- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 43 for signatures (0.04 sec)
-
cmd/signature-v2.go
signature := calculateSignatureV2(stringToSign, cred.SecretKey) return signature } // compareSignatureV2 returns true if and only if both signatures // are equal. The signatures are expected to be base64 encoded strings // according to the AWS S3 signature V2 spec. func compareSignatureV2(sig1, sig2 string) bool { // Decode signature string to binary byte-sequence representation is required
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 12.2K bytes - Viewed (0) -
.github/workflows/codeql-analysis.yml
- name: Cache Gradle Modules uses: actions/cache@v4 with: path: | ~/.gradle/caches/modules-2/ ~/.gradle/caches/build-cache-1/ ~/.gradle/caches/signatures/ ~/.gradle/caches/keyrings/ key: ${{ runner.os }}-gradle-cache-${{ hashFiles('gradle/wrapper/gradle-wrapper.properties') }} if: ${{ matrix.language == 'java' }}Registered: Wed Sep 10 11:36:15 UTC 2025 - Last Modified: Thu Aug 21 23:08:02 UTC 2025 - 4K bytes - Viewed (0) -
docs/en/docs/tutorial/security/oauth2-jwt.md
Registered: Sun Sep 07 07:19:17 UTC 2025 - Last Modified: Sun Aug 31 10:49:48 UTC 2025 - 10.5K bytes - Viewed (0) -
doc/godebug.md
This currently only affects arm64 programs. For all other platforms it is a no-op. Go 1.24 removed the `x509sha1` setting. `crypto/x509` no longer supports verifying signatures on certificates that use SHA-1 based signature algorithms. Go 1.24 changes the default value of the [`x509usepolicies` setting.](/pkg/crypto/x509/#CreateCertificate) from `0` to `1`. When marshalling certificates, policies are now taken from the
Registered: Tue Sep 09 11:13:09 UTC 2025 - Last Modified: Tue Jul 08 18:30:38 UTC 2025 - 22.9K bytes - Viewed (0) -
cmd/xl-storage-format-v2.go
} // signatureErr is a signature returned when an error occurs. var signatureErr = [4]byte{'e', 'r', 'r', 0} // getSignature will return a signature that is expected to be the same across all disks. func (j xlMetaV2Version) getSignature() [4]byte { switch j.Type { case ObjectType: return j.ObjectV2.Signature() case DeleteType: return j.DeleteMarker.Signature() case LegacyType:Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 65.6K bytes - Viewed (1) -
cmd/signature-v2_test.go
{ queryParams: map[string]string{ "Expires": "60", "Signature": "badsignature", "AWSAccessKeyId": accessKey, }, expected: ErrExpiredPresignRequest, }, // (4) Should error when the signature does not match. { queryParams: map[string]string{ "Expires": fmt.Sprintf("%d", now.Unix()+60), "Signature": "badsignature", "AWSAccessKeyId": accessKey, },Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 8K bytes - Viewed (0) -
RELEASE.md
* `tf.function`: * `tf.function` now uses the Python inspect library directly for parsing the signature of the Python function it is decorated on. This change may break code where the function signature is malformed, but was ignored previously, such as: * Using `functools.wraps` on a function with different signature * Using `functools.partial` with an invalid `tf.function` inputRegistered: Tue Sep 09 12:39:10 UTC 2025 - Last Modified: Mon Aug 18 20:54:38 UTC 2025 - 740K bytes - Viewed (3) -
cmd/streaming-signature-v4_test.go
} // List of readers used. readers := []io.Reader{ // Test - 1 bytes.NewReader([]byte("1000;chunk-signature=111123333333333333334444211\r\n")), // Test - 2 bytes.NewReader([]byte("1000;")), // Test - 3 bytes.NewReader(fmt.Appendf(nil, "%4097d", 1)), // Test - 4 bytes.NewReader([]byte("1000;chunk-signature=111123333333333333334444211\r\n")), } testCases := []testCase{ // Test - 1 - small bufio reader. {Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 5.7K bytes - Viewed (0) -
cmd/test-utils_test.go
req.URL.RawQuery = query.Encode() // Save signature finally. req.URL.RawQuery += "&Signature=" + url.QueryEscape(signature) return nil } // Sign given request using Signature V2. func signRequestV2(req *http.Request, accessKey, secretKey string) error { signer.SignV2(*req, accessKey, secretKey, false) return nil } // Sign given request using Signature V4.
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 77K bytes - Viewed (0) -
cmd/post-policy_test.go
} } // postPresignSignatureV4 - presigned signature for PostPolicy requests. func postPresignSignatureV4(policyBase64 string, t time.Time, secretAccessKey, location string) string { // Get signining key. signingkey := getSigningKey(secretAccessKey, t, location, "s3") // Calculate signature. signature := getSignature(signingkey, policyBase64) return signature }
Registered: Sun Sep 07 19:28:11 UTC 2025 - Last Modified: Fri Aug 29 02:39:48 UTC 2025 - 30.6K bytes - Viewed (0)