/macosx-10.10/Security-57031.1.35/Security/libsecurity_asn1/security_asn1/ |
H A D | X509Templates.c | 97 offsetof(NSS_TBSCertificate,signature), 139 offsetof(NSS_SignedCertOrCRL,signature) }, 155 offsetof(NSS_Certificate,signature) }, 186 offsetof(NSS_TBSCrl,signature), 220 offsetof(NSS_Crl,signature) },
|
/macosx-10.10/Security-57031.1.35/securityd/tests/ |
H A D | testcrypto.cpp | 81 CssmData signature; local 85 ss.generateSignature(signContext, privateKey, data, signature); 88 // verify the signature (local) 92 verifier.verify(data, signature); 96 // verify the signature (SS) 97 ss.verifySignature(signContext, publicKey, data, signature); 100 // falsify the signature (SS) 106 ss.verifySignature(signContext, publicKey, falseData, signature);
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-core-2.5.1/Modules/objc/ |
H A D | bundle-variables.m | 143 char* signature; 163 &py_name, &signature)) { 184 PyObject* pyVal = pythonify_c_value(signature, value); 255 char* signature; 278 PyObjCObject_Convert, &name, &signature, &doc, &meta)){ 298 &c_name, &signature, &doc, &meta)){ 322 signature, 402 char* signature; 424 &name, &signature, 449 signature, [all...] |
/macosx-10.10/hfs-285/fsck_hfs/dfalib/ |
H A D | BlockCache.c | 59 UInt16 signature; local 88 signature = SWAP_BE16(mdb->drSigWord); 89 if (signature == kHFSPlusSigWord || signature == kHFSXSigWord) 91 else if (signature == kHFSSigWord) 112 UInt16 signature; local 122 signature = ((HFSMasterDirectoryBlock *)block->buffer)->drSigWord; 123 if (signature == kHFSPlusSigWord || signature == kHFSXSigWord) 125 else if (signature [all...] |
/macosx-10.10/libarchive-30/libarchive/libarchive/ |
H A D | archive_read_support_compression_program.c | 75 const char *cmd, void *signature, size_t signature_len) 79 (void)signature; /* UNUSED */ 103 * The bidder object stores the command and the signature to watch for. 109 void *signature; member in struct:program_bidder 139 const char *cmd, const void *signature, size_t signature_len) 159 if (signature != NULL && signature_len > 0) { 161 state->signature = malloc(signature_len); 162 memcpy(state->signature, signature, signature_len); 181 free(state->signature); 74 archive_read_support_compression_program_signature(struct archive *_a, const char *cmd, void *signature, size_t signature_len) argument 138 archive_read_support_compression_program_signature(struct archive *_a, const char *cmd, const void *signature, size_t signature_len) argument [all...] |
/macosx-10.10/ruby-106/ruby/test/rdoc/ |
H A D | test_rdoc_tom_doc.rb | 51 signature = @TD.signature c 53 assert_equal "method_<here>(args)\n", signature 65 signature = @TD.signature c 67 assert_equal "method_<here>(args)\n", signature 84 assert_nil @TD.signature c 97 signature = @TD.signature c 99 assert_nil signature [all...] |
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-core/Modules/objc/ |
H A D | bundle-variables.m | 143 char* signature; 156 PyObjCObject_Convert, &name, &signature)) { 179 PyObject* pyVal = pythonify_c_value(signature, value); 246 char* signature; 262 PyObjCObject_Convert, &name, &signature, &doc, &meta)){ 288 signature, 368 char* signature; 384 &name, &signature, &doc, &meta)){ 402 signature,
|
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-core/Modules/objc/ |
H A D | bundle-variables.m | 143 char* signature; 163 &py_name, &signature)) { 184 PyObject* pyVal = pythonify_c_value(signature, value); 251 char* signature; 272 PyObjCObject_Convert, &name, &signature, &doc, &meta)){ 298 signature, 378 char* signature; 400 &name, &signature, &doc, &meta)){ 417 signature,
|
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | test_soft_pkcs11.c | 77 static char signature[1024]; variable 163 ck_sigsize = sizeof(signature); 165 (CK_BYTE *)signature, &ck_sigsize); 175 ret = (*func->C_Verify)(session, (CK_BYTE *)signature, ck_sigsize, 196 ck_sigsize = sizeof(signature); 198 (CK_BYTE *)signature, &ck_sigsize); 209 ret = (*func->C_Decrypt)(session, (CK_BYTE *)signature, ck_sigsize,
|
/macosx-10.10/emacs-93/emacs/lisp/ |
H A D | pgg-pgp.el | 174 "Make detached signature from text between START and END. 202 (defun pgg-pgp-verify-region (start end &optional signature) 203 "Verify region between START and END as the detached signature SIGNATURE." 214 (if (stringp signature) 216 (copy-file signature (setq signature (concat orig-file ".asc"))) 217 (setq args (concat args " " (shell-quote-argument signature))))) 221 (if signature (delete-file signature))
|
H A D | pgg-pgp5.el | 184 "Make detached signature from text between START and END." 208 (defun pgg-pgp5-verify-region (start end &optional signature) 209 "Verify region between START and END as the detached signature SIGNATURE." 220 (when (stringp signature) 221 (copy-file signature (setq signature (concat orig-file ".asc"))) 222 (setq args (append args (list signature)))) 225 (if signature (delete-file signature)) 228 (if (re-search-forward "^Good signature" ni [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/gke/ |
