Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for ConstantTimeCompare (0.11 sec)

  1. cmd/auth-handler.go

    	// based on admin credential such that token cannot be decoded
    	// on the client side and is treated like an opaque value.
    	claims, err := auth.ExtractClaims(token, secret)
    	if err != nil {
    		if subtle.ConstantTimeCompare([]byte(secret), []byte(globalActiveCred.SecretKey)) == 1 {
    			return nil, errAuthentication
    		}
    		claims, err = auth.ExtractClaims(token, globalActiveCred.SecretKey)
    		if err != nil {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 17 16:45:46 UTC 2024
    - 26.1K bytes
    - Viewed (0)
  2. cmd/encryption-v1.go

    			if subtle.ConstantTimeCompare(oldKey, newKey) == 1 {
    				return errInvalidSSEParameters // AWS returns special error for equal but invalid keys.
    			}
    			return crypto.ErrInvalidCustomerKey // To provide strict AWS S3 compatibility we return: access denied.
    
    		}
    		if subtle.ConstantTimeCompare(oldKey, newKey) == 1 && sealedKey.Algorithm == crypto.SealAlgorithm {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  3. cmd/admin-handlers.go

    			return
    		}
    		writeSuccessResponseJSON(w, resp)
    		return
    	}
    
    	// 3. Compare generated key with decrypted key
    	if subtle.ConstantTimeCompare(key.Plaintext, decryptedKey) != 1 {
    		response.DecryptionErr = "The generated and the decrypted data key do not match"
    		resp, err := json.Marshal(response)
    		if err != nil {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Oct 04 11:32:32 UTC 2024
    - 99.7K bytes
    - Viewed (0)
Back to top