Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 31 for hmac (0.03 sec)

  1. internal/kms/secret-key.go

    	iv, nonce := random[:16], random[16:]
    
    	var aead cipher.AEAD
    	switch keyType {
    	case kms.AES256:
    		mac := hmac.New(sha256.New, s.key)
    		mac.Write(iv)
    		sealingKey := mac.Sum(nil)
    
    		block, err := aes.NewCipher(sealingKey)
    		if err != nil {
    			return nil, err
    		}
    		aead, err = cipher.NewGCM(block)
    		if err != nil {
    			return nil, err
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 8.3K bytes
    - Viewed (0)
  2. cmd/sftp-server.go

    // supportedMACs specifies a default set of MAC algorithms in preference order.
    // This is based on RFC 4253, section 6.4, but with hmac-md5 variants removed
    // because they have reached the end of their useful life.
    // https://cs.opensource.google/go/x/crypto/+/refs/tags/v0.22.0:ssh/common.go;l=85
    var supportedMACs = []string{
    	"hmac******@****.***", "hmac******@****.***", "hmac-sha2-256", "hmac-sha2-512", "hmac-sha1", "hmac-sha1-96",
    }
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Aug 20 20:00:29 UTC 2024
    - 16K bytes
    - Viewed (0)
  3. internal/jwt/parser.go

    import (
    	"bytes"
    	"crypto"
    	"crypto/hmac"
    	"encoding/base64"
    	"errors"
    	"fmt"
    	"hash"
    	"sync"
    	"time"
    
    	"github.com/buger/jsonparser"
    	"github.com/dustin/go-humanize"
    	jwtgo "github.com/golang-jwt/jwt/v4"
    	jsoniter "github.com/json-iterator/go"
    )
    
    // SigningMethodHMAC - Implements the HMAC-SHA family of signing methods signing methods
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 17 16:45:46 UTC 2024
    - 14.1K bytes
    - Viewed (0)
  4. cmd/encryption-v1.go

    	var partIDbin [4]byte
    	binary.LittleEndian.PutUint32(partIDbin[:], uint32(partID)) // marshal part ID
    
    	mac := hmac.New(sha256.New, d.objectEncryptionKey) // derive part encryption key from part ID and object key
    	mac.Write(partIDbin[:])
    	partEncryptionKey := mac.Sum(nil)
    
    	// Limit the reader, so the decryptor doesn't receive bytes
    	// from the next part (different DARE stream)
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Oct 13 13:06:08 UTC 2024
    - 37.2K bytes
    - Viewed (0)
  5. cmd/test-utils_test.go

    // along with this program.  If not, see <http://www.gnu.org/licenses/>.
    
    package cmd
    
    import (
    	"archive/zip"
    	"bufio"
    	"bytes"
    	"context"
    	"crypto/ecdsa"
    	"crypto/hmac"
    	crand "crypto/rand"
    	"crypto/rsa"
    	"crypto/sha1"
    	"crypto/tls"
    	"crypto/x509"
    	"crypto/x509/pkix"
    	"encoding/base64"
    	"encoding/hex"
    	"encoding/pem"
    	"encoding/xml"
    	"errors"
    	"flag"
    	"fmt"
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 01 22:13:18 UTC 2024
    - 77K bytes
    - Viewed (0)
  6. internal/kms/kes.go

    			return nil, ErrPermission
    		}
    		return nil, errDecryptionFailed(err)
    	}
    	return plaintext, nil
    }
    
    // MAC generates the checksum of the given req.Message using the key
    // with the req.Name at the KMS.
    func (c *kesConn) MAC(ctx context.Context, req *MACRequest) ([]byte, error) {
    	mac, err := c.client.HMAC(context.Background(), req.Name, req.Message)
    	if err != nil {
    		if errors.Is(err, kes.ErrKeyNotFound) {
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Sun Aug 18 06:43:03 UTC 2024
    - 7.3K bytes
    - Viewed (0)
  7. internal/config/identity/openid/jwt.go

    func (r *Config) PopulatePublicKey(arn arn.ARN) error {
    	pCfg := r.arnProviderCfgsMap[arn]
    	if pCfg.JWKS.URL == nil || pCfg.JWKS.URL.String() == "" {
    		return nil
    	}
    
    	// Add client secret for the client ID for HMAC based signature.
    	r.pubKeys.add(pCfg.ClientID, []byte(pCfg.ClientSecret))
    
    	client := &http.Client{
    		Transport: r.transport,
    	}
    
    	resp, err := client.Get(pCfg.JWKS.URL.String())
    	if err != nil {
    		return err
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Fri Sep 06 02:46:36 UTC 2024
    - 8.4K bytes
    - Viewed (0)
  8. cmd/config-current.go

    		return
    	}
    
    	aKey, err := GlobalKMS.MAC(GlobalContext, &kms.MACRequest{Message: []byte("root access key")})
    	if errors.Is(err, kes.ErrNotAllowed) || errors.Is(err, errors.ErrUnsupported) {
    		return // If we don't have permission to compute the HMAC, don't change the cred.
    	}
    	if err != nil {
    		logger.Fatal(err, "Unable to generate root access key using KMS")
    	}
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Sep 03 18:23:41 UTC 2024
    - 30.1K bytes
    - Viewed (0)
  9. cmd/api-errors.go

    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrSignatureVersionNotSupported: {
    		Code:           "InvalidRequest",
    		Description:    "The authorization mechanism you have provided is not supported. Please use AWS4-HMAC-SHA256.",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrBucketNotEmpty: {
    		Code:           "BucketNotEmpty",
    		Description:    "The bucket you tried to delete is not empty",
    		HTTPStatusCode: http.StatusConflict,
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Tue Oct 01 22:13:18 UTC 2024
    - 92.1K bytes
    - Viewed (0)
  10. cmd/xl-storage_test.go

    	// create xlStorage test setup
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Wed Aug 14 17:11:51 UTC 2024
    - 66.7K bytes
    - Viewed (0)
Back to top