Searched refs:signature (Results 126 - 150 of 654) sorted by relevance

1234567891011>>

/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/
H A DX509Templates.c97 offsetof(NSS_TBSCertificate,signature),
139 offsetof(NSS_SignedCertOrCRL,signature) },
155 offsetof(NSS_Certificate,signature) },
186 offsetof(NSS_TBSCrl,signature),
220 offsetof(NSS_Crl,signature) },
/macosx-10.10/Security-57031.1.35/securityd/tests/
H A Dtestcrypto.cpp81 CssmData signature; local
85 ss.generateSignature(signContext, privateKey, data, signature);
88 // verify the signature (local)
92 verifier.verify(data, signature);
96 // verify the signature (SS)
97 ss.verifySignature(signContext, publicKey, data, signature);
100 // falsify the signature (SS)
106 ss.verifySignature(signContext, publicKey, falseData, signature);
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-core-2.5.1/Modules/objc/
H A Dbundle-variables.m143 char* signature;
163 &py_name, &signature)) {
184 PyObject* pyVal = pythonify_c_value(signature, value);
255 char* signature;
278 PyObjCObject_Convert, &name, &signature, &doc, &meta)){
298 &c_name, &signature, &doc, &meta)){
322 signature,
402 char* signature;
424 &name, &signature,
449 signature,
[all...]
/macosx-10.10/hfs-285/fsck_hfs/dfalib/
H A DBlockCache.c59 UInt16 signature; local
88 signature = SWAP_BE16(mdb->drSigWord);
89 if (signature == kHFSPlusSigWord || signature == kHFSXSigWord)
91 else if (signature == kHFSSigWord)
112 UInt16 signature; local
122 signature = ((HFSMasterDirectoryBlock *)block->buffer)->drSigWord;
123 if (signature == kHFSPlusSigWord || signature == kHFSXSigWord)
125 else if (signature
[all...]
/macosx-10.10/libarchive-30/libarchive/libarchive/
H A Darchive_read_support_compression_program.c75 const char *cmd, void *signature, size_t signature_len)
79 (void)signature; /* UNUSED */
103 * The bidder object stores the command and the signature to watch for.
109 void *signature; member in struct:program_bidder
139 const char *cmd, const void *signature, size_t signature_len)
159 if (signature != NULL && signature_len > 0) {
161 state->signature = malloc(signature_len);
162 memcpy(state->signature, signature, signature_len);
181 free(state->signature);
74 archive_read_support_compression_program_signature(struct archive *_a, const char *cmd, void *signature, size_t signature_len) argument
138 archive_read_support_compression_program_signature(struct archive *_a, const char *cmd, const void *signature, size_t signature_len) argument
[all...]
/macosx-10.10/ruby-106/ruby/test/rdoc/
H A Dtest_rdoc_tom_doc.rb51 signature = @TD.signature c
53 assert_equal "method_<here>(args)\n", signature
65 signature = @TD.signature c
67 assert_equal "method_<here>(args)\n", signature
84 assert_nil @TD.signature c
97 signature = @TD.signature c
99 assert_nil signature
[all...]
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-core/Modules/objc/
H A Dbundle-variables.m143 char* signature;
156 PyObjCObject_Convert, &name, &signature)) {
179 PyObject* pyVal = pythonify_c_value(signature, value);
246 char* signature;
262 PyObjCObject_Convert, &name, &signature, &doc, &meta)){
288 signature,
368 char* signature;
384 &name, &signature, &doc, &meta)){
402 signature,
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-core/Modules/objc/
H A Dbundle-variables.m143 char* signature;
163 &py_name, &signature)) {
184 PyObject* pyVal = pythonify_c_value(signature, value);
251 char* signature;
272 PyObjCObject_Convert, &name, &signature, &doc, &meta)){
298 signature,
378 char* signature;
400 &name, &signature, &doc, &meta)){
417 signature,
/macosx-10.10/Heimdal-398.1.2/lib/hx509/
H A Dtest_soft_pkcs11.c77 static char signature[1024]; variable
163 ck_sigsize = sizeof(signature);
165 (CK_BYTE *)signature, &ck_sigsize);
175 ret = (*func->C_Verify)(session, (CK_BYTE *)signature, ck_sigsize,
196 ck_sigsize = sizeof(signature);
198 (CK_BYTE *)signature, &ck_sigsize);
209 ret = (*func->C_Decrypt)(session, (CK_BYTE *)signature, ck_sigsize,
/macosx-10.10/emacs-93/emacs/lisp/
H A Dpgg-pgp.el174 "Make detached signature from text between START and END.
202 (defun pgg-pgp-verify-region (start end &optional signature)
203 "Verify region between START and END as the detached signature SIGNATURE."
214 (if (stringp signature)
216 (copy-file signature (setq signature (concat orig-file ".asc")))
217 (setq args (concat args " " (shell-quote-argument signature)))))
221 (if signature (delete-file signature))
H A Dpgg-pgp5.el184 "Make detached signature from text between START and END."
208 (defun pgg-pgp5-verify-region (start end &optional signature)
209 "Verify region between START and END as the detached signature SIGNATURE."
220 (when (stringp signature)
221 (copy-file signature (setq signature (concat orig-file ".asc")))
222 (setq args (append args (list signature))))
