- Sort Score
- Result 10 results
- Languages All
Results 1 - 7 of 7 for SealedKey (0.22 sec)
-
internal/crypto/sse-s3.go
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 7.6K bytes - Viewed (0) -
internal/crypto/sse-c.go
// metadata map if metadata is nil. func (ssec) CreateMetadata(metadata map[string]string, sealedKey SealedKey) map[string]string { if sealedKey.Algorithm != SealAlgorithm { logger.CriticalIf(context.Background(), Errorf("The seal algorithm '%s' is invalid for SSE-C", sealedKey.Algorithm)) } if metadata == nil { metadata = make(map[string]string, 3) }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 5.2K bytes - Viewed (0) -
internal/crypto/doc.go
// - SealedKey := DAREv2_Enc(KeyEncKey, ObjectKey) // - enc_object_data := DAREv2_Enc(ObjectKey, object_data) // - metadata <- IV // - metadata <- SealedKey // Output: enc_object_data, metadata // // 2. Decrypt: // Input: ClientKey, bucket, object, metadata, enc_object_data // - IV <- metadata // - SealedKey <- metadata
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Aug 26 19:52:29 UTC 2022 - 5K bytes - Viewed (0) -
internal/crypto/sse-kms.go
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0) -
internal/crypto/key_test.go
var extKey, iv [32]byte key := GenerateKey(extKey[:], rand.Reader) sealedKey := key.Seal(extKey[:], iv, "SSE-S3", "bucket", "object") sealedKey.Algorithm = InsecureSealAlgorithm if err := key.Unseal(extKey[:], sealedKey, "SSE-S3", "bucket", "object"); err == nil { t.Errorf("'%s' test succeeded but it should fail because the legacy algorithm was used", sealedKey.Algorithm) } } var derivePartKeyTest = []struct {
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Fri Jul 12 20:51:54 UTC 2024 - 6.7K bytes - Viewed (0) -
internal/crypto/key.go
func (key *ObjectKey) Unseal(extKey []byte, sealedKey SealedKey, domain, bucket, object string) error { var unsealConfig sio.Config switch sealedKey.Algorithm { default: return Errorf("The sealing algorithm '%s' is not supported", sealedKey.Algorithm) case SealAlgorithm: mac := hmac.New(sha256.New, extKey) mac.Write(sealedKey.IV[:]) mac.Write([]byte(domain)) mac.Write([]byte(SealAlgorithm))
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Mar 19 20:28:10 UTC 2024 - 6.4K bytes - Viewed (0) -
internal/crypto/sse.go
// from the metadata using the SSE-C client key. func unsealObjectKey(clientKey []byte, metadata map[string]string, bucket, object string) (key ObjectKey, err error) { sealedKey, err := SSEC.ParseMetadata(metadata) if err != nil { return } err = key.Unseal(clientKey, sealedKey, SSEC.String(), bucket, object) return } // EncryptSinglePart encrypts an io.Reader which must be the // body of a single-part PUT request.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Tue Aug 30 15:26:43 UTC 2022 - 4.4K bytes - Viewed (0)