedData [... method Decrypt (line 71) | func (x *XChaCha20Poly1305) Decrypt(ciphertext []byte, associatedData ... function NewXChaCha20Poly1305 (line 36) | func NewXChaCha20Poly1305(key []byte) (*XChaCha20Poly1305, error) { FILE: go/aead/subtle/xchacha20poly1305_test.go function TestXChaCha20Poly1305EncryptDecrypt (line 30) | func TestXChaCha20Poly1305EncryptDecrypt(t *testing.T) { function TestXChaCha20Poly1305EmptyAssociatedData (line 83) | func TestXChaCha20Poly1305EmptyAssociatedData(t *testing.T) { function TestXChaCha20Poly1305LongMessages (line 133) | func TestXChaCha20Poly1305LongMessages(t *testing.T) { function TestXChaCha20Poly1305ModifyCiphertext (line 160) | func TestXChaCha20Poly1305ModifyCiphertext(t *testing.T) { function TestXChaCha20Poly1305RandomNonce (line 208) | func TestXChaCha20Poly1305RandomNonce(t *testing.T) { function TestXChaCha20Poly1305WycheproofCases (line 228) | func TestXChaCha20Poly1305WycheproofCases(t *testing.T) { function runXChaCha20Poly1305WycheproofCase (line 248) | func runXChaCha20Poly1305WycheproofCase(t *testing.T, tc *AEADCase) { function TestPreallocatedCiphertextMemoryInXChaCha20Poly1305IsExact (line 279) | func TestPreallocatedCiphertextMemoryInXChaCha20Poly1305IsExact(t *testi... FILE: go/aead/xchacha20poly1305_key_manager.go constant xChaCha20Poly1305KeyVersion (line 33) | xChaCha20Poly1305KeyVersion = 0 constant xChaCha20Poly1305TypeURL (line 34) | xChaCha20Poly1305TypeURL = "type.googleapis.com/google.crypto.tink.XC... type xChaCha20Poly1305KeyManager (line 44) | type xChaCha20Poly1305KeyManager struct method Primitive (line 51) | func (km *xChaCha20Poly1305KeyManager) Primitive(serializedKey []byte)... method NewKey (line 71) | func (km *xChaCha20Poly1305KeyManager) NewKey(serializedKeyFormat []by... method NewKeyData (line 81) | func (km *xChaCha20Poly1305KeyManager) NewKeyData(serializedKeyFormat ... method DoesSupport (line 98) | func (km *xChaCha20Poly1305KeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 103) | func (km *xChaCha20Poly1305KeyManager) TypeURL() string { method KeyMaterialType (line 108) | func (km *xChaCha20Poly1305KeyManager) KeyMaterialType() tpb.KeyData_K... method DeriveKey (line 114) | func (km *xChaCha20Poly1305KeyManager) DeriveKey(serializedKeyFormat [... method validateKey (line 135) | func (km *xChaCha20Poly1305KeyManager) validateKey(key *xpb.XChaCha20P... FILE: go/aead/xchacha20poly1305_key_manager_test.go function TestXChaCha20Poly1305GetPrimitive (line 36) | func TestXChaCha20Poly1305GetPrimitive(t *testing.T) { function TestXChaCha20Poly1305GetPrimitiveWithInvalidKeys (line 62) | func TestXChaCha20Poly1305GetPrimitiveWithInvalidKeys(t *testing.T) { function TestXChaCha20Poly1305NewKey (line 98) | func TestXChaCha20Poly1305NewKey(t *testing.T) { function TestXChaCha20Poly1305NewKeyData (line 116) | func TestXChaCha20Poly1305NewKeyData(t *testing.T) { function TestXChaCha20Poly1305DoesSupport (line 148) | func TestXChaCha20Poly1305DoesSupport(t *testing.T) { function TestXChaCha20Poly1305TypeURL (line 161) | func TestXChaCha20Poly1305TypeURL(t *testing.T) { function TestXChaCha20Poly1305KeyMaterialType (line 171) | func TestXChaCha20Poly1305KeyMaterialType(t *testing.T) { function TestXChaCha20Poly1305DeriveKey (line 185) | func TestXChaCha20Poly1305DeriveKey(t *testing.T) { function TestXChaCha20Poly1305DeriveKeyFailsWithInvalidKeyFormats (line 236) | func TestXChaCha20Poly1305DeriveKeyFailsWithInvalidKeyFormats(t *testing... function TestXChaCha20Poly1305DeriveKeyFailsWithInsufficientRandomness (line 277) | func TestXChaCha20Poly1305DeriveKeyFailsWithInsufficientRandomness(t *te... function validateXChaCha20Poly1305Primitive (line 304) | func validateXChaCha20Poly1305Primitive(p any, key *xpb.XChaCha20Poly130... function validateXChaCha20Poly1305Key (line 324) | func validateXChaCha20Poly1305Key(key *xpb.XChaCha20Poly1305Key) error { FILE: go/core/cryptofmt/cryptofmt.go constant NonRawPrefixSize (line 28) | NonRawPrefixSize = 5 constant LegacyPrefixSize (line 32) | LegacyPrefixSize = NonRawPrefixSize constant LegacyStartByte (line 34) | LegacyStartByte = byte(0) constant TinkPrefixSize (line 38) | TinkPrefixSize = NonRawPrefixSize constant TinkStartByte (line 40) | TinkStartByte = byte(1) constant RawPrefixSize (line 44) | RawPrefixSize = 0 constant RawPrefix (line 46) | RawPrefix = "" function OutputPrefix (line 53) | func OutputPrefix(key *tinkpb.Keyset_Key) (string, error) { function createOutputPrefix (line 66) | func createOutputPrefix(size int, startByte byte, keyID uint32) string { FILE: go/core/cryptofmt/cryptofmt_test.go function TestOutputPrefix (line 42) | func TestOutputPrefix(t *testing.T) { function validatePrefix (line 78) | func validatePrefix(prefix string, startByte byte, key string) bool { FILE: go/core/primitiveset/primitiveset.go type Entry (line 32) | type Entry struct function newEntry (line 41) | func newEntry(keyID uint32, primitive any, prefix string, prefixType tin... type PrimitiveSet (line 63) | type PrimitiveSet struct method RawEntries (line 88) | func (ps *PrimitiveSet) RawEntries() ([]*Entry, error) { method EntriesForPrefix (line 93) | func (ps *PrimitiveSet) EntriesForPrefix(prefix string) ([]*Entry, err... method Add (line 102) | func (ps *PrimitiveSet) Add(primitive any, key *tinkpb.Keyset_Key) (*E... function New (line 78) | func New() *PrimitiveSet { FILE: go/core/primitiveset/primitiveset_test.go function makeTestKey (line 27) | func makeTestKey(keyID int, status tinkpb.KeyStatusType, outputPrefixTyp... function TestPrimitvesetNew (line 33) | func TestPrimitvesetNew(t *testing.T) { function TestPrimitivesetAddAndEntriesInKeysetOrder (line 40) | func TestPrimitivesetAddAndEntriesInKeysetOrder(t *testing.T) { function TestPrimitivesetRawEntries (line 93) | func TestPrimitivesetRawEntries(t *testing.T) { function TestPrimitivesetPrefixedEntries (line 135) | func TestPrimitivesetPrefixedEntries(t *testing.T) { function TestAddWithInvalidInput (line 239) | func TestAddWithInvalidInput(t *testing.T) { FILE: go/core/registry/custom_key_manager_test.go constant customTypeURL (line 36) | customTypeURL = "type.googleapis.com/google.crypto.tink.CustomAesGcmKey" type customKeyManager (line 40) | type customKeyManager struct method Primitive (line 45) | func (km *customKeyManager) Primitive(serializedKey []byte) (any, erro... method NewKey (line 58) | func (km *customKeyManager) NewKey(serializedKeyFormat []byte) (proto.... method NewKeyData (line 62) | func (km *customKeyManager) NewKeyData(serializedKeyFormat []byte) (*t... method DoesSupport (line 85) | func (km *customKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 89) | func (km *customKeyManager) TypeURL() string { method KeyMaterialType (line 93) | func (km *customKeyManager) KeyMaterialType() tinkpb.KeyData_KeyMateri... function aesGCM128KeyTemplate (line 98) | func aesGCM128KeyTemplate() *tinkpb.KeyTemplate { function aesGCM128KeyToKeysetHandle (line 114) | func aesGCM128KeyToKeysetHandle(rawAESKey []byte, keyID uint32, prefixTy... function TestCreateEncryptDecrypt (line 146) | func TestCreateEncryptDecrypt(t *testing.T) { function TestImportExistingKeyDecryptsExistingCiphertext (line 172) | func TestImportExistingKeyDecryptsExistingCiphertext(t *testing.T) { function TestEncryptAndDecryptWithTinkPrefix (line 205) | func TestEncryptAndDecryptWithTinkPrefix(t *testing.T) { function TestMixedKeysetWorks (line 253) | func TestMixedKeysetWorks(t *testing.T) { function TestSerializeAndParseKeysetWorks (line 301) | func TestSerializeAndParseKeysetWorks(t *testing.T) { function init (line 347) | func init() { registry.RegisterKeyManager(&customKeyManager{}) } FILE: go/core/registry/key_manager.go type KeyManager (line 26) | type KeyManager interface FILE: go/core/registry/kms_client.go type KMSClient (line 20) | type KMSClient interface FILE: go/core/registry/private_key_manager.go type PrivateKeyManager (line 22) | type PrivateKeyManager interface FILE: go/core/registry/registry.go function RegisterKeyManager (line 48) | func RegisterKeyManager(keyManager KeyManager) error { function GetKeyManager (line 60) | func GetKeyManager(typeURL string) (KeyManager, error) { function NewKeyData (line 71) | func NewKeyData(template *tinkpb.KeyTemplate) (*tinkpb.KeyData, error) { function NewKey (line 85) | func NewKey(template *tinkpb.KeyTemplate) (proto.Message, error) { function PrimitiveFromKeyData (line 99) | func PrimitiveFromKeyData(keyData *tinkpb.KeyData) (any, error) { function Primitive (line 110) | func Primitive(typeURL string, serializedKey []byte) (any, error) { function RegisterKMSClient (line 130) | func RegisterKMSClient(kmsClient KMSClient) { function GetKMSClient (line 137) | func GetKMSClient(keyURI string) (KMSClient, error) { function ClearKMSClients (line 151) | func ClearKMSClients() { FILE: go/core/registry/registry_test.go function TestRegisterKeyManager (line 33) | func TestRegisterKeyManager(t *testing.T) { function TestRegisterKeyManagerWithCollision (line 50) | func TestRegisterKeyManagerWithCollision(t *testing.T) { function TestNewKeyData (line 70) | func TestNewKeyData(t *testing.T) { function TestNewKey (line 94) | func TestNewKey(t *testing.T) { function TestPrimitiveFromKeyData (line 120) | func TestPrimitiveFromKeyData(t *testing.T) { function TestPrimitive (line 144) | func TestPrimitive(t *testing.T) { function TestRegisterKmsClient (line 178) | func TestRegisterKmsClient(t *testing.T) { function TestRegisterTwoKmsClientsForSameUri_firstGetsReturned (line 213) | func TestRegisterTwoKmsClientsForSameUri_firstGetsReturned(t *testing.T) { function TestClearKMSClients (line 236) | func TestClearKMSClients(t *testing.T) { FILE: go/daead/aes_siv_key_manager.go constant aesSIVKeyVersion (line 33) | aesSIVKeyVersion = 0 constant aesSIVTypeURL (line 34) | aesSIVTypeURL = "type.googleapis.com/google.crypto.tink.AesSivKey" type aesSIVKeyManager (line 43) | type aesSIVKeyManager struct method Primitive (line 49) | func (km *aesSIVKeyManager) Primitive(serializedKey []byte) (any, erro... method NewKey (line 69) | func (km *aesSIVKeyManager) NewKey(serializedKeyFormat []byte) (proto.... method NewKeyData (line 89) | func (km *aesSIVKeyManager) NewKeyData(serializedKeyFormat []byte) (*t... method DoesSupport (line 106) | func (km *aesSIVKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 111) | func (km *aesSIVKeyManager) TypeURL() string { method KeyMaterialType (line 116) | func (km *aesSIVKeyManager) KeyMaterialType() tpb.KeyData_KeyMaterialT... method DeriveKey (line 122) | func (km *aesSIVKeyManager) DeriveKey(serializedKeyFormat []byte, pseu... method validateKey (line 145) | func (km *aesSIVKeyManager) validateKey(key *aspb.AesSivKey) error { FILE: go/daead/aes_siv_key_manager_test.go function TestAESSIVPrimitive (line 35) | func TestAESSIVPrimitive(t *testing.T) { function TestAESSIVPrimitiveWithInvalidKeys (line 61) | func TestAESSIVPrimitiveWithInvalidKeys(t *testing.T) { function TestAESSIVNewKey (line 101) | func TestAESSIVNewKey(t *testing.T) { function TestAESSIVNewKeyData (line 119) | func TestAESSIVNewKeyData(t *testing.T) { function TestAESSIVNewKeyInvalid (line 143) | func TestAESSIVNewKeyInvalid(t *testing.T) { function TestAESSIVDoesSupport (line 182) | func TestAESSIVDoesSupport(t *testing.T) { function TestAESSIVTypeURL (line 195) | func TestAESSIVTypeURL(t *testing.T) { function TestAESSIVKeyMaterialType (line 205) | func TestAESSIVKeyMaterialType(t *testing.T) { function TestAESSIVDeriveKey (line 219) | func TestAESSIVDeriveKey(t *testing.T) { function TestAESSIVDeriveKeyFailsWithInvalidKeyFormats (line 251) | func TestAESSIVDeriveKeyFailsWithInvalidKeyFormats(t *testing.T) { function TestAESSIVDeriveKeyFailsWithMalformedKeyFormats (line 298) | func TestAESSIVDeriveKeyFailsWithMalformedKeyFormats(t *testing.T) { function TestAESSIVDeriveKeyFailsWithInsufficientRandomness (line 335) | func TestAESSIVDeriveKeyFailsWithInsufficientRandomness(t *testing.T) { function validateAESSIVPrimitive (line 365) | func validateAESSIVPrimitive(p any, key *aspb.AesSivKey) error { function validateAESSIVKey (line 384) | func validateAESSIVKey(key *aspb.AesSivKey) error { FILE: go/daead/daead.go function init (line 28) | func init() { FILE: go/daead/daead_benchmark_test.go function BenchmarkAESSIV (line 30) | func BenchmarkAESSIV(b *testing.B) { FILE: go/daead/daead_factory.go function New (line 30) | func New(handle *keyset.Handle) (tink.DeterministicAEAD, error) { type wrappedDeterministicAEAD (line 40) | type wrappedDeterministicAEAD struct method EncryptDeterministically (line 102) | func (d *wrappedDeterministicAEAD) EncryptDeterministically(pt, aad []... method DecryptDeterministically (line 127) | func (d *wrappedDeterministicAEAD) DecryptDeterministically(ct, aad []... function newWrappedDeterministicAEAD (line 49) | func newWrappedDeterministicAEAD(ps *primitiveset.PrimitiveSet) (*wrappe... function createLoggers (line 72) | func createLoggers(ps *primitiveset.PrimitiveSet) (monitoring.Logger, mo... FILE: go/daead/daead_factory_test.go function TestFactoryMultipleKeys (line 43) | func TestFactoryMultipleKeys(t *testing.T) { function TestFactoryRawKeyAsPrimary (line 112) | func TestFactoryRawKeyAsPrimary(t *testing.T) { function validateDAEADFactoryCipher (line 130) | func validateDAEADFactoryCipher(encryptCipher, decryptCipher tink.Determ... function TestFactoryWithInvalidPrimitiveSetType (line 164) | func TestFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestFactoryWithValidPrimitiveSetType (line 176) | func TestFactoryWithValidPrimitiveSetType(t *testing.T) { function TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecryptionWithPrefix (line 188) | func TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecrypti... function TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecryptionWithoutPrefix (line 252) | func TestPrimitiveFactoryWithMonitoringAnnotationsLogsEncryptionDecrypti... function TestFactoryWithMonitoringPrimitiveWithMultipleKeysLogsEncryptionDecryption (line 319) | func TestFactoryWithMonitoringPrimitiveWithMultipleKeysLogsEncryptionDec... function TestPrimitiveFactoryWithMonitoringAnnotationsEncryptionFailureIsLogged (line 421) | func TestPrimitiveFactoryWithMonitoringAnnotationsEncryptionFailureIsLog... function TestPrimitiveFactoryWithMonitoringAnnotationsDecryptionFailureIsLogged (line 491) | func TestPrimitiveFactoryWithMonitoringAnnotationsDecryptionFailureIsLog... function TestFactoryWithMonitoringMultiplePrimitivesLogOperations (line 544) | func TestFactoryWithMonitoringMultiplePrimitivesLogOperations(t *testing... function TestPrimitiveFactoryEncryptDecryptWithoutAnnotationsDoesNotMonitor (line 640) | func TestPrimitiveFactoryEncryptDecryptWithoutAnnotationsDoesNotMonitor(... FILE: go/daead/daead_init_test.go function TestDeterministicAEADInit (line 24) | func TestDeterministicAEADInit(t *testing.T) { FILE: go/daead/daead_key_templates.go function AESSIVKeyTemplate (line 27) | func AESSIVKeyTemplate() *tinkpb.KeyTemplate { FILE: go/daead/daead_key_templates_test.go function TestKeyTemplates (line 28) | func TestKeyTemplates(t *testing.T) { function testEncryptDecrypt (line 45) | func testEncryptDecrypt(template *tinkpb.KeyTemplate) error { FILE: go/daead/daead_test.go function Example (line 29) | func Example() { FILE: go/daead/subtle/aes_siv.go type AESSIV (line 52) | type AESSIV struct method EncryptDeterministically (line 112) | func (asc *AESSIV) EncryptDeterministically(plaintext, associatedData ... method DecryptDeterministically (line 129) | func (asc *AESSIV) DecryptDeterministically(ciphertext, associatedData... method ctrCrypt (line 153) | func (asc *AESSIV) ctrCrypt(siv, in, out []byte) error { method s2v (line 172) | func (asc *AESSIV) s2v(msg, ad, siv []byte) { method cmacLong (line 197) | func (asc *AESSIV) cmacLong(data, last, mac []byte) { method cmac (line 228) | func (asc *AESSIV) cmac(data, mac []byte) { constant AESSIVKeySize (line 62) | AESSIVKeySize = 64 constant intSize (line 64) | intSize = 32 << (^uint(0) >> 63) constant maxInt (line 65) | maxInt = 1<<(intSize-1) - 1 function NewAESSIV (line 69) | func NewAESSIV(key []byte) (*AESSIV, error) { function multiplyByX (line 102) | func multiplyByX(block []byte) { function xorBlock (line 257) | func xorBlock(x, block []byte) { FILE: go/daead/subtle/aes_siv_test.go type AESSIVSuite (line 27) | type AESSIVSuite struct type testGroup (line 34) | type testGroup struct type testCase (line 40) | type testCase struct function TestAESSIV_EncryptDecrypt (line 49) | func TestAESSIV_EncryptDecrypt(t *testing.T) { function TestAESSIV_EmptyPlaintext (line 77) | func TestAESSIV_EmptyPlaintext(t *testing.T) { function TestAESSIV_EmptyAdditionalData (line 113) | func TestAESSIV_EmptyAdditionalData(t *testing.T) { function TestAESSIV_KeySizes (line 144) | func TestAESSIV_KeySizes(t *testing.T) { function TestAESSIV_MessageSizes (line 166) | func TestAESSIV_MessageSizes(t *testing.T) { function TestAESSIV_AdditionalDataSizes (line 208) | func TestAESSIV_AdditionalDataSizes(t *testing.T) { function TestAESSIV_CiphertextModifications (line 237) | func TestAESSIV_CiphertextModifications(t *testing.T) { function TestAESSIV_WycheproofVectors (line 270) | func TestAESSIV_WycheproofVectors(t *testing.T) { FILE: go/hybrid/ecies_aead_hkdf_dem_helper.go constant aesGCMTypeURL (line 33) | aesGCMTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmKey" constant aesCTRHMACAEADTypeURL (line 34) | aesCTRHMACAEADTypeURL = "type.googleapis.com/google.crypto.tink.AesCtrHm... constant aesSIVTypeURL (line 35) | aesSIVTypeURL = "type.googleapis.com/google.crypto.tink.AesSivKey" type eciesAEADHKDFDEMHelper (line 40) | type eciesAEADHKDFDEMHelper struct method GetSymmetricKeySize (line 118) | func (r *eciesAEADHKDFDEMHelper) GetSymmetricKeySize() uint32 { method GetAEADOrDAEAD (line 124) | func (r *eciesAEADHKDFDEMHelper) GetAEADOrDAEAD(symmetricKeyValue []by... function newRegisterECIESAEADHKDFDemHelper (line 50) | func newRegisterECIESAEADHKDFDemHelper(k *tinkpb.KeyTemplate) (*eciesAEA... FILE: go/hybrid/ecies_aead_hkdf_dem_helper_test.go type eciesAEADHKDFDEMHelperTestCase (line 30) | type eciesAEADHKDFDEMHelperTestCase struct function TestECIESAEADHKDFDEMHelper_AEADKeyTemplates (line 69) | func TestECIESAEADHKDFDEMHelper_AEADKeyTemplates(t *testing.T) { function TestECIESAEADHKDFDEMHelper_DAEADKeyTemplates (line 108) | func TestECIESAEADHKDFDEMHelper_DAEADKeyTemplates(t *testing.T) { function TestECIESAEADHKDFDEMHelper_KeySizes (line 147) | func TestECIESAEADHKDFDEMHelper_KeySizes(t *testing.T) { function TestECIESAEADHKDFDEMHelper_UnsupportedKeyTemplates (line 175) | func TestECIESAEADHKDFDEMHelper_UnsupportedKeyTemplates(t *testing.T) { FILE: go/hybrid/ecies_aead_hkdf_hybrid_decrypt_test.go function modifyDecrypt (line 30) | func modifyDecrypt(t *testing.T, c string, k *tinkpb.KeyTemplate) { function TestECAESCTRHMACSHA256Decrypt (line 94) | func TestECAESCTRHMACSHA256Decrypt(t *testing.T) { function TestECAES256GCMDecrypt (line 106) | func TestECAES256GCMDecrypt(t *testing.T) { function TestECAESSIVDecrypt (line 118) | func TestECAESSIVDecrypt(t *testing.T) { function TestECAESSIVTestVectors (line 125) | func TestECAESSIVTestVectors(t *testing.T) { FILE: go/hybrid/ecies_aead_hkdf_hybrid_encrypt_test.go function basicMultipleEncrypts (line 28) | func basicMultipleEncrypts(t *testing.T, c string, k *tinkpb.KeyTemplate) { function TestECAESCTRHMACSHA256Encrypt (line 78) | func TestECAESCTRHMACSHA256Encrypt(t *testing.T) { function TestECAES256GCMEncrypt (line 90) | func TestECAES256GCMEncrypt(t *testing.T) { function TestECAESSIVEncrypt (line 102) | func TestECAESSIVEncrypt(t *testing.T) { FILE: go/hybrid/ecies_aead_hkdf_private_key_manager.go constant eciesAEADHKDFPrivateKeyKeyVersion (line 31) | eciesAEADHKDFPrivateKeyKeyVersion = 0 constant eciesAEADHKDFPrivateKeyTypeURL (line 32) | eciesAEADHKDFPrivateKeyTypeURL = "type.googleapis.com/google.crypto.t... type eciesAEADHKDFPrivateKeyKeyManager (line 41) | type eciesAEADHKDFPrivateKeyKeyManager struct method Primitive (line 47) | func (km *eciesAEADHKDFPrivateKeyKeyManager) Primitive(serializedKey [... method NewKey (line 75) | func (km *eciesAEADHKDFPrivateKeyKeyManager) NewKey(serializedKeyForma... method NewKeyData (line 111) | func (km *eciesAEADHKDFPrivateKeyKeyManager) NewKeyData(serializedKeyF... method PublicKeyData (line 127) | func (km *eciesAEADHKDFPrivateKeyKeyManager) PublicKeyData(serializedP... method DoesSupport (line 144) | func (km *eciesAEADHKDFPrivateKeyKeyManager) DoesSupport(typeURL strin... method TypeURL (line 149) | func (km *eciesAEADHKDFPrivateKeyKeyManager) TypeURL() string { method validateKey (line 154) | func (km *eciesAEADHKDFPrivateKeyKeyManager) validateKey(key *eahpb.Ec... method validateKeyFormat (line 162) | func (km *eciesAEADHKDFPrivateKeyKeyManager) validateKeyFormat(format ... function checkECIESAEADHKDFParams (line 166) | func checkECIESAEADHKDFParams(params *eahpb.EciesAeadHkdfParams) error { FILE: go/hybrid/ecies_aead_hkdf_private_key_manager_test.go function TestECIESAEADHKDFPrivateKeyManagerPrimitive (line 28) | func TestECIESAEADHKDFPrivateKeyManagerPrimitive(t *testing.T) { function TestECIESAEADHKDFPrivateKeyManagerPrimitiveErrors (line 44) | func TestECIESAEADHKDFPrivateKeyManagerPrimitiveErrors(t *testing.T) { function TestECIESAEADHKDFPrivateKeyManagerNewKey (line 84) | func TestECIESAEADHKDFPrivateKeyManagerNewKey(t *testing.T) { function TestECIESAEADHKDFPrivateKeyManagerNewKeyErrors (line 99) | func TestECIESAEADHKDFPrivateKeyManagerNewKeyErrors(t *testing.T) { function makeValidECIESAEADHKDFKeyFormat (line 182) | func makeValidECIESAEADHKDFKeyFormat(t *testing.T) *eahpb.EciesAeadHkdfK... function makeValidECIESAEADHKDFPrivateKey (line 199) | func makeValidECIESAEADHKDFPrivateKey(t *testing.T) *eahpb.EciesAeadHkdf... function mustMarshal (line 222) | func mustMarshal(t *testing.T, msg proto.Message) []byte { FILE: go/hybrid/ecies_aead_hkdf_public_key_manager.go constant eciesAEADHKDFPublicKeyKeyVersion (line 31) | eciesAEADHKDFPublicKeyKeyVersion = 0 constant eciesAEADHKDFPublicKeyTypeURL (line 33) | eciesAEADHKDFPublicKeyTypeURL = "type.googleapis.com/google.crypto.tink.... type eciesAEADHKDFPublicKeyKeyManager (line 42) | type eciesAEADHKDFPublicKeyKeyManager struct method Primitive (line 48) | func (km *eciesAEADHKDFPublicKeyKeyManager) Primitive(serializedKey []... method DoesSupport (line 83) | func (km *eciesAEADHKDFPublicKeyKeyManager) DoesSupport(typeURL string... method TypeURL (line 88) | func (km *eciesAEADHKDFPublicKeyKeyManager) TypeURL() string { method validateKey (line 93) | func (km *eciesAEADHKDFPublicKeyKeyManager) validateKey(key *eahpb.Eci... method NewKey (line 101) | func (km *eciesAEADHKDFPublicKeyKeyManager) NewKey(serializedKeyFormat... method NewKeyData (line 106) | func (km *eciesAEADHKDFPublicKeyKeyManager) NewKeyData(serializedKeyFo... FILE: go/hybrid/ecies_aead_hkdf_public_key_manager_test.go function TestECIESAEADHKDFPublicKeyManagerPrimitive (line 26) | func TestECIESAEADHKDFPublicKeyManagerPrimitive(t *testing.T) { function TestECIESAEADHKDFPublicKeyManagerPrimitiveErrors (line 42) | func TestECIESAEADHKDFPublicKeyManagerPrimitiveErrors(t *testing.T) { function makeValidECIESAEADHKDFPublicKey (line 131) | func makeValidECIESAEADHKDFPublicKey(t *testing.T) *eahpb.EciesAeadHkdfP... FILE: go/hybrid/ecies_aead_hkdf_test.go constant eciesAEADHKDFPrivateKeyKeyVersion (line 18) | eciesAEADHKDFPrivateKeyKeyVersion = 0 constant eciesAEADHKDFPrivateKeyTypeURL (line 19) | eciesAEADHKDFPrivateKeyTypeURL = "type.googleapis.com/google.crypto.t... constant eciesAEADHKDFPublicKeyKeyVersion (line 21) | eciesAEADHKDFPublicKeyKeyVersion = 0 constant eciesAEADHKDFPublicKeyTypeURL (line 22) | eciesAEADHKDFPublicKeyTypeURL = "type.googleapis.com/google.crypto.ti... FILE: go/hybrid/hpke_private_key_manager.go constant maxSupportedHPKEPrivateKeyVersion (line 34) | maxSupportedHPKEPrivateKeyVersion uint32 = 0 constant hpkePrivateKeyTypeURL (line 35) | hpkePrivateKeyTypeURL = "type.googleapis.com/google.c... type hpkePrivateKeyManager (line 44) | type hpkePrivateKeyManager struct method Primitive (line 48) | func (p *hpkePrivateKeyManager) Primitive(serializedKey []byte) (any, ... method NewKey (line 63) | func (p *hpkePrivateKeyManager) NewKey(serializedKeyFormat []byte) (pr... method NewKeyData (line 95) | func (p *hpkePrivateKeyManager) NewKeyData(serializedKeyFormat []byte)... method PublicKeyData (line 111) | func (p *hpkePrivateKeyManager) PublicKeyData(serializedPrivKey []byte... method DoesSupport (line 127) | func (p *hpkePrivateKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 131) | func (p *hpkePrivateKeyManager) TypeURL() string { function validateKeyFormat (line 135) | func validateKeyFormat(kf *hpkepb.HpkeKeyFormat) error { FILE: go/hybrid/hpke_private_key_manager_test.go function TestPrivateKeyManagerPrimitiveRejectsInvalidKeyVersion (line 31) | func TestPrivateKeyManagerPrimitiveRejectsInvalidKeyVersion(t *testing.T) { function TestPrivateKeyManagerPrimitiveRejectsInvalidParams (line 52) | func TestPrivateKeyManagerPrimitiveRejectsInvalidParams(t *testing.T) { function TestPrivateKeyManagerPrimitiveRejectsMissingParams (line 98) | func TestPrivateKeyManagerPrimitiveRejectsMissingParams(t *testing.T) { function TestPrivateKeyManagerPrimitiveRejectsNilKey (line 109) | func TestPrivateKeyManagerPrimitiveRejectsNilKey(t *testing.T) { function TestPrivateKeyManagerPrimitiveEncryptDecrypt (line 119) | func TestPrivateKeyManagerPrimitiveEncryptDecrypt(t *testing.T) { function TestPrivateKeyManagerNewKeyRejectsNilKeyFormat (line 166) | func TestPrivateKeyManagerNewKeyRejectsNilKeyFormat(t *testing.T) { function TestPrivateKeyManagerNewKeyRejectsInvalidKeyFormat (line 176) | func TestPrivateKeyManagerNewKeyRejectsInvalidKeyFormat(t *testing.T) { function TestPrivateKeyManagerNewKeyEncryptDecrypt (line 227) | func TestPrivateKeyManagerNewKeyEncryptDecrypt(t *testing.T) { function TestPrivateKeyManagerNewKeyDataRejectsNilKeyFormat (line 306) | func TestPrivateKeyManagerNewKeyDataRejectsNilKeyFormat(t *testing.T) { function TestPrivateKeyManagerNewKeyData (line 316) | func TestPrivateKeyManagerNewKeyData(t *testing.T) { function TestPrivateKeyManagerPublicKeyDataAcceptsNilKey (line 370) | func TestPrivateKeyManagerPublicKeyDataAcceptsNilKey(t *testing.T) { function TestPrivateKeyManagerPublicKeyData (line 384) | func TestPrivateKeyManagerPublicKeyData(t *testing.T) { function TestPrivateKeyManagerDoesSupport (line 425) | func TestPrivateKeyManagerDoesSupport(t *testing.T) { function TestPrivateKeyManagerTypeURL (line 439) | func TestPrivateKeyManagerTypeURL(t *testing.T) { FILE: go/hybrid/hpke_public_key_manager.go constant maxSupportedHPKEPublicKeyVersion (line 31) | maxSupportedHPKEPublicKeyVersion = 0 constant hpkePublicKeyTypeURL (line 32) | hpkePublicKeyTypeURL = "type.googleapis.com/google.crypto.ti... type hpkePublicKeyManager (line 41) | type hpkePublicKeyManager struct method Primitive (line 45) | func (p *hpkePublicKeyManager) Primitive(serializedKey []byte) (any, e... method DoesSupport (line 59) | func (p *hpkePublicKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 63) | func (p *hpkePublicKeyManager) TypeURL() string { method NewKey (line 67) | func (p *hpkePublicKeyManager) NewKey(serializedKeyFormat []byte) (pro... method NewKeyData (line 71) | func (p *hpkePublicKeyManager) NewKeyData(serializedKeyFormat []byte) ... FILE: go/hybrid/hpke_public_key_manager_test.go function TestPublicKeyManagerPrimitiveRejectsInvalidKeyVersion (line 35) | func TestPublicKeyManagerPrimitiveRejectsInvalidKeyVersion(t *testing.T) { function TestPublicKeyManagerPrimitiveRejectsInvalidParams (line 56) | func TestPublicKeyManagerPrimitiveRejectsInvalidParams(t *testing.T) { function TestPublicKeyManagerPrimitiveRejectsMissingParams (line 93) | func TestPublicKeyManagerPrimitiveRejectsMissingParams(t *testing.T) { function TestPublicKeyManagerPrimitiveRejectsNilKey (line 104) | func TestPublicKeyManagerPrimitiveRejectsNilKey(t *testing.T) { function TestPublicKeyManagerPrimitiveEncryptDecrypt (line 114) | func TestPublicKeyManagerPrimitiveEncryptDecrypt(t *testing.T) { function TestPublicKeyManagerDoesSupport (line 162) | func TestPublicKeyManagerDoesSupport(t *testing.T) { function TestPublicKeyManagerTypeURL (line 176) | func TestPublicKeyManagerTypeURL(t *testing.T) { function TestPublicKeyManagerNotSupported (line 186) | func TestPublicKeyManagerNotSupported(t *testing.T) { function serializedPubPrivKeys (line 199) | func serializedPubPrivKeys(t *testing.T, params *hpkepb.HpkeParams) ([]b... function pubPrivKeys (line 213) | func pubPrivKeys(t *testing.T, params *hpkepb.HpkeParams) (*hpkepb.HpkeP... FILE: go/hybrid/hybrid.go function init (line 37) | func init() { FILE: go/hybrid/hybrid_benchmark_test.go constant benchmarkPlaintextSize (line 28) | benchmarkPlaintextSize = 1 * 1024 constant benchmarkContextInfoSize (line 29) | benchmarkContextInfoSize = 256 function BenchmarkEncrypt (line 59) | func BenchmarkEncrypt(b *testing.B) { function BenchmarkDecrypt (line 89) | func BenchmarkDecrypt(b *testing.B) { FILE: go/hybrid/hybrid_decrypt_factory.go function NewHybridDecrypt (line 30) | func NewHybridDecrypt(handle *keyset.Handle) (tink.HybridDecrypt, error) { type wrappedHybridDecrypt (line 40) | type wrappedHybridDecrypt struct method Decrypt (line 87) | func (a *wrappedHybridDecrypt) Decrypt(ciphertext, contextInfo []byte)... function newWrappedHybridDecrypt (line 48) | func newWrappedHybridDecrypt(ps *primitiveset.PrimitiveSet) (*wrappedHyb... function createDecryptLogger (line 70) | func createDecryptLogger(ps *primitiveset.PrimitiveSet) (monitoring.Logg... function isHybridDecrypt (line 126) | func isHybridDecrypt(p any) error { FILE: go/hybrid/hybrid_encrypt_factory.go function NewHybridEncrypt (line 29) | func NewHybridEncrypt(handle *keyset.Handle) (tink.HybridEncrypt, error) { type wrappedHybridEncrypt (line 38) | type wrappedHybridEncrypt struct method Encrypt (line 85) | func (a *wrappedHybridEncrypt) Encrypt(plaintext, contextInfo []byte) ... function newEncryptPrimitiveSet (line 46) | func newEncryptPrimitiveSet(ps *primitiveset.PrimitiveSet) (*wrappedHybr... function createEncryptLogger (line 68) | func createEncryptLogger(ps *primitiveset.PrimitiveSet) (monitoring.Logg... function isHybridEncrypt (line 106) | func isHybridEncrypt(p any) error { FILE: go/hybrid/hybrid_factory_test.go function TestHybridFactoryTest (line 40) | func TestHybridFactoryTest(t *testing.T) { function TestFactoryWithInvalidPrimitiveSetType (line 113) | func TestFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestFactoryWithValidPrimitiveSetType (line 130) | func TestFactoryWithValidPrimitiveSetType(t *testing.T) { function TestPrimitiveFactoryFailsWhenKeysetHasNoPrimary (line 151) | func TestPrimitiveFactoryFailsWhenKeysetHasNoPrimary(t *testing.T) { function TestPrimitiveFactoryMonitoringWithAnnotationsLogsEncryptAndDecryptWithPrefix (line 189) | func TestPrimitiveFactoryMonitoringWithAnnotationsLogsEncryptAndDecryptW... function TestPrimitiveFactoryMonitoringWithAnnotationsLogsEncryptAndDecryptWithoutPrefix (line 281) | func TestPrimitiveFactoryMonitoringWithAnnotationsLogsEncryptAndDecryptW... function TestPrimitiveFactoryWithMonitoringWithMultipleKeysLogsEncryptionDecryption (line 371) | func TestPrimitiveFactoryWithMonitoringWithMultipleKeysLogsEncryptionDec... function TestPrimitiveFactoryMonitoringWithAnnotationsEncryptFailureIsLogged (line 514) | func TestPrimitiveFactoryMonitoringWithAnnotationsEncryptFailureIsLogged... function TestPrimitiveFactoryMonitoringWithAnnotationsDecryptFailureIsLogged (line 592) | func TestPrimitiveFactoryMonitoringWithAnnotationsDecryptFailureIsLogged... function TestPrimitiveFactoryEncryptDecryptWithoutAnnotationsDoesNotMonitor (line 644) | func TestPrimitiveFactoryEncryptDecryptWithoutAnnotationsDoesNotMonitor(... function TestEncryptFactoryFailsOnAEADHandle (line 686) | func TestEncryptFactoryFailsOnAEADHandle(t *testing.T) { function TestDecryptFactoryFailsOnAEADHandle (line 710) | func TestDecryptFactoryFailsOnAEADHandle(t *testing.T) { FILE: go/hybrid/hybrid_key_templates.go function DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_128_GCM_Key_Template (line 39) | func DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_128_GCM_Key_Template() *ti... function DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_128_GCM_Raw_Key_Template (line 55) | func DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_128_GCM_Raw_Key_Template()... function DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM_Key_Template (line 71) | func DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM_Key_Template() *ti... function DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM_Raw_Key_Template (line 87) | func DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_256_GCM_Raw_Key_Template()... function DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_CHACHA20_POLY1305_Key_Template (line 103) | func DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_CHACHA20_POLY1305_Key_Template... function DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_CHACHA20_POLY1305_Raw_Key_Template (line 119) | func DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_CHACHA20_POLY1305_Raw_Key_Temp... function createHPKEKeyTemplate (line 130) | func createHPKEKeyTemplate(kem hpkepb.HpkeKem, kdf hpkepb.HpkeKdf, aead ... function ECIESHKDFAES128GCMKeyTemplate (line 153) | func ECIESHKDFAES128GCMKeyTemplate() *tinkpb.KeyTemplate { function ECIESHKDFAES128CTRHMACSHA256KeyTemplate (line 169) | func ECIESHKDFAES128CTRHMACSHA256KeyTemplate() *tinkpb.KeyTemplate { function createECIESAEADHKDFKeyTemplate (line 176) | func createECIESAEADHKDFKeyTemplate(c commonpb.EllipticCurveType, ht com... FILE: go/hybrid/hybrid_key_templates_test.go function createECIESKeyTemplate (line 33) | func createECIESKeyTemplate(curveType commonpb.EllipticCurveType, hashTy... function eciesP384AES256GCMKeyTemplate (line 58) | func eciesP384AES256GCMKeyTemplate() *tinkpb.KeyTemplate { function eciesP521AES256GCMKeyTemplate (line 62) | func eciesP521AES256GCMKeyTemplate() *tinkpb.KeyTemplate { function eciesP256AESSIVKeyTemplate (line 66) | func eciesP256AESSIVKeyTemplate() *tinkpb.KeyTemplate { function TestKeyTemplates (line 70) | func TestKeyTemplates(t *testing.T) { FILE: go/hybrid/hybrid_test.go function Example (line 29) | func Example() { FILE: go/hybrid/internal/hpke/aead.go type aead (line 22) | type aead interface FILE: go/hybrid/internal/hpke/aes_gcm_aead.go type aesGCMAEAD (line 25) | type aesGCMAEAD struct method seal (line 45) | func (a *aesGCMAEAD) seal(key, nonce, plaintext, associatedData []byte... method open (line 56) | func (a *aesGCMAEAD) open(key, nonce, ciphertext, associatedData []byt... method id (line 67) | func (a *aesGCMAEAD) id() uint16 { method keyLength (line 71) | func (a *aesGCMAEAD) keyLength() int { method nonceLength (line 75) | func (a *aesGCMAEAD) nonceLength() int { function newAESGCMAEAD (line 34) | func newAESGCMAEAD(keyLength int) (*aesGCMAEAD, error) { FILE: go/hybrid/internal/hpke/aes_gcm_aead_test.go function TestAESGCMAEADSealOpen (line 23) | func TestAESGCMAEADSealOpen(t *testing.T) { FILE: go/hybrid/internal/hpke/chacha20poly1305_aead.go type chaCha20Poly1305AEAD (line 26) | type chaCha20Poly1305AEAD struct method seal (line 30) | func (c *chaCha20Poly1305AEAD) seal(key, nonce, plaintext, associatedD... method open (line 41) | func (c *chaCha20Poly1305AEAD) open(key, nonce, ciphertext, associated... method id (line 52) | func (c *chaCha20Poly1305AEAD) id() uint16 { method keyLength (line 56) | func (c *chaCha20Poly1305AEAD) keyLength() int { method nonceLength (line 60) | func (c *chaCha20Poly1305AEAD) nonceLength() int { FILE: go/hybrid/internal/hpke/chacha20poly1305_aead_test.go function TestChaCha20Poly1305AEADSealOpen (line 23) | func TestChaCha20Poly1305AEADSealOpen(t *testing.T) { FILE: go/hybrid/internal/hpke/context.go type context (line 25) | type context struct method incrementSequenceNumber (line 99) | func (c *context) incrementSequenceNumber() error { method computeNonce (line 109) | func (c *context) computeNonce() ([]byte, error) { method seal (line 131) | func (c *context) seal(plaintext, associatedData []byte) ([]byte, erro... method open (line 149) | func (c *context) open(ciphertext, associatedData []byte) ([]byte, err... function newSenderContext (line 36) | func newSenderContext(recipientPubKey *pb.HpkePublicKey, kem kem, kdf kd... function newRecipientContext (line 49) | func newRecipientContext(encapsulatedKey []byte, recipientPrivKey *pb.Hp... function createContext (line 60) | func createContext(encapsulatedKey []byte, sharedSecret []byte, kem kem,... function maxSequenceNumber (line 92) | func maxSequenceNumber(nonceLength int) *big.Int { FILE: go/hybrid/internal/hpke/context_test.go function TestContextSender (line 27) | func TestContextSender(t *testing.T) { function TestContextRecipient (line 78) | func TestContextRecipient(t *testing.T) { function TestContextMaxSequenceNumber (line 124) | func TestContextMaxSequenceNumber(t *testing.T) { function TestComputeNonce (line 135) | func TestComputeNonce(t *testing.T) { FILE: go/hybrid/internal/hpke/decrypt.go type Decrypt (line 26) | type Decrypt struct method Decrypt (line 49) | func (d *Decrypt) Decrypt(ciphertext, contextInfo []byte) ([]byte, err... function NewDecrypt (line 37) | func NewDecrypt(recipientPrivKey *pb.HpkePrivateKey) (*Decrypt, error) { FILE: go/hybrid/internal/hpke/encrypt.go type Encrypt (line 26) | type Encrypt struct method Encrypt (line 48) | func (e *Encrypt) Encrypt(plaintext, contextInfo []byte) ([]byte, erro... function NewEncrypt (line 36) | func NewEncrypt(recipientPubKey *pb.HpkePublicKey) (*Encrypt, error) { FILE: go/hybrid/internal/hpke/encrypt_decrypt_test.go function TestNewEncryptDecryptUnknownKEM (line 27) | func TestNewEncryptDecryptUnknownKEM(t *testing.T) { function TestNewEncryptDecryptUnknownKDF (line 40) | func TestNewEncryptDecryptUnknownKDF(t *testing.T) { function TestNewEncryptDecryptUnknownAEAD (line 53) | func TestNewEncryptDecryptUnknownAEAD(t *testing.T) { function TestNewEncryptDecryptMissingParams (line 66) | func TestNewEncryptDecryptMissingParams(t *testing.T) { function TestNewEncryptMissingPubKeyBytes (line 77) | func TestNewEncryptMissingPubKeyBytes(t *testing.T) { function TestNewDecryptMissingPrivKeyBytes (line 89) | func TestNewDecryptMissingPrivKeyBytes(t *testing.T) { function TestEncryptDecrypt (line 101) | func TestEncryptDecrypt(t *testing.T) { function TestDecryptModifiedCiphertextOrContextInfo (line 136) | func TestDecryptModifiedCiphertextOrContextInfo(t *testing.T) { function TestEncryptDecryptEmptyContextInfo (line 185) | func TestEncryptDecryptEmptyContextInfo(t *testing.T) { function TestDecryptEncapsulatedKeyWithFlippedMSB (line 213) | func TestDecryptEncapsulatedKeyWithFlippedMSB(t *testing.T) { function validParams (line 245) | func validParams(t *testing.T) *pb.HpkeParams { function pubPrivKeys (line 254) | func pubPrivKeys(t *testing.T, params *pb.HpkeParams) (*pb.HpkePublicKey... function flipRandByte (line 279) | func flipRandByte(t *testing.T, b []byte) []byte { FILE: go/hybrid/internal/hpke/hkdf_kdf.go type hkdfKDF (line 26) | type hkdfKDF struct method labeledExtract (line 42) | func (h *hkdfKDF) labeledExtract(salt, ikm []byte, ikmLabel string, su... method labeledExpand (line 46) | func (h *hkdfKDF) labeledExpand(prk, info []byte, infoLabel string, su... method extractAndExpand (line 59) | func (h *hkdfKDF) extractAndExpand(salt, ikm []byte, ikmLabel string, ... method id (line 64) | func (h *hkdfKDF) id() uint16 { function newHKDFKDF (line 35) | func newHKDFKDF(hashFunction string) (*hkdfKDF, error) { FILE: go/hybrid/internal/hpke/hkdf_kdf_test.go function TestHKDFKDFLabeledExtract (line 28) | func TestHKDFKDFLabeledExtract(t *testing.T) { function TestHKDFKDFLabeledExpand (line 51) | func TestHKDFKDFLabeledExpand(t *testing.T) { function TestHKDFKDFLabeledExpandRFCVectors (line 90) | func TestHKDFKDFLabeledExpandRFCVectors(t *testing.T) { function TestHKDFKDFExtractAndExpand (line 154) | func TestHKDFKDFExtractAndExpand(t *testing.T) { FILE: go/hybrid/internal/hpke/hpke.go constant baseMode (line 27) | baseMode uint8 = 0x00 constant x25519HKDFSHA256 (line 30) | x25519HKDFSHA256 uint16 = 0x0020 constant hkdfSHA256 (line 33) | hkdfSHA256 uint16 = 0x0001 constant aes128GCM (line 36) | aes128GCM uint16 = 0x0001 constant aes256GCM (line 37) | aes256GCM uint16 = 0x0002 constant chaCha20Poly1305 (line 38) | chaCha20Poly1305 uint16 = 0x0003 constant sha256 (line 40) | sha256 = "SHA256" constant hpkeV1 (line 41) | hpkeV1 = "HPKE-v1" function kemSuiteID (line 52) | func kemSuiteID(kemID uint16) []byte { function hpkeSuiteID (line 58) | func hpkeSuiteID(kemID, kdfID, aeadID uint16) []byte { function keyScheduleContext (line 70) | func keyScheduleContext(mode uint8, pskIDHash, infoHash []byte) []byte { function labelIKM (line 81) | func labelIKM(label string, ikm, suiteID []byte) []byte { function labelInfo (line 93) | func labelInfo(label string, info, suiteID []byte, length int) ([]byte, ... FILE: go/hybrid/internal/hpke/hpke_test.go type hpkeID (line 42) | type hpkeID struct type vector (line 50) | type vector struct type encryptionVector (line 66) | type encryptionVector struct type encryptionString (line 75) | type encryptionString struct function internetDraftVector (line 84) | func internetDraftVector(t *testing.T) (hpkeID, vector) { function parseEncryptions (line 212) | func parseEncryptions(t *testing.T, encs []encryptionString) []encryptio... function aeadRFCVectors (line 246) | func aeadRFCVectors(t *testing.T) map[hpkeID]encryptionVector { function baseModeX25519HKDFSHA256Vectors (line 361) | func baseModeX25519HKDFSHA256Vectors(t *testing.T) map[hpkeID]vector { function TestHpkeSuiteIDMemoryAllocatedIsExact (line 422) | func TestHpkeSuiteIDMemoryAllocatedIsExact(t *testing.T) { function TestKeyScheduleContextMemoryAllocatedIsExact (line 429) | func TestKeyScheduleContextMemoryAllocatedIsExact(t *testing.T) { function TestLabelIKMMemoryAllocatedIsExact (line 436) | func TestLabelIKMMemoryAllocatedIsExact(t *testing.T) { function TestLabelInfoMemoryAllocatedIsExact (line 443) | func TestLabelInfoMemoryAllocatedIsExact(t *testing.T) { FILE: go/hybrid/internal/hpke/kdf.go type kdf (line 22) | type kdf interface FILE: go/hybrid/internal/hpke/kem.go type kem (line 22) | type kem interface FILE: go/hybrid/internal/hpke/primitive_factory.go function newPrimitivesFromProto (line 24) | func newPrimitivesFromProto(params *pb.HpkeParams) (kem, kdf, aead, erro... function newKEM (line 57) | func newKEM(kemID uint16) (kem, error) { function kemIDFromProto (line 67) | func kemIDFromProto(enum pb.HpkeKem) (uint16, error) { function newKDF (line 76) | func newKDF(kdfID uint16) (kdf, error) { function kdfIDFromProto (line 86) | func kdfIDFromProto(enum pb.HpkeKdf) (uint16, error) { function newAEAD (line 95) | func newAEAD(aeadID uint16) (aead, error) { function aeadIDFromProto (line 111) | func aeadIDFromProto(enum