-
Type:
Task
-
Resolution: Done
-
Priority:
Major - P3
-
None
-
Affects Version/s: None
-
Component/s: None
-
None
-
Security 2022-03-07, Security 2022-03-21
-
55
-
None
-
None
-
None
-
None
-
None
-
None
-
None
As a placeholder, the FLE2 code uses the FLE 1 algorithm
For FLE 2, we should use CTR-AEAD for user data encryption and CTR for all other encryption.