Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 46 for signatures (0.08 sec)

  1. cmd/signature-v2.go

    	signature := calculateSignatureV2(stringToSign, cred.SecretKey)
    	return signature
    }
    
    // compareSignatureV2 returns true if and only if both signatures
    // are equal. The signatures are expected to be base64 encoded strings
    // according to the AWS S3 signature V2 spec.
    func compareSignatureV2(sig1, sig2 string) bool {
    	// Decode signature string to binary byte-sequence representation is required
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Aug 29 02:39:48 UTC 2025
    - 12.2K bytes
    - Viewed (0)
  2. cmd/signature-v4.go

    		return doesPolicySignatureV2Match(formValues)
    	}
    	return doesPolicySignatureV4Match(formValues)
    }
    
    // compareSignatureV4 returns true if and only if both signatures
    // are equal. The signatures are expected to be HEX encoded strings
    // according to the AWS S3 signature V4 spec.
    func compareSignatureV4(sig1, sig2 string) bool {
    	// The CTC using []byte(str) works because the hex encoding
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Fri Dec 13 22:19:12 UTC 2024
    - 12.4K bytes
    - Viewed (0)
  3. docs/en/docs/tutorial/security/oauth2-jwt.md

    If you want to play with JWT tokens and see how they work, check <a href="https://jwt.io/" class="external-link" target="_blank">https://jwt.io</a>.
    
    ## Install `PyJWT` { #install-pyjwt }
    
    Registered: Sun Sep 07 07:19:17 UTC 2025
    - Last Modified: Sun Aug 31 10:49:48 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  4. doc/godebug.md

    This currently only affects arm64 programs. For all other platforms it is a no-op.
    
    Go 1.24 removed the `x509sha1` setting.  `crypto/x509` no longer supports verifying
    signatures on certificates that use SHA-1 based signature algorithms.
    
    Go 1.24 changes the default value of the [`x509usepolicies`
    setting.](/pkg/crypto/x509/#CreateCertificate) from `0` to `1`. When marshalling
    certificates, policies are now taken from the
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Tue Jul 08 18:30:38 UTC 2025
    - 22.9K bytes
    - Viewed (0)
  5. src/cmd/api/main_test.go

    func (w *Walker) emitFunc(f *types.Func) {
    	sig := f.Signature()
    	if sig.Recv() != nil {
    		panic("method considered a regular function: " + f.String())
    	}
    	if w.isDeprecated(f) {
    		w.emitf("func %s //deprecated", f.Name())
    	}
    	w.emitf("func %s%s", f.Name(), w.signatureString(sig))
    }
    
    func (w *Walker) emitMethod(m *types.Selection) {
    	sig := m.Type().(*types.Signature)
    	recv := sig.Recv().Type()
    Registered: Tue Sep 09 11:13:09 UTC 2025
    - Last Modified: Thu Feb 20 03:25:33 UTC 2025
    - 31.4K bytes
    - Viewed (0)
  6. cmd/metacache-entries.go

    func (e metaCacheEntry) hasPrefix(s string) bool {
    	return strings.HasPrefix(e.name, s)
    }
    
    // matches returns if the entries have the same versions.
    // If strict is false we allow signatures to mismatch.
    func (e *metaCacheEntry) matches(other *metaCacheEntry, strict bool) (prefer *metaCacheEntry, matches bool) {
    	if e == nil && other == nil {
    		return nil, true
    	}
    	if e == nil {
    		return other, false
    	}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Thu Aug 08 15:29:58 UTC 2024
    - 24.1K bytes
    - Viewed (0)
  7. cmd/streaming-signature-v4.go

    			return n, cr.err
    		}
    	}
    
    	// Now, we read the signature of the following payload and expect:
    	//   chunk-signature=" + <signature-as-hex> + "\r\n"
    	//
    	// The signature is 64 bytes long (hex-encoded SHA256 hash) and
    	// starts with a 16 byte header: len("chunk-signature=") + 64 == 80.
    	var signature [80]byte
    	_, err = io.ReadFull(cr.reader, signature[:])
    	if err == io.EOF {
    		err = io.ErrUnexpectedEOF
    	}
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Sun Mar 30 00:56:02 UTC 2025
    - 18.2K bytes
    - Viewed (0)
  8. cmd/signature-v4_test.go

    			},
    			expected: ErrInvalidAccessKeyID,
    		},
    		// (2) It should fail with a bad signature.
    		{
    			form: http.Header{
    				"X-Amz-Credential": []string{fmt.Sprintf(credentialTemplate, accessKey, now.Format(yyyymmdd), globalMinioDefaultRegion)},
    				"X-Amz-Date":       []string{now.Format(iso8601Format)},
    				"X-Amz-Signature":  []string{"invalidsignature"},
    				"Policy":           []string{"policy"},
    			},
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 10.5K bytes
    - Viewed (0)
  9. cmd/signature-v4-utils_test.go

    		{"X-Amz-Content-Sha256", unsignedPayload, "X-Amz-Credential", "", true},
    
    		// Test case - 4.
    		// Enabling PreSigned Signature v4, but X-Amz-Content-Sha256 not set has to be skipped.
    		{"", "", "X-Amz-Credential", "", true},
    
    		// Test case - 5.
    		// Enabling PreSigned Signature v4, but X-Amz-Content-Sha256 set and its not UNSIGNED-PAYLOAD, we shouldn't skip.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Wed Apr 09 14:28:39 UTC 2025
    - 14.3K bytes
    - Viewed (0)
  10. cmd/signature-v4-parser_test.go

    			// validating the extraction/parsing of signature field.
    			if !compareSignatureV4(testCase.expectedAuthField.Signature, parsedAuthField.Signature) {
    				t.Errorf("Test %d: Parsed Signature field mismatch: Expected \"%s\", got \"%s\"", i+1, testCase.expectedAuthField.Signature, parsedAuthField.Signature)
    			}
    
    			// validating the extracted signed headers.
    Registered: Sun Sep 07 19:28:11 UTC 2025
    - Last Modified: Tue Feb 18 16:25:55 UTC 2025
    - 27.4K bytes
    - Viewed (0)
Back to top