/dports/benchmarks/stress-ng/stress-ng-0.13.09/ |
H A D | stress-rseq.c | 62 uint32_t valid_signature; /* rseq valid signature */ member 66 static uint32_t valid_signature; variable 251 valid_signature = 0xbadc0de; in stress_rseq_oomable() 253 valid_signature = rseq_info->valid_signature; in stress_rseq_oomable() 288 ret = rseq_register(misaligned_seq, valid_signature); in stress_rseq_oomable() 290 (void)rseq_unregister(misaligned_seq, valid_signature); in stress_rseq_oomable() 296 (void)rseq_unregister(&invalid_seq, valid_signature); in stress_rseq_oomable() 299 (void)rseq_unregister(&invalid_seq, ~valid_signature); in stress_rseq_oomable() 302 (void)rseq_register(&restartable_seq, valid_signature); in stress_rseq_oomable() 303 (void)rseq_register(&restartable_seq, valid_signature); in stress_rseq_oomable() [all …]
|
/dports/multimedia/tautulli/Tautulli-2.8.0/lib/oauthlib/oauth1/rfc5849/endpoints/ |
H A D | base.py | 196 valid_signature = signature.verify_rsa_sha1(request, rsa_key) 198 valid_signature = signature.verify_rsa_sha256(request, rsa_key) 200 valid_signature = signature.verify_rsa_sha512(request, rsa_key) 202 valid_signature = False 231 valid_signature = signature.verify_hmac_sha1( 234 valid_signature = signature.verify_hmac_sha256( 237 valid_signature = signature.verify_hmac_sha512( 240 valid_signature = signature.verify_plaintext( 243 valid_signature = False 245 return valid_signature
|
H A D | signature_only.py | 65 valid_signature = self._check_signature(request) 70 request.validator_log['signature'] = valid_signature 77 v = all((valid_client, valid_signature)) 81 log.info("Valid signature: %s", valid_signature)
|
H A D | resource.py | 141 valid_signature = self._check_signature(request) 148 request.validator_log['signature'] = valid_signature 156 valid_signature)) 162 log.info("Valid signature: %s", valid_signature)
|
H A D | request_token.py | 188 valid_signature = self._check_signature(request) 195 request.validator_log['signature'] = valid_signature 202 v = all((valid_client, valid_realm, valid_redirect, valid_signature)) 208 log.info("Valid signature: %s.", valid_signature)
|
H A D | access_token.py | 193 valid_signature = self._check_signature(request, is_token_request=True) 200 request.validator_log['signature'] = valid_signature 208 valid_signature)) 214 log.info("Valid signature:, %s", valid_signature)
|
/dports/security/py-oauthlib/oauthlib-1.1.2/oauthlib/oauth1/rfc5849/endpoints/ |
H A D | signature_only.py | 62 valid_signature = self._check_signature(request) 67 request.validator_log['signature'] = valid_signature 74 v = all((valid_client, valid_signature)) 78 log.info("Valid signature: %s", valid_signature)
|
H A D | resource.py | 143 valid_signature = self._check_signature(request) 150 request.validator_log['signature'] = valid_signature 158 valid_signature)) 164 log.info("Valid signature: %s", valid_signature)
|
H A D | request_token.py | 188 valid_signature = self._check_signature(request) 195 request.validator_log['signature'] = valid_signature 202 v = all((valid_client, valid_realm, valid_redirect, valid_signature)) 208 log.info("Valid signature: %s.", valid_signature)
|
H A D | access_token.py | 193 valid_signature = self._check_signature(request, is_token_request=True) 200 request.validator_log['signature'] = valid_signature 208 valid_signature)) 214 log.info("Valid signature:, %s", valid_signature)
|
/dports/security/py-securesystemslib/securesystemslib-124bb05d/tests/ |
H A D | test_ed25519_keys.py | 94 valid_signature = securesystemslib.ed25519_keys.verify_signature(public, 96 self.assertEqual(True, valid_signature) 99 valid_signature = securesystemslib.ed25519_keys.verify_signature(public, 101 self.assertEqual(True, valid_signature) 105 valid_signature = securesystemslib.ed25519_keys.verify_signature(public, 107 self.assertEqual(False, valid_signature)
|
