/dports/net-im/libsignal-client/libsignal-client-0.9.6/java/tests/src/test/java/org/signal/libsignal/metadata/certificate/ |
H A D | SenderCertificateTest.java | 17 private final ECKeyPair trustRoot = Curve.generateKeyPair(); field in SenderCertificateTest 21 …SenderCertificate senderCertificate = createCertificateFor(trustRoot, UUID.fromString("9d0652a3-… in testSignature() 23 new CertificateValidator(trustRoot.getPublicKey()).validate(senderCertificate, 31336); in testSignature() 29 …SenderCertificate senderCertificate = createCertificateFor(trustRoot, UUID.fromString("9d0652a3-… in testExpiredSignature() 31 new CertificateValidator(trustRoot.getPublicKey()).validate(senderCertificate, 31338); in testExpiredSignature() 41 …SenderCertificate senderCertificate = createCertificateFor(trustRoot, UUID.fromString("9d0652a3-… in testBadSignature() 50 new CertificateValidator(trustRoot.getPublicKey()).validate(badCert, 31336); in testBadSignature() 57 …private SenderCertificate createCertificateFor(ECKeyPair trustRoot, UUID uuid, String e164, int de… in createCertificateFor() argument 61 …ative.ServerCertificate_New(1, serverKey.getPublicKey().nativeHandle(), trustRoot.getPrivateKey().… in createCertificateFor()
|
H A D | ServerCertificateTest.java | 14 ECKeyPair trustRoot = Curve.generateKeyPair(); in testSignature() local 18 …Native.ServerCertificate_New(1, keyPair.getPublicKey().nativeHandle(), trustRoot.getPrivateKey().n… in testSignature() 20 new CertificateValidator(trustRoot.getPublicKey()).validate(certificate); in testSignature() 23 new CertificateValidator(trustRoot.getPublicKey()).validate(new ServerCertificate(serialized)); in testSignature() 27 ECKeyPair trustRoot = Curve.generateKeyPair(); in testBadSignature() local 31 …Native.ServerCertificate_New(1, keyPair.getPublicKey().nativeHandle(), trustRoot.getPrivateKey().n… in testBadSignature() 40 … new CertificateValidator(trustRoot.getPublicKey()).validate(new ServerCertificate(badSignature)); in testBadSignature()
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/java/java/src/main/java/org/signal/libsignal/metadata/certificate/ |
H A D | CertificateValidator.java | 10 private final ECPublicKey trustRoot; field in CertificateValidator 12 public CertificateValidator(ECPublicKey trustRoot) { in CertificateValidator() argument 13 this.trustRoot = trustRoot; in CertificateValidator() 17 return this.trustRoot; in getTrustRoot() 22 …if (!Native.SenderCertificate_Validate(certificate.nativeHandle(), trustRoot.nativeHandle(), valid… in validate() 33 … if (!Curve.verifySignature(trustRoot, certificate.getCertificate(), certificate.getSignature())) { in validate()
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/java/tests/src/test/java/org/signal/libsignal/metadata/ |
H A D | SealedSessionCipherTest.java | 62 ECKeyPair trustRoot = Curve.generateKeyPair(); in testEncryptDecrypt() local 86 ECKeyPair trustRoot = Curve.generateKeyPair(); in testEncryptDecryptUntrusted() local 96 bobCipher.decrypt(new CertificateValidator(trustRoot.getPublicKey()), ciphertext, 31335); in testEncryptDecryptUntrusted() 110 ECKeyPair trustRoot = Curve.generateKeyPair(); in testEncryptDecryptExpired() local 119 bobCipher.decrypt(new CertificateValidator(trustRoot.getPublicKey()), ciphertext, 31338); in testEncryptDecryptExpired() 133 ECKeyPair trustRoot = Curve.generateKeyPair(); in testEncryptFromWrongIdentity() local 144 bobCipher.decrypt(new CertificateValidator(trustRoot.getPublicKey()), ciphertext, 31335); in testEncryptFromWrongIdentity() 157 ECKeyPair trustRoot = Curve.generateKeyPair(); in testEncryptDecryptGroup() local 206 ECKeyPair trustRoot = Curve.generateKeyPair(); in testEncryptGroupWithBadRegistrationId() local 236 ECKeyPair trustRoot = Curve.generateKeyPair(); in testProtocolException() local [all …]
