Searched refs:signing (Results 1 – 25 of 43) sorted by relevance
12
72 private boolean signing; field in OpenSSLSignature91 if (signing) { in resetContext()119 if (signing) { in engineUpdate()161 if (signing) { in engineUpdate()196 private void initInternal(OpenSSLKey newKey, boolean signing) throws InvalidKeyException { in initInternal() argument200 this.signing = signing; in initInternal()
1 Magrathea: Glacier signing key2 Magrathea: Glacier signing key
10 signer: Magrathea: Glacier signing key22 signer: Magrathea: Glacier signing key
5 apply plugin: 'signing'61 signing {70 beforeDeployment { MavenDeployment deployment -> signing.signPom(deployment) }
48 Tools and scripts used to generate and use new signing keypairs. These are97 * Step 1: Generate RSA root and signing keys.103 The signing key can be between 1024-8192 bits.173 kernel signing key must be generated. The firmware signing generated above
20 signing {42 beforeDeployment { MavenDeployment deployment -> signing.signPom(deployment) }
3 apply plugin: 'signing'
9 of compiling, encrypting and signing these scripts with the `ls-cgt.jar` tool is a file containing11 the certificate for the signing key. This tool takes those signed, encrypted scripts and sends
2 # firmware and kernel versions to set during the signing process.
35 your OSSRH (OSS Repository Hosting) account and signing keys.50 # You need the signing properties only if you are making release deployment51 signing.keyId=<8-character-public-key-id>52 signing.password=<key-password>53 signing.secretKeyRingFile=<your-home-directory>/.gnupg/secring.gpg159 You'll also need to update `signing.secretKeyRingFile` in
39 apply plugin: "signing"111 signing {172 beforeDeployment { MavenDeployment deployment -> signing.signPom(deployment) }
9 signing key should be checked into the repository.
129 apply plugin: 'signing'148 signing {157 beforeDeployment { MavenDeployment deployment -> signing.signPom(deployment) }
13 This test verifies that a user's pkcs11 signing keys are preserved
14 This test stress tests and verifies that signing in via the UI (using Telemetry)
15 This test verifies that signing in via the UI (using Telemetry) works correctly.
13 This creates BASENAME.vbpubk and BASENAME.vbprivk pairs for use in signing
167 # the certificate can be used for anything *except* object signing.172 # For an object signing certificate this would be used.178 # and for everything including object signing:
104 # Leavings from module signing
4 * Add command for signing modules
237 # certificate not usable for signing certs238 CertPathReviewer.noCertSign.title = Key not usable for signing certificates239 …= The key usage constraint does not allow the use of this certificate key for signing certificates.240 CertPathReviewer.noCertSign.summary = The certificate key can not be used for signing certificates.241 …= The key usage constraint does not allow the use of this certificate key for signing certificates.443 # Issuer certificate key usage extension does not permit crl signing445 …er.noCrlSigningPermited.text = CRL checking failed: issuer certificate does not permit CRL signing.446 …noCrlSigningPermited.summary = CRL checking failed: issuer certificate does not permit CRL signing.447 …noCrlSigningPermited.details = CRL checking failed: issuer certificate does not permit CRL signing.
167 -h When signing a key, create a host certificate instead of a user171 Specify the key identity when signing a public key. Please see225 included in a certificate when signing a key. Multiple230 Specify a certificate option when signing a key. This option may335 Specify a validity interval when signing a certificate. A407 ssh-keygen supports signing of keys to produce certificates that may be
149 beforeDeployment { MavenDeployment deployment -> signing.signPom(deployment) }