Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for SupportedAEADs (0.34 sec)

  1. src/crypto/internal/hpke/hpke.go

    	seqNum uint128
    }
    
    var aesGCMNew = func(key []byte) (cipher.AEAD, error) {
    	block, err := aes.NewCipher(key)
    	if err != nil {
    		return nil, err
    	}
    	return cipher.NewGCM(block)
    }
    
    var SupportedAEADs = map[uint16]struct {
    	keySize   int
    	nonceSize int
    	aead      func([]byte) (cipher.AEAD, error)
    }{
    	// RFC 9180, Section 7.3
    	0x0001: {keySize: 16, nonceSize: 12, aead: aesGCMNew},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 7K bytes
    - Viewed (0)
  2. src/crypto/tls/ech.go

    	for _, ec := range list {
    		if _, ok := hpke.SupportedKEMs[ec.KemID]; !ok {
    			continue
    		}
    		var validSCS bool
    		for _, cs := range ec.SymmetricCipherSuite {
    			if _, ok := hpke.SupportedAEADs[cs.AEADID]; !ok {
    				continue
    			}
    			if _, ok := hpke.SupportedKDFs[cs.KDFID]; !ok {
    				continue
    			}
    			validSCS = true
    			break
    		}
    		if !validSCS {
    			continue
    		}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 7.4K bytes
    - Viewed (0)
  3. src/crypto/internal/hpke/hpke_test.go

    			}
    			if _, ok := SupportedKDFs[uint16(kdfID)]; !ok {
    				t.Skip("unsupported KDF")
    			}
    			aeadID, err := strconv.Atoi(setup["aead_id"])
    			if err != nil {
    				t.Fatal(err)
    			}
    			if _, ok := SupportedAEADs[uint16(aeadID)]; !ok {
    				t.Skip("unsupported AEAD")
    			}
    
    			info := mustDecodeHex(t, setup["info"])
    			pubKeyBytes := mustDecodeHex(t, setup["pkRm"])
    			pub, err := ParseHPKEPublicKey(uint16(kemID), pubKeyBytes)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 4.7K bytes
    - Viewed (0)
Back to top