/dports/net-im/mtxclient/mtxclient-0.6.0/tests/ |
H A D | utils.cpp | 65 alice->identity_keys().ed25519.data(), in TEST() 66 alice->identity_keys().ed25519.size(), in TEST() 94 {"curve25519:" + device_id, alice->identity_keys().curve25519}, in TEST() 95 {"ed25519:" + device_id, alice->identity_keys().ed25519}, in TEST() 115 json keys = alice->identity_keys(); in TEST() 128 alice->identity_keys().ed25519.data(), in TEST() 129 alice->identity_keys().ed25519.size(), in TEST() 145 json keys = alice->identity_keys(); in TEST() 148 {{"keys", {{"ed25519:" + alice->identity_keys().ed25519, alice->identity_keys().ed25519}}}, in TEST() 156 msg.keys["ed25519:" + alice->identity_keys().ed25519] = alice->identity_keys().ed25519; in TEST() [all …]
|
H A D | e2ee.cpp | 60 auto idks = account->identity_keys(); in generate_keys() 72 EXPECT_THROW(olm_account->identity_keys(), olm_exception); in TEST() 85 auto id_keys = olm_account->identity_keys(); in TEST() 472 EXPECT_THROW(olm_account->identity_keys(), olm_exception); in TEST() 485 auto id_keys = olm_account->identity_keys(); in TEST() 530 EXPECT_THROW(olm_account->identity_keys(), olm_exception); in TEST() 543 auto id_keys = olm_account->identity_keys(); in TEST() 739 std::string bob_key = bob->identity_keys().curve25519; in TEST() 945 EXPECT_EQ(bob_ed25519, bob_olm->identity_keys().ed25519); in TEST() 1100 EXPECT_EQ(bob_ed25519, bob_olm->identity_keys().ed25519); in TEST() [all …]
|
/dports/security/olm/olm-3.2.6/python/tests/ |
H A D | account_test.py | 20 assert alice.identity_keys 21 assert len(alice.identity_keys) == 2 26 assert (alice.identity_keys == Account.from_pickle(pickle) 27 .identity_keys) 37 assert (alice.identity_keys == Account.from_pickle( 38 pickle, passphrase).identity_keys) 79 signing_key = alice.identity_keys["ed25519"] 92 signing_key = bob.identity_keys["ed25519"] 105 signing_key = alice.identity_keys["ed25519"]
|
H A D | session_test.py | 13 id_key = bob.identity_keys["curve25519"] 78 alice_id = alice.identity_keys["curve25519"] 86 alice_id = alice.identity_keys["curve25519"] 103 alice_id = alice.identity_keys["curve25519"] 138 alice_id = alice.identity_keys["curve25519"]
|
/dports/net-im/signald/signald-65cf5e8a1cf2b81fd1f5c3936e0164d53c5a9b29/src/main/resources/db/migration/ |
H A D | V3__identity_keys_table.sql | 10 INSERT INTO identity_keys_new SELECT * FROM identity_keys GROUP BY account_uuid,recipient,identity_… 11 DROP TABLE identity_keys; 12 ALTER TABLE identity_keys_new RENAME TO identity_keys;
|
H A D | V2__create_core_account_tables.sql | 42 CREATE TABLE identity_keys ( table
|
/dports/security/olm/olm-3.2.6/src/ |
H A D | account.cpp | 99 _olm_crypto_ed25519_generate_key(random, &identity_keys.ed25519_key); in new_account() 129 sizeof(identity_keys.curve25519_key.public_key) in get_identity_json_length() 135 sizeof(identity_keys.ed25519_key.public_key) in get_identity_json_length() 157 identity_keys.curve25519_key.public_key.public_key, in get_identity_json() 158 sizeof(identity_keys.curve25519_key.public_key.public_key), in get_identity_json() 165 identity_keys.ed25519_key.public_key.public_key, in get_identity_json() 166 sizeof(identity_keys.ed25519_key.public_key.public_key), in get_identity_json() 189 &identity_keys.ed25519_key, message, message_length, signature in sign() 438 length += olm::pickle_length(value.identity_keys); in pickle_length() 452 pos = olm::pickle(pos, value.identity_keys); in pickle() [all …]
|
/dports/net-im/py-unmessage/unmessage-0.2.0/unmessage/ |
H A D | peer.py | 171 def identity_keys(self): member in Peer 172 return self._info.identity_keys 174 @identity_keys.setter 176 self._info.identity_keys = keys 359 priv_identity_key=self.identity_keys.priv, 360 identity_key=self.identity_keys.pub, 882 if not self.identity_keys: 1482 self.identity_keys = identity_keys 1559 identity_keys = None 1585 if peer_info.identity_keys: [all …]
|
/dports/security/gnome-ssh-askpass/openssh-6.6p1/ |
H A D | ssh.c | 1180 if (options.identity_keys[i]) { in main() 1181 key_free(options.identity_keys[i]); in main() 1182 options.identity_keys[i] = NULL; in main() 1749 Key *identity_keys[SSH_MAX_IDENTITY_FILES]; in load_public_identity_files() local 1757 memset(identity_keys, 0, sizeof(identity_keys)); in load_public_identity_files() 1770 identity_keys[n_ids] = keys[i]; in load_public_identity_files() 1802 identity_keys[n_ids] = public; in load_public_identity_files() 1823 identity_keys[n_ids] = public; in load_public_identity_files() 1830 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys)); in load_public_identity_files()
|
H A D | sshconnect1.c | 215 public = options.identity_keys[idx]; in try_rsa_authentication() 728 if (options.identity_keys[i] != NULL && in ssh_userauth1() 729 options.identity_keys[i]->type == KEY_RSA1 && in ssh_userauth1()
|
H A D | readconf.h | 105 Key *identity_keys[SSH_MAX_IDENTITY_FILES]; member
|
/dports/security/ncrack/ncrack-0.7/opensshlib/ |
