Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 4 of 4 for cipherText (0.2 sec)

  1. src/crypto/aes/gcm_ppc64x.go

    	}
    
    	tag := ciphertext[len(ciphertext)-g.tagSize:]
    	ciphertext = ciphertext[:len(ciphertext)-g.tagSize]
    
    	var counter, tagMask [gcmBlockSize]byte
    	g.deriveCounter(&counter, nonce)
    
    	g.cipher.Encrypt(tagMask[:], counter[:])
    	gcmInc32(&counter)
    
    	var expectedTag [gcmTagSize]byte
    	g.auth(expectedTag[:], ciphertext, data, &tagMask)
    
    	ret, out := sliceForAppend(dst, len(ciphertext))
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 13 18:57:38 UTC 2024
    - 6.4K bytes
    - Viewed (0)
  2. src/crypto/internal/hpke/hpke_test.go

    					}
    
    					expectedCiphertext := mustDecodeHex(t, enc["ct"])
    					ciphertext, err := context.Seal(mustDecodeHex(t, enc["aad"]), mustDecodeHex(t, enc["pt"]))
    					if err != nil {
    						t.Fatal(err)
    					}
    					if !bytes.Equal(ciphertext, expectedCiphertext) {
    						t.Errorf("unexpected ciphertext: got %x want %x", ciphertext, expectedCiphertext)
    					}
    				})
    			}
    		})
    	}
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 4.7K bytes
    - Viewed (0)
  3. src/crypto/internal/hpke/hpke.go

    		panic("message limit reached")
    	}
    	s.seqNum = s.seqNum.addOne()
    	return nonce
    }
    
    func (s *Sender) Seal(aad, plaintext []byte) ([]byte, error) {
    
    	ciphertext := s.aead.Seal(nil, s.nextNonce(), plaintext, aad)
    	return ciphertext, nil
    }
    
    func SuiteID(kemID, kdfID, aeadID uint16) []byte {
    	suiteID := make([]byte, 0, 4+2+2+2)
    	suiteID = append(suiteID, []byte("HPKE")...)
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Wed May 22 22:33:33 UTC 2024
    - 7K bytes
    - Viewed (0)
  4. cmd/kms-handlers.go

    		return
    	}
    
    	// 2. Verify that we can indeed decrypt the (encrypted) key
    	decryptedKey, err := GlobalKMS.Decrypt(ctx, &kms.DecryptRequest{
    		Name:           key.KeyID,
    		Ciphertext:     key.Ciphertext,
    		AssociatedData: kmsContext,
    	})
    	if err != nil {
    		response.DecryptionErr = err.Error()
    		resp, err := json.Marshal(response)
    		if err != nil {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri May 24 23:05:23 UTC 2024
    - 8.2K bytes
    - Viewed (0)
Back to top