/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/components/password_manager/core/browser/leak_detection/ |
H A D | leak_detection_request_utils_unittest.cc | 81 std::string key_server; in TEST() local 83 CipherReEncrypt(encrypted_username_password, &key_server); in TEST() 88 << testing::PrintToString(StringToArray(key_server))); in TEST() 91 CipherEncryptWithKey("unrelated_trash", key_server))); in TEST() 107 std::string key_server; in TEST() local 109 CipherReEncrypt(encrypted_username_password, &key_server); in TEST() 114 << testing::PrintToString(StringToArray(key_server))); in TEST() 120 CipherEncryptWithKey("unrelated_trash", key_server))); in TEST() 123 CipherEncryptWithKey(kUsernamePasswordHash, key_server)) in TEST()
|
H A D | authenticated_leak_check_unittest.cc | 263 std::string key_server; in TEST_F() local 266 CipherReEncrypt(payload_and_callback.payload, &key_server) + in TEST_F() 271 key_server))); in TEST_F() 298 std::string key_server; in TEST_F() local 300 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 304 key_server))); in TEST_F() 338 std::string key_server; in TEST_F() local 340 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 344 key_server))); in TEST_F()
|
H A D | bulk_leak_check_impl_unittest.cc | 263 std::string key_server; in TEST_F() local 266 CipherReEncrypt(payload_and_callback.payload, &key_server) + in TEST_F() 271 key_server))); in TEST_F() 293 std::string key_server; in TEST_F() local 295 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 299 key_server))); in TEST_F() 326 std::string key_server; in TEST_F() local 328 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 331 ScryptHashUsernameAndPassword("abc", kTestPassword), key_server))); in TEST_F()
|
H A D | encryption_utils_unittest.cc | 129 std::string key_server; in TEST() local 130 cipher = CipherReEncrypt(cipher, &key_server); in TEST() 133 << testing::PrintToString(StringAsArray(key_server))); in TEST() 135 EXPECT_THAT(CipherEncryptWithKey(kRandomString, key_server), in TEST()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/components/password_manager/core/browser/leak_detection/ |
H A D | leak_detection_request_utils_unittest.cc | 97 std::string key_server; in TEST() local 99 CipherReEncrypt(encrypted_username_password, &key_server); in TEST() 104 << testing::PrintToString(StringToArray(key_server))); in TEST() 107 CipherEncryptWithKey("unrelated_trash", key_server))); in TEST() 123 std::string key_server; in TEST() local 125 CipherReEncrypt(encrypted_username_password, &key_server); in TEST() 130 << testing::PrintToString(StringToArray(key_server))); in TEST() 136 CipherEncryptWithKey("unrelated_trash", key_server))); in TEST() 139 CipherEncryptWithKey(kUsernamePasswordHash, key_server)) in TEST()
|
H A D | authenticated_leak_check_unittest.cc | 263 std::string key_server; in TEST_F() local 266 CipherReEncrypt(payload_and_callback.payload, &key_server) + in TEST_F() 271 key_server))); in TEST_F() 298 std::string key_server; in TEST_F() local 300 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 304 key_server))); in TEST_F() 338 std::string key_server; in TEST_F() local 340 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 344 key_server))); in TEST_F()
|
H A D | bulk_leak_check_impl_unittest.cc | 263 std::string key_server; in TEST_F() local 266 CipherReEncrypt(payload_and_callback.payload, &key_server) + in TEST_F() 271 key_server))); in TEST_F() 293 std::string key_server; in TEST_F() local 295 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 299 key_server))); in TEST_F() 326 std::string key_server; in TEST_F() local 328 CipherReEncrypt(payload_and_callback.payload, &key_server); in TEST_F() 331 ScryptHashUsernameAndPassword("abc", kTestPassword), key_server))); in TEST_F()