pb.HpkeAead) (uint16, error) { FILE: go/hybrid/internal/hpke/primitive_factory_test.go function TestNewKEM (line 23) | func TestNewKEM(t *testing.T) { function TestNewKEMUnsupportedID (line 41) | func TestNewKEMUnsupportedID(t *testing.T) { function TestKEMIDFromProtoUnsupportedID (line 47) | func TestKEMIDFromProtoUnsupportedID(t *testing.T) { function TestNewKDF (line 53) | func TestNewKDF(t *testing.T) { function TestNewKDFUnsupportedID (line 71) | func TestNewKDFUnsupportedID(t *testing.T) { function TestKDFIDFromProtoUnsupportedID (line 77) | func TestKDFIDFromProtoUnsupportedID(t *testing.T) { function TestNewAEAD (line 93) | func TestNewAEAD(t *testing.T) { function TestNewAEADUnsupportedID (line 115) | func TestNewAEADUnsupportedID(t *testing.T) { function TestAEADIDFromProtoUnsupportedID (line 121) | func TestAEADIDFromProtoUnsupportedID(t *testing.T) { function TestNewPrimitivesFromProto (line 127) | func TestNewPrimitivesFromProto(t *testing.T) { function TestNewPrimitivesFromProtoUnsupportedID (line 153) | func TestNewPrimitivesFromProtoUnsupportedID(t *testing.T) { FILE: go/hybrid/internal/hpke/x25519_kem.go type x25519KEM (line 30) | type x25519KEM struct method encapsulate (line 46) | func (x *x25519KEM) encapsulate(recipientPubKey []byte) (sharedSecret,... method decapsulate (line 66) | func (x *x25519KEM) decapsulate(encapsulatedKey, recipientPrivKey []by... method id (line 78) | func (x *x25519KEM) id() uint16 { method encapsulatedKeyLength (line 82) | func (x *x25519KEM) encapsulatedKeyLength() int { method deriveKEMSharedSecret (line 87) | func (x *x25519KEM) deriveKEMSharedSecret(dh, senderPubKey, recipientP... function newX25519KEM (line 39) | func newX25519KEM(macAlg string) (*x25519KEM, error) { FILE: go/hybrid/internal/hpke/x25519_kem_test.go function TestX25519KEMEncapsulateBoringSSLVectors (line 27) | func TestX25519KEMEncapsulateBoringSSLVectors(t *testing.T) { function TestX25519KEMEncapsulateBadRecipientPubKey (line 66) | func TestX25519KEMEncapsulateBadRecipientPubKey(t *testing.T) { function TestX25519KEMEncapsulateBadSenderPrivKey (line 78) | func TestX25519KEMEncapsulateBadSenderPrivKey(t *testing.T) { function TestX25519KEMDecapsulateBoringSSLVectors (line 94) | func TestX25519KEMDecapsulateBoringSSLVectors(t *testing.T) { function TestX25519KEMDecapsulateEncapsulatedKeyPrefixesLargerSlice (line 129) | func TestX25519KEMDecapsulateEncapsulatedKeyPrefixesLargerSlice(t *testi... function TestX25519KEMDecapsulateBadEncapsulatedKey (line 157) | func TestX25519KEMDecapsulateBadEncapsulatedKey(t *testing.T) { function TestX25519KEMDecapsulateBadRecipientPrivKey (line 169) | func TestX25519KEMDecapsulateBadRecipientPrivKey(t *testing.T) { function TestX25519KEMEncapsulatedKeyLength (line 181) | func TestX25519KEMEncapsulatedKeyLength(t *testing.T) { FILE: go/hybrid/subtle/ecies_aead_hkdf_dem_helper.go type EciesAEADHKDFDEMHelper (line 18) | type EciesAEADHKDFDEMHelper interface FILE: go/hybrid/subtle/ecies_aead_hkdf_hybrid_decrypt.go type ECIESAEADHKDFHybridDecrypt (line 25) | type ECIESAEADHKDFHybridDecrypt struct method Decrypt (line 46) | func (e *ECIESAEADHKDFHybridDecrypt) Decrypt(ciphertext, contextInfo [... function NewECIESAEADHKDFHybridDecrypt (line 35) | func NewECIESAEADHKDFHybridDecrypt(pvt *ECPrivateKey, hkdfSalt []byte, h... FILE: go/hybrid/subtle/ecies_aead_hkdf_hybrid_encrypt.go type ECIESAEADHKDFHybridEncrypt (line 26) | type ECIESAEADHKDFHybridEncrypt struct method Encrypt (line 54) | func (e *ECIESAEADHKDFHybridEncrypt) Encrypt(plaintext, contextInfo []... function NewECIESAEADHKDFHybridEncrypt (line 36) | func NewECIESAEADHKDFHybridEncrypt(pub *ECPublicKey, hkdfSalt []byte, hk... FILE: go/hybrid/subtle/ecies_hkdf_recipient_kem.go type ECIESHKDFRecipientKem (line 21) | type ECIESHKDFRecipientKem struct method decapsulate (line 26) | func (s *ECIESHKDFRecipientKem) decapsulate(kem []byte, hashAlg string... FILE: go/hybrid/subtle/ecies_hkdf_sender_kem.go type KEMKey (line 20) | type KEMKey struct type ECIESHKDFSenderKem (line 26) | type ECIESHKDFSenderKem struct method encapsulate (line 31) | func (s *ECIESHKDFSenderKem) encapsulate(hashAlg string, salt []byte, ... FILE: go/hybrid/subtle/elliptic_curves.go type ECPublicKey (line 27) | type ECPublicKey struct type ECPrivateKey (line 33) | type ECPrivateKey struct method getParams (line 63) | func (p *ECPrivateKey) getParams() *elliptic.CurveParams { function GetECPrivateKey (line 39) | func GetECPrivateKey(c elliptic.Curve, b []byte) *ECPrivateKey { type ECPoint (line 59) | type ECPoint struct function getModulus (line 67) | func getModulus(c elliptic.Curve) *big.Int { function fieldSizeInBits (line 71) | func fieldSizeInBits(c elliptic.Curve) int { function fieldSizeInBytes (line 77) | func fieldSizeInBytes(c elliptic.Curve) int { function encodingSizeInBytes (line 81) | func encodingSizeInBytes(c elliptic.Curve, p string) (int, error) { function PointEncode (line 96) | func PointEncode(c elliptic.Curve, pFormat string, pt ECPoint) ([]byte, ... function PointDecode (line 135) | func PointDecode(c elliptic.Curve, pFormat string, e []byte) (*ECPoint, ... function getY (line 194) | func getY(x *big.Int, lsb bool, c elliptic.Curve) *big.Int { function validatePublicPoint (line 218) | func validatePublicPoint(pub *ECPoint, priv *ECPrivateKey) error { function ComputeSharedSecret (line 226) | func ComputeSharedSecret(pub *ECPoint, priv *ECPrivateKey) ([]byte, erro... function maxSharedKeyLength (line 245) | func maxSharedKeyLength(pub ECPublicKey) int { function GenerateECDHKeyPair (line 250) | func GenerateECDHKeyPair(c elliptic.Curve) (*ECPrivateKey, error) { function GetCurve (line 269) | func GetCurve(c string) (elliptic.Curve, error) { FILE: go/hybrid/subtle/elliptic_curves_test.go type testEC1 (line 35) | type testEC1 struct type testEC2 (line 40) | type testEC2 struct function TestPointOnCurve (line 429) | func TestPointOnCurve(t *testing.T) { function TestPointEncode (line 445) | func TestPointEncode(t *testing.T) { function TestPointDecode (line 468) | func TestPointDecode(t *testing.T) { function checkFlag (line 492) | func checkFlag(t *testing.T, flags []string, check []string) bool { function convertX509PublicKey (line 505) | func convertX509PublicKey(t *testing.T, b []byte) (*subtle.ECPublicKey, ... function convertPointPublicKey (line 525) | func convertPointPublicKey(t *testing.T, pk []byte, curve elliptic.Curve... function TestECWycheproofCases (line 540) | func TestECWycheproofCases(t *testing.T) { FILE: go/hybrid/subtle/public_key.go constant hpkeX25519HKDFSHA256PubKeyLen (line 31) | hpkeX25519HKDFSHA256PubKeyLen = 32 constant hpkePublicKeyTypeURL (line 33) | hpkePublicKeyTypeURL = "type.googleapis.com/google.crypto.tink.HpkePubl... constant hpkePrivateKeyTypeURL (line 34) | hpkePrivateKeyTypeURL = "type.googleapis.com/google.crypto.tink.HpkePriv... function SerializePrimaryPublicKey (line 45) | func SerializePrimaryPublicKey(handle *keyset.Handle, template *tinkpb.K... function KeysetHandleFromSerializedPublicKey (line 104) | func KeysetHandleFromSerializedPublicKey(pubKeyBytes []byte, template *t... function hpkeParamsFromTemplate (line 146) | func hpkeParamsFromTemplate(template *tinkpb.KeyTemplate) (*hpkepb.HpkeP... FILE: go/hybrid/subtle/public_key_test.go function TestHPKEPublicKeySerialization (line 31) | func TestHPKEPublicKeySerialization(t *testing.T) { function TestSerializePrimaryPublicKeyInvalidTemplateFails (line 82) | func TestSerializePrimaryPublicKeyInvalidTemplateFails(t *testing.T) { function TestSerializePrimaryPublicKeyInvalidHandleFails (line 117) | func TestSerializePrimaryPublicKeyInvalidHandleFails(t *testing.T) { function TestKeysetHandleFromSerializedPublicKeyInvalidTemplateFails (line 204) | func TestKeysetHandleFromSerializedPublicKeyInvalidTemplateFails(t *test... function keyDataFromBytes (line 243) | func keyDataFromBytes(t *testing.T, pubKeyBytes []byte, aeadID hpkepb.Hp... FILE: go/hybrid/subtle/subtle_test.go type ecdhSuite (line 19) | type ecdhSuite struct type ecdhGroup (line 25) | type ecdhGroup struct type ecdhCase (line 33) | type ecdhCase struct FILE: go/insecurecleartextkeyset/example_test.go function Example_cleartextKeysetInBinary (line 29) | func Example_cleartextKeysetInBinary() { function Example_cleartextKeysetInJSON (line 77) | func Example_cleartextKeysetInJSON() { FILE: go/insecurecleartextkeyset/insecurecleartextkeyset.go function Read (line 41) | func Read(r keyset.Reader, opts ...keyset.Option) (*keyset.Handle, error) { function Write (line 56) | func Write(handle *keyset.Handle, w keyset.Writer) error { function KeysetMaterial (line 67) | func KeysetMaterial(handle *keyset.Handle) *tinkpb.Keyset { function KeysetHandle (line 85) | func KeysetHandle(ks *tinkpb.Keyset) *keyset.Handle { FILE: go/insecurecleartextkeyset/insecurecleartextkeyset_test.go type NilKeysetReader (line 36) | type NilKeysetReader struct method Read (line 39) | func (m *NilKeysetReader) Read() (*tinkpb.Keyset, error) { method ReadEncrypted (line 43) | func (m *NilKeysetReader) ReadEncrypted() (*tinkpb.EncryptedKeyset, er... function TestReadWithNilKeysetFails (line 47) | func TestReadWithNilKeysetFails(t *testing.T) { function TestReadWithNilReaderFails (line 53) | func TestReadWithNilReaderFails(t *testing.T) { function TestWriteWithNilHandleFails (line 59) | func TestWriteWithNilHandleFails(t *testing.T) { function TestWriteWithNilWriterFails (line 66) | func TestWriteWithNilWriterFails(t *testing.T) { function TestWriteAndReadInBinary (line 76) | func TestWriteAndReadInBinary(t *testing.T) { function TestWriteAndReadInJson (line 101) | func TestWriteAndReadInJson(t *testing.T) { function TestLegacyKeysetHandle (line 126) | func TestLegacyKeysetHandle(t *testing.T) { function TestHandleFromReaderWithAnnotationsGetsMonitored (line 149) | func TestHandleFromReaderWithAnnotationsGetsMonitored(t *testing.T) { function TestHandleFromReaderWithAnnotationsTwiceFails (line 182) | func TestHandleFromReaderWithAnnotationsTwiceFails(t *testing.T) { function TestHandleFromReaderWithoutAnnotationsDoesNotGetMonitored (line 200) | func TestHandleFromReaderWithoutAnnotationsDoesNotGetMonitored(t *testin... FILE: go/integration/awskms/aws_kms_aead.go type AWSAEAD (line 29) | type AWSAEAD struct method Encrypt (line 51) | func (a *AWSAEAD) Encrypt(plaintext, associatedData []byte) ([]byte, e... method Decrypt (line 68) | func (a *AWSAEAD) Decrypt(ciphertext, associatedData []byte) ([]byte, ... function newAWSAEAD (line 42) | func newAWSAEAD(keyURI string, kms kmsiface.KMSAPI, name EncryptionConte... FILE: go/integration/awskms/aws_kms_client.go constant awsPrefix (line 36) | awsPrefix = "aws-kms://" type awsClient (line 47) | type awsClient struct method Supported (line 258) | func (c *awsClient) Supported(keyURI string) bool { method GetAEAD (line 270) | func (c *awsClient) GetAEAD(keyURI string) (tink.AEAD, error) { type ClientOption (line 55) | type ClientOption interface type option (line 57) | type option method set (line 59) | func (o option) set(a *awsClient) error { return o(a) } function WithCredentialPath (line 69) | func WithCredentialPath(credentialPath string) ClientOption { function WithKMS (line 91) | func WithKMS(kms kmsiface.KMSAPI) ClientOption { type EncryptionContextName (line 104) | type EncryptionContextName method valid (line 118) | func (n EncryptionContextName) valid() bool { method String (line 123) | func (n EncryptionContextName) String() string { constant AssociatedData (line 108) | AssociatedData EncryptionContextName = 1 + iota constant LegacyAdditionalData (line 110) | LegacyAdditionalData function WithEncryptionContextName (line 139) | func WithEncryptionContextName(name EncryptionContextName) ClientOption { function NewClientWithOptions (line 159) | func NewClientWithOptions(uriPrefix string, opts ...ClientOption) (regis... function NewClient (line 205) | func NewClient(uriPrefix string) (registry.KMSClient, error) { function NewClientWithCredentials (line 230) | func NewClientWithCredentials(uriPrefix string, credentialPath string) (... function NewClientWithKMS (line 252) | func NewClientWithKMS(uriPrefix string, kms kmsiface.KMSAPI) (registry.K... function getKMS (line 279) | func getKMS(uriPrefix string) (*kms.KMS, error) { function getKMSFromCredentialPath (line 295) | func getKMSFromCredentialPath(uriPrefix string, credentialPath string) (... function extractCredsCSV (line 337) | func extractCredsCSV(file string) (*credentials.Value, error) { function getRegion (line 370) | func getRegion(keyURI string) (string, error) { FILE: go/integration/awskms/aws_kms_client_test.go function TestNewClientWithOptions_URIPrefix (line 31) | func TestNewClientWithOptions_URIPrefix(t *testing.T) { function TestNewClientWithOptions_WithCredentialPath (line 114) | func TestNewClientWithOptions_WithCredentialPath(t *testing.T) { function TestNewClientWithOptions_RepeatedWithKMSFails (line 171) | func TestNewClientWithOptions_RepeatedWithKMSFails(t *testing.T) { function TestNewClientWithOptions_RepeatedWithEncryptionContextNameFails (line 184) | func TestNewClientWithOptions_RepeatedWithEncryptionContextNameFails(t *... function TestSupported (line 191) | func TestSupported(t *testing.T) { function TestGetAEADSupportedURI (line 210) | func TestGetAEADSupportedURI(t *testing.T) { function TestGetAEADEncryptDecrypt (line 225) | func TestGetAEADEncryptDecrypt(t *testing.T) { function TestUsesAdditionalDataAsContextName (line 268) | func TestUsesAdditionalDataAsContextName(t *testing.T) { function TestEncryptionContextName (line 312) | func TestEncryptionContextName(t *testing.T) { function TestEncryptionContextName_defaultEncryptionContextName (line 374) | func TestEncryptionContextName_defaultEncryptionContextName(t *testing.T) { FILE: go/integration/awskms/aws_kms_integration_test.go constant keyPrefix (line 33) | keyPrefix = "aws-kms://arn:aws:kms:us-east-2:235739564943:" constant keyAliasURI (line 34) | keyAliasURI = "aws-kms://arn:aws:kms:us-east-2:235739564943:alias/unit-a... constant keyURI (line 35) | keyURI = "aws-kms://arn:aws:kms:us-east-2:235739564943:key/3ee50705... constant keyURI2 (line 36) | keyURI2 = "aws-kms://arn:aws:kms:us-east-2:235739564943:key/b3ca2efd... function init (line 44) | func init() { function getTestFilePath (line 50) | func getTestFilePath(filename string) (string, error) { function TestNewClientWithCredentialsGetAEADEncryptDecrypt (line 62) | func TestNewClientWithCredentialsGetAEADEncryptDecrypt(t *testing.T) { function TestEmptyAssociatedDataEncryptDecrypt (line 96) | func TestEmptyAssociatedDataEncryptDecrypt(t *testing.T) { function TestKeyCommitment (line 132) | func TestKeyCommitment(t *testing.T) { function TestKMSEnvelopeAEADEncryptAndDecrypt (line 175) | func TestKMSEnvelopeAEADEncryptAndDecrypt(t *testing.T) { FILE: go/integration/awskms/internal/fakeawskms/fakeawskms.go type fakeAWSKMS (line 31) | type fakeAWSKMS struct method Encrypt (line 76) | func (f *fakeAWSKMS) Encrypt(request *kms.EncryptInput) (*kms.EncryptO... method Decrypt (line 92) | func (f *fakeAWSKMS) Decrypt(request *kms.DecryptInput) (*kms.DecryptO... function serializeContext (line 38) | func serializeContext(context map[string]*string) []byte { function New (line 57) | func New(validKeyIDs []string) (kmsiface.KMSAPI, error) { FILE: go/integration/awskms/internal/fakeawskms/fakeawskms_test.go constant validKeyID (line 26) | validKeyID = "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-... constant validKeyID2 (line 27) | validKeyID2 = "arn:aws:kms:us-west-2:123:key/different" function TestEncyptDecryptWithValidKeyId (line 29) | func TestEncyptDecryptWithValidKeyId(t *testing.T) { function TestEncyptWithUnknownKeyID (line 81) | func TestEncyptWithUnknownKeyID(t *testing.T) { function TestDecryptWithInvalidCiphertext (line 102) | func TestDecryptWithInvalidCiphertext(t *testing.T) { function TestDecryptWithUnknownKeyId (line 122) | func TestDecryptWithUnknownKeyId(t *testing.T) { function TestDecryptWithWrongKeyId (line 143) | func TestDecryptWithWrongKeyId(t *testing.T) { function TestDecryptWithoutKeyId (line 176) | func TestDecryptWithoutKeyId(t *testing.T) { function TestSerializeContext (line 249) | func TestSerializeContext(t *testing.T) { FILE: go/integration/gcpkms/gcp_kms_aead.go type gcpAEAD (line 28) | type gcpAEAD struct method Encrypt (line 46) | func (a *gcpAEAD) Encrypt(plaintext, associatedData []byte) ([]byte, e... method Decrypt (line 82) | func (a *gcpAEAD) Decrypt(ciphertext, associatedData []byte) ([]byte, ... function newGCPAEAD (line 36) | func newGCPAEAD(keyName string, kms *cloudkms.Service) tink.AEAD { function computeChecksum (line 113) | func computeChecksum(value []byte) int64 { FILE: go/integration/gcpkms/gcp_kms_aead_test.go function initializeServerWithResponse (line 31) | func initializeServerWithResponse(ctx context.Context, t *testing.T, res... function TestEncrypt_FailsWhenPlaintextUnverifed (line 54) | func TestEncrypt_FailsWhenPlaintextUnverifed(t *testing.T) { function TestEncrypt_FailsWhenAdditionalAuthenticatedDataUnverifed (line 102) | func TestEncrypt_FailsWhenAdditionalAuthenticatedDataUnverifed(t *testin... function TestEncrypt_FailsWithInvalidCiphertextCrc32c (line 150) | func TestEncrypt_FailsWithInvalidCiphertextCrc32c(t *testing.T) { function TestEncrypt_Success (line 190) | func TestEncrypt_Success(t *testing.T) { function TestDecrypt_FailsWithInvalidPlaintextCrc32c (line 214) | func TestDecrypt_FailsWithInvalidPlaintextCrc32c(t *testing.T) { function TestDecrypt_Success (line 250) | func TestDecrypt_Success(t *testing.T) { FILE: go/integration/gcpkms/gcp_kms_client.go constant gcpPrefix (line 33) | gcpPrefix = "gcp-kms://" type gcpClient (line 42) | type gcpClient struct method Supported (line 70) | func (c *gcpClient) Supported(keyURI string) bool { method GetAEAD (line 75) | func (c *gcpClient) GetAEAD(keyURI string) (tink.AEAD, error) { function NewClientWithOptions (line 52) | func NewClientWithOptions(ctx context.Context, uriPrefix string, opts ..... FILE: go/integration/gcpkms/gcp_kms_client_test.go function Example (line 26) | func Example() { FILE: go/integration/gcpkms/gcp_kms_integration_test.go constant keyURI (line 32) | keyURI = "gcp-kms://projects/tink-test-infrastructure/locations/global/k... function init (line 39) | func init() { function TestGetAeadWithEnvelopeAead (line 45) | func TestGetAeadWithEnvelopeAead(t *testing.T) { function TestAead (line 91) | func TestAead(t *testing.T) { FILE: go/integration/hcvault/hcvault_aead.go type vaultAEAD (line 28) | type vaultAEAD struct method Encrypt (line 117) | func (a *vaultAEAD) Encrypt(plaintext, associatedData []byte) ([]byte,... method Decrypt (line 153) | func (a *vaultAEAD) Decrypt(ciphertext, associatedData []byte) ([]byte... constant encryptSegment (line 38) | encryptSegment = "encrypt" constant decryptSegment (line 39) | decryptSegment = "decrypt" constant defaultAssociatedDataName (line 40) | defaultAssociatedDataName = "associated_data" constant legacyAssociatedDataName (line 41) | legacyAssociatedDataName = "context" type AEADOption (line 45) | type AEADOption interface type option (line 47) | type option method set (line 49) | func (o option) set(a *vaultAEAD) error { return o(a) } function WithLegacyContextParamater (line 70) | func WithLegacyContextParamater() AEADOption { function NewAEAD (line 78) | func NewAEAD(keyPath string, client *api.Logical, opts ...AEADOption) (t... function extractCiphertext (line 98) | func extractCiphertext(secret *api.Secret) ([]byte, error) { function extractPlaintext (line 131) | func extractPlaintext(secret *api.Secret) ([]byte, error) { function getEndpointPaths (line 171) | func getEndpointPaths(keyPath string) (encryptPath, decryptPath string, ... FILE: go/integration/hcvault/hcvault_aead_internal_test.go function TestGetEndpointPaths (line 24) | func TestGetEndpointPaths(t *testing.T) { function TestExtractCiphertextFails (line 110) | func TestExtractCiphertextFails(t *testing.T) { function TestExtractCiphertextWorks (line 147) | func TestExtractCiphertextWorks(t *testing.T) { function TestExtractPlaintextFails (line 161) | func TestExtractPlaintextFails(t *testing.T) { function TestExtractPlaintextWorks (line 182) | func TestExtractPlaintextWorks(t *testing.T) { FILE: go/integration/hcvault/hcvault_aead_test.go constant keyURITmpl (line 33) | keyURITmpl = "%s/transit/keys/key-1" constant token (line 34) | token = "mytoken" function TestVaultNewAEAD_EncryptDecrypt (line 37) | func TestVaultNewAEAD_EncryptDecrypt(t *testing.T) { function TestVaultNewAEAD_DecryptWithFixedCiphertext (line 69) | func TestVaultNewAEAD_DecryptWithFixedCiphertext(t *testing.T) { function TestVaultNewAEADWithLegacyContextParamater_isCompatible (line 94) | func TestVaultNewAEADWithLegacyContextParamater_isCompatible(t *testing.... function TestVaultClientAEAD_EncryptDecrypt (line 144) | func TestVaultClientAEAD_EncryptDecrypt(t *testing.T) { function TestVaultClientAEAD_DecryptWithFixedCiphertext (line 179) | func TestVaultClientAEAD_DecryptWithFixedCiphertext(t *testing.T) { function TestGetAEADFailWithBadKeyURI (line 206) | func TestGetAEADFailWithBadKeyURI(t *testing.T) { function newVaultAPIClient (line 245) | func newVaultAPIClient(t *testing.T, url string, token string, tlsConfig... type closeFunc (line 262) | type closeFunc function newServer (line 273) | func newServer(t *testing.T) (server *httptest.Server, uriPrefix string,... function fakeEncrypt (line 378) | func fakeEncrypt(plaintext, associatedData, context []byte) []byte { function TestFakeEncrypt (line 388) | func TestFakeEncrypt(t *testing.T) { function TestFakeEncryptWithoutAssociatedData (line 396) | func TestFakeEncryptWithoutAssociatedData(t *testing.T) { function TestFakeEncryptWithoutContext (line 404) | func TestFakeEncryptWithoutContext(t *testing.T) { function fakeDecrypt (line 412) | func fakeDecrypt(ciphertext, associatedData, context []byte) ([]byte, er... function TestFakeEncryptDecrypt (line 439) | func TestFakeEncryptDecrypt(t *testing.T) { FILE: go/integration/hcvault/hcvault_client.go constant vaultPrefix (line 34) | vaultPrefix = "hcvault://" type vaultClient (line 38) | type vaultClient struct method Supported (line 90) | func (c *vaultClient) Supported(keyURI string) bool { method GetAEAD (line 114) | func (c *vaultClient) GetAEAD(keyURI string) (tink.AEAD, error) { function NewClient (line 52) | func NewClient(uriPrefix string, tlsCfg *tls.Config, token string) (regi... FILE: go/integration/hcvault/hcvault_client_test.go function Example (line 25) | func Example() { function tlsConfig (line 61) | func tlsConfig() *tls.Config { function vaultToken (line 66) | func vaultToken() string { FILE: go/internal/aead/aead.go constant AESGCMIVSize (line 22) | AESGCMIVSize = 12 constant AESGCMTagSize (line 24) | AESGCMTagSize = 16 function ValidateAESKeySize (line 28) | func ValidateAESKeySize(sizeInBytes uint32) error { FILE: go/internal/aead/aead_test.go type AEADSuite (line 24) | type AEADSuite struct type AEADGroup (line 29) | type AEADGroup struct type AEADCase (line 38) | type AEADCase struct function TestValidateAESKeySize (line 48) | func TestValidateAESKeySize(t *testing.T) { FILE: go/internal/aead/aes_gcm_insecure_iv.go constant aesGCMMaxPlaintextSize (line 30) | aesGCMMaxPlaintextSize = (1 << 36) - 31 constant intSize (line 32) | intSize = 32 << (^uint(0) >> 63) constant maxInt (line 33) | maxInt = 1<<(intSize-1) - 1 constant maxIntPlaintextSize (line 34) | maxIntPlaintextSize = maxInt - AESGCMIVSize - AESGCMTagSize constant minNoIVCiphertextSize (line 36) | minNoIVCiphertextSize = AESGCMTagSize constant minPrependIVCiphertextSize (line 37) | minPrependIVCiphertextSize = AESGCMIVSize + AESGCMTagSize type AESGCMInsecureIV (line 42) | type AESGCMInsecureIV struct method Encrypt (line 72) | func (i *AESGCMInsecureIV) Encrypt(iv, plaintext, associatedData []byt... method Decrypt (line 110) | func (i *AESGCMInsecureIV) Decrypt(iv, ciphertext, associatedData []by... method newCipher (line 144) | func (i *AESGCMInsecureIV) newCipher() (cipher.AEAD, error) { function NewAESGCMInsecureIV (line 52) | func NewAESGCMInsecureIV(key []byte, prependIV bool) (*AESGCMInsecureIV,... FILE: go/internal/aead/aes_gcm_insecure_iv_test.go function TestAESGCMInsecureIVCiphertextSize (line 33) | func TestAESGCMInsecureIVCiphertextSize(t *testing.T) { function TestAESGCMInsecureIVKeySize (line 63) | func TestAESGCMInsecureIVKeySize(t *testing.T) { function TestAESGCMInsecureIVMismatchedIV (line 81) | func TestAESGCMInsecureIVMismatchedIV(t *testing.T) { function TestAESGCMInsecureIV (line 113) | func TestAESGCMInsecureIV(t *testing.T) { function TestAESGCMInsecureIVLongPlaintext (line 145) | func TestAESGCMInsecureIVLongPlaintext(t *testing.T) { function TestAESGCMInsecureIVModifyCiphertext (line 179) | func TestAESGCMInsecureIVModifyCiphertext(t *testing.T) { function TestAESGCMInsecureIVWycheproofVectors (line 233) | func TestAESGCMInsecureIVWycheproofVectors(t *testing.T) { function TestPreallocatedCiphertextMemoryIsExact (line 277) | func TestPreallocatedCiphertextMemoryIsExact(t *testing.T) { FILE: go/internal/aead/chacha20poly1305_insecure_nonce.go constant poly1305TagSize (line 24) | poly1305TagSize = 16 type ChaCha20Poly1305InsecureNonce (line 28) | type ChaCha20Poly1305InsecureNonce struct method Encrypt (line 43) | func (ca *ChaCha20Poly1305InsecureNonce) Encrypt(nonce, plaintext, ass... method Decrypt (line 55) | func (ca *ChaCha20Poly1305InsecureNonce) Decrypt(nonce, ciphertext, as... function NewChaCha20Poly1305InsecureNonce (line 34) | func NewChaCha20Poly1305InsecureNonce(key []byte) (*ChaCha20Poly1305Inse... FILE: go/internal/aead/chacha20poly1305_insecure_nonce_test.go function TestChaCha20Poly1305EncryptDecrypt (line 32) | func TestChaCha20Poly1305EncryptDecrypt(t *testing.T) { function TestChaCha20Poly1305EmptyAssociatedData (line 77) | func TestChaCha20Poly1305EmptyAssociatedData(t *testing.T) { function TestChaCha20Poly1305LongMessages (line 114) | func TestChaCha20Poly1305LongMessages(t *testing.T) { function TestChaCha20Poly1305ModifyCiphertext (line 142) | func TestChaCha20Poly1305ModifyCiphertext(t *testing.T) { function TestChaCha20Poly1305RandomNonce (line 191) | func TestChaCha20Poly1305RandomNonce(t *testing.T) { function TestChaCha20Poly1305WycheproofCases (line 212) | func TestChaCha20Poly1305WycheproofCases(t *testing.T) { function runChaCha20Poly1305WycheproofCase (line 233) | func runChaCha20Poly1305WycheproofCase(t *testing.T, tc *AEADCase) { FILE: go/internal/internalapi/token.go type Token (line 20) | type Token struct FILE: go/internal/internalregistry/derivable_key_manager.go type DerivableKeyManager (line 26) | type DerivableKeyManager interface FILE: go/internal/internalregistry/internal_registry.go type doNothingLogger (line 31) | type doNothingLogger struct method Log (line 35) | func (l *doNothingLogger) Log(uint32, int) {} method LogFailure (line 37) | func (l *doNothingLogger) LogFailure() {} type doNothingClient (line 41) | type doNothingClient struct method NewLogger (line 45) | func (c *doNothingClient) NewLogger(*monitoring.Context) (monitoring.L... function RegisterMonitoringClient (line 52) | func RegisterMonitoringClient(client monitoring.Client) error { function ClearMonitoringClient (line 63) | func ClearMonitoringClient() { function GetMonitoringClient (line 70) | func GetMonitoringClient() monitoring.Client { FILE: go/internal/internalregistry/internal_registry_test.go function TestRegisterMonitoringClient (line 24) | func TestRegisterMonitoringClient(t *testing.T) { function TestRegisterTwiceFailsMonitoringClient (line 38) | func TestRegisterTwiceFailsMonitoringClient(t *testing.T) { function TestDefaultMonitoringLogger (line 49) | func TestDefaultMonitoringLogger(t *testing.T) { function TestClearMonitoringClient (line 59) | func TestClearMonitoringClient(t *testing.T) { function TestClearReRegisterMonitoringClient (line 79) | func TestClearReRegisterMonitoringClient(t *testing.T) { FILE: go/internal/internalregistry/key_derivation.go function AllowKeyDerivation (line 46) | func AllowKeyDerivation(typeURL string) error { function CanDeriveKeys (line 61) | func CanDeriveKeys(typeURL string) bool { function DeriveKey (line 68) | func DeriveKey(keyTemplate *tinkpb.KeyTemplate, pseudorandomness io.Read... FILE: go/internal/internalregistry/key_derivation_test.go constant typeURLRoot (line 34) | typeURLRoot = "TestDeriveKeyFails" constant unregisteredKMTypeURL (line 35) | unregisteredKMTypeURL = typeURLRoot + "UnregisteredKeyManager" constant notDerivableKMTypeURL (line 36) | notDerivableKMTypeURL = typeURLRoot + "NotDerivableKeyManager" constant failingKMTypeURL (line 37) | failingKMTypeURL = typeURLRoot + "FailingKeyManager" function mustRegisterBadKeyManagers (line 42) | func mustRegisterBadKeyManagers(t *testing.T) { function TestDerivableKeyManagers (line 63) | func TestDerivableKeyManagers(t *testing.T) { function TestDerivableKeyManagersRejectsInvalidInputs (line 81) | func TestDerivableKeyManagersRejectsInvalidInputs(t *testing.T) { function TestDeriveKey (line 99) | func TestDeriveKey(t *testing.T) { function TestDeriveKeyFails (line 142) | func TestDeriveKeyFails(t *testing.T) { FILE: go/internal/monitoringutil/monitoring_util.go constant keytypeURLPrefix (line 27) | keytypeURLPrefix = "type.googleapis.com/google.crypto." type DoNothingLogger (line 30) | type DoNothingLogger struct method Log (line 35) | func (l *DoNothingLogger) Log(uint32, int) {} method LogFailure (line 38) | func (l *DoNothingLogger) LogFailure() {} function keyStatusFromProto (line 40) | func keyStatusFromProto(status tpb.KeyStatusType) (monitoring.KeyStatus,... function parseKeyTypeURL (line 56) | func parseKeyTypeURL(ktu string) string { function KeysetInfoFromPrimitiveSet (line 62) | func KeysetInfoFromPrimitiveSet(ps *primitiveset.PrimitiveSet) (*monitor... FILE: go/internal/monitoringutil/monitoring_util_test.go function TestKeysetInfoFromPrimitiveSetWithNilPrimitiveSetFails (line 27) | func TestKeysetInfoFromPrimitiveSetWithNilPrimitiveSetFails(t *testing.T) { function validPrimitiveSet (line 33) | func validPrimitiveSet() *primitiveset.PrimitiveSet { function TestBaselinePrimitiveSet (line 47) | func TestBaselinePrimitiveSet(t *testing.T) { function TestKeysetInfoFromPrimitiveSetWithNoEntryFails (line 53) | func TestKeysetInfoFromPrimitiveSetWithNoEntryFails(t *testing.T) { function TestKeysetInfoFromPrimitiveSetWithNoPrimaryFails (line 61) | func TestKeysetInfoFromPrimitiveSetWithNoPrimaryFails(t *testing.T) { function TestKeysetInfoFromPrimitiveSetWithInvalidKeyStatusFails (line 69) | func TestKeysetInfoFromPrimitiveSetWithInvalidKeyStatusFails(t *testing.... function TestKeysetInfoFromPrimitiveSet (line 82) | func TestKeysetInfoFromPrimitiveSet(t *testing.T) { FILE: go/internal/registryconfig/registry_config.go type RegistryConfig (line 28) | type RegistryConfig struct method PrimitiveFromKeyData (line 32) | func (c *RegistryConfig) PrimitiveFromKeyData(keyData *tinkpb.KeyData,... method RegisterKeyManager (line 38) | func (c *RegistryConfig) RegisterKeyManager(km registry.KeyManager, _ ... FILE: go/internal/registryconfig/registry_config_test.go function TestPrimitiveFromKeyData (line 30) | func TestPrimitiveFromKeyData(t *testing.T) { function TestPrimitiveFromKeyDataErrors (line 42) | func TestPrimitiveFromKeyDataErrors(t *testing.T) { type testPrimitive (line 80) | type testPrimitive struct type testKeyManager (line 81) | type testKeyManager struct method Primitive (line 83) | func (km *testKeyManager) Primitive(_ []byte) (any, error) ... method NewKey (line 84) | func (km *testKeyManager) NewKey(_ []byte) (proto.Message, error) ... method DoesSupport (line 85) | func (km *testKeyManager) DoesSupport(typeURL string) bool ... method TypeURL (line 86) | func (km *testKeyManager) TypeURL() string ... method NewKeyData (line 87) | func (km *testKeyManager) NewKeyData(_ []byte) (*tinkpb.KeyData, error... function TestRegisterKeyManager (line 89) | func TestRegisterKeyManager(t *testing.T) { FILE: go/internal/signature/rsa.go constant rsaMinModulusSizeInBits (line 28) | rsaMinModulusSizeInBits = 2048 constant rsaDefaultPublicExponent (line 29) | rsaDefaultPublicExponent = 65537 function RSAValidModulusSizeInBits (line 33) | func RSAValidModulusSizeInBits(m int) error { function RSAValidPublicExponent (line 41) | func RSAValidPublicExponent(e int) error { function HashSafeForSignature (line 51) | func HashSafeForSignature(hashAlg string) error { constant testMsg (line 61) | testMsg = "Tink and Wycheproof." constant signVerifyErrMsg (line 62) | signVerifyErrMsg = "signing with private key followed by verifying with ... function Validate_RSA_SSA_PKCS1 (line 66) | func Validate_RSA_SSA_PKCS1(hashAlg string, privKey *rsa.PrivateKey) err... function Validate_RSA_SSA_PSS (line 82) | func Validate_RSA_SSA_PSS(hashAlg string, saltLen int, privKey *rsa.Priv... function validateSignerVerifier (line 97) | func validateSignerVerifier(signer tink.Signer, verifier tink.Verifier) ... function validRSAPublicKey (line 108) | func validRSAPublicKey(publicKey *rsa.PublicKey) error { function hashID (line 115) | func hashID(hashAlg string) (crypto.Hash, error) { function rsaHashFunc (line 128) | func rsaHashFunc(hashAlg string) (func() hash.Hash, crypto.Hash, error) { FILE: go/internal/signature/rsa_test.go function TestValidatePublicExponent (line 26) | func TestValidatePublicExponent(t *testing.T) { function TestValidateInvalidPublicExponentFails (line 32) | func TestValidateInvalidPublicExponentFails(t *testing.T) { function TestValidateModulusSizeInBits (line 38) | func TestValidateModulusSizeInBits(t *testing.T) { function TestValidateInvalidModulusSizeInBitsFails (line 44) | func TestValidateInvalidModulusSizeInBitsFails(t *testing.T) { function TestHashSafeForSignature (line 50) | func TestHashSafeForSignature(t *testing.T) { function TestHashNotSafeForSignatureFails (line 64) | func TestHashNotSafeForSignatureFails(t *testing.T) { function TestRSAKeySelfTestWithCorruptedKeysFails (line 78) | func TestRSAKeySelfTestWithCorruptedKeysFails(t *testing.T) { FILE: go/internal/signature/rsassapkcs1_signer.go type RSA_SSA_PKCS1_Signer (line 28) | type RSA_SSA_PKCS1_Signer struct method Sign (line 53) | func (s *RSA_SSA_PKCS1_Signer) Sign(data []byte) ([]byte, error) { function New_RSA_SSA_PKCS1_Signer (line 37) | func New_RSA_SSA_PKCS1_Signer(hashAlg string, privKey *rsa.PrivateKey) (... FILE: go/internal/signature/rsassapkcs1_signer_verifier_test.go function TestRSASSAPKCS1SignVerify (line 30) | func TestRSASSAPKCS1SignVerify(t *testing.T) { function TestRSASSAPKCS1ModifySignatureFails (line 54) | func TestRSASSAPKCS1ModifySignatureFails(t *testing.T) { function TestNewRSASSAPKCS1SignerVerifierInvalidInput (line 87) | func TestNewRSASSAPKCS1SignerVerifierInvalidInput(t *testing.T) { type rsaSSAPKCS1Suite (line 137) | type rsaSSAPKCS1Suite struct type rsaSSAPKCS1Group (line 142) | type rsaSSAPKCS1Group struct type rsaSSAPKCS1Case (line 151) | type rsaSSAPKCS1Case struct function TestRSASSAPKCS1WycheproofCases (line 157) | func TestRSASSAPKCS1WycheproofCases(t *testing.T) { FILE: go/internal/signature/rsassapkcs1_verifier.go type RSA_SSA_PKCS1_Verifier (line 27) | type RSA_SSA_PKCS1_Verifier struct method Verify (line 53) | func (v *RSA_SSA_PKCS1_Verifier) Verify(signature, data []byte) error { function New_RSA_SSA_PKCS1_Verifier (line 36) | func New_RSA_SSA_PKCS1_Verifier(hashAlg string, pubKey *rsa.PublicKey) (... FILE: go/internal/signature/rsassapss_signer.go type RSA_SSA_PSS_Signer (line 29) | type RSA_SSA_PSS_Signer struct method Sign (line 59) | func (s *RSA_SSA_PSS_Signer) Sign(data []byte) ([]byte, error) { function New_RSA_SSA_PSS_Signer (line 39) | func New_RSA_SSA_PSS_Signer(hashAlg string, saltLength int, privKey *rsa... FILE: go/internal/signature/rsassapss_signer_verifier_test.go function TestRSASSAPSSSignVerify (line 30) | func TestRSASSAPSSSignVerify(t *testing.T) { function TestRSASSAPSSSignVerifyInvalidFails (line 55) | func TestRSASSAPSSSignVerifyInvalidFails(t *testing.T) { function TestNewRSASSAPSSSignerVerifierFailWithInvalidInputs (line 105) | func TestNewRSASSAPSSSignerVerifierFailWithInvalidInputs(t *testing.T) { type rsaSSAPSSSuite (line 169) | type rsaSSAPSSSuite struct type rsaSSAPSSGroup (line 174) | type rsaSSAPSSGroup struct type rsaSSAPSSCase (line 184) | type rsaSSAPSSCase struct function TestRSASSAPSSWycheproofCases (line 190) | func TestRSASSAPSSWycheproofCases(t *testing.T) { FILE: go/internal/signature/rsassapss_verifier.go type RSA_SSA_PSS_Verifier (line 28) | type RSA_SSA_PSS_Verifier struct method Verify (line 59) | func (v *RSA_SSA_PSS_Verifier) Verify(signature, data []byte) error { function New_RSA_SSA_PSS_Verifier (line 38) | func New_RSA_SSA_PSS_Verifier(hashAlg string, saltLength int, pubKey *rs... FILE: go/internal/testing/stubkeymanager/stubkeymanager.go type StubKeyManager (line 28) | type StubKeyManager struct method Primitive (line 38) | func (km *StubKeyManager) Primitive(serializedKey []byte) (any, error) { method NewKey (line 43) | func (km *StubKeyManager) NewKey(serializedKeyFormat []byte) (proto.Me... method NewKeyData (line 48) | func (km *StubKeyManager) NewKeyData(serializedKeyFormat []byte) (*tin... method DoesSupport (line 53) | func (km *StubKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 58) | func (km *StubKeyManager) TypeURL() string { type StubPrivateKeyManager (line 63) | type StubPrivateKeyManager struct method PublicKeyData (line 71) | func (skm *StubPrivateKeyManager) PublicKeyData(serializedKey []byte) ... type StubDerivableKeyManager (line 76) | type StubDerivableKeyManager struct method KeyMaterialType (line 86) | func (dkm *StubDerivableKeyManager) KeyMaterialType() tinkpb.KeyData_K... method DeriveKey (line 91) | func (dkm *StubDerivableKeyManager) DeriveKey(serializedKeyFormat []by... FILE: go/internal/testing/stubkeymanager/stubkeymanager_test.go type fakePrimitive (line 29) | type fakePrimitive struct function TestStubKeyManager (line 33) | func TestStubKeyManager(t *testing.T) { function TestStubPrivateKeyManager (line 77) | func TestStubPrivateKeyManager(t *testing.T) { function TestStubDerivableKeyManager (line 94) | func TestStubDerivableKeyManager(t *testing.T) { FILE: go/internal/tinkerror/tinkerror.go function Fail (line 24) | func Fail(message string) { FILE: go/internal/tinkerror/tinkerror_test.go function TestFail (line 24) | func TestFail(t *testing.T) { FILE: go/internal/tinkerror/tinkerrortest/tinkerrortest.go function RecoverFromFail (line 21) | func RecoverFromFail(f func()) (err error) { FILE: go/jwt/jwk_converter.go constant jwtECDSAPublicKeyType (line 33) | jwtECDSAPublicKeyType = "type.googleapis.com/google.crypto.tink.JwtEcdsa... constant jwtRSPublicKeyType (line 34) | jwtRSPublicKeyType = "type.googleapis.com/google.crypto.tink.JwtRsaSs... constant jwtPSPublicKeyType (line 35) | jwtPSPublicKeyType = "type.googleapis.com/google.crypto.tink.JwtRsaSs... function keysetHasID (line 38) | func keysetHasID(ks *tinkpb.Keyset, keyID uint32) bool { function generateUnusedID (line 47) | func generateUnusedID(ks *tinkpb.Keyset) uint32 { function hasItem (line 56) | func hasItem(s *spb.Struct, name string) bool { function stringItem (line 64) | func stringItem(s *spb.Struct, name string) (string, error) { function listValue (line 80) | func listValue(s *spb.Struct, name string) (*spb.ListValue, error) { function expectStringItem (line 99) | func expectStringItem(s *spb.Struct, name, value string) error { function decodeItem (line 110) | func decodeItem(s *spb.Struct, name string) ([]byte, error) { function validateKeyOPSIsVerify (line 118) | func validateKeyOPSIsVerify(s *spb.Struct) error { function validateUseIsSig (line 139) | func validateUseIsSig(s *spb.Struct) error { function algorithmPrefix (line 146) | func algorithmPrefix(s *spb.Struct) (string, error) { function psPublicKeyDataFromStruct (line 163) | func psPublicKeyDataFromStruct(keyStruct *spb.Struct) (*tinkpb.KeyData, ... function rsPublicKeyDataFromStruct (line 204) | func rsPublicKeyDataFromStruct(keyStruct *spb.Struct) (*tinkpb.KeyData, ... type rsaPubKey (line 239) | type rsaPubKey struct function rsaPubKeyFromStruct (line 245) | func rsaPubKeyFromStruct(keyStruct *spb.Struct) (*rsaPubKey, error) { function esPublicKeyDataFromStruct (line 286) | func esPublicKeyDataFromStruct(keyStruct *spb.Struct) (*tinkpb.KeyData, ... function keysetKeyFromStruct (line 354) | func keysetKeyFromStruct(val *spb.Value, keyID uint32) (*tinkpb.Keyset_K... function JWKSetToPublicKeysetHandle (line 389) | func JWKSetToPublicKeysetHandle(jwkSet []byte) (*keyset.Handle, error) { function addKeyOPSVerify (line 411) | func addKeyOPSVerify(s *spb.Struct) { function addStringEntry (line 415) | func addStringEntry(s *spb.Struct, key, val string) { function psPublicKeyToStruct (line 425) | func psPublicKeyToStruct(key *tinkpb.Keyset_Key) (*spb.Struct, error) { function rsPublicKeyToStruct (line 460) | func rsPublicKeyToStruct(key *tinkpb.Keyset_Key) (*spb.Struct, error) { function esPublicKeyToStruct (line 490) | func esPublicKeyToStruct(key *tinkpb.Keyset_Key) (*spb.Struct, error) { function setKeyID (line 543) | func setKeyID(outKey *spb.Struct, key *tinkpb.Keyset_Key, customKID *str... function JWKSetFromPublicKeysetHandle (line 562) | func JWKSetFromPublicKeysetHandle(kh *keyset.Handle) ([]byte, error) { FILE: go/jwt/jwk_converter_test.go type jwkSetTestCase (line 37) | type jwkSetTestCase struct function TestToPublicKeysetHandle (line 423) | func TestToPublicKeysetHandle(t *testing.T) { function createKeysetHandle (line 449) | func createKeysetHandle(key string) (*keyset.Handle, error) { function TestJWKSetToPublicKeysetHandleVerifyValidJWT (line 457) | func TestJWKSetToPublicKeysetHandleVerifyValidJWT(t *testing.T) { function TestJWKSetToPublicKeysetHandleInvalidJSONFails (line 495) | func TestJWKSetToPublicKeysetHandleInvalidJSONFails(t *testing.T) { function TestJWKSetToPublicKeysetPrimitivePS256SmallModulusFails (line 501) | func TestJWKSetToPublicKeysetPrimitivePS256SmallModulusFails(t *testing.... function TestJWKSetToPublicKeysetPS256CorrectlySetsKID (line 523) | func TestJWKSetToPublicKeysetPS256CorrectlySetsKID(t *testing.T) { function TestJWKSetToPublicKeysetPS256WithoutOptionalFieldsSucceeds (line 554) | func TestJWKSetToPublicKeysetPS256WithoutOptionalFieldsSucceeds(t *testi... function TestJWKSetToPublicKeysetInvalidPS256JWKSet (line 566) | func TestJWKSetToPublicKeysetInvalidPS256JWKSet(t *testing.T) { function TestJWKSetToPublicKeysetPrimitiveRS256SmallModulusFails (line 690) | func TestJWKSetToPublicKeysetPrimitiveRS256SmallModulusFails(t *testing.... function TestJWKSetToPublicKeysetRS256CorrectlySetsKID (line 712) | func TestJWKSetToPublicKeysetRS256CorrectlySetsKID(t *testing.T) { function TestJWKSetToPublicKeysetRS256WithoutOptionalFieldsSucceeds (line 743) | func TestJWKSetToPublicKeysetRS256WithoutOptionalFieldsSucceeds(t *testi... function TestJWKSetToPublicKeysetInvalidRS256JWKSet (line 755) | func TestJWKSetToPublicKeysetInvalidRS256JWKSet(t *testing.T) { function