tink-java icon indicating copy to clipboard operation
tink-java copied to clipboard

Java implementation of Tink

Results 18 tink-java issues
Sort by recently updated
recently updated
newest added

**Describe the bug:** `AesSivParameters` allows and validates keys of lengths 32, 48, and 64 bytes https://github.com/tink-crypto/tink-java/blob/main/src/main/java/com/google/crypto/tink/daead/AesSivParameters.java#L54-L69 However `AesSivKeyManager` Supports only 64 https://github.com/tink-crypto/tink-java/blob/main/src/main/java/com/google/crypto/tink/daead/AesSivKeyManager.java#L79-L87 **What was the expected behavior?** For keys of...

This is the same issue as already discussed here for AES-GCM: https://github.com/tink-crypto/tink/issues/208 AES-SIV currently creates a new cipher object on each call to encryptDeterministically and decryptDeterministically. But creating these objects...

It seems that java tink library does not scale with java threads. Find attached a small java test program. Find below test results with one and three threads, running on...

p3

**Help us help you** We're using Tink via AndroidX Jetpack Security `v1.1.0-alpha06` and using the non-deprecated `EncryptedSharedPreferences.create` method that avoids the race condition when creating a global `MasterKey`. The crash...

p3

This enables keys of lengths 32 and 48 bytes to be used see https://github.com/tink-crypto/tink-java/issues/32

**Describe the bug:** Tink is not compatible with protobuf-java v4.26.0 due to a class being renamed. Attempting to initialize Tink when using protobuf v4.26.0 results in this error ``` java.lang.ExceptionInInitializerError:...

**Describe the bug:** We started using EncryptedSharedPreferences and now receive a lot of ANR from Google Play Console. There is not much information, but some of ANRs points to com.google.crypto.tink...

p3

**Is your feature request related to a problem?** We are using the Aead Evenlope encryption. We are planning to store the DEK KeyTemplate with the encrypted data so that we...

**Help us help you** We'd like to know more about [your Tink deployment](https://docs.google.com/forms/d/1mhHvyNJQgTXFDnqOermB7-BD8GQSyvtFPUAhILRbYcA/). **Describe the bug:** `JwtPublicKeyVerify` primitive shows a huge performance gap in verifying a JWT depending on the...

enhancement
p3

Your docs state > Android Keystore is only useful when you want to require user authentication for key use but your implementation looks like it would need a complete rewrite...

p3