Lines Matching refs:we
15 Within Juniper we use signing servers, which apart from signing things
55 The ``keyID`` we want later will be the last 8 octets
57 This is what we will use for looking up the key.
66 The public key ``ACA72B4719FD2523.pub.asc`` is what we want to
69 we want the trust anchor in a file named ``t*.asc``
97 All we need for this library is a copy of the PEM encoded root CA
107 For Junos we currently use EC DSA signatures with file extension
110 This was the first signature method we used with the remote signing
113 So for Junos we define VE_ECDSA_HASH_AGAIN which causes ``verify_ec``
116 Later I added a FakeHash class to the signing server so we could
135 Eg. for ``ta_openpgp.asc`` we use ``vc_openpgp.asc``
136 and for ``ta_rsa.pem`` we use ``vc_rsa.pem``.
138 Note for the X.509 case we simply extract the 2nd last certificate