- Sort Score
- Result 10 results
- Languages All
Results 91 - 100 of 231 for Algorithms (0.05 sec)
-
internal/kms/secret-key.go
return ErrDecrypt } if len(value.Nonce) != NonceSize { return ErrDecrypt } switch value.Algorithm { case AES256GCM: c.Algorithm = kms.AES256 case CHACHA20POLY1305: c.Algorithm = kms.ChaCha20 default: c.Algorithm = 0 } c.ID = value.ID c.IV = value.IV c.Nonce = value.Nonce c.Bytes = value.Bytes return nil
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Apr 21 16:23:51 UTC 2025 - 8.4K bytes - Viewed (0) -
src/test/java/jcifs/CIFSUnsupportedCryptoExceptionTest.java
*/ @DisplayName("CIFSUnsupportedCryptoException Tests") class CIFSUnsupportedCryptoExceptionTest extends BaseTest { private static final String CRYPTO_ERROR_MESSAGE = "Unsupported cryptographic algorithm: AES-256-GCM"; private static final String ALGORITHM_NAME = "AES-256-GCM"; @Test @DisplayName("Default constructor should create exception with null message and cause") void testDefaultConstructor() {Registered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Thu Aug 14 05:31:44 UTC 2025 - 4.1K bytes - Viewed (0) -
internal/crypto/sse-kms.go
func (ssekms) CreateMetadata(metadata map[string]string, keyID string, kmsKey []byte, sealedKey SealedKey, ctx kms.Context) map[string]string { if sealedKey.Algorithm != SealAlgorithm { logger.CriticalIf(context.Background(), Errorf("The seal algorithm '%s' is invalid for SSE-S3", sealedKey.Algorithm)) } // There are two possibilities: // - We use a KMS -> There must be non-empty key ID and a KMS data key.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Tue May 07 23:55:37 UTC 2024 - 8.5K bytes - Viewed (0) -
cmd/xl-storage-format-v1_gen.go
z.PartNumber, err = dc.ReadInt() if err != nil { err = msgp.WrapError(err, "PartNumber") return } case "Algorithm": { var zb0002 uint zb0002, err = dc.ReadUint() if err != nil { err = msgp.WrapError(err, "Algorithm") return } z.Algorithm = BitrotAlgorithm(zb0002) } case "Hash": z.Hash, err = dc.ReadBytes(z.Hash) if err != nil {
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 41.2K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb2/Smb2TransformHeader.java
/** * Gets the flags field which contains flags in SMB 3.1.1 or encryption algorithm ID in SMB 3.0/3.0.2 * * @return the flags (SMB 3.1.1) or encryption algorithm (SMB 3.0/3.0.2) */ public int getFlags() { return this.flags; } /** * Sets the flags field which contains flags in SMB 3.1.1 or encryption algorithm ID in SMB 3.0/3.0.2 * * @param flagsRegistered: Sat Dec 20 13:44:44 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 9.1K bytes - Viewed (0) -
internal/crypto/error.go
// is not supported. ErrInvalidEncryptionMethod = Errorf("The encryption method is not supported") // ErrInvalidCustomerAlgorithm indicates that the specified SSE-C algorithm // is not supported. ErrInvalidCustomerAlgorithm = Errorf("The SSE-C algorithm is not supported") // ErrMissingCustomerKey indicates that the HTTP headers contains no SSE-C client key.
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 4.4K bytes - Viewed (0) -
internal/crypto/key.go
func (key *ObjectKey) Unseal(extKey []byte, sealedKey SealedKey, domain, bucket, object string) error { var unsealConfig sio.Config switch sealedKey.Algorithm { default: return Errorf("The sealing algorithm '%s' is not supported", sealedKey.Algorithm) case SealAlgorithm: mac := hmac.New(sha256.New, extKey) mac.Write(sealedKey.IV[:]) mac.Write([]byte(domain)) mac.Write([]byte(SealAlgorithm))
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Fri May 16 14:27:42 UTC 2025 - 6.2K bytes - Viewed (0) -
cmd/signature-v4_test.go
{ region: globalMinioDefaultRegion, expected: ErrInvalidQueryParams, }, // (1) Should error on an invalid access key. { queryParams: map[string]string{ "X-Amz-Algorithm": signV4Algorithm, "X-Amz-Date": now.Format(iso8601Format), "X-Amz-Expires": "60", "X-Amz-Signature": "badsignature", "X-Amz-SignedHeaders": "host;x-amz-content-sha256;x-amz-date",Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 10.5K bytes - Viewed (0) -
docs/site-replication/run-replication-with-checksum-header.sh
aws s3api --endpoint-url=https://localhost:9001 put-object --checksum-algorithm SHA256 --checksum-sha256 "${OBJ_CHKSUM}" --bucket test-bucket --key obj --body /tmp/data/obj --no-verify-ssl --profile enterprise split -n 10 /tmp/data/mpartobj CREATE_MPART_OUT=$(aws s3api --endpoint-url=https://localhost:9001 create-multipart-upload --bucket test-bucket --key mpartobj --checksum-algorithm SHA256 --no-verify-ssl --profile enterprise)Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Mon Jan 20 14:49:07 UTC 2025 - 11.5K bytes - Viewed (0) -
internal/crypto/sse.go
) const ( // SealAlgorithm is the encryption/sealing algorithm used to derive & seal // the key-encryption-key and to en/decrypt the object data. SealAlgorithm = "DAREv2-HMAC-SHA256" // InsecureSealAlgorithm is the legacy encryption/sealing algorithm used // to derive & seal the key-encryption-key and to en/decrypt the object data. // This algorithm should not be used for new objects because its key derivation
Registered: Sun Dec 28 19:28:13 UTC 2025 - Last Modified: Sun Sep 28 20:59:21 UTC 2025 - 4.3K bytes - Viewed (0)