-
As a successor for https://github.com/openssl/project/issues/912, we need to encrypt the token so that it cannot be tampered with by malicious actors and is completely opaque to the client. We need to…
-
Issue created from the old "Forthcoming features" section of the roadmap as per OMC vote.
We need a new AEAD API. The current one is not fit for purpose.
-
**Describe the bug:**
Apologies, I couldn’t find a direct way to report documentation bugs.
The [documentation](https://developers.google.com/tink/aead#choose_a_key_type) for the `AEAD` primitiv…
-
AWS [doc](https://docs.aws.amazon.com/cloudhsm/latest/userguide/pkcs11-mechanisms.html#pkcs11-mech-annotations) says
> When performing AES-GCM encryption, the HSM does not accept initialization vect…
-
Though an incremental/"streaming" decryption API is unsafe as by design it must disclose unauthenticated plaintext candidates (which can allow an attacker to perpetrate CCAs), incremental *encryption*…
-
安装后发现没有这样的文件gmssl/aead.h
-
With the support of AEAD-2022 ciphers that make it possible to handle multiple users on one port, how is it possible to get traffic usage data (TX and RX) for each user?
-
### Security issue notifications
If you discover a potential security issue in s2n we ask that you notify
AWS Security via our [vulnerability reporting page](http://aws.amazon.com/security/vulnera…
-
**Describe the bug:**
Following the [Client-side encryption with Tink and Cloud KMS example for Python](https://github.com/tink-crypto/tink/blob/HEAD/python/examples/gcs/gcs_envelope_aead_cli.py). …
ghost updated
1 month ago
-
Using rust-analyzer on this [crate](https://github.com/RustCrypto/traits/tree/a54bd0d7fbe7ea3543ff36eafbfbbb1b309aaccb/aead) (note the commit hash) results in two false-positive compilation errors (i.…