- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 329 for decrypto (0.2 sec)
-
cmd/encryption-v1.go
case crypto.SSEC: objectKey := crypto.GenerateKey(key, rand.Reader) sealedKey = objectKey.Seal(key, crypto.GenerateIV(rand.Reader), crypto.SSEC.String(), bucket, object) crypto.SSEC.CreateMetadata(metadata, sealedKey) return objectKey, nil default: return crypto.ObjectKey{}, fmt.Errorf("encryption type '%v' not supported", kind) } }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jun 13 06:56:12 UTC 2024 - 37.1K bytes - Viewed (0) -
internal/config/crypto.go
buffer.Write(metadata) return io.MultiReader( &buffer, stream.EncryptReader(plaintext, nonce, nil), ), nil } // Decrypt decrypts the ciphertext using a key managed by the KMS. // The same context that have been used during encryption must be // provided. func Decrypt(k *kms.KMS, ciphertext io.Reader, associatedData kms.Context) (io.Reader, error) { const ( MaxMetadataSize = 1 << 20 // max. size of the metadata
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 5K bytes - Viewed (0) -
src/crypto/rsa/pkcs1v15.go
package rsa import ( "bytes" "crypto" "crypto/internal/boring" "crypto/internal/randutil" "crypto/subtle" "errors" "io" ) // This file implements encryption and decryption using PKCS #1 v1.5 padding. // PKCS1v15DecryptOptions is for passing options to PKCS #1 v1.5 decryption using // the [crypto.Decrypter] interface. type PKCS1v15DecryptOptions struct {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:21 UTC 2024 - 12.8K bytes - Viewed (0) -
src/crypto/rsa/rsa.go
} return SignPKCS1v15(rand, priv, opts.HashFunc(), digest) } // Decrypt decrypts ciphertext with priv. If opts is nil or of type // *[PKCS1v15DecryptOptions] then PKCS #1 v1.5 decryption is performed. Otherwise // opts must have type *[OAEPOptions] and OAEP decryption is done. func (priv *PrivateKey) Decrypt(rand io.Reader, ciphertext []byte, opts crypto.DecrypterOpts) (plaintext []byte, err error) { if opts == nil {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 23.4K bytes - Viewed (0) -
docs/debugging/inspect/main.go
package main import ( "bufio" crand "crypto/rand" "crypto/rsa" "crypto/x509" "encoding/json" "encoding/pem" "errors" "flag" "fmt" "io" "os" "strings" "time" "github.com/klauspost/filepathx" ) var ( keyHex = flag.String("key", "", "decryption key") privKeyPath = flag.String("private-key", "support_private.pem", "private key")
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 31 14:49:23 UTC 2024 - 5.2K bytes - Viewed (0) -
internal/kms/secret-key.go
Plaintext: plaintext, Ciphertext: ciphertext, }, nil } // Decrypt decrypts req.Ciphertext. The key name req.Name must match the key // name of the secretKey. // // Decrypt supports decryption of binary-encoded ciphertexts, as produced by KES // and MinKMS, and legacy JSON formatted ciphertexts. func (s secretKey) Decrypt(_ context.Context, req *DecryptRequest) ([]byte, error) { if req.Name != s.keyID {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.2K bytes - Viewed (0) -
security/pkg/pki/util/crypto.go
Registered: Fri Jun 14 15:00:06 UTC 2024 - Last Modified: Tue Jun 04 13:00:07 UTC 2024 - 5.3K bytes - Viewed (0) -
internal/kms/kms.go
k.updateMetrics(err, time.Since(start)) return dek, err } // Decrypt decrypts a ciphertext using the master key req.Name. // It returns ErrKeyNotFound if the key does not exist. func (k *KMS) Decrypt(ctx context.Context, req *DecryptRequest) ([]byte, error) { start := time.Now() plaintext, err := k.conn.Decrypt(ctx, req) k.updateMetrics(err, time.Since(start)) return plaintext, err }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 11.4K bytes - Viewed (0) -
src/crypto/aes/gcm_s390x.go
// Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. //go:build !purego package aes import ( "crypto/cipher" "crypto/internal/alias" "crypto/subtle" "errors" "internal/byteorder" "internal/cpu" ) // This file contains two implementations of AES-GCM. The first implementation
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 11.3K bytes - Viewed (0) -
internal/crypto/sse-s3.go
return key, err } unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey, AssociatedData: kms.Context{bucket: path.Join(bucket, object)}, }) if err != nil { return key, err } err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object) return key, err } // UnsealObjectsKeys extracts and decrypts all sealed object keys
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0)