Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 169 for cipher (0.29 sec)

  1. src/crypto/des/cipher.go

    type tripleDESCipher struct {
    	cipher1, cipher2, cipher3 desCipher
    }
    
    // NewTripleDESCipher creates and returns a new [cipher.Block].
    func NewTripleDESCipher(key []byte) (cipher.Block, error) {
    	if len(key) != 24 {
    		return nil, KeySizeError(len(key))
    	}
    
    	c := new(tripleDESCipher)
    	c.cipher1.generateSubkeys(key[:8])
    	c.cipher2.generateSubkeys(key[8:16])
    	c.cipher3.generateSubkeys(key[16:])
    	return c, nil
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 4K bytes
    - Viewed (0)
  2. src/crypto/tls/cipher_suites.go

    	// certificate is ECDSA or EdDSA. If this is not set then the cipher suite
    	// is RSA based.
    	suiteECSign
    	// suiteTLS12 indicates that the cipher suite should only be advertised
    	// and accepted when using TLS 1.2.
    	suiteTLS12
    	// suiteSHA384 indicates that the cipher suite uses SHA384 as the
    	// handshake hash.
    	suiteSHA384
    )
    
    // A cipherSuite is a TLS 1.0–1.2 cipher suite, and defines the key exchange
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 29 17:58:53 UTC 2024
    - 25.5K bytes
    - Viewed (0)
  3. src/crypto/cipher/gcm.go

    	}
    
    	if cipher, ok := cipher.(gcmAble); ok {
    		return cipher.NewGCM(nonceSize, tagSize)
    	}
    
    	if cipher.BlockSize() != gcmBlockSize {
    		return nil, errors.New("cipher: NewGCM requires 128-bit block cipher")
    	}
    
    	var key [gcmBlockSize]byte
    	cipher.Encrypt(key[:], key[:])
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 13.7K bytes
    - Viewed (0)
  4. src/crypto/aes/gcm_s390x.go

    )
    
    var errOpen = errors.New("cipher: message authentication failed")
    
    // Assert that aesCipherAsm implements the gcmAble interface.
    var _ gcmAble = (*aesCipherAsm)(nil)
    
    // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only
    // called by [crypto/cipher.NewGCM] via the gcmAble interface.
    func (c *aesCipherAsm) NewGCM(nonceSize, tagSize int) (cipher.AEAD, error) {
    	var hk gcmHashKey
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 11.3K bytes
    - Viewed (0)
  5. src/crypto/aes/gcm_ppc64x.go

    func counterCryptASM(nr int, out, in []byte, counter *[gcmBlockSize]byte, key *uint32)
    
    // NewGCM returns the AES cipher wrapped in Galois Counter Mode. This is only
    // called by [crypto/cipher.NewGCM] via the gcmAble interface.
    func (c *aesCipherAsm) NewGCM(nonceSize, tagSize int) (cipher.AEAD, error) {
    	var h1, h2 uint64
    	g := &gcmAsm{cipher: c, ks: c.enc[:c.l], nonceSize: nonceSize, tagSize: tagSize}
    
    	hle := make([]byte, gcmBlockSize)
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  6. src/crypto/aes/asm_ppc64x.s

    //
    #define CIPHER_BLOCK(Vin, Vxor, Vout, vcipher, vciphel, label10, label12) \
    	VXOR	Vin, Vxor, Vout \
    	BEQ	CR1, label10 \
    	BEQ	CR2, label12 \
    	vcipher	Vout, V7, Vout \
    	vcipher	Vout, V8, Vout \
    	label12: \
    	vcipher	Vout, V9, Vout \
    	vcipher	Vout, V10, Vout \
    	label10: \
    	vcipher	Vout, V11, Vout \
    	vcipher	Vout, V12, Vout \
    	vcipher	Vout, V13, Vout \
    	vcipher	Vout, V14, Vout \
    	vcipher	Vout, V15, Vout \
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 20 18:05:32 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  7. pilot/pkg/bootstrap/options.go

    	for _, cipher := range tls.InsecureCipherSuites() {
    		acceptedCiphers[cipher.Name] = cipher.ID
    	}
    	for _, cipher := range tls.CipherSuites() {
    		acceptedCiphers[cipher.Name] = cipher.ID
    	}
    	return acceptedCiphers
    }
    
    // TLSCipherSuites returns a list of cipher suite IDs from the cipher suite names passed.
    func TLSCipherSuites(cipherNames []string) ([]uint16, error) {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 17:48:28 UTC 2024
    - 6.1K bytes
    - Viewed (0)
  8. src/crypto/aes/ctr_s390x.go

    type aesctr struct {
    	block   *aesCipherAsm          // block cipher
    	ctr     [2]uint64              // next value of the counter (big endian)
    	buffer  []byte                 // buffer for the encrypted counter values
    	storage [streamBufferSize]byte // array backing buffer slice
    }
    
    // NewCTR returns a Stream which encrypts/decrypts using the AES block
    // cipher in counter mode. The length of iv must be the same as [BlockSize].
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 2.4K bytes
    - Viewed (0)
  9. src/crypto/tls/handshake_server_test.go

    		compressionMethods: []uint8{compressionNone},
    	}
    	serverConfig := testConfig.Clone()
    	// Reset the enabled cipher suites to nil in order to test the
    	// defaults.
    	serverConfig.CipherSuites = nil
    	testClientHelloFailure(t, serverConfig, clientHello, "no cipher suite supported by both client and server")
    }
    
    func TestRejectSNIWithTrailingDot(t *testing.T) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Jun 03 14:56:25 UTC 2024
    - 64.7K bytes
    - Viewed (0)
  10. src/crypto/internal/hpke/hpke.go

    }
    
    type Sender struct {
    	aead cipher.AEAD
    	kem  *dhKEM
    
    	sharedSecret []byte
    
    	suiteID []byte
    
    	key            []byte
    	baseNonce      []byte
    	exporterSecret []byte
    
    	seqNum uint128
    }
    
    var aesGCMNew = func(key []byte) (cipher.AEAD, error) {
    	block, err := aes.NewCipher(key)
    	if err != nil {
    		return nil, err
    	}
    	return cipher.NewGCM(block)
    }
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 7K bytes
    - Viewed (0)
Back to top