|
H A D | encryption_utils_unittest.cc | 129 std::string key_server; in TEST() local 130 cipher = CipherReEncrypt(cipher, &key_server); in TEST() 133 << testing::PrintToString(StringAsArray(key_server))); in TEST() 135 EXPECT_THAT(CipherEncryptWithKey(kRandomString, key_server), in TEST()
|
/dports/net-im/py-matrix-synapse/synapse-1.50.2/synapse/crypto/ |
H A D | keyring.py | 613 async def get_key(key_server: TrustedKeyServer) -> Dict: 616 keys_to_fetch, key_server 620 "Key lookup failed from %r: %s", key_server.server_name, e 625 key_server.server_name, 647 self, keys_to_fetch: List[_FetchKeyRequest], key_server: TrustedKeyServer 663 perspective_name = key_server.server_name 716 self._validate_perspectives_response(key_server, response) 744 self, key_server: TrustedKeyServer, response: JsonDict 753 perspective_name = key_server.server_name 754 perspective_keys = key_server.verify_keys
|
/dports/security/rnp/rnp-0.15.2/src/tests/ |
H A D | user-prefs.cpp | 89 assert_string_equal(prefs.key_server.c_str(), "hkp://pgp.mit.edu"); in TEST_F() 122 assert_true(prefs.key_server.empty()); in TEST_F()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/rnp/src/tests/ |
H A D | user-prefs.cpp | 89 assert_string_equal(prefs.key_server.c_str(), "hkp://pgp.mit.edu"); in TEST_F() 122 assert_true(prefs.key_server.empty()); in TEST_F()
|
/dports/net-im/dendrite/dendrite-0.5.1/build/docker/ |
H A D | docker-compose.polylith.yml | 67 key_server: 68 hostname: key_server
|
/dports/sysutils/cfengine317/cfengine-3.17.0/examples/ |
H A D | simple_ssh_key_distribution.cf | 15 "key_server" string => "$(sys.policy_hub)"; 65 $(ssh_key_info.key_server) ),
|
/dports/sysutils/cfengine-devel/core-d08ae9eff/examples/ |
H A D | simple_ssh_key_distribution.cf | 15 "key_server" string => "$(sys.policy_hub)"; 65 $(ssh_key_info.key_server) ),
|
/dports/sysutils/cfengine316/cfengine-3.16.0/examples/ |
H A D | simple_ssh_key_distribution.cf | 15 "key_server" string => "$(sys.policy_hub)"; 65 $(ssh_key_info.key_server) ),
|
/dports/sysutils/cfengine/cfengine-3.19.0/examples/ |
H A D | simple_ssh_key_distribution.cf | 15 "key_server" string => "$(sys.policy_hub)"; 65 $(ssh_key_info.key_server) ),
|
/dports/sysutils/cfengine318/cfengine-3.18.1/examples/ |
H A D | simple_ssh_key_distribution.cf | 15 "key_server" string => "$(sys.policy_hub)"; 65 $(ssh_key_info.key_server) ),
|
/dports/sysutils/cfengine319/cfengine-3.19.0/examples/ |
H A D | simple_ssh_key_distribution.cf | 15 "key_server" string => "$(sys.policy_hub)"; 65 $(ssh_key_info.key_server) ),
|
/dports/net/hostapd/hostapd-2.9/src/pae/ |
H A D | ieee802_1x_kay.c | 751 body->key_server = participant->is_key_server; in ieee802_1x_mka_encode_basic_body() 891 peer->is_key_server = (Boolean) body->key_server; in ieee802_1x_mka_decode_basic_body() 897 peer->is_key_server = (Boolean) body->key_server; in ieee802_1x_mka_decode_basic_body() 2233 struct ieee802_1x_kay_peer *key_server = NULL; in ieee802_1x_kay_elect_key_server() local 2251 if (!key_server) { in ieee802_1x_kay_elect_key_server() 2252 key_server = peer; in ieee802_1x_kay_elect_key_server() 2256 if (compare_priorities(peer, key_server) < 0) in ieee802_1x_kay_elect_key_server() 2257 key_server = peer; in ieee802_1x_kay_elect_key_server() 2273 key_server = NULL; in ieee802_1x_kay_elect_key_server() 2296 } else if (key_server) { in ieee802_1x_kay_elect_key_server() [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/src/pae/ |
