content_signing_int.pem |
|
1082 |
content_signing_int.pem.certspec |
|
118 |
content_signing_onecrl_ee.pem |
|
839 |
content_signing_onecrl_ee.pem.certspec |
|
139 |
content_signing_onecrl_ee_expired.pem |
|
859 |
content_signing_onecrl_ee_expired.pem.certspec |
|
181 |
content_signing_onecrl_ee_not_valid_yet.pem |
|
867 |
content_signing_onecrl_ee_not_valid_yet.pem.certspec |
|
187 |
content_signing_onecrl_no_SAN_ee.pem |
|
798 |
content_signing_onecrl_no_SAN_ee.pem.certspec |
|
87 |
content_signing_onecrl_RSA_ee.pem |
|
1082 |
content_signing_onecrl_RSA_ee.pem.certspec |
|
122 |
content_signing_onecrl_wrong_key_ee.pem |
|
814 |
content_signing_onecrl_wrong_key_ee.pem.certspec |
|
149 |
content_signing_remote_newtab_ee.pem |
|
863 |
content_signing_remote_newtab_ee.pem.certspec |
|
156 |
pysign.py |
Create an ECDSA signature on the P-384 curve using the SHA-384 hash of data from
stdin. The key used for the signature is the secp384r1Encoded key used in pykey
and pycert.
The certificates for the content signature tests make use of this program.
You can use pysign.py like this:
cat test.txt | python pysign.py > test.txt.signature
|
1046 |
test.txt |
|
71 |
test.txt.signature |
|
129 |