mirror of
				https://github.com/superseriousbusiness/gotosocial.git
				synced 2025-10-31 09:02:25 -05:00 
			
		
		
		
	[chore]: Bump github.com/go-playground/validator/v10 (#1400)
Bumps [github.com/go-playground/validator/v10](https://github.com/go-playground/validator) from 10.11.1 to 10.11.2. - [Release notes](https://github.com/go-playground/validator/releases) - [Commits](https://github.com/go-playground/validator/compare/v10.11.1...v10.11.2) --- updated-dependencies: - dependency-name: github.com/go-playground/validator/v10 dependency-type: direct:production update-type: version-update:semver-patch ... Signed-off-by: dependabot[bot] <support@github.com> Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
This commit is contained in:
		
					parent
					
						
							
								7bcdf35cc1
							
						
					
				
			
			
				commit
				
					
						356e238793
					
				
			
		
					 25 changed files with 241 additions and 189 deletions
				
			
		
							
								
								
									
										11
									
								
								vendor/golang.org/x/crypto/ssh/cipher.go
									
										
									
										generated
									
									
										vendored
									
									
								
							
							
						
						
									
										11
									
								
								vendor/golang.org/x/crypto/ssh/cipher.go
									
										
									
										generated
									
									
										vendored
									
									
								
							|  | @ -15,7 +15,6 @@ import ( | |||
| 	"fmt" | ||||
| 	"hash" | ||||
| 	"io" | ||||
| 	"io/ioutil" | ||||
| 
 | ||||
| 	"golang.org/x/crypto/chacha20" | ||||
| 	"golang.org/x/crypto/internal/poly1305" | ||||
|  | @ -97,13 +96,13 @@ func streamCipherMode(skip int, createFunc func(key, iv []byte) (cipher.Stream, | |||
| // are not supported and will not be negotiated, even if explicitly requested in | ||||
| // ClientConfig.Crypto.Ciphers. | ||||
| var cipherModes = map[string]*cipherMode{ | ||||
| 	// Ciphers from RFC4344, which introduced many CTR-based ciphers. Algorithms | ||||
| 	// Ciphers from RFC 4344, which introduced many CTR-based ciphers. Algorithms | ||||
| 	// are defined in the order specified in the RFC. | ||||
| 	"aes128-ctr": {16, aes.BlockSize, streamCipherMode(0, newAESCTR)}, | ||||
| 	"aes192-ctr": {24, aes.BlockSize, streamCipherMode(0, newAESCTR)}, | ||||
| 	"aes256-ctr": {32, aes.BlockSize, streamCipherMode(0, newAESCTR)}, | ||||
| 
 | ||||
| 	// Ciphers from RFC4345, which introduces security-improved arcfour ciphers. | ||||
| 	// Ciphers from RFC 4345, which introduces security-improved arcfour ciphers. | ||||
| 	// They are defined in the order specified in the RFC. | ||||
| 	"arcfour128": {16, 0, streamCipherMode(1536, newRC4)}, | ||||
| 	"arcfour256": {32, 0, streamCipherMode(1536, newRC4)}, | ||||
|  | @ -111,7 +110,7 @@ var cipherModes = map[string]*cipherMode{ | |||
| 	// Cipher defined in RFC 4253, which describes SSH Transport Layer Protocol. | ||||
| 	// Note that this cipher is not safe, as stated in RFC 4253: "Arcfour (and | ||||
| 	// RC4) has problems with weak keys, and should be used with caution." | ||||
| 	// RFC4345 introduces improved versions of Arcfour. | ||||
| 	// RFC 4345 introduces improved versions of Arcfour. | ||||
| 	"arcfour": {16, 0, streamCipherMode(0, newRC4)}, | ||||
| 
 | ||||
| 	// AEAD ciphers | ||||
|  | @ -497,7 +496,7 @@ func (c *cbcCipher) readCipherPacket(seqNum uint32, r io.Reader) ([]byte, error) | |||
| 			// data, to make distinguishing between | ||||
| 			// failing MAC and failing length check more | ||||
| 			// difficult. | ||||
| 			io.CopyN(ioutil.Discard, r, int64(c.oracleCamouflage)) | ||||
| 			io.CopyN(io.Discard, r, int64(c.oracleCamouflage)) | ||||
| 		} | ||||
| 	} | ||||
| 	return p, err | ||||
|  | @ -642,7 +641,7 @@ const chacha20Poly1305ID = "chacha20-poly1305@openssh.com" | |||
| // | ||||
| //	https://tools.ietf.org/html/draft-josefsson-ssh-chacha20-poly1305-openssh-00 | ||||
| // | ||||
| // the methods here also implement padding, which RFC4253 Section 6 | ||||
| // the methods here also implement padding, which RFC 4253 Section 6 | ||||
| // also requires of stream ciphers. | ||||
| type chacha20Poly1305Cipher struct { | ||||
| 	lengthKey  [32]byte | ||||
|  |  | |||
		Loading…
	
	Add table
		Add a link
		
	
		Reference in a new issue