/macosx-10.10.1/ruby-106/ruby/lib/rubygems/package/ |
H A D | digest_io.rb | 2 # IO wrapper that creates digests of contents written to the IO it wraps. 7 # Collected digests for wrapped writes. 14 attr_reader :digests 18 # the +digests+ Hash. Returns the digests hash. Example: 21 # digests = { 26 # Gem::Package::DigestIO.wrap io, digests do |digest_io| 30 # digests['SHA1'].hexdigest #=> "aaf4c61d[...]" 31 # digests['SHA512'].hexdigest #=> "9b71d224[...]" 33 def self.wrap io, digests [all...] |
H A D | tar_writer.rb | 141 digests = digest_algorithms.map do |digest_algorithm| 146 digests = Hash[*digests.flatten] 149 Gem::Package::DigestIO.wrap io, digests do |digest_io| 154 digests 171 digests = add_file_digest name, mode, digest_algorithms do |io| 175 signature_digest = digests.values.find do |digest| 185 digests
|
/macosx-10.10.1/OpenSSL098-52/src/crypto/engine/ |
H A D | tb_digest.c | 76 if(e->digests) 79 int num_nids = e->digests(e, NULL, &nids, 0); 98 if(e->digests) 101 int num_nids = e->digests(e, NULL, &nids, 0); 135 return e->digests; 141 e->digests = f;
|
H A D | eng_int.h | 162 ENGINE_DIGESTS_PTR digests; member in struct:engine_st
|
H A D | eng_list.c | 338 dest->digests = src->digests;
|
/macosx-10.10.1/ruby-106/ruby/test/rubygems/ |
H A D | test_gem_security_policy.rb | 313 assert_equal 'no digests provided (probable bug)', e.message 331 digests, signatures = dummy_signatures 338 @almost_no.verify [PUBLIC_CERT], nil, digests, signatures 352 digests = { 'SHA512' => { 0 => data } } 357 @almost_no.verify [PUBLIC_CERT], nil, digests, signatures 360 assert_equal 'no digests provided (probable bug)', e.message 408 digests = package.digest s 409 metadata_gz_digest = digests['SHA1']['metadata.gz'] 415 assert @high.verify_signatures @spec, digests, signatures 431 digests [all...] |
H A D | test_gem_package_tar_writer.rb | 32 digests = @tar_writer.add_file_digest 'x', 0644, digest_algorithms do |io| 37 digests['SHA1'].hexdigest 42 digests['SHA512'].hexdigest 53 digests = @tar_writer.add_file_digest 'x', 0644, digest_algorithms do |io| 58 digests['SHA1'].hexdigest 63 digests['SHA512'].hexdigest
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/Security/ |
H A D | cmssigdata.c | 132 /* we assume that we have precomputed digests if there is a list of algorithms, and */ 134 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) { 136 if (sigd->digests[i] == NULL) 140 haveDigests = PR_TRUE; /* yes: we must have all the digests */ 164 /* but we were supposed to have all the digests already... */ 183 (void **)sigd->digests); 196 /* set up the digests */ 235 SecAsn1Item **digests = NULL; local 237 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, &digestalgs, &digests); 240 if (digestalgs && digests) { 392 SecAsn1Item * *digests = NULL; local 766 SecAsn1Item * *digests; local 785 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, SecAsn1Item * *digests) argument [all...] |
H A D | cmsdigest.c | 234 * SecCmsDigestContextFinishMultiple - finish the digests 246 SecAsn1Item **digests, *digest; local 256 /* no contents? do not update digests */ 279 digests = (SecAsn1Item * *)PORT_ArenaZAlloc(cmsdigcx->poolp, (cmsdigcx->digcnt+1) * sizeof(SecAsn1Item *)); 281 if (digestalgs == NULL || digests == NULL || digest == NULL) { 324 digests[i] = digest; 333 digests[i] = NULL; 335 *digestsp = digests; 364 /* get the digests into arena, then copy the first digest into poolp */
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/lib/ |
