- Sort Score
- Num 10 results
- Language All
Results 21 - 30 of 199 for Algorithm (0.05 seconds)
-
internal/crypto/sse-s3.go
// is nil. func (sses3) CreateMetadata(metadata map[string]string, keyID string, kmsKey []byte, sealedKey SealedKey) map[string]string { if sealedKey.Algorithm != SealAlgorithm { logger.CriticalIf(context.Background(), Errorf("The seal algorithm '%s' is invalid for SSE-S3", sealedKey.Algorithm)) } // There are two possibilities: // - We use a KMS -> There must be non-empty key ID and a KMS data key.
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Tue May 07 23:55:37 GMT 2024 - 7.6K bytes - Click Count (0) -
docs_src/security/tutorial004_an_py310.py
else: expire = datetime.now(timezone.utc) + timedelta(minutes=15) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]): credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED,Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 4.1K bytes - Click Count (0) -
internal/config/crypto.go
func Encrypt(k *kms.KMS, plaintext io.Reader, ctx kms.Context) (io.Reader, error) { algorithm := sio.AES_256_GCM if !sioutil.NativeAES() { algorithm = sio.ChaCha20Poly1305 } key, err := k.GenerateKey(context.Background(), &kms.GenerateKeyRequest{AssociatedData: ctx}) if err != nil { return nil, err } stream, err := algorithm.Stream(key.Plaintext) if err != nil { return nil, err }
Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri May 16 14:27:42 GMT 2025 - 4.7K bytes - Click Count (0) -
docs_src/security/tutorial004_an_py39.py
else: expire = datetime.now(timezone.utc) + timedelta(minutes=15) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt async def get_current_user(token: Annotated[str, Depends(oauth2_scheme)]): credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED,Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 4.2K bytes - Click Count (0) -
cmd/signature-v4-parser.go
type preSignValues struct { signValues Date time.Time Expires time.Duration } // Parses signature version '4' query string of the following form. // // querystring = X-Amz-Algorithm=algorithm // querystring += &X-Amz-Credential= urlencode(accessKey + '/' + credential_scope) // querystring += &X-Amz-Date=date // querystring += &X-Amz-Expires=timeout intervalCreated: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Oct 10 18:57:35 GMT 2025 - 9.4K bytes - Click Count (0) -
okhttp-tls/src/main/kotlin/okhttp3/tls/internal/der/CertificateAdapters.kt
else -> null } } /** * ``` * AlgorithmIdentifier ::= SEQUENCE { * algorithm OBJECT IDENTIFIER, * parameters ANY DEFINED BY algorithm OPTIONAL * } * ``` */ internal val algorithmIdentifier: BasicDerAdapter<AlgorithmIdentifier> = Adapters.sequence( "AlgorithmIdentifier",Created: Fri Dec 26 11:42:13 GMT 2025 - Last Modified: Wed Mar 19 19:25:20 GMT 2025 - 13.6K bytes - Click Count (0) -
internal/crypto/header_test.go
{ Header: http.Header{ "X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{""}, "X-Amz-Server-Side-Encryption-Customer-Key": []string{""}, "X-Amz-Server-Side-Encryption-Customer-Key-Md5": []string{""}, }, Expected: true, }, // 4 { Header: http.Header{ "X-Amz-Server-Side-Encryption-Customer-Algorithm": []string{"AES256"},Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Wed Jul 13 14:52:15 GMT 2022 - 21.4K bytes - Click Count (0) -
android/guava-tests/test/com/google/common/hash/MacHashFunctionTest.java
Hashing.hmacSha1(keyData).toString()); assertEquals( "Hashing.hmacSha256(Key[algorithm=HmacSHA256, format=RAW])", Hashing.hmacSha256(SHA256_KEY).toString()); assertEquals( "Hashing.hmacSha256(Key[algorithm=HmacSHA256, format=RAW])", Hashing.hmacSha256(keyData).toString()); assertEquals(
Created: Fri Dec 26 12:43:10 GMT 2025 - Last Modified: Fri Dec 27 16:19:35 GMT 2024 - 13.8K bytes - Click Count (0) -
internal/crypto/metadata_test.go
} if keyID != test.KeyID { t.Errorf("Test %d: got key-ID '%v' - want key-ID '%v'", i, keyID, test.KeyID) } if sealedKey.Algorithm != test.SealedKey.Algorithm { t.Errorf("Test %d: got sealed key algorithm '%v' - want sealed key algorithm '%v'", i, sealedKey.Algorithm, test.SealedKey.Algorithm) } if !bytes.Equal(sealedKey.Key[:], test.SealedKey.Key[:]) {Created: Sun Dec 28 19:28:13 GMT 2025 - Last Modified: Fri Jul 12 20:51:54 GMT 2024 - 18.7K bytes - Click Count (0) -
docs_src/security/tutorial004_py310.py
else: expire = datetime.now(timezone.utc) + timedelta(minutes=15) to_encode.update({"exp": expire}) encoded_jwt = jwt.encode(to_encode, SECRET_KEY, algorithm=ALGORITHM) return encoded_jwt async def get_current_user(token: str = Depends(oauth2_scheme)): credentials_exception = HTTPException( status_code=status.HTTP_401_UNAUTHORIZED,Created: Sun Dec 28 07:19:09 GMT 2025 - Last Modified: Mon Sep 29 02:57:38 GMT 2025 - 4K bytes - Click Count (0)