TestJWKSetToPublicKeysetES256WithSmallXPrimitiveFails (line 879) | func TestJWKSetToPublicKeysetES256WithSmallXPrimitiveFails(t *testing.T) { function TestJWKSetToPublicKeysetES256WithSmallYFails (line 900) | func TestJWKSetToPublicKeysetES256WithSmallYFails(t *testing.T) { function TestJWKSetToPublicKeysetES256CorrectlySetsKID (line 921) | func TestJWKSetToPublicKeysetES256CorrectlySetsKID(t *testing.T) { function TestJWKSetToPublicKeysetES256WithoutOptionalFieldsSucceeds (line 956) | func TestJWKSetToPublicKeysetES256WithoutOptionalFieldsSucceeds(t *testi... function TestJWKSetToPublicKeysetInvalidES256PublicKeys (line 970) | func TestJWKSetToPublicKeysetInvalidES256PublicKeys(t *testing.T) { function TestJWKSetFromPublicKeysetNonEnabledKeysAreIgnored (line 1202) | func TestJWKSetFromPublicKeysetNonEnabledKeysAreIgnored(t *testing.T) { function TestJWKSetFromPublicKeysetHandleTinkOutputPrefixHasKID (line 1232) | func TestJWKSetFromPublicKeysetHandleTinkOutputPrefixHasKID(t *testing.T) { function TestJWKSetFromPublicKeysetHandleInvalidKeysetsFails (line 1317) | func TestJWKSetFromPublicKeysetHandleInvalidKeysetsFails(t *testing.T) { function getCoordinateFromJwk (line 1422) | func getCoordinateFromJwk(jwk *spb.Struct, coord string) ([]byte, error) { function TestJWKSizedSizedECCEncoding (line 1427) | func TestJWKSizedSizedECCEncoding(t *testing.T) { FILE: go/jwt/jwt.go function IsExpirationErr (line 35) | func IsExpirationErr(err error) bool { function init (line 39) | func init() { FILE: go/jwt/jwt_ecdsa_signer_key_manager.go constant jwtECDSASignerKeyVersion (line 33) | jwtECDSASignerKeyVersion = 0 constant jwtECDSASignerTypeURL (line 34) | jwtECDSASignerTypeURL = "type.googleapis.com/google.crypto.tink.JwtEc... type jwtECDSASignerKeyManager (line 44) | type jwtECDSASignerKeyManager struct method Primitive (line 48) | func (km *jwtECDSASignerKeyManager) Primitive(serializedKey []byte) (a... method NewKey (line 73) | func (km *jwtECDSASignerKeyManager) NewKey(serializedKeyFormat []byte)... method NewKeyData (line 101) | func (km *jwtECDSASignerKeyManager) NewKeyData(serializedKeyFormat []b... method PublicKeyData (line 120) | func (km *jwtECDSASignerKeyManager) PublicKeyData(serializedPrivKey []... method DoesSupport (line 139) | func (km *jwtECDSASignerKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 143) | func (km *jwtECDSASignerKeyManager) TypeURL() string { method validateKey (line 147) | func (km *jwtECDSASignerKeyManager) validateKey(key *jepb.JwtEcdsaPriv... FILE: go/jwt/jwt_ecdsa_signer_key_manager_test.go constant testECDSASignerKeyType (line 28) | testECDSASignerKeyType = "type.googleapis.com/google.crypto.tink.JwtEcds... constant testECDSASignerVersion (line 29) | testECDSASignerVersion = 0 function TestECDSASignerDoesSupport (line 32) | func TestECDSASignerDoesSupport(t *testing.T) { function TestECDSASignerTypeURL (line 45) | func TestECDSASignerTypeURL(t *testing.T) { function TestECDSASignerNewKeyWithEmptyKeyFormatFails (line 55) | func TestECDSASignerNewKeyWithEmptyKeyFormatFails(t *testing.T) { function createECDSASerializedKeyFormat (line 65) | func createECDSASerializedKeyFormat(algorithm jepb.JwtEcdsaAlgorithm, ve... function TestECDSASignerNewKeyWithInvalidAlgorithmFails (line 73) | func TestECDSASignerNewKeyWithInvalidAlgorithmFails(t *testing.T) { function TestECDSASignerNewKeyGeneratesValidKey (line 87) | func TestECDSASignerNewKeyGeneratesValidKey(t *testing.T) { function TestECDSASignerNewKeyGeneratesDifferentKeys (line 137) | func TestECDSASignerNewKeyGeneratesDifferentKeys(t *testing.T) { function TestECDSASignerNewKeyDataWithEmptyKeyFormatFails (line 167) | func TestECDSASignerNewKeyDataWithEmptyKeyFormatFails(t *testing.T) { function TestECDSASignerNewKeyDataWithInvalidAlgorithmFails (line 177) | func TestECDSASignerNewKeyDataWithInvalidAlgorithmFails(t *testing.T) { function TestECDSASignerNewKeyDataGeneratesValidKeyData (line 191) | func TestECDSASignerNewKeyDataGeneratesValidKeyData(t *testing.T) { function TestECDSASignerPublicKeyDataWithEmptyKeyFormatFails (line 212) | func TestECDSASignerPublicKeyDataWithEmptyKeyFormatFails(t *testing.T) { function createECDSAKey (line 226) | func createECDSAKey() (*jepb.JwtEcdsaPrivateKey, error) { function createSerializedECDSAKey (line 243) | func createSerializedECDSAKey() ([]byte, error) { function TestECDSASignerPublicKeyDataGeneratesValidKeyData (line 251) | func TestECDSASignerPublicKeyDataGeneratesValidKeyData(t *testing.T) { function TestECDSASignerPrimitiveWithEmptyKeyFails (line 276) | func TestECDSASignerPrimitiveWithEmptyKeyFails(t *testing.T) { function TestECDSASignerPrimitiveWithInvalidKeyVersionFails (line 286) | func TestECDSASignerPrimitiveWithInvalidKeyVersionFails(t *testing.T) { function TestECDSASignerPrimitiveWithoutPublicKeyFails (line 305) | func TestECDSASignerPrimitiveWithoutPublicKeyFails(t *testing.T) { function TestECDSASignerPrimitiveWithInvalidAlgorithmFails (line 324) | func TestECDSASignerPrimitiveWithInvalidAlgorithmFails(t *testing.T) { function TestECDSASignerPrimitiveSignAndVerifyToken (line 343) | func TestECDSASignerPrimitiveSignAndVerifyToken(t *testing.T) { function TestECDSASignerPrimitiveSignAndVerifyTokenWithCustomKID (line 403) | func TestECDSASignerPrimitiveSignAndVerifyTokenWithCustomKID(t *testing.... FILE: go/jwt/jwt_ecdsa_verifier_key_manager.go constant jwtECDSAVerifierKeyVersion (line 30) | jwtECDSAVerifierKeyVersion = 0 constant jwtECDSAVerifierTypeURL (line 31) | jwtECDSAVerifierTypeURL = "type.googleapis.com/google.crypto.tink.Jwt... constant jwtECDSAEncoding (line 32) | jwtECDSAEncoding = "IEEE_P1363" type jwtECDSAVerifierKeyManager (line 42) | type jwtECDSAVerifierKeyManager struct method Primitive (line 57) | func (km *jwtECDSAVerifierKeyManager) Primitive(serializedKey []byte) ... method NewKey (line 79) | func (km *jwtECDSAVerifierKeyManager) NewKey(serializedKeyFormat []byt... method NewKeyData (line 83) | func (km *jwtECDSAVerifierKeyManager) NewKeyData(serializedKeyFormat [... method DoesSupport (line 87) | func (km *jwtECDSAVerifierKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 91) | func (km *jwtECDSAVerifierKeyManager) TypeURL() string { type ecdsaParams (line 46) | type ecdsaParams struct function ecdsaCustomKID (line 95) | func ecdsaCustomKID(pk *jepb.JwtEcdsaPublicKey) *string { FILE: go/jwt/jwt_ecdsa_verifier_key_manager_test.go constant testECDSAVerifierKeyType (line 27) | testECDSAVerifierKeyType = "type.googleapis.com/google.crypto.tink.JwtEc... function TestECDSAVerifierNotImplemented (line 29) | func TestECDSAVerifierNotImplemented(t *testing.T) { function TestECDSAVerifierDoesSupport (line 42) | func TestECDSAVerifierDoesSupport(t *testing.T) { function TestECDSAVerifierTypeURL (line 55) | func TestECDSAVerifierTypeURL(t *testing.T) { function TestECDSAVerifierPrimitiveWithNilKey (line 65) | func TestECDSAVerifierPrimitiveWithNilKey(t *testing.T) { function createECDSAPublicKey (line 75) | func createECDSAPublicKey(algorithm jepb.JwtEcdsaAlgorithm, kid *string,... function createECDSASerializedPublicKey (line 98) | func createECDSASerializedPublicKey(algorithm jepb.JwtEcdsaAlgorithm, ki... function TestECDSAVerifierPrimitiveInvalidKeyVersion (line 106) | func TestECDSAVerifierPrimitiveInvalidKeyVersion(t *testing.T) { function TestECDSAVerifierPrimitiveWithInvalidAlgorithm (line 121) | func TestECDSAVerifierPrimitiveWithInvalidAlgorithm(t *testing.T) { function TestECDSAVerifierPrimitiveVerifyFixedToken (line 135) | func TestECDSAVerifierPrimitiveVerifyFixedToken(t *testing.T) { function TestECDSAVerifierPrimitiveFixedTokenWithKID (line 172) | func TestECDSAVerifierPrimitiveFixedTokenWithKID(t *testing.T) { FILE: go/jwt/jwt_encoding.go function keyID (line 28) | func keyID(keyID uint32, outPrefixType tpb.OutputPrefixType) *string { function createUnsigned (line 39) | func createUnsigned(rawJWT *RawJWT, algo string, tinkKID *string, custom... function combineUnsignedAndSignature (line 69) | func combineUnsignedAndSignature(unsigned string, signature []byte) stri... function splitSignedCompact (line 74) | func splitSignedCompact(compact string) ([]byte, string, error) { function decodeUnsignedTokenAndValidateHeader (line 98) | func decodeUnsignedTokenAndValidateHeader(unsigned, algorithm string, ti... function base64Encode (line 126) | func base64Encode(content []byte) string { function base64Decode (line 131) | func base64Decode(content string) ([]byte, error) { function isValidURLsafeBase64Char (line 140) | func isValidURLsafeBase64Char(c rune) bool { function dotConcat (line 145) | func dotConcat(a, b string) string { function jsonToStruct (line 149) | func jsonToStruct(jsonPayload []byte) (*spb.Struct, error) { function extractTypeHeader (line 157) | func extractTypeHeader(header *spb.Struct) (*string, error) { function createHeader (line 173) | func createHeader(algorithm string, typeHeader, kid *string) (string, er... function validateHeader (line 192) | func validateHeader(header *spb.Struct, algorithm string, tinkKID, custo... function validateKIDInHeader (line 223) | func validateKIDInHeader(fields map[string]*spb.Value, kid *string) error { function headerStringField (line 234) | func headerStringField(fields map[string]*spb.Value, name string) (strin... FILE: go/jwt/jwt_encoding_test.go function TestKIDForNonTinkKeysIsNil (line 27) | func TestKIDForNonTinkKeysIsNil(t *testing.T) { function TestKeyIDForTinkKey (line 38) | func TestKeyIDForTinkKey(t *testing.T) { type payloadTestCase (line 49) | type payloadTestCase struct function refString (line 58) | func refString(a string) *string { function refTime (line 62) | func refTime(ts int64) *time.Time { function TestBase64Encode (line 67) | func TestBase64Encode(t *testing.T) { function TestBase64Decode (line 78) | func TestBase64Decode(t *testing.T) { function TestInvalidCharactersFailBase64Decode (line 91) | func TestInvalidCharactersFailBase64Decode(t *testing.T) { function TestEncodeStaticHeaderWithPayloadIssuerTokenForSigning (line 97) | func TestEncodeStaticHeaderWithPayloadIssuerTokenForSigning(t *testing.T) { function TestEncodeHeaderWithHeaderFieldsAndEmptyPayload (line 119) | func TestEncodeHeaderWithHeaderFieldsAndEmptyPayload(t *testing.T) { function TestCreateUnsignedWithNilRawJWTFails (line 179) | func TestCreateUnsignedWithNilRawJWTFails(t *testing.T) { function TestCreateUnsignedCustomAndTinkKIDFail (line 185) | func TestCreateUnsignedCustomAndTinkKIDFail(t *testing.T) { function TestCombineTokenAndSignature (line 195) | func TestCombineTokenAndSignature(t *testing.T) { function TestSplitSignedCompactInvalidInputs (line 206) | func TestSplitSignedCompactInvalidInputs(t *testing.T) { function TestSplitSignedCompact (line 249) | func TestSplitSignedCompact(t *testing.T) { function TestDecodeValidateInvalidHeaderFailures (line 266) | func TestDecodeValidateInvalidHeaderFailures(t *testing.T) { function TestDecodeValidateKIDHeader (line 345) | func TestDecodeValidateKIDHeader(t *testing.T) { function TestDecodeVerifyTokenFixedValues (line 385) | func TestDecodeVerifyTokenFixedValues(t *testing.T) { function TestDecodeVerifyTokenPaylodWithInvalidEndcoding (line 416) | func TestDecodeVerifyTokenPaylodWithInvalidEndcoding(t *testing.T) { FILE: go/jwt/jwt_hmac_key_manager.go constant jwtHMACKeyVersion (line 31) | jwtHMACKeyVersion = 0 constant jwtHMACTypeURL (line 32) | jwtHMACTypeURL = "type.googleapis.com/google.crypto.tink.JwtHmacKey" type jwtHMACKeyManager (line 36) | type jwtHMACKeyManager struct method Primitive (line 53) | func (km *jwtHMACKeyManager) Primitive(serializedKey []byte) (any, err... method NewKey (line 81) | func (km *jwtHMACKeyManager) NewKey(serializedKeyFormat []byte) (proto... method NewKeyData (line 99) | func (km *jwtHMACKeyManager) NewKeyData(serializedKeyFormat []byte) (*... method DoesSupport (line 116) | func (km *jwtHMACKeyManager) DoesSupport(keyTypeURL string) bool { method TypeURL (line 121) | func (km *jwtHMACKeyManager) TypeURL() string { method validateKey (line 125) | func (km *jwtHMACKeyManager) validateKey(key *jwtmacpb.JwtHmacKey) err... method validateKeyFormat (line 142) | func (km *jwtHMACKeyManager) validateKeyFormat(keyFormat *jwtmacpb.Jwt... FILE: go/jwt/jwt_hmac_key_manager_test.go type jwtKeyManagerTestCase (line 30) | type jwtKeyManagerTestCase struct constant typeURL (line 37) | typeURL = "type.googleapis.com/google.crypto.tink.JwtHmacKey" function generateKeyFormat (line 40) | func generateKeyFormat(keySize uint32, algorithm jwtmacpb.JwtHmacAlgorit... function TestDoesSupport (line 47) | func TestDoesSupport(t *testing.T) { function TestTypeURL (line 57) | func TestTypeURL(t *testing.T) { function TestNewKeyInvalidFormatFails (line 94) | func TestNewKeyInvalidFormatFails(t *testing.T) { function TestNewDataInvalidFormatFails (line 112) | func TestNewDataInvalidFormatFails(t *testing.T) { function TestNewKey (line 145) | func TestNewKey(t *testing.T) { function TestNewKeyData (line 174) | func TestNewKeyData(t *testing.T) { function generateKey (line 199) | func generateKey(keySize, version uint32, algorithm jwtmacpb.JwtHmacAlgo... function TestGetPrimitiveWithValidKeys (line 208) | func TestGetPrimitiveWithValidKeys(t *testing.T) { function TestGetPrimitiveWithInvalidKeys (line 272) | func TestGetPrimitiveWithInvalidKeys(t *testing.T) { function TestSpecyfingCustomKIDAndTINKKIDFails (line 304) | func TestSpecyfingCustomKIDAndTINKKIDFails(t *testing.T) { function TestGetPrimitiveWithInvalidKeyFails (line 359) | func TestGetPrimitiveWithInvalidKeyFails(t *testing.T) { function TestGeneratesDifferentKeys (line 398) | func TestGeneratesDifferentKeys(t *testing.T) { FILE: go/jwt/jwt_key_templates.go function createJWTHMACKeyTemplate (line 29) | func createJWTHMACKeyTemplate(keySize uint32, algorithm jwtmacpb.JwtHmac... function createJWTECDSAKeyTemplate (line 46) | func createJWTECDSAKeyTemplate(algorithm jepb.JwtEcdsaAlgorithm, outputP... function createJWTRSKeyTemplate (line 62) | func createJWTRSKeyTemplate(algorithm jrsppb.JwtRsaSsaPkcs1Algorithm, mo... function createJWTPSKeyTemplate (line 80) | func createJWTPSKeyTemplate(algorithm jrpsspb.JwtRsaSsaPssAlgorithm, mod... function HS256Template (line 100) | func HS256Template() *tinkpb.KeyTemplate { function RawHS256Template (line 106) | func RawHS256Template() *tinkpb.KeyTemplate { function HS384Template (line 112) | func HS384Template() *tinkpb.KeyTemplate { function RawHS384Template (line 118) | func RawHS384Template() *tinkpb.KeyTemplate { function HS512Template (line 124) | func HS512Template() *tinkpb.KeyTemplate { function RawHS512Template (line 130) | func RawHS512Template() *tinkpb.KeyTemplate { function ES256Template (line 136) | func ES256Template() *tinkpb.KeyTemplate { function RawES256Template (line 142) | func RawES256Template() *tinkpb.KeyTemplate { function ES384Template (line 148) | func ES384Template() *tinkpb.KeyTemplate { function RawES384Template (line 154) | func RawES384Template() *tinkpb.KeyTemplate { function ES512Template (line 160) | func ES512Template() *tinkpb.KeyTemplate { function RawES512Template (line 166) | func RawES512Template() *tinkpb.KeyTemplate { function RS256_2048_F4_Key_Template (line 172) | func RS256_2048_F4_Key_Template() *tinkpb.KeyTemplate { function RawRS256_2048_F4_Key_Template (line 178) | func RawRS256_2048_F4_Key_Template() *tinkpb.KeyTemplate { function RS256_3072_F4_Key_Template (line 184) | func RS256_3072_F4_Key_Template() *tinkpb.KeyTemplate { function RawRS256_3072_F4_Key_Template (line 190) | func RawRS256_3072_F4_Key_Template() *tinkpb.KeyTemplate { function RS384_3072_F4_Key_Template (line 196) | func RS384_3072_F4_Key_Template() *tinkpb.KeyTemplate { function RawRS384_3072_F4_Key_Template (line 202) | func RawRS384_3072_F4_Key_Template() *tinkpb.KeyTemplate { function RS512_4096_F4_Key_Template (line 208) | func RS512_4096_F4_Key_Template() *tinkpb.KeyTemplate { function RawRS512_4096_F4_Key_Template (line 214) | func RawRS512_4096_F4_Key_Template() *tinkpb.KeyTemplate { function PS256_2048_F4_Key_Template (line 220) | func PS256_2048_F4_Key_Template() *tinkpb.KeyTemplate { function RawPS256_2048_F4_Key_Template (line 226) | func RawPS256_2048_F4_Key_Template() *tinkpb.KeyTemplate { function PS256_3072_F4_Key_Template (line 232) | func PS256_3072_F4_Key_Template() *tinkpb.KeyTemplate { function RawPS256_3072_F4_Key_Template (line 238) | func RawPS256_3072_F4_Key_Template() *tinkpb.KeyTemplate { function PS384_3072_F4_Key_Template (line 244) | func PS384_3072_F4_Key_Template() *tinkpb.KeyTemplate { function RawPS384_3072_F4_Key_Template (line 250) | func RawPS384_3072_F4_Key_Template() *tinkpb.KeyTemplate { function PS512_4096_F4_Key_Template (line 256) | func PS512_4096_F4_Key_Template() *tinkpb.KeyTemplate { function RawPS512_4096_F4_Key_Template (line 262) | func RawPS512_4096_F4_Key_Template() *tinkpb.KeyTemplate { FILE: go/jwt/jwt_key_templates_test.go type templateTestCase (line 27) | type templateTestCase struct function TestJWTComputeVerifyMAC (line 32) | func TestJWTComputeVerifyMAC(t *testing.T) { function TestJWTSignVerify (line 86) | func TestJWTSignVerify(t *testing.T) { FILE: go/jwt/jwt_mac.go type MAC (line 19) | type MAC interface FILE: go/jwt/jwt_mac_factory.go function NewMAC (line 26) | func NewMAC(handle *keyset.Handle) (MAC, error) { type wrappedJWTMAC (line 38) | type wrappedJWTMAC struct method ComputeMACAndEncode (line 61) | func (w *wrappedJWTMAC) ComputeMACAndEncode(token *RawJWT) (string, er... method VerifyMACAndDecode (line 70) | func (w *wrappedJWTMAC) VerifyMACAndDecode(compact string, validator *... function newWrappedJWTMAC (line 44) | func newWrappedJWTMAC(ps *primitiveset.PrimitiveSet) (*wrappedJWTMAC, er... FILE: go/jwt/jwt_mac_factory_test.go function newJWTHMACKey (line 33) | func newJWTHMACKey(algorithm jwtmacpb.JwtHmacAlgorithm, kid *jwtmacpb.Jw... function newKeyData (line 42) | func newKeyData(key *jwtmacpb.JwtHmacKey) (*tinkpb.KeyData, error) { function createJWTMAC (line 54) | func createJWTMAC(keyData *tinkpb.KeyData, prefixType tinkpb.OutputPrefi... function verifyMACCompareSubject (line 63) | func verifyMACCompareSubject(p jwt.MAC, compact string, validator *jwt.V... function TestNilKeyHandle (line 78) | func TestNilKeyHandle(t *testing.T) { function TestFactorySameKeyMaterialWithRawPrefixAndNoKIDShouldIgnoreHeader (line 84) | func TestFactorySameKeyMaterialWithRawPrefixAndNoKIDShouldIgnoreHeader(t... function TestFactorySameKeyMaterialWithDifferentPrefixAndKIDShouldFailVerification (line 118) | func TestFactorySameKeyMaterialWithDifferentPrefixAndKIDShouldFailVerifi... function TestFactoryDifferentKeyShouldFailValidation (line 160) | func TestFactoryDifferentKeyShouldFailValidation(t *testing.T) { function TestFactoryWithRAWKeyAndKID (line 199) | func TestFactoryWithRAWKeyAndKID(t *testing.T) { function TestFactoryWithInvalidPrimitiveSetType (line 234) | func TestFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestVerifyMACAndDecodeReturnsValidationError (line 244) | func TestVerifyMACAndDecodeReturnsValidationError(t *testing.T) { FILE: go/jwt/jwt_mac_kid.go type macWithKID (line 24) | type macWithKID struct method ComputeMACAndEncodeWithKID (line 43) | func (jm *macWithKID) ComputeMACAndEncodeWithKID(token *RawJWT, kid *s... method VerifyMACAndDecodeWithKID (line 56) | func (jm *macWithKID) VerifyMACAndDecodeWithKID(compact string, verifi... function newMACWithKID (line 31) | func newMACWithKID(tm tink.MAC, algorithm string, customKID *string) (*m... FILE: go/jwt/jwt_mac_kid_test.go function TestNewMACwithNilMACFails (line 26) | func TestNewMACwithNilMACFails(t *testing.T) { function createMACwithKID (line 32) | func createMACwithKID(customKID *string) (*macWithKID, error) { function TestCreateAndValidateToken (line 45) | func TestCreateAndValidateToken(t *testing.T) { function TestCreateAndValidateTokenWithKID (line 103) | func TestCreateAndValidateTokenWithKID(t *testing.T) { function TestValidateFixedToken (line 157) | func TestValidateFixedToken(t *testing.T) { function TestInvalidTokens (line 221) | func TestInvalidTokens(t *testing.T) { function TestCustomKIDAndTinkPrefixKeyFail (line 244) | func TestCustomKIDAndTinkPrefixKeyFail(t *testing.T) { FILE: go/jwt/jwt_rsa_ssa_pkcs1_signer_key_manager.go constant jwtRSSignerKeyVersion (line 33) | jwtRSSignerKeyVersion = 0 constant jwtRSSignerTypeURL (line 34) | jwtRSSignerTypeURL = "type.googleapis.com/google.crypto.tink.JwtRsaSs... type jwtRSSignerKeyManager (line 44) | type jwtRSSignerKeyManager struct method Primitive (line 52) | func (km *jwtRSSignerKeyManager) Primitive(serializedKey []byte) (any,... method NewKey (line 116) | func (km *jwtRSSignerKeyManager) NewKey(serializedKeyFormat []byte) (p... method NewKeyData (line 160) | func (km *jwtRSSignerKeyManager) NewKeyData(serializedKeyFormat []byte... method PublicKeyData (line 176) | func (km *jwtRSSignerKeyManager) PublicKeyData(serializedPrivKey []byt... method DoesSupport (line 198) | func (km *jwtRSSignerKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 202) | func (km *jwtRSSignerKeyManager) TypeURL() string { function bytesToBigInt (line 48) | func bytesToBigInt(v []byte) *big.Int { function validateRSPrivateKey (line 96) | func validateRSPrivateKey(privKey *jrsppb.JwtRsaSsaPkcs1PrivateKey) error { FILE: go/jwt/jwt_rsa_ssa_pkcs1_signer_key_manager_test.go constant testJWTRSSignerKeyType (line 29) | testJWTRSSignerKeyType = "type.googleapis.com/google.crypto.tink.JwtRsaS... function makeValidJWTRSPrivateKey (line 31) | func makeValidJWTRSPrivateKey() (*jrsppb.JwtRsaSsaPkcs1PrivateKey, error) { function TestJWTRSSignerKeyManagerDoesSupport (line 94) | func TestJWTRSSignerKeyManagerDoesSupport(t *testing.T) { function TestJWTRSSignerKeyManagerTypeURL (line 107) | func TestJWTRSSignerKeyManagerTypeURL(t *testing.T) { function TestJWTRSSignerKeyManagerPrimitiveSignAndVerify (line 117) | func TestJWTRSSignerKeyManagerPrimitiveSignAndVerify(t *testing.T) { function TestJWTRSSignerKeyManagerPrimitiveWithInvalidSerializedKeyFails (line 176) | func TestJWTRSSignerKeyManagerPrimitiveWithInvalidSerializedKeyFails(t *... function TestJWTRSSignerKeyManagerPrimitiveSignAndVerifyWithTinkKID (line 186) | func TestJWTRSSignerKeyManagerPrimitiveSignAndVerifyWithTinkKID(t *testi... function TestJWTRSSignerKeyManagerPrimitiveSignAndVerifyWithCustomKID (line 244) | func TestJWTRSSignerKeyManagerPrimitiveSignAndVerifyWithCustomKID(t *tes... function TestJWTRSSignerKeyManagerPrimitiveFailsWithInvalidKey (line 307) | func TestJWTRSSignerKeyManagerPrimitiveFailsWithInvalidKey(t *testing.T) { function TestJWTRSSignerKeyManagerPrimitiveFailsWithCorruptedKey (line 551) | func TestJWTRSSignerKeyManagerPrimitiveFailsWithCorruptedKey(t *testing.... function TestJWTRSSignerKeyManagerPublicKeyData (line 572) | func TestJWTRSSignerKeyManagerPublicKeyData(t *testing.T) { function TestJWTRSSignerKeyManagerPublicKeyDataWithNilKeyFails (line 604) | func TestJWTRSSignerKeyManagerPublicKeyDataWithNilKeyFails(t *testing.T) { function TestJWTRSSignerKeyManagerNewKeyData (line 614) | func TestJWTRSSignerKeyManagerNewKeyData(t *testing.T) { function TestJWTRSSignerKeyManagerNewKeyDataFailsWithInvalidFormat (line 689) | func TestJWTRSSignerKeyManagerNewKeyDataFailsWithInvalidFormat(t *testin... function TestJWTRSSignerKeyManagerNewKeyDataFailsWithNilKeyFormat (line 759) | func TestJWTRSSignerKeyManagerNewKeyDataFailsWithNilKeyFormat(t *testing... function TestJWTRSSignerKeyManagerNewKeyDataFailsWithInvalidSerializedKeyFormat (line 772) | func TestJWTRSSignerKeyManagerNewKeyDataFailsWithInvalidSerializedKeyFor... FILE: go/jwt/jwt_rsa_ssa_pkcs1_verifier_key_manager.go constant jwtRSVerifierKeyVersion (line 32) | jwtRSVerifierKeyVersion = 0 constant jwtRSVerifierTypeURL (line 33) | jwtRSVerifierTypeURL = "type.googleapis.com/google.crypto.tink.JwtRsa... type jwtRSVerifierKeyManager (line 42) | type jwtRSVerifierKeyManager struct method Primitive (line 54) | func (km *jwtRSVerifierKeyManager) Primitive(serializedKey []byte) (an... method NewKey (line 80) | func (km *jwtRSVerifierKeyManager) NewKey(serializedKeyFormat []byte) ... method NewKeyData (line 84) | func (km *jwtRSVerifierKeyManager) NewKeyData(serializedKeyFormat []by... method DoesSupport (line 88) | func (km *jwtRSVerifierKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 92) | func (km *jwtRSVerifierKeyManager) TypeURL() string { function validateRSPublicKey (line 96) | func validateRSPublicKey(pubKey *jrsppb.JwtRsaSsaPkcs1PublicKey) error { function rsCustomKID (line 116) | func rsCustomKID(pk *jrsppb.JwtRsaSsaPkcs1PublicKey) *string { FILE: go/jwt/jwt_rsa_ssa_pkcs1_verifier_key_manager_test.go constant testJWTRSVerifierKeyType (line 28) | testJWTRSVerifierKeyType = "type.googleapis.com/google.crypto.tink.JwtRs... function makeValidRSPublicKey (line 30) | func makeValidRSPublicKey() (*jrsppb.JwtRsaSsaPkcs1PublicKey, error) { function TestJWTRSVerifierNotImplemented (line 55) | func TestJWTRSVerifierNotImplemented(t *testing.T) { function TestJWTRSVerifierDoesSupport (line 78) | func TestJWTRSVerifierDoesSupport(t *testing.T) { function TestJWTRSVerifierTypeURL (line 91) | func TestJWTRSVerifierTypeURL(t *testing.T) { function TestJWTRSVerifierPrimitiveWithInvalidKey (line 101) | func TestJWTRSVerifierPrimitiveWithInvalidKey(t *testing.T) { function TestJWTRSVerifierPrimitiveWithInvalidSerializedKey (line 186) | func TestJWTRSVerifierPrimitiveWithInvalidSerializedKey(t *testing.T) { function TestJWTRSVerifierPrimitiveVerifyFixedToken (line 196) | func TestJWTRSVerifierPrimitiveVerifyFixedToken(t *testing.T) { function TestJWTRSVerifierPrimitiveWithCustomKID (line 247) | func TestJWTRSVerifierPrimitiveWithCustomKID(t *testing.T) { function TestJWTRSVerifierPrimitiveWithTinkKID (line 320) | func TestJWTRSVerifierPrimitiveWithTinkKID(t *testing.T) { FILE: go/jwt/jwt_rsa_ssa_pss_signer_key_manager.go constant jwtPSSignerKeyVersion (line 33) | jwtPSSignerKeyVersion = 0 constant jwtPSSignerTypeURL (line 34) | jwtPSSignerTypeURL = "type.googleapis.com/google.crypto.tink.JwtRsaSs... type jwtPSSignerKeyManager (line 44) | type jwtPSSignerKeyManager struct method Primitive (line 48) | func (km *jwtPSSignerKeyManager) Primitive(serializedKey []byte) (any,... method NewKey (line 112) | func (km *jwtPSSignerKeyManager) NewKey(serializedKeyFormat []byte) (p... method NewKeyData (line 153) | func (km *jwtPSSignerKeyManager) NewKeyData(serializedKeyFormat []byte... method PublicKeyData (line 169) | func (km *jwtPSSignerKeyManager) PublicKeyData(serializedPrivKey []byt... method DoesSupport (line 191) | func (km *jwtPSSignerKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 195) | func (km *jwtPSSignerKeyManager) TypeURL() string { function validatePSPrivateKey (line 92) | func validatePSPrivateKey(privKey *jrsppb.JwtRsaSsaPssPrivateKey) error { FILE: go/jwt/jwt_rsa_ssa_pss_signer_key_manager_test.go constant testJWTPSSignerKeyType (line 29) | testJWTPSSignerKeyType = "type.googleapis.com/google.crypto.tink.JwtRsaS... function makeValidJWTPSPrivateKey (line 31) | func makeValidJWTPSPrivateKey() (*jrsppb.JwtRsaSsaPssPrivateKey, error) { function TestJWTPSSignerKeyManagerDoesSupport (line 94) | func TestJWTPSSignerKeyManagerDoesSupport(t *testing.T) { function TestJWTPSSignerKeyManagerTypeURL (line 107) | func TestJWTPSSignerKeyManagerTypeURL(t *testing.T) { function TestJWTPSSignerKeyManagerPritimiveSignVerify (line 117) | func TestJWTPSSignerKeyManagerPritimiveSignVerify(t *testing.T) { function TestJWTPSSignerKeyManagerPrimitiveFailsWithCorruptedKey (line 219) | func TestJWTPSSignerKeyManagerPrimitiveFailsWithCorruptedKey(t *testing.... function TestJWTPSSignerKeyManagerPrimitiveFailsWithInvalidKey (line 249) | func TestJWTPSSignerKeyManagerPrimitiveFailsWithInvalidKey(t *testing.T) { function TestJWTPSSignerKeyManagerPrimitiveFailsWithNilSerializedKey (line 480) | func TestJWTPSSignerKeyManagerPrimitiveFailsWithNilSerializedKey(t *test... function TestJWTPSSignerKeyManagerPrimitiveFailsWithInvalidSerializedKey (line 490) | func TestJWTPSSignerKeyManagerPrimitiveFailsWithInvalidSerializedKey(t *... function TestJWTPSSignerKeyManagerPublicKeyData (line 500) | func TestJWTPSSignerKeyManagerPublicKeyData(t *testing.T) { function TestJWTPSSignerKeyManagerNewKeyData (line 532) | func TestJWTPSSignerKeyManagerNewKeyData(t *testing.T) { function TestJWTPSSignerKeyManagerNewKeyDataFailsWithInvalidFormat (line 574) | func TestJWTPSSignerKeyManagerNewKeyDataFailsWithInvalidFormat(t *testin... function TestJWTPSSignerKeyManagerNewKeyDataFailsWithNilKeyFormat (line 644) | func TestJWTPSSignerKeyManagerNewKeyDataFailsWithNilKeyFormat(t *testing... function TestJWTPSSignerKeyManagerNewKeyDataFailsWithInvalidSerializedKeyFormat (line 657) | func TestJWTPSSignerKeyManagerNewKeyDataFailsWithInvalidSerializedKeyFor... FILE: go/jwt/jwt_rsa_ssa_pss_verify_key_manager.go constant jwtPSVerifierKeyVersion (line 32) | jwtPSVerifierKeyVersion = 0 constant jwtPSVerifierTypeURL (line 33) | jwtPSVerifierTypeURL = "type.googleapis.com/google.crypto.tink.JwtRsa... type jwtPSVerifierKeyManager (line 40) | type jwtPSVerifierKeyManager struct method Primitive (line 58) | func (km *jwtPSVerifierKeyManager) Primitive(serializedKey []byte) (an... method NewKey (line 85) | func (km *jwtPSVerifierKeyManager) NewKey(serializedKeyFormat []byte) ... method NewKeyData (line 89) | func (km *jwtPSVerifierKeyManager) NewKeyData(serializedKeyFormat []by... method DoesSupport (line 93) | func (km *jwtPSVerifierKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 97) | func (km *jwtPSVerifierKeyManager) TypeURL() string { function validatePSPublicKey (line 101) | func validatePSPublicKey(pubKey *jrsppb.JwtRsaSsaPssPublicKey) error { function psCustomKID (line 121) | func psCustomKID(pk *jrsppb.JwtRsaSsaPssPublicKey) *string { FILE: go/jwt/jwt_rsa_ssa_pss_verify_key_manager_test.go constant testJWTPSVerifierKeyType (line 28) | testJWTPSVerifierKeyType = "type.googleapis.com/google.crypto.tink.JwtRs... function makeValidPSPublicKey (line 30) | func makeValidPSPublicKey() (*jrsppb.JwtRsaSsaPssPublicKey, error) { function TestJWTPSVerifierNotImplemented (line 55) | func TestJWTPSVerifierNotImplemented(t *testing.T) { function TestJWTPSVerifierDoesSupport (line 78) | func TestJWTPSVerifierDoesSupport(t *testing.T) { function TestJWTPSVerifierTypeURL (line 91) | func TestJWTPSVerifierTypeURL(t *testing.T) { function TestJWTPSVerifierPrimitiveWithInvalidKey (line 101) | func TestJWTPSVerifierPrimitiveWithInvalidKey(t *testing.T) { function TestJWTPSVerifierPrimitiveVerifyFixedToken (line 186) | func TestJWTPSVerifierPrimitiveVerifyFixedToken(t *testing.T) { function TestJWTPSVerifierPrimitiveVerifyFixedTokenWithCustomKID (line 234) | func TestJWTPSVerifierPrimitiveVerifyFixedTokenWithCustomKID(t *testing.... function TestJWTPSVerifierPrimitiveVerifyFixedTokenWithTinkKID (line 285) | func TestJWTPSVerifierPrimitiveVerifyFixedTokenWithTinkKID(t *testing.T) { FILE: go/jwt/jwt_signer.go type Signer (line 19) | type Signer interface FILE: go/jwt/jwt_signer_factory.go function NewSigner (line 26) | func NewSigner(handle *keyset.Handle) (Signer, error) { type wrappedSigner (line 38) | type wrappedSigner struct method SignAndEncode (line 61) | func (w *wrappedSigner) SignAndEncode(rawJWT *RawJWT) (string, error) { function newWrappedSigner (line 44) | func newWrappedSigner(ps *primitiveset.PrimitiveSet) (*wrappedSigner, er... FILE: go/jwt/jwt_signer_kid.go type signerWithKID (line 23) | type signerWithKID struct method SignAndEncodeWithKID (line 42) | func (s *signerWithKID) SignAndEncodeWithKID(rawJWT *RawJWT, kid *stri... function newSignerWithKID (line 29) | func newSignerWithKID(ts tink.Signer, algorithm string, customKID *strin... FILE: go/jwt/jwt_signer_verifier_factory_test.go function TestSignerVerifierFactoryWithInvalidPrimitiveSetType (line 34) | func TestSignerVerifierFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestSignerVerifierFactoryNilKeyset (line 47) | func TestSignerVerifierFactoryNilKeyset(t *testing.T) { function createJWTECDSAKey (line 56) | func createJWTECDSAKey(kid *string) (*jepb.JwtEcdsaPrivateKey, error) { function createKeyData (line 78) | func createKeyData(privKey *jepb.JwtEcdsaPrivateKey) (*tinkpb.KeyData, e... function createKeysetHandles (line 90) | func createKeysetHandles(privKey *tinkpb.KeyData, outputPrefixType tinkp... function createKeyHandlesFromKey (line 103) | func createKeyHandlesFromKey(t *testing.T, privKey *jepb.JwtEcdsaPrivate... function createKeyAndKeyHandles (line 115) | func createKeyAndKeyHandles(t *testing.T, kid *string, outputPrefixType ... function TestFactoryVerifyWithDifferentKeyFails (line 124) | func TestFactoryVerifyWithDifferentKeyFails(t *testing.T) { function TestFactorySignWithTinkAndCustomKIDFails (line 163) | func TestFactorySignWithTinkAndCustomKIDFails(t *testing.T) { type signerVerifierFactoryKIDTestCase (line 178) | type signerVerifierFactoryKIDTestCase struct function TestFactorySignVerifyWithKIDFailure (line 186) | func TestFactorySignVerifyWithKIDFailure(t *testing.T) { function TestVerifyAndDecodeReturnsValidationError (line 259) | func TestVerifyAndDecodeReturnsValidationError(t *testing.T) { function TestFactorySignVerifyWithKIDSuccess (line 297) | func TestFactorySignVerifyWithKIDSuccess(t *testing.T) { FILE: go/jwt/jwt_signer_verifier_kid_test.go function createTinkECVerifier (line 26) | func createTinkECVerifier() (tink.Verifier, error) { function createTinkECSigner (line 43) | func createTinkECSigner() (tink.Signer, error) { function createESVerifier (line 56) | func createESVerifier(kid *string) (*verifierWithKID, error) { function createESSigner (line 68) | func createESSigner(kid *string) (*signerWithKID, error) { function TestVerifierWithFixedToken (line 80) | func TestVerifierWithFixedToken(t *testing.T) { function TestCreateSignValidateToken (line 119) | func TestCreateSignValidateToken(t *testing.T) { function TestSignerWithTinkAndCustomKIDFails (line 154) | func TestSignerWithTinkAndCustomKIDFails(t *testing.T) { type signerVerifierKIDTestCase (line 168) | type signerVerifierKIDTestCase struct function TestSignVerifyWithKID (line 178) | func TestSignVerifyWithKID(t *testing.T) { function TestSignVerifyWithKIDFailure (line 240) | func TestSignVerifyWithKIDFailure(t *testing.T) { function TestVerifierModifiedCompact (line 290) | func TestVerifierModifiedCompact(t *testing.T) { function TestVerifierInvalidInputs (line 326) | func TestVerifierInvalidInputs(t *testing.T) { function TestNewSignerWithNilTinkSignerFails (line 348) | func TestNewSignerWithNilTinkSignerFails(t *testing.T) { function TestNewVerifierWithNilTinkVerifierFails (line 354) | func TestNewVerifierWithNilTinkVerifierFails(t *testing.T) { FILE: go/jwt/jwt_test.go function Example_signAndVerify (line 30) | func Example_signAndVerify() { function Example_generateJWKS (line 144) | func Example_generateJWKS() { function Example_verifyWithJWKS (line 190) | func Example_verifyWithJWKS() { function Example_computeMACAndVerify (line 253) | func Example_computeMACAndVerify() { FILE: go/jwt/jwt_validator.go constant jwtMaxClockSkewMinutes (line 23) | jwtMaxClockSkewMinutes = 10 type ValidatorOpts (line 27) | type ValidatorOpts struct type Validator (line 47) | type Validator struct method Validate (line 81) | func (v *Validator) Validate(rawJWT *RawJWT) error { method validateTimestamps (line 100) | func (v *Validator) validateTimestamps(rawJWT *RawJWT) error { method validateTypeHeader (line 139) | func (v *Validator) validateTypeHeader(rawJWT *RawJWT) error { method validateIssuer (line 157) | func (v *Validator) validateIssuer(rawJWT *RawJWT) error { method validateAudiences (line 175) | func (v *Validator) validateAudiences(rawJWT *RawJWT) error { function NewValidator (line 52) | func NewValidator(opts *ValidatorOpts) (*Validator, error) { function validateFieldPresence (line 198) | func validateFieldPresence(ignore bool, isPresent bool, isExpected bool)... FILE: go/jwt/jwt_validator_test.go type validationTestCase (line 24) | type validationTestCase struct function TestNewValidatorFailure (line 30) | func TestNewValidatorFailure(t *testing.T) { function TestValidationFailures (line 85) | func TestValidationFailures(t *testing.T) { function TestExpiredTokenValidationReturnsExpiredErr (line 277) | func TestExpiredTokenValidationReturnsExpiredErr(t *testing.T) { function TestExpirationGetsValidatedFirst (line 302) | func TestExpirationGetsValidatedFirst(t *testing.T) { function TestValidationSuccess (line 329) | func TestValidationSuccess(t *testing.T) { FILE: go/jwt/jwt_verifier.go type Verifier (line 19) | type Verifier interface FILE: go/jwt/jwt_verifier_factory.go function NewVerifier (line 26) | func NewVerifier(handle *keyset.Handle) (Verifier, error) { type wrappedVerifier (line 38) | type wrappedVerifier struct method VerifyAndDecode (line 61) | func (w *wrappedVerifier) VerifyAndDecode(compact string, validator *V... function newWrappedVerifier (line 44) | func newWrappedVerifier(ps *primitiveset.PrimitiveSet) (*wrappedVerifier... FILE: go/jwt/jwt_verifier_kid.go type verifierWithKID (line 23) | type verifierWithKID struct method VerifyAndDecodeWithKID (line 42) | func (v *verifierWithKID) VerifyAndDecodeWithKID(compact string, valid... function newVerifierWithKID (line 29) | func newVerifierWithKID(tv tink.Verifier, algorithm string, customKID *s... FILE: go/jwt/raw_jwt.go constant claimIssuer (line 26) | claimIssuer = "iss" constant claimSubject (line 27) | claimSubject = "sub" constant claimAudience (line 28) | claimAudience = "aud" constant claimExpiration (line 29) | claimExpiration = "exp" constant claimNotBefore (line 30) | claimNotBefore = "nbf" constant claimIssuedAt (line 31) | claimIssuedAt = "iat" constant claimJWTID (line 32) | claimJWTID = "jti" constant jwtTimestampMax (line 34) | jwtTimestampMax = 253402300799 constant jwtTimestampMin (line 35) | jwtTimestampMin = 0 type RawJWTOptions (line 45) | type RawJWTOptions struct type RawJWT (line 61) | type RawJWT struct method JSONPayload (line 101) | func (r *RawJWT) JSONPayload() ([]byte, error) { method HasTypeHeader (line 106) | func (r *RawJWT) HasTypeHeader() bool { method TypeHeader (line 111) | func (r *RawJWT) TypeHeader() (string, error) { method HasAudiences (line 119) | func (r *RawJWT) HasAudiences() bool { method Audiences (line 124) | func (r *RawJWT) Audiences() ([]string, error) { method HasSubject (line 143) | func (r *RawJWT) HasSubject() bool { method Subject (line 148) | func (r *RawJWT) Subject() (string, error) { method HasIssuer (line 153) | func (r *RawJWT) HasIssuer() bool { method Issuer (line 158) | func (r *RawJWT) Issuer() (string, error) { method HasJWTID (line 163) | func (r *RawJWT) HasJWTID() bool { method JWTID (line 168) | func (r *RawJWT) JWTID() (string, error) { method HasIssuedAt (line 173) | func (r *RawJWT) HasIssuedAt() bool { method IssuedAt (line 178) | func (r *RawJWT) IssuedAt() (time.Time, error) { method HasExpiration (line 183) | func (r *RawJWT) HasExpiration() bool { method ExpiresAt (line 188) | func (r *RawJWT) ExpiresAt() (time.Time, error) { method HasNotBefore (line 193) | func (r *RawJWT) HasNotBefore() bool { method NotBefore (line 198) | func (r *RawJWT) NotBefore() (time.Time, error) { method HasStringClaim (line 203) | func (r *RawJWT) HasStringClaim(name string) bool { method StringClaim (line 208) | func (r *RawJWT) StringClaim(name string) (string, error) { method HasNumberClaim (line 216) | func (r *RawJWT) HasNumberClaim(name string) bool { method NumberClaim (line 221) | func (r *RawJWT) NumberClaim(name string) (float64, error) { method HasBooleanClaim (line 229) | func (r *RawJWT) HasBooleanClaim(name string) bool { method BooleanClaim (line 234) | func (r *RawJWT) BooleanClaim(name string) (bool, error) { method HasNullClaim (line 247) | func (r *RawJWT) HasNullClaim(name string) bool { method HasArrayClaim (line 252) | func (r *RawJWT) HasArrayClaim(name string) bool { method ArrayClaim (line 257) | func (r *RawJWT) ArrayClaim(name string) ([]any, error) { method HasObjectClaim (line 269) | func (r *RawJWT) HasObjectClaim(name string) bool { method ObjectClaim (line 274) | func (r *RawJWT) ObjectClaim(name string) (map[string]any, error) { method CustomClaimNames (line 286) | func (r *RawJWT) CustomClaimNames() []string { method timeClaim (line 296) | func (r *RawJWT) timeClaim(name string) (time.Time, error) { method numberClaim (line 304) | func (r *RawJWT) numberClaim(name string) (float64, error) { method stringClaim (line 316) | func (r *RawJWT) stringClaim(name string) (string, error) { method hasClaimOfKind (line 331) | func (r *RawJWT) hasClaimOfKind(name string, exp *spb.Value) bool { method customClaim (line 356) | func (r *RawJWT) customClaim(name string) (*spb.Value, error) { method hasField (line 367) | func (r *RawJWT) hasField(name string) bool { method field (line 372) | func (r *RawJWT) field(name string) (*spb.Value, bool) { function NewRawJWT (line 67) | func NewRawJWT(opts *RawJWTOptions) (*RawJWT, error) { function NewRawJWTFromJSON (line 86) | func NewRawJWTFromJSON(typeHeader *string, jsonPayload []byte) (*RawJWT,... function createPayload (line 378) | func createPayload(opts *RawJWTOptions) (*spb.Struct, error) { function validatePayload (line 414) | func validatePayload(payload *spb.Struct) error { function validateStringClaim (line 437) | func validateStringClaim(claim string, val *spb.Value) error { function validateTimeClaim (line 448) | func validateTimeClaim(claim string, val *spb.Value) error { function validateAudienceClaim (line 459) | func validateAudienceClaim(val *spb.Value) error { function validateCustomClaims (line 486) | func validateCustomClaims(cc map[string]any) error { function setTimeValue (line 498) | func setTimeValue(p *spb.Struct, claim string, val *time.Time) { function setStringValue (line 505) | func setStringValue(p *spb.Struct, claim string, val *string) { function setAudiences (line 512) | func setAudiences(p *spb.Struct, claim string, vals []string) { function setValue (line 525) | func setValue(p *spb.Struct, claim string, val *spb.Value) { function isRegisteredClaim (line 532) | func isRegisteredClaim(c string) bool { function isRegisteredStringClaim (line 536) | func isRegisteredStringClaim(c string) bool { function isRegisteredTimeClaim (line 540) | func isRegisteredTimeClaim(c string) bool { FILE: go/jwt/raw_jwt_test.go constant invalidUTF8 (line 27) | invalidUTF8 = "\xF4\x7F\xBF\xBF" constant validExpiration (line 28) | validExpiration = 1640043004 type testCase (line 31) | type testCase struct function refString (line 38) | func refString(a string) *string { function refTime (line 42) | func refTime(ts int64) *time.Time { function TestCreatingRawJWTWithAllClaims (line 47) | func TestCreatingRawJWTWithAllClaims(t *testing.T) { function TestGeneratingRawJWTWithoutClaims (line 242) | func TestGeneratingRawJWTWithoutClaims(t *testing.T) { function TestNewRawJWTLargeValidTimestamps (line 312) | func TestNewRawJWTLargeValidTimestamps(t *testing.T) { function TestNewRawJWTSingleStringAudience (line 348) | func TestNewRawJWTSingleStringAudience(t *testing.T) { function TestSingleStringAudienceFromJSON (line 367) | func TestSingleStringAudienceFromJSON(t *testing.T) { function TestNewRawJWTValidationFailures (line 382) | func TestNewRawJWTValidationFailures(t *testing.T) { function TestJSONPayload (line 552) | func TestJSONPayload(t *testing.T) { function TestFromJSONValidationFailures (line 661) | func TestFromJSONValidationFailures(t *testing.T) { function TestHasCustomClaimsOfKind (line 738) | func TestHasCustomClaimsOfKind(t *testing.T) { function TestGettingRegisteredClaimsThroughCustomFails (line 777) | func TestGettingRegisteredClaimsThroughCustomFails(t *testing.T) { FILE: go/jwt/verified_jwt.go type VerifiedJWT (line 23) | type VerifiedJWT struct method JSONPayload (line 38) | func (v *VerifiedJWT) JSONPayload() ([]byte, error) { method HasTypeHeader (line 43) | func (v *VerifiedJWT) HasTypeHeader() bool { method TypeHeader (line 48) | func (v *VerifiedJWT) TypeHeader() (string, error) { method HasAudiences (line 53) | func (v *VerifiedJWT) HasAudiences() bool { method Audiences (line 59) | func (v *VerifiedJWT) Audiences() ([]string, error) { method HasSubject (line 64) | func (v *VerifiedJWT) HasSubject() bool { method Subject (line 69) | func (v *VerifiedJWT) Subject() (string, error) { method HasIssuer (line 74) | func (v *VerifiedJWT) HasIssuer() bool { method Issuer (line 79) | func (v *VerifiedJWT) Issuer() (string, error) { method HasJWTID (line 84) | func (v *VerifiedJWT) HasJWTID() bool { method JWTID (line 89) | func (v *VerifiedJWT) JWTID() (string, error) { method HasIssuedAt (line 94) | func (v *VerifiedJWT) HasIssuedAt() bool { method IssuedAt (line 99) | func (v *VerifiedJWT) IssuedAt() (time.Time, error) { method HasExpiration (line 104) | func (v *VerifiedJWT) HasExpiration() bool { method ExpiresAt (line 109) | func (v *VerifiedJWT) ExpiresAt() (time.Time, error) { method HasNotBefore (line 114) | func (v *VerifiedJWT) HasNotBefore() bool { method NotBefore (line 119) | func (v *VerifiedJWT) NotBefore() (time.Time, error) { method HasStringClaim (line 124) | func (v *VerifiedJWT) HasStringClaim(name string) bool { method StringClaim (line 129) | func (v *VerifiedJWT) StringClaim(name string) (string, error) { method HasNumberClaim (line 134) | func (v *VerifiedJWT) HasNumberClaim(name string) bool { method NumberClaim (line 139) | func (v *VerifiedJWT) NumberClaim(name string) (float64, error) { method HasBooleanClaim (line 144) | func (v *VerifiedJWT) HasBooleanClaim(name string) bool { method BooleanClaim (line 149) | func (v *VerifiedJWT) BooleanClaim(name string) (bool, error) { method HasNullClaim (line 154) | func (v *VerifiedJWT) HasNullClaim(name string) bool { method HasArrayClaim (line 159) | func (v *VerifiedJWT) HasArrayClaim(name string) bool { method ArrayClaim (line 164) | func (v *VerifiedJWT) ArrayClaim(name string) ([]any, error) { method HasObjectClaim (line 169) | func (v *VerifiedJWT) HasObjectClaim(name string) bool { method ObjectClaim (line 174) | func (v *VerifiedJWT) ObjectClaim(name string) (map[string]any, error) { method CustomClaimNames (line 179) | func (v *VerifiedJWT) CustomClaimNames() []string { function newVerifiedJWT (line 28) | func newVerifiedJWT(rawJWT *RawJWT) (*VerifiedJWT, error) { FILE: go/jwt/verified_jwt_test.go function createVerifiedJWT (line 27) | func createVerifiedJWT(rawJWT *jwt.RawJWT) (*jwt.VerifiedJWT, error) { function TestGetRegisteredStringClaims (line 61) | func TestGetRegisteredStringClaims(t *testing.T) { function TestGetRegisteredTimestampClaims (line 122) | func TestGetRegisteredTimestampClaims(t *testing.T) { function TestGetAudiencesClaim (line 169) | func TestGetAudiencesClaim(t *testing.T) { function TestGetCustomClaims (line 194) | func TestGetCustomClaims(t *testing.T) { function TestCustomClaimIsFalseForWrongType (line 273) | func TestCustomClaimIsFalseForWrongType(t *testing.T) { function TestNoClaimsCallHasAndGet (line 313) | func TestNoClaimsCallHasAndGet(t *testing.T) { function TestCantGetRegisteredClaimsThroughCustomClaims (line 351) | func TestCantGetRegisteredClaimsThroughCustomClaims(t *testing.T) { function TestGetJSONPayload (line 394) | func TestGetJSONPayload(t *testing.T) { FILE: go/keyderivation/internal/streamingprf/hkdf_streaming_prf.go constant minHKDFStreamingPRFKeySize (line 27) | minHKDFStreamingPRFKeySize = 32 type hkdfStreamingPRF (line 30) | type hkdfStreamingPRF struct method Compute (line 53) | func (h *hkdfStreamingPRF) Compute(data []byte) (io.Reader, error) { function newHKDFStreamingPRF (line 41) | func newHKDFStreamingPRF(hashName string, key, salt []byte) (*hkdfStream... function validateHKDFStreamingPRFParams (line 57) | func validateHKDFStreamingPRFParams(hash string, keySize int) error { FILE: go/keyderivation/internal/streamingprf/hkdf_streaming_prf_key_manager.go constant hkdfStreamingPRFKeyVersion (line 34) | hkdfStreamingPRFKeyVersion = 0 constant hkdfPRFTypeURL (line 35) | hkdfPRFTypeURL = "type.googleapis.com/google.crypto.tink.Hkd... type HKDFStreamingPRFKeyManager (line 47) | type HKDFStreamingPRFKeyManager struct method Primitive (line 52) | func (km *HKDFStreamingPRFKeyManager) Primitive(serializedKey []byte) ... method NewKey (line 70) | func (km *HKDFStreamingPRFKeyManager) NewKey(serializedKeyFormat []byt... method NewKeyData (line 78) | func (km *HKDFStreamingPRFKeyManager) NewKeyData(serializedKeyFormat [... method DoesSupport (line 84) | func (km *HKDFStreamingPRFKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 90) | func (km *HKDFStreamingPRFKeyManager) TypeURL() string { FILE: go/keyderivation/internal/streamingprf/hkdf_streaming_prf_key_manager_test.go function TestHKDFStreamingPRFKeyManagerPrimitive (line 29) | func TestHKDFStreamingPRFKeyManagerPrimitive(t *testing.T) { function TestHKDFStreamingPRFKeyManagerPrimitiveRejectsIncorrectKeys (line 90) | func TestHKDFStreamingPRFKeyManagerPrimitiveRejectsIncorrectKeys(t *test... function TestHKDFStreamingPRFKeyManagerPrimitiveRejectsInvalidKeys (line 133) | func TestHKDFStreamingPRFKeyManagerPrimitiveRejectsInvalidKeys(t *testin... function TestHKDFStreamingPRFKeyManagerNewKeyAndNewKeyData (line 199) | func TestHKDFStreamingPRFKeyManagerNewKeyAndNewKeyData(t *testing.T) { function TestHKDFStreamingPRFKeyManagerDoesSupport (line 210) | func TestHKDFStreamingPRFKeyManagerDoesSupport(t *testing.T) { function TestHKDFStreamingPRFKeyManagerTypeURL (line 220) | func TestHKDFStreamingPRFKeyManagerTypeURL(t *testing.T) { FILE: go/keyderivation/internal/streamingprf/hkdf_streaming_prf_test.go function TestNewHKDFStreamingPRF (line 29) | func TestNewHKDFStreamingPRF(t *testing.T) { function TestNewHKDFStreamingPRFFails (line 70) | func TestNewHKDFStreamingPRFFails(t *testing.T) { function TestHKDFStreamingPRFWithRFCVector (line 95) | func TestHKDFStreamingPRFWithRFCVector(t *testing.T) { function TestHKDFStreamingPRFWithWycheproof (line 144) | func TestHKDFStreamingPRFWithWycheproof(t *testing.T) { FILE: go/keyderivation/internal/streamingprf/streaming_prf.go type StreamingPRF (line 27) | type StreamingPRF interface FILE: go/keyderivation/internal/streamingprf/streaming_prf_factory.go function New (line 28) | func New(h *keyset.Handle) (StreamingPRF, error) { type wrappedStreamingPRF (line 40) | type wrappedStreamingPRF struct method Compute (line 67) | func (w *wrappedStreamingPRF) Compute(input []byte) (io.Reader, error) { function newWrappedStreamingPRF (line 47) | func newWrappedStreamingPRF(ps *primitiveset.PrimitiveSet) (*wrappedStre... FILE: go/keyderivation/internal/streamingprf/streaming_prf_factory_test.go function TestNew (line 34) | func TestNew(t *testing.T) { function TestNewEqualToStreamingPRFPrimitive (line 70) | func TestNewEqualToStreamingPRFPrimitive(t *testing.T) { function TestNewRejectsIncorrectKeysetHandle (line 182) | func TestNewRejectsIncorrectKeysetHandle(t *testing.T) { function TestNewRejectsInvalidKeysetHandle (line 196) | func TestNewRejectsInvalidKeysetHandle(t *testing.T) { FILE: go/keyderivation/internal/streamingprf/streaming_prf_test.go constant hkdfPRFTypeURL (line 25) | hkdfPRFTypeURL = "type.googleapis.com/google.crypto.tink.HkdfPrfKey" function limitFromHash (line 28) | func limitFromHash(t *testing.T, hash commonpb.HashType) (limit int) { FILE: go/keyderivation/keyderivation.go function init (line 32) | func init() { FILE: go/keyderivation/keyderivation_key_templates.go function CreatePRFBasedKeyTemplate (line 29) | func CreatePRFBasedKeyTemplate(prfKeyTemplate, derivedKeyTemplate *tinkp... FILE: go/keyderivation/keyderivation_key_templates_test.go function TestPRFBasedKeyTemplateDerivesAESGCMKeyset (line 30) | func TestPRFBasedKeyTemplateDerivesAESGCMKeyset(t *testing.T) { function TestInvalidPRFBasedDeriverKeyTemplates (line 104) | func TestInvalidPRFBasedDeriverKeyTemplates(t *testing.T) { FILE: go/keyderivation/keyderivation_test.go function Example (line 27) | func Example() { FILE: go/keyderivation/keyset_deriver.go type KeysetDeriver (line 27) | type KeysetDeriver interface FILE: go/keyderivation/keyset_deriver_factory.go function New (line 30) | func New(handle *keyset.Handle) (KeysetDeriver, error) { type wrappedKeysetDeriver (line 42) | type wrappedKeysetDeriver struct method DeriveKeyset (line 61) | func (w *wrappedKeysetDeriver) DeriveKeyset(salt []byte) (*keyset.Hand... function newWrappedKeysetDeriver (line 49) | func newWrappedKeysetDeriver(ps *primitiveset.PrimitiveSet) (*wrappedKey... FILE: go/keyderivation/keyset_deriver_factory_test.go type invalidDeriver (line 29) | type invalidDeriver struct method DeriveKeyset (line 33) | func (i *invalidDeriver) DeriveKeyset(salt []byte) (*keyset.Handle, er... function TestDeriveKeysetWithInvalidPrimitiveImplementationFails (line 46) | func TestDeriveKeysetWithInvalidPrimitiveImplementationFails(t *testing.... function TestNewWrappedKeysetDeriverWrongPrimitiveFails (line 74) | func TestNewWrappedKeysetDeriverWrongPrimitiveFails(t *testing.T) { FILE: go/keyderivation/keyset_deriver_factory_x_test.go function TestWrappedKeysetDeriver (line 31) | func TestWrappedKeysetDeriver(t *testing.T) { function TestNewRejectsNilKeysetHandle (line 193) | func TestNewRejectsNilKeysetHandle(t *testing.T) { function TestNewRejectsIncorrectKey (line 199) | func TestNewRejectsIncorrectKey(t *testing.T) { FILE: go/keyderivation/prf_based_deriver.go constant hkdfPRFTypeURL (line 27) | hkdfPRFTypeURL = "type.googleapis.com/google.crypto.tink.HkdfPrfKey" type prfBasedDeriver (line 31) | type prfBasedDeriver struct method DeriveKeyset (line 76) | func (p *prfBasedDeriver) DeriveKeyset(salt []byte) (*keyset.Handle, e... function newPRFBasedDeriver (line 39) | func newPRFBasedDeriver(prfKeyData *tinkpb.KeyData, derivedKeyTemplate *... FILE: go/keyderivation/prf_based_deriver_key_manager.go constant prfBasedDeriverKeyVersion (line 29) | prfBasedDeriverKeyVersion = 0 constant prfBasedDeriverTypeURL (line 30) | prfBasedDeriverTypeURL = "type.googleapis.com/google.crypto.tink.PrfB... type prfBasedDeriverKeyManager (line 38) | type prfBasedDeriverKeyManager struct method Primitive (line 42) | func (km *prfBasedDeriverKeyManager) Primitive(serializedKey []byte) (... method NewKey (line 56) | func (km *prfBasedDeriverKeyManager) NewKey(serializedKeyFormat []byte... method NewKeyData (line 82) | func (km *prfBasedDeriverKeyManager) NewKeyData(serializedKeyFormat []... method DoesSupport (line 98) | func (km *prfBasedDeriverKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 102) | func (km *prfBasedDeriverKeyManager) TypeURL() string { FILE: go/keyderivation/prf_based_deriver_key_manager_test.go constant prfBasedDeriverKeyVersion (line 35) | prfBasedDeriverKeyVersion = 0 constant prfBasedDeriverTypeURL (line 36) | prfBasedDeriverTypeURL = "type.googleapis.com/google.crypto.tink.PrfB... function TestPRFBasedDeriverKeyManagerPrimitive (line 39) | func TestPRFBasedDeriverKeyManagerPrimitive(t *testing.T) { function TestPRFBasedDeriverKeyManagerPrimitiveRejectsIncorrectKeys (line 113) | func TestPRFBasedDeriverKeyManagerPrimitiveRejectsIncorrectKeys(t *testi... function TestPRFBasedDeriverKeyManagerPrimitiveRejectsInvalidKeys (line 163) | func TestPRFBasedDeriverKeyManagerPrimitiveRejectsInvalidKeys(t *testing... function TestPRFBasedDeriverKeyManagerNewKey (line 237) | func TestPRFBasedDeriverKeyManagerNewKey(t *testing.T) { function TestPRFBasedDeriverKeyManagerNewKeyData (line 313) | func TestPRFBasedDeriverKeyManagerNewKeyData(t *testing.T) { function TestPRFBasedDeriverKeyManagerNewKeyAndNewKeyDataRejectsIncorrectKeyFormats (line 395) | func TestPRFBasedDeriverKeyManagerNewKeyAndNewKeyDataRejectsIncorrectKey... function TestPRFBasedDeriverKeyManagerNewKeyAndNewKeyDataRejectsInvalidKeyFormats (line 443) | func TestPRFBasedDeriverKeyManagerNewKeyAndNewKeyDataRejectsInvalidKeyFo... function TestPRFBasedDeriverKeyManagerDoesSupport (line 500) | func TestPRFBasedDeriverKeyManagerDoesSupport(t *testing.T) { function TestPRFBasedDeriverKeyManagerTypeURL (line 513) | func TestPRFBasedDeriverKeyManagerTypeURL(t *testing.T) { FILE: go/keyderivation/prf_based_deriver_test.go function TestPRFBasedDeriver (line 38) | func TestPRFBasedDeriver(t *testing.T) { function TestPRFBasedDeriverWithHKDFRFCVectorForAESGCM (line 152) | func TestPRFBasedDeriverWithHKDFRFCVectorForAESGCM(t *testing.T) { function TestNewPRFBasedDeriverRejectsInvalidInputs (line 271) | func TestNewPRFBasedDeriverRejectsInvalidInputs(t *testing.T) { FILE: go/keyset/binary_io.go type BinaryReader (line 26) | type BinaryReader struct method Read (line 36) | func (bkr *BinaryReader) Read() (*tinkpb.Keyset, error) { method ReadEncrypted (line 46) | func (bkr *BinaryReader) ReadEncrypted() (*tinkpb.EncryptedKeyset, err... function NewBinaryReader (line 31) | func NewBinaryReader(r io.Reader) *BinaryReader { function read (line 55) | func read(r io.Reader, msg proto.Message) error { type BinaryWriter (line 65) | type BinaryWriter struct method Write (line 75) | func (bkw *BinaryWriter) Write(keyset *tinkpb.Keyset) error { method WriteEncrypted (line 80) | func (bkw *BinaryWriter) WriteEncrypted(keyset *tinkpb.EncryptedKeyset... function NewBinaryWriter (line 70) | func NewBinaryWriter(w io.Writer) *BinaryWriter { function write (line 87) | func write(w io.Writer, msg proto.Message) error { FILE: go/keyset/binary_io_test.go function TestBinaryIOUnencrypted (line 32) | func TestBinaryIOUnencrypted(t *testing.T) { function TestBinaryIOEncrypted (line 58) | func TestBinaryIOEncrypted(t *testing.T) { function TestBinaryWriteEncryptedOverhead (line 79) | func TestBinaryWriteEncryptedOverhead(t *testing.T) { FILE: go/keyset/handle.go type Handle (line 36) | type Handle struct method Public (line 110) | func (h *Handle) Public() (*Handle, error) { method String (line 139) | func (h *Handle) String() string { method KeysetInfo (line 149) | func (h *Handle) KeysetInfo() *tinkpb.KeysetInfo { method Write (line 154) | func (h *Handle) Write(writer Writer, masterKey tink.AEAD) error { method WriteWithAssociatedData (line 159) | func (h *Handle) WriteWithAssociatedData(writer Writer, masterKey tink... method WriteWithNoSecrets (line 169) | func (h *Handle) WriteWithNoSecrets(w Writer) error { method Primitives (line 213) | func (h *Handle) Primitives(opts ...PrimitivesOption) (*primitiveset.P... method PrimitivesWithKeyManager (line 233) | func (h *Handle) PrimitivesWithKeyManager(km registry.KeyManager) (*pr... method primitives (line 241) | func (h *Handle) primitives(km registry.KeyManager, opts ...Primitives... method hasSecrets (line 285) | func (h *Handle) hasSecrets() bool { function newWithOptions (line 41) | func newWithOptions(ks *tinkpb.Keyset, opts ...Option) (*Handle, error) { function NewHandle (line 51) | func NewHandle(kt *tinkpb.KeyTemplate) (*Handle, error) { function NewHandleWithNoSecrets (line 70) | func NewHandleWithNoSecrets(ks *tinkpb.Keyset) (*Handle, error) { function Read (line 83) | func Read(reader Reader, masterKey tink.AEAD) (*Handle, error) { function ReadWithAssociatedData (line 88) | func ReadWithAssociatedData(reader Reader, masterKey tink.AEAD, associat... function ReadWithNoSecrets (line 101) | func ReadWithNoSecrets(reader Reader) (*Handle, error) { type Config (line 179) | type Config interface type primitiveOptions (line 182) | type primitiveOptions struct type PrimitivesOption (line 187) | type PrimitivesOption function WithConfig (line 191) | func WithConfig(c Config) PrimitivesOption { function publicKeyData (line 303) | func publicKeyData(privKeyData *tinkpb.KeyData) (*tinkpb.KeyData, error) { function decrypt (line 318) | func decrypt(encryptedKeyset *tinkpb.EncryptedKeyset, masterKey tink.AEA... function encrypt (line 333) | func encrypt(keyset *tinkpb.Keyset, masterKey tink.AEAD, associatedData ... function getKeysetInfo (line 351) | func getKeysetInfo(keyset *tinkpb.Keyset) *tinkpb.KeysetInfo { function getKeyInfo (line 367) | func getKeyInfo(key *tinkpb.Keyset_Key) *tinkpb.KeysetInfo_KeyInfo { FILE: go/keyset/handle_test.go function TestNewHandle (line 34) | func TestNewHandle(t *testing.T) { function TestNewHandleWithInvalidTypeURLFails (line 56) | func TestNewHandleWithInvalidTypeURLFails(t *testing.T) { function TestNewHandleWithNilTemplateFails (line 65) | func TestNewHandleWithNilTemplateFails(t *testing.T) { function TestWriteAndReadInBinary (line 71) | func TestWriteAndReadInBinary(t *testing.T) { function TestWriteAndReadInJSON (line 103) | func TestWriteAndReadInJSON(t *testing.T) { function TestWriteAndReadWithAssociatedData (line 135) | func TestWriteAndReadWithAssociatedData(t *testing.T) { function TestReadWithMismatchedAssociatedData (line 168) | func TestReadWithMismatchedAssociatedData(t *testing.T) { function TestWriteAndReadWithNoSecrets (line 198) | func TestWriteAndReadWithNoSecrets(t *testing.T) { function TestWriteWithNoSecretsFailsWithSymmetricSecretKey (line 226) | func TestWriteWithNoSecretsFailsWithSymmetricSecretKey(t *testing.T) { function TestReadWithNoSecretsFailsWithSymmetricSecretKey (line 240) | func TestReadWithNoSecretsFailsWithSymmetricSecretKey(t *testing.T) { function TestWriteWithNoSecretsFailsWithPrivateKey (line 259) | func TestWriteWithNoSecretsFailsWithPrivateKey(t *testing.T) { function TestReadWithNoSecretsFailsWithPrivateKey (line 272) | func TestReadWithNoSecretsFailsWithPrivateKey(t *testing.T) { function TestWriteAndReadWithNoSecretsFailsWithUnknownKeyMaterial (line 291) | func TestWriteAndReadWithNoSecretsFailsWithUnknownKeyMaterial(t *testing... function TestKeysetInfo (line 317) | func TestKeysetInfo(t *testing.T) { function TestPrimitivesWithRegistry (line 329) | func TestPrimitivesWithRegistry(t *testing.T) { type testConfig (line 371) | type testConfig struct method PrimitiveFromKeyData (line 373) | func (c *testConfig) PrimitiveFromKeyData(_ *tinkpb.KeyData, _ interna... function TestPrimitivesWithConfig (line 377) | func TestPrimitivesWithConfig(t *testing.T) { function TestPrimitivesWithMultipleConfigs (line 396) | func TestPrimitivesWithMultipleConfigs(t *testing.T) { type testKeyManager (line 409) | type testKeyManager struct method Primitive (line 413) | func (km *testKeyManager) Primitive(_ []byte) (any, error) ... method NewKey (line 414) | func (km *testKeyManager) NewKey(_ []byte) (proto.Message, error) ... method TypeURL (line 415) | func (km *testKeyManager) TypeURL() string ... method NewKeyData (line 416) | func (km *testKeyManager) NewKeyData(_ []byte) (*tinkpb.KeyData, error... method DoesSupport (line 417) | func (km *testKeyManager) DoesSupport(typeURL string) bool { type testPrimitive (line 411) | type testPrimitive struct function TestPrimitivesWithKeyManager (line 421) | func TestPrimitivesWithKeyManager(t *testing.T) { FILE: go/keyset/json_io.go type JSONReader (line 27) | type JSONReader struct method Read (line 41) | func (bkr *JSONReader) Read() (*tinkpb.Keyset, error) { method ReadEncrypted (line 51) | func (bkr *JSONReader) ReadEncrypted() (*tinkpb.EncryptedKeyset, error) { method readJSON (line 60) | func (bkr *JSONReader) readJSON(r io.Reader, msg proto.Message) error { function NewJSONReader (line 33) | func NewJSONReader(r io.Reader) *JSONReader { type JSONWriter (line 69) | type JSONWriter struct method Write (line 86) | func (bkw *JSONWriter) Write(keyset *tinkpb.Keyset) error { method WriteEncrypted (line 91) | func (bkw *JSONWriter) WriteEncrypted(keyset *tinkpb.EncryptedKeyset) ... method writeJSON (line 95) | func (bkw *JSONWriter) writeJSON(w io.Writer, msg proto.Message) error { function NewJSONWriter (line 75) | func NewJSONWriter(w io.Writer) *JSONWriter { FILE: go/keyset/json_io_test.go function TestJSONIOUnencrypted (line 33) | func TestJSONIOUnencrypted(t *testing.T) { function TestJSONReader (line 59) | func TestJSONReader(t *testing.T) { function TestJSONReaderLargeIds (line 125) | func TestJSONReaderLargeIds(t *testing.T) { function TestJSONReaderRejectsNegativeKeyIds (line 170) | func TestJSONReaderRejectsNegativeKeyIds(t *testing.T) { function TestJSONReaderRejectsKeyIdLargerThanUint32 (line 195) | func TestJSONReaderRejectsKeyIdLargerThanUint32(t *testing.T) { function TestJSONWriterLargeId (line 222) | func TestJSONWriterLargeId(t *testing.T) { function TestJSONIOEncrypted (line 255) | func TestJSONIOEncrypted(t *testing.T) { FILE: go/keyset/keyset.go function keysetHandle (line 27) | func keysetHandle(ks *tinkpb.Keyset, opts ...Option) (*Handle, error) { function keysetMaterial (line 34) | func keysetMaterial(h *Handle) *tinkpb.Keyset { function init (line 38) | func init() { FILE: go/keyset/keyset_test.go constant keyURI (line 30) | keyURI = "fake-kms://CM2b3_MDElQKSAowdHlwZS5nb29nbGVhcGlzLmNvbS9nb29nbGU... function Example_encryptedKeyset (line 32) | func Example_encryptedKeyset() { FILE: go/keyset/manager.go type Manager (line 29) | type Manager struct method Add (line 50) | func (km *Manager) Add(kt *tinkpb.KeyTemplate) (uint32, error) { method SetPrimary (line 77) | func (km *Manager) SetPrimary(keyID uint32) error { method Enable (line 97) | func (km *Manager) Enable(keyID uint32) error { method Disable (line 116) | func (km *Manager) Disable(keyID uint32) error { method Delete (line 138) | func (km *Manager) Delete(keyID uint32) error { method Handle (line 163) | func (km *Manager) Handle() (*Handle, error) { method newKeyID (line 168) | func (km *Manager) newKeyID() uint32 { function NewManager (line 34) | func NewManager() *Manager { function NewManagerFromHandle (line 41) | func NewManagerFromHandle(kh *Handle) *Manager { FILE: go/keyset/manager_test.go function TestKeysetManagerBasic (line 29) | func TestKeysetManagerBasic(t *testing.T) { function TestExistingKeyset (line 57) | func TestExistingKeyset(t *testing.T) { function TestKeysetManagerFull (line 101) | func TestKeysetManagerFull(t *testing.T) { function TestKeysetManagerAdd (line 130) | func TestKeysetManagerAdd(t *testing.T) { function TestKeysetManagerAddWithNilKeysetTemplateFails (line 157) | func TestKeysetManagerAddWithNilKeysetTemplateFails(t *testing.T) { function TestKeysetManagerAddWithInvalidTypeUrlFails (line 166) | func TestKeysetManagerAddWithInvalidTypeUrlFails(t *testing.T) { function TestKeysetManagerAddWithUnknownOutputPrefixTypeFails (line 178) | func TestKeysetManagerAddWithUnknownOutputPrefixTypeFails(t *testing.T) { function TestKeysetManagerEnable (line 188) | func TestKeysetManagerEnable(t *testing.T) { function TestKeysetManagerEnableWithUnknownStatus (line 219) | func TestKeysetManagerEnableWithUnknownStatus(t *testing.T) { function TestKeysetManagerEnableWithDestroyed (line 239) | func TestKeysetManagerEnableWithDestroyed(t *testing.T) { function TestKeysetManagerEnableWithMissingKey (line 259) | func TestKeysetManagerEnableWithMissingKey(t *testing.T) { function TestKeysetManagerSetPrimary (line 279) | func TestKeysetManagerSetPrimary(t *testing.T) { function TestKeysetManagerSetPrimaryWithDisabledKey (line 309) | func TestKeysetManagerSetPrimaryWithDisabledKey(t *testing.T) { function TestKeysetManagerSetPrimaryWithDestroyedKey (line 332) | func TestKeysetManagerSetPrimaryWithDestroyedKey(t *testing.T) { function TestKeysetManagerSetPrimaryWithUnknownStatusKey (line 355) | func TestKeysetManagerSetPrimaryWithUnknownStatusKey(t *testing.T) { function TestKeysetManagerSetPrimaryWithMissingKey (line 378) | func TestKeysetManagerSetPrimaryWithMissingKey(t *testing.T) { function TestKeysetManagerDisable (line 401) | func TestKeysetManagerDisable(t *testing.T) { function TestKeysetManagerDisableWithPrimaryKey (line 435) | func TestKeysetManagerDisableWithPrimaryKey(t *testing.T) { function TestKeysetManagerDisableWithDestroyedKey (line 465) | func TestKeysetManagerDisableWithDestroyedKey(t *testing.T) { function TestKeysetManagerDisableWithMissingKey (line 488) | func TestKeysetManagerDisableWithMissingKey(t *testing.T) { function TestKeysetManagerDelete (line 510) | func TestKeysetManagerDelete(t *testing.T) { function TestKeysetManagerDeleteWithPrimaryKey (line 543) | func TestKeysetManagerDeleteWithPrimaryKey(t *testing.T) { function TestKeysetManagerDeleteWithMissingKey (line 563) | func TestKeysetManagerDeleteWithMissingKey(t *testing.T) { function TestKeysetManagerWithEmptyManager (line 583) | func TestKeysetManagerWithEmptyManager(t *testing.T) { FILE: go/keyset/mem_io.go type MemReaderWriter (line 23) | type MemReaderWriter struct method Read (line 33) | func (m *MemReaderWriter) Read() (*tinkpb.Keyset, error) { method ReadEncrypted (line 38) | func (m *MemReaderWriter) ReadEncrypted() (*tinkpb.EncryptedKeyset, er... method Write (line 43) | func (m *MemReaderWriter) Write(keyset *tinkpb.Keyset) error { method WriteEncrypted (line 49) | func (m *MemReaderWriter) WriteEncrypted(keyset *tinkpb.EncryptedKeyse... FILE: go/keyset/mem_io_test.go function TestConvertProtoKeysetIntoHandleInTests (line 32) | func TestConvertProtoKeysetIntoHandleInTests(t *testing.T) { function TestConvertHandleKeysetIntoProtoKeysetInTests (line 56) | func TestConvertHandleKeysetIntoProtoKeysetInTests(t *testing.T) { function TestConvertProtoKeysetIntoHandle (line 77) | func TestConvertProtoKeysetIntoHandle(t *testing.T) { function TestConvertHandleKeysetIntoProtoKeyset (line 106) | func TestConvertHandleKeysetIntoProtoKeyset(t *testing.T) { function TestConvertHandleKeysetIntoSerializedKeyset (line 127) | func TestConvertHandleKeysetIntoSerializedKeyset(t *testing.T) { function TestConvertPublicKeyProtoKeysetIntoHandle (line 166) | func TestConvertPublicKeyProtoKeysetIntoHandle(t *testing.T) { function TestConvertPublicKeysetHandleIntoProtoKeyset (line 199) | func TestConvertPublicKeysetHandleIntoProtoKeyset(t *testing.T) { function decryptKeyset (line 233) | func decryptKeyset(encrypted *tinkpb.EncryptedKeyset, keysetEncryptionAE... function TestConvertHandleKeysetIntoProtoEncryptedKeyset (line 246) | func TestConvertHandleKeysetIntoProtoEncryptedKeyset(t *testing.T) { function TestConvertProtoEncryptedKeysetIntoHandle (line 292) | func TestConvertProtoEncryptedKeysetIntoHandle(t *testing.T) { FILE: go/keyset/option.go type Option (line 20) | type Option interface type option (line 24) | type option method set (line 26) | func (o option) set(h *Handle) error { return o(h) } function WithAnnotations (line 29) | func WithAnnotations(annotations map[string]string) Option { function applyOptions (line 39) | func applyOptions(h *Handle, opts ...Option) error { FILE: go/keyset/reader.go type Reader (line 22) | type Reader interface FILE: go/keyset/validation.go function ValidateKeyVersion (line 25) | func ValidateKeyVersion(version, maxExpected uint32) error { function Validate (line 35) | func Validate(keyset *tinkpb.Keyset) error { function validateKey (line 74) | func validateKey(key *tinkpb.Keyset_Key) error { FILE: go/keyset/validation_test.go function TestValidateKeyVersion (line 26) | func TestValidateKeyVersion(t *testing.T) { function TestValidate (line 34) | func TestValidate(t *testing.T) { function generateInvalidKeys (line 101) | func generateInvalidKeys() []*tinkpb.Keyset_Key { FILE: go/keyset/writer.go type Writer (line 20) | type Writer interface FILE: go/kwp/subtle/kwp.go constant MinWrapSize (line 50) | MinWrapSize = 16 constant MaxWrapSize (line 52) | MaxWrapSize = 8192 constant roundCount (line 54) | roundCount = 6 constant ivPrefix (line 55) | ivPrefix = uint32(0xA65959A6) type KWP (line 59) | type KWP struct method computeW (line 89) | func (kwp *KWP) computeW(iv, key []byte) ([]byte, error) { method invertW (line 127) | func (kwp *KWP) invertW(wrapped []byte) ([]byte, error) { method Wrap (line 164) | func (kwp *KWP) Wrap(data []byte) ([]byte, error) { method Unwrap (line 182) | func (kwp *KWP) Unwrap(data []byte) ([]byte, error) { function NewKWP (line 67) | func NewKWP(wrappingKey []byte) (*KWP, error) { function wrappingSize (line 82) | func wrappingSize(inputSize int) int { FILE: go/kwp/subtle/kwp_test.go function TestWrapUnwrap (line 28) | func TestWrapUnwrap(t *testing.T) { function TestKeySizes (line 56) | func TestKeySizes(t *testing.T) { function TestInvalidWrappingSizes (line 74) | func TestInvalidWrappingSizes(t *testing.T) { type KwpCase (line 90) | type KwpCase struct type KwpGroup (line 97) | type KwpGroup struct type KwpSuite (line 103) | type KwpSuite struct function TestWycheproofCases (line 108) | func TestWycheproofCases(t *testing.T) { function runWycheproofCase (line 128) | func runWycheproofCase(t *testing.T, testCase *KwpCase) { FILE: go/mac/aes_cmac_key_manager.go constant cmacKeyVersion (line 30) | cmacKeyVersion = 0 constant cmacTypeURL (line 31) | cmacTypeURL = "type.googleapis.com/google.crypto.tink.AesCmacKey" type aescmacKeyManager (line 38) | type aescmacKeyManager struct method Primitive (line 41) | func (km *aescmacKeyManager) Primitive(serializedKey []byte) (any, err... method NewKey (line 60) | func (km *aescmacKeyManager) NewKey(serializedKeyFormat []byte) (proto... method NewKeyData (line 81) | func (km *aescmacKeyManager) NewKeyData(serializedKeyFormat []byte) (*... method DoesSupport (line 99) | func (km *aescmacKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 104) | func (km *aescmacKeyManager) TypeURL() string { method validateKey (line 110) | func (km *aescmacKeyManager) validateKey(key *cmacpb.AesCmacKey) error { method validateKeyFormat (line 120) | func (km *aescmacKeyManager) validateKeyFormat(format *cmacpb.AesCmacK... FILE: go/mac/aes_cmac_key_manager_test.go function TestGetPrimitiveCMACBasic (line 31) | func TestGetPrimitiveCMACBasic(t *testing.T) { function TestGetPrimitiveCMACWithInvalidInput (line 52) | func TestGetPrimitiveCMACWithInvalidInput(t *testing.T) { function TestNewKeyCMACMultipleTimes (line 77) | func TestNewKeyCMACMultipleTimes(t *testing.T) { function TestNewKeyCMACBasic (line 111) | func TestNewKeyCMACBasic(t *testing.T) { function TestNewKeyCMACWithInvalidInput (line 132) | func TestNewKeyCMACWithInvalidInput(t *testing.T) { function TestNewKeyDataCMACBasic (line 157) | func TestNewKeyDataCMACBasic(t *testing.T) { function TestNewKeyDataCMACWithInvalidInput (line 188) | func TestNewKeyDataCMACWithInvalidInput(t *testing.T) { function TestDoesSupportCMAC (line 210) | func TestDoesSupportCMAC(t *testing.T) { function TestTypeURLCMAC (line 223) | func TestTypeURLCMAC(t *testing.T) { function genInvalidCMACKeys (line 233) | func genInvalidCMACKeys() []proto.Message { function genInvalidCMACKeyFormats (line 256) | func genInvalidCMACKeyFormats() []proto.Message { function genValidCMACKeyFormats (line 275) | func genValidCMACKeyFormats() []*cmacpb.AesCmacKeyFormat { function genValidCMACKeys (line 282) | func genValidCMACKeys() []*cmacpb.AesCmacKey { function validateCMACKey (line 290) | func validateCMACKey(format *cmacpb.AesCmacKeyFormat, key *cmacpb.AesCma... function validateCMACPrimitive (line 303) | func validateCMACPrimitive(p any, key *cmacpb.AesCmacKey) error { FILE: go/mac/hmac_key_manager.go constant hmacKeyVersion (line 32) | hmacKeyVersion = 0 constant hmacTypeURL (line 33) | hmacTypeURL = "type.googleapis.com/google.crypto.tink.HmacKey" type hmacKeyManager (line 40) | type hmacKeyManager struct method Primitive (line 43) | func (km *hmacKeyManager) Primitive(serializedKey []byte) (any, error) { method NewKey (line 63) | func (km *hmacKeyManager) NewKey(serializedKeyFormat []byte) (proto.Me... method NewKeyData (line 84) | func (km *hmacKeyManager) NewKeyData(serializedKeyFormat []byte) (*tin... method DoesSupport (line 102) | func (km *hmacKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 107) | func (km *hmacKeyManager) TypeURL() string { method KeyMaterialType (line 112) | func (km *hmacKeyManager) KeyMaterialType() tinkpb.KeyData_KeyMaterial... method DeriveKey (line 117) | func (km *hmacKeyManager) DeriveKey(serializedKeyFormat []byte, pseudo... method validateKey (line 145) | func (km *hmacKeyManager) validateKey(key *hmacpb.HmacKey) error { method validateKeyFormat (line 156) | func (km *hmacKeyManager) validateKeyFormat(format *hmacpb.HmacKeyForm... FILE: go/mac/hmac_key_manager_test.go function TestGetPrimitiveWorks (line 36) | func TestGetPrimitiveWorks(t *testing.T) { function TestGetPrimitiveWithInvalidInput (line 126) | func TestGetPrimitiveWithInvalidInput(t *testing.T) { function TestNewKeyMultipleTimes (line 151) | func TestNewKeyMultipleTimes(t *testing.T) { function TestNewKeyBasic (line 185) | func TestNewKeyBasic(t *testing.T) { function TestNewKeyWithInvalidInput (line 213) | func TestNewKeyWithInvalidInput(t *testing.T) { function TestNewKeyDataWorks (line 238) | func TestNewKeyDataWorks(t *testing.T) { function TestNewKeyDataWithInvalidInput (line 280) | func TestNewKeyDataWithInvalidInput(t *testing.T) { function TestDoesSupport (line 302) | func TestDoesSupport(t *testing.T) { function TestTypeURL (line 315) | func TestTypeURL(t *testing.T) { function TestHMACKeyMaterialType (line 325) | func TestHMACKeyMaterialType(t *testing.T) { function TestHMACDeriveKey (line 339) | func TestHMACDeriveKey(t *testing.T) { function TestHMACDeriveKeyFailsWithInvalidKeyFormats (line 375) | func TestHMACDeriveKeyFailsWithInvalidKeyFormats(t *testing.T) { function TestHMACDeriveKeyFailsWithMalformedKeyFormats (line 458) | func TestHMACDeriveKeyFailsWithMalformedKeyFormats(t *testing.T) { function TestHMACDeriveKeyFailsWithInsufficientRandomness (line 499) | func TestHMACDeriveKeyFailsWithInsufficientRandomness(t *testing.T) { function genInvalidHMACKeys (line 533) | func genInvalidHMACKeys() []proto.Message { function genInvalidHMACKeyFormats (line 560) | func genInvalidHMACKeyFormats() []proto.Message { function genValidHMACKeyFormats (line 583) | func genValidHMACKeyFormats() []*hmacpb.HmacKeyFormat { FILE: go/mac/internal/mactest/mactest.go type AlwaysFailingMAC (line 23) | type AlwaysFailingMAC struct method ComputeMAC (line 30) | func (m *AlwaysFailingMAC) ComputeMAC(data []byte) ([]byte, error) { method VerifyMAC (line 35) | func (m *AlwaysFailingMAC) VerifyMAC(mac []byte, data []byte) error { FILE: go/mac/internal/mactest/mactest_test.go function TestAlwaysFailingMACAlwayFails (line 24) | func TestAlwaysFailingMACAlwayFails(t *testing.T) { FILE: go/mac/mac.go function init (line 29) | func init() { FILE: go/mac/mac_benchmark_test.go function BenchmarkComputeMac (line 62) | func BenchmarkComputeMac(b *testing.B) { function BenchmarkVerifyMac (line 87) | func BenchmarkVerifyMac(b *testing.B) { FILE: go/mac/mac_factory.go constant intSize (line 31) | intSize = 32 << (^uint(0) >> 63) constant maxInt (line 32) | maxInt = 1<<(intSize-1) - 1 function New (line 36) | func New(handle *keyset.Handle) (tink.MAC, error) { type wrappedMAC (line 46) | type wrappedMAC struct method ComputeMAC (line 106) | func (m *wrappedMAC) ComputeMAC(data []byte) ([]byte, error) { method VerifyMAC (line 141) | func (m *wrappedMAC) VerifyMAC(mac, data []byte) error { function newWrappedMAC (line 54) | func newWrappedMAC(ps *primitiveset.PrimitiveSet) (*wrappedMAC, error) { function createLoggers (line 76) | func createLoggers(ps *primitiveset.PrimitiveSet) (monitoring.Logger, mo... FILE: go/mac/mac_factory_test.go function TestFactoryMultipleKeys (line 47) | func TestFactoryMultipleKeys(t *testing.T) { function TestFactoryRawKey (line 113) | func TestFactoryRawKey(t *testing.T) { function TestFactoryLegacyKey (line 133) | func TestFactoryLegacyKey(t *testing.T) { function TestFactoryLegacyFixedKeyFixedTag (line 158) | func TestFactoryLegacyFixedKeyFixedTag(t *testing.T) { function verifyMacPrimitive (line 196) | func verifyMacPrimitive(computePrimitive, verifyPrimitive tink.MAC, expe... function TestFactoryWithInvalidPrimitiveSetType (line 233) | func TestFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestFactoryWithValidPrimitiveSetType (line 245) | func TestFactoryWithValidPrimitiveSetType(t *testing.T) { function TestPrimitiveFactoryMonitoringWithoutAnnotationsDoesNotLog (line 257) | func TestPrimitiveFactoryMonitoringWithoutAnnotationsDoesNotLog(t *testi... function TestFactoryWithMonitoringPrimitiveWithMultipleKeysLogsComputeVerify (line 285) | func TestFactoryWithMonitoringPrimitiveWithMultipleKeysLogsComputeVerify... function TestPrimitiveFactoryWithMonitoringAnnotationsComputeFailureIsLogged (line 395) | func TestPrimitiveFactoryWithMonitoringAnnotationsComputeFailureIsLogged... function TestPrimitiveFactoryWithMonitoringAnnotationsVerifyFailureIsLogged (line 467) | func TestPrimitiveFactoryWithMonitoringAnnotationsVerifyFailureIsLogged(... function TestPrimitiveFactoryMonitoringWithAnnotationsMultiplePrimitivesLogOperations (line 520) | func TestPrimitiveFactoryMonitoringWithAnnotationsMultiplePrimitivesLogO... function TestPrimitiveFactoryMonitoringWithAnnotationsComputeVerifyLogs (line 602) | func TestPrimitiveFactoryMonitoringWithAnnotationsComputeVerifyLogs(t *t... FILE: go/mac/mac_init_test.go function TestMacInit (line 24) | func TestMacInit(t *testing.T) { FILE: go/mac/mac_key_templates.go function HMACSHA256Tag128KeyTemplate (line 34) | func HMACSHA256Tag128KeyTemplate() *tinkpb.KeyTemplate { function HMACSHA256Tag256KeyTemplate (line 42) | func HMACSHA256Tag256KeyTemplate() *tinkpb.KeyTemplate { function HMACSHA512Tag256KeyTemplate (line 50) | func HMACSHA512Tag256KeyTemplate() *tinkpb.KeyTemplate { function HMACSHA512Tag512KeyTemplate (line 58) | func HMACSHA512Tag512KeyTemplate() *tinkpb.KeyTemplate { function AESCMACTag128KeyTemplate (line 65) | func AESCMACTag128KeyTemplate() *tinkpb.KeyTemplate { function createHMACKeyTemplate (line 70) | func createHMACKeyTemplate(keySize, tagSize uint32, hashType commonpb.Ha... function createCMACKeyTemplate (line 91) | func createCMACKeyTemplate(keySize uint32, tagSize uint32) *tinkpb.KeyTe... FILE: go/mac/mac_key_templates_test.go function TestKeyTemplates (line 25) | func TestKeyTemplates(t *testing.T) { FILE: go/mac/mac_test.go function Example (line 29) | func Example() { FILE: go/mac/subtle/cmac.go constant minCMACKeySizeInBytes (line 27) | minCMACKeySizeInBytes = 16 constant recommendedCMACKeySizeInBytes (line 28) | recommendedCMACKeySizeInBytes = uint32(32) constant minTagLengthInBytes (line 29) | minTagLengthInBytes = uint32(10) constant maxTagLengthInBytes (line 30) | maxTagLengthInBytes = uint32(16) type AESCMAC (line 34) | type AESCMAC struct method ComputeMAC (line 61) | func (a AESCMAC) ComputeMAC(data []byte) ([]byte, error) { method VerifyMAC (line 67) | func (a AESCMAC) VerifyMAC(mac, data []byte) error { function NewAESCMAC (line 40) | func NewAESCMAC(key []byte, tagLength uint32) (*AESCMAC, error) { function ValidateCMACParams (line 79) | func ValidateCMACParams(keySize, tagSize uint32) error { FILE: go/mac/subtle/cmac_test.go type AESCMACSuite (line 38) | type AESCMACSuite struct type testgroup (line 45) | type testgroup struct type testcase (line 52) | type testcase struct function TestVectorsWycheproof (line 61) | func TestVectorsWycheproof(t *testing.T) { function TestCMACBasic (line 120) | func TestCMACBasic(t *testing.T) { function TestNewCMACWithInvalidInput (line 144) | func TestNewCMACWithInvalidInput(t *testing.T) { function TestCMACComputeVerifyWithNilInput (line 162) | func TestCMACComputeVerifyWithNilInput(t *testing.T) { function TestCMACVerifyMACWithInvalidInput (line 176) | func TestCMACVerifyMACWithInvalidInput(t *testing.T) { function TestCMACModification (line 192) | func TestCMACModification(t *testing.T) { function TestCMACTruncation (line 216) | func TestCMACTruncation(t *testing.T) { function TestCMACSmallerTagSize (line 236) | func TestCMACSmallerTagSize(t *testing.T) { FILE: go/mac/subtle/hmac.go constant minKeySizeInBytes (line 29) | minKeySizeInBytes = uint32(16) constant minTagSizeInBytes (line 32) | minTagSizeInBytes = uint32(10) type HMAC (line 38) | type HMAC struct method ComputeMAC (line 82) | func (h *HMAC) ComputeMAC(data []byte) ([]byte, error) { method VerifyMAC (line 94) | func (h *HMAC) VerifyMAC(mac []byte, data []byte) error { function NewHMAC (line 45) | func NewHMAC(hashAlg string, key []byte, tagSize uint32) (*HMAC, error) { function ValidateHMACParams (line 62) | func ValidateHMACParams(hash string, keySize uint32, tagSize uint32) err... FILE: go/mac/subtle/hmac_test.go function TestHMACBasic (line 64) | func TestHMACBasic(t *testing.T) { function TestNewHMACWithInvalidInput (line 86) | func TestNewHMACWithInvalidInput(t *testing.T) { function TestHMACWithNilHashFunc (line 117) | func TestHMACWithNilHashFunc(t *testing.T) { function TestHMAComputeVerifyWithNilInput (line 131) | func TestHMAComputeVerifyWithNilInput(t *testing.T) { function TestVerifyMACWithInvalidInput (line 145) | func TestVerifyMACWithInvalidInput(t *testing.T) { function TestHMACModification (line 161) | func TestHMACModification(t *testing.T) { function TestHMACTruncation (line 187) | func TestHMACTruncation(t *testing.T) { FILE: go/monitoring/monitoring.go type KeyStatus (line 20) | type KeyStatus method String (line 34) | func (status KeyStatus) String() string { constant Enabled (line 24) | Enabled KeyStatus = iota constant Disabled (line 26) | Disabled constant Destroyed (line 28) | Destroyed constant DoNotUse (line 31) | DoNotUse KeyStatus = 20 type Entry (line 47) | type Entry struct type KeysetInfo (line 56) | type KeysetInfo struct function NewKeysetInfo (line 63) | func NewKeysetInfo(annotations map[string]string, primaryKeyID uint32, e... type Context (line 73) | type Context struct function NewContext (line 80) | func NewContext(primitive string, apiFunction string, keysetInfo *Keyset... type Logger (line 91) | type Logger interface type Client (line 111) | type Client interface FILE: go/prf/aes_cmac_prf_key_manager.go constant aescmacprfKeyVersion (line 30) | aescmacprfKeyVersion = 0 constant aescmacprfTypeURL (line 31) | aescmacprfTypeURL = "type.googleapis.com/google.crypto.tink.AesCmacPr... type aescmacprfKeyManager (line 38) | type aescmacprfKeyManager struct method Primitive (line 41) | func (km *aescmacprfKeyManager) Primitive(serializedKey []byte) (any, ... method NewKey (line 56) | func (km *aescmacprfKeyManager) NewKey(serializedKeyFormat []byte) (pr... method NewKeyData (line 76) | func (km *aescmacprfKeyManager) NewKeyData(serializedKeyFormat []byte)... method DoesSupport (line 94) | func (km *aescmacprfKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 99) | func (km *aescmacprfKeyManager) TypeURL() string { method validateKey (line 105) | func (km *aescmacprfKeyManager) validateKey(key *cmacpb.AesCmacPrfKey)... method validateKeyFormat (line 115) | func (km *aescmacprfKeyManager) validateKeyFormat(format *cmacpb.AesCm... FILE: go/prf/aes_cmac_prf_key_manager_test.go function TestGetPrimitiveCMACBasic (line 33) | func TestGetPrimitiveCMACBasic(t *testing.T) { function TestGetPrimitiveCMACWithInvalidInput (line 54) | func TestGetPrimitiveCMACWithInvalidInput(t *testing.T) { function TestNewKeyCMACMultipleTimes (line 79) | func TestNewKeyCMACMultipleTimes(t *testing.T) { function TestNewKeyCMACBasic (line 113) | func TestNewKeyCMACBasic(t *testing.T) { function TestNewKeyCMACWithInvalidInput (line 134) | func TestNewKeyCMACWithInvalidInput(t *testing.T) { function TestNewKeyDataCMACBasic (line 159) | func TestNewKeyDataCMACBasic(t *testing.T) { function TestNewKeyDataCMACWithInvalidInput (line 190) | func TestNewKeyDataCMACWithInvalidInput(t *testing.T) { function TestCMACDoesSupport (line 212) | func TestCMACDoesSupport(t *testing.T) { function TestCMACTypeURL (line 225) | func TestCMACTypeURL(t *testing.T) { function genInvalidCMACKeys (line 235) | func genInvalidCMACKeys() []proto.Message { function genInvalidCMACKeyFormats (line 250) | func genInvalidCMACKeyFormats() []proto.Message { function genValidCMACKeyFormats (line 261) | func genValidCMACKeyFormats() []*cmacpb.AesCmacPrfKeyFormat { function genValidCMACKeys (line 267) | func genValidCMACKeys() []*cmacpb.AesCmacPrfKey { function validateCMACKey (line 274) | func validateCMACKey(format *cmacpb.AesCmacPrfKeyFormat, key *cmacpb.Aes... function validateCMACPrimitive (line 286) | func validateCMACPrimitive(p any, key *cmacpb.AesCmacPrfKey) error { FILE: go/prf/hkdf_prf_key_manager.go constant hkdfprfKeyVersion (line 33) | hkdfprfKeyVersion = 0 constant hkdfprfTypeURL (line 34) | hkdfprfTypeURL = "type.googleapis.com/google.crypto.tink.HkdfPrfKey" type hkdfprfKeyManager (line 41) | type hkdfprfKeyManager struct method Primitive (line 47) | func (km *hkdfprfKeyManager) Primitive(serializedKey []byte) (any, err... method NewKey (line 67) | func (km *hkdfprfKeyManager) NewKey(serializedKeyFormat []byte) (proto... method NewKeyData (line 88) | func (km *hkdfprfKeyManager) NewKeyData(serializedKeyFormat []byte) (*... method DoesSupport (line 106) | func (km *hkdfprfKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 111) | func (km *hkdfprfKeyManager) TypeURL() string { method KeyMaterialType (line 116) | func (km *hkdfprfKeyManager) KeyMaterialType() tinkpb.KeyData_KeyMater... method DeriveKey (line 121) | func (km *hkdfprfKeyManager) DeriveKey(serializedKeyFormat []byte, pse... method validateKey (line 150) | func (km *hkdfprfKeyManager) validateKey(key *hkdfpb.HkdfPrfKey) error { method validateKeyFormat (line 160) | func (km *hkdfprfKeyManager) validateKeyFormat(format *hkdfpb.HkdfPrfK... FILE: go/prf/hkdf_prf_key_manager_test.go function TestGetPrimitiveHKDFBasic (line 36) | func TestGetPrimitiveHKDFBasic(t *testing.T) { function TestGetPrimitiveHKDFWithInvalidInput (line 57) | func TestGetPrimitiveHKDFWithInvalidInput(t *testing.T) { function TestNewKeyHKDFMultipleTimes (line 82) | func TestNewKeyHKDFMultipleTimes(t *testing.T) { function TestNewKeyHKDFBasic (line 116) | func TestNewKeyHKDFBasic(t *testing.T) { function TestNewKeyHKDFWithInvalidInput (line 137) | func TestNewKeyHKDFWithInvalidInput(t *testing.T) { function TestNewKeyDataHKDFBasic (line 162) | func TestNewKeyDataHKDFBasic(t *testing.T) { function TestNewKeyDataHKDFWithInvalidInput (line 193) | func TestNewKeyDataHKDFWithInvalidInput(t *testing.T) { function TestHKDFDoesSupport (line 215) | func TestHKDFDoesSupport(t *testing.T) { function TestHKDFTypeURL (line 228) | func TestHKDFTypeURL(t *testing.T) { function TestHKDFKeyMaterialType (line 238) | func TestHKDFKeyMaterialType(t *testing.T) { function TestHKDFDeriveKey (line 252) | func TestHKDFDeriveKey(t *testing.T) { function TestHKDFDeriveKeyFailsWithInvalidKeyFormats (line 315) | func TestHKDFDeriveKeyFailsWithInvalidKeyFormats(t *testing.T) { function TestHKDFDeriveKeyFailsWithMalformedSerializedKeyFormat (line 391) | func TestHKDFDeriveKeyFailsWithMalformedSerializedKeyFormat(t *testing.T) { function TestAESGCMDeriveKeyFailsWithInsufficientRandomness (line 416) | func TestAESGCMDeriveKeyFailsWithInsufficientRandomness(t *testing.T) { function genInvalidHKDFKeys (line 444) | func genInvalidHKDFKeys() []proto.Message { function genInvalidHKDFKeyFormats (line 467) | func genInvalidHKDFKeyFormats() []proto.Message { function genValidHKDFKeyFormats (line 486) | func genValidHKDFKeyFormats() []*hkdfpb.HkdfPrfKeyFormat { function genValidHKDFKeys (line 495) | func genValidHKDFKeys() []*hkdfpb.HkdfPrfKey { function validateHKDFKey (line 505) | func validateHKDFKey(format *hkdfpb.HkdfPrfKeyFormat, key *hkdfpb.HkdfPr... function validateHKDFPrimitive (line 518) | func validateHKDFPrimitive(p any, key *hkdfpb.HkdfPrfKey) error { FILE: go/prf/hmac_prf_key_manager.go constant hmacprfKeyVersion (line 32) | hmacprfKeyVersion = 0 constant hmacprfTypeURL (line 33) | hmacprfTypeURL = "type.googleapis.com/google.crypto.tink.HmacPrfKey" type hmacprfKeyManager (line 40) | type hmacprfKeyManager struct method Primitive (line 43) | func (km *hmacprfKeyManager) Primitive(serializedKey []byte) (any, err... method NewKey (line 63) | func (km *hmacprfKeyManager) NewKey(serializedKeyFormat []byte) (proto... method NewKeyData (line 83) | func (km *hmacprfKeyManager) NewKeyData(serializedKeyFormat []byte) (*... method DoesSupport (line 101) | func (km *hmacprfKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 106) | func (km *hmacprfKeyManager) TypeURL() string { method validateKey (line 112) | func (km *hmacprfKeyManager) validateKey(key *hmacpb.HmacPrfKey) error { method KeyMaterialType (line 122) | func (km *hmacprfKeyManager) KeyMaterialType() tinkpb.KeyData_KeyMater... method DeriveKey (line 127) | func (km *hmacprfKeyManager) DeriveKey(serializedKeyFormat []byte, pse... method validateKeyFormat (line 154) | func (km *hmacprfKeyManager) validateKeyFormat(format *hmacpb.HmacPrfK... FILE: go/prf/hmac_prf_key_manager_test.go function TestGetPrimitiveHMACBasic (line 36) | func TestGetPrimitiveHMACBasic(t *testing.T) { function TestGetPrimitiveHMACWithInvalidInput (line 57) | func TestGetPrimitiveHMACWithInvalidInput(t *testing.T) { function TestNewKeyHMACMultipleTimes (line 82) | func TestNewKeyHMACMultipleTimes(t *testing.T) { function TestNewKeyHMACBasic (line 116) | func TestNewKeyHMACBasic(t *testing.T) { function TestNewKeyHMACWithInvalidInput (line 137) | func TestNewKeyHMACWithInvalidInput(t *testing.T) { function TestNewKeyDataHMACBasic (line 162) | func TestNewKeyDataHMACBasic(t *testing.T) { function TestNewKeyDataHMACWithInvalidInput (line 193) | func TestNewKeyDataHMACWithInvalidInput(t *testing.T) { function TestHMACDoesSupport (line 215) | func TestHMACDoesSupport(t *testing.T) { function TestHMACTypeURL (line 228) | func TestHMACTypeURL(t *testing.T) { function TestHMACKeyMaterialType (line 238) | func TestHMACKeyMaterialType(t *testing.T) { function TestHMACDeriveKey (line 252) | func TestHMACDeriveKey(t *testing.T) { function TestHMACDeriveKeyFailsWithInvalidKeyFormats (line 285) | func TestHMACDeriveKeyFailsWithInvalidKeyFormats(t *testing.T) { function TestHMACDeriveKeyFailsWithMalformedKeyFormats (line 351) | func TestHMACDeriveKeyFailsWithMalformedKeyFormats(t *testing.T) { function TestHMACDeriveKeyFailsWithInsufficientRandomness (line 392) | func TestHMACDeriveKeyFailsWithInsufficientRandomness(t *testing.T) { function genInvalidHMACPRFKeys (line 423) | func genInvalidHMACPRFKeys() []proto.Message { function genInvalidHMACPRFKeyFormats (line 444) | func genInvalidHMACPRFKeyFormats() []proto.Message { function genValidHMACPRFKeyFormats (line 461) | func genValidHMACPRFKeyFormats() []*hmacpb.HmacPrfKeyFormat { function genValidHMACPRFKeys (line 469) | func genValidHMACPRFKeys() []*hmacpb.HmacPrfKey { function validateHMACPRFKey (line 478) | func validateHMACPRFKey(format *hmacpb.HmacPrfKeyFormat, key *hmacpb.Hma... function validateHMACPRFPrimitive (line 491) | func validateHMACPRFPrimitive(p any, key *hmacpb.HmacPrfKey) error { FILE: go/prf/prf_benchmark_test.go function BenchmarkComputePRF (line 28) | func BenchmarkComputePRF(b *testing.B) { FILE: go/prf/prf_key_templates.go function HMACSHA256PRFKeyTemplate (line 34) | func HMACSHA256PRFKeyTemplate() *tinkpb.KeyTemplate { function HMACSHA512PRFKeyTemplate (line 41) | func HMACSHA512PRFKeyTemplate() *tinkpb.KeyTemplate { function HKDFSHA256PRFKeyTemplate (line 49) | func HKDFSHA256PRFKeyTemplate() *tinkpb.KeyTemplate { function AESCMACPRFKeyTemplate (line 55) | func AESCMACPRFKeyTemplate() *tinkpb.KeyTemplate { function createHMACPRFKeyTemplate (line 60) | func createHMACPRFKeyTemplate(keySize uint32, hashType commonpb.HashType... function createHKDFPRFKeyTemplate (line 80) | func createHKDFPRFKeyTemplate(keySize uint32, hashType commonpb.HashType... function createAESCMACPRFKeyTemplate (line 101) | func createAESCMACPRFKeyTemplate(keySize uint32) *tinkpb.KeyTemplate { FILE: go/prf/prf_key_templates_test.go function TestKeyTemplates (line 26) | func TestKeyTemplates(t *testing.T) { FILE: go/prf/prf_set.go type PRF (line 47) | type PRF interface type monitoredPRF (line 65) | type monitoredPRF struct method ComputePRF (line 73) | func (w *monitoredPRF) ComputePRF(input []byte, outputLength uint32) (... type Set (line 88) | type Set struct method ComputePrimaryPRF (line 96) | func (s Set) ComputePrimaryPRF(input []byte, outputLength uint32) ([]b... function init (line 104) | func init() { FILE: go/prf/prf_set_factory.go function NewPRFSet (line 28) | func NewPRFSet(handle *keyset.Handle) (*Set, error) { function wrapPRFset (line 36) | func wrapPRFset(ps *primitiveset.PrimitiveSet) (*Set, error) { function createLogger (line 71) | func createLogger(ps *primitiveset.PrimitiveSet) (monitoring.Logger, err... FILE: go/prf/prf_set_factory_test.go constant maxAutocorrelation (line 37) | maxAutocorrelation = 100 function addKeyAndReturnID (line 40) | func addKeyAndReturnID(m *keyset.Manager, template *tinkpb.KeyTemplate) ... function TestFactoryBasic (line 52) | func TestFactoryBasic(t *testing.T) { function TestNonRawKeys (line 157) | func TestNonRawKeys(t *testing.T) { function TestNonPRFPrimitives (line 183) | func TestNonPRFPrimitives(t *testing.T) { function runZTests (line 209) | func runZTests(results [][]byte, t *testing.T) { function TestPrimitiveFactoryComputePRFWithoutAnnotationsDoesNothing (line 228) | func TestPrimitiveFactoryComputePRFWithoutAnnotationsDoesNothing(t *test... function TestPrimitiveFactoryMonitoringWithAnnotationsComputePRFFailureIsLogged (line 255) | func TestPrimitiveFactoryMonitoringWithAnnotationsComputePRFFailureIsLog... function TestPrimitiveFactoryIndividualPrfWithAnnotatonsLogsCompute (line 308) | func TestPrimitiveFactoryIndividualPrfWithAnnotatonsLogsCompute(t *testi... function TestPrimitiveFactoryWithMonitoringAnnotationsLogsComputePRF (line 401) | func TestPrimitiveFactoryWithMonitoringAnnotationsLogsComputePRF(t *test... FILE: go/prf/prf_test.go function Example (line 26) | func Example() { FILE: go/prf/subtle/aes_cmac.go constant mul (line 28) | mul = 0x87 constant pad (line 29) | pad = byte(0x80) constant recommendedKeySize (line 30) | recommendedKeySize = uint32(32) type AESCMACPRF (line 34) | type AESCMACPRF struct method ComputePRF (line 70) | func (a AESCMACPRF) ComputePRF(data []byte, outputLength uint32) ([]by... function NewAESCMACPRF (line 40) | func NewAESCMACPRF(key []byte) (*AESCMACPRF, error) { function ValidateAESCMACPRFParams (line 61) | func ValidateAESCMACPRFParams(keySize uint32) error { function mulByX (line 118) | func mulByX(block []byte) { FILE: go/prf/subtle/aes_cmac_test.go function TestVectorsRFC4493 (line 27) | func TestVectorsRFC4493(t *testing.T) { function TestAESCMACPRFWycheproofCases (line 58) | func TestAESCMACPRFWycheproofCases(t *testing.T) { function TestValidateAESCMACPRFParams (line 112) | func TestValidateAESCMACPRFParams(t *testing.T) { function TestKeyLength (line 121) | func TestKeyLength(t *testing.T) { function TestAESCMACPRFOutputLength (line 139) | func TestAESCMACPRFOutputLength(t *testing.T) { FILE: go/prf/subtle/hkdf.go constant minHKDFKeySizeInBytes (line 31) | minHKDFKeySizeInBytes = uint32(32) type HKDFPRF (line 35) | type HKDFPRF struct method ComputePRF (line 70) | func (h HKDFPRF) ComputePRF(data []byte, outputLength uint32) ([]byte,... function NewHKDFPRF (line 42) | func NewHKDFPRF(hashAlg string, key []byte, salt []byte) (*HKDFPRF, erro... function ValidateHKDFPRFParams (line 55) | func ValidateHKDFPRFParams(hash string, keySize uint32, salt []byte) err... FILE: go/prf/subtle/hkdf_test.go type rfc5869test (line 28) | type rfc5869test struct function TestVectorsRFC5869 (line 37) | func TestVectorsRFC5869(t *testing.T) { function TestHKDFPRFWycheproofCases (line 124) | func TestHKDFPRFWycheproofCases(t *testing.T) { function TestHKDFPRFHash (line 175) | func TestHKDFPRFHash(t *testing.T) { function TestHKDFPRFSalt (line 198) | func TestHKDFPRFSalt(t *testing.T) { function TestHKDFPRFOutputLength (line 216) | func TestHKDFPRFOutputLength(t *testing.T) { function TestValidateHKDFPRFParams (line 244) | func TestValidateHKDFPRFParams(t *testing.T) { FILE: go/prf/subtle/hmac.go constant minHMACKeySizeInBytes (line 26) | minHMACKeySizeInBytes = uint32(16) type HMACPRF (line 30) | type HMACPRF struct method ComputePRF (line 60) | func (h HMACPRF) ComputePRF(data []byte, outputLength uint32) ([]byte,... function NewHMACPRF (line 36) | func NewHMACPRF(hashAlg string, key []byte) (*HMACPRF, error) { function ValidateHMACPRFParams (line 48) | func ValidateHMACPRFParams(hash string, keySize uint32) error { FILE: go/prf/subtle/hmac_test.go type rfc4868test (line 28) | type rfc4868test struct function TestVectorsRFC4868 (line 34) | func TestVectorsRFC4868(t *testing.T) { function TestHMACPRFWycheproofCases (line 111) | func TestHMACPRFWycheproofCases(t *testing.T) { function TestHMACPRFHash (line 164) | func TestHMACPRFHash(t *testing.T) { function TestHMACPRFOutputLength (line 187) | func TestHMACPRFOutputLength(t *testing.T) { function TestValidateHMACPRFParams (line 215) | func TestValidateHMACPRFParams(t *testing.T) { FILE: go/prf/subtle/subtle_test.go type macSuite (line 19) | type macSuite struct type macGroup (line 24) | type macGroup struct type macCase (line 32) | type macCase struct type hkdfSuite (line 39) | type hkdfSuite struct type hkdfGroup (line 44) | type hkdfGroup struct type hkdfCase (line 51) | type hkdfCase struct FILE: go/proto/aes_cmac_go_proto/aes_cmac.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesCmacParams (line 39) | type AesCmacParams struct method Reset (line 47) | func (x *AesCmacParams) Reset() { method String (line 56) | func (x *AesCmacParams) String() string { method ProtoMessage (line 60) | func (*AesCmacParams) ProtoMessage() {} method ProtoReflect (line 62) | func (x *AesCmacParams) ProtoReflect() protoreflect.Message { method Descriptor (line 75) | func (*AesCmacParams) Descriptor() ([]byte, []int) { method GetTagSize (line 79) | func (x *AesCmacParams) GetTagSize() uint32 { type AesCmacKey (line 87) | type AesCmacKey struct method Reset (line 97) | func (x *AesCmacKey) Reset() { method String (line 106) | func (x *AesCmacKey) String() string { method ProtoMessage (line 110) | func (*AesCmacKey) ProtoMessage() {} method ProtoReflect (line 112) | func (x *AesCmacKey) ProtoReflect() protoreflect.Message { method Descriptor (line 125) | func (*AesCmacKey) Descriptor() ([]byte, []int) { method GetVersion (line 129) | func (x *AesCmacKey) GetVersion() uint32 { method GetKeyValue (line 136) | func (x *AesCmacKey) GetKeyValue() []byte { method GetParams (line 143) | func (x *AesCmacKey) GetParams() *AesCmacParams { type AesCmacKeyFormat (line 150) | type AesCmacKeyFormat struct method Reset (line 159) | func (x *AesCmacKeyFormat) Reset() { method String (line 168) | func (x *AesCmacKeyFormat) String() string { method ProtoMessage (line 172) | func (*AesCmacKeyFormat) ProtoMessage() {} method ProtoReflect (line 174) | func (x *AesCmacKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 187) | func (*AesCmacKeyFormat) Descriptor() ([]byte, []int) { method GetKeySize (line 191) | func (x *AesCmacKeyFormat) GetKeySize() uint32 { method GetParams (line 198) | func (x *AesCmacKeyFormat) GetParams() *AesCmacParams { function file_third_party_tink_proto_aes_cmac_proto_rawDescGZIP (line 242) | func file_third_party_tink_proto_aes_cmac_proto_rawDescGZIP() []byte { function init (line 265) | func init() { file_third_party_tink_proto_aes_cmac_proto_init() } function file_third_party_tink_proto_aes_cmac_proto_init (line 266) | func file_third_party_tink_proto_aes_cmac_proto_init() { FILE: go/proto/aes_cmac_prf_go_proto/aes_cmac_prf.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesCmacPrfKey (line 40) | type AesCmacPrfKey struct method Reset (line 49) | func (x *AesCmacPrfKey) Reset() { method String (line 58) | func (x *AesCmacPrfKey) String() string { method ProtoMessage (line 62) | func (*AesCmacPrfKey) ProtoMessage() {} method ProtoReflect (line 64) | func (x *AesCmacPrfKey) ProtoReflect() protoreflect.Message { method Descriptor (line 77) | func (*AesCmacPrfKey) Descriptor() ([]byte, []int) { method GetVersion (line 81) | func (x *AesCmacPrfKey) GetVersion() uint32 { method GetKeyValue (line 88) | func (x *AesCmacPrfKey) GetKeyValue() []byte { type AesCmacPrfKeyFormat (line 95) | type AesCmacPrfKeyFormat struct method Reset (line 104) | func (x *AesCmacPrfKeyFormat) Reset() { method String (line 113) | func (x *AesCmacPrfKeyFormat) String() string { method ProtoMessage (line 117) | func (*AesCmacPrfKeyFormat) ProtoMessage() {} method ProtoReflect (line 119) | func (x *AesCmacPrfKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 132) | func (*AesCmacPrfKeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 136) | func (x *AesCmacPrfKeyFormat) GetVersion() uint32 { method GetKeySize (line 143) | func (x *AesCmacPrfKeyFormat) GetKeySize() uint32 { function file_third_party_tink_proto_aes_cmac_prf_proto_rawDescGZIP (line 180) | func file_third_party_tink_proto_aes_cmac_prf_proto_rawDescGZIP() []byte { function init (line 200) | func init() { file_third_party_tink_proto_aes_cmac_prf_proto_init() } function file_third_party_tink_proto_aes_cmac_prf_proto_init (line 201) | func file_third_party_tink_proto_aes_cmac_prf_proto_init() { FILE: go/proto/aes_ctr_go_proto/aes_ctr.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesCtrParams (line 39) | type AesCtrParams struct method Reset (line 47) | func (x *AesCtrParams) Reset() { method String (line 56) | func (x *AesCtrParams) String() string { method ProtoMessage (line 60) | func (*AesCtrParams) ProtoMessage() {} method ProtoReflect (line 62) | func (x *AesCtrParams) ProtoReflect() protoreflect.Message { method Descriptor (line 75) | func (*AesCtrParams) Descriptor() ([]byte, []int) { method GetIvSize (line 79) | func (x *AesCtrParams) GetIvSize() uint32 { type AesCtrKeyFormat (line 86) | type AesCtrKeyFormat struct method Reset (line 95) | func (x *AesCtrKeyFormat) Reset() { method String (line 104) | func (x *AesCtrKeyFormat) String() string { method ProtoMessage (line 108) | func (*AesCtrKeyFormat) ProtoMessage() {} method ProtoReflect (line 110) | func (x *AesCtrKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 123) | func (*AesCtrKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 127) | func (x *AesCtrKeyFormat) GetParams() *AesCtrParams { method GetKeySize (line 134) | func (x *AesCtrKeyFormat) GetKeySize() uint32 { type AesCtrKey (line 142) | type AesCtrKey struct method Reset (line 152) | func (x *AesCtrKey) Reset() { method String (line 161) | func (x *AesCtrKey) String() string { method ProtoMessage (line 165) | func (*AesCtrKey) ProtoMessage() {} method ProtoReflect (line 167) | func (x *AesCtrKey) ProtoReflect() protoreflect.Message { method Descriptor (line 180) | func (*AesCtrKey) Descriptor() ([]byte, []int) { method GetVersion (line 184) | func (x *AesCtrKey) GetVersion() uint32 { method GetParams (line 191) | func (x *AesCtrKey) GetParams() *AesCtrParams { method GetKeyValue (line 198) | func (x *AesCtrKey) GetKeyValue() []byte { function file_third_party_tink_proto_aes_ctr_proto_rawDescGZIP (line 242) | func file_third_party_tink_proto_aes_ctr_proto_rawDescGZIP() []byte { function init (line 265) | func init() { file_third_party_tink_proto_aes_ctr_proto_init() } function file_third_party_tink_proto_aes_ctr_proto_init (line 266) | func file_third_party_tink_proto_aes_ctr_proto_init() { FILE: go/proto/aes_ctr_hmac_aead_go_proto/aes_ctr_hmac_aead.pb.go constant _ (line 36) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 38) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesCtrHmacAeadKeyFormat (line 41) | type AesCtrHmacAeadKeyFormat struct method Reset (line 50) | func (x *AesCtrHmacAeadKeyFormat) Reset() { method String (line 59) | func (x *AesCtrHmacAeadKeyFormat) String() string { method ProtoMessage (line 63) | func (*AesCtrHmacAeadKeyFormat) ProtoMessage() {} method ProtoReflect (line 65) | func (x *AesCtrHmacAeadKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 78) | func (*AesCtrHmacAeadKeyFormat) Descriptor() ([]byte, []int) { method GetAesCtrKeyFormat (line 82) | func (x *AesCtrHmacAeadKeyFormat) GetAesCtrKeyFormat() *aes_ctr_go_pro... method GetHmacKeyFormat (line 89) | func (x *AesCtrHmacAeadKeyFormat) GetHmacKeyFormat() *hmac_go_proto.Hm... type AesCtrHmacAeadKey (line 97) | type AesCtrHmacAeadKey struct method Reset (line 107) | func (x *AesCtrHmacAeadKey) Reset() { method String (line 116) | func (x *AesCtrHmacAeadKey) String() string { method ProtoMessage (line 120) | func (*AesCtrHmacAeadKey) ProtoMessage() {} method ProtoReflect (line 122) | func (x *AesCtrHmacAeadKey) ProtoReflect() protoreflect.Message { method Descriptor (line 135) | func (*AesCtrHmacAeadKey) Descriptor() ([]byte, []int) { method GetVersion (line 139) | func (x *AesCtrHmacAeadKey) GetVersion() uint32 { method GetAesCtrKey (line 146) | func (x *AesCtrHmacAeadKey) GetAesCtrKey() *aes_ctr_go_proto.AesCtrKey { method GetHmacKey (line 153) | func (x *AesCtrHmacAeadKey) GetHmacKey() *hmac_go_proto.HmacKey { function file_third_party_tink_proto_aes_ctr_hmac_aead_proto_rawDescGZIP (line 208) | func file_third_party_tink_proto_aes_ctr_hmac_aead_proto_rawDescGZIP() [... function init (line 236) | func init() { file_third_party_tink_proto_aes_ctr_hmac_aead_proto_init() } function file_third_party_tink_proto_aes_ctr_hmac_aead_proto_init (line 237) | func file_third_party_tink_proto_aes_ctr_hmac_aead_proto_init() { FILE: go/proto/aes_ctr_hmac_streaming_go_proto/aes_ctr_hmac_streaming.pb.go constant _ (line 36) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 38) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesCtrHmacStreamingParams (line 41) | type AesCtrHmacStreamingParams struct method Reset (line 52) | func (x *AesCtrHmacStreamingParams) Reset() { method String (line 61) | func (x *AesCtrHmacStreamingParams) String() string { method ProtoMessage (line 65) | func (*AesCtrHmacStreamingParams) ProtoMessage() {} method ProtoReflect (line 67) | func (x *AesCtrHmacStreamingParams) ProtoReflect() protoreflect.Message { method Descriptor (line 80) | func (*AesCtrHmacStreamingParams) Descriptor() ([]byte, []int) { method GetCiphertextSegmentSize (line 84) | func (x *AesCtrHmacStreamingParams) GetCiphertextSegmentSize() uint32 { method GetDerivedKeySize (line 91) | func (x *AesCtrHmacStreamingParams) GetDerivedKeySize() uint32 { method GetHkdfHashType (line 98) | func (x *AesCtrHmacStreamingParams) GetHkdfHashType() common_go_proto.... method GetHmacParams (line 105) | func (x *AesCtrHmacStreamingParams) GetHmacParams() *hmac_go_proto.Hma... type AesCtrHmacStreamingKeyFormat (line 112) | type AesCtrHmacStreamingKeyFormat struct method Reset (line 122) | func (x *AesCtrHmacStreamingKeyFormat) Reset() { method String (line 131) | func (x *AesCtrHmacStreamingKeyFormat) String() string { method ProtoMessage (line 135) | func (*AesCtrHmacStreamingKeyFormat) ProtoMessage() {} method ProtoReflect (line 137) | func (x *AesCtrHmacStreamingKeyFormat) ProtoReflect() protoreflect.Mes... method Descriptor (line 150) | func (*AesCtrHmacStreamingKeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 154) | func (x *AesCtrHmacStreamingKeyFormat) GetVersion() uint32 { method GetParams (line 161) | func (x *AesCtrHmacStreamingKeyFormat) GetParams() *AesCtrHmacStreamin... method GetKeySize (line 168) | func (x *AesCtrHmacStreamingKeyFormat) GetKeySize() uint32 { type AesCtrHmacStreamingKey (line 176) | type AesCtrHmacStreamingKey struct method Reset (line 186) | func (x *AesCtrHmacStreamingKey) Reset() { method String (line 195) | func (x *AesCtrHmacStreamingKey) String() string { method ProtoMessage (line 199) | func (*AesCtrHmacStreamingKey) ProtoMessage() {} method ProtoReflect (line 201) | func (x *AesCtrHmacStreamingKey) ProtoReflect() protoreflect.Message { method Descriptor (line 214) | func (*AesCtrHmacStreamingKey) Descriptor() ([]byte, []int) { method GetVersion (line 218) | func (x *AesCtrHmacStreamingKey) GetVersion() uint32 { method GetParams (line 225) | func (x *AesCtrHmacStreamingKey) GetParams() *AesCtrHmacStreamingParams { method GetKeyValue (line 232) | func (x *AesCtrHmacStreamingKey) GetKeyValue() []byte { function file_third_party_tink_proto_aes_ctr_hmac_streaming_proto_rawDescGZIP (line 301) | func file_third_party_tink_proto_aes_ctr_hmac_streaming_proto_rawDescGZI... function init (line 328) | func init() { file_third_party_tink_proto_aes_ctr_hmac_streaming_proto_i... function file_third_party_tink_proto_aes_ctr_hmac_streaming_proto_init (line 329) | func file_third_party_tink_proto_aes_ctr_hmac_streaming_proto_init() { FILE: go/proto/aes_gcm_go_proto/aes_gcm.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesGcmKeyFormat (line 39) | type AesGcmKeyFormat struct method Reset (line 48) | func (x *AesGcmKeyFormat) Reset() { method String (line 57) | func (x *AesGcmKeyFormat) String() string { method ProtoMessage (line 61) | func (*AesGcmKeyFormat) ProtoMessage() {} method ProtoReflect (line 63) | func (x *AesGcmKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 76) | func (*AesGcmKeyFormat) Descriptor() ([]byte, []int) { method GetKeySize (line 80) | func (x *AesGcmKeyFormat) GetKeySize() uint32 { method GetVersion (line 87) | func (x *AesGcmKeyFormat) GetVersion() uint32 { type AesGcmKey (line 94) | type AesGcmKey struct method Reset (line 103) | func (x *AesGcmKey) Reset() { method String (line 112) | func (x *AesGcmKey) String() string { method ProtoMessage (line 116) | func (*AesGcmKey) ProtoMessage() {} method ProtoReflect (line 118) | func (x *AesGcmKey) ProtoReflect() protoreflect.Message { method Descriptor (line 131) | func (*AesGcmKey) Descriptor() ([]byte, []int) { method GetVersion (line 135) | func (x *AesGcmKey) GetVersion() uint32 { method GetKeyValue (line 142) | func (x *AesGcmKey) GetKeyValue() []byte { function file_third_party_tink_proto_aes_gcm_proto_rawDescGZIP (line 178) | func file_third_party_tink_proto_aes_gcm_proto_rawDescGZIP() []byte { function init (line 198) | func init() { file_third_party_tink_proto_aes_gcm_proto_init() } function file_third_party_tink_proto_aes_gcm_proto_init (line 199) | func file_third_party_tink_proto_aes_gcm_proto_init() { FILE: go/proto/aes_gcm_hkdf_streaming_go_proto/aes_gcm_hkdf_streaming.pb.go constant _ (line 38) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 40) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesGcmHkdfStreamingParams (line 43) | type AesGcmHkdfStreamingParams struct method Reset (line 53) | func (x *AesGcmHkdfStreamingParams) Reset() { method String (line 62) | func (x *AesGcmHkdfStreamingParams) String() string { method ProtoMessage (line 66) | func (*AesGcmHkdfStreamingParams) ProtoMessage() {} method ProtoReflect (line 68) | func (x *AesGcmHkdfStreamingParams) ProtoReflect() protoreflect.Message { method Descriptor (line 81) | func (*AesGcmHkdfStreamingParams) Descriptor() ([]byte, []int) { method GetCiphertextSegmentSize (line 85) | func (x *AesGcmHkdfStreamingParams) GetCiphertextSegmentSize() uint32 { method GetDerivedKeySize (line 92) | func (x *AesGcmHkdfStreamingParams) GetDerivedKeySize() uint32 { method GetHkdfHashType (line 99) | func (x *AesGcmHkdfStreamingParams) GetHkdfHashType() common_go_proto.... type AesGcmHkdfStreamingKeyFormat (line 106) | type AesGcmHkdfStreamingKeyFormat struct method Reset (line 116) | func (x *AesGcmHkdfStreamingKeyFormat) Reset() { method String (line 125) | func (x *AesGcmHkdfStreamingKeyFormat) String() string { method ProtoMessage (line 129) | func (*AesGcmHkdfStreamingKeyFormat) ProtoMessage() {} method ProtoReflect (line 131) | func (x *AesGcmHkdfStreamingKeyFormat) ProtoReflect() protoreflect.Mes... method Descriptor (line 144) | func (*AesGcmHkdfStreamingKeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 148) | func (x *AesGcmHkdfStreamingKeyFormat) GetVersion() uint32 { method GetParams (line 155) | func (x *AesGcmHkdfStreamingKeyFormat) GetParams() *AesGcmHkdfStreamin... method GetKeySize (line 162) | func (x *AesGcmHkdfStreamingKeyFormat) GetKeySize() uint32 { type AesGcmHkdfStreamingKey (line 170) | type AesGcmHkdfStreamingKey struct method Reset (line 180) | func (x *AesGcmHkdfStreamingKey) Reset() { method String (line 189) | func (x *AesGcmHkdfStreamingKey) String() string { method ProtoMessage (line 193) | func (*AesGcmHkdfStreamingKey) ProtoMessage() {} method ProtoReflect (line 195) | func (x *AesGcmHkdfStreamingKey) ProtoReflect() protoreflect.Message { method Descriptor (line 208) | func (*AesGcmHkdfStreamingKey) Descriptor() ([]byte, []int) { method GetVersion (line 212) | func (x *AesGcmHkdfStreamingKey) GetVersion() uint32 { method GetParams (line 219) | func (x *AesGcmHkdfStreamingKey) GetParams() *AesGcmHkdfStreamingParams { method GetKeyValue (line 226) | func (x *AesGcmHkdfStreamingKey) GetKeyValue() []byte { function file_third_party_tink_proto_aes_gcm_hkdf_streaming_proto_rawDescGZIP (line 289) | func file_third_party_tink_proto_aes_gcm_hkdf_streaming_proto_rawDescGZI... function init (line 314) | func init() { file_third_party_tink_proto_aes_gcm_hkdf_streaming_proto_i... function file_third_party_tink_proto_aes_gcm_hkdf_streaming_proto_init (line 315) | func file_third_party_tink_proto_aes_gcm_hkdf_streaming_proto_init() { FILE: go/proto/aes_gcm_siv_go_proto/aes_gcm_siv.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesGcmSivKeyFormat (line 41) | type AesGcmSivKeyFormat struct method Reset (line 50) | func (x *AesGcmSivKeyFormat) Reset() { method String (line 59) | func (x *AesGcmSivKeyFormat) String() string { method ProtoMessage (line 63) | func (*AesGcmSivKeyFormat) ProtoMessage() {} method ProtoReflect (line 65) | func (x *AesGcmSivKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 78) | func (*AesGcmSivKeyFormat) Descriptor() ([]byte, []int) { method GetKeySize (line 82) | func (x *AesGcmSivKeyFormat) GetKeySize() uint32 { method GetVersion (line 89) | func (x *AesGcmSivKeyFormat) GetVersion() uint32 { type AesGcmSivKey (line 97) | type AesGcmSivKey struct method Reset (line 106) | func (x *AesGcmSivKey) Reset() { method String (line 115) | func (x *AesGcmSivKey) String() string { method ProtoMessage (line 119) | func (*AesGcmSivKey) ProtoMessage() {} method ProtoReflect (line 121) | func (x *AesGcmSivKey) ProtoReflect() protoreflect.Message { method Descriptor (line 134) | func (*AesGcmSivKey) Descriptor() ([]byte, []int) { method GetVersion (line 138) | func (x *AesGcmSivKey) GetVersion() uint32 { method GetKeyValue (line 145) | func (x *AesGcmSivKey) GetKeyValue() []byte { function file_third_party_tink_proto_aes_gcm_siv_proto_rawDescGZIP (line 181) | func file_third_party_tink_proto_aes_gcm_siv_proto_rawDescGZIP() []byte { function init (line 201) | func init() { file_third_party_tink_proto_aes_gcm_siv_proto_init() } function file_third_party_tink_proto_aes_gcm_siv_proto_init (line 202) | func file_third_party_tink_proto_aes_gcm_siv_proto_init() { FILE: go/proto/aes_siv_go_proto/aes_siv.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type AesSivKeyFormat (line 39) | type AesSivKeyFormat struct method Reset (line 49) | func (x *AesSivKeyFormat) Reset() { method String (line 58) | func (x *AesSivKeyFormat) String() string { method ProtoMessage (line 62) | func (*AesSivKeyFormat) ProtoMessage() {} method ProtoReflect (line 64) | func (x *AesSivKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 77) | func (*AesSivKeyFormat) Descriptor() ([]byte, []int) { method GetKeySize (line 81) | func (x *AesSivKeyFormat) GetKeySize() uint32 { method GetVersion (line 88) | func (x *AesSivKeyFormat) GetVersion() uint32 { type AesSivKey (line 96) | type AesSivKey struct method Reset (line 106) | func (x *AesSivKey) Reset() { method String (line 115) | func (x *AesSivKey) String() string { method ProtoMessage (line 119) | func (*AesSivKey) ProtoMessage() {} method ProtoReflect (line 121) | func (x *AesSivKey) ProtoReflect() protoreflect.Message { method Descriptor (line 134) | func (*AesSivKey) Descriptor() ([]byte, []int) { method GetVersion (line 138) | func (x *AesSivKey) GetVersion() uint32 { method GetKeyValue (line 145) | func (x *AesSivKey) GetKeyValue() []byte { function file_third_party_tink_proto_aes_siv_proto_rawDescGZIP (line 181) | func file_third_party_tink_proto_aes_siv_proto_rawDescGZIP() []byte { function init (line 201) | func init() { file_third_party_tink_proto_aes_siv_proto_init() } function file_third_party_tink_proto_aes_siv_proto_init (line 202) | func file_third_party_tink_proto_aes_siv_proto_init() { FILE: go/proto/chacha20_poly1305_go_proto/chacha20_poly1305.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type ChaCha20Poly1305KeyFormat (line 39) | type ChaCha20Poly1305KeyFormat struct method Reset (line 45) | func (x *ChaCha20Poly1305KeyFormat) Reset() { method String (line 54) | func (x *ChaCha20Poly1305KeyFormat) String() string { method ProtoMessage (line 58) | func (*ChaCha20Poly1305KeyFormat) ProtoMessage() {} method ProtoReflect (line 60) | func (x *ChaCha20Poly1305KeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 73) | func (*ChaCha20Poly1305KeyFormat) Descriptor() ([]byte, []int) { type ChaCha20Poly1305Key (line 80) | type ChaCha20Poly1305Key struct method Reset (line 89) | func (x *ChaCha20Poly1305Key) Reset() { method String (line 98) | func (x *ChaCha20Poly1305Key) String() string { method ProtoMessage (line 102) | func (*ChaCha20Poly1305Key) ProtoMessage() {} method ProtoReflect (line 104) | func (x *ChaCha20Poly1305Key) ProtoReflect() protoreflect.Message { method Descriptor (line 117) | func (*ChaCha20Poly1305Key) Descriptor() ([]byte, []int) { method GetVersion (line 121) | func (x *ChaCha20Poly1305Key) GetVersion() uint32 { method GetKeyValue (line 128) | func (x *ChaCha20Poly1305Key) GetKeyValue() []byte { function file_third_party_tink_proto_chacha20_poly1305_proto_rawDescGZIP (line 163) | func file_third_party_tink_proto_chacha20_poly1305_proto_rawDescGZIP() [... function init (line 183) | func init() { file_third_party_tink_proto_chacha20_poly1305_proto_init() } function file_third_party_tink_proto_chacha20_poly1305_proto_init (line 184) | func file_third_party_tink_proto_chacha20_poly1305_proto_init() { FILE: go/proto/common_go_proto/common.pb.go constant _ (line 36) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 38) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type EllipticCurveType (line 41) | type EllipticCurveType method Enum (line 69) | func (x EllipticCurveType) Enum() *EllipticCurveType { method String (line 75) | func (x EllipticCurveType) String() string { method Descriptor (line 79) | func (EllipticCurveType) Descriptor() protoreflect.EnumDescriptor { method Type (line 83) | func (EllipticCurveType) Type() protoreflect.EnumType { method Number (line 87) | func (x EllipticCurveType) Number() protoreflect.EnumNumber { method EnumDescriptor (line 92) | func (EllipticCurveType) EnumDescriptor() ([]byte, []int) { constant EllipticCurveType_UNKNOWN_CURVE (line 44) | EllipticCurveType_UNKNOWN_CURVE EllipticCurveType = 0 constant EllipticCurveType_NIST_P256 (line 45) | EllipticCurveType_NIST_P256 EllipticCurveType = 2 constant EllipticCurveType_NIST_P384 (line 46) | EllipticCurveType_NIST_P384 EllipticCurveType = 3 constant EllipticCurveType_NIST_P521 (line 47) | EllipticCurveType_NIST_P521 EllipticCurveType = 4 constant EllipticCurveType_CURVE25519 (line 48) | EllipticCurveType_CURVE25519 EllipticCurveType = 5 type EcPointFormat (line 96) | type EcPointFormat method Enum (line 123) | func (x EcPointFormat) Enum() *EcPointFormat { method String (line 129) | func (x EcPointFormat) String() string { method Descriptor (line 133) | func (EcPointFormat) Descriptor() protoreflect.EnumDescriptor { method Type (line 137) | func (EcPointFormat) Type() protoreflect.EnumType { method Number (line 141) | func (x EcPointFormat) Number() protoreflect.EnumNumber { method EnumDescriptor (line 146) | func (EcPointFormat) EnumDescriptor() ([]byte, []int) { constant EcPointFormat_UNKNOWN_FORMAT (line 99) | EcPointFormat_UNKNOWN_FORMAT EcPointFormat = 0 constant EcPointFormat_UNCOMPRESSED (line 100) | EcPointFormat_UNCOMPRESSED EcPointFormat = 1 constant EcPointFormat_COMPRESSED (line 101) | EcPointFormat_COMPRESSED EcPointFormat = 2 constant EcPointFormat_DO_NOT_USE_CRUNCHY_UNCOMPRESSED (line 104) | EcPointFormat_DO_NOT_USE_CRUNCHY_UNCOMPRESSED EcPointFormat = 3 type HashType (line 150) | type HashType method Enum (line 182) | func (x HashType) Enum() *HashType { method String (line 188) | func (x HashType) String() string { method Descriptor (line 192) | func (HashType) Descriptor() protoreflect.EnumDescriptor { method Type (line 196) | func (HashType) Type() protoreflect.EnumType { method Number (line 200) | func (x HashType) Number() protoreflect.EnumNumber { method EnumDescriptor (line 205) | func (HashType) EnumDescriptor() ([]byte, []int) { constant HashType_UNKNOWN_HASH (line 153) | HashType_UNKNOWN_HASH HashType = 0 constant HashType_SHA1 (line 154) | HashType_SHA1 HashType = 1 constant HashType_SHA384 (line 156) | HashType_SHA384 HashType = 2 constant HashType_SHA256 (line 157) | HashType_SHA256 HashType = 3 constant HashType_SHA512 (line 158) | HashType_SHA512 HashType = 4 constant HashType_SHA224 (line 159) | HashType_SHA224 HashType = 5 function file_third_party_tink_proto_common_proto_rawDescGZIP (line 247) | func file_third_party_tink_proto_common_proto_rawDescGZIP() []byte { function init (line 268) | func init() { file_third_party_tink_proto_common_proto_init() } function file_third_party_tink_proto_common_proto_init (line 269) | func file_third_party_tink_proto_common_proto_init() { FILE: go/proto/ecdsa_go_proto/ecdsa.pb.go constant _ (line 37) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 39) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type EcdsaSignatureEncoding (line 42) | type EcdsaSignatureEncoding method Enum (line 74) | func (x EcdsaSignatureEncoding) Enum() *EcdsaSignatureEncoding { method String (line 80) | func (x EcdsaSignatureEncoding) String() string { method Descriptor (line 84) | func (EcdsaSignatureEncoding) Descriptor() protoreflect.EnumDescriptor { method Type (line 88) | func (EcdsaSignatureEncoding) Type() protoreflect.EnumType { method Number (line 92) | func (x EcdsaSignatureEncoding) Number() protoreflect.EnumNumber { method EnumDescriptor (line 97) | func (EcdsaSignatureEncoding) EnumDescriptor() ([]byte, []int) { constant EcdsaSignatureEncoding_UNKNOWN_ENCODING (line 45) | EcdsaSignatureEncoding_UNKNOWN_ENCODING EcdsaSignatureEncoding = 0 constant EcdsaSignatureEncoding_IEEE_P1363 (line 49) | EcdsaSignatureEncoding_IEEE_P1363 EcdsaSignatureEncoding = 1 constant EcdsaSignatureEncoding_DER (line 57) | EcdsaSignatureEncoding_DER EcdsaSignatureEncoding = 2 type EcdsaParams (line 102) | type EcdsaParams struct method Reset (line 115) | func (x *EcdsaParams) Reset() { method String (line 124) | func (x *EcdsaParams) String() string { method ProtoMessage (line 128) | func (*EcdsaParams) ProtoMessage() {} method ProtoReflect (line 130) | func (x *EcdsaParams) ProtoReflect() protoreflect.Message { method Descriptor (line 143) | func (*EcdsaParams) Descriptor() ([]byte, []int) { method GetHashType (line 147) | func (x *EcdsaParams) GetHashType() common_go_proto.HashType { method GetCurve (line 154) | func (x *EcdsaParams) GetCurve() common_go_proto.EllipticCurveType { method GetEncoding (line 161) | func (x *EcdsaParams) GetEncoding() EcdsaSignatureEncoding { type EcdsaPublicKey (line 169) | type EcdsaPublicKey struct method Reset (line 188) | func (x *EcdsaPublicKey) Reset() { method String (line 197) | func (x *EcdsaPublicKey) String() string { method ProtoMessage (line 201) | func (*EcdsaPublicKey) ProtoMessage() {} method ProtoReflect (line 203) | func (x *EcdsaPublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 216) | func (*EcdsaPublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 220) | func (x *EcdsaPublicKey) GetVersion() uint32 { method GetParams (line 227) | func (x *EcdsaPublicKey) GetParams() *EcdsaParams { method GetX (line 234) | func (x *EcdsaPublicKey) GetX() []byte { method GetY (line 241) | func (x *EcdsaPublicKey) GetY() []byte { type EcdsaPrivateKey (line 249) | type EcdsaPrivateKey struct method Reset (line 263) | func (x *EcdsaPrivateKey) Reset() { method String (line 272) | func (x *EcdsaPrivateKey) String() string { method ProtoMessage (line 276) | func (*EcdsaPrivateKey) ProtoMessage() {} method ProtoReflect (line 278) | func (x *EcdsaPrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 291) | func (*EcdsaPrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 295) | func (x *EcdsaPrivateKey) GetVersion() uint32 { method GetPublicKey (line 302) | func (x *EcdsaPrivateKey) GetPublicKey() *EcdsaPublicKey { method GetKeyValue (line 309) | func (x *EcdsaPrivateKey) GetKeyValue() []byte { type EcdsaKeyFormat (line 316) | type EcdsaKeyFormat struct method Reset (line 326) | func (x *EcdsaKeyFormat) Reset() { method String (line 335) | func (x *EcdsaKeyFormat) String() string { method ProtoMessage (line 339) | func (*EcdsaKeyFormat) ProtoMessage() {} method ProtoReflect (line 341) | func (x *EcdsaKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 354) | func (*EcdsaKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 358) | func (x *EcdsaKeyFormat) GetParams() *EcdsaParams { method GetVersion (line 365) | func (x *EcdsaKeyFormat) GetVersion() uint32 { function file_third_party_tink_proto_ecdsa_proto_rawDescGZIP (line 435) | func file_third_party_tink_proto_ecdsa_proto_rawDescGZIP() []byte { function init (line 467) | func init() { file_third_party_tink_proto_ecdsa_proto_init() } function file_third_party_tink_proto_ecdsa_proto_init (line 468) | func file_third_party_tink_proto_ecdsa_proto_init() { FILE: go/proto/ecies_aead_hkdf_go_proto/ecies_aead_hkdf.pb.go