- Sort Score
- Num 10 results
- Language All
Results 11 - 19 of 19 for gcm (0.04 seconds)
The search processing time has exceeded the limit. The displayed results may be partial.
-
cmd/sftp-server.go
"aes128-ctr", "aes192-ctr", "aes256-ctr", "aes128-gcm@openssh.com", gcm256CipherID, chacha20Poly1305ID, "arcfour256", "arcfour128", "arcfour", aes128cbcID, tripledescbcID, } // preferredCiphers specifies the default preference for ciphers. // https://cs.opensource.google/go/x/crypto/+/refs/tags/v0.22.0:ssh/common.go;l=37 var preferredCiphers = []string{ "aes128-gcm@openssh.com", gcm256CipherID, chacha20Poly1305ID,
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Sun Sep 28 20:59:21 GMT 2025 - 16.5K bytes - Click Count (0) -
internal/kms/secret-key.go
return ErrNotSupported } return ErrKeyExists } // GenerateKey decrypts req.Ciphertext. The key name req.Name must match the key // name of the secretKey. // // The returned DEK is encrypted using AES-GCM and the ciphertext format is compatible // with KES and MinKMS. func (s secretKey) GenerateKey(_ context.Context, req *GenerateKeyRequest) (DEK, error) { if req.Name != s.keyID { return DEK{}, ErrKeyNotFound }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Mon Apr 21 16:23:51 GMT 2025 - 8.4K bytes - Click Count (0) -
docs/security/README.md
- [PRF](#prf): HMAC-SHA-256 - [AEAD](#aead): AES-256-GCM if the CPU supports AES-NI, ChaCha20-Poly1305 otherwise. More specifically AES-256-GCM is only selected for X86-64 CPUs with AES-NI extension.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Feb 26 09:25:50 GMT 2025 - 13.8K bytes - Click Count (0) -
src/test/java/jcifs/audit/SecurityAuditLoggerTest.java
} @Test @DisplayName("Test log encryption") void testLogEncryption() { logger.logEncryption(true, "AES-128-GCM", "SMB3.1.1"); Map<EventType, Long> stats = logger.getStatistics(); assertEquals(Long.valueOf(1), stats.get(EventType.ENCRYPTION_ENABLED), "Should have 1 encryption event"); } @TestCreated: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 8.6K bytes - Click Count (0) -
lib/fips140/v1.0.0-c2097c7c.zip
output } golang.org/fips140@v1.0.0-c2097c7c/fips140/v1.0.0-c2097c7c/aes/gcm/gcm.go // Copyright 2013 The Go Authors. All rights reserved. // Use of this source code is governed by a BSD-style // license that can be found in the LICENSE file. package gcm import ( "crypto/internal/fips140" "crypto/internal/fips140/aes" "crypto/internal/fips140/alias" "errors" ) // GCM represents a Galois Counter Mode with a specific key. type GCM struct { cipher aes.Block nonceSize int tagSize int gcmPlatformData } func...
Created: Tue Dec 30 11:13:12 GMT 2025 - Last Modified: Thu Sep 25 19:53:19 GMT 2025 - 642.7K bytes - Click Count (0) -
docs/smb3-features/02-persistent-handles-design.md
```java public class SecureHandleStorage { private final SecretKey encryptionKey; public void saveEncrypted(HandleInfo handle, Path file) throws Exception { Cipher cipher = Cipher.getInstance("AES/GCM/NoPadding"); cipher.init(Cipher.ENCRYPT_MODE, encryptionKey); ByteArrayOutputStream baos = new ByteArrayOutputStream(); try (CipherOutputStream cos = new CipherOutputStream(baos, cipher);Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 16 02:53:50 GMT 2025 - 31.6K bytes - Click Count (0) -
src/main/java/jcifs/smb/SmbTransportImpl.java
Created: Sat Dec 20 13:44:44 GMT 2025 - Last Modified: Sat Aug 30 05:58:03 GMT 2025 - 69.8K bytes - Click Count (0) -
CHANGELOG/CHANGELOG-1.7.md
* Add secretbox and AES-CBC encryption modes to at rest encryption. AES-CBC is considered superior to AES-GCM because it is resistant to nonce-reuse attacks, and secretbox uses Poly1305 and XSalsa20. ([#46916](https://github.com/kubernetes/kubernetes/pull/46916), [@smarterclayton](https://github.com/smarterclayton)) * Bug fixes:
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Thu May 05 13:44:43 GMT 2022 - 308.7K bytes - Click Count (1) -
CHANGELOG/CHANGELOG-1.8.md
* Add secretbox and AES-CBC encryption modes to at rest encryption. AES-CBC is considered superior to AES-GCM because it is resistant to nonce-reuse attacks, and secretbox uses Poly1305 and XSalsa20. ([#46916](https://github.com/kubernetes/kubernetes/pull/46916), [@smarterclayton](https://github.com/smarterclayton))
Created: Fri Dec 26 09:05:12 GMT 2025 - Last Modified: Tue Feb 20 15:45:02 GMT 2024 - 312.2K bytes - Click Count (0)