/dports/security/botan110/Botan-1.10.17/src/pk_pad/eme1/ |
H A D | eme1.h | 31 ~EME1() { delete mgf; } in ~EME1() local 38 MGF* mgf; variable
|
/dports/security/botan110/Botan-1.10.17/src/pk_pad/emsa4/ |
H A D | emsa4.h | 34 ~EMSA4() { delete hash; delete mgf; } in ~EMSA4() local 46 const MGF* mgf; variable
|
/dports/net/scapy/scapy-2.4.5/scapy/layers/tls/crypto/ |
H A D | pkcs1.py | 120 def _get_padding(padStr, mgf=padding.MGF1, h=hashes.SHA256, label=None): argument 144 def encrypt(self, m, t="pkcs", h="sha256", mgf=None, L=None): argument 151 def verify(self, M, S, t="pkcs", h="sha256", mgf=None, L=None): argument 191 def decrypt(self, C, t="pkcs", h="sha256", mgf=None, L=None): argument 198 def sign(self, M, t="pkcs", h="sha256", mgf=None, L=None): argument
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/boringssl/src/third_party/wycheproof_testvectors/ |
H A D | rsa_pss_misc_test.json | 20 "mgf" : "MGF1", string 45 "mgf" : "MGF1", string 70 "mgf" : "MGF1", string 95 "mgf" : "MGF1", string 120 "mgf" : "MGF1", string 145 "mgf" : "MGF1", string 170 "mgf" : "MGF1", string 195 "mgf" : "MGF1", string 220 "mgf" : "MGF1", string 245 "mgf" : "MGF1", string [all …]
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/boringssl/src/third_party/wycheproof_testvectors/ |
H A D | rsa_pss_misc_test.json | 20 "mgf" : "MGF1", string 45 "mgf" : "MGF1", string 70 "mgf" : "MGF1", string 95 "mgf" : "MGF1", string 120 "mgf" : "MGF1", string 145 "mgf" : "MGF1", string 170 "mgf" : "MGF1", string 195 "mgf" : "MGF1", string 220 "mgf" : "MGF1", string 245 "mgf" : "MGF1", string [all …]
|
/dports/net/quiche/quiche-0.9.0/deps/boringssl/src/third_party/wycheproof_testvectors/ |
H A D | rsa_pss_misc_test.json | 20 "mgf" : "MGF1", string 45 "mgf" : "MGF1", string 70 "mgf" : "MGF1", string 95 "mgf" : "MGF1", string 120 "mgf" : "MGF1", string 145 "mgf" : "MGF1", string 170 "mgf" : "MGF1", string 195 "mgf" : "MGF1", string 220 "mgf" : "MGF1", string 245 "mgf" : "MGF1", string [all …]
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/common/wycheproof/source_vectors/ |
H A D | rsa_pss_misc_test.json | 20 "mgf" : "MGF1", string 45 "mgf" : "MGF1", string 70 "mgf" : "MGF1", string 95 "mgf" : "MGF1", string 120 "mgf" : "MGF1", string 145 "mgf" : "MGF1", string 170 "mgf" : "MGF1", string 195 "mgf" : "MGF1", string 220 "mgf" : "MGF1", string 245 "mgf" : "MGF1", string [all …]
|
/dports/security/boringssl/boringssl-6a71840/third_party/wycheproof_testvectors/ |
H A D | rsa_pss_misc_test.json | 20 "mgf" : "MGF1", string 45 "mgf" : "MGF1", string 70 "mgf" : "MGF1", string 95 "mgf" : "MGF1", string 120 "mgf" : "MGF1", string 145 "mgf" : "MGF1", string 170 "mgf" : "MGF1", string 195 "mgf" : "MGF1", string 220 "mgf" : "MGF1", string 245 "mgf" : "MGF1", string [all …]
|
/dports/security/nss/nss-3.76.1/nss/gtests/common/wycheproof/source_vectors/ |
H A D | rsa_pss_misc_test.json | 20 "mgf" : "MGF1", string 45 "mgf" : "MGF1", string 70 "mgf" : "MGF1", string 95 "mgf" : "MGF1", string 120 "mgf" : "MGF1", string 145 "mgf" : "MGF1", string 170 "mgf" : "MGF1", string 195 "mgf" : "MGF1", string 220 "mgf" : "MGF1", string 245 "mgf" : "MGF1", string [all …]
|
/dports/security/py-pycryptodomex/pycryptodome-3.10.1/lib/Crypto/Signature/ |
H A D | pss.py | 98 mgf = lambda x, y: MGF1(x, y, msg_hash) function 192 def _EMSA_PSS_ENCODE(mhash, emBits, randFunc, mgf, sLen): argument 256 def _EMSA_PSS_VERIFY(mhash, em, emBits, mgf, sLen): argument
|
/dports/security/py-pycryptodome/pycryptodome-3.10.1/lib/Crypto/Signature/ |