constant _ (line 38) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 40) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type EciesHkdfKemParams (line 44) | type EciesHkdfKemParams struct method Reset (line 57) | func (x *EciesHkdfKemParams) Reset() { method String (line 66) | func (x *EciesHkdfKemParams) String() string { method ProtoMessage (line 70) | func (*EciesHkdfKemParams) ProtoMessage() {} method ProtoReflect (line 72) | func (x *EciesHkdfKemParams) ProtoReflect() protoreflect.Message { method Descriptor (line 85) | func (*EciesHkdfKemParams) Descriptor() ([]byte, []int) { method GetCurveType (line 89) | func (x *EciesHkdfKemParams) GetCurveType() common_go_proto.EllipticCu... method GetHkdfHashType (line 96) | func (x *EciesHkdfKemParams) GetHkdfHashType() common_go_proto.HashType { method GetHkdfSalt (line 103) | func (x *EciesHkdfKemParams) GetHkdfSalt() []byte { type EciesAeadDemParams (line 111) | type EciesAeadDemParams struct method Reset (line 122) | func (x *EciesAeadDemParams) Reset() { method String (line 131) | func (x *EciesAeadDemParams) String() string { method ProtoMessage (line 135) | func (*EciesAeadDemParams) ProtoMessage() {} method ProtoReflect (line 137) | func (x *EciesAeadDemParams) ProtoReflect() protoreflect.Message { method Descriptor (line 150) | func (*EciesAeadDemParams) Descriptor() ([]byte, []int) { method GetAeadDem (line 154) | func (x *EciesAeadDemParams) GetAeadDem() *tink_go_proto.KeyTemplate { type EciesAeadHkdfParams (line 161) | type EciesAeadHkdfParams struct method Reset (line 177) | func (x *EciesAeadHkdfParams) Reset() { method String (line 186) | func (x *EciesAeadHkdfParams) String() string { method ProtoMessage (line 190) | func (*EciesAeadHkdfParams) ProtoMessage() {} method ProtoReflect (line 192) | func (x *EciesAeadHkdfParams) ProtoReflect() protoreflect.Message { method Descriptor (line 205) | func (*EciesAeadHkdfParams) Descriptor() ([]byte, []int) { method GetKemParams (line 209) | func (x *EciesAeadHkdfParams) GetKemParams() *EciesHkdfKemParams { method GetDemParams (line 216) | func (x *EciesAeadHkdfParams) GetDemParams() *EciesAeadDemParams { method GetEcPointFormat (line 223) | func (x *EciesAeadHkdfParams) GetEcPointFormat() common_go_proto.EcPoi... type EciesAeadHkdfPublicKey (line 232) | type EciesAeadHkdfPublicKey struct method Reset (line 249) | func (x *EciesAeadHkdfPublicKey) Reset() { method String (line 258) | func (x *EciesAeadHkdfPublicKey) String() string { method ProtoMessage (line 262) | func (*EciesAeadHkdfPublicKey) ProtoMessage() {} method ProtoReflect (line 264) | func (x *EciesAeadHkdfPublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 277) | func (*EciesAeadHkdfPublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 281) | func (x *EciesAeadHkdfPublicKey) GetVersion() uint32 { method GetParams (line 288) | func (x *EciesAeadHkdfPublicKey) GetParams() *EciesAeadHkdfParams { method GetX (line 295) | func (x *EciesAeadHkdfPublicKey) GetX() []byte { method GetY (line 302) | func (x *EciesAeadHkdfPublicKey) GetY() []byte { type EciesAeadHkdfPrivateKey (line 311) | type EciesAeadHkdfPrivateKey struct method Reset (line 324) | func (x *EciesAeadHkdfPrivateKey) Reset() { method String (line 333) | func (x *EciesAeadHkdfPrivateKey) String() string { method ProtoMessage (line 337) | func (*EciesAeadHkdfPrivateKey) ProtoMessage() {} method ProtoReflect (line 339) | func (x *EciesAeadHkdfPrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 352) | func (*EciesAeadHkdfPrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 356) | func (x *EciesAeadHkdfPrivateKey) GetVersion() uint32 { method GetPublicKey (line 363) | func (x *EciesAeadHkdfPrivateKey) GetPublicKey() *EciesAeadHkdfPublicK... method GetKeyValue (line 370) | func (x *EciesAeadHkdfPrivateKey) GetKeyValue() []byte { type EciesAeadHkdfKeyFormat (line 377) | type EciesAeadHkdfKeyFormat struct method Reset (line 386) | func (x *EciesAeadHkdfKeyFormat) Reset() { method String (line 395) | func (x *EciesAeadHkdfKeyFormat) String() string { method ProtoMessage (line 399) | func (*EciesAeadHkdfKeyFormat) ProtoMessage() {} method ProtoReflect (line 401) | func (x *EciesAeadHkdfKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 414) | func (*EciesAeadHkdfKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 418) | func (x *EciesAeadHkdfKeyFormat) GetParams() *EciesAeadHkdfParams { function file_third_party_tink_proto_ecies_aead_hkdf_proto_rawDescGZIP (line 507) | func file_third_party_tink_proto_ecies_aead_hkdf_proto_rawDescGZIP() []b... function init (line 544) | func init() { file_third_party_tink_proto_ecies_aead_hkdf_proto_init() } function file_third_party_tink_proto_ecies_aead_hkdf_proto_init (line 545) | func file_third_party_tink_proto_ecies_aead_hkdf_proto_init() { FILE: go/proto/ed25519_go_proto/ed25519.pb.go constant _ (line 38) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 40) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type Ed25519KeyFormat (line 43) | type Ed25519KeyFormat struct method Reset (line 51) | func (x *Ed25519KeyFormat) Reset() { method String (line 60) | func (x *Ed25519KeyFormat) String() string { method ProtoMessage (line 64) | func (*Ed25519KeyFormat) ProtoMessage() {} method ProtoReflect (line 66) | func (x *Ed25519KeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 79) | func (*Ed25519KeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 83) | func (x *Ed25519KeyFormat) GetVersion() uint32 { type Ed25519PublicKey (line 91) | type Ed25519PublicKey struct method Reset (line 104) | func (x *Ed25519PublicKey) Reset() { method String (line 113) | func (x *Ed25519PublicKey) String() string { method ProtoMessage (line 117) | func (*Ed25519PublicKey) ProtoMessage() {} method ProtoReflect (line 119) | func (x *Ed25519PublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 132) | func (*Ed25519PublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 136) | func (x *Ed25519PublicKey) GetVersion() uint32 { method GetKeyValue (line 143) | func (x *Ed25519PublicKey) GetKeyValue() []byte { type Ed25519PrivateKey (line 151) | type Ed25519PrivateKey struct method Reset (line 166) | func (x *Ed25519PrivateKey) Reset() { method String (line 175) | func (x *Ed25519PrivateKey) String() string { method ProtoMessage (line 179) | func (*Ed25519PrivateKey) ProtoMessage() {} method ProtoReflect (line 181) | func (x *Ed25519PrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 194) | func (*Ed25519PrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 198) | func (x *Ed25519PrivateKey) GetVersion() uint32 { method GetKeyValue (line 205) | func (x *Ed25519PrivateKey) GetKeyValue() []byte { method GetPublicKey (line 212) | func (x *Ed25519PrivateKey) GetPublicKey() *Ed25519PublicKey { function file_third_party_tink_proto_ed25519_proto_rawDescGZIP (line 256) | func file_third_party_tink_proto_ed25519_proto_rawDescGZIP() []byte { function init (line 278) | func init() { file_third_party_tink_proto_ed25519_proto_init() } function file_third_party_tink_proto_ed25519_proto_init (line 279) | func file_third_party_tink_proto_ed25519_proto_init() { FILE: go/proto/hkdf_prf_go_proto/hkdf_prf.pb.go constant _ (line 35) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 37) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type HkdfPrfParams (line 40) | type HkdfPrfParams struct method Reset (line 55) | func (x *HkdfPrfParams) Reset() { method String (line 64) | func (x *HkdfPrfParams) String() string { method ProtoMessage (line 68) | func (*HkdfPrfParams) ProtoMessage() {} method ProtoReflect (line 70) | func (x *HkdfPrfParams) ProtoReflect() protoreflect.Message { method Descriptor (line 83) | func (*HkdfPrfParams) Descriptor() ([]byte, []int) { method GetHash (line 87) | func (x *HkdfPrfParams) GetHash() common_go_proto.HashType { method GetSalt (line 94) | func (x *HkdfPrfParams) GetSalt() []byte { type HkdfPrfKey (line 101) | type HkdfPrfKey struct method Reset (line 111) | func (x *HkdfPrfKey) Reset() { method String (line 120) | func (x *HkdfPrfKey) String() string { method ProtoMessage (line 124) | func (*HkdfPrfKey) ProtoMessage() {} method ProtoReflect (line 126) | func (x *HkdfPrfKey) ProtoReflect() protoreflect.Message { method Descriptor (line 139) | func (*HkdfPrfKey) Descriptor() ([]byte, []int) { method GetVersion (line 143) | func (x *HkdfPrfKey) GetVersion() uint32 { method GetParams (line 150) | func (x *HkdfPrfKey) GetParams() *HkdfPrfParams { method GetKeyValue (line 157) | func (x *HkdfPrfKey) GetKeyValue() []byte { type HkdfPrfKeyFormat (line 164) | type HkdfPrfKeyFormat struct method Reset (line 174) | func (x *HkdfPrfKeyFormat) Reset() { method String (line 183) | func (x *HkdfPrfKeyFormat) String() string { method ProtoMessage (line 187) | func (*HkdfPrfKeyFormat) ProtoMessage() {} method ProtoReflect (line 189) | func (x *HkdfPrfKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 202) | func (*HkdfPrfKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 206) | func (x *HkdfPrfKeyFormat) GetParams() *HkdfPrfParams { method GetKeySize (line 213) | func (x *HkdfPrfKeyFormat) GetKeySize() uint32 { method GetVersion (line 220) | func (x *HkdfPrfKeyFormat) GetVersion() uint32 { function file_third_party_tink_proto_hkdf_prf_proto_rawDescGZIP (line 271) | func file_third_party_tink_proto_hkdf_prf_proto_rawDescGZIP() []byte { function init (line 296) | func init() { file_third_party_tink_proto_hkdf_prf_proto_init() } function file_third_party_tink_proto_hkdf_prf_proto_init (line 297) | func file_third_party_tink_proto_hkdf_prf_proto_init() { FILE: go/proto/hmac_go_proto/hmac.pb.go constant _ (line 35) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 37) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type HmacParams (line 40) | type HmacParams struct method Reset (line 49) | func (x *HmacParams) Reset() { method String (line 58) | func (x *HmacParams) String() string { method ProtoMessage (line 62) | func (*HmacParams) ProtoMessage() {} method ProtoReflect (line 64) | func (x *HmacParams) ProtoReflect() protoreflect.Message { method Descriptor (line 77) | func (*HmacParams) Descriptor() ([]byte, []int) { method GetHash (line 81) | func (x *HmacParams) GetHash() common_go_proto.HashType { method GetTagSize (line 88) | func (x *HmacParams) GetTagSize() uint32 { type HmacKey (line 96) | type HmacKey struct method Reset (line 106) | func (x *HmacKey) Reset() { method String (line 115) | func (x *HmacKey) String() string { method ProtoMessage (line 119) | func (*HmacKey) ProtoMessage() {} method ProtoReflect (line 121) | func (x *HmacKey) ProtoReflect() protoreflect.Message { method Descriptor (line 134) | func (*HmacKey) Descriptor() ([]byte, []int) { method GetVersion (line 138) | func (x *HmacKey) GetVersion() uint32 { method GetParams (line 145) | func (x *HmacKey) GetParams() *HmacParams { method GetKeyValue (line 152) | func (x *HmacKey) GetKeyValue() []byte { type HmacKeyFormat (line 159) | type HmacKeyFormat struct method Reset (line 169) | func (x *HmacKeyFormat) Reset() { method String (line 178) | func (x *HmacKeyFormat) String() string { method ProtoMessage (line 182) | func (*HmacKeyFormat) ProtoMessage() {} method ProtoReflect (line 184) | func (x *HmacKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 197) | func (*HmacKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 201) | func (x *HmacKeyFormat) GetParams() *HmacParams { method GetKeySize (line 208) | func (x *HmacKeyFormat) GetKeySize() uint32 { method GetVersion (line 215) | func (x *HmacKeyFormat) GetVersion() uint32 { function file_third_party_tink_proto_hmac_proto_rawDescGZIP (line 265) | func file_third_party_tink_proto_hmac_proto_rawDescGZIP() []byte { function init (line 290) | func init() { file_third_party_tink_proto_hmac_proto_init() } function file_third_party_tink_proto_hmac_proto_init (line 291) | func file_third_party_tink_proto_hmac_proto_init() { FILE: go/proto/hmac_prf_go_proto/hmac_prf.pb.go constant _ (line 35) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 37) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type HmacPrfParams (line 40) | type HmacPrfParams struct method Reset (line 48) | func (x *HmacPrfParams) Reset() { method String (line 57) | func (x *HmacPrfParams) String() string { method ProtoMessage (line 61) | func (*HmacPrfParams) ProtoMessage() {} method ProtoReflect (line 63) | func (x *HmacPrfParams) ProtoReflect() protoreflect.Message { method Descriptor (line 76) | func (*HmacPrfParams) Descriptor() ([]byte, []int) { method GetHash (line 80) | func (x *HmacPrfParams) GetHash() common_go_proto.HashType { type HmacPrfKey (line 88) | type HmacPrfKey struct method Reset (line 98) | func (x *HmacPrfKey) Reset() { method String (line 107) | func (x *HmacPrfKey) String() string { method ProtoMessage (line 111) | func (*HmacPrfKey) ProtoMessage() {} method ProtoReflect (line 113) | func (x *HmacPrfKey) ProtoReflect() protoreflect.Message { method Descriptor (line 126) | func (*HmacPrfKey) Descriptor() ([]byte, []int) { method GetVersion (line 130) | func (x *HmacPrfKey) GetVersion() uint32 { method GetParams (line 137) | func (x *HmacPrfKey) GetParams() *HmacPrfParams { method GetKeyValue (line 144) | func (x *HmacPrfKey) GetKeyValue() []byte { type HmacPrfKeyFormat (line 151) | type HmacPrfKeyFormat struct method Reset (line 161) | func (x *HmacPrfKeyFormat) Reset() { method String (line 170) | func (x *HmacPrfKeyFormat) String() string { method ProtoMessage (line 174) | func (*HmacPrfKeyFormat) ProtoMessage() {} method ProtoReflect (line 176) | func (x *HmacPrfKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 189) | func (*HmacPrfKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 193) | func (x *HmacPrfKeyFormat) GetParams() *HmacPrfParams { method GetKeySize (line 200) | func (x *HmacPrfKeyFormat) GetKeySize() uint32 { method GetVersion (line 207) | func (x *HmacPrfKeyFormat) GetVersion() uint32 { function file_third_party_tink_proto_hmac_prf_proto_rawDescGZIP (line 257) | func file_third_party_tink_proto_hmac_prf_proto_rawDescGZIP() []byte { function init (line 282) | func init() { file_third_party_tink_proto_hmac_prf_proto_init() } function file_third_party_tink_proto_hmac_prf_proto_init (line 283) | func file_third_party_tink_proto_hmac_prf_proto_init() { FILE: go/proto/hpke_go_proto/hpke.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type HpkeKem (line 39) | type HpkeKem method Enum (line 67) | func (x HpkeKem) Enum() *HpkeKem { method String (line 73) | func (x HpkeKem) String() string { method Descriptor (line 77) | func (HpkeKem) Descriptor() protoreflect.EnumDescriptor { method Type (line 81) | func (HpkeKem) Type() protoreflect.EnumType { method Number (line 85) | func (x HpkeKem) Number() protoreflect.EnumNumber { method EnumDescriptor (line 90) | func (HpkeKem) EnumDescriptor() ([]byte, []int) { constant HpkeKem_KEM_UNKNOWN (line 42) | HpkeKem_KEM_UNKNOWN HpkeKem = 0 constant HpkeKem_DHKEM_X25519_HKDF_SHA256 (line 43) | HpkeKem_DHKEM_X25519_HKDF_SHA256 HpkeKem = 1 constant HpkeKem_DHKEM_P256_HKDF_SHA256 (line 44) | HpkeKem_DHKEM_P256_HKDF_SHA256 HpkeKem = 2 constant HpkeKem_DHKEM_P384_HKDF_SHA384 (line 45) | HpkeKem_DHKEM_P384_HKDF_SHA384 HpkeKem = 3 constant HpkeKem_DHKEM_P521_HKDF_SHA512 (line 46) | HpkeKem_DHKEM_P521_HKDF_SHA512 HpkeKem = 4 type HpkeKdf (line 94) | type HpkeKdf method Enum (line 119) | func (x HpkeKdf) Enum() *HpkeKdf { method String (line 125) | func (x HpkeKdf) String() string { method Descriptor (line 129) | func (HpkeKdf) Descriptor() protoreflect.EnumDescriptor { method Type (line 133) | func (HpkeKdf) Type() protoreflect.EnumType { method Number (line 137) | func (x HpkeKdf) Number() protoreflect.EnumNumber { method EnumDescriptor (line 142) | func (HpkeKdf) EnumDescriptor() ([]byte, []int) { constant HpkeKdf_KDF_UNKNOWN (line 97) | HpkeKdf_KDF_UNKNOWN HpkeKdf = 0 constant HpkeKdf_HKDF_SHA256 (line 98) | HpkeKdf_HKDF_SHA256 HpkeKdf = 1 constant HpkeKdf_HKDF_SHA384 (line 99) | HpkeKdf_HKDF_SHA384 HpkeKdf = 2 constant HpkeKdf_HKDF_SHA512 (line 100) | HpkeKdf_HKDF_SHA512 HpkeKdf = 3 type HpkeAead (line 146) | type HpkeAead method Enum (line 171) | func (x HpkeAead) Enum() *HpkeAead { method String (line 177) | func (x HpkeAead) String() string { method Descriptor (line 181) | func (HpkeAead) Descriptor() protoreflect.EnumDescriptor { method Type (line 185) | func (HpkeAead) Type() protoreflect.EnumType { method Number (line 189) | func (x HpkeAead) Number() protoreflect.EnumNumber { method EnumDescriptor (line 194) | func (HpkeAead) EnumDescriptor() ([]byte, []int) { constant HpkeAead_AEAD_UNKNOWN (line 149) | HpkeAead_AEAD_UNKNOWN HpkeAead = 0 constant HpkeAead_AES_128_GCM (line 150) | HpkeAead_AES_128_GCM HpkeAead = 1 constant HpkeAead_AES_256_GCM (line 151) | HpkeAead_AES_256_GCM HpkeAead = 2 constant HpkeAead_CHACHA20_POLY1305 (line 152) | HpkeAead_CHACHA20_POLY1305 HpkeAead = 3 type HpkeParams (line 198) | type HpkeParams struct method Reset (line 208) | func (x *HpkeParams) Reset() { method String (line 217) | func (x *HpkeParams) String() string { method ProtoMessage (line 221) | func (*HpkeParams) ProtoMessage() {} method ProtoReflect (line 223) | func (x *HpkeParams) ProtoReflect() protoreflect.Message { method Descriptor (line 236) | func (*HpkeParams) Descriptor() ([]byte, []int) { method GetKem (line 240) | func (x *HpkeParams) GetKem() HpkeKem { method GetKdf (line 247) | func (x *HpkeParams) GetKdf() HpkeKdf { method GetAead (line 254) | func (x *HpkeParams) GetAead() HpkeAead { type HpkePublicKey (line 261) | type HpkePublicKey struct method Reset (line 273) | func (x *HpkePublicKey) Reset() { method String (line 282) | func (x *HpkePublicKey) String() string { method ProtoMessage (line 286) | func (*HpkePublicKey) ProtoMessage() {} method ProtoReflect (line 288) | func (x *HpkePublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 301) | func (*HpkePublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 305) | func (x *HpkePublicKey) GetVersion() uint32 { method GetParams (line 312) | func (x *HpkePublicKey) GetParams() *HpkeParams { method GetPublicKey (line 319) | func (x *HpkePublicKey) GetPublicKey() []byte { type HpkePrivateKey (line 326) | type HpkePrivateKey struct method Reset (line 338) | func (x *HpkePrivateKey) Reset() { method String (line 347) | func (x *HpkePrivateKey) String() string { method ProtoMessage (line 351) | func (*HpkePrivateKey) ProtoMessage() {} method ProtoReflect (line 353) | func (x *HpkePrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 366) | func (*HpkePrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 370) | func (x *HpkePrivateKey) GetVersion() uint32 { method GetPublicKey (line 377) | func (x *HpkePrivateKey) GetPublicKey() *HpkePublicKey { method GetPrivateKey (line 384) | func (x *HpkePrivateKey) GetPrivateKey() []byte { type HpkeKeyFormat (line 391) | type HpkeKeyFormat struct method Reset (line 399) | func (x *HpkeKeyFormat) Reset() { method String (line 408) | func (x *HpkeKeyFormat) String() string { method ProtoMessage (line 412) | func (*HpkeKeyFormat) ProtoMessage() {} method ProtoReflect (line 414) | func (x *HpkeKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 427) | func (*HpkeKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 431) | func (x *HpkeKeyFormat) GetParams() *HpkeParams { function file_third_party_tink_proto_hpke_proto_rawDescGZIP (line 508) | func file_third_party_tink_proto_hpke_proto_rawDescGZIP() []byte { function init (line 540) | func init() { file_third_party_tink_proto_hpke_proto_init() } function file_third_party_tink_proto_hpke_proto_init (line 541) | func file_third_party_tink_proto_hpke_proto_init() { FILE: go/proto/jwt_ecdsa_go_proto/jwt_ecdsa.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type JwtEcdsaAlgorithm (line 40) | type JwtEcdsaAlgorithm method Enum (line 65) | func (x JwtEcdsaAlgorithm) Enum() *JwtEcdsaAlgorithm { method String (line 71) | func (x JwtEcdsaAlgorithm) String() string { method Descriptor (line 75) | func (JwtEcdsaAlgorithm) Descriptor() protoreflect.EnumDescriptor { method Type (line 79) | func (JwtEcdsaAlgorithm) Type() protoreflect.EnumType { method Number (line 83) | func (x JwtEcdsaAlgorithm) Number() protoreflect.EnumNumber { method EnumDescriptor (line 88) | func (JwtEcdsaAlgorithm) EnumDescriptor() ([]byte, []int) { constant JwtEcdsaAlgorithm_ES_UNKNOWN (line 43) | JwtEcdsaAlgorithm_ES_UNKNOWN JwtEcdsaAlgorithm = 0 constant JwtEcdsaAlgorithm_ES256 (line 44) | JwtEcdsaAlgorithm_ES256 JwtEcdsaAlgorithm = 1 constant JwtEcdsaAlgorithm_ES384 (line 45) | JwtEcdsaAlgorithm_ES384 JwtEcdsaAlgorithm = 2 constant JwtEcdsaAlgorithm_ES512 (line 46) | JwtEcdsaAlgorithm_ES512 JwtEcdsaAlgorithm = 3 type JwtEcdsaPublicKey (line 93) | type JwtEcdsaPublicKey struct method Reset (line 107) | func (x *JwtEcdsaPublicKey) Reset() { method String (line 116) | func (x *JwtEcdsaPublicKey) String() string { method ProtoMessage (line 120) | func (*JwtEcdsaPublicKey) ProtoMessage() {} method ProtoReflect (line 122) | func (x *JwtEcdsaPublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 135) | func (*JwtEcdsaPublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 139) | func (x *JwtEcdsaPublicKey) GetVersion() uint32 { method GetAlgorithm (line 146) | func (x *JwtEcdsaPublicKey) GetAlgorithm() JwtEcdsaAlgorithm { method GetX (line 153) | func (x *JwtEcdsaPublicKey) GetX() []byte { method GetY (line 160) | func (x *JwtEcdsaPublicKey) GetY() []byte { method GetCustomKid (line 167) | func (x *JwtEcdsaPublicKey) GetCustomKid() *JwtEcdsaPublicKey_CustomKid { type JwtEcdsaPrivateKey (line 175) | type JwtEcdsaPrivateKey struct method Reset (line 186) | func (x *JwtEcdsaPrivateKey) Reset() { method String (line 195) | func (x *JwtEcdsaPrivateKey) String() string { method ProtoMessage (line 199) | func (*JwtEcdsaPrivateKey) ProtoMessage() {} method ProtoReflect (line 201) | func (x *JwtEcdsaPrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 214) | func (*JwtEcdsaPrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 218) | func (x *JwtEcdsaPrivateKey) GetVersion() uint32 { method GetPublicKey (line 225) | func (x *JwtEcdsaPrivateKey) GetPublicKey() *JwtEcdsaPublicKey { method GetKeyValue (line 232) | func (x *JwtEcdsaPrivateKey) GetKeyValue() []byte { type JwtEcdsaKeyFormat (line 239) | type JwtEcdsaKeyFormat struct method Reset (line 248) | func (x *JwtEcdsaKeyFormat) Reset() { method String (line 257) | func (x *JwtEcdsaKeyFormat) String() string { method ProtoMessage (line 261) | func (*JwtEcdsaKeyFormat) ProtoMessage() {} method ProtoReflect (line 263) | func (x *JwtEcdsaKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 276) | func (*JwtEcdsaKeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 280) | func (x *JwtEcdsaKeyFormat) GetVersion() uint32 { method GetAlgorithm (line 287) | func (x *JwtEcdsaKeyFormat) GetAlgorithm() JwtEcdsaAlgorithm { type JwtEcdsaPublicKey_CustomKid (line 296) | type JwtEcdsaPublicKey_CustomKid struct method Reset (line 304) | func (x *JwtEcdsaPublicKey_CustomKid) Reset() { method String (line 313) | func (x *JwtEcdsaPublicKey_CustomKid) String() string { method ProtoMessage (line 317) | func (*JwtEcdsaPublicKey_CustomKid) ProtoMessage() {} method ProtoReflect (line 319) | func (x *JwtEcdsaPublicKey_CustomKid) ProtoReflect() protoreflect.Mess... method Descriptor (line 332) | func (*JwtEcdsaPublicKey_CustomKid) Descriptor() ([]byte, []int) { method GetValue (line 336) | func (x *JwtEcdsaPublicKey_CustomKid) GetValue() string { function file_third_party_tink_proto_jwt_ecdsa_proto_rawDescGZIP (line 400) | func file_third_party_tink_proto_jwt_ecdsa_proto_rawDescGZIP() []byte { function init (line 428) | func init() { file_third_party_tink_proto_jwt_ecdsa_proto_init() } function file_third_party_tink_proto_jwt_ecdsa_proto_init (line 429) | func file_third_party_tink_proto_jwt_ecdsa_proto_init() { FILE: go/proto/jwt_hmac_go_proto/jwt_hmac.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type JwtHmacAlgorithm (line 40) | type JwtHmacAlgorithm method Enum (line 65) | func (x JwtHmacAlgorithm) Enum() *JwtHmacAlgorithm { method String (line 71) | func (x JwtHmacAlgorithm) String() string { method Descriptor (line 75) | func (JwtHmacAlgorithm) Descriptor() protoreflect.EnumDescriptor { method Type (line 79) | func (JwtHmacAlgorithm) Type() protoreflect.EnumType { method Number (line 83) | func (x JwtHmacAlgorithm) Number() protoreflect.EnumNumber { method EnumDescriptor (line 88) | func (JwtHmacAlgorithm) EnumDescriptor() ([]byte, []int) { constant JwtHmacAlgorithm_HS_UNKNOWN (line 43) | JwtHmacAlgorithm_HS_UNKNOWN JwtHmacAlgorithm = 0 constant JwtHmacAlgorithm_HS256 (line 44) | JwtHmacAlgorithm_HS256 JwtHmacAlgorithm = 1 constant JwtHmacAlgorithm_HS384 (line 45) | JwtHmacAlgorithm_HS384 JwtHmacAlgorithm = 2 constant JwtHmacAlgorithm_HS512 (line 46) | JwtHmacAlgorithm_HS512 JwtHmacAlgorithm = 3 type JwtHmacKey (line 93) | type JwtHmacKey struct method Reset (line 104) | func (x *JwtHmacKey) Reset() { method String (line 113) | func (x *JwtHmacKey) String() string { method ProtoMessage (line 117) | func (*JwtHmacKey) ProtoMessage() {} method ProtoReflect (line 119) | func (x *JwtHmacKey) ProtoReflect() protoreflect.Message { method Descriptor (line 132) | func (*JwtHmacKey) Descriptor() ([]byte, []int) { method GetVersion (line 136) | func (x *JwtHmacKey) GetVersion() uint32 { method GetAlgorithm (line 143) | func (x *JwtHmacKey) GetAlgorithm() JwtHmacAlgorithm { method GetKeyValue (line 150) | func (x *JwtHmacKey) GetKeyValue() []byte { method GetCustomKid (line 157) | func (x *JwtHmacKey) GetCustomKid() *JwtHmacKey_CustomKid { type JwtHmacKeyFormat (line 164) | type JwtHmacKeyFormat struct method Reset (line 174) | func (x *JwtHmacKeyFormat) Reset() { method String (line 183) | func (x *JwtHmacKeyFormat) String() string { method ProtoMessage (line 187) | func (*JwtHmacKeyFormat) ProtoMessage() {} method ProtoReflect (line 189) | func (x *JwtHmacKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 202) | func (*JwtHmacKeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 206) | func (x *JwtHmacKeyFormat) GetVersion() uint32 { method GetAlgorithm (line 213) | func (x *JwtHmacKeyFormat) GetAlgorithm() JwtHmacAlgorithm { method GetKeySize (line 220) | func (x *JwtHmacKeyFormat) GetKeySize() uint32 { type JwtHmacKey_CustomKid (line 229) | type JwtHmacKey_CustomKid struct method Reset (line 237) | func (x *JwtHmacKey_CustomKid) Reset() { method String (line 246) | func (x *JwtHmacKey_CustomKid) String() string { method ProtoMessage (line 250) | func (*JwtHmacKey_CustomKid) ProtoMessage() {} method ProtoReflect (line 252) | func (x *JwtHmacKey_CustomKid) ProtoReflect() protoreflect.Message { method Descriptor (line 265) | func (*JwtHmacKey_CustomKid) Descriptor() ([]byte, []int) { method GetValue (line 269) | func (x *JwtHmacKey_CustomKid) GetValue() string { function file_third_party_tink_proto_jwt_hmac_proto_rawDescGZIP (line 325) | func file_third_party_tink_proto_jwt_hmac_proto_rawDescGZIP() []byte { function init (line 351) | func init() { file_third_party_tink_proto_jwt_hmac_proto_init() } function file_third_party_tink_proto_jwt_hmac_proto_init (line 352) | func file_third_party_tink_proto_jwt_hmac_proto_init() { FILE: go/proto/jwt_rsa_ssa_pkcs1_go_proto/jwt_rsa_ssa_pkcs1.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type JwtRsaSsaPkcs1Algorithm (line 40) | type JwtRsaSsaPkcs1Algorithm method Enum (line 65) | func (x JwtRsaSsaPkcs1Algorithm) Enum() *JwtRsaSsaPkcs1Algorithm { method String (line 71) | func (x JwtRsaSsaPkcs1Algorithm) String() string { method Descriptor (line 75) | func (JwtRsaSsaPkcs1Algorithm) Descriptor() protoreflect.EnumDescriptor { method Type (line 79) | func (JwtRsaSsaPkcs1Algorithm) Type() protoreflect.EnumType { method Number (line 83) | func (x JwtRsaSsaPkcs1Algorithm) Number() protoreflect.EnumNumber { method EnumDescriptor (line 88) | func (JwtRsaSsaPkcs1Algorithm) EnumDescriptor() ([]byte, []int) { constant JwtRsaSsaPkcs1Algorithm_RS_UNKNOWN (line 43) | JwtRsaSsaPkcs1Algorithm_RS_UNKNOWN JwtRsaSsaPkcs1Algorithm = 0 constant JwtRsaSsaPkcs1Algorithm_RS256 (line 44) | JwtRsaSsaPkcs1Algorithm_RS256 JwtRsaSsaPkcs1Algorithm = 1 constant JwtRsaSsaPkcs1Algorithm_RS384 (line 45) | JwtRsaSsaPkcs1Algorithm_RS384 JwtRsaSsaPkcs1Algorithm = 2 constant JwtRsaSsaPkcs1Algorithm_RS512 (line 46) | JwtRsaSsaPkcs1Algorithm_RS512 JwtRsaSsaPkcs1Algorithm = 3 type JwtRsaSsaPkcs1PublicKey (line 93) | type JwtRsaSsaPkcs1PublicKey struct method Reset (line 109) | func (x *JwtRsaSsaPkcs1PublicKey) Reset() { method String (line 118) | func (x *JwtRsaSsaPkcs1PublicKey) String() string { method ProtoMessage (line 122) | func (*JwtRsaSsaPkcs1PublicKey) ProtoMessage() {} method ProtoReflect (line 124) | func (x *JwtRsaSsaPkcs1PublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 137) | func (*JwtRsaSsaPkcs1PublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 141) | func (x *JwtRsaSsaPkcs1PublicKey) GetVersion() uint32 { method GetAlgorithm (line 148) | func (x *JwtRsaSsaPkcs1PublicKey) GetAlgorithm() JwtRsaSsaPkcs1Algorit... method GetN (line 155) | func (x *JwtRsaSsaPkcs1PublicKey) GetN() []byte { method GetE (line 162) | func (x *JwtRsaSsaPkcs1PublicKey) GetE() []byte { method GetCustomKid (line 169) | func (x *JwtRsaSsaPkcs1PublicKey) GetCustomKid() *JwtRsaSsaPkcs1Public... type JwtRsaSsaPkcs1PrivateKey (line 177) | type JwtRsaSsaPkcs1PrivateKey struct method Reset (line 205) | func (x *JwtRsaSsaPkcs1PrivateKey) Reset() { method String (line 214) | func (x *JwtRsaSsaPkcs1PrivateKey) String() string { method ProtoMessage (line 218) | func (*JwtRsaSsaPkcs1PrivateKey) ProtoMessage() {} method ProtoReflect (line 220) | func (x *JwtRsaSsaPkcs1PrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 233) | func (*JwtRsaSsaPkcs1PrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 237) | func (x *JwtRsaSsaPkcs1PrivateKey) GetVersion() uint32 { method GetPublicKey (line 244) | func (x *JwtRsaSsaPkcs1PrivateKey) GetPublicKey() *JwtRsaSsaPkcs1Publi... method GetD (line 251) | func (x *JwtRsaSsaPkcs1PrivateKey) GetD() []byte { method GetP (line 258) | func (x *JwtRsaSsaPkcs1PrivateKey) GetP() []byte { method GetQ (line 265) | func (x *JwtRsaSsaPkcs1PrivateKey) GetQ() []byte { method GetDp (line 272) | func (x *JwtRsaSsaPkcs1PrivateKey) GetDp() []byte { method GetDq (line 279) | func (x *JwtRsaSsaPkcs1PrivateKey) GetDq() []byte { method GetCrt (line 286) | func (x *JwtRsaSsaPkcs1PrivateKey) GetCrt() []byte { type JwtRsaSsaPkcs1KeyFormat (line 293) | type JwtRsaSsaPkcs1KeyFormat struct method Reset (line 304) | func (x *JwtRsaSsaPkcs1KeyFormat) Reset() { method String (line 313) | func (x *JwtRsaSsaPkcs1KeyFormat) String() string { method ProtoMessage (line 317) | func (*JwtRsaSsaPkcs1KeyFormat) ProtoMessage() {} method ProtoReflect (line 319) | func (x *JwtRsaSsaPkcs1KeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 332) | func (*JwtRsaSsaPkcs1KeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 336) | func (x *JwtRsaSsaPkcs1KeyFormat) GetVersion() uint32 { method GetAlgorithm (line 343) | func (x *JwtRsaSsaPkcs1KeyFormat) GetAlgorithm() JwtRsaSsaPkcs1Algorit... method GetModulusSizeInBits (line 350) | func (x *JwtRsaSsaPkcs1KeyFormat) GetModulusSizeInBits() uint32 { method GetPublicExponent (line 357) | func (x *JwtRsaSsaPkcs1KeyFormat) GetPublicExponent() []byte { type JwtRsaSsaPkcs1PublicKey_CustomKid (line 366) | type JwtRsaSsaPkcs1PublicKey_CustomKid struct method Reset (line 374) | func (x *JwtRsaSsaPkcs1PublicKey_CustomKid) Reset() { method String (line 383) | func (x *JwtRsaSsaPkcs1PublicKey_CustomKid) String() string { method ProtoMessage (line 387) | func (*JwtRsaSsaPkcs1PublicKey_CustomKid) ProtoMessage() {} method ProtoReflect (line 389) | func (x *JwtRsaSsaPkcs1PublicKey_CustomKid) ProtoReflect() protoreflec... method Descriptor (line 402) | func (*JwtRsaSsaPkcs1PublicKey_CustomKid) Descriptor() ([]byte, []int) { method GetValue (line 406) | func (x *JwtRsaSsaPkcs1PublicKey_CustomKid) GetValue() string { function file_third_party_tink_proto_jwt_rsa_ssa_pkcs1_proto_rawDescGZIP (line 484) | func file_third_party_tink_proto_jwt_rsa_ssa_pkcs1_proto_rawDescGZIP() [... function init (line 512) | func init() { file_third_party_tink_proto_jwt_rsa_ssa_pkcs1_proto_init() } function file_third_party_tink_proto_jwt_rsa_ssa_pkcs1_proto_init (line 513) | func file_third_party_tink_proto_jwt_rsa_ssa_pkcs1_proto_init() { FILE: go/proto/jwt_rsa_ssa_pss_go_proto/jwt_rsa_ssa_pss.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type JwtRsaSsaPssAlgorithm (line 40) | type JwtRsaSsaPssAlgorithm method Enum (line 65) | func (x JwtRsaSsaPssAlgorithm) Enum() *JwtRsaSsaPssAlgorithm { method String (line 71) | func (x JwtRsaSsaPssAlgorithm) String() string { method Descriptor (line 75) | func (JwtRsaSsaPssAlgorithm) Descriptor() protoreflect.EnumDescriptor { method Type (line 79) | func (JwtRsaSsaPssAlgorithm) Type() protoreflect.EnumType { method Number (line 83) | func (x JwtRsaSsaPssAlgorithm) Number() protoreflect.EnumNumber { method EnumDescriptor (line 88) | func (JwtRsaSsaPssAlgorithm) EnumDescriptor() ([]byte, []int) { constant JwtRsaSsaPssAlgorithm_PS_UNKNOWN (line 43) | JwtRsaSsaPssAlgorithm_PS_UNKNOWN JwtRsaSsaPssAlgorithm = 0 constant JwtRsaSsaPssAlgorithm_PS256 (line 44) | JwtRsaSsaPssAlgorithm_PS256 JwtRsaSsaPssAlgorithm = 1 constant JwtRsaSsaPssAlgorithm_PS384 (line 45) | JwtRsaSsaPssAlgorithm_PS384 JwtRsaSsaPssAlgorithm = 2 constant JwtRsaSsaPssAlgorithm_PS512 (line 46) | JwtRsaSsaPssAlgorithm_PS512 JwtRsaSsaPssAlgorithm = 3 type JwtRsaSsaPssPublicKey (line 93) | type JwtRsaSsaPssPublicKey struct method Reset (line 109) | func (x *JwtRsaSsaPssPublicKey) Reset() { method String (line 118) | func (x *JwtRsaSsaPssPublicKey) String() string { method ProtoMessage (line 122) | func (*JwtRsaSsaPssPublicKey) ProtoMessage() {} method ProtoReflect (line 124) | func (x *JwtRsaSsaPssPublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 137) | func (*JwtRsaSsaPssPublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 141) | func (x *JwtRsaSsaPssPublicKey) GetVersion() uint32 { method GetAlgorithm (line 148) | func (x *JwtRsaSsaPssPublicKey) GetAlgorithm() JwtRsaSsaPssAlgorithm { method GetN (line 155) | func (x *JwtRsaSsaPssPublicKey) GetN() []byte { method GetE (line 162) | func (x *JwtRsaSsaPssPublicKey) GetE() []byte { method GetCustomKid (line 169) | func (x *JwtRsaSsaPssPublicKey) GetCustomKid() *JwtRsaSsaPssPublicKey_... type JwtRsaSsaPssPrivateKey (line 177) | type JwtRsaSsaPssPrivateKey struct method Reset (line 205) | func (x *JwtRsaSsaPssPrivateKey) Reset() { method String (line 214) | func (x *JwtRsaSsaPssPrivateKey) String() string { method ProtoMessage (line 218) | func (*JwtRsaSsaPssPrivateKey) ProtoMessage() {} method ProtoReflect (line 220) | func (x *JwtRsaSsaPssPrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 233) | func (*JwtRsaSsaPssPrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 237) | func (x *JwtRsaSsaPssPrivateKey) GetVersion() uint32 { method GetPublicKey (line 244) | func (x *JwtRsaSsaPssPrivateKey) GetPublicKey() *JwtRsaSsaPssPublicKey { method GetD (line 251) | func (x *JwtRsaSsaPssPrivateKey) GetD() []byte { method GetP (line 258) | func (x *JwtRsaSsaPssPrivateKey) GetP() []byte { method GetQ (line 265) | func (x *JwtRsaSsaPssPrivateKey) GetQ() []byte { method GetDp (line 272) | func (x *JwtRsaSsaPssPrivateKey) GetDp() []byte { method GetDq (line 279) | func (x *JwtRsaSsaPssPrivateKey) GetDq() []byte { method GetCrt (line 286) | func (x *JwtRsaSsaPssPrivateKey) GetCrt() []byte { type JwtRsaSsaPssKeyFormat (line 293) | type JwtRsaSsaPssKeyFormat struct method Reset (line 304) | func (x *JwtRsaSsaPssKeyFormat) Reset() { method String (line 313) | func (x *JwtRsaSsaPssKeyFormat) String() string { method ProtoMessage (line 317) | func (*JwtRsaSsaPssKeyFormat) ProtoMessage() {} method ProtoReflect (line 319) | func (x *JwtRsaSsaPssKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 332) | func (*JwtRsaSsaPssKeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 336) | func (x *JwtRsaSsaPssKeyFormat) GetVersion() uint32 { method GetAlgorithm (line 343) | func (x *JwtRsaSsaPssKeyFormat) GetAlgorithm() JwtRsaSsaPssAlgorithm { method GetModulusSizeInBits (line 350) | func (x *JwtRsaSsaPssKeyFormat) GetModulusSizeInBits() uint32 { method GetPublicExponent (line 357) | func (x *JwtRsaSsaPssKeyFormat) GetPublicExponent() []byte { type JwtRsaSsaPssPublicKey_CustomKid (line 366) | type JwtRsaSsaPssPublicKey_CustomKid struct method Reset (line 374) | func (x *JwtRsaSsaPssPublicKey_CustomKid) Reset() { method String (line 383) | func (x *JwtRsaSsaPssPublicKey_CustomKid) String() string { method ProtoMessage (line 387) | func (*JwtRsaSsaPssPublicKey_CustomKid) ProtoMessage() {} method ProtoReflect (line 389) | func (x *JwtRsaSsaPssPublicKey_CustomKid) ProtoReflect() protoreflect.... method Descriptor (line 402) | func (*JwtRsaSsaPssPublicKey_CustomKid) Descriptor() ([]byte, []int) { method GetValue (line 406) | func (x *JwtRsaSsaPssPublicKey_CustomKid) GetValue() string { function file_third_party_tink_proto_jwt_rsa_ssa_pss_proto_rawDescGZIP (line 483) | func file_third_party_tink_proto_jwt_rsa_ssa_pss_proto_rawDescGZIP() []b... function init (line 511) | func init() { file_third_party_tink_proto_jwt_rsa_ssa_pss_proto_init() } function file_third_party_tink_proto_jwt_rsa_ssa_pss_proto_init (line 512) | func file_third_party_tink_proto_jwt_rsa_ssa_pss_proto_init() { FILE: go/proto/kms_aead_go_proto/kms_aead.