- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 107 for secretKey (0.09 sec)
-
cmd/bucket-handlers_test.go
testCases := []struct { bucketName string accessKey string secretKey string // expected Response. expectedRespStatus int }{ // Test case - 1. // Bucket exists. { bucketName: bucketName, accessKey: credentials.AccessKey, secretKey: credentials.SecretKey, expectedRespStatus: http.StatusOK, }, // Test case - 2.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 39.8K bytes - Viewed (0) -
cmd/object-handlers_test.go
secretKey: credentials.SecretKey, expectedRespStatus: http.StatusNotFound, }, // Test case - 3. // Test case to induce a signature mismatch. // Using invalid accessID. { bucketName: bucketName, objectName: objectName, accessKey: "Invalid-AccessID", secretKey: credentials.SecretKey,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 163.1K bytes - Viewed (0) -
cmd/server_test.go
// Create new HTTP request with incorrect secretKey to generate an incorrect signature. secretKey := s.secretKey + "a" request, err = newTestSignedRequest(http.MethodPut, getPutObjectURL(s.endPoint, bucketName, objName), 0, nil, s.accessKey, secretKey, s.signer) c.Assert(err, nil) response, err = s.client.Do(request) c.Assert(err, nil)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 118.1K bytes - Viewed (0) -
cmd/signature-v2_test.go
signature string errCode APIErrorCode }{ {"invalidAccessKey", policy, calculateSignatureV2(policy, creds.SecretKey), ErrInvalidAccessKeyID}, {creds.AccessKey, policy, calculateSignatureV2("random", creds.SecretKey), ErrSignatureDoesNotMatch}, {creds.AccessKey, policy, calculateSignatureV2(policy, creds.SecretKey), ErrNone}, } for i, test := range testCases { formValues := make(http.Header)
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 8K bytes - Viewed (0) -
cmd/bucket-lifecycle-handlers_test.go
bucketName string accessKey string secretKey string // Sent body body []byte // Expected response expectedRespStatus int lifecycleResponse []byte errorResponse APIErrorResponse shouldPass bool }{ // GET empty credentials { method: http.MethodGet, bucketName: bucketName, accessKey: "", secretKey: "", expectedRespStatus: http.StatusForbidden,
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Mon Jun 10 15:50:49 UTC 2024 - 11.3K bytes - Viewed (0) -
cmd/test-utils_test.go
return nil } // Sign given request using Signature V2. func signRequestV2(req *http.Request, accessKey, secretKey string) error { signer.SignV2(*req, accessKey, secretKey, false) return nil } // Sign given request using Signature V4. func signRequestV4(req *http.Request, accessKey, secretKey string) error { // Get hashed payload. hashedPayload := req.Header.Get("x-amz-content-sha256") if hashedPayload == "" {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 77K bytes - Viewed (0) -
cmd/ftp-server-driver.go
AccessKey: cred.AccessKey, SecretKey: cred.SecretKey, SessionToken: cred.SessionToken, ParentUser: cred.ParentUser, }, UpdatedAt: updatedAt, })) mcreds = credentials.NewStaticV4(cred.AccessKey, cred.SecretKey, cred.SessionToken) } else { mcreds = credentials.NewStaticV4(sa.Credentials.AccessKey, sa.Credentials.SecretKey, "") }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 14.3K bytes - Viewed (0) -
src/main/java/jcifs/util/SecureCredentialStorage.java
/** * Derive encryption key from password using PBKDF2 */ private SecretKey deriveKey(char[] password, byte[] salt) throws GeneralSecurityException { SecretKeyFactory keyFactory = SecretKeyFactory.getInstance(KEY_DERIVATION_ALGORITHM); KeySpec keySpec = new PBEKeySpec(password, salt, PBKDF2_ITERATIONS, KEY_SIZE); SecretKey tempKey = keyFactory.generateSecret(keySpec);
Registered: Sun Sep 07 00:10:21 UTC 2025 - Last Modified: Sat Aug 30 05:58:03 UTC 2025 - 12.7K bytes - Viewed (0) -
cmd/admin-handlers-idp-ldap.go
Credentials: madmin.Credentials{ AccessKey: newCred.AccessKey, SecretKey: newCred.SecretKey, Expiration: newCred.Expiration, }, } data, err := json.Marshal(createResp) if err != nil { writeErrorResponseJSON(ctx, w, toAdminAPIErr(ctx, err), r.URL) return } encryptedData, err := madmin.EncryptData(cred.SecretKey, data) if err != nil {
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 08 02:46:04 UTC 2025 - 19.2K bytes - Viewed (0) -
cmd/post-policy_test.go
testCasesV2 := []struct { expectedStatus int secretKey string formData map[string]string }{ {http.StatusForbidden, credentials.SecretKey, map[string]string{"AWSAccessKeyId": "invalidaccesskey"}}, {http.StatusForbidden, "invalidsecretkey", map[string]string{"AWSAccessKeyId": credentials.AccessKey}}, {http.StatusNoContent, credentials.SecretKey, map[string]string{"AWSAccessKeyId": credentials.AccessKey}},
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 30.6K bytes - Viewed (0)