/dports/security/py-josepy/josepy-1.10.0/tests/ |
H A D | jwa_test.py | 61 from josepy.jwa import HS256 66 self.assertEqual(HS256.sign(b'some key', b'foo'), sig) 67 self.assertIs(HS256.verify(b'some key', b'foo', sig), True) 68 self.assertIs(HS256.verify(b'some key', b'foo', sig + b'!'), False)
|
/dports/www/elixir-joken/joken-2.4.1/guides/ |
H A D | introduction.md | 46 signer = Joken.Signer.create("HS256", "secret") 75 signer = Joken.Signer.create("HS256", "secret") 85 The default is to use HS256 with the configured binary as the key. It will generate:
|
/dports/www/elixir-joken/joken-2.4.1/test/ |
H A D | use_config_test.exs | 47 signer = Joken.Signer.create("HS256", "s3cret") 129 signer = Joken.Signer.create("HS256", "s3cret") 175 signer = Joken.Signer.create("HS256", "s3cret")
|
/dports/net/jose/jose-11/doc/man/ |
H A D | jose-jwk-gen.1.adoc | 57 $ jose jwk gen -i '{"alg":"HS256"}' -o oct.jwk 70 -i '{"keys":[{"alg":"HS256"},{"alg":"ES256"}]}' \ 76 -i '{"alg":"HS256"}' \
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/jsonwebtoken-7.2.0/src/crypto/ |
H A D | mod.rs | 26 Algorithm::HS256 => sign_hmac(hmac::HMAC_SHA256, key.inner(), message), in sign() 72 Algorithm::HS256 | Algorithm::HS384 | Algorithm::HS512 => { in verify()
|
/dports/www/py-pyjwt/PyJWT-2.3.0/ |
H A D | README.rst | 43 >>> encoded = jwt.encode({"some": "payload"}, "secret", algorithm="HS256") 46 >>> jwt.decode(encoded, "secret", algorithms=["HS256"])
|
/dports/www/elixir-joken/joken-2.4.1/benchmarks/ |
H A D | hs_benchmark.exs | 60 "HS256 generate and sign" => fn -> HS256Auth.generate_and_sign() end, 69 "HS256 verify and validate" => fn -> HS256AuthVerify.verify_and_validate(hs256_token) end,
|
/dports/www/jwt-cli/jwt-cli-5.0.0/cargo-crates/jsonwebtoken-7.2.0/src/crypto/ |
H A D | mod.rs | 26 Algorithm::HS256 => sign_hmac(hmac::HMAC_SHA256, key.inner(), message), in sign() 72 Algorithm::HS256 | Algorithm::HS384 | Algorithm::HS512 => { in verify()
|
/dports/devel/sccache/sccache-0.2.15/cargo-crates/jsonwebtoken-7.2.0/src/crypto/ |
H A D | mod.rs | 26 Algorithm::HS256 => sign_hmac(hmac::HMAC_SHA256, key.inner(), message), in sign() 72 Algorithm::HS256 | Algorithm::HS384 | Algorithm::HS512 => { in verify()
|
/dports/security/p5-Crypt-JWT/Crypt-JWT-0.034/t/ |
H A D | kw_ecdh.t | 13 enc => "A128CBC-HS256", 23 is(unpack("H*", $unw), $expected_hex, "ECDH-ES + A128CBC-HS256")
|
/dports/sysutils/ldap-account-manager/ldap-account-manager-7.3/lib/3rdParty/composer/web-auth/cose-lib/src/ |
H A D | Algorithms.php | 141 Mac\HS256::identifier() => new Mac\HS256(),
|
/dports/www/py-pyjwt/PyJWT-2.3.0/docs/ |
H A D | algorithms.rst | 7 * HS256 - HMAC using SHA-256 hash algorithm (default) 55 >>> jwt.decode(encoded, "secret", algorithms=["HS512", "HS256"]) 59 HS512 or HS256, the claim will be rejected with an ``InvalidAlgorithmError``.
