- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 12 for DecryptKey (0.31 sec)
-
internal/kms/single-key_test.go
t.Fatalf("Failed to initialize KMS: %v", err) } key, err := KMS.GenerateKey(context.Background(), "my-key", Context{}) if err != nil { t.Fatalf("Failed to generate key: %v", err) } plaintext, err := KMS.DecryptKey(key.KeyID, key.Ciphertext, Context{}) if err != nil { t.Fatalf("Failed to decrypt key: %v", err) } if !bytes.Equal(key.Plaintext, plaintext) {
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Tue Jul 19 01:54:27 GMT 2022 - 3K bytes - Viewed (0) -
internal/kms/kms.go
// a particular DEK. The context may be nil. GenerateKey(ctx context.Context, keyID string, context Context) (DEK, error) // DecryptKey decrypts the ciphertext with the key referenced // by the key ID. The context must match the context value // used to generate the ciphertext. DecryptKey(keyID string, ciphertext []byte, context Context) ([]byte, error) // DecryptAll decrypts all ciphertexts with the key referenced
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 4.6K bytes - Viewed (0) -
internal/kms/single-key.go
}) if err != nil { return DEK{}, err } return DEK{ KeyID: keyID, Plaintext: plaintext, Ciphertext: ciphertext, }, nil } func (kms secretKey) DecryptKey(keyID string, ciphertext []byte, context Context) ([]byte, error) { if keyID != kms.keyID { return nil, Error{ HTTPStatusCode: http.StatusBadRequest, APICode: "KMS.NotFoundException",
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 7.9K bytes - Viewed (0) -
internal/kms/kes.go
return nil, err } return c.client.Encrypt(context.Background(), keyID, plaintext, ctxBytes) } // DecryptKey decrypts the ciphertext with the key at the KES // server referenced by the key ID. The context must match the // context value used to generate the ciphertext. func (c *kesClient) DecryptKey(keyID string, ciphertext []byte, ctx Context) ([]byte, error) { c.lock.RLock() defer c.lock.RUnlock()
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Tue Apr 16 15:43:39 GMT 2024 - 14.9K bytes - Viewed (0) -
internal/crypto/sse-s3.go
if k == nil { return key, Errorf("KMS not configured") } keyID, kmsKey, sealedKey, err := s3.ParseMetadata(metadata) if err != nil { return key, err } unsealKey, err := k.DecryptKey(keyID, kmsKey, kms.Context{bucket: path.Join(bucket, object)}) if err != nil { return key, err } err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object) return key, err }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.5K bytes - Viewed (0) -
internal/config/crypto.go
} if fips.Enabled && metadata.Algorithm != sio.AES_256_GCM { return nil, fmt.Errorf("config: unsupported encryption algorithm: %q is not supported in FIPS mode", metadata.Algorithm) } key, err := k.DecryptKey(metadata.KeyID, metadata.KMSKey, context) if err != nil { return nil, err } stream, err := metadata.Algorithm.Stream(key) if err != nil { return nil, err }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Mon Mar 06 16:56:10 GMT 2023 - 4.8K bytes - Viewed (0) -
docs/security/README.md
- `GenerateKey`: Takes a key ID and generates a new data key from a master key referenced by the key ID. It returns the new data key in two different forms: The plain data key and the data key encrypted using the master key. - `DecryptKey`: Takes a key ID and an encrypted data key and returns the plain data key - the decryption of the encrypted data key using the master key referenced by the key ID - on success or an error otherwise.
Plain Text - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Sat Feb 12 00:51:25 GMT 2022 - 13.8K bytes - Viewed (0) -
internal/crypto/sse-kms.go
return key, err } if ctx == nil { ctx = kms.Context{bucket: path.Join(bucket, object)} } else if _, ok := ctx[bucket]; !ok { ctx[bucket] = path.Join(bucket, object) } unsealKey, err := k.DecryptKey(keyID, kmsKey, ctx) if err != nil { return key, err } err = key.Unseal(unsealKey, sealedKey, s3.String(), bucket, object) return key, err }
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.4K bytes - Viewed (0) -
cmd/bucket-metadata.go
if GlobalKMS == nil { return nil, errKMSNotConfigured } keyID, kmsKey, sealedKey, err := crypto.S3.ParseMetadata(meta) if err != nil { return nil, err } extKey, err := GlobalKMS.DecryptKey(keyID, kmsKey, kmsContext) if err != nil { return nil, err } var objectKey crypto.ObjectKey if err = objectKey.Unseal(extKey, sealedKey, crypto.S3.String(), bucket, ""); err != nil { return nil, err
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 16.5K bytes - Viewed (0) -
cmd/kms-handlers.go
return } writeSuccessResponseJSON(w, resp) return } // 2. Verify that we can indeed decrypt the (encrypted) key decryptedKey, err := GlobalKMS.DecryptKey(key.KeyID, key.Ciphertext, kmsContext) if err != nil { response.DecryptionErr = err.Error() resp, err := json.Marshal(response) if err != nil {
Go - Registered: Sun Apr 28 19:28:10 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 20.7K bytes - Viewed (0)