Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 8 of 8 for Signatures (0.27 sec)

  1. cmd/signature-v4_test.go

    			},
    			expected: ErrInvalidAccessKeyID,
    		},
    		// (2) It should fail with a bad signature.
    		{
    			form: http.Header{
    				"X-Amz-Credential": []string{fmt.Sprintf(credentialTemplate, accessKey, now.Format(yyyymmdd), globalMinioDefaultRegion)},
    				"X-Amz-Date":       []string{now.Format(iso8601Format)},
    				"X-Amz-Signature":  []string{"invalidsignature"},
    				"Policy":           []string{"policy"},
    			},
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 10.5K bytes
    - Viewed (0)
  2. cmd/signature-v4-utils.go

    			extractedSignedHeaders[http.CanonicalHeaderKey(header)] = r.TransferEncoding
    		case "content-length":
    			// Signature-V4 spec excludes Content-Length from signed headers list for signature calculation.
    			// But some clients deviate from this rule. Hence we consider Content-Length for signature
    			// calculation to be compatible with such clients.
    			extractedSignedHeaders.Set(header, strconv.FormatInt(r.ContentLength, 10))
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 9.1K bytes
    - Viewed (0)
  3. cmd/object-multipart-handlers.go

    		return
    	}
    
    	// if Content-Length is unknown/missing, throw away
    	size := r.ContentLength
    
    	rAuthType := getRequestAuthType(r)
    	// For auth type streaming signature, we need to gather a different content length.
    	switch rAuthType {
    	// Check signature types that must have content length
    	case authTypeStreamingSigned, authTypeStreamingSignedTrailer, authTypeStreamingUnsignedTrailer:
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Jun 14 13:28:35 UTC 2024
    - 38.8K bytes
    - Viewed (0)
  4. cmd/api-errors.go

    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrMissingSignTag: {
    		Code:           "AccessDenied",
    		Description:    "Signature header missing Signature field.",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrMissingSignHeadersTag: {
    		Code:           "InvalidArgument",
    		Description:    "Signature header missing SignedHeaders field.",
    		HTTPStatusCode: http.StatusBadRequest,
    	},
    	ErrMalformedExpires: {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Thu Jun 13 22:26:38 UTC 2024
    - 92.1K bytes
    - Viewed (0)
  5. cmd/bucket-handlers.go

    			return
    		}
    	}
    
    	// Verify policy signature.
    	cred, errCode := doesPolicySignatureMatch(formValues)
    	if errCode != ErrNone {
    		writeErrorResponse(ctx, w, errorCodes.ToAPIErr(errCode), r.URL)
    		return
    	}
    
    	if len(fanOutEntries) > 0 {
    		// Once signature is validated, check if the user has
    		// explicit permissions for the user.
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Jun 14 13:28:35 UTC 2024
    - 61.2K bytes
    - Viewed (0)
  6. tensorflow/c/experimental/stream_executor/stream_executor.cc

    struct HostCallbackContext {
      absl::AnyInvocable<absl::Status() &&> callback;
    };
    
    // This wrapper allows calling `HostCallbackContext::callback` across C API.
    // This function matches `SE_StatusCallbackFn` signature and will be passed as
    // `callback_fn` to `host_callback` in `SP_StreamExecutor`.
    void HostCallbackTrampoline(void* ctx, TF_Status* status) {
      HostCallbackContext* host_ctx = static_cast<HostCallbackContext*>(ctx);
    Registered: Sun Jun 16 05:45:23 UTC 2024
    - Last Modified: Fri Jun 14 07:39:19 UTC 2024
    - 27.1K bytes
    - Viewed (0)
  7. pkg/security/security.go

    	// Didn't find much doc - but I suspect used for 'central cluster' use cases - so should
    	// match the cluster name set in the MC setup.
    	ClusterID string
    
    	// The type of Elliptical Signature algorithm to use
    	// when generating private keys. Currently only ECDSA is supported.
    	ECCSigAlg string
    
    	// The type of curve to use when generating private keys with ECC. Currently only ECDSA is supported.
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Thu Jun 13 17:48:28 UTC 2024
    - 19.1K bytes
    - Viewed (0)
  8. cmd/object-handlers.go

    		return
    	}
    
    	// if Content-Length is unknown/missing, deny the request
    	size := r.ContentLength
    	rAuthType := getRequestAuthType(r)
    	switch rAuthType {
    	// Check signature types that must have content length
    	case authTypeStreamingSigned, authTypeStreamingSignedTrailer, authTypeStreamingUnsignedTrailer:
    		if sizeStr, ok := r.Header[xhttp.AmzDecodedContentLength]; ok {
    			if sizeStr[0] == "" {
    Registered: Sun Jun 16 00:44:34 UTC 2024
    - Last Modified: Fri Jun 14 13:28:35 UTC 2024
    - 124.2K bytes
    - Viewed (0)
Back to top