- Sort Score
- Result 10 results
- Languages All
Results 1 - 9 of 9 for CryptBlocks (0.27 sec)
-
src/crypto/aes/cipher_s390x.go
key []byte // key (128, 192 or 256 bits) storage [32]byte // array backing key slice } // cryptBlocks invokes the cipher message (KM) instruction with // the given function code. This is equivalent to AES in ECB // mode. The length must be a multiple of BlockSize (16). // //go:noescape func cryptBlocks(c code, key, dst, src *byte, length int) func newCipher(key []byte) (cipher.Block, error) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 2.6K bytes - Viewed (0) -
src/crypto/aes/cbc_s390x.go
// with the given function code. The length must be a multiple of BlockSize (16). // //go:noescape func cryptBlocksChain(c code, iv, key, dst, src *byte, length int) func (x *cbc) CryptBlocks(dst, src []byte) { if len(src)%BlockSize != 0 { panic("crypto/cipher: input not full blocks") } if len(dst) < len(src) { panic("crypto/cipher: output smaller than input") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 1.6K bytes - Viewed (0) -
src/crypto/aes/cbc_ppc64x.go
// cryptBlocksChain invokes the cipher message identifying encrypt or decrypt. // //go:noescape func cryptBlocksChain(src, dst *byte, length int, key *uint32, iv *byte, enc int, nr int) func (x *cbc) CryptBlocks(dst, src []byte) { if len(src)%BlockSize != 0 { panic("crypto/cipher: input not full blocks") } if len(dst) < len(src) { panic("crypto/cipher: output smaller than input") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue Mar 26 19:58:31 UTC 2024 - 1.7K bytes - Viewed (0) -
src/crypto/aes/asm_s390x.s
// Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build !purego #include "textflag.h" // func cryptBlocks(c code, key, dst, src *byte, length int) TEXT ยทcryptBlocks(SB),NOSPLIT,$0-40 MOVD key+8(FP), R1 MOVD dst+16(FP), R2 MOVD src+24(FP), R4 MOVD length+32(FP), R5 MOVD c+0(FP), R0 loop: KM R2, R4 // cipher message (KM)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 4.4K bytes - Viewed (0) -
src/crypto/x509/pem_decrypt.go
return nil, errors.New("x509: encrypted PEM data is not a multiple of the block size") } data := make([]byte, len(b.Bytes)) dec := cipher.NewCBCDecrypter(block, iv) dec.CryptBlocks(data, b.Bytes) // Blocks are padded using a scheme where the last n bytes of padding are all // equal to n. It can pad from 1 to blocksize bytes inclusive. See RFC 1423. // For example: // [x y z 2 2]
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Oct 13 17:09:47 UTC 2023 - 7.2K bytes - Viewed (0) -
src/crypto/aes/ctr_s390x.go
// Increment in big endian: c0 is high, c1 is low. c1++ if c1 == 0 { // add carry c0++ } } c.ctr[0], c.ctr[1] = c0, c1 // Encrypt the buffer using AES in ECB mode. cryptBlocks(c.block.function, &c.block.key[0], &c.buffer[0], &c.buffer[0], streamBufferSize) } func (c *aesctr) XORKeyStream(dst, src []byte) { if len(dst) < len(src) { panic("crypto/cipher: output smaller than input") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 2.4K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/aes/aes.go
if len(data)%blockSize != 0 { return nil, false, errInvalidBlockSize } result := make([]byte, len(data)) copy(result, data) mode := cipher.NewCBCDecrypter(t.block, iv) mode.CryptBlocks(result, result) // remove and verify PKCS#7 padding for CBC c := result[len(result)-1] paddingSize := int(c) size := len(result) - paddingSize if paddingSize == 0 || paddingSize > len(result) {
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jul 21 19:25:52 UTC 2023 - 9.6K bytes - Viewed (0) -
src/crypto/internal/boring/aes.go
&c.dec) } type aesCBC struct { key *C.GO_AES_KEY mode C.int iv [aesBlockSize]byte } func (x *aesCBC) BlockSize() int { return aesBlockSize } func (x *aesCBC) CryptBlocks(dst, src []byte) { if inexactOverlap(dst, src) { panic("crypto/cipher: invalid buffer overlap") } if len(src)%aesBlockSize != 0 { panic("crypto/cipher: input not full blocks") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Fri Jan 26 22:52:27 UTC 2024 - 10.2K bytes - Viewed (0) -
src/crypto/tls/conn.go
return nil, 0, alertBadRecordMAC } if explicitNonceLen > 0 { c.SetIV(payload[:explicitNonceLen]) payload = payload[explicitNonceLen:] } c.CryptBlocks(payload, payload) // In a limited attempt to protect against CBC padding oracles like // Lucky13, the data past paddingLen (which is secret) is passed to
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 51.8K bytes - Viewed (0)