Home
last modified time | relevance | path

Searched refs:identity_keys (Results 1 – 25 of 42) sorted by relevance

12

/dports/net-im/mtxclient/mtxclient-0.6.0/tests/
H A Dutils.cpp65 alice->identity_keys().ed25519.data(), in TEST()
66 alice->identity_keys().ed25519.size(), in TEST()
94 {"curve25519:" + device_id, alice->identity_keys().curve25519}, in TEST()
95 {"ed25519:" + device_id, alice->identity_keys().ed25519}, in TEST()
115 json keys = alice->identity_keys(); in TEST()
128 alice->identity_keys().ed25519.data(), in TEST()
129 alice->identity_keys().ed25519.size(), in TEST()
145 json keys = alice->identity_keys(); in TEST()
148 {{"keys", {{"ed25519:" + alice->identity_keys().ed25519, alice->identity_keys().ed25519}}}, in TEST()
156 msg.keys["ed25519:" + alice->identity_keys().ed25519] = alice->identity_keys().ed25519; in TEST()
[all …]
H A De2ee.cpp60 auto idks = account->identity_keys(); in generate_keys()
72 EXPECT_THROW(olm_account->identity_keys(), olm_exception); in TEST()
85 auto id_keys = olm_account->identity_keys(); in TEST()
472 EXPECT_THROW(olm_account->identity_keys(), olm_exception); in TEST()
485 auto id_keys = olm_account->identity_keys(); in TEST()
530 EXPECT_THROW(olm_account->identity_keys(), olm_exception); in TEST()
543 auto id_keys = olm_account->identity_keys(); in TEST()
739 std::string bob_key = bob->identity_keys().curve25519; in TEST()
945 EXPECT_EQ(bob_ed25519, bob_olm->identity_keys().ed25519); in TEST()
1100 EXPECT_EQ(bob_ed25519, bob_olm->identity_keys().ed25519); in TEST()
[all …]
/dports/security/olm/olm-3.2.6/python/tests/
H A Daccount_test.py20 assert alice.identity_keys
21 assert len(alice.identity_keys) == 2
26 assert (alice.identity_keys == Account.from_pickle(pickle)
27 .identity_keys)
37 assert (alice.identity_keys == Account.from_pickle(
38 pickle, passphrase).identity_keys)
79 signing_key = alice.identity_keys["ed25519"]
92 signing_key = bob.identity_keys["ed25519"]
105 signing_key = alice.identity_keys["ed25519"]
H A Dsession_test.py13 id_key = bob.identity_keys["curve25519"]
78 alice_id = alice.identity_keys["curve25519"]
86 alice_id = alice.identity_keys["curve25519"]
103 alice_id = alice.identity_keys["curve25519"]
138 alice_id = alice.identity_keys["curve25519"]
/dports/net-im/signald/signald-65cf5e8a1cf2b81fd1f5c3936e0164d53c5a9b29/src/main/resources/db/migration/
H A DV3__identity_keys_table.sql10 INSERT INTO identity_keys_new SELECT * FROM identity_keys GROUP BY account_uuid,recipient,identity_…
11 DROP TABLE identity_keys;
12 ALTER TABLE identity_keys_new RENAME TO identity_keys;
H A DV2__create_core_account_tables.sql42 CREATE TABLE identity_keys ( table
/dports/security/olm/olm-3.2.6/src/
H A Daccount.cpp99 _olm_crypto_ed25519_generate_key(random, &identity_keys.ed25519_key); in new_account()
129 sizeof(identity_keys.curve25519_key.public_key) in get_identity_json_length()
135 sizeof(identity_keys.ed25519_key.public_key) in get_identity_json_length()
157 identity_keys.curve25519_key.public_key.public_key, in get_identity_json()
158 sizeof(identity_keys.curve25519_key.public_key.public_key), in get_identity_json()
165 identity_keys.ed25519_key.public_key.public_key, in get_identity_json()
166 sizeof(identity_keys.ed25519_key.public_key.public_key), in get_identity_json()
189 &identity_keys.ed25519_key, message, message_length, signature in sign()
438 length += olm::pickle_length(value.identity_keys); in pickle_length()
452 pos = olm::pickle(pos, value.identity_keys); in pickle()
[all …]
/dports/net-im/py-unmessage/unmessage-0.2.0/unmessage/
H A Dpeer.py171 def identity_keys(self): member in Peer
172 return self._info.identity_keys
174 @identity_keys.setter
176 self._info.identity_keys = keys
359 priv_identity_key=self.identity_keys.priv,
360 identity_key=self.identity_keys.pub,
882 if not self.identity_keys:
1482 self.identity_keys = identity_keys
1559 identity_keys = None
1585 if peer_info.identity_keys:
[all …]
/dports/security/gnome-ssh-askpass/openssh-6.6p1/
H A Dssh.c1180 if (options.identity_keys[i]) { in main()
1181 key_free(options.identity_keys[i]); in main()
1182 options.identity_keys[i] = NULL; in main()
1749 Key *identity_keys[SSH_MAX_IDENTITY_FILES]; in load_public_identity_files() local
1757 memset(identity_keys, 0, sizeof(identity_keys)); in load_public_identity_files()
1770 identity_keys[n_ids] = keys[i]; in load_public_identity_files()
1802 identity_keys[n_ids] = public; in load_public_identity_files()
1823 identity_keys[n_ids] = public; in load_public_identity_files()
1830 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys)); in load_public_identity_files()
H A Dsshconnect1.c215 public = options.identity_keys[idx]; in try_rsa_authentication()
728 if (options.identity_keys[i] != NULL && in ssh_userauth1()
729 options.identity_keys[i]->type == KEY_RSA1 && in ssh_userauth1()
H A Dreadconf.h105 Key *identity_keys[SSH_MAX_IDENTITY_FILES]; member
