Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 72 for Algorithm (0.19 sec)

  1. cmd/signature-v4-parser_test.go

    			expectedErrCode:       ErrInvalidQuerySignatureAlgo,
    		},
    		// Test case - 3.
    		// Test case with valid "X-Amz-Algorithm" query value, but invalid  "X-Amz-Credential" header.
    		// Malformed crenential.
    		{
    			inputQueryKeyVals: []string{
    				// valid  "X-Amz-Algorithm" header.
    				"X-Amz-Algorithm", signV4Algorithm,
    				// valid  "X-Amz-Credential" header.
    				"X-Amz-Credential", "invalid-credential",
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Feb 22 06:26:06 GMT 2024
    - 27.4K bytes
    - Viewed (0)
  2. docs/debugging/hash-set/main.go

    	"encoding/binary"
    	"flag"
    	"fmt"
    	"hash/crc32"
    	"log"
    	"os"
    	"strings"
    
    	"github.com/dchest/siphash"
    	"github.com/google/uuid"
    )
    
    // hashes the key returning an integer based on the input algorithm.
    // This function currently supports
    // - SIPMOD
    func sipHashMod(key string, cardinality int, id [16]byte) int {
    	if cardinality <= 0 {
    		return -1
    	}
    	// use the faster version as per siphash docs
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Mon Sep 19 18:05:16 GMT 2022
    - 3.7K bytes
    - Viewed (0)
  3. internal/crypto/sse-c.go

    	}
    	if algorithm != SealAlgorithm && algorithm != InsecureSealAlgorithm {
    		return sealedKey, errInvalidInternalSealAlgorithm
    	}
    	encryptedKey, err := base64.StdEncoding.DecodeString(b64SealedKey)
    	if err != nil || len(encryptedKey) != 64 {
    		return sealedKey, Errorf("The internal sealed key for SSE-C is invalid")
    	}
    
    	sealedKey.Algorithm = algorithm
    	copy(sealedKey.IV[:], iv)
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Jan 18 07:03:17 GMT 2024
    - 5.2K bytes
    - Viewed (0)
  4. cmd/xl-storage-format_test.go

    	}
    	if unMarshalXLMeta.Erasure.Algorithm != jsoniterXLMeta.Erasure.Algorithm {
    		t.Errorf("Expected the erasure algorithm to be \"%v\", but got \"%v\".", unMarshalXLMeta.Erasure.Algorithm, jsoniterXLMeta.Erasure.Algorithm)
    	}
    	if unMarshalXLMeta.Erasure.DataBlocks != jsoniterXLMeta.Erasure.DataBlocks {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Feb 22 06:26:06 GMT 2024
    - 17.6K bytes
    - Viewed (0)
  5. cmd/xl-storage-format-v1_gen.go

    			z.PartNumber, err = dc.ReadInt()
    			if err != nil {
    				err = msgp.WrapError(err, "PartNumber")
    				return
    			}
    		case "Algorithm":
    			{
    				var zb0002 uint
    				zb0002, err = dc.ReadUint()
    				if err != nil {
    					err = msgp.WrapError(err, "Algorithm")
    					return
    				}
    				z.Algorithm = BitrotAlgorithm(zb0002)
    			}
    		case "Hash":
    			z.Hash, err = dc.ReadBytes(z.Hash)
    			if err != nil {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Mar 21 17:21:35 GMT 2024
    - 40.2K bytes
    - Viewed (0)
  6. internal/lsync/lrwmutex.go

    const (
    	lockRetryInterval = 50 * time.Millisecond
    )
    
    // lockLoop will acquire either a read or a write lock
    //
    // The call will block until the lock is granted using a built-in
    // timing randomized back-off algorithm to try again until successful
    func (lm *LRWMutex) lockLoop(ctx context.Context, id, source string, timeout time.Duration, isWriteLock bool) (locked bool) {
    	r := rand.New(rand.NewSource(time.Now().UnixNano()))
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sun Jan 02 17:15:06 GMT 2022
    - 4.8K bytes
    - Viewed (0)
  7. cmd/storage-errors.go

    var errFileCorrupt = StorageErr("file is corrupted")
    
    // errBitrotHashAlgoInvalid - the algo for bit-rot hash
    // verification is empty or invalid.
    var errBitrotHashAlgoInvalid = StorageErr("bit-rot hash algorithm is invalid")
    
    // errCrossDeviceLink - rename across devices not allowed.
    var errCrossDeviceLink = StorageErr("Rename across devices not allowed, please fix your backend configuration")
    
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 6.4K bytes
    - Viewed (0)
  8. docs/debugging/s3-check-md5/main.go

    				continue
    			}
    			if object.IsDeleteMarker {
    				log.Println("SKIPPED: DELETE marker object:", objFullPath(object))
    				continue
    			}
    			if _, ok := object.UserMetadata["X-Amz-Server-Side-Encryption-Customer-Algorithm"]; ok {
    				log.Println("SKIPPED: Objects encrypted with SSE-C do not have md5sum as ETag:", objFullPath(object))
    				continue
    			}
    			if v, ok := object.UserMetadata["X-Amz-Server-Side-Encryption"]; ok && v == "aws:kms" {
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Feb 17 01:15:57 GMT 2024
    - 6.3K bytes
    - Viewed (0)
  9. cmd/xl-storage-free-version_test.go

    		Mode:             0,
    		Metadata:         nil,
    		Parts:            nil,
    		Erasure: ErasureInfo{
    			Algorithm:    ReedSolomon.String(),
    			DataBlocks:   4,
    			ParityBlocks: 2,
    			BlockSize:    10000,
    			Index:        1,
    			Distribution: []int{1, 2, 3, 4, 5, 6, 7, 8},
    			Checksums: []ChecksumInfo{{
    				PartNumber: 1,
    				Algorithm:  HighwayHash256S,
    				Hash:       nil,
    			}},
    		},
    		MarkDeleted:      false,
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Sat Mar 02 05:11:03 GMT 2024
    - 7.8K bytes
    - Viewed (0)
  10. cmd/encryption-v1.go

    			return crypto.ErrInvalidCustomerKey // To provide strict AWS S3 compatibility we return: access denied.
    
    		}
    		if subtle.ConstantTimeCompare(oldKey, newKey) == 1 && sealedKey.Algorithm == crypto.SealAlgorithm {
    			return nil // don't rotate on equal keys if seal algorithm is latest
    		}
    		sealedKey = objectKey.Seal(newKey, sealedKey.IV, crypto.SSEC.String(), bucket, object)
    		crypto.SSEC.CreateMetadata(metadata, sealedKey)
    		return nil
    Go
    - Registered: Sun May 05 19:28:20 GMT 2024
    - Last Modified: Thu Apr 04 12:04:40 GMT 2024
    - 36.5K bytes
    - Viewed (0)
Back to top