H A D | ssh.c | 1353 if (options.identity_keys[i]) { in main() 1354 key_free(options.identity_keys[i]); in main() 1355 options.identity_keys[i] = NULL; in main() 1955 Key *identity_keys[SSH_MAX_IDENTITY_FILES]; 1963 memset(identity_keys, 0, sizeof(identity_keys)); 1976 identity_keys[n_ids] = keys[i]; 2008 identity_keys[n_ids] = public; 2029 identity_keys[n_ids] = public; 2036 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys));
|
H A D | readconf.h | 96 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; member
|
/dports/security/pam_ssh/pam_ssh-8.0/openssh/ |
H A D | ssh.c | 1515 if (options.identity_keys[i]) { in main() 1516 sshkey_free(options.identity_keys[i]); in main() 1517 options.identity_keys[i] = NULL; in main() 2006 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; in load_public_identity_files() local 2018 memset(identity_keys, 0, sizeof(identity_keys)); in load_public_identity_files() 2037 identity_keys[n_ids] = keys[i]; in load_public_identity_files() 2063 identity_keys[n_ids] = public; in load_public_identity_files() 2093 identity_keys[n_ids] = public; in load_public_identity_files() 2140 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys)); in load_public_identity_files()
|
H A D | readconf.h | 90 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; member
|
/dports/security/olm/olm-3.2.6/python/ |
H A D | README.md | 27 The public parts of the key pair are available using the identity_keys property 32 >>> alice.identity_keys 79 >>> id_key = bob.identity_keys["curve25519"]
|
/dports/security/openssh-portable/openssh-8.8p1/ |
H A D | ssh.c | 1687 if (options.identity_keys[i]) { in main() 1688 sshkey_free(options.identity_keys[i]); in main() 1689 options.identity_keys[i] = NULL; in main() 2226 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; in load_public_identity_files() local 2239 memset(identity_keys, 0, sizeof(identity_keys)); in load_public_identity_files() 2259 identity_keys[n_ids] = keys[i]; in load_public_identity_files() 2283 identity_keys[n_ids] = public; in load_public_identity_files() 2313 identity_keys[n_ids] = public; in load_public_identity_files() 2353 memcpy(options.identity_keys, identity_keys, sizeof(identity_keys)); in load_public_identity_files()
|
H A D | readconf.h | 91 struct sshkey *identity_keys[SSH_MAX_IDENTITY_FILES]; member
|
/dports/net-im/nheko/nheko-0.9.0/src/encryption/ |
H A D | SelfVerificationStatus.cpp | 149 olm::client()->identity_keys().ed25519 && in setupCrosssigning() 151 olm::client()->identity_keys().curve25519) { in setupCrosssigning() 275 keys->seen_device_keys.count(olm::client()->identity_keys().curve25519))) { in invalidate()
|
H A D | Olm.cpp | 207 if (msg.sender_key == olm::client()->identity_keys().ed25519) { in handle_olm_message() 212 const auto my_key = olm::client()->identity_keys().curve25519; in handle_olm_message() 250 receiver_ed25519 != olm::client()->identity_keys().ed25519) { in handle_olm_message() 591 session_data.sender_claimed_ed25519_key = olm::client()->identity_keys().ed25519; in encrypt_group_message() 613 index.sender_key = olm::client()->identity_keys().curve25519; in encrypt_group_message() 641 data.sender_key = olm::client()->identity_keys().curve25519; in encrypt_group_message() 1004 req.content.sender_key != olm::client()->identity_keys().curve25519) { in handle_key_request_message() 1010 olm::client()->identity_keys().curve25519); in handle_key_request_message() 1209 auto our_curve = olm::client()->identity_keys().curve25519; in send_encrypted_to_device_messages()
|
/dports/security/olm/olm-3.2.6/javascript/ |
H A D | README.md | 16 var bobs_id_keys = JSON.parse(bob.identity_keys());
|
H A D | index.d.ts | 23 identity_keys(): string;
|
/dports/security/olm/olm-3.2.6/include/olm/ |
H A D | account.hh | 44 IdentityKeys identity_keys; member
|
/dports/net-im/mtxclient/mtxclient-0.6.0/lib/crypto/ |
H A D | client.cpp | 70 OlmClient::identity_keys() const in identity_keys() function in OlmClient 97 auto keys = identity_keys(); in sign_identity_keys() 188 auto id_keys = identity_keys(); in create_upload_keys_request() 721 event["keys"]["ed25519"] = identity_keys().ed25519; in create_olm_encrypted_content() 734 {"sender_key", identity_keys().curve25519}, in create_olm_encrypted_content()
|
/dports/net-im/nheko/nheko-0.9.0/src/ |
H A D | ChatPage.cpp | 426 nhlog::crypto()->info("ed25519 : {}", olm::client()->identity_keys().ed25519); in loadStateFromCache() 427 nhlog::crypto()->info("curve25519: {}", olm::client()->identity_keys().curve25519); in loadStateFromCache() 494 nhlog::crypto()->info("ed25519 : {}", olm::client()->identity_keys().ed25519); in tryInitialSync() 495 nhlog::crypto()->info("curve25519: {}", olm::client()->identity_keys().curve25519); in tryInitialSync() 1154 olm::client()->identity_keys().ed25519 && in decryptDownloadedSecrets() 1156 olm::client()->identity_keys().curve25519) { in decryptDownloadedSecrets()
|