- Sort Score
- Num 10 results
- Language All
Results 1 - 9 of 9 for GCM (0.06 seconds)
-
internal/crypto/crypto.go
return []uint16{ tls.TLS_CHACHA20_POLY1305_SHA256, // TLS 1.3 tls.TLS_AES_128_GCM_SHA256, tls.TLS_AES_256_GCM_SHA384, tls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256, // TLS 1.2 ECDHE GCM / POLY1305 tls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256, tls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256, tls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256, tls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sat Jul 19 06:23:15 GMT 2025 - 2.8K bytes - Click Count (0) -
docs/security/README.md
- [PRF](#prf): HMAC-SHA-256 - [AEAD](#aead): AES-256-GCM if the CPU supports AES-NI, ChaCha20-Poly1305 otherwise. More specifically AES-256-GCM is only selected for X86-64 CPUs with AES-NI extension.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Feb 26 09:25:50 GMT 2025 - 13.8K bytes - Click Count (0) -
docs/ftp/README.md
``` `--sftp=cipher-algos=...` specifies the allowed cipher algorithms. If unspecified then a sensible default is used. Valid values: ``` aes128-ctr aes192-ctr aes256-ctr aes128-gcm@openssh.com aes256-gcm@openssh.com ******@****.*** arcfour256 arcfour128 arcfour aes128-cbc 3des-cbc ``` `--sftp=mac-algos=...` specifies a default set of MAC algorithms in preference order.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue May 07 06:41:25 GMT 2024 - 7.8K bytes - Click Count (0) -
cmd/sftp-server.go
"aes128-ctr", "aes192-ctr", "aes256-ctr", "aes128-gcm@openssh.com", gcm256CipherID, chacha20Poly1305ID, "arcfour256", "arcfour128", "arcfour", aes128cbcID, tripledescbcID, } // preferredCiphers specifies the default preference for ciphers. // https://cs.opensource.google/go/x/crypto/+/refs/tags/v0.22.0:ssh/common.go;l=37 var preferredCiphers = []string{ "aes128-gcm@openssh.com", gcm256CipherID, chacha20Poly1305ID,
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.5K bytes - Click Count (0) -
internal/kms/secret-key.go
return ErrNotSupported } return ErrKeyExists } // GenerateKey decrypts req.Ciphertext. The key name req.Name must match the key // name of the secretKey. // // The returned DEK is encrypted using AES-GCM and the ciphertext format is compatible // with KES and MinKMS. func (s secretKey) GenerateKey(_ context.Context, req *GenerateKeyRequest) (DEK, error) { if req.Name != s.keyID { return DEK{}, ErrKeyNotFound }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Apr 21 16:23:51 GMT 2025 - 8.4K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
output } golang.org/fips140@v1.0.0-c2097c7c/fips140/v1.0.0-c2097c7c/aes/gcm/gcm.go // Copyright 2013 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package gcm import ( "crypto/internal/fips140" "crypto/internal/fips140/aes" "crypto/internal/fips140/alias" "errors" ) // GCM represents a Galois Counter Mode with a specific key. type GCM struct { cipher aes.Block nonceSize int tagSize int gcmPlatformData } func...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
lib/fips140/v1.1.0-rc1.zip
K2[:]) return output } golang.org/fips140@v1.1.0-rc1/fips140/v1.1.0-rc1/aes/gcm/gcm.go // Copyright 2013 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package gcm import ( "crypto/internal/fips140" "crypto/internal/fips140/aes" "crypto/internal/fips140/alias" "errors" ) // GCM represents a Galois Counter Mode with a specific key. type GCM struct { cipher aes.Block nonceSize int tagSize int gcmPlatformData } func...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Dec 11 16:27:41 GMT 2025 - 663K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.25.md
### Introduced KMS v2 Introduce KMS v2alpha1 API to add performance, rotation, and observability improvements. Encrypt data at rest (ie Kubernetes `Secrets`) with DEK using AES-GCM instead of AES-CBC for kms data encryption. No user action is required. Reads with AES-GCM and AES-CBC will continue to be allowed. See the guide [Using a KMS provider for data encryption](https://kubernetes.io/docs/tasks/administer-cluster/kms-provider/) for more information.
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Mon May 06 09:23:20 GMT 2024 - 419.1K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.8.md
* Add secretbox and AES-CBC encryption modes to at rest encryption. AES-CBC is considered superior to AES-GCM because it is resistant to nonce-reuse attacks, and secretbox uses Poly1305 and XSalsa20. ([#46916](https://github.com/kubernetes/kubernetes/pull/46916), [@smarterclayton](https://github.com/smarterclayton))
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Feb 20 15:45:02 GMT 2024 - 312.2K bytes - Click Count (0)