- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 121 for sign (0.03 sec)
-
cmd/signature-v2.go
if canonicalQuery != "" { return encodedResource + "?" + canonicalQuery } return encodedResource } // Return string to sign under two different conditions. // - if expires string is set then string to sign includes date instead of the Date header. // - if expires string is empty then string to sign includes date header instead.
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 12.2K bytes - Viewed (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/HeldCertificate.kt
* * By default this certificate cannot not sign other certificates. Set this to 0 so this * certificate can sign other certificates (but those certificates cannot themselves sign * certificates). Set this to 1 so this certificate can sign intermediate certificates that can * themselves sign certificates. Add one for each additional layer of intermediates to permit. */
Registered: Fri Nov 01 11:42:11 UTC 2024 - Last Modified: Mon Jan 08 01:13:22 UTC 2024 - 21.6K bytes - Viewed (0) -
src/main/java/jcifs/internal/smb1/SMB1SigningDigest.java
return b; } /** * {@inheritDoc} * * @see jcifs.internal.SMBSigningDigest#sign(byte[], int, int, jcifs.internal.CommonServerMessageBlock, * jcifs.internal.CommonServerMessageBlock) */ @Override public void sign ( byte[] data, int offset, int length, CommonServerMessageBlock request, CommonServerMessageBlock response ) { if ( log.isTraceEnabled() ) {
Registered: Sun Nov 03 00:10:13 UTC 2024 - Last Modified: Sun Aug 05 09:45:59 UTC 2018 - 10.6K bytes - Viewed (0) -
CONTRIBUTING.md
If you didn't sign off your commits before creating the pull request, you can fix that after the fact. To sign off a single commit: `git commit --amend --signoff` To sign off one or multiple commits: `git rebase --signoff origin/master` Then force push your branch:
Registered: Wed Nov 06 11:36:14 UTC 2024 - Last Modified: Tue Nov 05 15:15:33 UTC 2024 - 15.6K bytes - Viewed (0) -
cmd/signature-v4.go
// according to the AWS S3 signature V4 spec. func compareSignatureV4(sig1, sig2 string) bool { // The CTC using []byte(str) works because the hex encoding // is unique for a sequence of bytes. See also compareSignatureV2. return subtle.ConstantTimeCompare([]byte(sig1), []byte(sig2)) == 1 } // doesPolicySignatureMatch - Verify query headers with post policy
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 12.4K bytes - Viewed (0) -
cmd/signature-v4-parser_test.go
expectedSignStr: "", expectedErrCode: ErrMissingFields, }, // Test case - 3. // SignElement with missing "SignatureTag",ErrMissingSignTag expected. { inputSignElement: "Sign=", expectedSignStr: "", expectedErrCode: ErrMissingSignTag, }, // Test case - 4. // Test case with valid inputs. { inputSignElement: "Signature=abcd", expectedSignStr: "abcd",
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu Feb 22 06:26:06 UTC 2024 - 27.4K bytes - Viewed (0) -
cmd/streaming-signature-v4.go
valueBuffer.Write([]byte{'\n'}) } sig = sig[len("x-amz-trailer-signature:"):] sig = bytes.TrimSpace(sig) cr.chunkSHA256Writer.Write(valueBuffer.Bytes()) wantSig := cr.getTrailerChunkSignature() if !compareSignatureV4(string(sig), wantSig) { if cr.debug { fmt.Printf("signature, want: %q, got %q\nSignature buffer: %q\n", wantSig, string(sig), valueBuffer.String()) } return errSignatureMismatch }
Registered: Sun Nov 03 19:28:11 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 18.2K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
After a week, the token will be expired and the user will not be authorized and will have to sign in again to get a new token. And if the user (or a third party) tried to modify the token to change the expiration, you would be able to discover it, because the signatures would not match.
Registered: Sun Nov 03 07:19:11 UTC 2024 - Last Modified: Sat Oct 26 11:45:10 UTC 2024 - 12.8K bytes - Viewed (0) -
android/guava/src/com/google/common/math/LongMath.java
long naiveSum = a + b; if ((a ^ b) < 0 | (a ^ naiveSum) >= 0) { // If a and b have different signs or a has the same sign as the result then there was no // overflow, return. return naiveSum; } // we did over/under flow, if the sign is negative we should return MAX otherwise MIN return Long.MAX_VALUE + ((naiveSum >>> (Long.SIZE - 1)) ^ 1); } /**
Registered: Fri Nov 01 12:43:10 UTC 2024 - Last Modified: Wed Oct 09 16:39:37 UTC 2024 - 45.2K bytes - Viewed (0) -
CONTRIBUTING.md
* If you work for a company that wants to allow you to contribute your work, then you'll need to sign a [corporate CLA](https://code.google.com/legal/corporate-cla-v1.0.html).
Registered: Tue Nov 05 12:39:12 UTC 2024 - Last Modified: Wed Oct 23 06:20:12 UTC 2024 - 15.9K bytes - Viewed (0)