Search Options

Results per page
Sort
Preferred Languages
Advance

Results 31 - 40 of 75 for openjsse (0.42 sec)

  1. src/crypto/tls/tls.go

    	default:
    		return fail(errors.New("tls: unknown public key algorithm"))
    	}
    
    	return cert, nil
    }
    
    // Attempt to parse the given private key DER block. OpenSSL 0.9.8 generates
    // PKCS #1 private keys by default, while OpenSSL 1.0.0 generates PKCS #8 keys.
    // OpenSSL ecparam generates SEC1 EC private keys for ECDSA. We try all three.
    func parsePrivateKey(der []byte) (crypto.PrivateKey, error) {
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Fri Jun 07 17:57:01 UTC 2024
    - 12.2K bytes
    - Viewed (0)
  2. hack/lib/util.sh

        fi
      done
      return 1
    }
    
    # Test whether openssl is installed.
    # Sets:
    #  OPENSSL_BIN: The path to the openssl binary to use
    function kube::util::test_openssl_installed {
        if ! openssl version >& /dev/null; then
          echo "Failed to run openssl. Please ensure openssl is installed"
          exit 1
        fi
    
        OPENSSL_BIN=$(command -v openssl)
    }
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Fri Mar 01 06:07:33 UTC 2024
    - 25.9K bytes
    - Viewed (0)
  3. docs_src/security/tutorial004_an_py39.py

    from jwt.exceptions import InvalidTokenError
    from passlib.context import CryptContext
    from pydantic import BaseModel
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  4. docs_src/security/tutorial004_an.py

    from jwt.exceptions import InvalidTokenError
    from passlib.context import CryptContext
    from pydantic import BaseModel
    from typing_extensions import Annotated
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4.2K bytes
    - Viewed (0)
  5. docs_src/security/tutorial004_py310.py

    from fastapi.security import OAuth2PasswordBearer, OAuth2PasswordRequestForm
    from jwt.exceptions import InvalidTokenError
    from passlib.context import CryptContext
    from pydantic import BaseModel
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 4K bytes
    - Viewed (0)
  6. src/crypto/sha512/sha512block_ppc64x.s

    // # ====================================================================
    // # Written by Andy Polyakov <appro@openssl.org> for the OpenSSL
    // # project. The module is, however, dual licensed under OpenSSL and
    // # CRYPTOGAMS licenses depending on where you obtain it. For further
    // # details see http://www.openssl.org/~appro/cryptogams/.
    // # ====================================================================
    
    Registered: Wed Jun 12 16:32:35 UTC 2024
    - Last Modified: Mon Mar 04 17:29:44 UTC 2024
    - 15.8K bytes
    - Viewed (0)
  7. docs_src/security/tutorial005_an_py310.py

        SecurityScopes,
    )
    from jwt.exceptions import InvalidTokenError
    from passlib.context import CryptContext
    from pydantic import BaseModel, ValidationError
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  8. docs_src/security/tutorial005_an_py39.py

        SecurityScopes,
    )
    from jwt.exceptions import InvalidTokenError
    from passlib.context import CryptContext
    from pydantic import BaseModel, ValidationError
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.3K bytes
    - Viewed (0)
  9. docs_src/security/tutorial005_py39.py

        SecurityScopes,
    )
    from jwt.exceptions import InvalidTokenError
    from passlib.context import CryptContext
    from pydantic import BaseModel, ValidationError
    
    # to get a string like this run:
    # openssl rand -hex 32
    SECRET_KEY = "09d25e094faa6ca2556c818166b7a9563b93f7099f6f0f4caa6cf63b88e8d3e7"
    ALGORITHM = "HS256"
    ACCESS_TOKEN_EXPIRE_MINUTES = 30
    
    
    fake_users_db = {
        "johndoe": {
            "username": "johndoe",
    Registered: Mon Jun 17 08:32:26 UTC 2024
    - Last Modified: Mon May 20 17:37:28 UTC 2024
    - 5.2K bytes
    - Viewed (0)
  10. okhttp/src/test/java/okhttp3/SessionReuseTest.kt

        //
        // Report https://bugs.java.com/bugdatabase/view_bug.do?bug_id=JDK-8264944
        // Sessions improvement https://bugs.java.com/bugdatabase/view_bug.do?bug_id=JDK-8245576
        if (!platform.isJdk9() && !platform.isOpenJsse() && !platform.isJdk8Alpn()) {
          reuseSession = true
        }
    
        client.newCall(request).execute().use { response ->
          assertEquals(200, response.code)
        }
    
        assertEquals(2, sessionIds.size)
    Registered: Sun Jun 16 04:42:17 UTC 2024
    - Last Modified: Sat Jan 20 10:30:28 UTC 2024
    - 6K bytes
    - Viewed (0)
Back to top