Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for Mac (0.28 sec)

  1. internal/kms/single-key.go

    		algorithm = algorithmAESGCM
    	} else {
    		algorithm = algorithmChaCha20Poly1305
    	}
    
    	var aead cipher.AEAD
    	switch algorithm {
    	case algorithmAESGCM:
    		mac := hmac.New(sha256.New, kms.key)
    		mac.Write(iv)
    		sealingKey := mac.Sum(nil)
    
    		var block cipher.Block
    		block, err = aes.NewCipher(sealingKey)
    		if err != nil {
    			return DEK{}, err
    		}
    		aead, err = cipher.NewGCM(block)
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Fri Mar 01 21:09:42 GMT 2024
    - 7.9K bytes
    - Viewed (0)
  2. cmd/generic-handlers_test.go

    		shouldFail: false,
    	},
    	{
    		header:     http.Header{crypto.MetaAlgorithm: []string{crypto.InsecureSealAlgorithm}},
    		shouldFail: false,
    	},
    	{
    		header:     http.Header{crypto.MetaSealedKeySSEC: []string{"mac"}},
    		shouldFail: false,
    	},
    	{
    		header:     http.Header{ReservedMetadataPrefix + "Key": []string{"value"}},
    		shouldFail: true,
    	},
    }
    
    func TestContainsReservedMetadata(t *testing.T) {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 28 17:44:56 GMT 2024
    - 5.4K bytes
    - Viewed (0)
  3. cmd/encryption-v1.go

    		return err
    	}
    
    	var partIDbin [4]byte
    	binary.LittleEndian.PutUint32(partIDbin[:], uint32(partID)) // marshal part ID
    
    	mac := hmac.New(sha256.New, objectEncryptionKey) // derive part encryption key from part ID and object key
    	mac.Write(partIDbin[:])
    	partEncryptionKey := mac.Sum(nil)
    
    	// Limit the reader, so the decryptor doesn't receive bytes
    	// from the next part (different DARE stream)
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 36.5K bytes
    - Viewed (0)
  4. cmd/encryption-v1_test.go

    		}
    		if iv, ok := test.metadata[crypto.MetaIV]; !ok {
    			t.Errorf("Test %d: crypto.SSEIV must be part of metadata: %v", i, iv)
    		}
    		if mac, ok := test.metadata[crypto.MetaSealedKeySSEC]; !ok {
    			t.Errorf("Test %d: ServerSideEncryptionKeyMAC must be part of metadata: %v", i, mac)
    		}
    	}
    }
    
    var decryptObjectMetaTests = []struct {
    	info    ObjectInfo
    	request *http.Request
    	expErr  error
    }{
    	{
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Sep 24 04:17:08 GMT 2022
    - 19.9K bytes
    - Viewed (0)
  5. docs/ftp/README.md

    aes128-ctr
    aes192-ctr
    aes256-ctr
    ******@****.***
    ******@****.***
    ******@****.***
    arcfour256
    arcfour128
    arcfour
    aes128-cbc
    3des-cbc
    ```
    
    `--sftp=mac-algos=...` specifies a default set of MAC algorithms in preference order.
    This is based on RFC 4253, section 6.4, but with hmac-md5 variants removed because they have 
    reached the end of their useful life.
    
    Valid values: 
    
    ```
    Plain Text
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Apr 30 15:15:45 GMT 2024
    - 7.1K bytes
    - Viewed (0)
  6. internal/crypto/key.go

    	}
    	var (
    		sealingKey   [32]byte
    		encryptedKey bytes.Buffer
    	)
    	mac := hmac.New(sha256.New, extKey)
    	mac.Write(iv[:])
    	mac.Write([]byte(domain))
    	mac.Write([]byte(SealAlgorithm))
    	mac.Write([]byte(path.Join(bucket, object))) // use path.Join for canonical 'bucket/object'
    	mac.Sum(sealingKey[:0])
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Tue Mar 19 20:28:10 GMT 2024
    - 6.4K bytes
    - Viewed (0)
  7. internal/etag/etag.go

    // the ETag unmodified.
    func Decrypt(key []byte, etag ETag) (ETag, error) {
    	const HMACContext = "SSE-etag"
    
    	if !etag.IsEncrypted() {
    		return etag, nil
    	}
    	mac := hmac.New(sha256.New, key)
    	mac.Write([]byte(HMACContext))
    	decryptionKey := mac.Sum(nil)
    
    	plaintext := make([]byte, 0, 16)
    	etag, err := sio.DecryptBuffer(plaintext, etag, sio.Config{
    		Key:          decryptionKey,
    		CipherSuites: fips.DARECiphers(),
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sun Mar 10 21:09:36 GMT 2024
    - 13.3K bytes
    - Viewed (0)
  8. cmd/sftp-server.go

    var preferredCiphers = []string{
    	"******@****.***", gcm256CipherID,
    	chacha20Poly1305ID,
    	"aes128-ctr", "aes192-ctr", "aes256-ctr",
    }
    
    // supportedMACs specifies a default set of MAC algorithms in preference order.
    // This is based on RFC 4253, section 6.4, but with hmac-md5 variants removed
    // because they have reached the end of their useful life.
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Wed May 01 11:07:40 GMT 2024
    - 10.4K bytes
    - Viewed (0)
Back to top