/macosx-10.10/pyobjc-45/pyobjc/pyobjc-core-2.5.1/PyObjCTest/ |
H A D | test_callbacks.py | 178 self.assertEqual(OC_CallbackTest.selWithSEL_SEL_andObject_.signature, 191 self.assertEqual(selector.signature, b"q@:q") 199 self.assertEqual(selector.signature, b"q@:q") 205 self.assertEqual(selector.signature, b"v@:@@^v")
|
H A D | test_regr.py | 27 someRectWithRect_ = objc.selector(someRectWithRect_, signature=rct + b'@:' + rct) 78 self.assertEqual(objc.splitSignature(o.onewayVoidMethod.signature), (objc._C_ONEWAY + objc._C_VOID, objc._C_ID, objc._C_SEL)) 136 self.assertEqual(imp.signature, b'i@:f') 139 self.assertEqual(sel.signature, b'i@:f')
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-Cocoa-2.5.1/Examples/AppKit/SimpleService/ |
H A D | ServiceTest.py | 7 # this is the signature of service selectors 8 return objc.selector(fn, signature="v@:@@o^@")
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-Cocoa-2.5.1/Examples/AppKit/TinyURLService/ |
H A D | TinyURLService.py | 10 # this is the signature of service selectors 11 return objc.selector(fn, signature="v@:@@o^@")
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-framework-Cocoa-2.5.1/PyObjCTest/ |
H A D | test_cfsocket.py | 161 signature = CFSocketSignature( 167 sock = CFSocketCreateWithSocketSignature(None, signature, 171 signature = CFSocketSignature( 176 sock = CFSocketCreateConnectedToSocketSignature(None, signature,
|
H A D | test_nsopenpanel.py | 11 sig = o.beginSheetForDirectory_file_types_modalForWindow_modalDelegate_didEndSelector_contextInfo_.signature
|
/macosx-10.10/ruby-106/ruby/lib/rubygems/package/ |
H A D | tar_writer.rb | 160 # digest_algorithm per add_file_digest and a cryptographic signature in 179 signature = signer.sign signature_digest.digest 181 add_file_simple "#{name}.sig", 0444, signature.length do |io| 182 io.write signature 183 end if signature
|
/macosx-10.10/Security-57031.1.35/Security/sec/Security/Tool/ |
H A D | codesign.c | 46 CSMAGIC_EMBEDDED_SIGNATURE = 0xfade0cc0, /* embedded form of signature data */ 54 * Structure of an embedded-signature SuperBlob 82 uint32_t codeLimit; /* limit to main image signature range */ 355 CFDictionaryRef signature = CFArrayGetValueAtIndex(sigs, i); local 357 CFDataRef code_dir = CFDictionaryGetValue(signature, CFSTR("CodeDirectory")); 360 CFDataRef signed_data = CFDictionaryGetValue(signature, CFSTR("SignedData")); 362 CFDataRef entitlements = CFDictionaryGetValue(signature, CFSTR("Entitlements")); 363 CFDataRef entitlements_cd_hash = CFDictionaryGetValue(signature, CFSTR("EntitlementsCDHash")); 364 CFDataRef entitlements_hash = CFDictionaryGetValue(signature, CFSTR("EntitlementsHash")); 366 CFStringRef arch = CFDictionaryGetValue(signature, CFST [all...] |
/macosx-10.10/configd-699.1.5/nwi/ |
H A D | network_information.c | 658 * returns the signature and its length for an ifstate given an address family. 659 * If AF_UNSPEC is passed in, the signature for a given ifstate is returned. 661 * If the signature does not exist, NULL is returned. 683 *length = sizeof(i_state->signature); 684 return (i_state->signature); 713 * returns the signature and its length for given 716 * If the signature does not exist, NULL is returned. 722 const uint8_t * signature = NULL; local 741 signature = v4_signature; 745 /* v6 is ranked never, v4 is ranked never but has a valid signature */ [all...] |
