/dports/sysutils/ansible/ansible-4.7.0/ansible_collections/community/crypto/tests/integration/targets/openssh_cert/tests/ |
H A D | regenerate.yml | 10 signing_key: "{{ signing_key }}" 19 signing_key: "{{ signing_key }}" 28 signing_key: "{{ signing_key }}" 40 signing_key: "{{ signing_key }}" 53 signing_key: "{{ signing_key }}" 62 signing_key: "{{ signing_key }}" 71 signing_key: "{{ signing_key }}" 84 signing_key: "{{ signing_key }}" 93 signing_key: "{{ signing_key }}" 110 signing_key: "{{ test_case.signing_key | default(omit) }}"
|
H A D | key_idempotency.yml | 19 signing_key: "{{ signing_key }}" 29 signing_key: "{{ signing_key }}" 45 signing_key: "{{ signing_key }}" 61 signing_key: "{{ signing_key }}" 77 signing_key: "{{ signing_key }}" 92 signing_key: "{{ signing_key }}" 103 signing_key: "{{ new_signing_key }}" 113 signing_key: "{{ signing_key }}" 123 signing_key: "{{ new_signing_key }}" 134 signing_key: "{{ new_signing_key }}"
|
H A D | options_idempotency.yml | 11 signing_key: "{{ signing_key }}" 24 signing_key: "{{ signing_key }}" 41 signing_key: "{{ signing_key }}" 55 signing_key: "{{ signing_key }}" 69 signing_key: "{{ signing_key }}" 83 signing_key: "{{ signing_key }}"
|
H A D | ssh-agent.yml | 13 signing_key: "{{ signing_key }}" 29 command: 'ssh-add {{ signing_key }}' 34 signing_key: "{{ signing_key }}" 45 signing_key: "{{ signing_key }}" 55 signing_key: "{{ signing_key }}" 72 signing_key: "{{ signing_key }}"
|
/dports/net/samba412/samba-4.12.15/libcli/smb/ |
H A D | smb2_signing.c | 106 .data = signing_key->blob.data, in smb2_signing_sign_pdu() 111 if (signing_key->hmac_hnd == NULL) { in smb2_signing_sign_pdu() 122 rc = gnutls_hmac(signing_key->hmac_hnd, in smb2_signing_sign_pdu() 135 signing_key->blob.data, in smb2_signing_sign_pdu() 152 if (signing_key->hmac_hnd == NULL) { in smb2_signing_sign_pdu() 155 signing_key->blob.data, in smb2_signing_sign_pdu() 216 .data = signing_key->blob.data, in smb2_signing_check_pdu() 221 if (signing_key->hmac_hnd == NULL) { in smb2_signing_check_pdu() 255 signing_key->blob.data, in smb2_signing_check_pdu() 274 if (signing_key->hmac_hnd == NULL) { in smb2_signing_check_pdu() [all …]
|
/dports/sysutils/ansible2/ansible-2.9.27/test/integration/targets/openssh_cert/tasks/ |
H A D | main.yml | 25 signing_key: '{{ output_dir }}/id_key' 34 signing_key: '{{ output_dir }}/id_key' 42 signing_key: '{{ output_dir }}/id_key' 50 signing_key: '{{ output_dir }}/id_key' 59 signing_key: '{{ output_dir }}/id_key' 69 signing_key: '{{ output_dir }}/id_key' 78 signing_key: '{{ output_dir }}/id_key' 87 signing_key: '{{ output_dir }}/id_key' 97 signing_key: '{{ output_dir }}/id_key' 109 signing_key: '{{ output_dir }}/id_key' [all …]
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/crates/tor-netdoc/src/doc/authcert/ |
H A D | build.rs | 26 signing_key: Option<rsa::PublicKey>, field 39 signing_key: None, in new() 65 self.signing_key = Some(key); in signing_key() 105 let signing_key = self in dangerous_testing_cert() localVariable 106 .signing_key in dangerous_testing_cert() 112 let sk_fingerprint = signing_key.to_rsa_identity(); in dangerous_testing_cert() 122 signing_key, in dangerous_testing_cert() 155 .signing_key(rsa1()) in simple_cert() 183 .signing_key(rsa1()) in failing_cert() 191 .signing_key(rsa1()) in failing_cert() [all …]
