Searched refs:digests (Results 1 - 25 of 34) sorted by relevance

12

/macosx-10.9.5/ruby-104/ruby/lib/rubygems/package/
H A Ddigest_io.rb2 # IO wrapper that creates digests of contents written to the IO it wraps.
7 # Collected digests for wrapped writes.
14 attr_reader :digests
18 # the +digests+ Hash. Returns the digests hash. Example:
21 # digests = {
26 # Gem::Package::DigestIO.wrap io, digests do |digest_io|
30 # digests['SHA1'].hexdigest #=> "aaf4c61d[...]"
31 # digests['SHA512'].hexdigest #=> "9b71d224[...]"
33 def self.wrap io, digests
[all...]
H A Dtar_writer.rb141 digests = digest_algorithms.map do |digest_algorithm|
146 digests = Hash[*digests.flatten]
149 Gem::Package::DigestIO.wrap io, digests do |digest_io|
154 digests
171 digests = add_file_digest name, mode, digest_algorithms do |io|
175 signature_digest = digests.values.find do |digest|
185 digests
/macosx-10.9.5/ruby-104/ruby/test/rubygems/
H A Dtest_gem_security_policy.rb313 assert_equal 'no digests provided (probable bug)', e.message
331 digests, signatures = dummy_signatures
338 @almost_no.verify [PUBLIC_CERT], nil, digests, signatures
352 digests = { 'SHA512' => { 0 => data } }
357 @almost_no.verify [PUBLIC_CERT], nil, digests, signatures
360 assert_equal 'no digests provided (probable bug)', e.message
408 digests = package.digest s
409 metadata_gz_digest = digests['SHA1']['metadata.gz']
415 assert @high.verify_signatures @spec, digests, signatures
431 digests
[all...]
H A Dtest_gem_package_tar_writer.rb32 digests = @tar_writer.add_file_digest 'x', 0644, digest_algorithms do |io|
37 digests['SHA1'].hexdigest
42 digests['SHA512'].hexdigest
53 digests = @tar_writer.add_file_digest 'x', 0644, digest_algorithms do |io|
58 digests['SHA1'].hexdigest
63 digests['SHA512'].hexdigest
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/
H A Dpackage.rb143 @digests = Hash.new { |h, algorithm| h[algorithm] = {} }
159 @checksums.each do |name, digests|
160 digests.each do |algorithm, digest|
177 digests = tar.add_file_signed 'data.tar.gz', 0444, @signer do |io|
185 @checksums['data.tar.gz'] = digests
209 digests = tar.add_file_signed 'metadata.gz', 0444, @signer do |io|
215 @checksums['metadata.gz'] = digests
293 @digests[algorithm][entry.full_name] = digester
296 @digests
477 verify_checksums @digests,
[all...]
/macosx-10.9.5/Heimdal-323.92.1/kdc/
H A Ddefault_config.c81 const char *digests; local
83 digests = krb5_config_get_string(context, NULL,
86 if (digests == NULL)
87 digests = "ntlm-v2";
88 c->digests_allowed = parse_flags(digests,_kdc_digestunits, 0);
92 digests);
97 digests);
/macosx-10.9.5/Security-55471.14.18/include/security_smime/
H A Dcmssigdata.c140 /* we assume that we have precomputed digests if there is a list of algorithms, and */
142 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) {
144 if (sigd->digests[i] == NULL)
148 haveDigests = PR_TRUE; /* yes: we must have all the digests */
173 /* but we were supposed to have all the digests already... */
192 (void **)sigd->digests);
205 /* set up the digests */
438 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, (SecArenaPoolRef)poolp, &(sigd->digests));
454 if (n < 0 || sigd->digests == NULL || sigd->digests[
963 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, CSSM_DATA_PTR *digests) argument
[all...]
H A Dcmsdigest.c164 * SecCmsDigestContextFinishMultiple - finish the digests and put them
172 CSSM_DATA_PTR *digests, digest; local
177 /* no contents? do not update digests */
191 digests = (CSSM_DATA_PTR *)PORT_ArenaAlloc((PLArenaPool *)poolp, (cmsdigcx->digcnt+1) * sizeof(CSSM_DATA_PTR));
193 if (digests == NULL || digest == NULL) {
228 digests[i] = digest;
230 digests[i] = NULL;
231 *digestsp = digests;
265 /* get the digests into arena, then copy the first digest into poolp */
H A DSecCmsSignedData.h104 @abstract See if we have digests in place.
112 @discussion The digests were either calculated during decoding (and are stored in the
179 CSSM_DATA_PTR *digests);
H A Dcmstpriv.h182 CSSM_DATA_PTR * digests; member in struct:SecCmsSignedDataStr
/macosx-10.9.5/Security-55471.14.18/libsecurity_smime/lib/
H A Dcmssigdata.c140 /* we assume that we have precomputed digests if there is a list of algorithms, and */
142 if (sigd->digestAlgorithms != NULL && sigd->digests != NULL) {
144 if (sigd->digests[i] == NULL)
148 haveDigests = PR_TRUE; /* yes: we must have all the digests */
173 /* but we were supposed to have all the digests already... */
192 (void **)sigd->digests);
205 /* set up the digests */
438 rv = SecCmsDigestContextFinishMultiple(cinfo->digcx, (SecArenaPoolRef)poolp, &(sigd->digests));
454 if (n < 0 || sigd->digests == NULL || sigd->digests[
963 SecCmsSignedDataSetDigests(SecCmsSignedDataRef sigd, SECAlgorithmID **digestalgs, CSSM_DATA_PTR *digests) argument
[all...]
H A Dcmsdigest.c164 * SecCmsDigestContextFinishMultiple - finish the digests and put them
172 CSSM_DATA_PTR *digests, digest; local
