Searched refs:signature (Results 1 – 9 of 9) sorted by relevance
/dokuwiki/vendor/kissifrot/php-ixr/src/Server/ |
H A D | IntrospectionServer.php | 68 // Over-rides default call method, adds signature check 74 $signature = $this->signatures[$methodname]; 75 array_shift($signature); 78 if (count($args) != count($signature)) { 87 $type = array_shift($signature);
|
/dokuwiki/inc/ |
H A D | Mailer.class.php | 217 $html = preg_replace('/\n-- <br \/>.*$/s', '', $html); //strip signature 677 $signature = str_replace( 682 $this->replacements['text']['EMAILSIGNATURE'] = "\n-- \n" . $signature . "\n"; 695 $signature = $lang['email_signature_text']; 697 $signature = $lang['email_signature_html']; 699 $signature = str_replace( 702 $signature 704 $this->replacements['html']['EMAILSIGNATURE'] = $signature;
|
H A D | JpegMeta.php | 1000 // Check for the JPEG signature 1159 // Check for the JPEG signature 1435 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 4); 1436 if ($signature == 'JFIF') { 1574 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 29); 1575 if ($signature == "http://ns.adobe.com/xap/1.0/\0") { 1681 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 6); 1682 if ($signature == "Exif\0\0") { 1962 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 6); 1963 if ($signature [all...] |
/dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Net/ |
H A D | SSH2.php | 63 use phpseclib3\Crypt\TripleDES; // Used to do Diffie-Hellman key exchange and DSA/RSA signature verification. 728 * Server signature 735 private $signature = ''; 738 * Server signature format 804 * Has the signature been validated? 1816 $this->signature 1833 if (strlen($this->signature) < 4) { 1834 throw new \LengthException('The signature needs at least four bytes'); 1836 $temp = unpack('Nlength', substr($this->signature, 0, 4)); 1837 $this->signature_format = substr($this->signature, 671 var $signature = ''; global() variable in phpseclib\\Net\\SSH2 [all...] |
/dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Crypt/ |
H A D | RSA.php | 34 * $signature = $private->sign($plaintext); 36 * echo $public->verify($plaintext, $signature) ? 'verified' : 'unverified'; 128 * Use a relaxed version of PKCS#1 padding for signature verification 137 * Use PKCS#1 padding for signature verification 697 * Used with signature production / verification and (if the encryption mode is self::PADDING_OAEP) encryption and 872 throw new InconsistentSetupException('Multiple signature padding modes have been selected; at most only one should be selected'); 3301 verify($message, $signature) global() argument
|
/dokuwiki/vendor/phpseclib/phpseclib/phpseclib/File/ |
H A D | X509.php | 13 * Note that loading an X.509 certificate and resaving it may invalidate the signature. The reason being that the signature is based on a 16 * be encoded. It can be encoded explicitly or left out all together. This would effect the signature value and thus may invalidate the 177 * The signature subject 180 * encoded so we take save the portion of the original cert that the signature would have made for. 524 $cert['tbsCertificate']['signature']['parameters'] = null; 529 $filters['tbsCertificate']['signature']['parameters'] = $type_utf8_string; 530 $filters['tbsCertificate']['signature']['issuer']['rdnSequence']['value'] = $type_utf8_string; 1235 * Validate a signature 1238 * Returns true if the signature i 2428 _validateSignature($publicKeyAlgorithm, $publicKey, $signatureAlgorithm, $signature, $signatureSubject) global() argument [all...] |
/dokuwiki/vendor/geshi/geshi/ |
H A D | LICENSE | 332 <signature of Ty Coon>, 1 April 1989
|
/dokuwiki/ |
H A D | COPYING | 332 <signature of Ty Coon>, 1 April 1989
|
/dokuwiki/vendor/simplepie/simplepie/idn/ |
H A D | LICENCE | 499 <signature of Ty Coon>, 1 April 1990
|