/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/services/network/public/cpp/ |
H A D | digitally_signed_mojom_traits.cc | 16 std::vector<uint8_t> signature_data; in Read() local 19 !data.ReadSignature(&signature_data)) { in Read() 22 if (signature_data.empty()) in Read() 24 out->signature_data.assign( in Read() 25 reinterpret_cast<const char*>(signature_data.data()), in Read() 26 signature_data.size()); in Read()
|
H A D | digitally_signed_mojom_traits_unittest.cc | 31 original.signature_data.assign(5, static_cast<char>(hash_alg)); in TEST() 39 EXPECT_EQ(original.signature_data, copied.signature_data); in TEST() 48 original.signature_data.clear(); in TEST() 60 original.signature_data.assign(32, '\x01'); in TEST()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/services/network/public/cpp/ |
H A D | digitally_signed_mojom_traits.cc | 16 std::vector<uint8_t> signature_data; in Read() local 19 !data.ReadSignature(&signature_data)) { in Read() 22 if (signature_data.empty()) in Read() 24 out->signature_data.assign( in Read() 25 reinterpret_cast<const char*>(signature_data.data()), in Read() 26 signature_data.size()); in Read()
|
H A D | digitally_signed_mojom_traits_unittest.cc | 31 original.signature_data.assign(5, static_cast<char>(hash_alg)); in TEST() 39 EXPECT_EQ(original.signature_data, copied.signature_data); in TEST() 48 original.signature_data.clear(); in TEST() 60 original.signature_data.assign(32, '\x01'); in TEST()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/net/cert/ |
H A D | signed_certificate_timestamp.cc | 18 if (lhs->signature.signature_data != rhs->signature.signature_data) in operator ()() 19 return lhs->signature.signature_data < rhs->signature.signature_data; in operator ()() 43 pickle->WriteString(signature.signature_data); in Persist() 65 iter->ReadString(&sct->signature.signature_data) && in CreateFromPickle()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/net/cert/ |
H A D | signed_certificate_timestamp.cc | 18 if (lhs->signature.signature_data != rhs->signature.signature_data) in operator ()() 19 return lhs->signature.signature_data < rhs->signature.signature_data; in operator ()() 43 pickle->WriteString(signature.signature_data); in Persist() 65 iter->ReadString(&sct->signature.signature_data) && in CreateFromPickle()
|
/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/plugins/module_utils/openssh/ |
H A D | utils.py | 196 def signature_data(cls, signature_string): member in OpensshParser 197 signature_data = {} 207 signature_data['s'] = cls._big_int(signature_blob, "big") 210 signature_data['r'] = cls._big_int(signature_blob[:20], "big") 211 signature_data['s'] = cls._big_int(signature_blob[20:], "big") 214 signature_data['r'] = blob_parser.mpint() 215 signature_data['s'] = blob_parser.mpint() 218 signature_data['R'] = cls._big_int(signature_blob[:32], "little") 219 signature_data['S'] = cls._big_int(signature_blob[32:], "little") 223 signature_data['signature_type'] = signature_type [all …]
|
/dports/security/s2n/s2n-tls-1.1.2/tests/unit/ |
H A D | s2n_rsa_pss_test.c | 176 …s2n_stack_blob(signature_data, RSA_PSS_SIGN_VERIFY_SIGNATURE_SIZE, RSA_PSS_SIGN_VERIFY_SIGNATURE_S… in main() 177 …EXPECT_SUCCESS(s2n_pkey_sign(private_key, S2N_SIGNATURE_RSA_PSS_PSS, &sign_hash, &signature_data)); in main() 180 EXPECT_SUCCESS(s2n_flip_random_bit(&signature_data)); in main() 181 …CT_FAILURE(s2n_pkey_verify(&public_key, S2N_SIGNATURE_RSA_PSS_PSS, &verify_hash, &signature_data)); in main() 264 …s2n_stack_blob(signature_data, RSA_PSS_SIGN_VERIFY_SIGNATURE_SIZE, RSA_PSS_SIGN_VERIFY_SIGNATURE_S… in main() 267 …T_SUCCESS(s2n_pkey_sign(root_private_key, S2N_SIGNATURE_RSA_PSS_PSS, &sign_hash, &signature_data)); in main() 268 …ILURE(s2n_pkey_verify(&leaf_public_key, S2N_SIGNATURE_RSA_PSS_PSS, &verify_hash, &signature_data)); in main() 336 …s2n_stack_blob(signature_data, RSA_PSS_SIGN_VERIFY_SIGNATURE_SIZE, RSA_PSS_SIGN_VERIFY_SIGNATURE_S… in main() 337 …EXPECT_SUCCESS(s2n_pkey_sign(private_key, S2N_SIGNATURE_RSA_PSS_PSS, &sign_hash, &signature_data)); in main() 338 …CT_FAILURE(s2n_pkey_verify(&public_key, S2N_SIGNATURE_RSA_PSS_PSS, &verify_hash, &signature_data)); in main()
|
/dports/security/gnutls/gnutls-3.6.16/tests/ |
H A D | x509sign-verify.c | 75 char signature_data[512]; in doit() local 101 signature_size = sizeof(signature_data); in doit() 103 &raw_data, signature_data, &signature_size); in doit() 117 signature.data = (unsigned char*)signature_data; in doit()
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/pyu2f/ |
H A D | model.py | 77 def __init__(self, key_handle, signature_data, client_data): argument 79 self.signature_data = signature_data
