Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 3 of 3 for compareSignatureV4 (0.14 sec)

  1. cmd/signature-v4.go

    		return doesPolicySignatureV2Match(formValues)
    	}
    	return doesPolicySignatureV4Match(formValues)
    }
    
    // compareSignatureV4 returns true if and only if both signatures
    // are equal. The signatures are expected to be HEX encoded strings
    // according to the AWS S3 signature V4 spec.
    func compareSignatureV4(sig1, sig2 string) bool {
    	// The CTC using []byte(str) works because the hex encoding
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu May 16 23:13:47 UTC 2024
    - 12.4K bytes
    - Viewed (0)
  2. cmd/streaming-signature-v4.go

    	// Calculate signature.
    	newSignature := getSignature(signingKey, stringToSign)
    
    	// Verify if signature match.
    	if !compareSignatureV4(newSignature, signV4Values.Signature) {
    		return cred, "", "", time.Time{}, ErrSignatureDoesNotMatch
    	}
    
    	// Return calculated signature.
    	return cred, newSignature, region, date, ErrNone
    }
    
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu May 16 23:13:47 UTC 2024
    - 18.2K bytes
    - Viewed (0)
  3. cmd/signature-v4-parser_test.go

    			validateCredentialfields(t, i+1, testCase.expectedAuthField.Credential, parsedAuthField.Credential)
    
    			// validating the extraction/parsing of signature field.
    			if !compareSignatureV4(testCase.expectedAuthField.Signature, parsedAuthField.Signature) {
    				t.Errorf("Test %d: Parsed Signature field mismatch: Expected \"%s\", got \"%s\"", i+1, testCase.expectedAuthField.Signature, parsedAuthField.Signature)
    			}
    Registered: Sun Nov 03 19:28:11 UTC 2024
    - Last Modified: Thu Feb 22 06:26:06 UTC 2024
    - 27.4K bytes
    - Viewed (0)
Back to top