Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 53 for ALGORITHM (0.18 sec)

  1. cmd/erasure-decode_test.go

    	{dataBlocks: 4, onDisks: 8, offDisks: 0, blocksize: int64(blockSizeV2), data: oneMiByte, offset: 0, length: oneMiByte, algorithm: DefaultBitrotAlgorithm, shouldFail: false, shouldFailQuorum: false}, // 2
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jan 30 20:43:25 GMT 2024
    - 21.1K bytes
    - Viewed (1)
  2. cmd/signature-v4_test.go

    		{
    			region:   globalMinioDefaultRegion,
    			expected: ErrInvalidQueryParams,
    		},
    		// (1) Should error on an invalid access key.
    		{
    			queryParams: map[string]string{
    				"X-Amz-Algorithm":     signV4Algorithm,
    				"X-Amz-Date":          now.Format(iso8601Format),
    				"X-Amz-Expires":       "60",
    				"X-Amz-Signature":     "badsignature",
    				"X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 10.4K bytes
    - Viewed (1)
  3. internal/crypto/key.go

    func (key *ObjectKey) Unseal(extKey []byte, sealedKey SealedKey, domain, bucket, object string) error {
    	var unsealConfig sio.Config
    	switch sealedKey.Algorithm {
    	default:
    		return Errorf("The sealing algorithm '%s' is not supported", sealedKey.Algorithm)
    	case SealAlgorithm:
    		mac := hmac.New(sha256.New, extKey)
    		mac.Write(sealedKey.IV[:])
    		mac.Write([]byte(domain))
    		mac.Write([]byte(SealAlgorithm))
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Mar 19 20:28:10 GMT 2024
    - 6.4K bytes
    - Viewed (0)
  4. cmd/erasure-heal_test.go

    	blocksize, size int64
    	algorithm       BitrotAlgorithm
    	shouldFail      bool
    }{
    	{dataBlocks: 2, disks: 4, offDisks: 1, badDisks: 0, badStaleDisks: 0, blocksize: int64(blockSizeV2), size: oneMiByte, algorithm: SHA256, shouldFail: false},                   // 0
    	{dataBlocks: 3, disks: 6, offDisks: 2, badDisks: 0, badStaleDisks: 0, blocksize: int64(blockSizeV2), size: oneMiByte, algorithm: BLAKE2b512, shouldFail: false},               // 1
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jan 30 20:43:25 GMT 2024
    - 7.9K bytes
    - Viewed (0)
  5. internal/crypto/metadata_test.go

    		}
    		if keyID != test.KeyID {
    			t.Errorf("Test %d: got key-ID '%v' - want key-ID '%v'", i, keyID, test.KeyID)
    		}
    		if sealedKey.Algorithm != test.SealedKey.Algorithm {
    			t.Errorf("Test %d: got sealed key algorithm '%v' - want sealed key algorithm '%v'", i, sealedKey.Algorithm, test.SealedKey.Algorithm)
    		}
    		if !bytes.Equal(sealedKey.Key[:], test.SealedKey.Key[:]) {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Feb 02 00:13:57 GMT 2024
    - 18.7K bytes
    - Viewed (0)
  6. cmd/bitrot.go

    	}
    	for algorithm := range bitrotAlgorithms {
    		if !algorithm.Available() {
    			continue
    		}
    
    		checksum, err := hex.DecodeString(checksums[algorithm])
    		if err != nil {
    			logger.Fatal(errSelfTestFailure, fmt.Sprintf("bitrot: failed to decode %v checksum %s for selftest: %v", algorithm, checksums[algorithm], err))
    		}
    		var (
    			hash = algorithm.New()
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Jan 30 20:43:25 GMT 2024
    - 7.6K bytes
    - Viewed (0)
  7. internal/kms/single-key.go

    		}
    	}
    	iv, err := sioutil.Random(16)
    	if err != nil {
    		return DEK{}, err
    	}
    
    	var algorithm string
    	if sioutil.NativeAES() {
    		algorithm = algorithmAESGCM
    	} else {
    		algorithm = algorithmChaCha20Poly1305
    	}
    
    	var aead cipher.AEAD
    	switch algorithm {
    	case algorithmAESGCM:
    		mac := hmac.New(sha256.New, kms.key)
    		mac.Write(iv)
    		sealingKey := mac.Sum(nil)
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Mar 01 21:09:42 GMT 2024
    - 7.9K bytes
    - Viewed (0)
  8. internal/crypto/sse-kms.go

    func (ssekms) CreateMetadata(metadata map[string]string, keyID string, kmsKey []byte, sealedKey SealedKey, ctx kms.Context) map[string]string {
    	if sealedKey.Algorithm != SealAlgorithm {
    		logger.CriticalIf(context.Background(), Errorf("The seal algorithm '%s' is invalid for SSE-S3", sealedKey.Algorithm))
    	}
    
    	// There are two possibilities:
    	// - We use a KMS -> There must be non-empty key ID and a KMS data key.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 8.4K bytes
    - Viewed (0)
  9. cmd/signature-v4-parser.go

    type preSignValues struct {
    	signValues
    	Date    time.Time
    	Expires time.Duration
    }
    
    // Parses signature version '4' query string of the following form.
    //
    //	querystring = X-Amz-Algorithm=algorithm
    //	querystring += &X-Amz-Credential= urlencode(accessKey + '/' + credential_scope)
    //	querystring += &X-Amz-Date=date
    //	querystring += &X-Amz-Expires=timeout interval
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 9.4K bytes
    - Viewed (0)
  10. internal/crypto/error.go

    	// is not supported.
    	ErrInvalidEncryptionMethod = Errorf("The encryption method is not supported")
    
    	// ErrInvalidCustomerAlgorithm indicates that the specified SSE-C algorithm
    	// is not supported.
    	ErrInvalidCustomerAlgorithm = Errorf("The SSE-C algorithm is not supported")
    
    	// ErrMissingCustomerKey indicates that the HTTP headers contains no SSE-C client key.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 4.4K bytes
    - Viewed (0)
Back to top