Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 10 of 916 for crypt (0.1 sec)

  1. src/main/java/jcifs/pac/kerberos/KerberosTicket.java

                    DEROctetString encOctets = ASN1Util.as(DEROctetString.class, ASN1Util.as(ASN1TaggedObject.class, encSequence, 2));
                    byte[] crypt = encOctets.getOctets();
    
                    if ( keys == null ) {
                        try {
                            keys = new KerberosCredentials().getKeys();
                        }
    Registered: Wed Jun 12 15:45:55 UTC 2024
    - Last Modified: Mon Oct 02 12:02:06 UTC 2023
    - 5.7K bytes
    - Viewed (0)
  2. security/tools/jwt/sa-jwt.py

    """
    from __future__ import print_function
    import argparse
    import time
    
    import google.auth.crypt
    import google.auth.jwt
    
    
    def main(args):
        """Generates a signed JSON Web Token using a Google API Service Account."""
        signer = google.auth.crypt.RSASigner.from_service_account_file(
            args.service_account_file)
        now = int(time.time())
        payload = {
    Registered: Fri Jun 14 15:00:06 UTC 2024
    - Last Modified: Sat Sep 14 20:15:07 UTC 2019
    - 2.6K bytes
    - Viewed (0)
  3. src/crypto/internal/boring/rsa.go

    }
    
    var invalidSaltLenErr = errors.New("crypto/rsa: PSSOptions.SaltLength cannot be negative")
    
    func SignRSAPSS(priv *PrivateKeyRSA, h crypto.Hash, hashed []byte, saltLen int) ([]byte, error) {
    	md := cryptoHashToMD(h)
    	if md == nil {
    		return nil, errors.New("crypto/rsa: unsupported hash function")
    	}
    
    	// A salt length of -2 is valid in BoringSSL, but not in crypto/rsa, so reject
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Mar 26 23:38:03 UTC 2024
    - 12K bytes
    - Viewed (0)
  4. src/crypto/aes/asm_s390x.s

    	STMG	R2, R9, (R1)
    	ADDW	$4, R3
    	ADDW	$4, R5
    	ADDW	$4, R7
    	ADDW	$4, R9
    	MOVD	$64(R1), R1
    	SUB	$64, R0
    	BR	incr
    tail:
    	CMP	R0, $0
    	BEQ	crypt
    	STMG	R2, R3, (R1)
    	ADDW	$1, R3
    	MOVD	$16(R1), R1
    	SUB	$16, R0
    	BR	tail
    crypt:
    	STMG	R2, R3, (R12)       // update next counter value
    	MOVD	fn+0(FP), R0        // function code (encryption)
    	MOVD	key_base+8(FP), R1  // key
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 4.4K bytes
    - Viewed (0)
  5. src/crypto/rc4/rc4_test.go

    	"fmt"
    	"testing"
    )
    
    type rc4Test struct {
    	key, keystream []byte
    }
    
    var golden = []rc4Test{
    	// Test vectors from the original cypherpunk posting of ARC4:
    	//   https://groups.google.com/group/sci.crypt/msg/10a300c9d21afca0?pli=1
    	{
    		[]byte{0x01, 0x23, 0x45, 0x67, 0x89, 0xab, 0xcd, 0xef},
    		[]byte{0x74, 0x94, 0xc2, 0xe7, 0x10, 0x4b, 0x08, 0x79},
    	},
    	{
    		[]byte{0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00},
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Tue Aug 21 19:49:06 UTC 2018
    - 4.3K bytes
    - Viewed (0)
  6. pyproject.toml

        # TODO: remove after upgrading HTTPX to a version newer than 0.23.0
        # Including PR: https://github.com/encode/httpx/pull/2309
        "ignore:'cgi' is deprecated:DeprecationWarning",
        # For passlib
        "ignore:'crypt' is deprecated and slated for removal in Python 3.13:DeprecationWarning",
        # see https://trio.readthedocs.io/en/stable/history.html#trio-0-22-0-2022-09-28
        "ignore:You seem to already have a custom.*:RuntimeWarning:trio",
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Thu May 02 22:37:31 UTC 2024
    - 9.3K bytes
    - Viewed (0)
  7. hack/unwanted-dependencies.json

          "github.com/PuerkitoBio/urlesc": "unmaintained, archive mode",
          "github.com/armon/consul-api": "MPL license not in CNCF allowlist",
          "github.com/bketelsen/crypt": "unused, crypto",
          "github.com/form3tech-oss/jwt-go": "unmaintained, archive mode",
          "github.com/getsentry/raven-go": "unmaintained, archive mode",
          "github.com/go-bindata/go-bindata": "refer to #99829",
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Thu Jun 13 12:31:38 UTC 2024
    - 9.8K bytes
    - Viewed (0)
  8. go.work.sum

    go.uber.org/atomic v1.7.0 h1:ADUqmZGgLDDfbSL9ZmPxKTybcoEYHgpYfELNoN+7hsw=
    golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc=
    golang.org/x/crypto v0.0.0-20220314234659-1baeb1ce4c0b/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4=
    golang.org/x/crypto v0.9.0/go.mod h1:yrmDGqONDYtNj3tH8X9dzUun2m2lzPa9ngI6/RUPGR0=
    golang.org/x/crypto v0.12.0/go.mod h1:NF0Gs7EO5K4qLn+Ylc+fih8BSTeIjAP05siRnAh98yw=
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue May 28 08:48:12 UTC 2024
    - 30.9K bytes
    - Viewed (0)
  9. src/crypto/aes/asm_ppc64x.s

    #define INP R3
    #define OUTP R4
    #define LEN R5
    #define KEYP R6
    #define ROUNDS R7
    #define IVP R8
    #define ENC R9
    
    #define INOUT V2
    #define TMP V3
    #define IVEC V4
    
    // Load the crypt key into VSRs.
    //
    // The expanded key is stored and loaded using
    // STXVD2X/LXVD2X. The in-memory byte ordering
    // depends on the endianness of the machine. The
    // expanded keys are generated by expandKeyAsm above.
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon May 20 18:05:32 UTC 2024
    - 18.6K bytes
    - Viewed (0)
  10. go.sum

    golang.org/x/crypto v0.0.0-20190605123033-f99c8df09eb5/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
    golang.org/x/crypto v0.0.0-20191011191535-87dc89f01550/go.mod h1:yigFU9vqHzYiE8UmvKecakEJjdnWj3jj499lnFckfCI=
    golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto=
    golang.org/x/crypto v0.23.0 h1:dIJU/v2J8Mdglj/8rJ6UUOM3Zc9zLZxVZwwxMooUSAI=
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 12 21:47:11 UTC 2024
    - 93.1K bytes
    - Viewed (0)
Back to top