H A D | network_information_server.c | 397 unsigned char *signature, 400 bzero(signature, signature_len); 411 sha1 = (signature_len >= CC_SHA1_DIGEST_LENGTH) ? signature : sha1_buf; 417 if (sha1 != signature) { 418 bcopy(sha1, signature, signature_len); 396 _nwi_state_signature(nwi_state *state, unsigned char *signature, size_t signature_len) argument
|
/macosx-10.10/diskdev_cmds-576/fdisk.tproj/ |
H A D | mbr.c | 86 mbr->signature = MBR_SIGNATURE; 90 mbr->signature = DOSMBR_SIGNATURE; 139 mbr->signature = getshort(&mbr_buf[MBR_SIG_OFF]); 154 putshort(&mbr_buf[MBR_SIG_OFF], mbr->signature); 169 (int)mbr->signature); 453 mbr->signature = MBR_SIGNATURE; 486 if (mbr->signature != MBR_SIGNATURE) { 487 /* The MBR signature is invalid. */
|
/macosx-10.10/pyobjc-45/2.5/pyobjc/pyobjc-core/Modules/objc/ |
H A D | super-call.m | 24 /* Dict mapping from signature-string to a 'struct registry' */ 115 char* signature, 129 signature, 133 PyErr_SetString(PyObjCExc_Error, "cannot simplify signature"); 254 find_signature(char* signature) 262 signature, 266 PyErr_SetString(PyObjCExc_Error, "cannot simplify signature"); 280 "signature '%s'", signature);
|
/macosx-10.10/pyobjc-45/2.6/pyobjc/pyobjc-core/Modules/objc/ |
H A D | super-call.m | 24 /* Dict mapping from signature-string to a 'struct registry' */ 128 char* signature, 142 signature, 146 PyErr_SetString(PyObjCExc_Error, "cannot simplify signature"); 280 find_signature(char* signature) 288 signature, 292 PyErr_SetString(PyObjCExc_Error, "cannot simplify signature"); 312 "signature '%s'", signature);
|
/macosx-10.10/pyobjc-45/pyobjc/pyobjc-core-2.5.1/Modules/objc/ |
H A D | super-call.m | 24 /* Dict mapping from signature-string to a 'struct registry' */ 128 char* signature, 142 signature, 146 PyErr_SetString(PyObjCExc_Error, "cannot simplify signature"); 280 find_signature(const char* signature) 288 signature, 292 PyErr_SetString(PyObjCExc_Error, "cannot simplify signature"); 312 "signature '%s'", signature);
|
/macosx-10.10/tcl-105/tcl_ext/tclvfs/tclvfs/library/template/ |
H A D | deltavfs.tcl | 83 set signature [read $f] 85 tpatch $targetFile $signature $reconFile 194 set signature [tdelta $referenceFile $targetFile $::trsync::blockSize 1 1] 198 set signatureSize [string length $signature] 210 puts -nonewline $f $signature
|
/macosx-10.10/OpenSSL098-52/src/crypto/x509/ |
H A D | x_all.c | 77 a->signature,a->cert_info,r)); 83 a->sig_alg,a->signature,a->req_info,r)); 89 a->sig_alg, a->signature,a->crl,r)); 95 a->sig_algor,a->signature,a->spkac,r)); 101 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 102 x->sig_alg, x->signature, x->cert_info,pkey,md)); 108 x->signature, x->req_info,pkey,md)); 115 x->sig_alg, x->signature, x->crl,pkey,md)); 121 x->signature, x->spkac,pkey,md));
|
/macosx-10.10/Security-57031.1.35/Security/include/security_codesigning/ |
H A D | signer.cpp | 92 // Remove any existing code signature from code 96 // can't remove a detached signature 261 if (time > now) // not allowed to post-date a signature 404 // pass 1: prepare signature blobs and calculate sizes 422 // add identification blob (made from this architecture) only if we're making a detached signature 443 CFRef<CFDataRef> signature = signCodeDirectory(cd); local 448 CFDataGetBytePtr(signature), CFDataGetLength(signature))); 476 // add identification blob (made from this architecture) only if we're making a detached signature 483 CFRef<CFDataRef> signature local 586 CFDataRef signature; local [all...] |
/macosx-10.10/Security-57031.1.35/Security/libsecurity_codesigning/lib/ |