H A D | ieee802_1x_kay.c | 751 body->key_server = participant->is_key_server; in ieee802_1x_mka_encode_basic_body() 891 peer->is_key_server = body->key_server; in ieee802_1x_mka_decode_basic_body() 897 peer->is_key_server = body->key_server; in ieee802_1x_mka_decode_basic_body() 2270 struct ieee802_1x_kay_peer *key_server = NULL; in ieee802_1x_kay_elect_key_server() local 2288 if (!key_server) { in ieee802_1x_kay_elect_key_server() 2289 key_server = peer; in ieee802_1x_kay_elect_key_server() 2293 if (compare_priorities(peer, key_server) < 0) in ieee802_1x_kay_elect_key_server() 2294 key_server = peer; in ieee802_1x_kay_elect_key_server() 2310 key_server = NULL; in ieee802_1x_kay_elect_key_server() 2333 } else if (key_server) { in ieee802_1x_kay_elect_key_server() [all …]
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_kay.c | 751 body->key_server = participant->is_key_server; in ieee802_1x_mka_encode_basic_body() 891 peer->is_key_server = (Boolean) body->key_server; in ieee802_1x_mka_decode_basic_body() 897 peer->is_key_server = (Boolean) body->key_server; in ieee802_1x_mka_decode_basic_body() 2233 struct ieee802_1x_kay_peer *key_server = NULL; in ieee802_1x_kay_elect_key_server() local 2251 if (!key_server) { in ieee802_1x_kay_elect_key_server() 2252 key_server = peer; in ieee802_1x_kay_elect_key_server() 2256 if (compare_priorities(peer, key_server) < 0) in ieee802_1x_kay_elect_key_server() 2257 key_server = peer; in ieee802_1x_kay_elect_key_server() 2273 key_server = NULL; in ieee802_1x_kay_elect_key_server() 2296 } else if (key_server) { in ieee802_1x_kay_elect_key_server() [all …]
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/src/pae/ |
H A D | ieee802_1x_kay.c | 751 body->key_server = participant->is_key_server; in ieee802_1x_mka_encode_basic_body() 891 peer->is_key_server = body->key_server; in ieee802_1x_mka_decode_basic_body() 897 peer->is_key_server = body->key_server; in ieee802_1x_mka_decode_basic_body() 2270 struct ieee802_1x_kay_peer *key_server = NULL; in ieee802_1x_kay_elect_key_server() local 2288 if (!key_server) { in ieee802_1x_kay_elect_key_server() 2289 key_server = peer; in ieee802_1x_kay_elect_key_server() 2293 if (compare_priorities(peer, key_server) < 0) in ieee802_1x_kay_elect_key_server() 2294 key_server = peer; in ieee802_1x_kay_elect_key_server() 2310 key_server = NULL; in ieee802_1x_kay_elect_key_server() 2333 } else if (key_server) { in ieee802_1x_kay_elect_key_server() [all …]
|
/dports/security/wpa_supplicant/wpa_supplicant-2.9/src/pae/ |
H A D | ieee802_1x_kay.c | 751 body->key_server = participant->is_key_server; in ieee802_1x_mka_encode_basic_body() 891 peer->is_key_server = (Boolean) body->key_server; in ieee802_1x_mka_decode_basic_body() 897 peer->is_key_server = (Boolean) body->key_server; in ieee802_1x_mka_decode_basic_body() 2233 struct ieee802_1x_kay_peer *key_server = NULL; in ieee802_1x_kay_elect_key_server() local 2251 if (!key_server) { in ieee802_1x_kay_elect_key_server() 2252 key_server = peer; in ieee802_1x_kay_elect_key_server() 2256 if (compare_priorities(peer, key_server) < 0) in ieee802_1x_kay_elect_key_server() 2257 key_server = peer; in ieee802_1x_kay_elect_key_server() 2273 key_server = NULL; in ieee802_1x_kay_elect_key_server() 2296 } else if (key_server) { in ieee802_1x_kay_elect_key_server() [all …]
|
/dports/net/hostapd-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_macsec.py | 246 key_server = None 252 if key_server is None or prio < ks_prio or \ 254 key_server = w 258 logger.info("Expected key server: " + key_server.ifname) 259 if key_server.get_status_field("is_key_server") != "Yes": 262 if w != key_server and w.get_status_field("is_key_server") == "Yes":
|
/dports/security/wpa_supplicant-devel/hostap-14ab4a816/tests/hwsim/ |
H A D | test_macsec.py | 246 key_server = None 252 if key_server is None or prio < ks_prio or \ 254 key_server = w 258 logger.info("Expected key server: " + key_server.ifname) 259 if key_server.get_status_field("is_key_server") != "Yes": 262 if w != key_server and w.get_status_field("is_key_server") == "Yes":
|