aboutsummaryrefslogtreecommitdiffhomepage
path: root/vendor/golang.org/x/crypto
diff options
context:
space:
mode:
authorappilon <apilon@hashicorp.com>2019-02-27 16:43:31 -0500
committerGitHub <noreply@github.com>2019-02-27 16:43:31 -0500
commit844b5a68d8af4791755b8f0ad293cc99f5959183 (patch)
tree255c250a5c9d4801c74092d33b7337d8c14438ff /vendor/golang.org/x/crypto
parent303b299eeb6b06e939e35905e4b34cb410dd9dc3 (diff)
parent15c0b25d011f37e7c20aeca9eaf461f78285b8d9 (diff)
downloadterraform-provider-statuscake-844b5a68d8af4791755b8f0ad293cc99f5959183.tar.gz
terraform-provider-statuscake-844b5a68d8af4791755b8f0ad293cc99f5959183.tar.zst
terraform-provider-statuscake-844b5a68d8af4791755b8f0ad293cc99f5959183.zip
Merge pull request #27 from terraform-providers/go-modules-2019-02-22
[MODULES] Switch to Go Modules
Diffstat (limited to 'vendor/golang.org/x/crypto')
-rw-r--r--vendor/golang.org/x/crypto/AUTHORS3
-rw-r--r--vendor/golang.org/x/crypto/CONTRIBUTORS3
-rw-r--r--vendor/golang.org/x/crypto/bcrypt/bcrypt.go11
-rw-r--r--vendor/golang.org/x/crypto/blowfish/cipher.go2
-rw-r--r--vendor/golang.org/x/crypto/blowfish/const.go2
-rw-r--r--vendor/golang.org/x/crypto/openpgp/keys.go3
6 files changed, 15 insertions, 9 deletions
diff --git a/vendor/golang.org/x/crypto/AUTHORS b/vendor/golang.org/x/crypto/AUTHORS
new file mode 100644
index 0000000..2b00ddb
--- /dev/null
+++ b/vendor/golang.org/x/crypto/AUTHORS
@@ -0,0 +1,3 @@
1# This source code refers to The Go Authors for copyright purposes.
2# The master list of authors is in the main Go distribution,
3# visible at https://tip.golang.org/AUTHORS.
diff --git a/vendor/golang.org/x/crypto/CONTRIBUTORS b/vendor/golang.org/x/crypto/CONTRIBUTORS
new file mode 100644
index 0000000..1fbd3e9
--- /dev/null
+++ b/vendor/golang.org/x/crypto/CONTRIBUTORS
@@ -0,0 +1,3 @@
1# This source code was written by the Go contributors.
2# The master list of contributors is in the main Go distribution,
3# visible at https://tip.golang.org/CONTRIBUTORS.
diff --git a/vendor/golang.org/x/crypto/bcrypt/bcrypt.go b/vendor/golang.org/x/crypto/bcrypt/bcrypt.go
index f8b807f..aeb73f8 100644
--- a/vendor/golang.org/x/crypto/bcrypt/bcrypt.go
+++ b/vendor/golang.org/x/crypto/bcrypt/bcrypt.go
@@ -12,9 +12,10 @@ import (
12 "crypto/subtle" 12 "crypto/subtle"
13 "errors" 13 "errors"
14 "fmt" 14 "fmt"
15 "golang.org/x/crypto/blowfish"
16 "io" 15 "io"
17 "strconv" 16 "strconv"
17
18 "golang.org/x/crypto/blowfish"
18) 19)
19 20
20const ( 21const (
@@ -205,7 +206,6 @@ func bcrypt(password []byte, cost int, salt []byte) ([]byte, error) {
205} 206}
206 207
207func expensiveBlowfishSetup(key []byte, cost uint32, salt []byte) (*blowfish.Cipher, error) { 208func expensiveBlowfishSetup(key []byte, cost uint32, salt []byte) (*blowfish.Cipher, error) {
208
209 csalt, err := base64Decode(salt) 209 csalt, err := base64Decode(salt)
210 if err != nil { 210 if err != nil {
211 return nil, err 211 return nil, err
@@ -213,7 +213,8 @@ func expensiveBlowfishSetup(key []byte, cost uint32, salt []byte) (*blowfish.Cip
213 213
214 // Bug compatibility with C bcrypt implementations. They use the trailing 214 // Bug compatibility with C bcrypt implementations. They use the trailing
215 // NULL in the key string during expansion. 215 // NULL in the key string during expansion.
