- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 785 for sig2 (0.06 sec)
-
src/crypto/ed25519/ed25519_test.go
var priv [PrivateKeySize]byte copy(priv[:], privBytes) copy(priv[32:], pubKey) sig2 := Sign(priv[:], msg) if !bytes.Equal(sig, sig2[:]) { t.Errorf("different signature result on line %d: %x vs %x", lineNo, sig, sig2) } if !Verify(pubKey, msg, sig2) { t.Errorf("signature failed to verify on line %d", lineNo) } priv2 := NewKeyFromSeed(priv[:32]) if !bytes.Equal(priv[:], priv2) {
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Wed Mar 27 18:23:49 UTC 2024 - 10.9K bytes - Viewed (0) -
cmd/signature-v2.go
// according to the AWS S3 signature V2 spec. func compareSignatureV2(sig1, sig2 string) bool { // Decode signature string to binary byte-sequence representation is required // as Base64 encoding of a value is not unique: // For example "aGVsbG8=" and "aGVsbG8=\r" will result in the same byte slice. signature1, err := base64.StdEncoding.DecodeString(sig1) if err != nil { return false }
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu Jan 18 07:03:17 UTC 2024 - 12.2K bytes - Viewed (0) -
cmd/signature-v4.go
// according to the AWS S3 signature V4 spec. func compareSignatureV4(sig1, sig2 string) bool { // The CTC using []byte(str) works because the hex encoding // is unique for a sequence of bytes. See also compareSignatureV2. return subtle.ConstantTimeCompare([]byte(sig1), []byte(sig2)) == 1 } // doesPolicySignatureMatch - Verify query headers with post policy
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Thu May 16 23:13:47 UTC 2024 - 12.4K bytes - Viewed (0) -
tensorflow/compiler/mlir/quantization/tensorflow/python/integration_test/quantize_model_test.py
'sig1': os.path.join(self._input_saved_model_path, 'sig1_repr'), 'sig2': os.path.join(self._input_saved_model_path, 'sig2_repr'), }).save({ 'sig1': data_gen_sig1(), 'sig2': data_gen_sig2(), }) tags = {tag_constants.SERVING} quantization_options = quant_opts_pb2.QuantizationOptions( quantization_method=quant_opts_pb2.QuantizationMethod(
Registered: Sun Jun 16 05:45:23 UTC 2024 - Last Modified: Fri May 17 03:36:50 UTC 2024 - 235.6K bytes - Viewed (0) -
src/cmd/compile/internal/types2/api_test.go
// in Identical() or String(). sig, _ := sel.Type().(*Signature) if sel.Kind() == MethodVal { got := sig.Recv().Type() want := sel.Recv() if !Identical(got, want) { t.Errorf("%s: Recv() = %s, want %s", segment, got, want) } } else if sig != nil && sig.Recv() != nil { t.Errorf("%s: signature has receiver %s", sig, sig.Recv().Type()) } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Tue May 07 20:08:23 UTC 2024 - 93.3K bytes - Viewed (0) -
src/go/types/api_test.go
// in Identical() or String(). sig, _ := sel.Type().(*Signature) if sel.Kind() == MethodVal { got := sig.Recv().Type() want := sel.Recv() if !Identical(got, want) { t.Errorf("%s: Recv() = %s, want %s", syntax, got, want) } } else if sig != nil && sig.Recv() != nil { t.Errorf("%s: signature has receiver %s", sig, sig.Recv().Type()) } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 01:00:11 UTC 2024 - 94.2K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_legacy.go
func Verify(pub *PublicKey, hash []byte, r, s *big.Int) bool { if r.Sign() <= 0 || s.Sign() <= 0 { return false } sig, err := encodeSignature(r.Bytes(), s.Bytes()) if err != nil { return false } return VerifyASN1(pub, hash, sig) } func verifyLegacy(pub *PublicKey, hash []byte, sig []byte) bool { rBytes, sBytes, err := parseSignature(sig) if err != nil { return false }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 4.8K bytes - Viewed (0) -
src/crypto/ed25519/ed25519.go
copy(privateKey[32:], publicKey) } // Sign signs the message with privateKey and returns a signature. It will // panic if len(privateKey) is not [PrivateKeySize]. func Sign(privateKey PrivateKey, message []byte) []byte { // Outline the function body so that the returned signature can be // stack-allocated. signature := make([]byte, SignatureSize) sign(signature, privateKey, message, domPrefixPure, "") return signature
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Thu May 23 00:11:18 UTC 2024 - 11.7K bytes - Viewed (0) -
src/os/signal/signal.go
type handler struct { mask [(numSig + 31) / 32]uint32 } func (h *handler) want(sig int) bool { return (h.mask[sig/32]>>uint(sig&31))&1 != 0 } func (h *handler) set(sig int) { h.mask[sig/32] |= 1 << uint(sig&31) } func (h *handler) clear(sig int) { h.mask[sig/32] &^= 1 << uint(sig&31) } // Stop relaying the signals, sigs, to any channels previously registered to
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 21:33:12 UTC 2024 - 8.3K bytes - Viewed (0) -
src/crypto/ecdsa/ecdsa_test.go
priv, _ := GenerateKey(c, rand.Reader) hashed := []byte("testing") sig, err := SignASN1(rand.Reader, priv, hashed) if err != nil { t.Errorf("error signing: %s", err) return } if !VerifyASN1(&priv.PublicKey, hashed, sig) { t.Errorf("VerifyASN1 failed") } hashed[0] ^= 0xff if VerifyASN1(&priv.PublicKey, hashed, sig) { t.Errorf("VerifyASN1 always works!") } }
Registered: Wed Jun 12 16:32:35 UTC 2024 - Last Modified: Mon Feb 26 21:33:58 UTC 2024 - 13.5K bytes - Viewed (0)