- Sort Score
- Result 10 results
- Languages All
Results 11 - 14 of 14 for cipherText (0.1 sec)
-
src/crypto/internal/hpke/hpke.go
panic("message limit reached") } s.seqNum = s.seqNum.addOne() return nonce } func (s *Sender) Seal(aad, plaintext []byte) ([]byte, error) { ciphertext := s.aead.Seal(nil, s.nextNonce(), plaintext, aad) return ciphertext, nil } func SuiteID(kemID, kdfID, aeadID uint16) []byte { suiteID := make([]byte, 0, 4+2+2+2) suiteID = append(suiteID, []byte("HPKE")...)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 7K bytes - Viewed (0) -
cmd/kms-handlers.go
return } // 2. Verify that we can indeed decrypt the (encrypted) key decryptedKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{ Name: key.KeyID, Ciphertext: key.Ciphertext, AssociatedData: kmsContext, }) if err != nil { response.DecryptionErr = err.Error() resp, err := json.Marshal(response) if err != nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8.2K bytes - Viewed (0) -
internal/crypto/sse-s3.go
} keyID, kmsKey, sealedKey, err := s3.ParseMetadata(metadata) if err != nil { return key, err } unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey, AssociatedData: kms.Context{bucket: path.Join(bucket, object)}, }) if err != nil { return key, err } err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object) return key, err }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
internal/crypto/sse-kms.go
} else if _, ok := ctx[bucket]; !ok { ctx[bucket] = path.Join(bucket, object) } unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey, AssociatedData: ctx, }) if err != nil { return key, err } err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object) return key, err }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0)