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/swift/Sources/SignalClient/ |
H A D | SealedSenderCertificates.swift | 20 public init(keyId: UInt32, publicKey: PublicKey, trustRoot: PrivateKey) throws { 22 …rror(signal_server_certificate_new(&result, keyId, publicKey.nativeHandle, trustRoot.nativeHandle)) 185 public func validate(trustRoot: PublicKey, time: UInt64) throws -> Bool { in validate() 187 …try checkError(signal_sender_certificate_validate(&result, nativeHandle, trustRoot.nativeHandle, t… in validate()
|
H A D | SealedSender.swift | 197 trustRoot: PublicKey, 223 trustRoot.nativeHandle,
|
/dports/math/vtk6/VTK-6.2.0/ThirdParty/Twisted/twisted/internet/ |
H A D | _sslverify.py | 643 options.update(dict(trustRoot=OpenSSLCertificateAuthorities( 1102 def optionsForClientTLS(hostname, trustRoot=None, clientCertificate=None, argument 1150 if trustRoot is None: 1151 trustRoot = platformTrust() 1170 trustRoot=trustRoot, 1224 trustRoot=None): argument 1401 if trustRoot is None: 1403 trustRoot = OpenSSLCertificateAuthorities(caCerts) 1407 trustRoot = IOpenSSLTrustRoot(trustRoot) 1408 self.trustRoot = trustRoot [all …]
|
/dports/devel/py-twisted/Twisted-22.1.0/src/twisted/internet/ |
H A D | _sslverify.py | 655 trustRoot=OpenSSLCertificateAuthorities( 1185 trustRoot=None, argument 1241 if trustRoot is None: 1242 trustRoot = platformTrust() 1254 trustRoot=trustRoot, 1318 trustRoot=None, argument 1600 if trustRoot is None: 1602 trustRoot = OpenSSLCertificateAuthorities(caCerts) 1606 trustRoot = IOpenSSLTrustRoot(trustRoot) 1607 self.trustRoot = trustRoot [all …]
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/node/test/ |
H A D | PublicAPITest.ts | 285 const trustRoot = SignalClient.PrivateKey.generate(); constant 293 trustRoot 916 trustRoot 985 trustRoot.getPublicKey(), 1063 trustRoot 1136 trustRoot.getPublicKey(), 1187 trustRoot 1334 trustRoot 1446 const trustRoot = SignalClient.PrivateKey.generate(); constant 1452 trustRoot [all …]
|
/dports/net/boinc-client/boinc-client_release-7.8-7.8.6/html/user/ |
H A D | openid.php | 56 protected $server, $version, $trustRoot, $aliases, $identifier_select = false 72 … $this->trustRoot = (!empty($_SERVER['HTTPS']) ? 'https' : 'http') . '://' . $_SERVER['HTTP_HOST']; 74 $this->returnUrl = $this->trustRoot . $uri; 101 $this->trustRoot = trim($value); 115 return $this->trustRoot; 548 'openid.trust_root' => $this->trustRoot,
|
/dports/www/py-autobahn/autobahn-python-19.5.1/examples/twisted/wamp/component/ |
H A D | backend.py | 24 trustRoot=OpenSSLCertificateAuthorities([cert]), 30 trustRoot=cert,
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/swift/Tests/SignalClientTests/ |
H A D | SessionTests.swift | 162 …rt = try! ServerCertificate(keyId: 1, publicKey: server_keys.publicKey, trustRoot: trust_root.priv… in testSealedSenderSession() 183 trustRoot: trust_root.publicKey, in testSealedSenderSession() 248 …rt = try! ServerCertificate(keyId: 1, publicKey: server_keys.publicKey, trustRoot: trust_root.priv… in testSealedSenderGroupCipher() 318 …rt = try! ServerCertificate(keyId: 1, publicKey: server_keys.publicKey, trustRoot: trust_root.priv… in testSealedSenderGroupCipherWithBadRegistrationId() 393 …rt = try! ServerCertificate(keyId: 1, publicKey: server_keys.publicKey, trustRoot: trust_root.priv… in testDecryptionErrorMessage()
|
/dports/devel/py-twisted/Twisted-22.1.0/src/twisted/test/ |