|
/dports/net/google-cloud-sdk/google-cloud-sdk/platform/gsutil/third_party/pyu2f/pyu2f/ |
H A D | model.py | 77 def __init__(self, key_handle, signature_data, client_data): argument 79 self.signature_data = signature_data
|
/dports/net/google-cloud-sdk/google-cloud-sdk/platform/bq/third_party/pyu2f/ |
H A D | model.py | 78 def __init__(self, key_handle, signature_data, client_data): argument 80 self.signature_data = signature_data
|
/dports/net/py-pyu2f/pyu2f-0.1.5/pyu2f/ |
H A D | model.py | 77 def __init__(self, key_handle, signature_data, client_data): argument 79 self.signature_data = signature_data
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/catapult/third_party/gsutil/third_party/pyu2f/pyu2f/ |
H A D | model.py | 77 def __init__(self, key_handle, signature_data, client_data): argument 79 self.signature_data = signature_data
|
/dports/net/google-cloud-sdk/google-cloud-sdk/platform/bq/third_party/pyu2f/convenience/ |
H A D | localauthenticator.py | 58 signature_data = self._base64encode(result.signature_data) 63 'signatureData': signature_data,
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/pyu2f/convenience/ |
H A D | localauthenticator.py | 57 signature_data = self._base64encode(result.signature_data) 62 'signatureData': signature_data,
|
/dports/net/google-cloud-sdk/google-cloud-sdk/platform/gsutil/third_party/pyu2f/pyu2f/convenience/ |
H A D | localauthenticator.py | 57 signature_data = self._base64encode(result.signature_data) 62 'signatureData': signature_data,
|
/dports/net/py-pyu2f/pyu2f-0.1.5/pyu2f/convenience/ |
H A D | localauthenticator.py | 57 signature_data = self._base64encode(result.signature_data) 62 'signatureData': signature_data,
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/catapult/third_party/gsutil/third_party/pyu2f/pyu2f/convenience/ |
H A D | localauthenticator.py | 57 signature_data = self._base64encode(result.signature_data) 62 'signatureData': signature_data,
|
/dports/security/opensc/OpenSC-0.22.0/src/pkcs11/ |
H A D | mechanism.c | 38 struct signature_data { struct 372 struct signature_data *data; in sc_pkcs11_signature_init() 437 struct signature_data *data; in sc_pkcs11_signature_update() 441 data = (struct signature_data *) operation->priv_data; in sc_pkcs11_signature_update() 459 struct signature_data *data; in sc_pkcs11_signature_final() 530 struct signature_data *data; in sc_pkcs11_signature_release() 643 struct signature_data *data; in sc_pkcs11_verify_init() 701 struct signature_data *data; in sc_pkcs11_verify_update() 722 struct signature_data *data; in sc_pkcs11_verify_final() 1056 struct signature_data *data; in sc_pkcs11_decrypt_init() [all …]
|
/dports/misc/librepo/librepo-1.14.2/librepo/ |
H A D | gpg.c | 72 gpgme_data_t signature_data; in lr_gpg_check_signature_fd() local 124 gpgerr = gpgme_data_new_from_fd(&signature_data, signature_fd); in lr_gpg_check_signature_fd() 142 gpgme_data_release(signature_data); in lr_gpg_check_signature_fd() 148 gpgerr = gpgme_op_verify(context, signature_data, data_data, NULL); in lr_gpg_check_signature_fd() 149 gpgme_data_release(signature_data); in lr_gpg_check_signature_fd()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/components/cast_certificate/ |
H A D | cast_cert_validator_unittest.cc | 134 auto signature_data = cast_certificate::testing::ReadSignatureTestData( in RunTest() local 138 EXPECT_TRUE(context->VerifySignatureOverData(signature_data.signature_sha1, in RunTest() 139 signature_data.message, in RunTest() 144 signature_data.signature_sha256, signature_data.message, in RunTest()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/components/cast_certificate/ |
H A D | cast_cert_validator_unittest.cc | 131 auto signature_data = cast_certificate::testing::ReadSignatureTestData( in RunTest() local 135 EXPECT_TRUE(context->VerifySignatureOverData(signature_data.signature_sha1, in RunTest() 136 signature_data.message, in RunTest() 141 signature_data.signature_sha256, signature_data.message, in RunTest()
|
/dports/www/firefox/firefox-99.0/third_party/rust/origin-trial-token/ |
H A D | lib.rs | 87 fn signature_data(&self) -> Vec<u8> { in signature_data() method 183 let signature_data = token.signature_data(); localVariable 184 if !verify_signature(&token.signature, &signature_data) {
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/blink/public/platform/ |
H A D | web_url_response.h | 78 WebString signature_data) in SignedCertificateTimestamp() 86 signature_data(signature_data) {} in SignedCertificateTimestamp() 94 WebString signature_data; member
|