Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 34 of 34 for cipherText (0.21 sec)

  1. staging/src/k8s.io/apiserver/pkg/server/options/encryptionconfig/config_test.go

    		return nil, t.err
    	}
    	return base64.StdEncoding.DecodeString(string(req.Ciphertext))
    }
    
    func (t *testKMSv2EnvelopeService) Encrypt(ctx context.Context, uid string, data []byte) (*kmsservice.EncryptResponse, error) {
    	t.encryptCalls++
    	if t.err != nil {
    		return nil, t.err
    	}
    	return &kmsservice.EncryptResponse{
    		Ciphertext:  []byte(base64.StdEncoding.EncodeToString(data)),
    		KeyID:       t.keyID,
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu May 16 16:56:39 UTC 2024
    - 72.3K bytes
    - Viewed (0)
  2. src/crypto/tls/common.go

    	}
    }
    
    const (
    	maxPlaintext               = 16384        // maximum plaintext payload length
    	maxCiphertext              = 16384 + 2048 // maximum ciphertext payload length
    	maxCiphertextTLS13         = 16384 + 256  // maximum ciphertext length in TLS 1.3
    	recordHeaderLen            = 5            // record header length
    	maxHandshake               = 65536        // maximum handshake we support (protocol max is 16 MB)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 59.1K bytes
    - Viewed (0)
  3. cmd/admin-handlers.go

    		return
    	}
    
    	// 2. Verify that we can indeed decrypt the (encrypted) key
    	decryptedKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{
    		Name:           key.KeyID,
    		Ciphertext:     key.Ciphertext,
    		AssociatedData: kmsContext,
    	})
    	if err != nil {
    		response.DecryptionErr = err.Error()
    		resp, err := json.Marshal(response)
    		if err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 98K bytes
    - Viewed (0)
  4. src/crypto/tls/conn.go

    	// are included in the MAC. Otherwise, an attacker that could
    	// distinguish MAC failures from padding failures could mount an attack
    	// similar to POODLE in SSL 3.0: given a good ciphertext that uses a
    	// full block's worth of padding, replace the final block with another
    	// block. If the MAC check passed but the padding check failed, the
    	// last byte of that block decrypted to the block size.
    	//
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Thu May 23 03:10:12 UTC 2024
    - 51.8K bytes
    - Viewed (0)
Back to top