- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 243 for Encryptions (0.23 sec)
-
src/crypto/internal/hpke/testdata/rfc9180-vectors.json
bb05449\nsecret: 12fff91991e93b48de37e7daddb52981084bd8aa64289c3788471d9a9712f397\nkey: 4531685d41d65f03dc48f6b8302c05b0\nbase_nonce: 56d890e5accaaf011cff4b7d\nexporter_secret: 45ff1c2e220db587171952c0592d5f5ebe103f1561a2614e38f2ffd47e99e3f8","Encryptions":"sequence number: 0\npt: 4265617574792069732074727574682c20747275746820626561757479\naad: 436f756e742d30\nnonce: 56d890e5accaaf011cff4b7d\nct: f938558b5d72f1a23810b4be2ab4f84331acc02fc97babc53a52ae8218a355a96d8770ac83d07bea87e13c512a\n\nsequence...
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 17.2K bytes - Viewed (0) -
src/crypto/internal/hpke/hpke_test.go
func TestRFC9180Vectors(t *testing.T) { vectorsJSON, err := os.ReadFile("testdata/rfc9180-vectors.json") if err != nil { t.Fatal(err) } var vectors []struct { Name string Setup string Encryptions string } if err := json.Unmarshal(vectorsJSON, &vectors); err != nil { t.Fatal(err) } for _, vector := range vectors { t.Run(vector.Name, func(t *testing.T) { setup := parseVectorSetup(vector.Setup)
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed May 22 22:33:33 UTC 2024 - 4.7K bytes - Viewed (0) -
src/crypto/aes/gcm_ppc64x.s
// These macros set up the initial value // for a single encryption, or 4 or 8 // stitched encryptions implemented // with interleaving vciphers. // // The input value for each encryption // is generated by XORing the counter // from V30 with the first key in VS0 // and incrementing the counter. // // Single encryption in V15 #define GEN_VCIPHER_INPUT \ XXLOR VS0, VS0, V29 \
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Mar 04 17:29:44 UTC 2024 - 27.1K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/aes/aes.go
// on process startup and must never be used for encryption outside the lifetime of the process. // Unlike NewGCMTransformer, this function is immune to the birthday attack and thus the key can // be used for 2^64-1 writes without rotation. Furthermore, cryptographic wear out of AES-GCM with // a sequential nonce occurs after 2^64 encryptions, which is not a concern for our use cases.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jul 21 19:25:52 UTC 2023 - 9.6K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/aes/aes_extended_nonce.go
// Unlike NewGCMTransformer, this function is immune to the birthday attack because a new key is generated // per encryption via a key derivation function: KDF(seed, random_bytes) -> key. The derived key is // only used once as an AES-GCM key with a random 12 byte nonce. This avoids any concerns around // cryptographic wear out (by either number of encryptions or the amount of data being encrypted).
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jul 21 19:25:52 UTC 2023 - 6.8K bytes - Viewed (0) -
staging/src/k8s.io/apiserver/pkg/storage/value/encrypt/aes/aes_test.go
runEncrypt(t, transformer) assertNonce(t, &nonceGen.nonce, 1) runEncrypt(t, transformer) assertNonce(t, &nonceGen.nonce, 2) nonceGen.nonce.Store(math.MaxUint64 - 1) // pretend lots of encryptions occurred runEncrypt(t, transformer) assertNonce(t, &nonceGen.nonce, math.MaxUint64) if count != 0 { t.Errorf("fatal should not have been called yet") } runEncrypt(t, transformer)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jul 21 19:25:52 UTC 2023 - 23.2K bytes - Viewed (0) -
cmd/bucket-encryption.go
"io" sse "github.com/minio/minio/internal/bucket/encryption" ) // BucketSSEConfigSys - in-memory cache of bucket encryption config type BucketSSEConfigSys struct{} // NewBucketSSEConfigSys - Creates an empty in-memory bucket encryption configuration cache func NewBucketSSEConfigSys() *BucketSSEConfigSys { return &BucketSSEConfigSys{} } // Get - gets bucket encryption config for the given bucket.
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Tue Oct 25 00:44:15 UTC 2022 - 1.7K bytes - Viewed (0) -
cmd/encryption-v1.go
errKMSDefaultKeyAlreadyConfigured = errors.New("A default encryption already exists on KMS") // Additional MinIO errors for SSE-C requests. errObjectTampered = errors.New("The requested object was modified and may be compromised") // error returned when invalid encryption parameters are specified errInvalidEncryptionParameters = errors.New("The encryption parameters are not applicable to this object")
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jun 13 06:56:12 UTC 2024 - 37.1K bytes - Viewed (0) -
internal/crypto/auto-encryption.go
package crypto import ( "github.com/minio/minio/internal/config" "github.com/minio/pkg/v3/env" ) const ( // EnvKMSAutoEncryption is the environment variable used to en/disable // SSE-S3 auto-encryption. SSE-S3 auto-encryption, if enabled, // requires a valid KMS configuration and turns any non-SSE-C // request into an SSE-S3 request. // If present EnvAutoEncryption must be either "on" or "off".
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 1.4K bytes - Viewed (0) -
cmd/bucket-encryption-handlers.go
"github.com/minio/minio/internal/logger" "github.com/minio/mux" "github.com/minio/pkg/v3/policy" ) const ( // Bucket Encryption configuration file name. bucketSSEConfig = "bucket-encryption.xml" ) // PutBucketEncryptionHandler - Stores given bucket encryption configuration // https://docs.aws.amazon.com/AmazonS3/latest/API/API_PutBucketEncryption.html
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Fri May 24 23:05:23 UTC 2024 - 6.4K bytes - Viewed (0)