H A D | test_sslverify.py | 340 clientOpts = sslverify.OpenSSLCertificateOptions(trustRoot=trustRoot) 346 trustRoot, argument 384 trustRoot=trustRoot, acceptableProtocols=clientProtocols 785 trustRoot=None, 793 trustRoot=None, 1889 trustRoot=caCert, 2337 trustRoot=trustRoot, 2627 trustRoot=mt, 2653 trustRoot=trust, 2673 trustRoot=trust, [all …]
|
/dports/devel/gitlab-runner/gitlab-runner-8925d9a06fd8e452e2161a768462652a2a13111f/vendor/github.com/docker/cli/cli-20.10.2/cli/command/swarm/ |
H A D | ca_test.go | 155 trustRoot := "trustme" 158 TLSInfo: swarm.TLSInfo{TrustRoot: trustRoot}, 162 assert.Check(t, is.Equal(trustRoot+"\n", buffer.String()))
|
/dports/sysutils/helm/helm-3.5.2/vendor/github.com/docker/cli/cli/command/swarm/ |
H A D | ca_test.go | 155 trustRoot := "trustme" 158 TLSInfo: swarm.TLSInfo{TrustRoot: trustRoot}, 162 assert.Check(t, is.Equal(trustRoot+"\n", buffer.String()))
|
/dports/sysutils/docker/docker-ce-18.09.5/components/cli/cli/command/swarm/ |
H A D | ca_test.go | 155 trustRoot := "trustme" 158 TLSInfo: swarm.TLSInfo{TrustRoot: trustRoot}, 162 assert.Check(t, is.Equal(trustRoot+"\n", buffer.String()))
|
/dports/www/e107/e107/e107_handlers/vendor/hybridauth/hybridauth/src/Thirdparty/OpenID/ |
H A D | LightOpenID.php | 63 protected $trustRoot; variable in Hybridauth\\Thirdparty\\OpenID\\LightOpenID 103 $this->returnUrl = $this->trustRoot . $uri; 144 $this->trustRoot = trim($value); 173 return $this->trustRoot; 247 $this->trustRoot = $realm; 972 'openid.trust_root' => $this->trustRoot,
|
/dports/www/orangehrm/orangehrm-4.9/symfony/lib/vendor/iignatov/lightopenid/ |
H A D | openid.php | 28 protected $server, $version, $trustRoot, $aliases, $identifier_select = false 50 $this->returnUrl = $this->trustRoot . $uri; 82 $this->trustRoot = trim($value); 106 return $this->trustRoot; 172 $this->trustRoot = $realm; 800 'openid.trust_root' => $this->trustRoot,
|
/dports/devel/py-twisted/Twisted-22.1.0/src/twisted/web/test/ |
H A D | test_agent.py | 1558 trustRoot = CustomOpenSSLTrustRoot() 1559 policy = BrowserLikePolicyForHTTPS(trustRoot=trustRoot) 1561 self.assertTrue(trustRoot.called) 3262 trustRoot = CustomOpenSSLTrustRoot() 3263 wrappedPolicy = BrowserLikePolicyForHTTPS(trustRoot=trustRoot) 3266 self.assertTrue(trustRoot.called) 3267 trustRoot.called = False 3273 self.assertFalse(trustRoot.called) 3280 trustRoot = CustomOpenSSLTrustRoot() 3281 wrappedPolicy = BrowserLikePolicyForHTTPS(trustRoot=trustRoot) [all …]
|
/dports/net-im/py-matrix-synapse/synapse-1.50.2/synapse/crypto/ |
H A D | context_factory.py | 123 trustRoot=trust_root, insecurelyLowerMinimumTo=minTLS 180 self._ssl_context = CertificateOptions(trustRoot=trust_root).getContext()
|
/dports/www/firefox-esr/firefox-91.8.0/testing/web-platform/tests/tools/ci/azure/ |
H A D | install_certs.yml | 4 …sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain tools/certs/c…
|
/dports/mail/thunderbird/thunderbird-91.8.0/testing/web-platform/tests/tools/ci/azure/ |
H A D | install_certs.yml | 4 …sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain tools/certs/c…
|
/dports/lang/spidermonkey78/firefox-78.9.0/testing/web-platform/tests/tools/ci/azure/ |
H A D | install_certs.yml | 4 …sudo security add-trusted-cert -d -r trustRoot -k /Library/Keychains/System.keychain tools/certs/c…
|
/dports/net-im/libsignal-client/libsignal-client-0.9.6/node/ |
H A D | index.ts | 626 trustRoot: PrivateKey property in ServerCertificate 629 NativeImpl.ServerCertificate_New(keyId, serverKey, trustRoot) 761 validate(trustRoot: PublicKey, time: number): boolean { 762 return NativeImpl.SenderCertificate_Validate(this, trustRoot, time); 1438 trustRoot: PublicKey, 1450 trustRoot,
|
/dports/www/py-autobahn/autobahn-python-19.5.1/examples/twisted/wamp/pubsub/tls/ |
H A D | backend_selfsigned.py | 67 trustRoot=OpenSSLCertificateAuthorities([cert]),
|