Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 2 of 2 for AEAD (0.08 seconds)

  1. api/go1.26.txt

    pkg crypto/fips140, func WithoutEnforcement(func()) #74630
    pkg crypto/hpke, func AES128GCM() AEAD #75300
    pkg crypto/hpke, func AES256GCM() AEAD #75300
    pkg crypto/hpke, func ChaCha20Poly1305() AEAD #75300
    pkg crypto/hpke, func DHKEM(ecdh.Curve) KEM #75300
    pkg crypto/hpke, func ExportOnly() AEAD #75300
    pkg crypto/hpke, func HKDFSHA256() KDF #75300
    pkg crypto/hpke, func HKDFSHA384() KDF #75300
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Thu Dec 11 19:57:52 GMT 2025
    - 11.5K bytes
    - Click Count (0)
  2. lib/fips140/v1.26.0.zip

    bytes, and out must be 16 bytes longer than plaintext. // out and plaintext may overlap exactly or not at all. additionalData and out // must not overlap. // // This complies with FIPS 140-3 IG C.H Scenario 2. // // Note that this is NOT a [cipher.AEAD].Seal method. func SealWithRandomNonce(g *GCM, nonce, out, plaintext, additionalData []byte) { if uint64(len(plaintext)) > uint64((1<<32)-2)*gcmBlockSize { panic("crypto/cipher: message too large for GCM") } if len(nonce) != gcmStandardNonceSize {...
    Created: Tue Apr 07 11:13:11 GMT 2026
    - Last Modified: Thu Jan 08 17:58:32 GMT 2026
    - 660.3K bytes
    - Click Count (0)
Back to Top