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type KmsAeadKeyFormat (line 39) | type KmsAeadKeyFormat struct method Reset (line 53) | func (x *KmsAeadKeyFormat) Reset() { method String (line 62) | func (x *KmsAeadKeyFormat) String() string { method ProtoMessage (line 66) | func (*KmsAeadKeyFormat) ProtoMessage() {} method ProtoReflect (line 68) | func (x *KmsAeadKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 81) | func (*KmsAeadKeyFormat) Descriptor() ([]byte, []int) { method GetKeyUri (line 85) | func (x *KmsAeadKeyFormat) GetKeyUri() string { type KmsAeadKey (line 93) | type KmsAeadKey struct method Reset (line 103) | func (x *KmsAeadKey) Reset() { method String (line 112) | func (x *KmsAeadKey) String() string { method ProtoMessage (line 116) | func (*KmsAeadKey) ProtoMessage() {} method ProtoReflect (line 118) | func (x *KmsAeadKey) ProtoReflect() protoreflect.Message { method Descriptor (line 131) | func (*KmsAeadKey) Descriptor() ([]byte, []int) { method GetVersion (line 135) | func (x *KmsAeadKey) GetVersion() uint32 { method GetParams (line 142) | func (x *KmsAeadKey) GetParams() *KmsAeadKeyFormat { function file_third_party_tink_proto_kms_aead_proto_rawDescGZIP (line 178) | func file_third_party_tink_proto_kms_aead_proto_rawDescGZIP() []byte { function init (line 199) | func init() { file_third_party_tink_proto_kms_aead_proto_init() } function file_third_party_tink_proto_kms_aead_proto_init (line 200) | func file_third_party_tink_proto_kms_aead_proto_init() { FILE: go/proto/kms_envelope_go_proto/kms_envelope.pb.go constant _ (line 35) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 37) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type KmsEnvelopeAeadKeyFormat (line 40) | type KmsEnvelopeAeadKeyFormat struct method Reset (line 57) | func (x *KmsEnvelopeAeadKeyFormat) Reset() { method String (line 66) | func (x *KmsEnvelopeAeadKeyFormat) String() string { method ProtoMessage (line 70) | func (*KmsEnvelopeAeadKeyFormat) ProtoMessage() {} method ProtoReflect (line 72) | func (x *KmsEnvelopeAeadKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 85) | func (*KmsEnvelopeAeadKeyFormat) Descriptor() ([]byte, []int) { method GetKekUri (line 89) | func (x *KmsEnvelopeAeadKeyFormat) GetKekUri() string { method GetDekTemplate (line 96) | func (x *KmsEnvelopeAeadKeyFormat) GetDekTemplate() *tink_go_proto.Key... type KmsEnvelopeAeadKey (line 104) | type KmsEnvelopeAeadKey struct method Reset (line 114) | func (x *KmsEnvelopeAeadKey) Reset() { method String (line 123) | func (x *KmsEnvelopeAeadKey) String() string { method ProtoMessage (line 127) | func (*KmsEnvelopeAeadKey) ProtoMessage() {} method ProtoReflect (line 129) | func (x *KmsEnvelopeAeadKey) ProtoReflect() protoreflect.Message { method Descriptor (line 142) | func (*KmsEnvelopeAeadKey) Descriptor() ([]byte, []int) { method GetVersion (line 146) | func (x *KmsEnvelopeAeadKey) GetVersion() uint32 { method GetParams (line 153) | func (x *KmsEnvelopeAeadKey) GetParams() *KmsEnvelopeAeadKeyFormat { function file_third_party_tink_proto_kms_envelope_proto_rawDescGZIP (line 198) | func file_third_party_tink_proto_kms_envelope_proto_rawDescGZIP() []byte { function init (line 221) | func init() { file_third_party_tink_proto_kms_envelope_proto_init() } function file_third_party_tink_proto_kms_envelope_proto_init (line 222) | func file_third_party_tink_proto_kms_envelope_proto_init() { FILE: go/proto/prf_based_deriver_go_proto/prf_based_deriver.pb.go constant _ (line 35) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 37) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type PrfBasedDeriverParams (line 40) | type PrfBasedDeriverParams struct method Reset (line 48) | func (x *PrfBasedDeriverParams) Reset() { method String (line 57) | func (x *PrfBasedDeriverParams) String() string { method ProtoMessage (line 61) | func (*PrfBasedDeriverParams) ProtoMessage() {} method ProtoReflect (line 63) | func (x *PrfBasedDeriverParams) ProtoReflect() protoreflect.Message { method Descriptor (line 76) | func (*PrfBasedDeriverParams) Descriptor() ([]byte, []int) { method GetDerivedKeyTemplate (line 80) | func (x *PrfBasedDeriverParams) GetDerivedKeyTemplate() *tink_go_proto... type PrfBasedDeriverKeyFormat (line 87) | type PrfBasedDeriverKeyFormat struct method Reset (line 96) | func (x *PrfBasedDeriverKeyFormat) Reset() { method String (line 105) | func (x *PrfBasedDeriverKeyFormat) String() string { method ProtoMessage (line 109) | func (*PrfBasedDeriverKeyFormat) ProtoMessage() {} method ProtoReflect (line 111) | func (x *PrfBasedDeriverKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 124) | func (*PrfBasedDeriverKeyFormat) Descriptor() ([]byte, []int) { method GetPrfKeyTemplate (line 128) | func (x *PrfBasedDeriverKeyFormat) GetPrfKeyTemplate() *tink_go_proto.... method GetParams (line 135) | func (x *PrfBasedDeriverKeyFormat) GetParams() *PrfBasedDeriverParams { type PrfBasedDeriverKey (line 143) | type PrfBasedDeriverKey struct method Reset (line 153) | func (x *PrfBasedDeriverKey) Reset() { method String (line 162) | func (x *PrfBasedDeriverKey) String() string { method ProtoMessage (line 166) | func (*PrfBasedDeriverKey) ProtoMessage() {} method ProtoReflect (line 168) | func (x *PrfBasedDeriverKey) ProtoReflect() protoreflect.Message { method Descriptor (line 181) | func (*PrfBasedDeriverKey) Descriptor() ([]byte, []int) { method GetVersion (line 185) | func (x *PrfBasedDeriverKey) GetVersion() uint32 { method GetPrfKey (line 192) | func (x *PrfBasedDeriverKey) GetPrfKey() *tink_go_proto.KeyData { method GetParams (line 199) | func (x *PrfBasedDeriverKey) GetParams() *PrfBasedDeriverParams { function file_third_party_tink_proto_prf_based_deriver_proto_rawDescGZIP (line 257) | func file_third_party_tink_proto_prf_based_deriver_proto_rawDescGZIP() [... function init (line 285) | func init() { file_third_party_tink_proto_prf_based_deriver_proto_init() } function file_third_party_tink_proto_prf_based_deriver_proto_init (line 286) | func file_third_party_tink_proto_prf_based_deriver_proto_init() { FILE: go/proto/rsa_ssa_pkcs1_go_proto/rsa_ssa_pkcs1.pb.go constant _ (line 38) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 40) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type RsaSsaPkcs1Params (line 43) | type RsaSsaPkcs1Params struct method Reset (line 54) | func (x *RsaSsaPkcs1Params) Reset() { method String (line 63) | func (x *RsaSsaPkcs1Params) String() string { method ProtoMessage (line 67) | func (*RsaSsaPkcs1Params) ProtoMessage() {} method ProtoReflect (line 69) | func (x *RsaSsaPkcs1Params) ProtoReflect() protoreflect.Message { method Descriptor (line 82) | func (*RsaSsaPkcs1Params) Descriptor() ([]byte, []int) { method GetHashType (line 86) | func (x *RsaSsaPkcs1Params) GetHashType() common_go_proto.HashType { type RsaSsaPkcs1PublicKey (line 94) | type RsaSsaPkcs1PublicKey struct method Reset (line 111) | func (x *RsaSsaPkcs1PublicKey) Reset() { method String (line 120) | func (x *RsaSsaPkcs1PublicKey) String() string { method ProtoMessage (line 124) | func (*RsaSsaPkcs1PublicKey) ProtoMessage() {} method ProtoReflect (line 126) | func (x *RsaSsaPkcs1PublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 139) | func (*RsaSsaPkcs1PublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 143) | func (x *RsaSsaPkcs1PublicKey) GetVersion() uint32 { method GetParams (line 150) | func (x *RsaSsaPkcs1PublicKey) GetParams() *RsaSsaPkcs1Params { method GetN (line 157) | func (x *RsaSsaPkcs1PublicKey) GetN() []byte { method GetE (line 164) | func (x *RsaSsaPkcs1PublicKey) GetE() []byte { type RsaSsaPkcs1PrivateKey (line 172) | type RsaSsaPkcs1PrivateKey struct method Reset (line 208) | func (x *RsaSsaPkcs1PrivateKey) Reset() { method String (line 217) | func (x *RsaSsaPkcs1PrivateKey) String() string { method ProtoMessage (line 221) | func (*RsaSsaPkcs1PrivateKey) ProtoMessage() {} method ProtoReflect (line 223) | func (x *RsaSsaPkcs1PrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 236) | func (*RsaSsaPkcs1PrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 240) | func (x *RsaSsaPkcs1PrivateKey) GetVersion() uint32 { method GetPublicKey (line 247) | func (x *RsaSsaPkcs1PrivateKey) GetPublicKey() *RsaSsaPkcs1PublicKey { method GetD (line 254) | func (x *RsaSsaPkcs1PrivateKey) GetD() []byte { method GetP (line 261) | func (x *RsaSsaPkcs1PrivateKey) GetP() []byte { method GetQ (line 268) | func (x *RsaSsaPkcs1PrivateKey) GetQ() []byte { method GetDp (line 275) | func (x *RsaSsaPkcs1PrivateKey) GetDp() []byte { method GetDq (line 282) | func (x *RsaSsaPkcs1PrivateKey) GetDq() []byte { method GetCrt (line 289) | func (x *RsaSsaPkcs1PrivateKey) GetCrt() []byte { type RsaSsaPkcs1KeyFormat (line 296) | type RsaSsaPkcs1KeyFormat struct method Reset (line 309) | func (x *RsaSsaPkcs1KeyFormat) Reset() { method String (line 318) | func (x *RsaSsaPkcs1KeyFormat) String() string { method ProtoMessage (line 322) | func (*RsaSsaPkcs1KeyFormat) ProtoMessage() {} method ProtoReflect (line 324) | func (x *RsaSsaPkcs1KeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 337) | func (*RsaSsaPkcs1KeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 341) | func (x *RsaSsaPkcs1KeyFormat) GetParams() *RsaSsaPkcs1Params { method GetModulusSizeInBits (line 348) | func (x *RsaSsaPkcs1KeyFormat) GetModulusSizeInBits() uint32 { method GetPublicExponent (line 355) | func (x *RsaSsaPkcs1KeyFormat) GetPublicExponent() []byte { function file_third_party_tink_proto_rsa_ssa_pkcs1_proto_rawDescGZIP (line 423) | func file_third_party_tink_proto_rsa_ssa_pkcs1_proto_rawDescGZIP() []byte { function init (line 450) | func init() { file_third_party_tink_proto_rsa_ssa_pkcs1_proto_init() } function file_third_party_tink_proto_rsa_ssa_pkcs1_proto_init (line 451) | func file_third_party_tink_proto_rsa_ssa_pkcs1_proto_init() { FILE: go/proto/rsa_ssa_pss_go_proto/rsa_ssa_pss.pb.go constant _ (line 39) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 41) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type RsaSsaPssParams (line 44) | type RsaSsaPssParams struct method Reset (line 62) | func (x *RsaSsaPssParams) Reset() { method String (line 71) | func (x *RsaSsaPssParams) String() string { method ProtoMessage (line 75) | func (*RsaSsaPssParams) ProtoMessage() {} method ProtoReflect (line 77) | func (x *RsaSsaPssParams) ProtoReflect() protoreflect.Message { method Descriptor (line 90) | func (*RsaSsaPssParams) Descriptor() ([]byte, []int) { method GetSigHash (line 94) | func (x *RsaSsaPssParams) GetSigHash() common_go_proto.HashType { method GetMgf1Hash (line 101) | func (x *RsaSsaPssParams) GetMgf1Hash() common_go_proto.HashType { method GetSaltLength (line 108) | func (x *RsaSsaPssParams) GetSaltLength() int32 { type RsaSsaPssPublicKey (line 116) | type RsaSsaPssPublicKey struct method Reset (line 133) | func (x *RsaSsaPssPublicKey) Reset() { method String (line 142) | func (x *RsaSsaPssPublicKey) String() string { method ProtoMessage (line 146) | func (*RsaSsaPssPublicKey) ProtoMessage() {} method ProtoReflect (line 148) | func (x *RsaSsaPssPublicKey) ProtoReflect() protoreflect.Message { method Descriptor (line 161) | func (*RsaSsaPssPublicKey) Descriptor() ([]byte, []int) { method GetVersion (line 165) | func (x *RsaSsaPssPublicKey) GetVersion() uint32 { method GetParams (line 172) | func (x *RsaSsaPssPublicKey) GetParams() *RsaSsaPssParams { method GetN (line 179) | func (x *RsaSsaPssPublicKey) GetN() []byte { method GetE (line 186) | func (x *RsaSsaPssPublicKey) GetE() []byte { type RsaSsaPssPrivateKey (line 194) | type RsaSsaPssPrivateKey struct method Reset (line 230) | func (x *RsaSsaPssPrivateKey) Reset() { method String (line 239) | func (x *RsaSsaPssPrivateKey) String() string { method ProtoMessage (line 243) | func (*RsaSsaPssPrivateKey) ProtoMessage() {} method ProtoReflect (line 245) | func (x *RsaSsaPssPrivateKey) ProtoReflect() protoreflect.Message { method Descriptor (line 258) | func (*RsaSsaPssPrivateKey) Descriptor() ([]byte, []int) { method GetVersion (line 262) | func (x *RsaSsaPssPrivateKey) GetVersion() uint32 { method GetPublicKey (line 269) | func (x *RsaSsaPssPrivateKey) GetPublicKey() *RsaSsaPssPublicKey { method GetD (line 276) | func (x *RsaSsaPssPrivateKey) GetD() []byte { method GetP (line 283) | func (x *RsaSsaPssPrivateKey) GetP() []byte { method GetQ (line 290) | func (x *RsaSsaPssPrivateKey) GetQ() []byte { method GetDp (line 297) | func (x *RsaSsaPssPrivateKey) GetDp() []byte { method GetDq (line 304) | func (x *RsaSsaPssPrivateKey) GetDq() []byte { method GetCrt (line 311) | func (x *RsaSsaPssPrivateKey) GetCrt() []byte { type RsaSsaPssKeyFormat (line 318) | type RsaSsaPssKeyFormat struct method Reset (line 331) | func (x *RsaSsaPssKeyFormat) Reset() { method String (line 340) | func (x *RsaSsaPssKeyFormat) String() string { method ProtoMessage (line 344) | func (*RsaSsaPssKeyFormat) ProtoMessage() {} method ProtoReflect (line 346) | func (x *RsaSsaPssKeyFormat) ProtoReflect() protoreflect.Message { method Descriptor (line 359) | func (*RsaSsaPssKeyFormat) Descriptor() ([]byte, []int) { method GetParams (line 363) | func (x *RsaSsaPssKeyFormat) GetParams() *RsaSsaPssParams { method GetModulusSizeInBits (line 370) | func (x *RsaSsaPssKeyFormat) GetModulusSizeInBits() uint32 { method GetPublicExponent (line 377) | func (x *RsaSsaPssKeyFormat) GetPublicExponent() []byte { function file_third_party_tink_proto_rsa_ssa_pss_proto_rawDescGZIP (line 450) | func file_third_party_tink_proto_rsa_ssa_pss_proto_rawDescGZIP() []byte { function init (line 478) | func init() { file_third_party_tink_proto_rsa_ssa_pss_proto_init() } function file_third_party_tink_proto_rsa_ssa_pss_proto_init (line 479) | func file_third_party_tink_proto_rsa_ssa_pss_proto_init() { FILE: go/proto/tink_go_proto/tink.pb.go constant _ (line 36) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 38) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type KeyStatusType (line 41) | type KeyStatusType method Enum (line 66) | func (x KeyStatusType) Enum() *KeyStatusType { method String (line 72) | func (x KeyStatusType) String() string { method Descriptor (line 76) | func (KeyStatusType) Descriptor() protoreflect.EnumDescriptor { method Type (line 80) | func (KeyStatusType) Type() protoreflect.EnumType { method Number (line 84) | func (x KeyStatusType) Number() protoreflect.EnumNumber { method EnumDescriptor (line 89) | func (KeyStatusType) EnumDescriptor() ([]byte, []int) { constant KeyStatusType_UNKNOWN_STATUS (line 44) | KeyStatusType_UNKNOWN_STATUS KeyStatusType = 0 constant KeyStatusType_ENABLED (line 45) | KeyStatusType_ENABLED KeyStatusType = 1 constant KeyStatusType_DISABLED (line 46) | KeyStatusType_DISABLED KeyStatusType = 2 constant KeyStatusType_DESTROYED (line 47) | KeyStatusType_DESTROYED KeyStatusType = 3 type OutputPrefixType (line 107) | type OutputPrefixType method Enum (line 135) | func (x OutputPrefixType) Enum() *OutputPrefixType { method String (line 141) | func (x OutputPrefixType) String() string { method Descriptor (line 145) | func (OutputPrefixType) Descriptor() protoreflect.EnumDescriptor { method Type (line 149) | func (OutputPrefixType) Type() protoreflect.EnumType { method Number (line 153) | func (x OutputPrefixType) Number() protoreflect.EnumNumber { method EnumDescriptor (line 158) | func (OutputPrefixType) EnumDescriptor() ([]byte, []int) { constant OutputPrefixType_UNKNOWN_PREFIX (line 110) | OutputPrefixType_UNKNOWN_PREFIX OutputPrefixType = 0 constant OutputPrefixType_TINK (line 111) | OutputPrefixType_TINK OutputPrefixType = 1 constant OutputPrefixType_LEGACY (line 112) | OutputPrefixType_LEGACY OutputPrefixType = 2 constant OutputPrefixType_RAW (line 113) | OutputPrefixType_RAW OutputPrefixType = 3 constant OutputPrefixType_CRUNCHY (line 114) | OutputPrefixType_CRUNCHY OutputPrefixType = 4 type KeyData_KeyMaterialType (line 162) | type KeyData_KeyMaterialType method Enum (line 190) | func (x KeyData_KeyMaterialType) Enum() *KeyData_KeyMaterialType { method String (line 196) | func (x KeyData_KeyMaterialType) String() string { method Descriptor (line 200) | func (KeyData_KeyMaterialType) Descriptor() protoreflect.EnumDescriptor { method Type (line 204) | func (KeyData_KeyMaterialType) Type() protoreflect.EnumType { method Number (line 208) | func (x KeyData_KeyMaterialType) Number() protoreflect.EnumNumber { method EnumDescriptor (line 213) | func (KeyData_KeyMaterialType) EnumDescriptor() ([]byte, []int) { constant KeyData_UNKNOWN_KEYMATERIAL (line 165) | KeyData_UNKNOWN_KEYMATERIAL KeyData_KeyMaterialType = 0 constant KeyData_SYMMETRIC (line 166) | KeyData_SYMMETRIC KeyData_KeyMaterialType = 1 constant KeyData_ASYMMETRIC_PRIVATE (line 167) | KeyData_ASYMMETRIC_PRIVATE KeyData_KeyMaterialType = 2 constant KeyData_ASYMMETRIC_PUBLIC (line 168) | KeyData_ASYMMETRIC_PUBLIC KeyData_KeyMaterialType = 3 constant KeyData_REMOTE (line 169) | KeyData_REMOTE KeyData_KeyMaterialType = 4 type KeyTemplate (line 217) | type KeyTemplate struct method Reset (line 234) | func (x *KeyTemplate) Reset() { method String (line 243) | func (x *KeyTemplate) String() string { method ProtoMessage (line 247) | func (*KeyTemplate) ProtoMessage() {} method ProtoReflect (line 249) | func (x *KeyTemplate) ProtoReflect() protoreflect.Message { method Descriptor (line 262) | func (*KeyTemplate) Descriptor() ([]byte, []int) { method GetTypeUrl (line 266) | func (x *KeyTemplate) GetTypeUrl() string { method GetValue (line 273) | func (x *KeyTemplate) GetValue() []byte { method GetOutputPrefixType (line 280) | func (x *KeyTemplate) GetOutputPrefixType() OutputPrefixType { type KeyData (line 291) | type KeyData struct method Reset (line 305) | func (x *KeyData) Reset() { method String (line 314) | func (x *KeyData) String() string { method ProtoMessage (line 318) | func (*KeyData) ProtoMessage() {} method ProtoReflect (line 320) | func (x *KeyData) ProtoReflect() protoreflect.Message { method Descriptor (line 333) | func (*KeyData) Descriptor() ([]byte, []int) { method GetTypeUrl (line 337) | func (x *KeyData) GetTypeUrl() string { method GetValue (line 344) | func (x *KeyData) GetValue() []byte { method GetKeyMaterialType (line 351) | func (x *KeyData) GetKeyMaterialType() KeyData_KeyMaterialType { type Keyset (line 362) | type Keyset struct method Reset (line 375) | func (x *Keyset) Reset() { method String (line 384) | func (x *Keyset) String() string { method ProtoMessage (line 388) | func (*Keyset) ProtoMessage() {} method ProtoReflect (line 390) | func (x *Keyset) ProtoReflect() protoreflect.Message { method Descriptor (line 403) | func (*Keyset) Descriptor() ([]byte, []int) { method GetPrimaryKeyId (line 407) | func (x *Keyset) GetPrimaryKeyId() uint32 { method GetKey (line 414) | func (x *Keyset) GetKey() []*Keyset_Key { type KeysetInfo (line 424) | type KeysetInfo struct method Reset (line 436) | func (x *KeysetInfo) Reset() { method String (line 445) | func (x *KeysetInfo) String() string { method ProtoMessage (line 449) | func (*KeysetInfo) ProtoMessage() {} method ProtoReflect (line 451) | func (x *KeysetInfo) ProtoReflect() protoreflect.Message { method Descriptor (line 464) | func (*KeysetInfo) Descriptor() ([]byte, []int) { method GetPrimaryKeyId (line 468) | func (x *KeysetInfo) GetPrimaryKeyId() uint32 { method GetKeyInfo (line 475) | func (x *KeysetInfo) GetKeyInfo() []*KeysetInfo_KeyInfo { type EncryptedKeyset (line 483) | type EncryptedKeyset struct method Reset (line 494) | func (x *EncryptedKeyset) Reset() { method String (line 503) | func (x *EncryptedKeyset) String() string { method ProtoMessage (line 507) | func (*EncryptedKeyset) ProtoMessage() {} method ProtoReflect (line 509) | func (x *EncryptedKeyset) ProtoReflect() protoreflect.Message { method Descriptor (line 522) | func (*EncryptedKeyset) Descriptor() ([]byte, []int) { method GetEncryptedKeyset (line 526) | func (x *EncryptedKeyset) GetEncryptedKeyset() []byte { method GetKeysetInfo (line 533) | func (x *EncryptedKeyset) GetKeysetInfo() *KeysetInfo { type Keyset_Key (line 540) | type Keyset_Key struct method Reset (line 557) | func (x *Keyset_Key) Reset() { method String (line 566) | func (x *Keyset_Key) String() string { method ProtoMessage (line 570) | func (*Keyset_Key) ProtoMessage() {} method ProtoReflect (line 572) | func (x *Keyset_Key) ProtoReflect() protoreflect.Message { method Descriptor (line 585) | func (*Keyset_Key) Descriptor() ([]byte, []int) { method GetKeyData (line 589) | func (x *Keyset_Key) GetKeyData() *KeyData { method GetStatus (line 596) | func (x *Keyset_Key) GetStatus() KeyStatusType { method GetKeyId (line 603) | func (x *Keyset_Key) GetKeyId() uint32 { method GetOutputPrefixType (line 610) | func (x *Keyset_Key) GetOutputPrefixType() OutputPrefixType { type KeysetInfo_KeyInfo (line 617) | type KeysetInfo_KeyInfo struct method Reset (line 633) | func (x *KeysetInfo_KeyInfo) Reset() { method String (line 642) | func (x *KeysetInfo_KeyInfo) String() string { method ProtoMessage (line 646) | func (*KeysetInfo_KeyInfo) ProtoMessage() {} method ProtoReflect (line 648) | func (x *KeysetInfo_KeyInfo) ProtoReflect() protoreflect.Message { method Descriptor (line 661) | func (*KeysetInfo_KeyInfo) Descriptor() ([]byte, []int) { method GetTypeUrl (line 665) | func (x *KeysetInfo_KeyInfo) GetTypeUrl() string { method GetStatus (line 672) | func (x *KeysetInfo_KeyInfo) GetStatus() KeyStatusType { method GetKeyId (line 679) | func (x *KeysetInfo_KeyInfo) GetKeyId() uint32 { method GetOutputPrefixType (line 686) | func (x *KeysetInfo_KeyInfo) GetOutputPrefixType() OutputPrefixType { function file_third_party_tink_proto_tink_proto_rawDescGZIP (line 798) | func file_third_party_tink_proto_tink_proto_rawDescGZIP() []byte { function init (line 837) | func init() { file_third_party_tink_proto_tink_proto_init() } function file_third_party_tink_proto_tink_proto_init (line 838) | func file_third_party_tink_proto_tink_proto_init() { FILE: go/proto/xchacha20_poly1305_go_proto/xchacha20_poly1305.pb.go constant _ (line 34) | _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) constant _ (line 36) | _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) type XChaCha20Poly1305KeyFormat (line 39) | type XChaCha20Poly1305KeyFormat struct method Reset (line 47) | func (x *XChaCha20Poly1305KeyFormat) Reset() { method String (line 56) | func (x *XChaCha20Poly1305KeyFormat) String() string { method ProtoMessage (line 60) | func (*XChaCha20Poly1305KeyFormat) ProtoMessage() {} method ProtoReflect (line 62) | func (x *XChaCha20Poly1305KeyFormat) ProtoReflect() protoreflect.Messa... method Descriptor (line 75) | func (*XChaCha20Poly1305KeyFormat) Descriptor() ([]byte, []int) { method GetVersion (line 79) | func (x *XChaCha20Poly1305KeyFormat) GetVersion() uint32 { type XChaCha20Poly1305Key (line 87) | type XChaCha20Poly1305Key struct method Reset (line 96) | func (x *XChaCha20Poly1305Key) Reset() { method String (line 105) | func (x *XChaCha20Poly1305Key) String() string { method ProtoMessage (line 109) | func (*XChaCha20Poly1305Key) ProtoMessage() {} method ProtoReflect (line 111) | func (x *XChaCha20Poly1305Key) ProtoReflect() protoreflect.Message { method Descriptor (line 124) | func (*XChaCha20Poly1305Key) Descriptor() ([]byte, []int) { method GetVersion (line 128) | func (x *XChaCha20Poly1305Key) GetVersion() uint32 { method GetKeyValue (line 135) | func (x *XChaCha20Poly1305Key) GetKeyValue() []byte { function file_third_party_tink_proto_xchacha20_poly1305_proto_rawDescGZIP (line 172) | func file_third_party_tink_proto_xchacha20_poly1305_proto_rawDescGZIP() ... function init (line 192) | func init() { file_third_party_tink_proto_xchacha20_poly1305_proto_init() } function file_third_party_tink_proto_xchacha20_poly1305_proto_init (line 193) | func file_third_party_tink_proto_xchacha20_poly1305_proto_init() { FILE: go/signature/ecdsa_signer_key_manager.go constant ecdsaSignerKeyVersion (line 33) | ecdsaSignerKeyVersion = 0 constant ecdsaSignerTypeURL (line 34) | ecdsaSignerTypeURL = "type.googleapis.com/google.crypto.tink.EcdsaPri... type ecdsaSignerKeyManager (line 43) | type ecdsaSignerKeyManager struct method Primitive (line 46) | func (km *ecdsaSignerKeyManager) Primitive(serializedKey []byte) (any,... method NewKey (line 66) | func (km *ecdsaSignerKeyManager) NewKey(serializedKeyFormat []byte) (p... method NewKeyData (line 93) | func (km *ecdsaSignerKeyManager) NewKeyData(serializedKeyFormat []byte... method PublicKeyData (line 110) | func (km *ecdsaSignerKeyManager) PublicKeyData(serializedPrivKey []byt... method DoesSupport (line 127) | func (km *ecdsaSignerKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 132) | func (km *ecdsaSignerKeyManager) TypeURL() string { method validateKey (line 137) | func (km *ecdsaSignerKeyManager) validateKey(key *ecdsapb.EcdsaPrivate... method validateKeyFormat (line 146) | func (km *ecdsaSignerKeyManager) validateKeyFormat(format *ecdsapb.Ecd... FILE: go/signature/ecdsa_signer_key_manager_test.go type ecdsaParams (line 32) | type ecdsaParams struct function TestECDSASignerGetPrimitiveBasic (line 37) | func TestECDSASignerGetPrimitiveBasic(t *testing.T) { function TestECDSASignGetPrimitiveWithInvalidInput (line 55) | func TestECDSASignGetPrimitiveWithInvalidInput(t *testing.T) { function TestECDSASignNewKeyBasic (line 115) | func TestECDSASignNewKeyBasic(t *testing.T) { function TestECDSASignNewKeyWithInvalidInput (line 139) | func TestECDSASignNewKeyWithInvalidInput(t *testing.T) { function TestECDSASignNewKeyMultipleTimes (line 189) | func TestECDSASignNewKeyMultipleTimes(t *testing.T) { function TestECDSASignNewKeyDataBasic (line 229) | func TestECDSASignNewKeyDataBasic(t *testing.T) { function TestECDSASignNewKeyDataWithInvalidInput (line 265) | func TestECDSASignNewKeyDataWithInvalidInput(t *testing.T) { function TestPublicKeyDataBasic (line 289) | func TestPublicKeyDataBasic(t *testing.T) { function TestPublicKeyDataWithInvalidInput (line 323) | func TestPublicKeyDataWithInvalidInput(t *testing.T) { function validateECDSAPrivateKey (line 351) | func validateECDSAPrivateKey(key *ecdsapb.EcdsaPrivateKey, params *ecdsa... function genValidECDSAParams (line 408) | func genValidECDSAParams() []ecdsaParams { function genUnkownECDSAParams (line 429) | func genUnkownECDSAParams() []ecdsaParams { function genInvalidECDSAParams (line 442) | func genInvalidECDSAParams() []ecdsaParams { FILE: go/signature/ecdsa_verifier_key_manager.go constant ecdsaVerifierKeyVersion (line 28) | ecdsaVerifierKeyVersion = 0 constant ecdsaVerifierTypeURL (line 29) | ecdsaVerifierTypeURL = "type.googleapis.com/google.crypto.tink.EcdsaP... type ecdsaVerifierKeyManager (line 38) | type ecdsaVerifierKeyManager struct method Primitive (line 41) | func (km *ecdsaVerifierKeyManager) Primitive(serializedKey []byte) (an... method NewKey (line 61) | func (km *ecdsaVerifierKeyManager) NewKey(serializedKeyFormat []byte) ... method NewKeyData (line 67) | func (km *ecdsaVerifierKeyManager) NewKeyData(serializedKeyFormat []by... method DoesSupport (line 72) | func (km *ecdsaVerifierKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 77) | func (km *ecdsaVerifierKeyManager) TypeURL() string { method validateKey (line 82) | func (km *ecdsaVerifierKeyManager) validateKey(key *ecdsapb.EcdsaPubli... FILE: go/signature/ecdsa_verifier_key_manager_test.go function TestECDSAVerifyGetPrimitiveBasic (line 26) | func TestECDSAVerifyGetPrimitiveBasic(t *testing.T) { function TestECDSAVerifyWithInvalidPublicKeyFailsCreatingPrimitive (line 44) | func TestECDSAVerifyWithInvalidPublicKeyFailsCreatingPrimitive(t *testin... function TestECDSAVerifyGetPrimitiveWithInvalidInput (line 61) | func TestECDSAVerifyGetPrimitiveWithInvalidInput(t *testing.T) { FILE: go/signature/ed25519_signer_key_manager.go constant ed25519SignerKeyVersion (line 32) | ed25519SignerKeyVersion = 0 constant ed25519SignerTypeURL (line 33) | ed25519SignerTypeURL = "type.googleapis.com/google.crypto.tink.Ed2551... type ed25519SignerKeyManager (line 42) | type ed25519SignerKeyManager struct method Primitive (line 45) | func (km *ed25519SignerKeyManager) Primitive(serializedKey []byte) (an... method NewKey (line 66) | func (km *ed25519SignerKeyManager) NewKey(serializedKeyFormat []byte) ... method NewKeyData (line 83) | func (km *ed25519SignerKeyManager) NewKeyData(serializedKeyFormat []by... method PublicKeyData (line 100) | func (km *ed25519SignerKeyManager) PublicKeyData(serializedPrivKey []b... method DoesSupport (line 117) | func (km *ed25519SignerKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 122) | func (km *ed25519SignerKeyManager) TypeURL() string { method KeyMaterialType (line 127) | func (km *ed25519SignerKeyManager) KeyMaterialType() tinkpb.KeyData_Ke... method DeriveKey (line 133) | func (km *ed25519SignerKeyManager) DeriveKey(serializedKeyFormat []byt... method validateKey (line 158) | func (km *ed25519SignerKeyManager) validateKey(key *ed25519pb.Ed25519P... FILE: go/signature/ed25519_signer_key_manager_test.go function TestED25519SignerGetPrimitiveBasic (line 35) | func TestED25519SignerGetPrimitiveBasic(t *testing.T) { function TestED25519SignGetPrimitiveWithInvalidInput (line 78) | func TestED25519SignGetPrimitiveWithInvalidInput(t *testing.T) { function TestED25519SignNewKeyBasic (line 104) | func TestED25519SignNewKeyBasic(t *testing.T) { function TestED25519PublicKeyDataBasic (line 123) | func TestED25519PublicKeyDataBasic(t *testing.T) { function TestED25519PublicKeyDataWithInvalidInput (line 155) | func TestED25519PublicKeyDataWithInvalidInput(t *testing.T) { function TestED25519KeyMaterialType (line 180) | func TestED25519KeyMaterialType(t *testing.T) { function TestED25519DeriveKey (line 194) | func TestED25519DeriveKey(t *testing.T) { function TestED25519DeriveKeyFailsWithInvalidKeyFormats (line 251) | func TestED25519DeriveKeyFailsWithInvalidKeyFormats(t *testing.T) { function TestED25519DeriveKeyFailsWithInsufficientRandomness (line 292) | func TestED25519DeriveKeyFailsWithInsufficientRandomness(t *testing.T) { function validateED25519PrivateKey (line 319) | func validateED25519PrivateKey(key *ed25519pb.Ed25519PrivateKey) error { FILE: go/signature/ed25519_verifier_key_manager.go constant ed25519VerifierKeyVersion (line 29) | ed25519VerifierKeyVersion = 0 constant ed25519VerifierTypeURL (line 30) | ed25519VerifierTypeURL = "type.googleapis.com/google.crypto.tink.Ed25... type ed25519VerifierKeyManager (line 39) | type ed25519VerifierKeyManager struct method Primitive (line 42) | func (km *ed25519VerifierKeyManager) Primitive(serializedKey []byte) (... method NewKey (line 61) | func (km *ed25519VerifierKeyManager) NewKey(serializedKeyFormat []byte... method NewKeyData (line 67) | func (km *ed25519VerifierKeyManager) NewKeyData(serializedKeyFormat []... method DoesSupport (line 72) | func (km *ed25519VerifierKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 77) | func (km *ed25519VerifierKeyManager) TypeURL() string { method validateKey (line 82) | func (km *ed25519VerifierKeyManager) validateKey(key *ed25519pb.Ed2551... FILE: go/signature/ed25519_verifier_key_manager_test.go function TestED25519VerifyGetPrimitiveBasic (line 25) | func TestED25519VerifyGetPrimitiveBasic(t *testing.T) { function TestED25519VerifyGetPrimitiveWithInvalidInput (line 40) | func TestED25519VerifyGetPrimitiveWithInvalidInput(t *testing.T) { FILE: go/signature/proto.go function getECDSAParamNames (line 24) | func getECDSAParamNames(params *ecdsapb.EcdsaParams) (string, string, st... function newECDSAPrivateKey (line 32) | func newECDSAPrivateKey(version uint32, publicKey *ecdsapb.EcdsaPublicKe... function newECDSAPublicKey (line 41) | func newECDSAPublicKey(version uint32, params *ecdsapb.EcdsaParams, x, y... FILE: go/signature/rsa.go function bytesToBigInt (line 25) | func bytesToBigInt(val []byte) *big.Int { function validateRSAPubKeyParams (line 29) | func validateRSAPubKeyParams(h commonpb.HashType, modSizeBits int, pubEx... function hashName (line 43) | func hashName(h commonpb.HashType) string { FILE: go/signature/rsassapkcs1_signer_key_manager.go constant rsaSSAPKCS1SignerKeyVersion (line 33) | rsaSSAPKCS1SignerKeyVersion = 0 constant rsaSSAPKCS1SignerTypeURL (line 34) | rsaSSAPKCS1SignerTypeURL = "type.googleapis.com/google.crypto.tink.Rs... type rsaSSAPKCS1SignerKeyManager (line 42) | type rsaSSAPKCS1SignerKeyManager struct method Primitive (line 46) | func (km *rsaSSAPKCS1SignerKeyManager) Primitive(serializedKey []byte)... method NewKey (line 103) | func (km *rsaSSAPKCS1SignerKeyManager) NewKey(serializedKeyFormat []by... method NewKeyData (line 146) | func (km *rsaSSAPKCS1SignerKeyManager) NewKeyData(serializedKeyFormat ... method PublicKeyData (line 163) | func (km *rsaSSAPKCS1SignerKeyManager) PublicKeyData(serializedPrivKey... method DoesSupport (line 183) | func (km *rsaSSAPKCS1SignerKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 188) | func (km *rsaSSAPKCS1SignerKeyManager) TypeURL() string { function validateRSAPKCS1PrivateKey (line 86) | func validateRSAPKCS1PrivateKey(privKey *rsassapkcs1pb.RsaSsaPkcs1Privat... FILE: go/signature/rsassapkcs1_signer_key_manager_test.go constant rsaPKCS1PrivateKeyTypeURL (line 34) | rsaPKCS1PrivateKeyTypeURL = "type.googleapis.com/google.crypto.tink.RsaS... function TestRSASSAPKCS1SignerKeyManagerDoesSupport (line 37) | func TestRSASSAPKCS1SignerKeyManagerDoesSupport(t *testing.T) { function TestRSASSAPKCS1SignerTypeURL (line 50) | func TestRSASSAPKCS1SignerTypeURL(t *testing.T) { function TestRSASSAPKCS1SignerKeyManagerPublicKeyData (line 60) | func TestRSASSAPKCS1SignerKeyManagerPublicKeyData(t *testing.T) { function TestRSASSAPKCS1SignerKeyManagerPrimitiveSignVerify (line 92) | func TestRSASSAPKCS1SignerKeyManagerPrimitiveSignVerify(t *testing.T) { function TestRSASSAPKCS1SignerKeyManagerPrimitiveWithInvalidInputFails (line 139) | func TestRSASSAPKCS1SignerKeyManagerPrimitiveWithInvalidInputFails(t *te... function TestRSASSAPKCS1SignerKeyManagerPrimitiveWithCorruptedKeyFails (line 350) | func TestRSASSAPKCS1SignerKeyManagerPrimitiveWithCorruptedKeyFails(t *te... function TestRSASSAPKCS1SignerKeyManagerPrimitiveNewKey (line 370) | func TestRSASSAPKCS1SignerKeyManagerPrimitiveNewKey(t *testing.T) { function TestRSASSAPKCS1SignerKeyManagerPrimitiveNewKeyWithInvalidInputFails (line 415) | func TestRSASSAPKCS1SignerKeyManagerPrimitiveNewKeyWithInvalidInputFails... function TestRSASSAPKCS1SignerKeyManagerPrimitiveNewKeyData (line 472) | func TestRSASSAPKCS1SignerKeyManagerPrimitiveNewKeyData(t *testing.T) { function TestRSASSAPKCS1SignerKeyManagerPrimitiveNISTTestVectors (line 503) | func TestRSASSAPKCS1SignerKeyManagerPrimitiveNISTTestVectors(t *testing.... FILE: go/signature/rsassapkcs1_verifier_key_manager.go constant rsaSSAPKCS1VerifierKeyVersion (line 31) | rsaSSAPKCS1VerifierKeyVersion = 0 constant rsaSSAPKCS1VerifierTypeURL (line 32) | rsaSSAPKCS1VerifierTypeURL = "type.googleapis.com/google.crypto.tink.... type rsaSSAPKCS1VerifierKeyManager (line 39) | type rsaSSAPKCS1VerifierKeyManager struct method Primitive (line 43) | func (km *rsaSSAPKCS1VerifierKeyManager) Primitive(serializedKey []byt... method NewKey (line 71) | func (km *rsaSSAPKCS1VerifierKeyManager) NewKey(serializedKeyFormat []... method NewKeyData (line 75) | func (km *rsaSSAPKCS1VerifierKeyManager) NewKeyData(serializedKeyForma... method DoesSupport (line 79) | func (km *rsaSSAPKCS1VerifierKeyManager) DoesSupport(typeURL string) b... method TypeURL (line 83) | func (km *rsaSSAPKCS1VerifierKeyManager) TypeURL() string { function validateRSAPKCS1PublicKey (line 61) | func validateRSAPKCS1PublicKey(pubKey *rsassapkcs1pb.RsaSsaPkcs1PublicKe... FILE: go/signature/rsassapkcs1_verifier_key_manager_test.go constant rsaPKCS1PublicTypeURL (line 34) | rsaPKCS1PublicTypeURL = "type.googleapis.com/google.crypto.tink.RsaSsaPk... function makeValidRSAPKCS1Key (line 37) | func makeValidRSAPKCS1Key() (*rsassapkcs1pb.RsaSsaPkcs1PrivateKey, error) { function TestRSASSAPKCS1VerifierDoesSupport (line 61) | func TestRSASSAPKCS1VerifierDoesSupport(t *testing.T) { function TestRSASSAPKCS1VerifierTypeURL (line 74) | func TestRSASSAPKCS1VerifierTypeURL(t *testing.T) { function TestRSASSAPKCS1VerifierNotImplemented (line 84) | func TestRSASSAPKCS1VerifierNotImplemented(t *testing.T) { function TestRSASSAPKCS1VerifierPrimitive (line 107) | func TestRSASSAPKCS1VerifierPrimitive(t *testing.T) { function TestRSASSAPKCS1VerifierPrimitiveWithInvalidInput (line 129) | func TestRSASSAPKCS1VerifierPrimitiveWithInvalidInput(t *testing.T) { type nistRSAPKCS1TestVector (line 261) | type nistRSAPKCS1TestVector struct method ToProtoKey (line 269) | func (t *nistRSAPKCS1TestVector) ToProtoKey() (*rsassapkcs1pb.RsaSsaPk... function TestRSASSAPKCS1VerifierPrimitiveNISTTestVectors (line 391) | func TestRSASSAPKCS1VerifierPrimitiveNISTTestVectors(t *testing.T) { FILE: go/signature/rsassapss_signer_key_manager.go constant rsaSSAPSSSignerKeyVersion (line 34) | rsaSSAPSSSignerKeyVersion = 0 constant rsaSSAPSSSignerTypeURL (line 35) | rsaSSAPSSSignerTypeURL = "type.googleapis.com/google.crypto.tink.RsaS... type rsaSSAPSSSignerKeyManager (line 42) | type rsaSSAPSSSignerKeyManager struct method Primitive (line 46) | func (km *rsaSSAPSSSignerKeyManager) Primitive(serializedKey []byte) (... method PublicKeyData (line 106) | func (km *rsaSSAPSSSignerKeyManager) PublicKeyData(serializedPrivKey [... method NewKey (line 128) | func (km *rsaSSAPSSSignerKeyManager) NewKey(serializedKeyFormat []byte... method NewKeyData (line 175) | func (km *rsaSSAPSSSignerKeyManager) NewKeyData(serializedKeyFormat []... method DoesSupport (line 191) | func (km *rsaSSAPSSSignerKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 195) | func (km *rsaSSAPSSSignerKeyManager) TypeURL() string { function validateRSAPSSPrivateKey (line 86) | func validateRSAPSSPrivateKey(privKey *rsassapsspb.RsaSsaPssPrivateKey) ... FILE: go/signature/rsassapss_signer_key_manager_test.go constant rsaPSSTestPrivateKeyTypeURL (line 33) | rsaPSSTestPrivateKeyTypeURL = "type.googleapis.com/google.crypto.tink.Rs... constant rsaPSSTestPrivateKeyVersion (line 34) | rsaPSSTestPrivateKeyVersion = 0 function TestRSASSAPSSSignerKeyManagerDoesSupport (line 37) | func TestRSASSAPSSSignerKeyManagerDoesSupport(t *testing.T) { function TestRSASSAPSSSignerKeyManagerTypeURL (line 50) | func TestRSASSAPSSSignerKeyManagerTypeURL(t *testing.T) { function TestRSASSAPSSSignerGetPrimitive (line 60) | func TestRSASSAPSSSignerGetPrimitive(t *testing.T) { function mergePrivPub (line 101) | func mergePrivPub(priv *rsppb.RsaSsaPssPrivateKey, pub *rsppb.RsaSsaPssP... function TestRSASSAPSSSignerGetPrimitiveWithInvalidInput (line 114) | func TestRSASSAPSSSignerGetPrimitiveWithInvalidInput(t *testing.T) { function TestRSASSAPSSSignerGetPrimitiveWithCorruptedPrivateKey (line 358) | func TestRSASSAPSSSignerGetPrimitiveWithCorruptedPrivateKey(t *testing.T) { function TestRSASSAPSSSignerNewKey (line 379) | func TestRSASSAPSSSignerNewKey(t *testing.T) { function TestRSASSAPSSSignerNewKeyData (line 439) | func TestRSASSAPSSSignerNewKeyData(t *testing.T) { function TestRSASSAPSSSignerNewKeyFailsWithInvalidFormat (line 502) | func TestRSASSAPSSSignerNewKeyFailsWithInvalidFormat(t *testing.T) { function TestRSASSAPSSSignerPublicKeyData (line 604) | func TestRSASSAPSSSignerPublicKeyData(t *testing.T) { FILE: go/signature/rsassapss_verifier_key_manager.go constant rsaSSAPSSVerifierKeyVersion (line 32) | rsaSSAPSSVerifierKeyVersion = 0 constant rsaSSAPSSVerifierTypeURL (line 33) | rsaSSAPSSVerifierTypeURL = "type.googleapis.com/google.crypto.tink.Rs... type rsaSSAPSSVerifierKeyManager (line 41) | type rsaSSAPSSVerifierKeyManager struct method Primitive (line 45) | func (km *rsaSSAPSSVerifierKeyManager) Primitive(serializedKey []byte)... method NewKey (line 79) | func (km *rsaSSAPSSVerifierKeyManager) NewKey(serializedKeyFormat []by... method NewKeyData (line 83) | func (km *rsaSSAPSSVerifierKeyManager) NewKeyData(serializedKeyFormat ... method DoesSupport (line 87) | func (km *rsaSSAPSSVerifierKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 91) | func (km *rsaSSAPSSVerifierKeyManager) TypeURL() string { function validateRSAPSSPublicKey (line 63) | func validateRSAPSSPublicKey(pubKey *rsassapsspb.RsaSsaPssPublicKey) err... FILE: go/signature/rsassapss_verifier_key_manager_test.go constant rsaPSSTestPublicKeyTypeURL (line 34) | rsaPSSTestPublicKeyTypeURL = "type.googleapis.com/google.crypto.tink.Rsa... function makeValidRSAPSSKey (line 37) | func makeValidRSAPSSKey() (*rsppb.RsaSsaPssPrivateKey, error) { function TestRSASSAPSSVerifierNewKeyNotSupported (line 63) | func TestRSASSAPSSVerifierNewKeyNotSupported(t *testing.T) { function TestRSASSAPSSVerifierDoesSupport (line 89) | func TestRSASSAPSSVerifierDoesSupport(t *testing.T) { function TestRSASSAPSSVerifierTypeURL (line 102) | func TestRSASSAPSSVerifierTypeURL(t *testing.T) { type nistRSATestKey (line 112) | type nistRSATestKey struct type nistRSAPSSTestVector (line 145) | type nistRSAPSSTestVector struct method ProtoKey (line 233) | func (t *nistRSAPSSTestVector) ProtoKey() (*rsppb.RsaSsaPssPublicKey, ... function TestRSASSAPSSVerifierPrimitive (line 254) | func TestRSASSAPSSVerifierPrimitive(t *testing.T) { function TestRSASSAPSSVerifierPrimitiveFailsWithInvalidKey (line 292) | func TestRSASSAPSSVerifierPrimitiveFailsWithInvalidKey(t *testing.T) { FILE: go/signature/signature.go function init (line 28) | func init() { FILE: go/signature/signature_benchmark_test.go constant benchmarkDataSize (line 28) | benchmarkDataSize = 16 * 1024 function BenchmarkSign (line 61) | func BenchmarkSign(b *testing.B) { function BenchmarkVerify (line 86) | func BenchmarkVerify(b *testing.B) { FILE: go/signature/signature_factory_test.go function TestSignerVerifyFactory (line 40) | func TestSignerVerifyFactory(t *testing.T) { function TestPrimitiveFactoryFailsWhenKeysetHasNoPrimary (line 107) | func TestPrimitiveFactoryFailsWhenKeysetHasNoPrimary(t *testing.T) { function newECDSAKeysetKeypair (line 133) | func newECDSAKeysetKeypair(t *testing.T, hashType commonpb.HashType, cur... function TestFactoryWithInvalidPrimitiveSetType (line 156) | func TestFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestFactoryWithValidPrimitiveSetType (line 173) | func TestFactoryWithValidPrimitiveSetType(t *testing.T) { function TestPrimitiveFactorySignVerifyWithoutAnnotationsDoesNothing (line 195) | func TestPrimitiveFactorySignVerifyWithoutAnnotationsDoesNothing(t *test... function TestPrimitiveFactoryMonitoringWithAnnotationsLogSignVerify (line 233) | func TestPrimitiveFactoryMonitoringWithAnnotationsLogSignVerify(t *testi... type alwaysFailingSigner (line 325) | type alwaysFailingSigner struct method Sign (line 327) | func (a *alwaysFailingSigner) Sign(data []byte) ([]byte, error) { retu... function TestPrimitiveFactoryMonitoringWithAnnotationsSignFailureIsLogged (line 329) | func TestPrimitiveFactoryMonitoringWithAnnotationsSignFailureIsLogged(t ... function TestPrimitiveFactoryMonitoringWithAnnotationsVerifyFailureIsLogged (line 403) | func TestPrimitiveFactoryMonitoringWithAnnotationsVerifyFailureIsLogged(... function TestVerifyWithLegacyKeyDoesNotHaveSideEffectOnMessage (line 462) | func TestVerifyWithLegacyKeyDoesNotHaveSideEffectOnMessage(t *testing.T) { FILE: go/signature/signature_init_test.go function TestSignatureInit (line 24) | func TestSignatureInit(t *testing.T) { FILE: go/signature/signature_key_templates.go function ECDSAP256KeyTemplate (line 37) | func ECDSAP256KeyTemplate() *tinkpb.KeyTemplate { function ECDSAP256KeyWithoutPrefixTemplate (line 52) | func ECDSAP256KeyWithoutPrefixTemplate() *tinkpb.KeyTemplate { function ECDSAP256RawKeyTemplate (line 65) | func ECDSAP256RawKeyTemplate() *tinkpb.KeyTemplate { function ECDSAP384SHA384KeyTemplate (line 77) | func ECDSAP384SHA384KeyTemplate() *tinkpb.KeyTemplate { function ECDSAP384SHA384KeyWithoutPrefixTemplate (line 89) | func ECDSAP384SHA384KeyWithoutPrefixTemplate() *tinkpb.KeyTemplate { function ECDSAP384SHA512KeyTemplate (line 101) | func ECDSAP384SHA512KeyTemplate() *tinkpb.KeyTemplate { function ECDSAP384KeyWithoutPrefixTemplate (line 114) | func ECDSAP384KeyWithoutPrefixTemplate() *tinkpb.KeyTemplate { function ECDSAP521KeyTemplate (line 126) | func ECDSAP521KeyTemplate() *tinkpb.KeyTemplate { function ECDSAP521KeyWithoutPrefixTemplate (line 139) | func ECDSAP521KeyWithoutPrefixTemplate() *tinkpb.KeyTemplate { function createECDSAKeyTemplate (line 148) | func createECDSAKeyTemplate(hashType commonpb.HashType, curve commonpb.E... function ED25519KeyTemplate (line 167) | func ED25519KeyTemplate() *tinkpb.KeyTemplate { function ED25519KeyWithoutPrefixTemplate (line 175) | func ED25519KeyWithoutPrefixTemplate() *tinkpb.KeyTemplate { function create_RSA_SSA_PKCS1_Template (line 182) | func create_RSA_SSA_PKCS1_Template(prefixType tinkpb.OutputPrefixType, h... function create_RSA_SSA_PSS_Template (line 201) | func create_RSA_SSA_PSS_Template(prefixType tinkpb.OutputPrefixType, has... function RSA_SSA_PKCS1_3072_SHA256_F4_Key_Template (line 228) | func RSA_SSA_PKCS1_3072_SHA256_F4_Key_Template() *tinkpb.KeyTemplate { function RSA_SSA_PKCS1_3072_SHA256_F4_RAW_Key_Template (line 238) | func RSA_SSA_PKCS1_3072_SHA256_F4_RAW_Key_Template() *tinkpb.KeyTemplate { function RSA_SSA_PKCS1_4096_SHA512_F4_Key_Template (line 248) | func RSA_SSA_PKCS1_4096_SHA512_F4_Key_Template() *tinkpb.KeyTemplate { function RSA_SSA_PKCS1_4096_SHA512_F4_RAW_Key_Template (line 258) | func RSA_SSA_PKCS1_4096_SHA512_F4_RAW_Key_Template() *tinkpb.KeyTemplate { function RSA_SSA_PSS_3072_SHA256_32_F4_Key_Template (line 270) | func RSA_SSA_PSS_3072_SHA256_32_F4_Key_Template() *tinkpb.KeyTemplate { function RSA_SSA_PSS_3072_SHA256_32_F4_Raw_Key_Template (line 282) | func RSA_SSA_PSS_3072_SHA256_32_F4_Raw_Key_Template() *tinkpb.KeyTemplate { function RSA_SSA_PSS_4096_SHA512_64_F4_Key_Template (line 294) | func RSA_SSA_PSS_4096_SHA512_64_F4_Key_Template() *tinkpb.KeyTemplate { function RSA_SSA_PSS_4096_SHA512_64_F4_Raw_Key_Template (line 306) | func RSA_SSA_PSS_4096_SHA512_64_F4_Raw_Key_Template() *tinkpb.KeyTemplate { FILE: go/signature/signature_key_templates_test.go function TestKeyTemplates (line 26) | func TestKeyTemplates(t *testing.T) { function testSignVerify (line 75) | func testSignVerify(template *tinkpb.KeyTemplate) error { FILE: go/signature/signature_test.go function Example (line 29) | func Example() { FILE: go/signature/signer_factory.go function NewSigner (line 30) | func NewSigner(handle *keyset.Handle) (tink.Signer, error) { type wrappedSigner (line 39) | type wrappedSigner struct method Sign (line 87) | func (s *wrappedSigner) Sign(data []byte) ([]byte, error) { function newWrappedSigner (line 47) | func newWrappedSigner(ps *primitiveset.PrimitiveSet) (*wrappedSigner, er... function createSignerLogger (line 69) | func createSignerLogger(ps *primitiveset.PrimitiveSet) (monitoring.Logge... FILE: go/signature/subtle/ecdsa.go type ECDSASignature (line 26) | type ECDSASignature struct method EncodeECDSASignature (line 36) | func (sig *ECDSASignature) EncodeECDSASignature(encoding, curveName st... function NewECDSASignature (line 31) | func NewECDSASignature(r, s *big.Int) *ECDSASignature { function DecodeECDSASignature (line 56) | func DecodeECDSASignature(encodedBytes []byte, encoding string) (*ECDSAS... function ValidateECDSAParams (line 76) | func ValidateECDSAParams(hashAlg string, curve string, encoding string) ... FILE: go/signature/subtle/ecdsa_signer.go type ECDSASigner (line 30) | type ECDSASigner struct method Sign (line 67) | func (e *ECDSASigner) Sign(data []byte) ([]byte, error) { function NewECDSASigner (line 37) | func NewECDSASigner(hashAlg, curve, encoding string, keyValue []byte) (*... function NewECDSASignerFromPrivateKey (line 50) | func NewECDSASignerFromPrivateKey(hashAlg, encoding string, privateKey *... FILE: go/signature/subtle/ecdsa_signer_verifier_test.go function TestSignVerify (line 29) | func TestSignVerify(t *testing.T) { function TestECDSAInvalidPublicKey (line 75) | func TestECDSAInvalidPublicKey(t *testing.T) { function TestECDSAInvalidCurve (line 81) | func TestECDSAInvalidCurve(t *testing.T) { function TestECDSAWycheproofCases (line 91) | func TestECDSAWycheproofCases(t *testing.T) { FILE: go/signature/subtle/ecdsa_test.go type paramsTestECDSA (line 27) | type paramsTestECDSA struct function TestECDSAEncodeDecodeDER (line 33) | func TestECDSAEncodeDecodeDER(t *testing.T) { function TestECDSAEncodeDecodeIEEEP1363 (line 64) | func TestECDSAEncodeDecodeIEEEP1363(t *testing.T) { function TestECDSAEncodeWithInvalidInput (line 102) | func TestECDSAEncodeWithInvalidInput(t *testing.T) { function TestECDSADecodeWithModifiedFirstByte (line 110) | func TestECDSADecodeWithModifiedFirstByte(t *testing.T) { function TestECDSADecodeWithModifiedTag (line 