Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 1 - 10 of 64 for Algorithm (0.07 seconds)

  1. cmd/bitrot.go

    	}
    	for algorithm := range bitrotAlgorithms {
    		if !algorithm.Available() {
    			continue
    		}
    
    		checksum, err := hex.DecodeString(checksums[algorithm])
    		if err != nil {
    			logger.Fatal(errSelfTestFailure, fmt.Sprintf("bitrot: failed to decode %v checksum %s for selftest: %v", algorithm, checksums[algorithm], err))
    		}
    		var (
    			hash = algorithm.New()
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 7.7K bytes
    - Click Count (0)
  2. internal/crypto/sse-c.go

    	}
    	if algorithm != SealAlgorithm && algorithm != InsecureSealAlgorithm {
    		return sealedKey, errInvalidInternalSealAlgorithm
    	}
    	encryptedKey, err := base64.StdEncoding.DecodeString(b64SealedKey)
    	if err != nil || len(encryptedKey) != 64 {
    		return sealedKey, Errorf("The internal sealed key for SSE-C is invalid")
    	}
    
    	sealedKey.Algorithm = algorithm
    	copy(sealedKey.IV[:], iv)
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Sun Sep 28 20:59:21 GMT 2025
    - 5.2K bytes
    - Click Count (0)
  3. docs_src/security/tutorial005_an_py310.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(
        security_scopes: SecurityScopes, token: Annotated[str, Depends(oauth2_scheme)]
    ):
        if security_scopes.scopes:
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 5.3K bytes
    - Click Count (0)
  4. docs_src/security/tutorial005_an_py39.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(
        security_scopes: SecurityScopes, token: Annotated[str, Depends(oauth2_scheme)]
    ):
        if security_scopes.scopes:
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 5.3K bytes
    - Click Count (0)
  5. okhttp/src/commonJvmAndroid/kotlin/okhttp3/CompressionInterceptor.kt

     */
    open class CompressionInterceptor(
      vararg val algorithms: DecompressionAlgorithm,
    ) : Interceptor {
      internal val acceptEncoding =
        algorithms
          .map {
            it.encoding
          }.joinToString(separator = ", ")
    
      override fun intercept(chain: Interceptor.Chain): Response =
        if (algorithms.isNotEmpty() && chain.request().header("Accept-Encoding") == null) {
          val request =
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Tue Oct 07 15:15:28 GMT 2025
    - 2.9K bytes
    - Click Count (1)
  6. docs_src/security/tutorial004_an_py310.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4.1K bytes
    - Click Count (0)
  7. docs_src/security/tutorial004_an_py39.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4.2K bytes
    - Click Count (0)
  8. cmd/signature-v4-parser.go

    type preSignValues struct {
    	signValues
    	Date    time.Time
    	Expires time.Duration
    }
    
    // Parses signature version '4' query string of the following form.
    //
    //	querystring = X-Amz-Algorithm=algorithm
    //	querystring += &X-Amz-Credential= urlencode(accessKey + '/' + credential_scope)
    //	querystring += &X-Amz-Date=date
    //	querystring += &X-Amz-Expires=timeout interval
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Oct 10 18:57:35 GMT 2025
    - 9.4K bytes
    - Click Count (0)
  9. docs_src/security/tutorial004_py310.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4K bytes
    - Click Count (0)
  10. docs_src/security/tutorial004_py39.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Wed Dec 17 20:41:43 GMT 2025
    - 4.1K bytes
    - Click Count (0)
Back to Top