177 /* no contents? do not update digests */
191 digests = (CSSM_DATA_PTR *)PORT_ArenaAlloc((PLArenaPool *)poolp, (cmsdigcx->digcnt+1) * sizeof(CSSM_DATA_PTR));
193 if (digests == NULL || digest == NULL) {
228 digests[i] = digest;
230 digests[i] = NULL;
231 *digestsp = digests;
265 /* get the digests into arena, then copy the first digest into poolp */
H A DSecCmsSignedData.h104 @abstract See if we have digests in place.
112 @discussion The digests were either calculated during decoding (and are stored in the
179 CSSM_DATA_PTR *digests);
H A Dcmstpriv.h182 CSSM_DATA_PTR * digests; member in struct:SecCmsSignedDataStr
/macosx-10.9.5/ruby-104/ruby/lib/rubygems/security/
H A Dpolicy.rb144 # the digests of the two certificates match according to +digester+
187 # Verifies the certificate +chain+ is valid, the +digests+ match the
193 def verify chain, key = nil, digests = {}, signatures = {}
204 _, signer_digests = digests.find do |algorithm, file_digests|
209 raise Gem::Security::Exception, 'no digests provided (probable bug)' if
250 def verify_signatures spec, digests, signatures
255 verify chain, nil, digests, signatures
/macosx-10.9.5/CPANInternal-140/Digest-SHA/examples/
H A Ddups14 achieves its efficiency by comparing file digests rather than the
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A Dtls1Callouts.c349 * Given digests contexts representing the running total of all handshake messages,
361 unsigned char digests[SSL_MD5_DIGEST_LEN + SSL_SHA1_DIGEST_LEN]; local
385 digBuf.data = digests;
402 digests,
415 * Given digests contexts representing the running total of all handshake messages,
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A Dtls1Callouts.c349 * Given digests contexts representing the running total of all handshake messages,
361 unsigned char digests[SSL_MD5_DIGEST_LEN + SSL_SHA1_DIGEST_LEN]; local
385 digBuf.data = digests;
402 digests,
415 * Given digests contexts representing the running total of all handshake messages,
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A Dtls1Callouts.c349 * Given digests contexts representing the running total of all handshake messages,
361 unsigned char digests[SSL_MD5_DIGEST_LEN + SSL_SHA1_DIGEST_LEN]; local
385 digBuf.data = digests;
402 digests,
415 * Given digests contexts representing the running total of all handshake messages,
/macosx-10.9.5/CPANInternal-140/Digest-SHA/
H A Dshasum3 # shasum: filter for computing SHA digests (analogous to sha1sum)
44 compute SHA message digests. Rather than writing a program, the user
49 The following command shows how easy it is to compute digests for typical
/macosx-10.9.5/Security-55471.14.18/libsecurity_manifest/lib/
H A DSecureDownloadInternal.c614 CFDataRef digests = copyChildWithNameAsData(tree, namespaces, SD_XML_NAMESPACE, SD_XML_DIGESTS); local
615 if (digests) {
616 CFDictionarySetValue(dict, SD_XML_DIGESTS, digests);
617 CFRelease(digests);
833 CFDataRef digests = CFDictionaryGetValue(dict, SD_XML_DIGESTS); local
835 _appendCString(data, "\t\t\t<digests>");
836 _appendCFData(data, digests);
837 _appendCString(data, "</digests>\n");
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/
H A Dtkey.c224 unsigned char digests[32]; local
236 isc_md5_final(&md5ctx, digests);
245 isc_md5_final(&md5ctx, &digests[ISC_MD5_DIGESTLENGTH]);
252 if (r.length < sizeof(digests) || r.length < r2.length)
254 if (r2.length > sizeof(digests)) {
256 for (i = 0; i < sizeof(digests); i++)
257 r.base[i] ^= digests[i];
260 memcpy(r.base, digests, sizeof(digests));
263 isc_buffer_add(secret, sizeof(digests));
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_cms/lib/
H A DCMSDecoder.cpp165 CSSM_DATA **digests = NULL; local
170 OSStatus ortn = SecCmsDigestContextFinishMultiple(digcx, cmsDecoder->arena, &digests);
176 ortn = SecCmsSignedDataSetDigests(cmsDecoder->signedData, digestAlgorithms, digests);
328 /* time to calculate digests from detached content */
357 /* time to calculate digests from detached content */
/macosx-10.9.5/Security-55471.14.18/sec/SOSCircle/SecureObjectSync/
H A DSOSTransport.c98 size_t count, const uint8_t *digests) {
101 memcpy(dv->digest[dv->count], digests, count * SOSDigestSize);
97 SOSDigestVectorAppendMultiple(struct SOSDigestVector *dv, size_t count, const uint8_t *digests) argument
/macosx-10.9.5/SecurityTool-55115/
H A Dcmsutil.c352 static OSStatus DigestFile(SecArenaPoolRef poolp, CSSM_DATA ***digests, CSSM_DATA *input, SECAlgorithmID **algids) argument
360 return SecCmsDigestContextFinishMultiple(digcx, poolp, digests);
439 CSSM_DATA **digests; local
489 /* if we have a content file, but no digests for this signedData */
494 SEC_CHECK(DigestFile(poolp, &digests, &sitem, digestalgs),
496 SEC_CHECK(SecCmsSignedDataSetDigests(sigd, digestalgs, digests),
497 "problem setting message digests");
523 SEC_CHECK0(SecCmsSignedDataHasDigests(sigd), "message has no digests");
1511 NULL, NULL, /* detached digests */

Completed in 249 milliseconds

12