122) | func TestECDSADecodeWithModifiedTag(t *testing.T) { function TestECDSADecodeWithModifiedLength (line 134) | func TestECDSADecodeWithModifiedLength(t *testing.T) { function TestECDSADecodeWithUnusedZeros (line 146) | func TestECDSADecodeWithUnusedZeros(t *testing.T) { function TestECDSADecodeWithStructWithThreeNumbers (line 159) | func TestECDSADecodeWithStructWithThreeNumbers(t *testing.T) { function TestECDSAValidateParams (line 174) | func TestECDSAValidateParams(t *testing.T) { function genECDSAInvalidParams (line 189) | func genECDSAInvalidParams() []paramsTestECDSA { function genECDSAValidParams (line 214) | func genECDSAValidParams() []paramsTestECDSA { function newECDSARandomSignature (line 227) | func newECDSARandomSignature() *subtle.ECDSASignature { FILE: go/signature/subtle/ecdsa_verifier.go type ECDSAVerifier (line 31) | type ECDSAVerifier struct method Verify (line 69) | func (e *ECDSAVerifier) Verify(signatureBytes, data []byte) error { function NewECDSAVerifier (line 38) | func NewECDSAVerifier(hashAlg string, curve string, encoding string, x [... function NewECDSAVerifierFromPublicKey (line 48) | func NewECDSAVerifierFromPublicKey(hashAlg string, encoding string, publ... FILE: go/signature/subtle/ed25519_signer.go type ED25519Signer (line 22) | type ED25519Signer struct method Sign (line 40) | func (e *ED25519Signer) Sign(data []byte) ([]byte, error) { function NewED25519Signer (line 27) | func NewED25519Signer(keyValue []byte) (*ED25519Signer, error) { function NewED25519SignerFromPrivateKey (line 33) | func NewED25519SignerFromPrivateKey(privateKey *ed25519.PrivateKey) (*ED... FILE: go/signature/subtle/ed25519_signer_verifier_test.go function TestED25519Deterministic (line 30) | func TestED25519Deterministic(t *testing.T) { function TestEd25519VerifyModifiedSignature (line 63) | func TestEd25519VerifyModifiedSignature(t *testing.T) { function TestEd25519VerifyModifiedMessage (line 89) | func TestEd25519VerifyModifiedMessage(t *testing.T) { function TestED25519SignVerify (line 116) | func TestED25519SignVerify(t *testing.T) { function TestED25519WycheproofCases (line 154) | func TestED25519WycheproofCases(t *testing.T) { function newSignerVerifier (line 216) | func newSignerVerifier(t *testing.T, pvtKey *ed25519.PrivateKey, pubKey ... FILE: go/signature/subtle/ed25519_verifier.go type ED25519Verifier (line 27) | type ED25519Verifier struct method Verify (line 46) | func (e *ED25519Verifier) Verify(signature, data []byte) error { function NewED25519Verifier (line 32) | func NewED25519Verifier(pub []byte) (*ED25519Verifier, error) { function NewED25519VerifierFromPublicKey (line 38) | func NewED25519VerifierFromPublicKey(publicKey *ed25519.PublicKey) (*ED2... FILE: go/signature/subtle/encoding.go function asn1encode (line 26) | func asn1encode(sig *ECDSASignature) ([]byte, error) { function asn1decode (line 42) | func asn1decode(b []byte) (*ECDSASignature, error) { function ieeeSignatureSize (line 60) | func ieeeSignatureSize(curveName string) (int, error) { function ieeeP1363Encode (line 73) | func ieeeP1363Encode(sig *ECDSASignature, curveName string) ([]byte, err... function ieeeP1363Decode (line 100) | func ieeeP1363Decode(encodedBytes []byte) (*ECDSASignature, error) { FILE: go/signature/subtle/subtle_test.go type ecdsaSuite (line 19) | type ecdsaSuite struct type ecdsaGroup (line 24) | type ecdsaGroup struct type ecdsaCase (line 35) | type ecdsaCase struct type ecdsaTestKey (line 41) | type ecdsaTestKey struct type ecdsaJWK (line 48) | type ecdsaJWK struct type ed25519Suite (line 57) | type ed25519Suite struct type ed25519Group (line 62) | type ed25519Group struct type ed25519Case (line 72) | type ed25519Case struct type ed25519TestKey (line 78) | type ed25519TestKey struct FILE: go/signature/verifier_factory.go function NewVerifier (line 32) | func NewVerifier(handle *keyset.Handle) (tink.Verifier, error) { type wrappedVerifier (line 42) | type wrappedVerifier struct method Verify (line 91) | func (v *wrappedVerifier) Verify(signature, data []byte) error { function newWrappedVerifier (line 50) | func newWrappedVerifier(ps *primitiveset.PrimitiveSet) (*wrappedVerifier... function createVerifierLogger (line 72) | func createVerifierLogger(ps *primitiveset.PrimitiveSet) (monitoring.Log... FILE: go/streamingaead/aes_ctr_hmac_key_manager.go constant aesCTRHMACKeyVersion (line 33) | aesCTRHMACKeyVersion = 0 constant aesCTRHMACTypeURL (line 34) | aesCTRHMACTypeURL = "type.googleapis.com/google.crypto.tink.AesCtrHma... type aesCTRHMACKeyManager (line 46) | type aesCTRHMACKeyManager struct method Primitive (line 50) | func (km *aesCTRHMACKeyManager) Primitive(serializedKey []byte) (any, ... method NewKey (line 78) | func (km *aesCTRHMACKeyManager) NewKey(serializedKeyFormat []byte) (pr... method NewKeyData (line 100) | func (km *aesCTRHMACKeyManager) NewKeyData(serializedKeyFormat []byte)... method DoesSupport (line 117) | func (km *aesCTRHMACKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 122) | func (km *aesCTRHMACKeyManager) TypeURL() string { method validateKey (line 127) | func (km *aesCTRHMACKeyManager) validateKey(key *chpb.AesCtrHmacStream... method validateKeyFormat (line 142) | func (km *aesCTRHMACKeyManager) validateKeyFormat(format *chpb.AesCtrH... method validateParams (line 153) | func (km *aesCTRHMACKeyManager) validateParams(params *chpb.AesCtrHmac... FILE: go/streamingaead/aes_ctr_hmac_key_manager_test.go function TestAESCTRHMACGetPrimitiveBasic (line 32) | func TestAESCTRHMACGetPrimitiveBasic(t *testing.T) { function TestAESCTRHMACGetPrimitiveWithInvalidInput (line 53) | func TestAESCTRHMACGetPrimitiveWithInvalidInput(t *testing.T) { function TestAESCTRHMACNewKeyMultipleTimes (line 88) | func TestAESCTRHMACNewKeyMultipleTimes(t *testing.T) { function TestAESCTRHMACNewKeyBasic (line 123) | func TestAESCTRHMACNewKeyBasic(t *testing.T) { function TestAESCTRHMACNewKeyWithInvalidInput (line 145) | func TestAESCTRHMACNewKeyWithInvalidInput(t *testing.T) { function TestAESCTRHMACNewKeyDataBasic (line 181) | func TestAESCTRHMACNewKeyDataBasic(t *testing.T) { function TestAESCTRHMACNewKeyDataWithInvalidInput (line 220) | func TestAESCTRHMACNewKeyDataWithInvalidInput(t *testing.T) { function TestAESCTRHMACDoesSupport (line 245) | func TestAESCTRHMACDoesSupport(t *testing.T) { function TestAESCTRHMACTypeURL (line 258) | func TestAESCTRHMACTypeURL(t *testing.T) { function genInvalidAESCTRHMACKeys (line 268) | func genInvalidAESCTRHMACKeys() []proto.Message { function genInvalidAESCTRHMACKeyFormats (line 294) | func genInvalidAESCTRHMACKeyFormats() []proto.Message { function validateAESCTRHMACKey (line 306) | func validateAESCTRHMACKey(key *ctrhmacpb.AesCtrHmacStreamingKey, format... function validateAESCTRHMACPrimitive (line 338) | func validateAESCTRHMACPrimitive(p any, key *ctrhmacpb.AesCtrHmacStreami... FILE: go/streamingaead/aes_gcm_hkdf_key_manager.go constant aesGCMHKDFKeyVersion (line 33) | aesGCMHKDFKeyVersion = 0 constant aesGCMHKDFTypeURL (line 34) | aesGCMHKDFTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmHkd... type aesGCMHKDFKeyManager (line 44) | type aesGCMHKDFKeyManager struct method Primitive (line 47) | func (km *aesGCMHKDFKeyManager) Primitive(serializedKey []byte) (any, ... method NewKey (line 73) | func (km *aesGCMHKDFKeyManager) NewKey(serializedKeyFormat []byte) (pr... method NewKeyData (line 93) | func (km *aesGCMHKDFKeyManager) NewKeyData(serializedKeyFormat []byte)... method DoesSupport (line 110) | func (km *aesGCMHKDFKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 115) | func (km *aesGCMHKDFKeyManager) TypeURL() string { method KeyMaterialType (line 120) | func (km *aesGCMHKDFKeyManager) KeyMaterialType() tinkpb.KeyData_KeyMa... method DeriveKey (line 125) | func (km *aesGCMHKDFKeyManager) DeriveKey(serializedKeyFormat []byte, ... method validateKey (line 152) | func (km *aesGCMHKDFKeyManager) validateKey(key *ghpb.AesGcmHkdfStream... method validateKeyFormat (line 167) | func (km *aesGCMHKDFKeyManager) validateKeyFormat(format *ghpb.AesGcmH... method validateParams (line 178) | func (km *aesGCMHKDFKeyManager) validateParams(params *ghpb.AesGcmHkdf... FILE: go/streamingaead/aes_gcm_hkdf_key_manager_test.go function TestAESGCMHKDFGetPrimitiveBasic (line 37) | func TestAESGCMHKDFGetPrimitiveBasic(t *testing.T) { function TestAESGCMHKDFGetPrimitiveWithInvalidInput (line 58) | func TestAESGCMHKDFGetPrimitiveWithInvalidInput(t *testing.T) { function TestAESGCMHKDFNewKeyMultipleTimes (line 92) | func TestAESGCMHKDFNewKeyMultipleTimes(t *testing.T) { function TestAESGCMHKDFNewKeyBasic (line 127) | func TestAESGCMHKDFNewKeyBasic(t *testing.T) { function TestAESGCMHKDFNewKeyWithInvalidInput (line 154) | func TestAESGCMHKDFNewKeyWithInvalidInput(t *testing.T) { function TestAESGCMHKDFNewKeyDataBasic (line 190) | func TestAESGCMHKDFNewKeyDataBasic(t *testing.T) { function TestAESGCMHKDFNewKeyDataWithInvalidInput (line 234) | func TestAESGCMHKDFNewKeyDataWithInvalidInput(t *testing.T) { function TestAESGCMHKDFDoesSupport (line 259) | func TestAESGCMHKDFDoesSupport(t *testing.T) { function TestAESGCMHKDFTypeURL (line 272) | func TestAESGCMHKDFTypeURL(t *testing.T) { function TestAESGCMHKDFKeyMaterialType (line 282) | func TestAESGCMHKDFKeyMaterialType(t *testing.T) { function TestAESGCMHKDFDeriveKey (line 296) | func TestAESGCMHKDFDeriveKey(t *testing.T) { function TestAESGCMHKDFDeriveKeyFailsWithInvalidKeyFormats (line 338) | func TestAESGCMHKDFDeriveKeyFailsWithInvalidKeyFormats(t *testing.T) { function TestAESGCMHKDFDeriveKeyFailsWithMalformedKeyFormats (line 460) | func TestAESGCMHKDFDeriveKeyFailsWithMalformedKeyFormats(t *testing.T) { function TestAESGCMHKDFDeriveKeyFailsWithInsufficientRandomness (line 501) | func TestAESGCMHKDFDeriveKeyFailsWithInsufficientRandomness(t *testing.T) { function genInvalidAESGCMHKDFKeys (line 536) | func genInvalidAESGCMHKDFKeys() []proto.Message { function genInvalidAESGCMHKDFKeyFormats (line 549) | func genInvalidAESGCMHKDFKeyFormats() []proto.Message { function validateAESGCMHKDFKey (line 560) | func validateAESGCMHKDFKey(key *gcmhkdfpb.AesGcmHkdfStreamingKey, format... function validatePrimitive (line 590) | func validatePrimitive(p any, key *gcmhkdfpb.AesGcmHkdfStreamingKey) err... FILE: go/streamingaead/decrypt_reader.go type decryptReader (line 30) | type decryptReader struct method Read (line 41) | func (dr *decryptReader) Read(p []byte) (n int, err error) { type unreader (line 89) | type unreader struct method Read (line 96) | func (u *unreader) Read(buf []byte) (int, error) { method unread (line 115) | func (u *unreader) unread() { method disable (line 121) | func (u *unreader) disable() { FILE: go/streamingaead/decrypt_reader_test.go function BenchmarkDecryptReader (line 31) | func BenchmarkDecryptReader(b *testing.B) { function TestUnreaderUnread (line 117) | func TestUnreaderUnread(t *testing.T) { function TestUnreader (line 142) | func TestUnreader(t *testing.T) { FILE: go/streamingaead/streamingaead.go function init (line 28) | func init() { FILE: go/streamingaead/streamingaead_factory.go function New (line 27) | func New(handle *keyset.Handle) (tink.StreamingAEAD, error) { type wrappedStreamingAEAD (line 53) | type wrappedStreamingAEAD struct method NewEncryptingWriter (line 64) | func (s *wrappedStreamingAEAD) NewEncryptingWriter(w io.Writer, aad []... method NewDecryptingReader (line 77) | func (s *wrappedStreamingAEAD) NewDecryptingReader(r io.Reader, aad []... FILE: go/streamingaead/streamingaead_factory_test.go constant aesGCMHKDFTypeURL (line 38) | aesGCMHKDFTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmHkdfSt... function TestFactoryMultipleKeys (line 41) | func TestFactoryMultipleKeys(t *testing.T) { function validateFactoryCipher (line 96) | func validateFactoryCipher(encryptCipher tink.StreamingAEAD, decryptCiph... function encryptDecrypt (line 107) | func encryptDecrypt(encryptCipher, decryptCipher tink.StreamingAEAD, ptS... function TestFactoryWithInvalidPrimitiveSetType (line 139) | func TestFactoryWithInvalidPrimitiveSetType(t *testing.T) { function TestFactoryWithValidPrimitiveSetType (line 151) | func TestFactoryWithValidPrimitiveSetType(t *testing.T) { function TestFactoryWithKeysetWithTinkKeys (line 163) | func TestFactoryWithKeysetWithTinkKeys(t *testing.T) { FILE: go/streamingaead/streamingaead_key_templates.go function AES128GCMHKDF4KBKeyTemplate (line 37) | func AES128GCMHKDF4KBKeyTemplate() *tinkpb.KeyTemplate { function AES128GCMHKDF1MBKeyTemplate (line 46) | func AES128GCMHKDF1MBKeyTemplate() *tinkpb.KeyTemplate { function AES256GCMHKDF4KBKeyTemplate (line 55) | func AES256GCMHKDF4KBKeyTemplate() *tinkpb.KeyTemplate { function AES256GCMHKDF1MBKeyTemplate (line 64) | func AES256GCMHKDF1MBKeyTemplate() *tinkpb.KeyTemplate { function AES128CTRHMACSHA256Segment4KBKeyTemplate (line 76) | func AES128CTRHMACSHA256Segment4KBKeyTemplate() *tinkpb.KeyTemplate { function AES128CTRHMACSHA256Segment1MBKeyTemplate (line 88) | func AES128CTRHMACSHA256Segment1MBKeyTemplate() *tinkpb.KeyTemplate { function AES256CTRHMACSHA256Segment4KBKeyTemplate (line 100) | func AES256CTRHMACSHA256Segment4KBKeyTemplate() *tinkpb.KeyTemplate { function AES256CTRHMACSHA256Segment1MBKeyTemplate (line 112) | func AES256CTRHMACSHA256Segment1MBKeyTemplate() *tinkpb.KeyTemplate { function newAESGCMHKDFKeyTemplate (line 118) | func newAESGCMHKDFKeyTemplate(mainKeySize uint32, hkdfHashType commonpb.... function newAESCTRHMACKeyTemplate (line 139) | func newAESCTRHMACKeyTemplate(mainKeySize uint32, hkdfHashType commonpb.... FILE: go/streamingaead/streamingaead_key_templates_test.go function TestKeyTemplates (line 27) | func TestKeyTemplates(t *testing.T) { FILE: go/streamingaead/streamingaead_test.go function Example (line 32) | func Example() { FILE: go/streamingaead/subtle/aes_ctr_hmac.go constant AESCTRHMACNonceSizeInBytes (line 34) | AESCTRHMACNonceSizeInBytes = 16 constant AESCTRHMACNoncePrefixSizeInBytes (line 37) | AESCTRHMACNoncePrefixSizeInBytes = 7 constant AESCTRHMACKeySizeInBytes (line 40) | AESCTRHMACKeySizeInBytes = 32 type AESCTRHMAC (line 48) | type AESCTRHMAC struct method HeaderLength (line 115) | func (a *AESCTRHMAC) HeaderLength() int { method deriveKeys (line 122) | func (a *AESCTRHMAC) deriveKeys(salt, aad []byte) ([]byte, []byte, err... method NewEncryptingWriter (line 174) | func (a *AESCTRHMAC) NewEncryptingWriter(w io.Writer, aad []byte) (io.... method NewDecryptingReader (line 256) | func (a *AESCTRHMAC) NewDecryptingReader(r io.Reader, aad []byte) (io.... function NewAESCTRHMAC (line 77) | func NewAESCTRHMAC(mainKey []byte, hkdfAlg string, keySizeInBytes int, t... type aesCTRHMACSegmentEncrypter (line 133) | type aesCTRHMACSegmentEncrypter struct method EncryptSegment (line 140) | func (e aesCTRHMACSegmentEncrypter) EncryptSegment(segment, nonce []by... type aesCTRHMACWriter (line 165) | type aesCTRHMACWriter struct type aesCTRHMACSegmentDecrypter (line 219) | type aesCTRHMACSegmentDecrypter struct method DecryptSegment (line 226) | func (d aesCTRHMACSegmentDecrypter) DecryptSegment(segment, nonce []by... type aesCTRHMACReader (line 249) | type aesCTRHMACReader struct FILE: go/streamingaead/subtle/aes_ctr_hmac_test.go function TestAESCTRHMACEncryptDecrypt (line 24) | func TestAESCTRHMACEncryptDecrypt(t *testing.T) { function TestAESCTRHMACModifiedCiphertext (line 233) | func TestAESCTRHMACModifiedCiphertext(t *testing.T) { FILE: go/streamingaead/subtle/aes_gcm_hkdf.go constant AESGCMHKDFNonceSizeInBytes (line 33) | AESGCMHKDFNonceSizeInBytes = 12 constant AESGCMHKDFNoncePrefixSizeInBytes (line 37) | AESGCMHKDFNoncePrefixSizeInBytes = 7 constant AESGCMHKDFTagSizeInBytes (line 41) | AESGCMHKDFTagSizeInBytes = 16 type AESGCMHKDF (line 49) | type AESGCMHKDF struct method HeaderLength (line 97) | func (a *AESGCMHKDF) HeaderLength() int { method deriveKey (line 103) | func (a *AESGCMHKDF) deriveKey(salt, aad []byte) ([]byte, error) { method newCipher (line 108) | func (a *AESGCMHKDF) newCipher(key []byte) (cipher.AEAD, error) { method NewEncryptingWriter (line 144) | func (a *AESGCMHKDF) NewEncryptingWriter(w io.Writer, aad []byte) (io.... method NewDecryptingReader (line 203) | func (a *AESGCMHKDF) NewDecryptingReader(r io.Reader, aad []byte) (io.... function NewAESGCMHKDF (line 71) | func NewAESGCMHKDF(mainKey []byte, hkdfAlg string, keySizeInBytes, ciphe... type aesGCMHKDFSegmentEncrypter (line 120) | type aesGCMHKDFSegmentEncrypter struct method EncryptSegment (line 125) | func (e aesGCMHKDFSegmentEncrypter) EncryptSegment(segment, nonce []by... type aesGCMHKDFWriter (line 135) | type aesGCMHKDFWriter struct type aesGCMHKDFSegmentDecrypter (line 181) | type aesGCMHKDFSegmentDecrypter struct method DecryptSegment (line 186) | func (d aesGCMHKDFSegmentDecrypter) DecryptSegment(segment, nonce []by... type aesGCMHKDFReader (line 196) | type aesGCMHKDFReader struct FILE: go/streamingaead/subtle/aes_gcm_hkdf_test.go function TestAESGCMHKDFEncryptDecrypt (line 24) | func TestAESGCMHKDFEncryptDecrypt(t *testing.T) { function TestAESGCMHKDFModifiedCiphertext (line 213) | func TestAESGCMHKDFModifiedCiphertext(t *testing.T) { FILE: go/streamingaead/subtle/noncebased/noncebased.go type SegmentEncrypter (line 71) | type SegmentEncrypter interface type Writer (line 79) | type Writer struct method Write (line 134) | func (w *Writer) Write(p []byte) (int, error) { method Close (line 174) | func (w *Writer) Close() error { type WriterParams (line 93) | type WriterParams struct function NewWriter (line 119) | func NewWriter(params WriterParams) (*Writer, error) { type SegmentDecrypter (line 200) | type SegmentDecrypter interface type Reader (line 209) | type Reader struct method Read (line 265) | func (r *Reader) Read(p []byte) (int, error) { type ReaderParams (line 223) | type ReaderParams struct function NewReader (line 248) | func NewReader(params ReaderParams) (*Reader, error) { function generateSegmentNonce (line 334) | func generateSegmentNonce(size int, prefix []byte, segmentNum uint64, la... FILE: go/streamingaead/subtle/noncebased/noncebased_test.go function TestNonceBased (line 30) | func TestNonceBased(t *testing.T) { function TestNonceBased_invalidParameters (line 121) | func TestNonceBased_invalidParameters(t *testing.T) { type testEncrypter (line 183) | type testEncrypter struct method EncryptSegment (line 187) | func (e testEncrypter) EncryptSegment(segment, nonce []byte) ([]byte, ... type testDecrypter (line 195) | type testDecrypter struct method DecryptSegment (line 199) | func (d testDecrypter) DecryptSegment(segment, nonce []byte) ([]byte, ... function testEncrypt (line 217) | func testEncrypt(plaintextSize, noncePrefixSize int, wp noncebased.Write... function testDecrypt (line 251) | func testDecrypt(plaintext, ciphertext []byte, chunkSize int, rp nonceba... FILE: go/streamingaead/subtle/subtle_test.go function encrypt (line 38) | func encrypt(cipher tink.StreamingAEAD, aad []byte, plaintextSize int) (... function decrypt (line 64) | func decrypt(cipher tink.StreamingAEAD, aad, pt, ct []byte, chunkSize in... function segmentPos (line 94) | func segmentPos(segmentSize, firstSegmentOffset, headerLen, segmentNr in... FILE: go/subtle/hkdf.go constant minTagSizeInBytes (line 27) | minTagSizeInBytes = uint32(10) function validateHKDFParams (line 33) | func validateHKDFParams(hash string, keySize uint32, tagSize uint32) err... function ComputeHKDF (line 49) | func ComputeHKDF(hashAlg string, key []byte, salt []byte, info []byte, t... FILE: go/subtle/hkdf_test.go function TestHKDFBasic (line 24) | func TestHKDFBasic(t *testing.T) { function TestNewHMACWithInvalidInput (line 156) | func TestNewHMACWithInvalidInput(t *testing.T) { FILE: go/subtle/random/random.go function GetRandomBytes (line 24) | func GetRandomBytes(n uint32) []byte { function GetRandomUint32 (line 34) | func GetRandomUint32() uint32 { FILE: go/subtle/random/random_test.go function TestGetRandomBytes (line 23) | func TestGetRandomBytes(t *testing.T) { FILE: go/subtle/subtle.go function GetHashDigestSize (line 41) | func GetHashDigestSize(hash string) (uint32, error) { function ConvertHashName (line 54) | func ConvertHashName(name string) string { function ConvertCurveName (line 73) | func ConvertCurveName(name string) string { function GetHashFunc (line 87) | func GetHashFunc(hash string) func() hash.Hash { function GetCurve (line 106) | func GetCurve(curve string) elliptic.Curve { function ComputeHash (line 120) | func ComputeHash(hashFunc func() hash.Hash, data []byte) ([]byte, error) { function NewBigIntFromHex (line 130) | func NewBigIntFromHex(s string) (*big.Int, error) { FILE: go/subtle/subtle_test.go function TestConvertHashName (line 25) | func TestConvertHashName(t *testing.T) { function TestConvertCurveName (line 34) | func TestConvertCurveName(t *testing.T) { function TestComputeHash (line 43) | func TestComputeHash(t *testing.T) { function TestGetCurve (line 74) | func TestGetCurve(t *testing.T) { FILE: go/subtle/x25519.go function GeneratePrivateKeyX25519 (line 24) | func GeneratePrivateKeyX25519() ([]byte, error) { function ComputeSharedSecretX25519 (line 32) | func ComputeSharedSecretX25519(privKey, pubValue []byte) ([]byte, error) { function PublicFromPrivateX25519 (line 37) | func PublicFromPrivateX25519(privKey []byte) ([]byte, error) { FILE: go/subtle/x25519_test.go function TestComputeSharedSecretX25519WithRFCTestVectors (line 28) | func TestComputeSharedSecretX25519WithRFCTestVectors(t *testing.T) { type x25519Suite (line 62) | type x25519Suite struct type x25519Group (line 67) | type x25519Group struct type x25519Case (line 73) | type x25519Case struct function TestComputeSharedSecretX25519WithWycheproofVectors (line 82) | func TestComputeSharedSecretX25519WithWycheproofVectors(t *testing.T) { function TestComputeSharedSecretX25519Fails (line 132) | func TestComputeSharedSecretX25519Fails(t *testing.T) { function TestPublicFromPrivateX25519WithRFCTestVectors (line 166) | func TestPublicFromPrivateX25519WithRFCTestVectors(t *testing.T) { function TestPublicFromPrivateX25519Fails (line 194) | func TestPublicFromPrivateX25519Fails(t *testing.T) { FILE: go/testing/fakekms/fakekms.go constant fakePrefix (line 39) | fakePrefix = "fake-kms://" type fakeClient (line 43) | type fakeClient struct method Supported (line 59) | func (c *fakeClient) Supported(keyURI string) bool { method GetAEAD (line 64) | func (c *fakeClient) GetAEAD(keyURI string) (tink.AEAD, error) { function NewClient (line 49) | func NewClient(uriPrefix string) (registry.KMSClient, error) { function NewKeyURI (line 82) | func NewKeyURI() (string, error) { FILE: go/testing/fakekms/fakekms_test.go constant keyURI (line 24) | keyURI = "fake-kms://CM2b3_MDElQKSAowdHlwZS5nb29nbGVhcGlzLmNvbS9nb29nbGU... constant anotherKeyURI (line 25) | anotherKeyURI = "fake-kms://CLHW_5cHElQKSAowdHlwZS5nb29nbGVhcGlzLmNvbS9n... function TestValidKeyURIs (line 27) | func TestValidKeyURIs(t *testing.T) { function TestBadUriPrefix (line 68) | func TestBadUriPrefix(t *testing.T) { function TestValidPrefix (line 75) | func TestValidPrefix(t *testing.T) { function TestInvalidPrefix (line 90) | func TestInvalidPrefix(t *testing.T) { function TestGetAeadFailsWithBadKeysetEncoding (line 105) | func TestGetAeadFailsWithBadKeysetEncoding(t *testing.T) { FILE: go/testing/fakemonitoring/fakemonitoring.go type Logger (line 25) | type Logger struct method Log (line 33) | func (l *Logger) Log(keyID uint32, numBytes int) { method LogFailure (line 42) | func (l *Logger) LogFailure() { type LogEvent (line 47) | type LogEvent struct type LogFailure (line 54) | type LogFailure struct type Client (line 59) | type Client struct method NewLogger (line 78) | func (c *Client) NewLogger(context *monitoring.Context) (monitoring.Lo... method Events (line 86) | func (c *Client) Events() []*LogEvent { method Failures (line 91) | func (c *Client) Failures() []*LogFailure { method addEvent (line 95) | func (c *Client) addEvent(event *LogEvent) { method addFailure (line 101) | func (c *Client) addFailure(failure *LogFailure) { function NewClient (line 71) | func NewClient(name string) *Client { FILE: go/testing/fakemonitoring/fakemonitoring_test.go function TestCreateNewClient (line 25) | func TestCreateNewClient(t *testing.T) { function TestCreateNewLoggers (line 32) | func TestCreateNewLoggers(t *testing.T) { function TestLoggerRecordsEvents (line 54) | func TestLoggerRecordsEvents(t *testing.T) { function TestLogFailureRecordsFailure (line 87) | func TestLogFailureRecordsFailure(t *testing.T) { FILE: go/testkeyset/testkeyset.go function NewHandle (line 37) | func NewHandle(ks *tinkpb.Keyset) (*keyset.Handle, error) { function Read (line 45) | func Read(r keyset.Reader) (*keyset.Handle, error) { function Write (line 59) | func Write(h *keyset.Handle, w keyset.Writer) error { function KeysetMaterial (line 70) | func KeysetMaterial(h *keyset.Handle) *tinkpb.Keyset { function KeysetHandle (line 79) | func KeysetHandle(ks *tinkpb.Keyset) *keyset.Handle { FILE: go/testkeyset/testkeyset_test.go function makeKeyset (line 28) | func makeKeyset(template *tinkpb.KeyTemplate) (*tinkpb.Keyset, error) { function TestNewHandleCallsAreConsistent (line 36) | func TestNewHandleCallsAreConsistent(t *testing.T) { FILE: go/testutil/constant.go constant AESCTRHMACAEADKeyVersion (line 21) | AESCTRHMACAEADKeyVersion = 0 constant AESCTRHMACAEADTypeURL (line 23) | AESCTRHMACAEADTypeURL = "type.googleapis.com/google.crypto.tink.AesCtrHm... constant AESGCMKeyVersion (line 26) | AESGCMKeyVersion = 0 constant AESGCMTypeURL (line 28) | AESGCMTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmKey" constant AESGCMSIVKeyVersion (line 31) | AESGCMSIVKeyVersion = 0 constant AESGCMSIVTypeURL (line 33) | AESGCMSIVTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmSivKey" constant ChaCha20Poly1305KeyVersion (line 36) | ChaCha20Poly1305KeyVersion = 0 constant ChaCha20Poly1305TypeURL (line 38) | ChaCha20Poly1305TypeURL = "type.googleapis.com/google.crypto.tink.ChaCha... constant KMSEnvelopeAEADKeyVersion (line 41) | KMSEnvelopeAEADKeyVersion = 0 constant KMSEnvelopeAEADTypeURL (line 43) | KMSEnvelopeAEADTypeURL = "type.googleapis.com/google.crypto.tink.KmsEnve... constant XChaCha20Poly1305KeyVersion (line 46) | XChaCha20Poly1305KeyVersion = 0 constant XChaCha20Poly1305TypeURL (line 48) | XChaCha20Poly1305TypeURL = "type.googleapis.com/google.crypto.tink.XChaC... constant EciesAeadHkdfPrivateKeyKeyVersion (line 51) | EciesAeadHkdfPrivateKeyKeyVersion = 0 constant EciesAeadHkdfPrivateKeyTypeURL (line 54) | EciesAeadHkdfPrivateKeyTypeURL = "type.googleapis.com/google.crypto.tink... constant EciesAeadHkdfPublicKeyKeyVersion (line 57) | EciesAeadHkdfPublicKeyKeyVersion = 0 constant EciesAeadHkdfPublicKeyTypeURL (line 60) | EciesAeadHkdfPublicKeyTypeURL = "type.googleapis.com/google.crypto.tink.... constant AESSIVKeyVersion (line 65) | AESSIVKeyVersion = 0 constant AESSIVTypeURL (line 67) | AESSIVTypeURL = "type.googleapis.com/google.crypto.tink.AesSivKey" constant HMACKeyVersion (line 72) | HMACKeyVersion = 0 constant HMACTypeURL (line 74) | HMACTypeURL = "type.googleapis.com/google.crypto.tink.HmacKey" constant AESCMACKeyVersion (line 76) | AESCMACKeyVersion = 0 constant AESCMACTypeURL (line 78) | AESCMACTypeURL = "type.googleapis.com/google.crypto.tink.AesCmacKey" constant AESCMACPRFKeyVersion (line 83) | AESCMACPRFKeyVersion = 0 constant AESCMACPRFTypeURL (line 85) | AESCMACPRFTypeURL = "type.googleapis.com/google.crypto.tink.AesCmacPrfKey" constant HKDFPRFKeyVersion (line 88) | HKDFPRFKeyVersion = 0 constant HKDFPRFTypeURL (line 90) | HKDFPRFTypeURL = "type.googleapis.com/google.crypto.tink.HkdfPrfKey" constant HMACPRFKeyVersion (line 93) | HMACPRFKeyVersion = 0 constant HMACPRFTypeURL (line 95) | HMACPRFTypeURL = "type.googleapis.com/google.crypto.tink.HmacPrfKey" constant ECDSASignerKeyVersion (line 100) | ECDSASignerKeyVersion = 0 constant ECDSASignerTypeURL (line 102) | ECDSASignerTypeURL = "type.googleapis.com/google.crypto.tink.EcdsaPrivat... constant ECDSAVerifierKeyVersion (line 105) | ECDSAVerifierKeyVersion = 0 constant ECDSAVerifierTypeURL (line 107) | ECDSAVerifierTypeURL = "type.googleapis.com/google.crypto.tink.EcdsaPubl... constant ED25519SignerKeyVersion (line 110) | ED25519SignerKeyVersion = 0 constant ED25519SignerTypeURL (line 112) | ED25519SignerTypeURL = "type.googleapis.com/google.crypto.tink.Ed25519Pr... constant ED25519VerifierKeyVersion (line 115) | ED25519VerifierKeyVersion = 0 constant ED25519VerifierTypeURL (line 117) | ED25519VerifierTypeURL = "type.googleapis.com/google.crypto.tink.Ed25519... constant AESGCMHKDFKeyVersion (line 122) | AESGCMHKDFKeyVersion = 0 constant AESGCMHKDFTypeURL (line 124) | AESGCMHKDFTypeURL = "type.googleapis.com/google.crypto.tink.AesGcmHkdfSt... constant AESCTRHMACKeyVersion (line 127) | AESCTRHMACKeyVersion = 0 constant AESCTRHMACTypeURL (line 129) | AESCTRHMACTypeURL = "type.googleapis.com/google.crypto.tink.AesCtrHmacSt... FILE: go/testutil/hybrid/private_key.go constant hpkeX25519HKDFSHA256PrivKeyLen (line 33) | hpkeX25519HKDFSHA256PrivKeyLen = 32 constant hpkeX25519HKDFSHA256PubKeyLen (line 34) | hpkeX25519HKDFSHA256PubKeyLen = 32 constant hpkePrivateKeyTypeURL (line 36) | hpkePrivateKeyTypeURL = "type.googleapis.com/google.crypto.tink.HpkePriv... function KeysetHandleFromSerializedPrivateKey (line 49) | func KeysetHandleFromSerializedPrivateKey(privKeyBytes, pubKeyBytes []by... function hpkeParamsFromTemplate (line 97) | func hpkeParamsFromTemplate(template *tinkpb.KeyTemplate) (*hpkepb.HpkeP... FILE: go/testutil/hybrid/private_key_test.go function TestKeysetHandleFromSerializedPrivateKey (line 31) | func TestKeysetHandleFromSerializedPrivateKey(t *testing.T) { function TestKeysetHandleFromSerializedPrivateKeyInvalidTemplateFails (line 77) | func TestKeysetHandleFromSerializedPrivateKeyInvalidTemplateFails(t *tes... function privPubKeyBytes (line 109) | func privPubKeyBytes(t *testing.T, handle *keyset.Handle) ([]byte, []byt... FILE: go/testutil/testutil.go type DummyAEADKeyManager (line 60) | type DummyAEADKeyManager struct method Primitive (line 66) | func (km *DummyAEADKeyManager) Primitive(serializedKey []byte) (any, e... method NewKey (line 71) | func (km *DummyAEADKeyManager) NewKey(serializedKeyFormat []byte) (pro... method NewKeyData (line 76) | func (km *DummyAEADKeyManager) NewKeyData(serializedKeyFormat []byte) ... method DoesSupport (line 81) | func (km *DummyAEADKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 86) | func (km *DummyAEADKeyManager) TypeURL() string { type DummyAEAD (line 94) | type DummyAEAD struct method Encrypt (line 105) | func (a *DummyAEAD) Encrypt(plaintext []byte, associatedData []byte) (... method Decrypt (line 120) | func (a *DummyAEAD) Decrypt(ciphertext []byte, associatedData []byte) ... type dummyAEADData (line 98) | type dummyAEADData struct type AlwaysFailingAead (line 133) | type AlwaysFailingAead struct method Encrypt (line 145) | func (a *AlwaysFailingAead) Encrypt(plaintext []byte, associatedData [... method Decrypt (line 150) | func (a *AlwaysFailingAead) Decrypt(ciphertext []byte, associatedData ... function NewAlwaysFailingAead (line 140) | func NewAlwaysFailingAead(err error) tink.AEAD { type AlwaysFailingDeterministicAead (line 155) | type AlwaysFailingDeterministicAead struct method EncryptDeterministically (line 167) | func (a *AlwaysFailingDeterministicAead) EncryptDeterministically(plai... method DecryptDeterministically (line 172) | func (a *AlwaysFailingDeterministicAead) DecryptDeterministically(ciph... function NewAlwaysFailingDeterministicAead (line 162) | func NewAlwaysFailingDeterministicAead(err error) tink.DeterministicAEAD { type TestKeyManager (line 178) | type TestKeyManager struct method Primitive (line 194) | func (km *TestKeyManager) Primitive(serializedKey []byte) (any, error) { method NewKey (line 199) | func (km *TestKeyManager) NewKey(serializedKeyFormat []byte) (proto.Me... method NewKeyData (line 204) | func (km *TestKeyManager) NewKeyData(serializedKeyFormat []byte) (*tin... method DoesSupport (line 209) | func (km *TestKeyManager) DoesSupport(typeURL string) bool { method TypeURL (line 214) | func (km *TestKeyManager) TypeURL() string { function NewTestKeyManager (line 186) | func NewTestKeyManager(primitive any, typeURL string) registry.KeyManager { type DummySigner (line 219) | type DummySigner struct method Sign (line 230) | func (s *DummySigner) Sign(data []byte) ([]byte, error) { function NewDummySigner (line 225) | func NewDummySigner(name string) *DummySigner { type DummyVerifier (line 235) | type DummyVerifier struct method Verify (line 240) | func (v *DummyVerifier) Verify(sig, data []byte) error { function NewDummyVerifier (line 247) | func NewDummyVerifier(name string) *DummyVerifier { type DummyMAC (line 252) | type DummyMAC struct method ComputeMAC (line 257) | func (h *DummyMAC) ComputeMAC(data []byte) ([]byte, error) { method VerifyMAC (line 269) | func (h *DummyMAC) VerifyMAC(mac []byte, data []byte) error { function makeDummyMAC (line 261) | func makeDummyMAC(data []byte, name string) []byte { type DummyKMSClient (line 280) | type DummyKMSClient struct method Supported (line 285) | func (d *DummyKMSClient) Supported(keyURI string) bool { method GetAEAD (line 290) | func (d *DummyKMSClient) GetAEAD(keyURI string) (tink.AEAD, error) { function NewTestAESGCMKeyset (line 295) | func NewTestAESGCMKeyset(primaryOutputPrefixType tinkpb.OutputPrefixType... function NewTestAESGCMSIVKeyset (line 301) | func NewTestAESGCMSIVKeyset(primaryOutputPrefixType tinkpb.OutputPrefixT... function NewTestAESSIVKeyset (line 307) | func NewTestAESSIVKeyset(primaryOutputPrefixType tinkpb.OutputPrefixType... function NewTestHMACKeyset (line 322) | func NewTestHMACKeyset(tagSize uint32, primaryOutputPrefixType tinkpb.Ou... function NewTestAESGCMHKDFKeyset (line 328) | func NewTestAESGCMHKDFKeyset() *tinkpb.Keyset { function NewTestKeyset (line 339) | func NewTestKeyset(keyData *tinkpb.KeyData, primaryOutputPrefixType tink... function NewDummyKey (line 350) | func NewDummyKey(keyID int, status tinkpb.KeyStatusType, outputPrefixTyp... function NewECDSAParams (line 360) | func NewECDSAParams(hashType commonpb.HashType, curve commonpb.EllipticC... function NewECDSAKeyFormat (line 369) | func NewECDSAKeyFormat(params *ecdsapb.EcdsaParams) *ecdsapb.EcdsaKeyFor... function NewECDSAPrivateKey (line 374) | func NewECDSAPrivateKey(version uint32, publicKey *ecdsapb.EcdsaPublicKe... function NewECDSAPublicKey (line 383) | func NewECDSAPublicKey(version uint32, params *ecdsapb.EcdsaParams, x, y... function NewRandomECDSAPrivateKey (line 393) | func NewRandomECDSAPrivateKey(hashType commonpb.HashType, curve commonpb... function NewRandomECDSAPublicKey (line 405) | func NewRandomECDSAPublicKey(hashType commonpb.HashType, curve commonpb.... function GetECDSAParamNames (line 411) | func GetECDSAParamNames(params *ecdsapb.EcdsaParams) (string, string, st... function NewED25519PrivateKey (line 419) | func NewED25519PrivateKey() *ed25519pb.Ed25519PrivateKey { function NewED25519PublicKey (line 436) | func NewED25519PublicKey() *ed25519pb.Ed25519PublicKey { function NewAESGCMKey (line 441) | func NewAESGCMKey(keyVersion uint32, keySize uint32) *gcmpb.AesGcmKey { function NewAESGCMKeyData (line 450) | func NewAESGCMKeyData(keySize uint32) *tinkpb.KeyData { function NewAESGCMKeyFormat (line 459) | func NewAESGCMKeyFormat(keySize uint32) *gcmpb.AesGcmKeyFormat { function NewAESGCMSIVKey (line 466) | func NewAESGCMSIVKey(keyVersion, keySize uint32) *gcmsivpb.AesGcmSivKey { function NewAESGCMSIVKeyData (line 475) | func NewAESGCMSIVKeyData(keySize uint32) *tinkpb.KeyData { function NewAESGCMSIVKeyFormat (line 484) | func NewAESGCMSIVKeyFormat(keySize uint32) *gcmsivpb.AesGcmSivKeyFormat { function NewAESGCMHKDFKey (line 491) | func NewAESGCMHKDFKey(keyVersion, keySize, derivedKeySize uint32, hkdfHa... function NewAESGCMHKDFKeyData (line 505) | func NewAESGCMHKDFKeyData(keySize, derivedKeySize uint32, hkdfHashType c... function NewAESGCMHKDFKeyFormat (line 514) | func NewAESGCMHKDFKeyFormat(keySize, derivedKeySize uint32, hkdfHashType... function NewAESCTRHMACKey (line 526) | func NewAESCTRHMACKey(keyVersion, keySize uint32, hkdfHashType commonpb.... function NewAESCTRHMACKeyFormat (line 544) | func NewAESCTRHMACKeyFormat(keySize uint32, hkdfHashType commonpb.HashTy... function NewHMACParams (line 560) | func NewHMACParams(hashType commonpb.HashType, tagSize uint32) *hmacpb.H... function NewHMACKey (line 568) | func NewHMACKey(hashType commonpb.HashType, tagSize uint32) *hmacpb.Hmac... function NewHMACKeyFormat (line 579) | func NewHMACKeyFormat(hashType commonpb.HashType, tagSize uint32) *hmacp... function NewAESCMACParams (line 589) | func NewAESCMACParams(tagSize uint32) *cmacpb.AesCmacParams { function NewAESCMACKey (line 596) | func NewAESCMACKey(tagSize uint32) *cmacpb.AesCmacKey { function NewAESCMACKeyFormat (line 607) | func NewAESCMACKeyFormat(tagSize uint32) *cmacpb.AesCmacKeyFormat { function NewHMACKeysetManager (line 617) | func NewHMACKeysetManager() *keyset.Manager { function NewHMACKeyData (line 632) | func NewHMACKeyData(hashType commonpb.HashType, tagSize uint32) *tinkpb.... function NewHMACPRFParams (line 646) | func NewHMACPRFParams(hashType commonpb.HashType) *hmacprfpb.HmacPrfPara... function NewHMACPRFKey (line 653) | func NewHMACPRFKey(hashType commonpb.HashType) *hmacprfpb.HmacPrfKey { function NewHMACPRFKeyFormat (line 664) | func NewHMACPRFKeyFormat(hashType commonpb.HashType) *hmacprfpb.HmacPrfK... function NewHKDFPRFParams (line 674) | func NewHKDFPRFParams(hashType commonpb.HashType, salt []byte) *hkdfprfp... function NewHKDFPRFKey (line 682) | func NewHKDFPRFKey(hashType commonpb.HashType, salt []byte) *hkdfprfpb.H... function NewHKDFPRFKeyFormat (line 693) | func NewHKDFPRFKeyFormat(hashType commonpb.HashType, salt []byte) *hkdfp... function NewAESCMACPRFKey (line 703) | func NewAESCMACPRFKey() *aescmacprfpb.AesCmacPrfKey { function NewAESCMACPRFKeyFormat (line 712) | func NewAESCMACPRFKeyFormat() *aescmacprfpb.AesCmacPrfKeyFormat { function NewKeyData (line 720) | func NewKeyData(typeURL string, value []byte, materialType tinkpb.KeyDat... function NewKey (line 729) | func NewKey(keyData *tinkpb.KeyData, status tinkpb.KeyStatusType, keyID ... function NewKeyset (line 739) | func NewKeyset(primaryKeyID uint32, keys []*tinkpb.Keyset_Key) *tinkpb.K... function GenerateMutations (line 747) | func GenerateMutations(src []byte) (all [][]byte) { function ZTestUniformString (line 783) | func ZTestUniformString(bytes []byte) error { function rotate (line 803) | func rotate(bytes []byte) []byte { function ZTestCrosscorrelationUniformStrings (line 828) | func ZTestCrosscorrelationUniformStrings(bytes1, bytes2 []byte) error { function ZTestAutocorrelationUniformString (line 853) | func ZTestAutocorrelationUniformString(bytes []byte) error { function eciesAEADHKDFPublicKey (line 871) | func eciesAEADHKDFPublicKey(c commonpb.EllipticCurveType, ht commonpb.Ha... function eciesAEADHKDFPrivateKey (line 891) | func eciesAEADHKDFPrivateKey(p *eciespb.EciesAeadHkdfPublicKey, d []byte... function GenerateECIESAEADHKDFPrivateKey (line 900) | func GenerateECIESAEADHKDFPrivateKey(c commonpb.EllipticCurveType, ht co... FILE: go/testutil/testutil_test.go function TestDummyAEAD (line 27) | func TestDummyAEAD(t *testing.T) { function TestDummySigner (line 49) | func TestDummySigner(t *testing.T) { function TestDummyVerifier (line 53) | func TestDummyVerifier(t *testing.T) { function TestDummySignerVerifier (line 57) | func TestDummySignerVerifier(t *testing.T) { function TestDummyMAC (line 75) | func TestDummyMAC(t *testing.T) { function fillByteArray (line 96) | func fillByteArray(b byte, length int) []byte { function TestUniformString (line 104) | func TestUniformString(t *testing.T) { function TestCrossCorrelationUniformString (line 116) | func TestCrossCorrelationUniformString(t *testing.T) { function TestAutocorrelationUniformString (line 131) | func TestAutocorrelationUniformString(t *testing.T) { function TestGenerateMutations (line 146) | func TestGenerateMutations(t *testing.T) { FILE: go/testutil/wycheproofutil.go constant testvectorsDir (line 27) | testvectorsDir = "testdata/testvectors" function SkipTestIfTestSrcDirIsNotSet (line 33) | func SkipTestIfTestSrcDirIsNotSet(t *testing.T) { type WycheproofSuite (line 44) | type WycheproofSuite struct type WycheproofGroup (line 55) | type WycheproofGroup struct type WycheproofCase (line 63) | type WycheproofCase struct type HexBytes (line 72) | type HexBytes method UnmarshalText (line 75) | func (a *HexBytes) UnmarshalText(text []byte) error { function PopulateSuite (line 90) | func PopulateSuite(suite any, filename string) error { FILE: go/testutil/wycheproofutil_test.go function TestPopulateSuite (line 25) | func TestPopulateSuite(t *testing.T) { function TestPopulateSuite_FileOpenError (line 63) | func TestPopulateSuite_FileOpenError(t *testing.T) { function TestPopulateSuite_DecodeError (line 76) | func TestPopulateSuite_DecodeError(t *testing.T) { FILE: go/tink/aead.go type AEAD (line 23) | type AEAD interface FILE: go/tink/deterministic_aead.go type DeterministicAEAD (line 36) | type DeterministicAEAD interface FILE: go/tink/hybrid_decrypt.go type HybridDecrypt (line 58) | type HybridDecrypt interface FILE: go/tink/hybrid_encrypt.go type HybridEncrypt (line 57) | type HybridEncrypt interface FILE: go/tink/mac.go type MAC (line 22) | type MAC interface FILE: go/tink/signer.go type Signer (line 22) | type Signer interface FILE: go/tink/streamingaead.go type StreamingAEAD (line 32) | type StreamingAEAD interface FILE: go/tink/verifier.go type Verifier (line 22) | type Verifier interface FILE: go/tink/version.go constant Version (line 19) | Version = "2.1.0" FILE: java_src/examples/aead/AeadExample.java class AeadExample (line 42) | public final class AeadExample { method main (line 46) | public static void main(String[] args) throws Exception { method AeadExample (line 88) | private AeadExample() {} FILE: java_src/examples/android/helloworld/app/src/main/java/com/helloworld/MainActivity.java class MainActivity (line 31) | public class MainActivity extends AppCompatActivity { method onCreate (line 37) | @Override method attemptEncrypt (line 65) | private void attemptEncrypt() { method attemptDecrypt (line 85) | private void attemptDecrypt() { method base64Encode (line 103) | private static String base64Encode(final byte[] input) { method base64Decode (line 107) | private static byte[] base64Decode(String input) { FILE: java_src/examples/android/helloworld/app/src/main/java/com/helloworld/TinkApplication.java class TinkApplication (line 29) | public class TinkApplication extends Application { method onCreate (line 36) | @Override method getOrGenerateNewKeysetHandle (line 47) | private KeysetHandle getOrGenerateNewKeysetHandle() throws IOException... FILE: java_src/examples/cleartextkeyset/CleartextKeysetExample.java class CleartextKeysetExample (line 45) | public final class CleartextKeysetExample { method main (line 51) | public static void main(String[] args) throws Exception { method CleartextKeysetExample (line 104) | private CleartextKeysetExample() {}