- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 33 for iv (0.15 sec)
-
internal/crypto/doc.go
// initialization vector (IV) and the bucket/object path. // // 1. Encrypt: // Input: ClientKey, bucket, object, metadata, object_data // - IV := Random({0,1}²⁵⁶) // - ObjectKey := SHA256(ClientKey || Random({0,1}²⁵⁶)) // - KeyEncKey := HMAC-SHA256(ClientKey, IV || 'SSE-C' || 'DAREv2-HMAC-SHA256' || bucket || '/' || object)
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Fri Aug 26 19:52:29 GMT 2022 - 5K bytes - Viewed (0) -
internal/crypto/key.go
} // GenerateIV generates a new random 256 bit IV from the provided source // of randomness. If random is nil the default PRNG of the system // (crypto/rand) is used. func GenerateIV(random io.Reader) (iv [32]byte) { if random == nil { random = rand.Reader } if _, err := io.ReadFull(random, iv[:]); err != nil { logger.CriticalIf(context.Background(), errOutOfEntropy) } return iv }
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Tue Mar 19 20:28:10 GMT 2024 - 6.4K bytes - Viewed (0) -
internal/crypto/sse_test.go
"X-Minio-Internal-Server-Side-Encryption-Seal-Algorithm": "DAREv2-HMAC-SHA256", "X-Minio-Internal-Server-Side-Encryption-Iv": "coVfGS3I/CTrqexX5vUN+PQPoP9aUFiPYYrSzqTWfBA=", }, ExpectedErr: nil, }, { // 1 - Valid HTTP headers but invalid metadata entries for bucket/object2 Headers: http.Header{
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Tue Jun 01 21:59:40 GMT 2021 - 8.4K bytes - Viewed (0) -
internal/crypto/sse-c.go
if !ok { return sealedKey, Errorf("The object metadata is missing the internal sealed key for SSE-C") } // Check whether all extracted values are well-formed iv, err := base64.StdEncoding.DecodeString(b64IV) if err != nil || len(iv) != 32 { return sealedKey, errInvalidInternalIV } if algorithm != SealAlgorithm && algorithm != InsecureSealAlgorithm { return sealedKey, errInvalidInternalSealAlgorithm }
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 5.2K bytes - Viewed (0) -
internal/crypto/metadata_test.go
t.Errorf("Test %d: got sealed key '%v' - want sealed key '%v'", i, sealedKey.Key, test.SealedKey.Key) } if !bytes.Equal(sealedKey.IV[:], test.SealedKey.IV[:]) { t.Errorf("Test %d: got sealed key IV '%v' - want sealed key IV '%v'", i, sealedKey.IV, test.SealedKey.IV) } } } var ssecParseMetadataTests = []struct { Metadata map[string]string ExpectedErr error SealedKey SealedKey }{
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Fri Feb 02 00:13:57 GMT 2024 - 18.7K bytes - Viewed (0) -
internal/crypto/key_test.go
for i, test := range generateIVTests { i, test := i, test func() { defer recoverTest(i, test.ShouldPass, t) iv := GenerateIV(test.Random) if iv == [32]byte{} { t.Errorf("Test %d: generated IV is zero IV", i) // check that we generate random and unique IV } }() } } var sealUnsealKeyTests = []struct { SealExtKey, SealIV [32]byte
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Fri Feb 02 00:13:57 GMT 2024 - 6.8K bytes - Viewed (0) -
internal/kms/single-key.go
} } if n := len(encryptedKey.IV); n != 16 { return nil, Error{ HTTPStatusCode: http.StatusBadRequest, APICode: "KMS.InternalException", Err: fmt.Errorf("invalid iv size: %d", n), } } var aead cipher.AEAD switch encryptedKey.Algorithm { case algorithmAESGCM: mac := hmac.New(sha256.New, kms.key) mac.Write(encryptedKey.IV) sealingKey := mac.Sum(nil)
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Fri Mar 01 21:09:42 GMT 2024 - 7.9K bytes - Viewed (0) -
tests/joins_test.go
} iv := DB.Table(`table_invoices`).Select(`seller, SUM(total) as total, SUM(paid) as paid, SUM(balance) as balance`).Group(`seller`) stmt = dryDB.Table(`table_employees`).Select(`id, name, iv.total, iv.paid, iv.balance`).Joins(`LEFT JOIN (?) AS iv ON iv.seller = table_employees.id`, iv).Scan(&user).Statement
Go - Registered: Sun Apr 21 09:35:09 GMT 2024 - Last Modified: Wed Apr 26 14:19:32 GMT 2023 - 13.5K bytes - Viewed (1) -
internal/crypto/sse-s3.go
return keyID, kmsKey, sealedKey, Errorf("The object metadata is missing the internal sealed KMS data key for SSE-S3") } // Check whether all extracted values are well-formed iv, err := base64.StdEncoding.DecodeString(b64IV) if err != nil || len(iv) != 32 { return keyID, kmsKey, sealedKey, errInvalidInternalIV } if algorithm != SealAlgorithm { return keyID, kmsKey, sealedKey, errInvalidInternalSealAlgorithm }
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.5K bytes - Viewed (0) -
internal/crypto/sse-kms.go
return keyID, kmsKey, sealedKey, ctx, Errorf("The object metadata is missing the internal sealed KMS data key for SSE-S3") } // Check whether all extracted values are well-formed iv, err := base64.StdEncoding.DecodeString(b64IV) if err != nil || len(iv) != 32 { return keyID, kmsKey, sealedKey, ctx, errInvalidInternalIV } if algorithm != SealAlgorithm { return keyID, kmsKey, sealedKey, ctx, errInvalidInternalSealAlgorithm }
Go - Registered: Sun Apr 21 19:28:08 GMT 2024 - Last Modified: Thu Jan 18 07:03:17 GMT 2024 - 8.4K bytes - Viewed (0)