H A D | cmssigdata.c | 132 /* we assume that we have precomputed digests if there is a list of algorithms, and */ 134 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) { 136 if (sigd->digests[i] == NULL) 140 haveDigests = PR_TRUE; /* yes: we must have all the digests */ 164 /* but we were supposed to have all the digests already... */ 183 (void **)sigd->digests); 196 /* set up the digests */ 235 SecAsn1Item **digests = NULL; local 237 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, &digestalgs, &digests); 240 if (digestalgs && digests) { 392 SecAsn1Item * *digests = NULL; local 766 SecAsn1Item * *digests; local 785 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, SecAsn1Item * *digests) argument [all...] |
H A D | cmsdigest.c | 234 * SecCmsDigestContextFinishMultiple - finish the digests 246 SecAsn1Item **digests, *digest; local 256 /* no contents? do not update digests */ 279 digests = (SecAsn1Item * *)PORT_ArenaZAlloc(cmsdigcx->poolp, (cmsdigcx->digcnt+1) * sizeof(SecAsn1Item *)); 281 if (digestalgs == NULL || digests == NULL || digest == NULL) { 324 digests[i] = digest; 333 digests[i] = NULL; 335 *digestsp = digests; 364 /* get the digests into arena, then copy the first digest into poolp */
|
/macosx-10.10.1/Security-57031.1.35/libsecurity_smime/security_smime/ |
H A D | cmssigdata.c | 132 /* we assume that we have precomputed digests if there is a list of algorithms, and */ 134 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) { 136 if (sigd->digests[i] == NULL) 140 haveDigests = PR_TRUE; /* yes: we must have all the digests */ 164 /* but we were supposed to have all the digests already... */ 183 (void **)sigd->digests); 196 /* set up the digests */ 235 SecAsn1Item **digests = NULL; local 237 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, &digestalgs, &digests); 240 if (digestalgs && digests) { 392 SecAsn1Item * *digests = NULL; local 766 SecAsn1Item * *digests; local 785 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, SecAsn1Item * *digests) argument [all...] |
H A D | cmsdigest.c | 234 * SecCmsDigestContextFinishMultiple - finish the digests 246 SecAsn1Item **digests, *digest; local 256 /* no contents? do not update digests */ 279 digests = (SecAsn1Item * *)PORT_ArenaZAlloc(cmsdigcx->poolp, (cmsdigcx->digcnt+1) * sizeof(SecAsn1Item *)); 281 if (digestalgs == NULL || digests == NULL || digest == NULL) { 324 digests[i] = digest; 333 digests[i] = NULL; 335 *digestsp = digests; 364 /* get the digests into arena, then copy the first digest into poolp */
|
/macosx-10.10.1/Security-57031.1.35/Security/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSPeer.c | 79 static CFStringRef kSOSPeerProposedManifestKey = CFSTR("pending-manifest"); // array of digests 80 static CFStringRef kSOSPeerLocalManifestKey = CFSTR("local-manifest"); // array of digests 115 CFMutableArrayRef digests = (CFMutableArrayRef)CFDictionaryGetValue(SOSPeerGetState(peer), key); local 116 CFIndex count = digests ? CFArrayGetCount(digests) : 0; 118 CFDataRef digest = CFArrayGetValueAtIndex(digests, 0); 156 CFMutableArrayRef digests = (CFMutableArrayRef)CFDictionaryGetValue(peerState, key); local 157 if (!digests) { 158 digests = CFArrayCreateMutableForCFTypes(kCFAllocatorDefault); 159 CFDictionarySetValue(peerState, key, digests); 173 CFMutableArrayRef digests = SOSPeerGetDigestsWithKey(peer, key); local 396 SOSMarkDigestsInUse(struct SOSDigestVector *mdInUse, CFArrayRef digests) argument [all...] |
H A D | SOSDigestVector.h | 63 const uint8_t *digests);
|
/macosx-10.10.1/Security-57031.1.35/SecurityTests/cspxutils/ccOneShot/ |
H A D | ccOneShot.cpp | 66 static const CommonDigestInfo digests[] = variable 101 #define NUM_DIGESTS (sizeof(digests) / sizeof(digests[0])) 107 if((unsigned)(digests[dex].alg) == alg) { 108 return &digests[dex];
|
/macosx-10.10.1/ruby-106/ruby/lib/rubygems/ |
H A D | package.rb | 143 @digests = Hash.new { |h, algorithm| h[algorithm] = {} } 159 @checksums.each do |name, digests| 160 digests.each do |algorithm, digest| 177 digests = tar.add_file_signed 'data.tar.gz', 0444, @signer do |io| 185 @checksums['data.tar.gz'] = digests 209 digests = tar.add_file_signed 'metadata.gz', 0444, @signer do |io| 215 @checksums['metadata.gz'] = digests 293 @digests[algorithm][entry.full_name] = digester 296 @digests 477 verify_checksums @digests, [all...] |