216 ckey := append(key, 0) 216 // We copy the key to prevent changing the underlying array.
217 ckey := append(key[:len(key):len(key)], 0)
217 218
218 c, err := blowfish.NewSaltedCipher(ckey, csalt) 219 c, err := blowfish.NewSaltedCipher(ckey, csalt)
219 if err != nil { 220 if err != nil {
@@ -240,11 +241,11 @@ func (p *hashed) Hash() []byte {
240 n = 3 241 n = 3
241 } 242 }
242 arr[n] = '$' 243 arr[n] = '$'
243 n += 1 244 n++
244 copy(arr[n:], []byte(fmt.Sprintf("%02d", p.cost))) 245 copy(arr[n:], []byte(fmt.Sprintf("%02d", p.cost)))
245 n += 2 246 n += 2
246 arr[n] = '$' 247 arr[n] = '$'
247 n += 1 248 n++
248 copy(arr[n:], p.salt) 249 copy(arr[n:], p.salt)
249 n += encodedSaltSize 250 n += encodedSaltSize
250 copy(arr[n:], p.hash) 251 copy(arr[n:], p.hash)
diff --git a/vendor/golang.org/x/crypto/blowfish/cipher.go b/vendor/golang.org/x/crypto/blowfish/cipher.go
index a73954f..2641dad 100644
--- a/vendor/golang.org/x/crypto/blowfish/cipher.go
+++ b/vendor/golang.org/x/crypto/blowfish/cipher.go
@@ -6,7 +6,7 @@
6package blowfish // import "golang.org/x/crypto/blowfish" 6package blowfish // import "golang.org/x/crypto/blowfish"
7 7
8// The code is a port of Bruce Schneier's C implementation. 8// The code is a port of Bruce Schneier's C implementation.
9// See http://www.schneier.com/blowfish.html. 9// See https://www.schneier.com/blowfish.html.
10 10
11import "strconv" 11import "strconv"
12 12
diff --git a/vendor/golang.org/x/crypto/blowfish/const.go b/vendor/golang.org/x/crypto/blowfish/const.go
index 8c5ee4c..d040775 100644
--- a/vendor/golang.org/x/crypto/blowfish/const.go
+++ b/vendor/golang.org/x/crypto/blowfish/const.go
@@ -4,7 +4,7 @@
4 4
5// The startup permutation array and substitution boxes. 5// The startup permutation array and substitution boxes.
6// They are the hexadecimal digits of PI; see: 6// They are the hexadecimal digits of PI; see:
7// http://www.schneier.com/code/constants.txt. 7// https://www.schneier.com/code/constants.txt.
8 8
9package blowfish 9package blowfish
10 10
diff --git a/vendor/golang.org/x/crypto/openpgp/keys.go b/vendor/golang.org/x/crypto/openpgp/keys.go
index 68b14c6..744e293 100644
--- a/vendor/golang.org/x/crypto/openpgp/keys.go
+++ b/vendor/golang.org/x/crypto/openpgp/keys.go
@@ -325,9 +325,8 @@ func ReadEntity(packets *packet.Reader) (*Entity, error) {
325 if e.PrivateKey, ok = p.(*packet.PrivateKey); !ok { 325 if e.PrivateKey, ok = p.(*packet.PrivateKey); !ok {
326 packets.Unread(p) 326 packets.Unread(p)
327 return nil, errors.StructuralError("first packet was not a public/private key") 327 return nil, errors.StructuralError("first packet was not a public/private key")
328 } else {
329 e.PrimaryKey = &e.PrivateKey.PublicKey
330 } 328 }
329 e.PrimaryKey = &e.PrivateKey.PublicKey
331 } 330 }
332 331
333 if !e.PrimaryKey.PubKeyAlgo.CanSign() { 332 if !e.PrimaryKey.PubKeyAlgo.CanSign() {