- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 18 for DecodeString (0.11 sec)
-
internal/config/identity/openid/jwks.go
case "RSA": if key.N == "" || key.E == "" { return nil, errMalformedJWKRSAKey } // decode exponent ebuf, err := base64.RawURLEncoding.DecodeString(key.E) if err != nil { return nil, errMalformedJWKRSAKey } nbuf, err := base64.RawURLEncoding.DecodeString(key.N) if err != nil { return nil, errMalformedJWKRSAKey } var n, e big.Int n.SetBytes(nbuf) e.SetBytes(ebuf)
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Apr 02 23:02:35 UTC 2024 - 3.1K bytes - Viewed (0) -
internal/crypto/sse-c.go
return key, ErrMissingCustomerKeyMD5 } clientKey, err := base64.StdEncoding.DecodeString(h.Get(xhttp.AmzServerSideEncryptionCustomerKey)) if err != nil || len(clientKey) != 32 { // The client key must be 256 bits long return key, ErrInvalidCustomerKey } keyMD5, err := base64.StdEncoding.DecodeString(h.Get(xhttp.AmzServerSideEncryptionCustomerKeyMD5))
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.2K bytes - Viewed (0) -
internal/crypto/sse-s3.go
// Check whether all extracted values are well-formed iv, err := base64.StdEncoding.DecodeString(b64IV) if err != nil || len(iv) != 32 { return keyID, kmsKey, sealedKey, errInvalidInternalIV } if algorithm != SealAlgorithm { return keyID, kmsKey, sealedKey, errInvalidInternalSealAlgorithm } encryptedKey, err := base64.StdEncoding.DecodeString(b64SealedKey) if err != nil || len(encryptedKey) != 64 {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
cmd/object-api-input-checks.go
if HasSuffix(keyMarker, SlashSeparator) { return InvalidUploadIDKeyCombination{ UploadIDMarker: uploadIDMarker, KeyMarker: keyMarker, } } _, err := base64.RawURLEncoding.DecodeString(uploadIDMarker) if err != nil { return MalformedUploadID{ UploadID: uploadIDMarker, } } } return nil }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Apr 04 12:04:40 UTC 2024 - 5.7K bytes - Viewed (0) -
internal/crypto/sse-kms.go
// Check whether all extracted values are well-formed iv, err := base64.StdEncoding.DecodeString(b64IV) if err != nil || len(iv) != 32 { return keyID, kmsKey, sealedKey, ctx, errInvalidInternalIV } if algorithm != SealAlgorithm { return keyID, kmsKey, sealedKey, ctx, errInvalidInternalSealAlgorithm } encryptedKey, err := base64.StdEncoding.DecodeString(b64SealedKey) if err != nil || len(encryptedKey) != 64 {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0) -
docs/debugging/inspect/decrypt-v1.go
"fmt" "hash/crc32" "io" "github.com/secure-io/sio-go" ) func extractInspectV1(keyHex string, r io.Reader, w io.Writer, okMsg string) error { id, err := hex.DecodeString(keyHex[:8]) if err != nil { return err } key, err := hex.DecodeString(keyHex[8:]) if err != nil { return err } // Verify that CRC is ok. want := binary.LittleEndian.Uint32(id) got := crc32.ChecksumIEEE(key) if want != got {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Apr 11 21:22:47 UTC 2024 - 1.6K bytes - Viewed (0) -
internal/crypto/key_test.go
} func TestDerivePartKey(t *testing.T) { var key ObjectKey for i, test := range derivePartKeyTest { expectedPartKey, err := hex.DecodeString(test.PartKey) if err != nil { t.Fatalf("Test %d failed to decode expected part-key: %v", i, err) } partKey := key.DerivePartKey(test.PartID) if !bytes.Equal(partKey[:], expectedPartKey) {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 12 20:51:54 UTC 2024 - 6.7K bytes - Viewed (0) -
internal/crypto/header.go
return key, ErrMissingCustomerKeyMD5 } clientKey, err := base64.StdEncoding.DecodeString(h.Get(xhttp.AmzServerSideEncryptionCopyCustomerKey)) if err != nil || len(clientKey) != 32 { // The client key must be 256 bits long return key, ErrInvalidCustomerKey } keyMD5, err := base64.StdEncoding.DecodeString(h.Get(xhttp.AmzServerSideEncryptionCopyCustomerKeyMD5))
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Feb 22 06:26:06 UTC 2024 - 2.9K bytes - Viewed (0) -
internal/config/crypto_test.go
Context: kms.Context{"key": "value"}, }, { Data: make([]byte, 1<<20), Context: kms.Context{"key": "value", "a": "b"}, }, } func TestEncryptDecrypt(t *testing.T) { key, err := hex.DecodeString("ddedadb867afa3f73bd33c25499a723ed7f9f51172ee7b1b679e08dc795debcc") if err != nil { t.Fatalf("Failed to decode master key: %v", err) } KMS, err := kms.NewBuiltin("my-key", key) if err != nil {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 3.2K bytes - Viewed (0) -
internal/kms/secret-key_test.go
if err != nil { t.Fatalf("Failed to initialize KMS: %v", err) } for i, test := range decryptKeyTests { dataKey, err := base64.StdEncoding.DecodeString(test.Plaintext) if err != nil { t.Fatalf("Test %d: failed to decode plaintext key: %v", i, err) } plaintext, err := KMS.Decrypt(context.TODO(), &DecryptRequest{ Name: test.KeyID,
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 2.9K bytes - Viewed (0)