Issues
- 3
AWS Encryption SDK support for Go
#250 opened by brianterry - 2
- 0
Make Duvet public
#240 opened by alex-chew - 0
MBedTLS support
#237 opened by disa6302 - 0
Feature request: add option to immediately validate ciphertext by decrypting it
#235 opened by farleyb-amazon - 0
Update specification to add key commitment
#231 opened by robin-aws - 0
Implementation: Hold final frame plaintext on Decrypt until signature verifies
#184 opened by lavaleri - 0
- 1
- 2
- 0
- 0
We love Big Endian
#228 opened by seebees - 0
- 0
- 0
Implementation: Add maxHeaderSize Decrypt input
#182 opened by lavaleri - 0
implementation: follow-up to refactoring CMC spec
#192 opened by alex-chew - 0
Raw RSA Keyring doc security considerations
#207 opened by lavaleri - 0
Raw AES Keyring doc security considerations
#206 opened by lavaleri - 0
KMS Keyring doc security considerations
#204 opened by lavaleri - 0
Algorithm Suites doc security consideration section
#201 opened by lavaleri - 0
Message Header doc security considerations
#200 opened by lavaleri - 0
Test Vectors for Message Format
#199 opened by lavaleri - 0
Encrypt doc security considerations
#196 opened by lavaleri - 0
- 0
(grammar) Standardize useage of possesive form of "decryption materials"
#218 opened by MatthewBennington - 1
Multi Keyring doc security considerations
#205 opened by lavaleri - 0
Caching CMM doc Security Considerations
#203 opened by lavaleri - 0
Algorithm Suites test vectors
#202 opened by lavaleri - 0
Add unframed example bytes to Message Body doc
#198 opened by lavaleri - 0
Message Body AAD doc security considerations
#197 opened by lavaleri - 0
- 0
move spec doc versions into yaml metadata
#193 opened by mattsb42-aws - 0
Implementation: Encrypt input maxPlaintextSize is NOT passed to CMM is plaintext length is known
#180 opened by lavaleri - 0
define standard no-op keyring errors
#164 opened by mattsb42-aws - 0
- 0
define decryption contracts for all keyrings
#185 opened by mattsb42-aws - 0
- 0
- 0
define decryption contract for raw RSA keyring
#188 opened by mattsb42-aws - 0
define decryption contract for raw AES keyring
#187 opened by mattsb42-aws - 0
Implementation: Raw AES Keyring MUST fail when given unserializable EC
#174 opened by MatthewBennington - 0
- 0
implementation: detecting base64-encoded messages
#169 opened by robin-aws - 0
- 0
Implementation: Raw keyrings MUST NOT accept a key namespace of "aws-kms"
#171 opened by MatthewBennington - 0
- 0
Determine how/where/if the Raw RSA Keyring checks that public/private keys match
#167 opened by MatthewBennington - 0
implementation: re-designing the AWS KMS keyring
#165 opened by acioc - 0
- 2
Generalize "Encrypted Data Key" term
#158 opened by robin-aws