Search Options

Display Count
Sort
Preferred Language
Advanced Search

Results 21 - 30 of 199 for Algorithm (0.07 seconds)

  1. internal/crypto/sse-s3.go

    // is nil.
    func (sses3) CreateMetadata(metadata map[string]string, keyID string, kmsKey []byte, sealedKey SealedKey) map[string]string {
    	if sealedKey.Algorithm != SealAlgorithm {
    		logger.CriticalIf(context.Background(), Errorf("The seal algorithm '%s' is invalid for SSE-S3", sealedKey.Algorithm))
    	}
    
    	// There are two possibilities:
    	// - We use a KMS -> There must be non-empty key ID and a KMS data key.
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Tue May 07 23:55:37 GMT 2024
    - 7.6K bytes
    - Click Count (0)
  2. docs_src/security/tutorial004_an_py310.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4.1K bytes
    - Click Count (0)
  3. internal/config/crypto.go

    func Encrypt(k *kms.KMS, plaintext io.Reader, ctx kms.Context) (io.Reader, error) {
    	algorithm := sio.AES_256_GCM
    	if !sioutil.NativeAES() {
    		algorithm = sio.ChaCha20Poly1305
    	}
    
    	key, err := k.GenerateKey(context.Background(), &kms.GenerateKeyRequest{AssociatedData: ctx})
    	if err != nil {
    		return nil, err
    	}
    	stream, err := algorithm.Stream(key.Plaintext)
    	if err != nil {
    		return nil, err
    	}
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri May 16 14:27:42 GMT 2025
    - 4.7K bytes
    - Click Count (0)
  4. docs_src/security/tutorial004_an_py39.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4.2K bytes
    - Click Count (0)
  5. cmd/signature-v4-parser.go

    type preSignValues struct {
    	signValues
    	Date    time.Time
    	Expires time.Duration
    }
    
    // Parses signature version '4' query string of the following form.
    //
    //	querystring = X-Amz-Algorithm=algorithm
    //	querystring += &X-Amz-Credential= urlencode(accessKey + '/' + credential_scope)
    //	querystring += &X-Amz-Date=date
    //	querystring += &X-Amz-Expires=timeout interval
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Oct 10 18:57:35 GMT 2025
    - 9.4K bytes
    - Click Count (0)
  6. okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt

            else -> null
          }
        }
    
      /**
       * ```
       * AlgorithmIdentifier ::= SEQUENCE  {
       *   algorithm      OBJECT IDENTIFIER,
       *   parameters     ANY DEFINED BY algorithm OPTIONAL
       * }
       * ```
       */
      internal val algorithmIdentifier: BasicDerAdapter<AlgorithmIdentifier> =
        Adapters.sequence(
          "AlgorithmIdentifier",
    Created: Fri Dec 26 11:42:13 GMT 2025
    - Last Modified: Wed Mar 19 19:25:20 GMT 2025
    - 13.6K bytes
    - Click Count (0)
  7. internal/crypto/header_test.go

    	{
    		Header: http.Header{
    			"X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{""},
    			"X-Amz-Server-Side-Encryption-Customer-Key":       []string{""},
    			"X-Amz-Server-Side-Encryption-Customer-Key-Md5":   []string{""},
    		},
    		Expected: true,
    	}, // 4
    	{
    		Header: http.Header{
    			"X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"},
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Wed Jul 13 14:52:15 GMT 2022
    - 21.4K bytes
    - Click Count (0)
  8. android/guava-tests/test/com/google/common/hash/MacHashFunctionTest.java

            Hashing.hmacSha1(keyData).toString());
    
        assertEquals(
            "Hashing.hmacSha256(Key[algorithm=HmacSHA256, format=RAW])",
            Hashing.hmacSha256(SHA256_KEY).toString());
        assertEquals(
            "Hashing.hmacSha256(Key[algorithm=HmacSHA256, format=RAW])",
            Hashing.hmacSha256(keyData).toString());
    
        assertEquals(
    Created: Fri Dec 26 12:43:10 GMT 2025
    - Last Modified: Fri Dec 27 16:19:35 GMT 2024
    - 13.8K bytes
    - Click Count (0)
  9. internal/crypto/metadata_test.go

    		}
    		if keyID != test.KeyID {
    			t.Errorf("Test %d: got key-ID '%v' - want key-ID '%v'", i, keyID, test.KeyID)
    		}
    		if sealedKey.Algorithm != test.SealedKey.Algorithm {
    			t.Errorf("Test %d: got sealed key algorithm '%v' - want sealed key algorithm '%v'", i, sealedKey.Algorithm, test.SealedKey.Algorithm)
    		}
    		if !bytes.Equal(sealedKey.Key[:], test.SealedKey.Key[:]) {
    Created: Sun Dec 28 19:28:13 GMT 2025
    - Last Modified: Fri Jul 12 20:51:54 GMT 2024
    - 18.7K bytes
    - Click Count (0)
  10. docs_src/security/tutorial004_py310.py

        else:
            expire = datetime.now(timezone.utc) + timedelta(minutes=15)
        to_encode.update({"exp": expire})
        encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM)
        return encoded_jwt
    
    
    async def get_current_user(token: str = Depends(oauth2_scheme)):
        credentials_exception = HTTPException(
            status_code=status.HTTP_401_UNAUTHORIZED,
    Created: Sun Dec 28 07:19:09 GMT 2025
    - Last Modified: Mon Sep 29 02:57:38 GMT 2025
    - 4K bytes
    - Click Count (0)
Back to Top