- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 29 for aesctr (0.17 sec)
-
src/crypto/internal/boring/aes.go
x := &aesCBC{key: &c.dec, mode: C.GO_AES_DECRYPT} copy(x.iv[:], iv) return x } type aesCTR struct { key *C.GO_AES_KEY iv [aesBlockSize]byte num C.uint ecount_buf [16]C.uint8_t } func (x *aesCTR) XORKeyStream(dst, src []byte) { if inexactOverlap(dst, src) { panic("crypto/cipher: invalid buffer overlap") } if len(dst) < len(src) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jan 26 22:52:27 UTC 2024 - 10.2K bytes - Viewed (0) -
src/crypto/aes/gcm_amd64.s
#define pTbl DI #define ctx DX #define ctrPtr CX #define ptx SI #define ks AX #define tPtr R8 #define ptxLen R9 #define aluCTR R10 #define aluTMP R11 #define aluK R12 #define NR R13 #define increment(i) ADDL $1, aluCTR; MOVL aluCTR, aluTMP; XORL aluK, aluTMP; BSWAPL aluTMP; MOVL aluTMP, (3*4 + 8*16 + i*16)(SP)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 23.4K bytes - Viewed (0) -
subprojects/core/src/test/groovy/org/gradle/api/internal/tasks/options/OptionReaderTest.groovy
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Thu Aug 10 12:45:01 UTC 2023 - 33.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/apiserver/validation/validation_encryption.go
case provider.AESGCM != nil: allErrs = append(allErrs, validateKeys(provider.AESGCM.Keys, path.Child("aesgcm").Child("keys"), aesKeySizes)...) case provider.AESCBC != nil: allErrs = append(allErrs, validateKeys(provider.AESCBC.Keys, path.Child("aescbc").Child("keys"), aesKeySizes)...) case provider.Secretbox != nil:
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Dec 18 20:54:24 UTC 2023 - 13.3K bytes - Viewed (0) -
platforms/software/platform-base/src/test/groovy/org/gradle/language/base/internal/ComponentTypeModelRuleExtractorTest.groovy
"library" | ComponentModelBasePlugin "application" | ComponentModelBasePlugin } def "decent error message for rule declaration problem - #descr"() { def ruleMethod = ruleDefinitionForMethod(methodName) def ruleDescription = getStringDescription(ruleMethod.method) when: extract(ruleMethod) then:
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Wed Oct 11 12:16:09 UTC 2023 - 10.2K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/apiserver/v1/zz_generated.conversion.go
out.AESGCM = (*apiserver.AESConfiguration)(unsafe.Pointer(in.AESGCM)) out.AESCBC = (*apiserver.AESConfiguration)(unsafe.Pointer(in.AESCBC)) out.Secretbox = (*apiserver.SecretboxConfiguration)(unsafe.Pointer(in.Secretbox)) out.Identity = (*apiserver.IdentityConfiguration)(unsafe.Pointer(in.Identity))
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Dec 18 20:54:24 UTC 2023 - 20.5K bytes - Viewed (0) -
src/crypto/cipher/example_test.go
panic(err) } stream := cipher.NewCTR(block, iv) stream.XORKeyStream(ciphertext[aes.BlockSize:], plaintext) // It's important to remember that ciphertexts must be authenticated // (i.e. by using crypto/hmac) as well as being encrypted in order to // be secure. // CTR mode is the same for both encryption and decryption, so we can // also decrypt that ciphertext with NewCTR.
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Oct 30 16:23:44 UTC 2018 - 11.8K bytes - Viewed (0) -
src/cmd/vet/vet_test.go
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 03 01:02:40 UTC 2024 - 12.5K bytes - Viewed (0) -
src/time/zoneinfo_abbrs_windows.go
"Cen. Australia Standard Time": {"ACST", "ACDT"}, // Australia/Adelaide "E. Australia Standard Time": {"AEST", "AEST"}, // Australia/Brisbane "AUS Central Standard Time": {"ACST", "ACST"}, // Australia/Darwin "Aus Central W. Standard Time": {"+0845", "+0845"}, // Australia/Eucla "Tasmania Standard Time": {"AEST", "AEDT"}, // Australia/Hobart "Lord Howe Standard Time": {"+1030", "+11"}, // Australia/Lord_Howe
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri May 12 20:01:59 UTC 2023 - 10.5K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/apis/apiserver/zz_generated.deepcopy.go
*out = *in if in.AESGCM != nil { in, out := &in.AESGCM, &out.AESGCM *out = new(AESConfiguration) (*in).DeepCopyInto(*out) } if in.AESCBC != nil { in, out := &in.AESCBC, &out.AESCBC *out = new(AESConfiguration) (*in).DeepCopyInto(*out) } if in.Secretbox != nil { in, out := &in.Secretbox, &out.Secretbox *out = new(SecretboxConfiguration)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Dec 18 20:54:24 UTC 2023 - 21.6K bytes - Viewed (0)