- Sort Score
- Num 10 results
- Language All
Results 1 - 10 of 70 for nonces (0.04 seconds)
-
src/cmd/asm/internal/asm/testdata/386.s
// the old assembler's (8a's) grammar and hand-writing complete // instructions for each rule, to guarantee we cover the same space. #include "../../../../../runtime/textflag.h" TEXT foo(SB), DUPOK|NOSPLIT, $0 // LTYPE1 nonrem { outcode(int($1), &$2); } SETCC AX SETCC foo+4(SB) // LTYPE2 rimnon { outcode(int($1), &$2); } DIVB AX DIVB foo+4(SB) PUSHL $foo+4(SB) POPL AX // LTYPE3 rimrem { outcode(int($1), &$2); }
Created: Tue Apr 07 11:13:11 GMT 2026 - Last Modified: Tue Apr 09 18:57:21 GMT 2019 - 2K bytes - Click Count (0) -
src/main/java/jcifs/internal/smb2/Smb2TransformHeader.java
java.util.Arrays.fill(this.nonce, (byte) 0); System.arraycopy(nonce, 0, this.nonce, 0, 12); } else if (nonce.length == 16) { // For GCM cipher, use full 16-byte nonce System.arraycopy(nonce, 0, this.nonce, 0, 16); } else { throw new IllegalArgumentException("Nonce must be 12 bytes (CCM) or 16 bytes (GCM)"); }
Created: Sun Apr 05 00:10:12 GMT 2026 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 9.1K bytes - Click Count (0) -
helm/minio/templates/NOTES.txt
Daryl White <******@****.***> 1755022836 -0400
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Tue Aug 12 18:20:36 GMT 2025 - 2.7K bytes - Click Count (0) -
docs/debugging/inspect/decrypt-v1.go
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Thu Apr 11 21:22:47 GMT 2024 - 1.6K bytes - Click Count (0) -
internal/kms/secret-key.go
if len(value.IV) != IVSize { return ErrDecrypt } if len(value.Nonce) != NonceSize { return ErrDecrypt } switch value.Algorithm { case AES256GCM: c.Algorithm = kms.AES256 case CHACHA20POLY1305: c.Algorithm = kms.ChaCha20 default: c.Algorithm = 0 } c.ID = value.ID c.IV = value.IV c.Nonce = value.Nonce c.Bytes = value.Bytes return nil
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Mon Apr 21 16:23:51 GMT 2025 - 8.4K bytes - Click Count (0) -
internal/config/crypto.go
return nil, err } if stream.NonceSize() != len(metadata.Nonce) { return nil, sio.NotAuthentic } return stream.DecryptReader(ciphertext, metadata.Nonce, nil), nil } type encryptedObject struct { KeyID string `json:"keyid"` KMSKey []byte `json:"kmskey"` Algorithm sio.Algorithm `json:"algorithm"` Nonce []byte `json:"nonce"`
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri May 16 14:27:42 GMT 2025 - 4.7K bytes - Click Count (0) -
.github/workflows/release-notes.yml
name: Check closed issue release notes on: issues: types: [ closed ] permissions: {} jobs: check_release_notes: permissions: issues: write runs-on: ubuntu-latest steps: # Check that release-note-worthy issues have a PR with release notes attachedCreated: Wed Apr 01 11:36:16 GMT 2026 - Last Modified: Thu Jul 04 15:13:53 GMT 2024 - 344 bytes - Click Count (0) -
build-tools-internal/src/main/resources/templates/release-notes.asciidoc
<% for (version in changelogsByVersionByTypeByArea.keySet()) { def unqualifiedVersion = version.withoutQualifier() %>[[release-notes-$unqualifiedVersion]] == {es} version ${unqualifiedVersion} <% if (version.isSnapshot()) { %> coming[$unqualifiedVersion] <% } %> Also see <<breaking-changes-${ version.major }.${ version.minor },Breaking changes in ${ version.major }.${ version.minor }>>. <% if (changelogsByVersionByTypeByArea[version]["security"] != null) { %>
Created: Wed Apr 08 16:19:15 GMT 2026 - Last Modified: Wed Sep 01 06:25:29 GMT 2021 - 1.7K bytes - Click Count (0) -
docs/es/docs/tutorial/body-nested-models.md
Pero luego pensamos en ello, y nos damos cuenta de que los tags no deberían repetirse, probablemente serían strings únicos. Y Python tiene un tipo de datos especial para conjuntos de elementos únicos, el `set`. Entonces podemos declarar `tags` como un conjunto de strings: {* ../../docs_src/body_nested_models/tutorial003_py310.py hl[12] *}Created: Sun Apr 05 07:19:11 GMT 2026 - Last Modified: Thu Mar 19 18:15:55 GMT 2026 - 7.2K bytes - Click Count (0) -
internal/crypto/key.go
} var nonce [32]byte if _, err := io.ReadFull(random, nonce[:]); err != nil { logger.CriticalIf(context.Background(), errOutOfEntropy) } const Context = "object-encryption-key generation" mac := hmac.New(sha256.New, extKey) mac.Write([]byte(Context)) mac.Write(nonce[:]) mac.Sum(key[:0]) return key }
Created: Sun Apr 05 19:28:12 GMT 2026 - Last Modified: Fri May 16 14:27:42 GMT 2025 - 6.2K bytes - Click Count (0)