- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 46 for signatures (0.08 sec)
-
cmd/signature-v2.go
signature := calculateSignatureV2(stringToSign, cred.SecretKey) return signature } // compareSignatureV2 returns true if and only if both signatures // are equal. The signatures are expected to be base64 encoded strings // according to the AWS S3 signature V2 spec. func compareSignatureV2(sig1, sig2 string) bool { // Decode signature string to binary byte-sequence representation is required
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
cmd/signature-v4.go
return doesPolicySignatureV2Match(formValues) } return doesPolicySignatureV4Match(formValues) } // compareSignatureV4 returns true if and only if both signatures // are equal. The signatures are expected to be HEX encoded strings // according to the AWS S3 signature V4 spec. func compareSignatureV4(sig1, sig2 string) bool { // The CTC using []byte(str) works because the hex encoding
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Dec 13 22:19:12 UTC 2024 - 12.4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
doc/godebug.md
This currently only affects arm64 programs. For all other platforms it is a no-op. Go 1.24 removed the `x509sha1` setting. `crypto/x509` no longer supports verifying signatures on certificates that use SHA-1 based signature algorithms. Go 1.24 changes the default value of the [`x509usepolicies` setting.](/pkg/crypto/x509/#CreateCertificate) from `0` to `1`. When marshalling certificates, policies are now taken from the
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Jul 08 18:30:38 UTC 2025 - 22.9K bytes - Viewed (0) -
src/cmd/api/main_test.go
func (w *Walker) emitFunc(f *types.Func) { sig := f.Signature() if sig.Recv() != nil { panic("method considered a regular function: " + f.String()) } if w.isDeprecated(f) { w.emitf("func %s //deprecated", f.Name()) } w.emitf("func %s%s", f.Name(), w.signatureString(sig)) } func (w *Walker) emitMethod(m *types.Selection) { sig := m.Type().(*types.Signature) recv := sig.Recv().Type()
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Thu Feb 20 03:25:33 UTC 2025 - 31.4K bytes - Viewed (0) -
cmd/metacache-entries.go
func (e metaCacheEntry) hasPrefix(s string) bool { return strings.HasPrefix(e.name, s) } // matches returns if the entries have the same versions. // If strict is false we allow signatures to mismatch. func (e *metaCacheEntry) matches(other *metaCacheEntry, strict bool) (prefer *metaCacheEntry, matches bool) { if e == nil && other == nil { return nil, true } if e == nil { return other, false }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Thu Aug 08 15:29:58 UTC 2024 - 24.1K bytes - Viewed (0) -
cmd/streaming-signature-v4.go
return n, cr.err } } // Now, we read the signature of the following payload and expect: // chunk-signature=" + <signature-as-hex> + "\r\n" // // The signature is 64 bytes long (hex-encoded SHA256 hash) and // starts with a 16 byte header: len("chunk-signature=") + 64 == 80. var signature [80]byte _, err = io.ReadFull(cr.reader, signature[:]) if err == io.EOF { err = io.ErrUnexpectedEOF }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Sun Mar 30 00:56:02 UTC 2025 - 18.2K bytes - Viewed (0) -
cmd/signature-v4_test.go
}, expected: ErrInvalidAccessKeyID, }, // (2) It should fail with a bad signature. { form: http.Header{ "X-Amz-Credential": []string{fmt.Sprintf(credentialTemplate, accessKey, now.Format(yyyymmdd), globalMinioDefaultRegion)}, "X-Amz-Date": []string{now.Format(iso8601Format)}, "X-Amz-Signature": []string{"invalidsignature"}, "Policy": []string{"policy"}, },Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 10.5K bytes - Viewed (0) -
cmd/signature-v4-utils_test.go
{"X-Amz-Content-Sha256", unsignedPayload, "X-Amz-Credential", "", true}, // Test case - 4. // Enabling PreSigned Signature v4, but X-Amz-Content-Sha256 not set has to be skipped. {"", "", "X-Amz-Credential", "", true}, // Test case - 5. // Enabling PreSigned Signature v4, but X-Amz-Content-Sha256 set and its not UNSIGNED-PAYLOAD, we shouldn't skip.Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Wed Apr 09 14:28:39 UTC 2025 - 14.3K bytes - Viewed (0) -
cmd/signature-v4-parser_test.go
// validating the extraction/parsing of signature field. if !compareSignatureV4(testCase.expectedAuthField.Signature, parsedAuthField.Signature) { t.Errorf("Test %d: Parsed Signature field mismatch: Expected \"%s\", got \"%s\"", i+1, testCase.expectedAuthField.Signature, parsedAuthField.Signature) } // validating the extracted signed headers.Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Tue Feb 18 16:25:55 UTC 2025 - 27.4K bytes - Viewed (0)