|
/dports/devel/elixir-plug/plug-1.4.5/lib/plug/crypto/ |
H A D | message_verifier.ex | 63 defp hmac_sha2_to_protected(:sha256), do: "HS256" 67 defp hmac_sha2_to_digest_type("HS256"), do: :sha256 80 {protected, payload, plain_text, signature} when protected in ["HS256", "HS384", "HS512"] ->
|
/dports/security/acmetool/acmetool-0.2.1/vendor/gopkg.in/square/go-jose.v1/ |
H A D | signing_test.go | 95 …sigAlgs := []SignatureAlgorithm{RS256, RS384, RS512, PS256, PS384, PS512, HS256, HS384, HS512, ES2… 118 …sigAlgs := []SignatureAlgorithm{RS256, RS384, RS512, PS256, PS384, PS512, HS256, HS384, HS512, ES2… 274 case HS256, HS384, HS512: 429 enc, err := NewSigner(HS256, &JsonWebKey{
|
/dports/www/py-pyjwt1/PyJWT-1.7.1/ |
H A D | README.rst | 46 >>> encoded = jwt.encode({'some': 'payload'}, 'secret', algorithm='HS256') 49 >>> jwt.decode(encoded, 'secret', algorithms=['HS256'])
|
/dports/security/elixir-jose/erlang-jose-1.11.1/test/jose_SUITE_data/jws/ |
H A D | a.1.1.jws+json | 2 "alg":"HS256"}
|
/dports/security/erlang-jose/erlang-jose-1.11.1/test/jose_SUITE_data/jws/ |
H A D | a.1.1.jws+json | 2 "alg":"HS256"}
|
/dports/net-im/py-matrix-synapse/synapse-1.50.2/docs/ |
H A D | jwt.md | 66 secret and an algorithm of HS256: 72 algorithm: "HS256" 77 $ pyjwt --key=my-secret-token --alg=HS256 encode sub=test-user
|
/dports/security/erlang-jose/erlang-jose-1.11.1/ |
H A D | CHANGELOG.md | 211 ["HS256", "HS384", "HS512"] 218 iex> JOSE.JWS.generate_key(%{"alg" => "HS256"}) |> JOSE.JWK.to_map |> elem(1) 219 %{"alg" => "HS256", "k" => "UuP3Tw2xbGV5N3BGh34cJNzzC2R1zU7i4rOnF9A8nqY", "kty" => "oct", "use" => … 226 iex> jws = JOSE.JWS.from(%{"alg" => "HS256"}) 228 %{"alg" => "HS256", "typ" => "JWT"} 375 * Fix bit sizes for A128CBC-HS256, A192CBC-HS384, and A256CBC-HS512 algorithms. 419 * `PBES2-HS256+A128KW` 423 * `A128CBC-HS256` 438 * `HS256`
|
/dports/security/elixir-jose/erlang-jose-1.11.1/ |
H A D | CHANGELOG.md | 211 ["HS256", "HS384", "HS512"] 218 iex> JOSE.JWS.generate_key(%{"alg" => "HS256"}) |> JOSE.JWK.to_map |> elem(1) 219 %{"alg" => "HS256", "k" => "UuP3Tw2xbGV5N3BGh34cJNzzC2R1zU7i4rOnF9A8nqY", "kty" => "oct", "use" => … 226 iex> jws = JOSE.JWS.from(%{"alg" => "HS256"}) 228 %{"alg" => "HS256", "typ" => "JWT"} 375 * Fix bit sizes for A128CBC-HS256, A192CBC-HS384, and A256CBC-HS512 algorithms. 419 * `PBES2-HS256+A128KW` 423 * `A128CBC-HS256` 438 * `HS256`
|
/dports/net/rabbitmq/rabbitmq-server-3.9.11/deps/jose/ |
H A D | CHANGELOG.md | 211 ["HS256", "HS384", "HS512"] 218 iex> JOSE.JWS.generate_key(%{"alg" => "HS256"}) |> JOSE.JWK.to_map |> elem(1) 219 %{"alg" => "HS256", "k" => "UuP3Tw2xbGV5N3BGh34cJNzzC2R1zU7i4rOnF9A8nqY", "kty" => "oct", "use" => … 226 iex> jws = JOSE.JWS.from(%{"alg" => "HS256"}) 228 %{"alg" => "HS256", "typ" => "JWT"} 375 * Fix bit sizes for A128CBC-HS256, A192CBC-HS384, and A256CBC-HS512 algorithms. 419 * `PBES2-HS256+A128KW` 423 * `A128CBC-HS256` 438 * `HS256`
|
/dports/net/jose/jose-11/tests/vectors/ |
H A D | rfc7520_4.7.jwsf | 1 …IGtub3dpbmcgd2hlcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","header":{"alg":"HS256","kid":"018c0ae5-4…
|
H A D | rfc7520_4.7.jwsg | 1 …lcmUgeW91IG1pZ2h0IGJlIHN3ZXB0IG9mZiB0by4","signatures":[{"header":{"alg":"HS256","kid":"018c0ae5-4…
|
H A D | rfc7520_4.5.jwk | 1 {"kty":"oct","kid":"018c0ae5-4d9b-471b-bfd6-eef314bc7037","use":"sig","alg":"HS256","k":"hJtXIZ2uSN…
|
/dports/security/nextcloud-twofactor_webauthn/twofactor_webauthn/vendor/web-auth/cose-lib/src/Algorithm/Mac/ |
H A D | HS256.php | 16 final class HS256 extends Hmac class
|