/dports/www/trafficserver/trafficserver-9.1.1/plugins/experimental/uri_signing/unit_tests/ |
H A D | testConfig.config | 13 "alg": "HS256", 19 "alg": "HS256", 25 "alg": "HS256", 31 "alg": "HS256", 37 "alg": "HS256", 43 "alg": "HS256", 49 "alg": "HS256", 55 "alg": "HS256", 61 "alg": "HS256", 67 "alg": "HS256", [all …]
|
H A D | uri_signing_test.cc | 50 "alg": "HS256", 56 "alg": "HS256", 62 "alg": "HS256", 68 "alg": "HS256", 74 "alg": "HS256", 80 "alg": "HS256", 86 "alg": "HS256", 92 "alg": "HS256", 98 "alg": "HS256", 104 "alg": "HS256", [all …]
|
/dports/security/erlang-jose/erlang-jose-1.11.1/test/jose_SUITE_data/jwk/ |
H A D | c.config | 3 …2.jwe+json", <<"{\"alg\":\"PBES2-HS256+A128KW\",\"p2s\":\"2WCTcJZ1Rvd_CJuJripQ1w\",\"p2c\":4096,\"… 10 {"c.7.aad", <<"{\"alg\":\"PBES2-HS256+A128KW\",\"p2s\":\"2WCTcJZ1Rvd_CJuJripQ1w\",\"p2c\":4096,\"en…
|
H A D | c.2.jwe+json | 1 {"alg":"PBES2-HS256+A128KW","p2s":"2WCTcJZ1Rvd_CJuJripQ1w","p2c":4096,"enc":"A128CBC-HS256","cty":"…
|
/dports/security/elixir-jose/erlang-jose-1.11.1/test/jose_SUITE_data/jwk/ |
H A D | c.config | 3 …2.jwe+json", <<"{\"alg\":\"PBES2-HS256+A128KW\",\"p2s\":\"2WCTcJZ1Rvd_CJuJripQ1w\",\"p2c\":4096,\"… 10 {"c.7.aad", <<"{\"alg\":\"PBES2-HS256+A128KW\",\"p2s\":\"2WCTcJZ1Rvd_CJuJripQ1w\",\"p2c\":4096,\"en…
|
H A D | c.2.jwe+json | 1 {"alg":"PBES2-HS256+A128KW","p2s":"2WCTcJZ1Rvd_CJuJripQ1w","p2c":4096,"enc":"A128CBC-HS256","cty":"…
|
/dports/www/elixir-joken/joken-2.4.1/guides/ |
H A D | custom_header_arguments.md | 14 signer = Signer.create("HS256", "secret", %{"kid" => key_id}) 16 assert %{"kid" => ^key_id, "alg" => "HS256"} = Joken.peek_header(token) 25 signer_alg: "HS256", 33 assert %{"kid" => "my_key_id", "alg" => "HS256"} = Joken.peek_header(token)
|
/dports/security/py-python-jose/python-jose-3.0.0/jose/ |
H A D | constants.py | 6 HS256 = 'HS256' variable in Algorithms 16 HMAC = {HS256, HS384, HS512} 25 HS256: hashlib.sha256,
|
/dports/devel/sccache/sccache-0.2.15/cargo-crates/jsonwebtoken-7.2.0/src/ |
H A D | algorithms.rs | 16 HS256, enumerator 44 Algorithm::HS256 in default() 52 "HS256" => Ok(Algorithm::HS256), in from_str() 71 Algorithm::HS256 | Algorithm::HS384 | Algorithm::HS512 => AlgorithmFamily::Hmac, in family()
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/jsonwebtoken-7.2.0/src/ |
H A D | algorithms.rs | 16 HS256, enumerator 44 Algorithm::HS256 in default() 52 "HS256" => Ok(Algorithm::HS256), in from_str() 71 Algorithm::HS256 | Algorithm::HS384 | Algorithm::HS512 => AlgorithmFamily::Hmac, in family()
|
/dports/www/jwt-cli/jwt-cli-5.0.0/cargo-crates/jsonwebtoken-7.2.0/src/ |
H A D | algorithms.rs | 16 HS256, enumerator 44 Algorithm::HS256 in default() 52 "HS256" => Ok(Algorithm::HS256), in from_str() 71 Algorithm::HS256 | Algorithm::HS384 | Algorithm::HS512 => AlgorithmFamily::Hmac, in family()
|
/dports/www/p5-JSON-WebToken/JSON-WebToken-0.10/t/ |
H A D | 01_basic.t | 15 desc => 'with algorithm: HS256', 19 algorithm => 'HS256', 48 alg => 'HS256',
|
/dports/security/erlang-jose/erlang-jose-1.11.1/lib/jose/ |
H A D | jws.ex | 33 * `"HS256"` 122 ### HS256, HS384, and HS512 129 # HS256 251 iex> JOSE.JWS.from(%{ "alg" => "HS256" }) 253 iex> JOSE.JWS.from("{\"alg\":\"HS256\"}") 355 iex> JOSE.JWS.generate_key(%{"alg" => "HS256"}) 356 %JOSE.JWK{fields: %{"alg" => "HS256", "use" => "sig"}, 391 "{\"alg\":\"HS256\",\"typ\":\"JWT\"}" 411 iex> JOSE.JWS.sign(jwk, "{}", %{ "alg" => "HS256" }) 421 iex> JOSE.JWS.sign(jwk, "test", %{ "alg" => "HS256" }) [all …]