/dports/security/ncrack/ncrack-0.7/opensshlib/
H A Dssh.c1353 if (options.identity_keys[i]) { in main()
1354 key_free(options.identity_keys[i]); in main()
1355 options.identity_keys[i] = NULL; in main()
1955 Key *identity_keys[SSH_MAX_IDENTITY_FILES];
1963 memset(identity_keys, 0, sizeof(identity_keys));
1976 identity_keys[n_ids] = keys[i];
2008 identity_keys[n_ids] = public;
2029 identity_keys[n_ids] = public;
2036 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys));
H A Dreadconf.h96 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; member
/dports/security/pam_ssh/pam_ssh-8.0/openssh/
H A Dssh.c1515 if (options.identity_keys[i]) { in main()
1516 sshkey_free(options.identity_keys[i]); in main()
1517 options.identity_keys[i] = NULL; in main()
2006 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; in load_public_identity_files() local
2018 memset(identity_keys, 0, sizeof(identity_keys)); in load_public_identity_files()
2037 identity_keys[n_ids] = keys[i]; in load_public_identity_files()
2063 identity_keys[n_ids] = public; in load_public_identity_files()
2093 identity_keys[n_ids] = public; in load_public_identity_files()
2140 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys)); in load_public_identity_files()
H A Dreadconf.h90 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; member
/dports/security/olm/olm-3.2.6/python/
H A DREADME.md27 The public parts of the key pair are available using the identity_keys property
32 >>> alice.identity_keys
79 >>> id_key = bob.identity_keys["curve25519"]
/dports/security/openssh-portable/openssh-8.8p1/
H A Dssh.c1687 if (options.identity_keys[i]) { in main()
1688 sshkey_free(options.identity_keys[i]); in main()
1689 options.identity_keys[i] = NULL; in main()
2226 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; in load_public_identity_files() local
2239 memset(identity_keys, 0, sizeof(identity_keys)); in load_public_identity_files()
2259 identity_keys[n_ids] = keys[i]; in load_public_identity_files()
2283 identity_keys[n_ids] = public; in load_public_identity_files()
2313 identity_keys[n_ids] = public; in load_public_identity_files()
2353 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys)); in load_public_identity_files()
H A Dreadconf.h91 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; member
/dports/net-im/nheko/nheko-0.9.0/src/encryption/
H A DSelfVerificationStatus.cpp149 olm::client()->identity_keys().ed25519 && in setupCrosssigning()
151 olm::client()->identity_keys().curve25519) { in setupCrosssigning()
275 keys->seen_device_keys.count(olm::client()->identity_keys().curve25519))) { in invalidate()
H A DOlm.cpp207 if (msg.sender_key == olm::client()->identity_keys().ed25519) { in handle_olm_message()
212 const auto my_key = olm::client()->identity_keys().curve25519; in handle_olm_message()
250 receiver_ed25519 != olm::client()->identity_keys().ed25519) { in handle_olm_message()
591 session_data.sender_claimed_ed25519_key = olm::client()->identity_keys().ed25519; in encrypt_group_message()
613 index.sender_key = olm::client()->identity_keys().curve25519; in encrypt_group_message()
641 data.sender_key = olm::client()->identity_keys().curve25519; in encrypt_group_message()
1004 req.content.sender_key != olm::client()->identity_keys().curve25519) { in handle_key_request_message()
1010 olm::client()->identity_keys().curve25519); in handle_key_request_message()
1209 auto our_curve = olm::client()->identity_keys().curve25519; in send_encrypted_to_device_messages()
/dports/security/olm/olm-3.2.6/javascript/
H A DREADME.md16 var bobs_id_keys = JSON.parse(bob.identity_keys());
H A Dindex.d.ts23 identity_keys(): string;
/dports/security/olm/olm-3.2.6/include/olm/
H A Daccount.hh44 IdentityKeys identity_keys; member
/dports/net-im/mtxclient/mtxclient-0.6.0/lib/crypto/
H A Dclient.cpp70 OlmClient::identity_keys() const in identity_keys() function in OlmClient
97 auto keys = identity_keys(); in sign_identity_keys()
188 auto id_keys = identity_keys(); in create_upload_keys_request()
721 event["keys"]["ed25519"] = identity_keys().ed25519; in create_olm_encrypted_content()
734 {"sender_key", identity_keys().curve25519}, in create_olm_encrypted_content()
/dports/net-im/nheko/nheko-0.9.0/src/
H A DChatPage.cpp426 nhlog::crypto()->info("ed25519 : {}", olm::client()->identity_keys().ed25519); in loadStateFromCache()
427 nhlog::crypto()->info("curve25519: {}", olm::client()->identity_keys().curve25519); in loadStateFromCache()
494 nhlog::crypto()->info("ed25519 : {}", olm::client()->identity_keys().ed25519); in tryInitialSync()
495 nhlog::crypto()->info("curve25519: {}", olm::client()->identity_keys().curve25519); in tryInitialSync()
1154 olm::client()->identity_keys().ed25519 && in decryptDownloadedSecrets()
1156 olm::client()->identity_keys().curve25519) { in decryptDownloadedSecrets()

12