Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 243 for Encryptions (0.28 sec)

  1. src/crypto/internal/hpke/testdata/rfc9180-vectors.json

    bb05449\nsecret: 12fff91991e93b48de37e7daddb52981084bd8aa64289c3788471d9a9712f397\nkey: 4531685d41d65f03dc48f6b8302c05b0\nbase_nonce: 56d890e5accaaf011cff4b7d\nexporter_secret: 45ff1c2e220db587171952c0592d5f5ebe103f1561a2614e38f2ffd47e99e3f8","Encryptions":"sequence number: 0\npt: 4265617574792069732074727574682c20747275746820626561757479\naad: 436f756e742d30\nnonce: 56d890e5accaaf011cff4b7d\nct: f938558b5d72f1a23810b4be2ab4f84331acc02fc97babc53a52ae8218a355a96d8770ac83d07bea87e13c512a\n\nsequence...
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 17.2K bytes
    - Viewed (0)
  2. src/crypto/internal/hpke/hpke_test.go

    func TestRFC9180Vectors(t *testing.T) {
    	vectorsJSON, err := os.ReadFile("testdata/rfc9180-vectors.json")
    	if err != nil {
    		t.Fatal(err)
    	}
    
    	var vectors []struct {
    		Name        string
    		Setup       string
    		Encryptions string
    	}
    	if err := json.Unmarshal(vectorsJSON, &vectors); err != nil {
    		t.Fatal(err)
    	}
    
    	for _, vector := range vectors {
    		t.Run(vector.Name, func(t *testing.T) {
    			setup := parseVectorSetup(vector.Setup)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 4.7K bytes
    - Viewed (0)
  3. src/crypto/aes/gcm_ppc64x.s

    // These macros set up the initial value
    // for a single encryption, or 4 or 8
    // stitched encryptions implemented
    // with interleaving vciphers.
    //
    // The input value for each encryption
    // is generated by XORing the counter
    // from V30 with the first key in VS0
    // and incrementing the counter.
    //
    // Single encryption in V15
    #define GEN_VCIPHER_INPUT \
    	XXLOR VS0, VS0, V29 \
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 27.1K bytes
    - Viewed (0)
  4. staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/aes/aes.go

    // on process startup and must never be used for encryption outside the lifetime of the process.
    // Unlike NewGCMTransformer, this function is immune to the birthday attack and thus the key can
    // be used for 2^64-1 writes without rotation.  Furthermore, cryptographic wear out of AES-GCM with
    // a sequential nonce occurs after 2^64 encryptions, which is not a concern for our use cases.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jul 21 19:25:52 UTC 2023
    - 9.6K bytes
    - Viewed (0)
  5. staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/aes/aes_extended_nonce.go

    // Unlike NewGCMTransformer, this function is immune to the birthday attack because a new key is generated
    // per encryption via a key derivation function: KDF(seed, random_bytes) -> key.  The derived key is
    // only used once as an AES-GCM key with a random 12 byte nonce.  This avoids any concerns around
    // cryptographic wear out (by either number of encryptions or the amount of data being encrypted).
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jul 21 19:25:52 UTC 2023
    - 6.8K bytes
    - Viewed (0)
  6. staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/aes/aes_test.go

    	runEncrypt(t, transformer)
    
    	assertNonce(t, &nonceGen.nonce, 1)
    
    	runEncrypt(t, transformer)
    
    	assertNonce(t, &nonceGen.nonce, 2)
    
    	nonceGen.nonce.Store(math.MaxUint64 - 1) // pretend lots of encryptions occurred
    
    	runEncrypt(t, transformer)
    
    	assertNonce(t, &nonceGen.nonce, math.MaxUint64)
    
    	if count != 0 {
    		t.Errorf("fatal should not have been called yet")
    	}
    
    	runEncrypt(t, transformer)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Jul 21 19:25:52 UTC 2023
    - 23.2K bytes
    - Viewed (0)
  7. cmd/bucket-encryption.go

    	"io"
    
    	sse "github.com/minio/minio/internal/bucket/encryption"
    )
    
    // BucketSSEConfigSys - in-memory cache of bucket encryption config
    type BucketSSEConfigSys struct{}
    
    // NewBucketSSEConfigSys - Creates an empty in-memory bucket encryption configuration cache
    func NewBucketSSEConfigSys() *BucketSSEConfigSys {
    	return &BucketSSEConfigSys{}
    }
    
    // Get - gets bucket encryption config for the given bucket.
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue Oct 25 00:44:15 UTC 2022
    - 1.7K bytes
    - Viewed (0)
  8. cmd/encryption-v1.go

    	errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS")
    	// Additional MinIO errors for SSE-C requests.
    	errObjectTampered = errors.New("The requested object was modified and may be compromised")
    	// error returned when invalid encryption parameters are specified
    	errInvalidEncryptionParameters     = errors.New("The encryption parameters are not applicable to this object")
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 06:56:12 UTC 2024
    - 37.1K bytes
    - Viewed (0)
  9. internal/crypto/auto-encryption.go

    package crypto
    
    import (
    	"github.com/minio/minio/internal/config"
    	"github.com/minio/pkg/v3/env"
    )
    
    const (
    	// EnvKMSAutoEncryption is the environment variable used to en/disable
    	// SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled,
    	// requires a valid KMS configuration and turns any non-SSE-C
    	// request into an SSE-S3 request.
    	// If present EnvAutoEncryption must be either "on" or "off".
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 1.4K bytes
    - Viewed (0)
  10. cmd/bucket-encryption-handlers.go

    	"github.com/minio/minio/internal/logger"
    	"github.com/minio/mux"
    	"github.com/minio/pkg/v3/policy"
    )
    
    const (
    	// Bucket Encryption configuration file name.
    	bucketSSEConfig = "bucket-encryption.xml"
    )
    
    // PutBucketEncryptionHandler - Stores given bucket encryption configuration
    // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 6.4K bytes
    - Viewed (0)
Back to top