|
/dports/security/elixir-jose/erlang-jose-1.11.1/lib/jose/ |
H A D | jws.ex | 33 * `"HS256"` 122 ### HS256, HS384, and HS512 129 # HS256 251 iex> JOSE.JWS.from(%{ "alg" => "HS256" }) 253 iex> JOSE.JWS.from("{\"alg\":\"HS256\"}") 355 iex> JOSE.JWS.generate_key(%{"alg" => "HS256"}) 356 %JOSE.JWK{fields: %{"alg" => "HS256", "use" => "sig"}, 391 "{\"alg\":\"HS256\",\"typ\":\"JWT\"}" 411 iex> JOSE.JWS.sign(jwk, "{}", %{ "alg" => "HS256" }) 421 iex> JOSE.JWS.sign(jwk, "test", %{ "alg" => "HS256" }) [all …]
|
/dports/net/rabbitmq/rabbitmq-server-3.9.11/deps/jose/lib/jose/ |
H A D | jws.ex | 33 * `"HS256"` 122 ### HS256, HS384, and HS512 129 # HS256 251 iex> JOSE.JWS.from(%{ "alg" => "HS256" }) 253 iex> JOSE.JWS.from("{\"alg\":\"HS256\"}") 355 iex> JOSE.JWS.generate_key(%{"alg" => "HS256"}) 356 %JOSE.JWK{fields: %{"alg" => "HS256", "use" => "sig"}, 391 "{\"alg\":\"HS256\",\"typ\":\"JWT\"}" 411 iex> JOSE.JWS.sign(jwk, "{}", %{ "alg" => "HS256" }) 421 iex> JOSE.JWS.sign(jwk, "test", %{ "alg" => "HS256" }) [all …]
|
/dports/www/elixir-joken/joken-2.4.1/lib/joken/ |
H A D | signer.ex | 11 @hs_algorithms ["HS256", "HS384", "HS512"] 56 iex> Joken.Signer.create("HS256", "s3cret") 58 alg: "HS256", 65 alg: {:jose_jws_alg_hmac, :HS256}, 117 iex> Joken.Signer.sign(%{"name" => "John Doe"}, Joken.Signer.create("HS256", "secret")) 139 …m9obiBEb2UifQ.xuEv8qrfXu424LZk8bVgr9MQJUIrp1rHcPyZw_KSsds", Joken.Signer.create("HS256", "secret")) 187 signer_alg: "HS256", 206 create("HS256", key_config) 217 signer_alg = config[:signer_alg] || "HS256"
|
/dports/security/erlang-jose/erlang-jose-1.11.1/ |
H A D | README.md | 148 "PBES2-HS256+A128GCMKW", "PBES2-HS256+A128KW", "PBES2-HS384+A192GCMKW", 176 "ECDH-ES+XC20PKW", "PBES2-HS256+A128GCMKW", "PBES2-HS256+A128KW", 201 # Signed Compact JSON Web Token (JWT) with HS256 232 # {_, %{"alg" => "HS256", "typ" => "JWT"}} 273 "alg" => "HS256" 315 <<"alg">> => <<"HS256">> 343 % alg = {jose_jws_alg_hmac,'HS256'}, 486 - [X] `PBES2-HS256+A128GCMKW` <sup>non-standard</sup> 489 - [X] `PBES2-HS256+A128KW` 501 - [X] `A128CBC-HS256` [all …]
|
/dports/security/elixir-jose/erlang-jose-1.11.1/ |
H A D | README.md | 148 "PBES2-HS256+A128GCMKW", "PBES2-HS256+A128KW", "PBES2-HS384+A192GCMKW", 176 "ECDH-ES+XC20PKW", "PBES2-HS256+A128GCMKW", "PBES2-HS256+A128KW", 201 # Signed Compact JSON Web Token (JWT) with HS256 232 # {_, %{"alg" => "HS256", "typ" => "JWT"}} 273 "alg" => "HS256" 315 <<"alg">> => <<"HS256">> 343 % alg = {jose_jws_alg_hmac,'HS256'}, 486 - [X] `PBES2-HS256+A128GCMKW` <sup>non-standard</sup> 489 - [X] `PBES2-HS256+A128KW` 501 - [X] `A128CBC-HS256` [all …]
|
/dports/net/rabbitmq/rabbitmq-server-3.9.11/deps/jose/ |
H A D | README.md | 148 "PBES2-HS256+A128GCMKW", "PBES2-HS256+A128KW", "PBES2-HS384+A192GCMKW", 176 "ECDH-ES+XC20PKW", "PBES2-HS256+A128GCMKW", "PBES2-HS256+A128KW", 201 # Signed Compact JSON Web Token (JWT) with HS256 232 # {_, %{"alg" => "HS256", "typ" => "JWT"}} 273 "alg" => "HS256" 315 <<"alg">> => <<"HS256">> 343 % alg = {jose_jws_alg_hmac,'HS256'}, 486 - [X] `PBES2-HS256+A128GCMKW` <sup>non-standard</sup> 489 - [X] `PBES2-HS256+A128KW` 501 - [X] `A128CBC-HS256` [all …]
|
/dports/www/jwt-cli/jwt-cli-5.0.0/tests/ |