/macosx-10.10.1/Heimdal-398.1.2/kdc/ |
H A D | default_config.c | 81 const char *digests; local 83 digests = krb5_config_get_string(context, NULL, 86 if (digests == NULL) 87 digests = "ntlm-v2"; 88 c->digests_allowed = parse_flags(digests,_kdc_digestunits, 0); 92 digests); 97 digests);
|
/macosx-10.10.1/Security-57031.1.35/Security/include/security_smime/ |
H A D | cmssigdata.c | 142 /* we assume that we have precomputed digests if there is a list of algorithms, and */ 144 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) { 146 if (sigd->digests[i] == NULL) 150 haveDigests = PR_TRUE; /* yes: we must have all the digests */ 175 /* but we were supposed to have all the digests already... */ 194 (void **)sigd->digests); 207 /* set up the digests */ 440 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, (SecArenaPoolRef)poolp, &(sigd->digests)); 456 if (n < 0 || sigd->digests == NULL || sigd->digests[ 967 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, CSSM_DATA_PTR *digests) argument [all...] |
H A D | cmsdigest.c | 164 * SecCmsDigestContextFinishMultiple - finish the digests and put them 172 CSSM_DATA_PTR *digests, digest; local 177 /* no contents? do not update digests */ 191 digests = (CSSM_DATA_PTR *)PORT_ArenaAlloc((PLArenaPool *)poolp, (cmsdigcx->digcnt+1) * sizeof(CSSM_DATA_PTR)); 193 if (digests == NULL || digest == NULL) { 228 digests[i] = digest; 230 digests[i] = NULL; 231 *digestsp = digests; 265 /* get the digests into arena, then copy the first digest into poolp */
|
H A D | SecCmsSignedData.h | 104 @abstract See if we have digests in place. 112 @discussion The digests were either calculated during decoding (and are stored in the 179 CSSM_DATA_PTR *digests);
|
/macosx-10.10.1/Security-57031.1.35/Security/libsecurity_smime/lib/ |
H A D | cmssigdata.c | 142 /* we assume that we have precomputed digests if there is a list of algorithms, and */ 144 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) { 146 if (sigd->digests[i] == NULL) 150 haveDigests = PR_TRUE; /* yes: we must have all the digests */ 175 /* but we were supposed to have all the digests already... */ 194 (void **)sigd->digests); 207 /* set up the digests */ 440 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, (SecArenaPoolRef)poolp, &(sigd->digests)); 456 if (n < 0 || sigd->digests == NULL || sigd->digests[ 967 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, CSSM_DATA_PTR *digests) argument [all...] |
H A D | cmsdigest.c | 164 * SecCmsDigestContextFinishMultiple - finish the digests and put them 172 CSSM_DATA_PTR *digests, digest; local 177 /* no contents? do not update digests */ 191 digests = (CSSM_DATA_PTR *)PORT_ArenaAlloc((PLArenaPool *)poolp, (cmsdigcx->digcnt+1) * sizeof(CSSM_DATA_PTR)); 193 if (digests == NULL || digest == NULL) { 228 digests[i] = digest; 230 digests[i] = NULL; 231 *digestsp = digests; 265 /* get the digests into arena, then copy the first digest into poolp */
|
H A D | SecCmsSignedData.h | 104 @abstract See if we have digests in place. 112 @discussion The digests were either calculated during decoding (and are stored in the 179 CSSM_DATA_PTR *digests);
|
/macosx-10.10.1/ruby-106/ruby/lib/rubygems/security/ |
H A D | policy.rb | 144 # the digests of the two certificates match according to +digester+ 187 # Verifies the certificate +chain+ is valid, the +digests+ match the 193 def verify chain, key = nil, digests = {}, signatures = {} 204 _, signer_digests = digests.find do |algorithm, file_digests| 209 raise Gem::Security::Exception, 'no digests provided (probable bug)' if 250 def verify_signatures spec, digests, signatures 255 verify chain, nil, digests, signatures
|