- Sort Score
- Result 10 results
- Languages All
Results 1 - 8 of 8 for Mac (0.28 sec)
-
internal/kms/single-key.go
algorithm = algorithmAESGCM } else { algorithm = algorithmChaCha20Poly1305 } var aead cipher.AEAD switch algorithm { case algorithmAESGCM: mac := hmac.New(sha256.New, kms.key) mac.Write(iv) sealingKey := mac.Sum(nil) var block cipher.Block block, err = aes.NewCipher(sealingKey) if err != nil { return DEK{}, err } aead, err = cipher.NewGCM(block)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 7.9K bytes - Viewed (0) -
cmd/generic-handlers_test.go
shouldFail: false, }, { header: http.Header{crypto.MetaAlgorithm: []string{crypto.InsecureSealAlgorithm}}, shouldFail: false, }, { header: http.Header{crypto.MetaSealedKeySSEC: []string{"mac"}}, shouldFail: false, }, { header: http.Header{ReservedMetadataPrefix + "Key": []string{"value"}}, shouldFail: true, }, } func TestContainsReservedMetadata(t *testing.T) {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Mar 28 17:44:56 GMT 2024 - 5.4K bytes - Viewed (0) -
cmd/encryption-v1.go
return err } var partIDbin [4]byte binary.LittleEndian.PutUint32(partIDbin[:], uint32(partID)) // marshal part ID mac := hmac.New(sha256.New, objectEncryptionKey) // derive part encryption key from part ID and object key mac.Write(partIDbin[:]) partEncryptionKey := mac.Sum(nil) // Limit the reader, so the decryptor doesn't receive bytes // from the next part (different DARE stream)
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Thu Apr 04 12:04:40 GMT 2024 - 36.5K bytes - Viewed (0) -
cmd/encryption-v1_test.go
} if iv, ok := test.metadata[crypto.MetaIV]; !ok { t.Errorf("Test %d: crypto.SSEIV must be part of metadata: %v", i, iv) } if mac, ok := test.metadata[crypto.MetaSealedKeySSEC]; !ok { t.Errorf("Test %d: ServerSideEncryptionKeyMAC must be part of metadata: %v", i, mac) } } } var decryptObjectMetaTests = []struct { info ObjectInfo request *http.Request expErr error }{ {
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sat Sep 24 04:17:08 GMT 2022 - 19.9K bytes - Viewed (0) -
docs/ftp/README.md
aes128-ctr aes192-ctr aes256-ctr ******@****.*** ******@****.*** ******@****.*** arcfour256 arcfour128 arcfour aes128-cbc 3des-cbc ``` `--sftp=mac-algos=...` specifies a default set of MAC algorithms in preference order. This is based on RFC 4253, section 6.4, but with hmac-md5 variants removed because they have reached the end of their useful life. Valid values: ```
Plain Text - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Apr 30 15:15:45 GMT 2024 - 7.1K bytes - Viewed (0) -
internal/crypto/key.go
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Tue Mar 19 20:28:10 GMT 2024 - 6.4K bytes - Viewed (0) -
internal/etag/etag.go
// the ETag unmodified. func Decrypt(key []byte, etag ETag) (ETag, error) { const HMACContext = "SSE-etag" if !etag.IsEncrypted() { return etag, nil } mac := hmac.New(sha256.New, key) mac.Write([]byte(HMACContext)) decryptionKey := mac.Sum(nil) plaintext := make([]byte, 0, 16) etag, err := sio.DecryptBuffer(plaintext, etag, sio.Config{ Key: decryptionKey, CipherSuites: fips.DARECiphers(),
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Sun Mar 10 21:09:36 GMT 2024 - 13.3K bytes - Viewed (0) -
cmd/sftp-server.go
var preferredCiphers = []string{ "******@****.***", gcm256CipherID, chacha20Poly1305ID, "aes128-ctr", "aes192-ctr", "aes256-ctr", } // supportedMACs specifies a default set of MAC algorithms in preference order. // This is based on RFC 4253, section 6.4, but with hmac-md5 variants removed // because they have reached the end of their useful life.
Go - Registered: Sun May 05 19:28:20 GMT 2024 - Last Modified: Wed May 01 11:07:40 GMT 2024 - 10.4K bytes - Viewed (0)