- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 33 for Algorithms (0.27 sec)
-
internal/bucket/encryption/bucket-sse-config.go
) const ( // AES256 is used with SSE-S3 AES256 Algorithm = "AES256" // AWSKms is used with SSE-KMS AWSKms Algorithm = "aws:kms" ) // Algorithm - represents valid SSE algorithms supported; currently only AES256 is supported type Algorithm string // UnmarshalXML - Unmarshals XML tag to valid SSE algorithm func (alg *Algorithm) UnmarshalXML(d *xml.Decoder, start xml.StartElement) error { var s string
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Oct 25 00:44:15 GMT 2022 - 4.9K bytes - Viewed (0) -
cmd/bitrot.go
} for algorithm := range bitrotAlgorithms { if !algorithm.Available() { continue } checksum, err := hex.DecodeString(checksums[algorithm]) if err != nil { logger.Fatal(errSelfTestFailure, fmt.Sprintf("bitrot: failed to decode %v checksum %s for selftest: %v", algorithm, checksums[algorithm], err)) } var ( hash = algorithm.New()
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Jan 30 20:43:25 GMT 2024 - 7.6K bytes - Viewed (0) -
internal/kms/single-key.go
} } iv, err := sioutil.Random(16) if err != nil { return DEK{}, err } var algorithm string if sioutil.NativeAES() { algorithm = algorithmAESGCM } else { algorithm = algorithmChaCha20Poly1305 } var aead cipher.AEAD switch algorithm { case algorithmAESGCM: mac := hmac.New(sha256.New, kms.key) mac.Write(iv) sealingKey := mac.Sum(nil)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 7.9K bytes - Viewed (0) -
cmd/erasure-coding.go
if tillOffset > shardFileSize { tillOffset = shardFileSize } return tillOffset } // erasureSelfTest performs a self-test to ensure that erasure // algorithms compute expected erasure codes. If any algorithm // produces an incorrect value it fails with a hard error. // // erasureSelfTest tries to catch any issue in the erasure implementation // early instead of silently corrupting data.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed Jan 31 02:11:45 GMT 2024 - 8.6K bytes - Viewed (0) -
internal/crypto/sse_test.go
"X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "DAREv2-HMAC-SHA256", "X-Minio-Internal-Server-Side-Encryption-Iv": "coVfGS3I/CTrqexX5vUN+PQPoP9aUFiPYYrSzqTWfBA=", }, ExpectedErr: nil, }, { // 1 - Valid HTTP headers but invalid metadata entries for bucket/object2 Headers: http.Header{ "X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"},
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Jun 01 21:59:40 GMT 2021 - 8.4K bytes - Viewed (0) -
internal/crypto/key.go
func (key *ObjectKey) Unseal(extKey []byte, sealedKey SealedKey, domain, bucket, object string) error { var unsealConfig sio.Config switch sealedKey.Algorithm { default: return Errorf("The sealing algorithm '%s' is not supported", sealedKey.Algorithm) case SealAlgorithm: mac := hmac.New(sha256.New, extKey) mac.Write(sealedKey.IV[:]) mac.Write([]byte(domain)) mac.Write([]byte(SealAlgorithm))
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Mar 19 20:28:10 GMT 2024 - 6.4K bytes - Viewed (0) -
cmd/xl-storage-format-utils_test.go
Metadata: nil, Parts: nil, Erasure: ErasureInfo{ Algorithm: ReedSolomon.String(), DataBlocks: 4, ParityBlocks: 2, BlockSize: 10000, Index: 1, Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8}, Checksums: []ChecksumInfo{{ PartNumber: 1, Algorithm: HighwayHash256S, Hash: nil, }}, }, MarkDeleted: false,
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Sep 02 14:49:24 GMT 2023 - 6K bytes - Viewed (0) -
src/cmd/cgo/internal/test/issue24161e2/main.go
#include <Security/Security.h> #if TARGET_OS_IPHONE == 0 && __MAC_OS_X_VERSION_MAX_ALLOWED < 101200 typedef CFStringRef SecKeyAlgorithm; static CFDataRef SecKeyCreateSignature(SecKeyRef key, SecKeyAlgorithm algorithm, CFDataRef dataToSign, CFErrorRef *error){return NULL;} #define kSecKeyAlgorithmECDSASignatureDigestX962SHA1 foo() static SecKeyAlgorithm foo(void){return NULL;} #endif */ import "C" import ( "fmt"
Go - Registered: Tue Mar 26 11:13:08 GMT 2024 - Last Modified: Fri May 12 12:00:02 GMT 2023 - 1K bytes - Viewed (1) -
internal/config/crypto.go
return nil, err } if fips.Enabled && metadata.Algorithm != sio.AES_256_GCM { return nil, fmt.Errorf("config: unsupported encryption algorithm: %q is not supported in FIPS mode", metadata.Algorithm) } key, err := k.DecryptKey(metadata.KeyID, metadata.KMSKey, context) if err != nil { return nil, err } stream, err := metadata.Algorithm.Stream(key) if err != nil { return nil, err }
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Mon Mar 06 16:56:10 GMT 2023 - 4.8K bytes - Viewed (0) -
internal/crypto/sse-kms.go
func (ssekms) CreateMetadata(metadata map[string]string, keyID string, kmsKey []byte, sealedKey SealedKey, ctx kms.Context) map[string]string { if sealedKey.Algorithm != SealAlgorithm { logger.CriticalIf(context.Background(), Errorf("The seal algorithm '%s' is invalid for SSE-S3", sealedKey.Algorithm)) } // There are two possibilities: // - We use a KMS -> There must be non-empty key ID and a KMS data key.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.4K bytes - Viewed (0)