H A D | pss.py | 98 mgf = lambda x, y: MGF1(x, y, msg_hash) function 192 def _EMSA_PSS_ENCODE(mhash, emBits, randFunc, mgf, sLen): argument 256 def _EMSA_PSS_VERIFY(mhash, em, emBits, mgf, sLen): argument
|
/dports/security/py-cryptography/cryptography-3.3.2/src/cryptography/hazmat/primitives/asymmetric/ |
H A D | padding.py | 35 def __init__(self, mgf, salt_length): argument 54 def __init__(self, mgf, algorithm, label): argument
|
/dports/security/py-cryptography/stage/usr/local/lib/python3.8/site-packages/cryptography/hazmat/primitives/asymmetric/ |
H A D | padding.py | 35 def __init__(self, mgf, salt_length): argument 54 def __init__(self, mgf, algorithm, label): argument
|
/dports/security/py-cryptography/cryptography-3.3.2/build/lib.dragonfly-6.3-DEVELOPMENT-x86_64-3.8/cryptography/hazmat/primitives/asymmetric/ |
H A D | padding.py | 35 def __init__(self, mgf, salt_length): argument 54 def __init__(self, mgf, algorithm, label): argument
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/pk11_gtest/ |
H A D | pk11_rsapss_unittest.cc | 46 Pkcs11RsaPssTestBase(SECOidTag hashOid, CK_RSA_PKCS_MGF_TYPE mgf, int sLen) in Pkcs11RsaPssTestBase() 132 Pkcs11RsaPssTestWrap(SECOidTag hash, CK_RSA_PKCS_MGF_TYPE mgf, int s_len) in Pkcs11RsaPssTestWrap() 174 CK_RSA_PKCS_MGF_TYPE mgf, int s_len, in RunTests() 196 CK_RSA_PKCS_MGF_TYPE mgf = CKM_INVALID_MECHANISM; in RunGroup() local 262 CK_RSA_PKCS_MGF_TYPE mgf = CKG_MGF1_SHA256; in TEST_F() local
|
/dports/security/nss/nss-3.76.1/nss/gtests/pk11_gtest/ |
H A D | pk11_rsapss_unittest.cc | 46 Pkcs11RsaPssTestBase(SECOidTag hashOid, CK_RSA_PKCS_MGF_TYPE mgf, int sLen) in Pkcs11RsaPssTestBase() 132 Pkcs11RsaPssTestWrap(SECOidTag hash, CK_RSA_PKCS_MGF_TYPE mgf, int s_len) in Pkcs11RsaPssTestWrap() 174 CK_RSA_PKCS_MGF_TYPE mgf, int s_len, in RunTests() 196 CK_RSA_PKCS_MGF_TYPE mgf = CKM_INVALID_MECHANISM; in RunGroup() local 262 CK_RSA_PKCS_MGF_TYPE mgf = CKG_MGF1_SHA256; in TEST_F() local
|
/dports/databases/pgloader3/ironclad-v0.54/src/public-key/ |
H A D | pkcs1.lisp | 8 (defun mgf (digest-name seed num-bytes) function
|
/dports/security/py-pycrypto/pycrypto-2.6.1/lib/Crypto/Signature/ |
H A D | PKCS1_PSS.py | 210 def EMSA_PSS_ENCODE(mhash, emBits, randFunc, mgf, sLen): argument 269 def EMSA_PSS_VERIFY(mhash, em, emBits, mgf, sLen): argument
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/catapult/third_party/google-endpoints/Crypto/Signature/ |
H A D | PKCS1_PSS.py | 210 def EMSA_PSS_ENCODE(mhash, emBits, randFunc, mgf, sLen): argument 269 def EMSA_PSS_VERIFY(mhash, em, emBits, mgf, sLen): argument
|
/dports/security/iaikpkcs11wrapper/src/java/src/iaik/pkcs/pkcs11/wrapper/ |
H A D | CK_RSA_PKCS_PSS_PARAMS.java | 33 public long mgf; field in CK_RSA_PKCS_PSS_PARAMS
|
H A D | CK_RSA_PKCS_OAEP_PARAMS.java | 36 public long mgf; field in CK_RSA_PKCS_OAEP_PARAMS
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/ |
H A D | CK_RSA_PKCS_PSS_PARAMS.java | 82 public long mgf; field in CK_RSA_PKCS_PSS_PARAMS
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/ |
H A D | CK_RSA_PKCS_OAEP_PARAMS.java | 85 public long mgf; field in CK_RSA_PKCS_OAEP_PARAMS
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/src/jdk.crypto.cryptoki/share/classes/sun/security/pkcs11/wrapper/ |
H A D | CK_RSA_PKCS_OAEP_PARAMS.java | 85 public long mgf; field in CK_RSA_PKCS_OAEP_PARAMS
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/pkcs11/wrapper/ |
H A D | CK_RSA_PKCS_OAEP_PARAMS.java | 85 public long mgf; field in CK_RSA_PKCS_OAEP_PARAMS
|