/dokuwiki/vendor/phpseclib/phpseclib/phpseclib/System/SSH/Agent/ |
H A D | Identity.php | 44 // Signature Flags 74 * Signature flags 222 * Determines the signature padding mode 231 throw new UnsupportedAlgorithmException('Only DSA and EC keys support signature format setting'); 257 * Create a signature 259 * See "2.6.2 Protocol 2 private key signature request" 286 throw new \RuntimeException('Unable to retrieve signature');
|
/dokuwiki/vendor/kissifrot/php-ixr/src/Server/ |
H A D | IntrospectionServer.php | 68 // Over-rides default call method, adds signature check 74 $signature = $this->signatures[$methodname]; 75 array_shift($signature); 78 if (count($args) != count($signature)) { 87 $type = array_shift($signature);
|
/dokuwiki/inc/ |
H A D | Mailer.class.php | 217 $html = preg_replace('/\n-- <br \/>.*$/s', '', $html); //strip signature 677 $signature = str_replace( 682 $this->replacements['text']['EMAILSIGNATURE'] = "\n-- \n" . $signature . "\n"; 695 $signature = $lang['email_signature_text']; 697 $signature = $lang['email_signature_html']; 699 $signature = str_replace( 702 $signature 704 $this->replacements['html']['EMAILSIGNATURE'] = $signature;
|
H A D | toolbar.php | 241 'type' => 'signature', 257 * prepares the signature string as configured in the config 268 $sig = $conf['signature'];
|
H A D | JpegMeta.php | 1000 // Check for the JPEG signature 1159 // Check for the JPEG signature 1435 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 4); 1436 if ($signature == 'JFIF') { 1574 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 29); 1575 if ($signature == "http://ns.adobe.com/xap/1.0/\0") { 1681 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 6); 1682 if ($signature == "Exif\0\0") { 1962 $signature = $this->_getFixedString($this->_markers[$i]['data'], 0, 6); 1963 if ($signature [all...] |
/dokuwiki/vendor/phpseclib/phpseclib/phpseclib/File/ |
H A D | X509.php | 13 * Note that loading an X.509 certificate and resaving it may invalidate the signature. The reason being that the signature is based on a 16 * be encoded. It can be encoded explicitly or left out all together. This would effect the signature value and thus may invalidate the 177 * The signature subject 180 * encoded so we take save the portion of the original cert that the signature would have made for. 524 $cert['tbsCertificate']['signature']['parameters'] = null; 529 $filters['tbsCertificate']['signature']['parameters'] = $type_utf8_string; 530 $filters['tbsCertificate']['signature']['issuer']['rdnSequence']['value'] = $type_utf8_string; 1235 * Validate a signature 1238 * Returns true if the signature i 2428 _validateSignature($publicKeyAlgorithm, $publicKey, $signatureAlgorithm, $signature, $signatureSubject) global() argument [all...] |
/dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Net/ |
H A D | SSH2.php | 63 use phpseclib3\Crypt\TripleDES; // Used to do Diffie-Hellman key exchange and DSA/RSA signature verification. 728 * Server signature 735 private $signature = ''; 738 * Server signature format 804 * Has the signature been validated? 1013 * Preferred Signature Format 1816 $this->signature 1833 if (strlen($this->signature) < 4) { 1834 throw new \LengthException('The signature needs at least four bytes'); 1836 $temp = unpack('Nlength', substr($this->signature, 671 var $signature = ''; global() variable in phpseclib\\Net\\SSH2 [all...] |
/dokuwiki/vendor/phpseclib/phpseclib/phpseclib/Crypt/ |
H A D | RSA.php | 34 * $signature = $private->sign($plaintext); 36 * echo $public->verify($plaintext, $signature) ? 'verified' : 'unverified'; 114 * Use the Probabilistic Signature Scheme for signing 128 * Use a relaxed version of PKCS#1 padding for signature verification 137 * Use PKCS#1 padding for signature verification 153 * Signature padding mode 697 * Used with signature production / verification and (if the encryption mode is self::PADDING_OAEP) encryption and 872 throw new InconsistentSetupException('Multiple signature padding modes have been selected; at most only one should be selected'); 3301 verify($message, $signature) global() argument
|
/dokuwiki/vendor/geshi/geshi/src/geshi/ |
H A D | standardml.php | 75 'rec', 'raise', 'sharing', 'sig', 'signature', 'struct', 'structure', 'then', 117 /* functor signature > http://www.smlnj.org/doc/features.html */
|
H A D | whois.php | 82 'route6','rtr-set','signature','source','status','sub-dom','tech-c',
|
H A D | email.php | 65 'Disposition-Notification-To','DKIM-Signature',
|
H A D | kotlin.php | 757 'ShortSeqHolder', 'Signature', 'SignatureException',
|
H A D | java.php | 773 'ShortSeqHolder', 'Signature', 'SignatureException',
|
H A D | racket.php | 722 'define-serializable-class*', 'define-signature', 723 'define-signature-form', 'define-struct/contract', 'define-unit', 772 'provide-signature-elements', 'provide/contract', 'public',
|
H A D | groovy.php | 759 'ShortSeqHolder', 'Signature', 'SignatureException',
|
H A D | progress.php | 162 'GET-SELECTED-widget','GET-SERIALIZED','GET-SIGNATURE','GET-SOCKET-OPTION',
|
H A D | wolfram.php | 749 'ShowCellTags', 'ShowClosedCellArea', 'ShowContents', 'Signature',
|
/dokuwiki/conf/ |
H A D | dokuwiki.php | 39 $conf['signature'] = ' --- //[[@MAIL@|@NAME@]] @DATE@//'; //signature see wiki page for details
|
/dokuwiki/lib/scripts/ |
H A D | edit.js | 135 * Add button action for signature button
|
/dokuwiki/vendor/splitbrain/php-archive/src/ |
H A D | Zip.php | 481 $this->writebytes("\x50\x4b\x05\x06"); // end of central dir signature 915 $header = "\x50\x4b\x01\x02"; // central file header signature 962 $header = "\x50\x4b\x03\x04"; // local file header signature
|
/dokuwiki/lib/plugins/config/settings/ |
H A D | config.metadata.php | 108 $meta['signature'] = ['string'];
|
/dokuwiki/vendor/geshi/geshi/ |
H A D | LICENSE | 332 <signature of Ty Coon>, 1 April 1989
|
/dokuwiki/ |
H A D | COPYING | 332 <signature of Ty Coon>, 1 April 1989
|
/dokuwiki/vendor/composer/ |
H A D | installed.json | 419 "signature",
|
/dokuwiki/vendor/simplepie/simplepie/idn/ |
H A D | LICENCE | 499 <signature of Ty Coon>, 1 April 1990
|