Home
last modified time | relevance | path

Searched refs:valid_signature (Results 1 – 25 of 58) sorted by relevance

123

/dports/benchmarks/stress-ng/stress-ng-0.13.09/
H A Dstress-rseq.c62 uint32_t valid_signature; /* rseq valid signature */ member
66 static uint32_t valid_signature; variable
251 valid_signature = 0xbadc0de; in stress_rseq_oomable()
253 valid_signature = rseq_info->valid_signature; in stress_rseq_oomable()
288 ret = rseq_register(misaligned_seq, valid_signature); in stress_rseq_oomable()
290 (void)rseq_unregister(misaligned_seq, valid_signature); in stress_rseq_oomable()
296 (void)rseq_unregister(&invalid_seq, valid_signature); in stress_rseq_oomable()
299 (void)rseq_unregister(&invalid_seq, ~valid_signature); in stress_rseq_oomable()
302 (void)rseq_register(&restartable_seq, valid_signature); in stress_rseq_oomable()
303 (void)rseq_register(&restartable_seq, valid_signature); in stress_rseq_oomable()
[all …]
/dports/multimedia/tautulli/Tautulli-2.8.0/lib/oauthlib/oauth1/rfc5849/endpoints/
H A Dbase.py196 valid_signature = signature.verify_rsa_sha1(request, rsa_key)
198 valid_signature = signature.verify_rsa_sha256(request, rsa_key)
200 valid_signature = signature.verify_rsa_sha512(request, rsa_key)
202 valid_signature = False
231 valid_signature = signature.verify_hmac_sha1(
234 valid_signature = signature.verify_hmac_sha256(
237 valid_signature = signature.verify_hmac_sha512(
240 valid_signature = signature.verify_plaintext(
243 valid_signature = False
245 return valid_signature
H A Dsignature_only.py65 valid_signature = self._check_signature(request)
70 request.validator_log['signature'] = valid_signature
77 v = all((valid_client, valid_signature))
81 log.info("Valid signature: %s", valid_signature)
H A Dresource.py141 valid_signature = self._check_signature(request)
148 request.validator_log['signature'] = valid_signature
156 valid_signature))
162 log.info("Valid signature: %s", valid_signature)
H A Drequest_token.py188 valid_signature = self._check_signature(request)
195 request.validator_log['signature'] = valid_signature
202 v = all((valid_client, valid_realm, valid_redirect, valid_signature))
208 log.info("Valid signature: %s.", valid_signature)
H A Daccess_token.py193 valid_signature = self._check_signature(request, is_token_request=True)
200 request.validator_log['signature'] = valid_signature
208 valid_signature))
214 log.info("Valid signature:, %s", valid_signature)
/dports/security/py-oauthlib/oauthlib-1.1.2/oauthlib/oauth1/rfc5849/endpoints/
H A Dsignature_only.py62 valid_signature = self._check_signature(request)
67 request.validator_log['signature'] = valid_signature
74 v = all((valid_client, valid_signature))
78 log.info("Valid signature: %s", valid_signature)
H A Dresource.py143 valid_signature = self._check_signature(request)
150 request.validator_log['signature'] = valid_signature
158 valid_signature))
164 log.info("Valid signature: %s", valid_signature)
H A Drequest_token.py188 valid_signature = self._check_signature(request)
195 request.validator_log['signature'] = valid_signature
202 v = all((valid_client, valid_realm, valid_redirect, valid_signature))
208 log.info("Valid signature: %s.", valid_signature)
H A Daccess_token.py193 valid_signature = self._check_signature(request, is_token_request=True)
200 request.validator_log['signature'] = valid_signature
208 valid_signature))
214 log.info("Valid signature:, %s", valid_signature)
/dports/security/py-securesystemslib/securesystemslib-124bb05d/tests/
H A Dtest_ed25519_keys.py94 valid_signature = securesystemslib.ed25519_keys.verify_signature(public,
96 self.assertEqual(True, valid_signature)
99 valid_signature = securesystemslib.ed25519_keys.verify_signature(public,
101 self.assertEqual(True, valid_signature)
105 valid_signature = securesystemslib.ed25519_keys.verify_signature(public,
