/macosx-10.9.5/ruby-104/ruby/lib/rubygems/package/ |
H A D | digest_io.rb | 2 # IO wrapper that creates digests of contents written to the IO it wraps. 7 # Collected digests for wrapped writes. 14 attr_reader :digests 18 # the +digests+ Hash. Returns the digests hash. Example: 21 # digests = { 26 # Gem::Package::DigestIO.wrap io, digests do |digest_io| 30 # digests['SHA1'].hexdigest #=> "aaf4c61d[...]" 31 # digests['SHA512'].hexdigest #=> "9b71d224[...]" 33 def self.wrap io, digests [all...] |
H A D | tar_writer.rb | 141 digests = digest_algorithms.map do |digest_algorithm| 146 digests = Hash[*digests.flatten] 149 Gem::Package::DigestIO.wrap io, digests do |digest_io| 154 digests 171 digests = add_file_digest name, mode, digest_algorithms do |io| 175 signature_digest = digests.values.find do |digest| 185 digests
|
/macosx-10.9.5/ruby-104/ruby/test/rubygems/ |
H A D | test_gem_security_policy.rb | 313 assert_equal 'no digests provided (probable bug)', e.message 331 digests, signatures = dummy_signatures 338 @almost_no.verify [PUBLIC_CERT], nil, digests, signatures 352 digests = { 'SHA512' => { 0 => data } } 357 @almost_no.verify [PUBLIC_CERT], nil, digests, signatures 360 assert_equal 'no digests provided (probable bug)', e.message 408 digests = package.digest s 409 metadata_gz_digest = digests['SHA1']['metadata.gz'] 415 assert @high.verify_signatures @spec, digests, signatures 431 digests [all...] |
H A D | test_gem_package_tar_writer.rb | 32 digests = @tar_writer.add_file_digest 'x', 0644, digest_algorithms do |io| 37 digests['SHA1'].hexdigest 42 digests['SHA512'].hexdigest 53 digests = @tar_writer.add_file_digest 'x', 0644, digest_algorithms do |io| 58 digests['SHA1'].hexdigest 63 digests['SHA512'].hexdigest
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/ |
H A D | package.rb | 143 @digests = Hash.new { |h, algorithm| h[algorithm] = {} } 159 @checksums.each do |name, digests| 160 digests.each do |algorithm, digest| 177 digests = tar.add_file_signed 'data.tar.gz', 0444, @signer do |io| 185 @checksums['data.tar.gz'] = digests 209 digests = tar.add_file_signed 'metadata.gz', 0444, @signer do |io| 215 @checksums['metadata.gz'] = digests 293 @digests[algorithm][entry.full_name] = digester 296 @digests 477 verify_checksums @digests, [all...] |
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | default_config.c | 81 const char *digests; local 83 digests = krb5_config_get_string(context, NULL, 86 if (digests == NULL) 87 digests = "ntlm-v2"; 88 c->digests_allowed = parse_flags(digests,_kdc_digestunits, 0); 92 digests); 97 digests);
|
/macosx-10.9.5/Security-55471.14.18/include/security_smime/ |
H A D | cmssigdata.c | 140 /* we assume that we have precomputed digests if there is a list of algorithms, and */ 142 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) { 144 if (sigd->digests[i] == NULL) 148 haveDigests = PR_TRUE; /* yes: we must have all the digests */ 173 /* but we were supposed to have all the digests already... */ 192 (void **)sigd->digests); 205 /* set up the digests */ 438 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, (SecArenaPoolRef)poolp, &(sigd->digests)); 454 if (n < 0 || sigd->digests == NULL || sigd->digests[ 963 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, CSSM_DATA_PTR *digests) argument [all...] |
H A D | cmsdigest.c | 164 * SecCmsDigestContextFinishMultiple - finish the digests and put them 172 CSSM_DATA_PTR *digests, digest; local 177 /* no contents? do not update digests */ 191 digests = (CSSM_DATA_PTR *)PORT_ArenaAlloc((PLArenaPool *)poolp, (cmsdigcx->digcnt+1) * sizeof(CSSM_DATA_PTR)); 193 if (digests == NULL || digest == NULL) { 228 digests[i] = digest; 230 digests[i] = NULL; 231 *digestsp = digests; 265 /* get the digests into arena, then copy the first digest into poolp */
|
H A D | SecCmsSignedData.h | 104 @abstract See if we have digests in place. 112 @discussion The digests were either calculated during decoding (and are stored in the 179 CSSM_DATA_PTR *digests);
|
H A D | cmstpriv.h | 182 CSSM_DATA_PTR * digests; member in struct:SecCmsSignedDataStr
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/ |
H A D | cmssigdata.c | 140 /* we assume that we have precomputed digests if there is a list of algorithms, and */ 142 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) { 144 if (sigd->digests[i] == NULL) 148 haveDigests = PR_TRUE; /* yes: we must have all the digests */ 173 /* but we were supposed to have all the digests already... */ 192 (void **)sigd->digests); 205 /* set up the digests */ 438 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, (SecArenaPoolRef)poolp, &(sigd->digests)); 454 if (n < 0 || sigd->digests == NULL || sigd->digests[ 963 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, CSSM_DATA_PTR *digests) argument [all...] |
