- Sort Score
- Result 10 results
- Languages All
Results 1 - 3 of 3 for SupportedAEADs (0.27 sec)
-
src/crypto/internal/hpke/hpke.go
seqNum uint128 } var aesGCMNew = func(key []byte) (cipher.AEAD, error) { block, err := aes.NewCipher(key) if err != nil { return nil, err } return cipher.NewGCM(block) } var SupportedAEADs = map[uint16]struct { keySize int nonceSize int aead func([]byte) (cipher.AEAD, error) }{ // RFC 9180, Section 7.3 0x0001: {keySize: 16, nonceSize: 12, aead: aesGCMNew},
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 7K bytes - Viewed (0) -
src/crypto/tls/ech.go
for _, ec := range list { if _, ok := hpke.SupportedKEMs[ec.KemID]; !ok { continue } var validSCS bool for _, cs := range ec.SymmetricCipherSuite { if _, ok := hpke.SupportedAEADs[cs.AEADID]; !ok { continue } if _, ok := hpke.SupportedKDFs[cs.KDFID]; !ok { continue } validSCS = true break } if !validSCS { continue }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 7.4K bytes - Viewed (0) -
src/crypto/internal/hpke/hpke_test.go
} if _, ok := SupportedKDFs[uint16(kdfID)]; !ok { t.Skip("unsupported KDF") } aeadID, err := strconv.Atoi(setup["aead_id"]) if err != nil { t.Fatal(err) } if _, ok := SupportedAEADs[uint16(aeadID)]; !ok { t.Skip("unsupported AEAD") } info := mustDecodeHex(t, setup["info"]) pubKeyBytes := mustDecodeHex(t, setup["pkRm"]) pub, err := ParseHPKEPublicKey(uint16(kemID), pubKeyBytes)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 4.7K bytes - Viewed (0)