107 self.assertEqual(False, valid_signature)
/dports/net/google-cloud-sdk/google-cloud-sdk/lib/third_party/oauthlib/oauth1/rfc5849/endpoints/
H A Dsignature_only.py61 valid_signature = self._check_signature(request)
66 request.validator_log['signature'] = valid_signature
73 v = all((valid_client, valid_signature))
77 log.info('Valid signature: %s', valid_signature)
H A Dresource.py151 valid_signature = self._check_signature(request)
158 request.validator_log['signature'] = valid_signature
165 v = all((valid_client, valid_resource_owner, valid_realm, valid_signature))
171 log.info('Valid signature: %s', valid_signature)
H A Drequest_token.py193 valid_signature = self._check_signature(request)
200 request.validator_log['signature'] = valid_signature
207 v = all((valid_client, valid_realm, valid_redirect, valid_signature))
213 log.info('Valid signature: %s.', valid_signature)
H A Daccess_token.py192 valid_signature = self._check_signature(request, is_token_request=True)
199 request.validator_log['signature'] = valid_signature
207 (valid_client, valid_resource_owner, valid_verifier, valid_signature))
213 log.info('Valid signature:, %s', valid_signature)
H A Dbase.py177 valid_signature = signature.verify_rsa_sha1(request, rsa_key)
198 valid_signature = signature.verify_hmac_sha1(request, client_secret,
201 valid_signature = signature.verify_plaintext(request, client_secret,
203 return valid_signature
/dports/net-p2p/bazarr/bazarr-1.0.2/libs/oauthlib/oauth1/rfc5849/endpoints/
H A Dsignature_only.py67 valid_signature = self._check_signature(request)
72 request.validator_log['signature'] = valid_signature
79 v = all((valid_client, valid_signature))
83 log.info("Valid signature: %s", valid_signature)
H A Dresource.py143 valid_signature = self._check_signature(request)
150 request.validator_log['signature'] = valid_signature
158 valid_signature))
164 log.info("Valid signature: %s", valid_signature)
H A Drequest_token.py188 valid_signature = self._check_signature(request)
195 request.validator_log['signature'] = valid_signature
202 v = all((valid_client, valid_realm, valid_redirect, valid_signature))
208 log.info("Valid signature: %s.", valid_signature)
H A Daccess_token.py193 valid_signature = self._check_signature(request, is_token_request=True)
200 request.validator_log['signature'] = valid_signature
208 valid_signature))
214 log.info("Valid signature:, %s", valid_signature)
H A Dbase.py187 valid_signature = signature.verify_rsa_sha1(request, rsa_key)
208 valid_signature = signature.verify_hmac_sha1(request,
211 valid_signature = signature.verify_plaintext(request,
213 return valid_signature
/dports/security/oath-toolkit/oath-toolkit-2.6.2/libpskc/
H A Dsign.c144 xmlSecDSigCtxPtr dsigCtx, const char *cert_file, int *valid_signature) in verify() argument
177 *valid_signature = 1; in verify()
179 *valid_signature = 0; in verify()
196 int *valid_signature) in pskc_verify_x509crt() argument
217 rc = verify (container, mngr, dsigCtx, cert_file, valid_signature); in pskc_verify_x509crt()
/dports/security/py-securesystemslib/securesystemslib-124bb05d/securesystemslib/
H A Ded25519_keys.py368 valid_signature = False
375 valid_signature = True
390 valid_signature = True
404 return valid_signature
/dports/devel/py-twilio/twilio-7.4.0/twilio/
H A Drequest_validator.py107 valid_signature = False # Default fail
118 valid_signature = compare(self.compute_signature(uri_without_port, params), signature)
121 return valid_body_hash and (valid_signature or valid_signature_with_port)
/dports/security/oath-toolkit/oath-toolkit-2.6.2/pskctool/
H A Dpskctool.c146 int valid_signature; in verify() local
148 rc = pskc_verify_x509crt (container, verify_crt, &valid_signature); in verify()
152 if (quiet && !valid_signature) in verify()
154 if (!quiet && valid_signature) in verify()

123