Search Options

Results per page
Sort
Preferred Languages
Advance

Results 11 - 14 of 14 for cipherText (0.2 sec)

  1. src/crypto/internal/hpke/hpke.go

    		panic("message limit reached")
    	}
    	s.seqNum = s.seqNum.addOne()
    	return nonce
    }
    
    func (s *Sender) Seal(aad, plaintext []byte) ([]byte, error) {
    
    	ciphertext := s.aead.Seal(nil, s.nextNonce(), plaintext, aad)
    	return ciphertext, nil
    }
    
    func SuiteID(kemID, kdfID, aeadID uint16) []byte {
    	suiteID := make([]byte, 0, 4+2+2+2)
    	suiteID = append(suiteID, []byte("HPKE")...)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 7K bytes
    - Viewed (0)
  2. cmd/kms-handlers.go

    		return
    	}
    
    	// 2. Verify that we can indeed decrypt the (encrypted) key
    	decryptedKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{
    		Name:           key.KeyID,
    		Ciphertext:     key.Ciphertext,
    		AssociatedData: kmsContext,
    	})
    	if err != nil {
    		response.DecryptionErr = err.Error()
    		resp, err := json.Marshal(response)
    		if err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 8.2K bytes
    - Viewed (0)
  3. internal/crypto/sse-s3.go

    	}
    	keyID, kmsKey, sealedKey, err := s3.ParseMetadata(metadata)
    	if err != nil {
    		return key, err
    	}
    	unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{
    		Name:           keyID,
    		Ciphertext:     kmsKey,
    		AssociatedData: kms.Context{bucket: path.Join(bucket, object)},
    	})
    	if err != nil {
    		return key, err
    	}
    	err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object)
    	return key, err
    }
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 7.6K bytes
    - Viewed (0)
  4. internal/crypto/sse-kms.go

    	} else if _, ok := ctx[bucket]; !ok {
    		ctx[bucket] = path.Join(bucket, object)
    	}
    	unsealKey, err := k.Decrypt(context.TODO(), &kms.DecryptRequest{
    		Name:           keyID,
    		Ciphertext:     kmsKey,
    		AssociatedData: ctx,
    	})
    	if err != nil {
    		return key, err
    	}
    	err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object)
    	return key, err
    }
    
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Tue May 07 23:55:37 UTC 2024
    - 8.5K bytes
    - Viewed (0)
Back to top