|
/dports/security/olm/olm-3.2.6/python/tests/ |
H A D | account_test.py | 79 signing_key = alice.identity_keys["ed25519"] 82 assert signing_key 84 ed25519_verify(signing_key, message, signature) 92 signing_key = bob.identity_keys["ed25519"] 95 assert signing_key 98 ed25519_verify(signing_key, message, signature) 105 signing_key = alice.identity_keys["ed25519"] 108 assert signing_key 110 ed25519_verify(signing_key, message, signature) 113 ed25519_verify(signing_key, message, signature)
|
/dports/security/arti/arti-9d0ede26801cdb182daa85c3eb5f0058dc178eb6/crates/tor-cert/tests/ |
H A D | testvec_certs.rs | 13 let signing_key = hex!("F82294B866A31F01FC5D0DA8572850A9B929545C3266558D7D2316E3B74172B0"); in test_valid_ed() localVariable 15 let signing_key = PublicKey::from_bytes(&signing_key[..]).unwrap(); in test_valid_ed() localVariable 31 assert_eq!(cert.peek_subject_key().as_ed25519(), Some(&signing_key)); in test_valid_ed() 41 assert_eq!(cert.subject_key().as_ed25519(), Some(&signing_key)); in test_valid_ed() 42 assert_eq!(cert.signing_key().unwrap(), &identity_key); in test_valid_ed() 62 .check_key(&Some(signing_key)) in test_valid_ed() 71 assert_eq!(cert.signing_key().unwrap(), &signing_key); in test_valid_ed()
|
/dports/sysutils/fwup/fwup-1.9.0/src/ |
H A D | fwfile.c | 28 int fwfile_add_meta_conf(cfg_t *cfg, struct archive *a, const unsigned char *signing_key) in fwfile_add_meta_conf() argument 40 int rc = fwfile_add_meta_conf_str(configtxt, configtxt_len, a, signing_key); in fwfile_add_meta_conf() 47 struct archive *a, const unsigned char *signing_key) in fwfile_add_meta_conf_str() argument 52 if (signing_key) { in fwfile_add_meta_conf_str() 54 …crypto_ed25519_sign(signature, &signing_key[0], &signing_key[FWUP_PRIVATE_KEY_LEN], (const uint8_t… in fwfile_add_meta_conf_str()
|
/dports/security/py-signedjson/signedjson-1.1.1/tests/ |
H A D | test_known_key.py | 39 self.signing_key = nacl.signing.SigningKey(SIGNING_KEY_SEED) 40 self.signing_key.alg = KEY_ALG 41 self.signing_key.version = KEY_VER 45 sign_json({}, "domain", self.signing_key), 58 sign_json({'one': 1, 'two': "Two"}, "domain", self.signing_key),
|
/dports/net-im/py-matrix-synapse/synapse-1.50.2/scripts-dev/ |
H A D | federation_client.py | 80 json_object: Any, signing_key: signedjson.types.SigningKey, signing_name: str 85 signed = signing_key.sign(encode_canonical_json(json_object)) 88 key_id = "%s:%s" % (signing_key.alg, signing_key.version) 202 args.signing_key = None 205 args.signing_key = f.readline() 207 if not args.server_name or not args.signing_key: 210 algorithm, version, key_base64 = args.signing_key.split() 238 if not args.signing_key: 240 args.signing_key = config["signing_key"] 243 args.signing_key = f.readline()
|
/dports/www/pomerium/pomerium-0.8.3/authorize/evaluator/opa/policy/ |
H A D | authz_test.rego | 7 signing_key := { 11 shared_key := base64url.decode(signing_key.k) 17 }, signing_key) 22 }] with data.signing_key as signing_key with data.shared_key as shared_key with input as { 33 }, signing_key) 45 ] with data.signing_key as signing_key with data.shared_key as shared_key with input as { 56 }, signing_key) 61 }] with data.signing_key as signing_key with data.shared_key as shared_key with input as {
|