H A D | jwt-cli.rs | 79 SupportedAlgorithms::HS256 in supported_algorithm_from_string() 115 SupportedAlgorithms::HS256 in supported_algorithm_from_string() 150 translate_algorithm(SupportedAlgorithms::HS256), in translates_algorithm() 151 Algorithm::HS256 in translates_algorithm() 189 let algorithm = Algorithm::HS256; in creates_jwt_header_with_kid() 201 let algorithm = Algorithm::HS256; in creates_jwt_header_without_kid() 260 assert_eq!(header.alg, Algorithm::HS256); in encodes_a_token() 662 let key = encoding_key_from_secret(&Algorithm::HS256, "@./tests/hmac-key.bin").unwrap(); in encoding_key_from_secret_handles_at() 671 let key = encoding_key_from_secret(&Algorithm::HS256, &arg).unwrap(); in encoding_key_from_secret_handles_base64() 678 let key = decoding_key_from_secret(&Algorithm::HS256, "@./tests/hmac-key.bin").unwrap(); in decoding_key_from_secret_handles_at() [all …]
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/centrifugal/centrifuge/_examples/jwt_token/jwt/ |
H A D | token_verifier_jwt.go | 99 HS256 jwt.Verifier member 112 verifierHS256, err := jwt.NewVerifierHS(jwt.HS256, []byte(tokenHMACSecretKey)) 124 alg.HS256 = verifierHS256 154 case jwt.HS256: 155 verifier = s.HS256
|
/dports/www/elixir-joken/joken-2.4.1/test/ |
H A D | joken_signer_test.exs | 97 valid_signer = Signer.create("HS256", "secret") 98 invalid_signer = Signer.create("HS256", "otherSecret") 110 signer = Signer.create("HS256", "secret", %{"kid" => key_id}) 113 assert {:ok, %{"kid" => ^key_id, "alg" => "HS256"}} = Joken.peek_header(token) 118 assert {:ok, %{"kid" => "my_key_id", "alg" => "HS256"}} = Joken.peek_header(token)
|
/dports/www/py-pyjwt/PyJWT-2.3.0/docs/ |
H A D | usage.rst | 4 Encoding & Decoding Tokens with HS256 11 >>> encoded = jwt.encode({"some": "payload"}, key, algorithm="HS256") 14 >>> jwt.decode(encoded, key, algorithms="HS256") 57 ... algorithm="HS256", 130 jwt.decode("JWT_STRING", "secret", algorithms=["HS256"]) 158 jwt.decode(jwt_payload, "secret", leeway=10, algorithms=["HS256"]) 166 jwt_payload, "secret", leeway=datetime.timedelta(seconds=10), algorithms=["HS256"] 200 decoded = jwt.decode(token, "secret", issuer="urn:foo", algorithms=["HS256"]) 222 decoded = jwt.decode(token, "secret", audience="urn:foo", algorithms=["HS256"]) 232 decoded = jwt.decode(token, "secret", audience="urn:foo", algorithms=["HS256"]) [all …]
|
/dports/databases/couchdb3/apache-couchdb-3.2.1/test/elixir/test/ |
H A D | jwtauth_test.exs | 19 :value => "HS256, HS384, HS512" 23 run_on_modified_server(server_config, fn -> test_fun("HS256", secret) end) 158 :value => "HS256, HS384, HS512" 162 run_on_modified_server(server_config, fn -> good_iss("HS256", secret) end) 163 run_on_modified_server(server_config, fn -> bad_iss("HS256", secret) end)
|
/dports/security/vaultwarden/vaultwarden-1.23.1/cargo-crates/jsonwebtoken-7.2.0/ |
H A D | README.md | 22 - HS256 67 The default algorithm is HS256, which uses a shared secret. 87 // HS256 98 When using HS256, HS2384 or HS512, the key is always a shared secret like in the example above. Whe… 116 As with encoding, when using HS256, HS2384 or HS512, the key is always a shared secret like in the … 163 …t least, you will need to set the algorithm(s) allowed for this token if you are not using `HS256`. 174 pub algorithms: Vec<Algorithm>, // Default: vec![Algorithm::HS256] 181 // Default validation: the only algo allowed is HS256
|