H A D | gkgenerate | 57 signature = data.signatures[auth.path].signature.data 59 (stdout, stderr) = unpack.communicate(input=signature) 61 fail("signature unpack failed for %s" % auth.path) 109 # The signatures are written as tightly packed signature blobs 114 sigblobs.write(sigdata["signature"].data) 116 print "Wrote %d signature record(s) to %s" % (len(sigs), sigsfile)
|
/macosx-10.10/WebKit2-7600.1.25/UIProcess/ios/ |
H A D | WKScrollView.mm | 61 NSMethodSignature *signature = [super methodSignatureForSelector:aSelector]; 62 if (!signature) 63 signature = [(NSObject *)_internalDelegate methodSignatureForSelector:aSelector]; 64 if (!signature) 65 signature = [(NSObject *)_externalDelegate methodSignatureForSelector:aSelector]; 66 return signature;
|
/macosx-10.10/smb-759.0/lib/smb/ |
H A D | subr.c | 112 void LogToMessageTracer(const char *domain, const char *signature, argument 119 if ( (domain == NULL) || (signature == NULL) || (fmt == NULL) ) { 120 /* domain, signature and msg are required */ 126 asl_set(m, "com.apple.message.signature", signature);
|
/macosx-10.10/bootp-298/IPConfiguration.bproj/ |
H A D | stf.c | 75 CFStringRef signature; /* signature of IPv4 service */ member in struct:__anon6957 131 if (stf->signature != NULL) { 134 stf->signature); 272 CFStringRef signature = NULL; local 301 signature = CFDictionaryGetValue(dict, kNetworkSignature); 302 signature = isA_CFString(signature); 312 if (ret_signature != NULL && signature != NULL) { 313 *ret_signature = CFRetain(signature); 362 CFStringRef signature = NULL; local [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmssiginfo.c | 324 SecAsn1Item signature = { 0 }; local 383 /* Fortezza MISSI have weird signature formats. 415 * the hash/signature. We do this here, rather than building 433 rv = SEC_SignData(&signature, encoded_attrs.Data, encoded_attrs.Length, 436 signature.Length = SecKeyGetSize(privkey, kSecKeySignatureSize); 437 signature.Data = PORT_ZAlloc(signature.Length); 438 if (!signature.Data) { 439 signature.Length = 0; 442 rv = SecKeyDigestAndSign(privkey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signature [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmssiginfo.c | 324 SecAsn1Item signature = { 0 }; local 383 /* Fortezza MISSI have weird signature formats. 415 * the hash/signature. We do this here, rather than building 433 rv = SEC_SignData(&signature, encoded_attrs.Data, encoded_attrs.Length, 436 signature.Length = SecKeyGetSize(privkey, kSecKeySignatureSize); 437 signature.Data = PORT_ZAlloc(signature.Length); 438 if (!signature.Data) { 439 signature.Length = 0; 442 rv = SecKeyDigestAndSign(privkey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signature [all...] |
/macosx-10.10/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmssiginfo.c | 324 SecAsn1Item signature = { 0 }; local 383 /* Fortezza MISSI have weird signature formats. 415 * the hash/signature. We do this here, rather than building 433 rv = SEC_SignData(&signature, encoded_attrs.Data, encoded_attrs.Length, 436 signature.Length = SecKeyGetSize(privkey, kSecKeySignatureSize); 437 signature.Data = PORT_ZAlloc(signature.Length); 438 if (!signature.Data) { 439 signature.Length = 0; 442 rv = SecKeyDigestAndSign(privkey, &signerinfo->digestAlg, encoded_attrs.Data, encoded_attrs.Length, signature [all...] |
/macosx-10.10/ICU-531.30/icuSources/common/ |
H A D | utrie2_impl.h | 33 * UTrie and UTrie2 signature values, 52 uint32_t signature; member in struct:UTrie2Header
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | kexdhs.c | 60 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local 151 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash, 161 packet_put_string(signature, slen); 164 xfree(signature);
|
H A D | kexecdhc.c | 57 u_char *server_host_key_blob = NULL, *signature = NULL; local 109 signature = packet_get_string(&slen); 146 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 149 xfree(signature);
|
H A D | kexecdhs.c | 59 u_char *server_host_key_blob = NULL, *signature = NULL; local 145 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, 155 packet_put_string(signature, slen); 158 xfree(signature);
|
H A D | kexgexc.c | 59 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local 152 signature = packet_get_string(&slen); 196 if (key_verify(server_host_key, signature, slen, hash, hashlen) != 1) 199 xfree(signature);
|
H A D | kexgexs.c | 63 u_char *kbuf, *hash, *signature = NULL, *server_host_key_blob = NULL; local 194 if (PRIVSEP(key_sign(server_host_private, &signature, &slen, hash, 205 packet_put_string(signature, slen); 208 xfree(signature);
|
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_req.c | 108 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
|