/dports/devel/sccache/sccache-0.2.15/cargo-crates/cookie-0.12.0/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/lang/spidermonkey60/firefox-60.9.0/third_party/rust/cookie/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/www/geckodriver/mozilla-central-e9783a644016aa9b317887076618425586730d73/testing/geckodriver/cargo-crates/cookie-0.12.0/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/www/firefox/firefox-99.0/third_party/rust/cookie/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/mail/thunderbird/thunderbird-91.8.0/third_party/rust/cookie/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/www/firefox-esr/firefox-91.8.0/third_party/rust/cookie/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/lang/spidermonkey78/firefox-78.9.0/third_party/rust/cookie/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/sysutils/rsfetch/rsfetch-2.0.0/cargo-crates/cookie-0.12.0/src/secure/ |
H A D | key.rs | 24 signing_key: [u8; SIGNED_KEY_LEN], field 62 let mut signing_key = [0; SIGNED_KEY_LEN]; in from_master() localVariable 64 signing_key.copy_from_slice(&both_keys[..SIGNED_KEY_LEN]); in from_master() 68 signing_key: signing_key, in from_master() 112 Some(Key { signing_key: sign_key, encryption_key: enc_key }) in try_generate() 126 &self.signing_key[..] in signing()
|
/dports/devel/py-oci/oci-2.53.1/src/oci/identity_data_plane/models/ |
H A D | derived_key_response.py | 44 def signing_key(self): member in DerivedKeyResponse 55 @signing_key.setter 56 def signing_key(self, signing_key): argument 65 self._signing_key = signing_key
|
/dports/security/py-pyspnego/pyspnego-0.3.1/src/spnego/_ntlm_raw/ |
H A D | security.py | 15 signing_key: bytes, 37 signature = sign(flags, handle, signing_key, seq_num, b_data) 44 signing_key: bytes, 73 return _mac_with_ess(flags, handle, signing_key, seq_num, b_data) 138 signing_key: bytes, 184 checksum = hmac_md5(signing_key, b_seq_num + b_data)[:8]
|
/dports/www/py-pyjwt/PyJWT-2.3.0/tests/ |
H A D | test_jwks_client.py | 98 signing_key = jwks_client.get_signing_key(kid) 100 assert isinstance(signing_key, PyJWK) 101 assert signing_key.key_type == "RSA" 102 assert signing_key.key_id == kid 103 assert signing_key.public_key_use == "sig" 143 signing_key = jwks_client.get_signing_key_from_jwt(token) 147 signing_key.key,
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/chrome/updater/device_management/ |
H A D | dm_policy_builder_for_testing.cc | 247 std::unique_ptr<DMSigningKeyForTesting> signing_key, in DMPolicyBuilderForTesting() argument 254 signing_key_(std::move(signing_key)), in DMPolicyBuilderForTesting() 265 std::unique_ptr<DMSigningKeyForTesting> signing_key; in CreateInstanceWithOptions() local 271 signing_key = GetTestKey1(); in CreateInstanceWithOptions() 279 std::move(signing_key), std::move(new_signing_key), signing_option); in CreateInstanceWithOptions() 286 const DMSigningKeyForTesting* signing_key = signing_key_.get(); in FillPolicyFetchResponseWithPayload() local 288 signing_key = new_signing_key_.get(); in FillPolicyFetchResponseWithPayload() 325 if (signing_key->has_key_version()) { in FillPolicyFetchResponseWithPayload() 326 policy_data.set_public_key_version(signing_key->key_version()); in FillPolicyFetchResponseWithPayload() 337 signing_key->SignData(policy_response->policy_data(), in FillPolicyFetchResponseWithPayload()
|