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/oauthlib/oauth1/rfc5849/endpoints/ |
H A D | signature_only.py | 61 valid_signature = self._check_signature(request) 66 request.validator_log['signature'] = valid_signature 73 v = all((valid_client, valid_signature)) 77 log.info('Valid signature: %s', valid_signature)
|
H A D | resource.py | 151 valid_signature = self._check_signature(request) 158 request.validator_log['signature'] = valid_signature 165 v = all((valid_client, valid_resource_owner, valid_realm, valid_signature)) 171 log.info('Valid signature: %s', valid_signature)
|
H A D | request_token.py | 193 valid_signature = self._check_signature(request) 200 request.validator_log['signature'] = valid_signature 207 v = all((valid_client, valid_realm, valid_redirect, valid_signature)) 213 log.info('Valid signature: %s.', valid_signature)
|
H A D | access_token.py | 192 valid_signature = self._check_signature(request, is_token_request=True) 199 request.validator_log['signature'] = valid_signature 207 (valid_client, valid_resource_owner, valid_verifier, valid_signature)) 213 log.info('Valid signature:, %s', valid_signature)
|
H A D | base.py | 177 valid_signature = signature.verify_rsa_sha1(request, rsa_key) 198 valid_signature = signature.verify_hmac_sha1(request, client_secret, 201 valid_signature = signature.verify_plaintext(request, client_secret, 203 return valid_signature
|
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/oauthlib/oauth1/rfc5849/endpoints/ |
H A D | signature_only.py | 67 valid_signature = self._check_signature(request) 72 request.validator_log['signature'] = valid_signature 79 v = all((valid_client, valid_signature)) 83 log.info("Valid signature: %s", valid_signature)
|
H A D | resource.py | 143 valid_signature = self._check_signature(request) 150 request.validator_log['signature'] = valid_signature 158 valid_signature)) 164 log.info("Valid signature: %s", valid_signature)
|
H A D | request_token.py | 188 valid_signature = self._check_signature(request) 195 request.validator_log['signature'] = valid_signature 202 v = all((valid_client, valid_realm, valid_redirect, valid_signature)) 208 log.info("Valid signature: %s.", valid_signature)
|
H A D | access_token.py | 193 valid_signature = self._check_signature(request, is_token_request=True) 200 request.validator_log['signature'] = valid_signature 208 valid_signature)) 214 log.info("Valid signature:, %s", valid_signature)
|
H A D | base.py | 187 valid_signature = signature.verify_rsa_sha1(request, rsa_key) 208 valid_signature = signature.verify_hmac_sha1(request, 211 valid_signature = signature.verify_plaintext(request, 213 return valid_signature
|
/dports/security/oath-toolkit/oath-toolkit-2.6.2/libpskc/ |
H A D | sign.c | 144 xmlSecDSigCtxPtr dsigCtx, const char *cert_file, int *valid_signature) in verify() argument 177 *valid_signature = 1; in verify() 179 *valid_signature = 0; in verify() 196 int *valid_signature) in pskc_verify_x509crt() argument 217 rc = verify (container, mngr, dsigCtx, cert_file, valid_signature); in pskc_verify_x509crt()
|
/dports/security/py-securesystemslib/securesystemslib-124bb05d/securesystemslib/ |
H A D | ed25519_keys.py | 368 valid_signature = False 375 valid_signature = True 390 valid_signature = True 404 return valid_signature
|
/dports/devel/py-twilio/twilio-7.4.0/twilio/ |
H A D | request_validator.py | 107 valid_signature = False # Default fail 118 valid_signature = compare(self.compute_signature(uri_without_port, params), signature) 121 return valid_body_hash and (valid_signature or valid_signature_with_port)
|
/dports/security/oath-toolkit/oath-toolkit-2.6.2/pskctool/ |
H A D | pskctool.c | 146 int valid_signature; in verify() local 148 rc = pskc_verify_x509crt (container, verify_crt, &valid_signature); in verify() 152 if (quiet && !valid_signature) in verify() 154 if (!quiet && valid_signature) in verify()
|