225 (if signature (delete-file signature))
228 (if (re-search-forward "^Good signature" ni
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/gke/
H A Dgkgenerate57 signature = data.signatures[auth.path].signature.data
59 (stdout, stderr) = unpack.communicate(input=signature)
61 fail("signature unpack failed for %s" % auth.path)
109 # The signatures are written as tightly packed signature blobs
114 sigblobs.write(sigdata["signature"].data)
116 print "Wrote %d signature record(s) to %s" % (len(sigs), sigsfile)
/macosx-10.10/WebKit2-7600.1.25/UIProcess/ios/
H A DWKScrollView.mm61 NSMethodSignature *signature = [super methodSignatureForSelector:aSelector];
62 if (!signature)
63 signature = [(NSObject *)_internalDelegate methodSignatureForSelector:aSelector];
64 if (!signature)
65 signature = [(NSObject *)_externalDelegate methodSignatureForSelector:aSelector];
66 return signature;
/macosx-10.10/smb-759.0/lib/smb/
H A Dsubr.c112 void LogToMessageTracer(const char *domain, const char *signature, argument
119 if ( (domain == NULL) || (signature == NULL) || (fmt == NULL) ) {
120 /* domain, signature and msg are required */
126 asl_set(m, "com.apple.message.signature", signature);
/macosx-10.10/bootp-298/IPConfiguration.bproj/
H A Dstf.c75 CFStringRef signature; /* signature of IPv4 service */ member in struct:__anon6957
131 if (stf->signature != NULL) {
134 stf->signature);
272 CFStringRef signature = NULL; local
301 signature = CFDictionaryGetValue(dict, kNetworkSignature);
302 signature = isA_CFString(signature);
312 if (ret_signature != NULL && signature != NULL) {
313 *ret_signature = CFRetain(signature);
362 CFStringRef signature = NULL; local
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/
H A Dcmssiginfo.c324 SecAsn1Item signature = { 0 }; local
383 /* Fortezza MISSI have weird signature formats.
415 * the hash/signature. We do this here, rather than building
433 rv = SEC_SignData(&signature, encoded_attrs.Data, encoded_attrs.Length,
436 signature.Length = SecKeyGetSize(privkey, kSecKeySignatureSize);
437 signature.Data = PORT_ZAlloc(signature.Length);
438 if (!signature.Data) {
439 signature.Length = 0;
442 rv = SecKeyDigestAndSign(privkey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signature
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/
H A Dcmssiginfo.c324 SecAsn1Item signature = { 0 }; local
383 /* Fortezza MISSI have weird signature formats.
415 * the hash/signature. We do this here, rather than building
433 rv = SEC_SignData(&signature, encoded_attrs.Data, encoded_attrs.Length,
436 signature.Length = SecKeyGetSize(privkey, kSecKeySignatureSize);
437 signature.Data = PORT_ZAlloc(signature.Length);
438 if (!signature.Data) {
439 signature.Length = 0;
442 rv = SecKeyDigestAndSign(privkey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signature
[all...]
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/
H A Dcmssiginfo.c324 SecAsn1Item signature = { 0 }; local
383 /* Fortezza MISSI have weird signature formats.
415 * the hash/signature. We do this here, rather than building
433 rv = SEC_SignData(&signature, encoded_attrs.Data, encoded_attrs.Length,
436 signature.Length = SecKeyGetSize(privkey, kSecKeySignatureSize);
437 signature.Data = PORT_ZAlloc(signature.Length);
438 if (!signature.Data) {
439 signature.Length = 0;
442 rv = SecKeyDigestAndSign(privkey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signature
[all...]
/macosx-10.10/ICU-531.30/icuSources/common/
H A Dutrie2_impl.h33 * UTrie and UTrie2 signature values,
52 uint32_t signature; member in struct:UTrie2Header
/macosx-10.10/OpenSSH-189/openssh/
H A Dkexdhs.c60 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local
151 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash,
161 packet_put_string(signature, slen);
164 xfree(signature);
H A Dkexecdhc.c57 u_char *server_host_key_blob = NULL, *signature = NULL; local
109 signature = packet_get_string(&slen);
146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
149 xfree(signature);
H A Dkexecdhs.c59 u_char *server_host_key_blob = NULL, *signature = NULL; local
145 if (PRIVSEP(key_sign(server_host_private, &signature, &slen,
155 packet_put_string(signature, slen);
158 xfree(signature);
H A Dkexgexc.c59 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local
152 signature = packet_get_string(&slen);
196 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1)
199 xfree(signature);
H A Dkexgexs.c63 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local
194 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash,
205 packet_put_string(signature, slen);
208 xfree(signature);
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/
H A Dx_req.c108 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)

Completed in 728 milliseconds

1234567891011>>