H A D | signer.cpp | 92 // Remove any existing code signature from code 96 // can't remove a detached signature 261 if (time > now) // not allowed to post-date a signature 404 // pass 1: prepare signature blobs and calculate sizes 422 // add identification blob (made from this architecture) only if we're making a detached signature 443 CFRef<CFDataRef> signature = signCodeDirectory(cd); local 448 CFDataGetBytePtr(signature), CFDataGetLength(signature))); 476 // add identification blob (made from this architecture) only if we're making a detached signature 483 CFRef<CFDataRef> signature local 586 CFDataRef signature; local [all...] |
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | rrsig_46.c | 252 * signature expiration: 4 292 * signature expiration: 4 337 REQUIRE(sig->signature != NULL || sig->siglen == 0); 385 return (mem_tobuffer(target, sig->signature, sig->siglen)); 456 sig->signature = mem_maybedup(mctx, sr.base, sig->siglen); 457 if (sig->signature == NULL) 481 if (sig->signature != NULL) 482 isc_mem_free(sig->mctx, sig->signature);
|
H A D | sig_24.c | 256 * signature expiration: 4 296 * signature expiration: 4 368 REQUIRE(sig->signature != NULL || sig->siglen == 0); 416 return (mem_tobuffer(target, sig->signature, sig->siglen)); 487 sig->signature = mem_maybedup(mctx, sr.base, sig->siglen); 488 if (sig->signature == NULL) 512 if (sig->signature != NULL) 513 isc_mem_free(sig->mctx, sig->signature);
|
/macosx-10.10/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_security_policy.rb | 64 signature = sign data 66 assert @almost_no.check_data(PUBLIC_KEY, @sha1, signature, data) 72 signature = sign data 77 @almost_no.check_data PUBLIC_KEY, @sha1, signature, invalid 80 assert_equal 'invalid signature', e.message 174 assert_equal 'missing key or signature', e.message 353 signature = PRIVATE_KEY.sign sha512.new, data.digest 354 signatures = { 0 => signature } 444 assert_equal 'missing signature for data.tar.gz', e.message
|
/macosx-10.10/tcl-105/tcl_ext/tclsoap/tclsoap/ |
H A D | beep.tcl | 165 set signature "" 167 append signature $option $options($option) 175 || ($props(signature) != $signature) } { 203 set props(signature) "" 205 append props(signature) $option $options($option)
|
/macosx-10.10/Security-57031.1.35/Security/libsecurity_keychain/libDER/Tests/ |
H A D | parseTicket.c | 151 unsigned char signature[SIG_LEN] ) 177 signature, &signatureLength, rsa ); 197 unsigned char signature[SIG_LEN] ) 223 signature, signatureLength, rsa ); 315 // Verify signature if key file exists (we should really use the certificate or GPUK in the ticket here. */ 321 (unsigned char *)ticket.signature.data ); 400 ticket.signature.data = (DERByte *)fakeSig; 401 ticket.signature.length = sizeof(fakeSig); 444 unsigned char signature[SIG_LEN] = {}; local 486 // NOTE: In the SEE machine, the Body above will then be hashed/signed to generate signature [all...] |
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | ssh-ecdsa.c | 96 ssh_ecdsa_verify(const Key *key, const u_char *signature, u_int signaturelen, argument 115 /* fetch signature */ 117 buffer_append(&b, signature, signaturelen); 130 error("%s: remaining bytes in signature %d", __func__, rlen); 135 /* parse signature */ 164 debug("%s: signature %s", __func__,
|
/macosx-10.10/OpenSSL098-52/src/crypto/asn1/ |
H A D | x_crl.c | 74 * Since we cache the original encoding the signature wont be affected by 107 ASN1_SIMPLE(X509_CRL, signature, ASN1_BIT_STRING)
|