Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 2 of 2 for newGCMWithNonceAndTagSize (0.24 sec)

  1. src/crypto/cipher/gcm.go

    // [NewGCM], which is more resistant to misuse.
    func NewGCMWithTagSize(cipher Block, tagSize int) (AEAD, error) {
    	return newGCMWithNonceAndTagSize(cipher, gcmStandardNonceSize, tagSize)
    }
    
    func newGCMWithNonceAndTagSize(cipher Block, nonceSize, tagSize int) (AEAD, error) {
    	if tagSize < gcmMinimumTagSize || tagSize > gcmBlockSize {
    		return nil, errors.New("cipher: incorrect tag size given to GCM")
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 13.7K bytes
    - Viewed (0)
  2. src/crypto/cipher/gcm_test.go

    	aes, _ := aes.NewCipher(key)
    
    	for _, tagSize := range []int{0, 1, aes.BlockSize() + 1} {
    		aesgcm, err := cipher.NewGCMWithTagSize(aes, tagSize)
    		if aesgcm != nil || err == nil {
    			t.Fatalf("NewGCMWithNonceAndTagSize was successful with an invalid %d-byte tag size", tagSize)
    		}
    	}
    }
    
    func TestTagFailureOverwrite(t *testing.T) {
    	// The AESNI GCM code decrypts and authenticates concurrently and so
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed Oct 25 15:27:49 UTC 2023
    - 35K bytes
    - Viewed (0)
Back to top