- Sort Score
- Result 10 results
- Languages All
Results 21 - 30 of 34 for cipherText (0.17 sec)
-
src/crypto/tls/cipher_suites.go
copy(f.nonce[4:], nonce) return f.aead.Seal(out, f.nonce[:], plaintext, additionalData) } func (f *prefixNonceAEAD) Open(out, nonce, ciphertext, additionalData []byte) ([]byte, error) { copy(f.nonce[4:], nonce) return f.aead.Open(out, f.nonce[:], ciphertext, additionalData) } // xorNonceAEAD wraps an AEAD by XORing in a fixed pattern to the nonce // before each call. type xorNonceAEAD struct {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 29 17:58:53 UTC 2024 - 25.5K bytes - Viewed (0) -
cmd/encryption-v1.go
} keyID, kmsKey, sealedKey, err := crypto.S3.ParseMetadata(metadata) if err != nil { return err } oldKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey, AssociatedData: kms.Context{bucket: path.Join(bucket, object)}, }) if err != nil { return err } var objectKey crypto.ObjectKey
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jun 13 06:56:12 UTC 2024 - 37.1K bytes - Viewed (0) -
cmd/bucket-metadata.go
objectKey := crypto.GenerateKey(key.Plaintext, rand.Reader) sealedKey := objectKey.Seal(key.Plaintext, crypto.GenerateIV(rand.Reader), crypto.S3.String(), bucket, "") crypto.S3.CreateMetadata(metadata, key.KeyID, key.Ciphertext, sealedKey) _, err = sio.Encrypt(outbuf, bytes.NewBuffer(input), sio.Config{Key: objectKey[:], MinVersion: sio.Version20, CipherSuites: fips.DARECiphers()}) if err != nil { return output, metabytes, err }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 16.7K bytes - Viewed (0) -
src/crypto/aes/asm_ppc64x.s
MOVD $64, R9 MOVD $80, R10 MOVD $96, R11 MOVD $112, R12 // Load text in BE order P8_LXVB16X(R4, R0, V0) // V1, V2 will hold keys, V0 is a temp. // At completion, V2 will hold the ciphertext. // Load xk[0:3] and xor with text LXVD2X (R0+R5), V1 VXOR V0, V1, V0 // Load xk[4:11] and cipher LXVD2X (R6+R5), V1 LXVD2X (R7+R5), V2 VCIPHER V0, V1, V0 VCIPHER V0, V2, V0
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon May 20 18:05:32 UTC 2024 - 18.6K bytes - Viewed (0) -
internal/crypto/sse-s3.go
} keyID, kmsKey, sealedKey, err := s3.ParseMetadata(metadata) if err != nil { return key, err } unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey, AssociatedData: kms.Context{bucket: path.Join(bucket, object)}, }) if err != nil { return key, err } err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object) return key, err }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
src/crypto/tls/handshake_messages.go
} type clientKeyExchangeMsg struct { ciphertext []byte } func (m *clientKeyExchangeMsg) marshal() ([]byte, error) { length := len(m.ciphertext) x := make([]byte, length+4) x[0] = typeClientKeyExchange x[1] = uint8(length >> 16) x[2] = uint8(length >> 8) x[3] = uint8(length) copy(x[4:], m.ciphertext) return x, nil }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 51.8K bytes - Viewed (0) -
internal/crypto/sse-kms.go
} else if _, ok := ctx[bucket]; !ok { ctx[bucket] = path.Join(bucket, object) } unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{ Name: keyID, Ciphertext: kmsKey, AssociatedData: ctx, }) if err != nil { return key, err } err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object) return key, err }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0) -
src/crypto/tls/handshake_client_tls13.go
} if hs.serverHello.serverShare.group == x25519Kyber768Draft00 { if hs.keyShareKeys.kyber == nil { return c.sendAlert(alertInternalError) } ciphertext := hs.serverHello.serverShare.data[x25519PublicKeySize:] kyberShared, err := kyberDecapsulate(hs.keyShareKeys.kyber, ciphertext) if err != nil { c.sendAlert(alertIllegalParameter) return errors.New("tls: invalid Kyber server key share") }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 27.9K bytes - Viewed (0) -
src/crypto/tls/handshake_server_tls13.go
} if selectedGroup == x25519Kyber768Draft00 { ciphertext, kyberShared, err := kyberEncapsulate(clientKeyShare.data[x25519PublicKeySize:]) if err != nil { c.sendAlert(alertIllegalParameter) return errors.New("tls: invalid Kyber client key share") } hs.sharedKey = append(hs.sharedKey, kyberShared...) hs.hello.serverShare.data = append(hs.hello.serverShare.data, ciphertext...) }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 17:23:54 UTC 2024 - 30.5K bytes - Viewed (0) -
src/crypto/tls/handshake_messages_test.go
m.response = randomBytes(rand.Intn(10)+1, rand) return reflect.ValueOf(m) } func (*clientKeyExchangeMsg) Generate(rand *rand.Rand, size int) reflect.Value { m := &clientKeyExchangeMsg{} m.ciphertext = randomBytes(rand.Intn(1000)+1, rand) return reflect.ValueOf(m) } func (*finishedMsg) Generate(rand *rand.Rand, size int) reflect.Value { m := &finishedMsg{} m.verifyData = randomBytes(12, rand)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 03:10:12 UTC 2024 - 15.7K bytes - Viewed (0)