- Sort Score
- Result 10 results
- Languages All
Results 41 - 50 of 772 for decrypto (0.14 sec)
-
staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/envelope/envelope_test.go
disabled bool keyVersion string } func (t *testEnvelopeService) Decrypt(data []byte) ([]byte, error) { if t.disabled { return nil, fmt.Errorf("Envelope service was disabled") } dataChunks := strings.SplitN(string(data), ":", 2) if len(dataChunks) != 2 { return nil, fmt.Errorf("invalid data encountered for decryption: %s. Missing key version", data) } return base64.StdEncoding.DecodeString(dataChunks[1]) }
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Mar 14 14:23:50 UTC 2023 - 10.1K bytes - Viewed (0) -
internal/kms/secret-key_test.go
if err != nil { t.Fatalf("Failed to generate key: %v", err) } plaintext, err := KMS.Decrypt(context.TODO(), &DecryptRequest{ Name: key.KeyID, Ciphertext: key.Ciphertext, }) if err != nil { t.Fatalf("Failed to decrypt key: %v", err) } if !bytes.Equal(key.Plaintext, plaintext) { t.Fatalf("Decrypted key does not match generated one: got %x - want %x", key.Plaintext, plaintext) } }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 2.9K bytes - Viewed (0) -
internal/kms/kes.go
return nil, err } return c.client.Encrypt(context.Background(), keyID, plaintext, ctxBytes) } // DecryptKey decrypts the ciphertext with the key at the KES // server referenced by the key ID. The context must match the // context value used to generate the ciphertext. func (c *kesConn) Decrypt(ctx context.Context, req *DecryptRequest) ([]byte, error) { aad, err := req.AssociatedData.MarshalText() if err != nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.1K bytes - Viewed (0) -
src/crypto/aes/cipher_s390x.go
if len(src) < BlockSize { panic("crypto/aes: input not full block") } if len(dst) < BlockSize { panic("crypto/aes: output not full block") } if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { panic("crypto/aes: invalid buffer overlap") } cryptBlocks(c.function, &c.key[0], &dst[0], &src[0], BlockSize) } func (c *aesCipherAsm) Decrypt(dst, src []byte) { if len(src) < BlockSize {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 2.6K bytes - Viewed (0) -
src/crypto/rand/rand_js.go
import "syscall/js" // The maximum buffer size for crypto.getRandomValues is 65536 bytes. // https://developer.mozilla.org/en-US/docs/Web/API/Crypto/getRandomValues#exceptions const maxGetRandomRead = 64 << 10 var batchedGetRandom func([]byte) error func init() { Reader = &reader{} batchedGetRandom = batched(getRandom, maxGetRandomRead) } var jsCrypto = js.Global().Get("crypto") var uint8Array = js.Global().Get("Uint8Array")
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 06 18:03:38 UTC 2023 - 1.1K bytes - Viewed (0) -
internal/crypto/sse-c.go
return key, ErrCustomerKeyMD5Mismatch } copy(key[:], clientKey) return key, nil } // UnsealObjectKey extracts and decrypts the sealed object key // from the metadata using the SSE-C client key of the HTTP headers // and returns the decrypted object key. func (s3 ssec) UnsealObjectKey(h http.Header, metadata map[string]string, bucket, object string) (key ObjectKey, err error) { clientKey, err := s3.ParseHTTP(h)
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.2K bytes - Viewed (0) -
internal/kms/conn.go
// The same context must be provided when the generated key // should be decrypted. Therefore, it is the callers // responsibility to remember the corresponding context for // a particular DEK. The context may be nil. GenerateKey(context.Context, *GenerateKeyRequest) (DEK, error) // DecryptKey decrypts the ciphertext with the key referenced // by the key ID. The context must match the context value
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 5K bytes - Viewed (0) -
src/crypto/des/cipher.go
if len(src) < BlockSize { panic("crypto/des: input not full block") } if len(dst) < BlockSize { panic("crypto/des: output not full block") } if alias.InexactOverlap(dst[:BlockSize], src[:BlockSize]) { panic("crypto/des: invalid buffer overlap") } cryptBlock(c.subkeys[:], dst, src, false) } func (c *desCipher) Decrypt(dst, src []byte) { if len(src) < BlockSize {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 13 18:57:38 UTC 2024 - 4K bytes - Viewed (0) -
cmd/kms-handlers.go
return } writeSuccessResponseJSON(w, resp) return } // 2. Verify that we can indeed decrypt the (encrypted) key decryptedKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{ Name: key.KeyID, Ciphertext: key.Ciphertext, AssociatedData: kmsContext, }) if err != nil { response.DecryptionErr = err.Error()
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 8.2K bytes - Viewed (0) -
internal/crypto/sse-kms.go
func (ssekms) IsEncrypted(metadata map[string]string) bool { if _, ok := metadata[MetaSealedKeyKMS]; ok { return true } return false } // UnsealObjectKey extracts and decrypts the sealed object key // from the metadata using KMS and returns the decrypted object // key. func (s3 ssekms) UnsealObjectKey(k *kms.KMS, metadata map[string]string, bucket, object string) (key ObjectKey, err error) { if k == nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0)