H A D | cmsdigest.c | 164 * SecCmsDigestContextFinishMultiple - finish the digests and put them 172 CSSM_DATA_PTR *digests, digest; local 177 /* no contents? do not update digests */ 191 digests = (CSSM_DATA_PTR *)PORT_ArenaAlloc((PLArenaPool *)poolp, (cmsdigcx->digcnt+1) * sizeof(CSSM_DATA_PTR)); 193 if (digests == NULL || digest == NULL) { 228 digests[i] = digest; 230 digests[i] = NULL; 231 *digestsp = digests; 265 /* get the digests into arena, then copy the first digest into poolp */
|
H A D | SecCmsSignedData.h | 104 @abstract See if we have digests in place. 112 @discussion The digests were either calculated during decoding (and are stored in the 179 CSSM_DATA_PTR *digests);
|
H A D | cmstpriv.h | 182 CSSM_DATA_PTR * digests; member in struct:SecCmsSignedDataStr
|
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/security/ |
H A D | policy.rb | 144 # the digests of the two certificates match according to +digester+ 187 # Verifies the certificate +chain+ is valid, the +digests+ match the 193 def verify chain, key = nil, digests = {}, signatures = {} 204 _, signer_digests = digests.find do |algorithm, file_digests| 209 raise Gem::Security::Exception, 'no digests provided (probable bug)' if 250 def verify_signatures spec, digests, signatures 255 verify chain, nil, digests, signatures
|
/macosx-10.9.5/CPANInternal-140/Digest-SHA/examples/ |
H A D | dups | 14 achieves its efficiency by comparing file digests rather than the
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | tls1Callouts.c | 349 * Given digests contexts representing the running total of all handshake messages, 361 unsigned char digests[SSL_MD5_DIGEST_LEN + SSL_SHA1_DIGEST_LEN]; local 385 digBuf.data = digests; 402 digests, 415 * Given digests contexts representing the running total of all handshake messages,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | tls1Callouts.c | 349 * Given digests contexts representing the running total of all handshake messages, 361 unsigned char digests[SSL_MD5_DIGEST_LEN + SSL_SHA1_DIGEST_LEN]; local 385 digBuf.data = digests; 402 digests, 415 * Given digests contexts representing the running total of all handshake messages,
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | tls1Callouts.c | 349 * Given digests contexts representing the running total of all handshake messages, 361 unsigned char digests[SSL_MD5_DIGEST_LEN + SSL_SHA1_DIGEST_LEN]; local 385 digBuf.data = digests; 402 digests, 415 * Given digests contexts representing the running total of all handshake messages,
|
/macosx-10.9.5/CPANInternal-140/Digest-SHA/ |
H A D | shasum | 3 # shasum: filter for computing SHA digests (analogous to sha1sum) 44 compute SHA message digests. Rather than writing a program, the user 49 The following command shows how easy it is to compute digests for typical
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_manifest/lib/ |
H A D | SecureDownloadInternal.c | 614 CFDataRef digests = copyChildWithNameAsData(tree, namespaces, SD_XML_NAMESPACE, SD_XML_DIGESTS); local 615 if (digests) { 616 CFDictionarySetValue(dict, SD_XML_DIGESTS, digests); 617 CFRelease(digests); 833 CFDataRef digests = CFDictionaryGetValue(dict, SD_XML_DIGESTS); local 835 _appendCString(data, "\t\t\t<digests>"); 836 _appendCFData(data, digests); 837 _appendCString(data, "</digests>\n");
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/ |
H A D | tkey.c | 224 unsigned char digests[32]; local 236 isc_md5_final(&md5ctx, digests); 245 isc_md5_final(&md5ctx, &digests[ISC_MD5_DIGESTLENGTH]); 252 if (r.length < sizeof(digests) || r.length < r2.length) 254 if (r2.length > sizeof(digests)) { 256 for (i = 0; i < sizeof(digests); i++) 257 r.base[i] ^= digests[i]; 260 memcpy(r.base, digests, sizeof(digests)); 263 isc_buffer_add(secret, sizeof(digests)); [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_cms/lib/ |
H A D | CMSDecoder.cpp | 165 CSSM_DATA **digests = NULL; local 170 OSStatus ortn = SecCmsDigestContextFinishMultiple(digcx, cmsDecoder->arena, &digests); 176 ortn = SecCmsSignedDataSetDigests(cmsDecoder->signedData, digestAlgorithms, digests); 328 /* time to calculate digests from detached content */ 357 /* time to calculate digests from detached content */
|
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/ |
H A D | SOSTransport.c | 98 size_t count, const uint8_t *digests) { 101 memcpy(dv->digest[dv->count], digests, count * SOSDigestSize); 97 SOSDigestVectorAppendMultiple(struct SOSDigestVector *dv, size_t count, const uint8_t *digests) argument
|
/macosx-10.9.5/SecurityTool-55115/ |
H A D | cmsutil.c | 352 static OSStatus DigestFile(SecArenaPoolRef poolp, CSSM_DATA ***digests, CSSM_DATA *input, SECAlgorithmID **algids) argument 360 return SecCmsDigestContextFinishMultiple(digcx, poolp, digests); 439 CSSM_DATA **digests; local 489 /* if we have a content file, but no digests for this signedData */ 494 SEC_CHECK(DigestFile(poolp, &digests, &sitem, digestalgs), 496 SEC_CHECK(SecCmsSignedDataSetDigests(sigd, digestalgs, digests), 497 "problem setting message digests"); 523 SEC_CHECK0(SecCmsSignedDataHasDigests(sigd), "message has no digests"); 1511 NULL, NULL, /* detached digests */
|