Searched refs:hash (Results 1 - 25 of 39) sorted by relevance

12

/pkg/src/modules/actions/
H A D_actions.c52 static const char *notident = "hash attribute not identical to positional hash";
168 PyObject *hash = NULL; local
192 Py_XDECREF(hash);\
302 if (PyDict_Size(attrs) > 0 || hash != NULL) {
308 hash = PyUnicode_FromStringAndSize(
311 hash = PyString_FromStringAndSize(
314 if (hash == NULL) {
347 strncmp(keystr, "hash", keysize) == 0) {
494 if (strncmp(keystr, "hash
[all...]
H A Dsignature.py49 __slots__ = ["hash", "hash_alg", "sig_alg", "cert_ident",
59 self.hash = None
76 # If there's a hash, then there's a certificate to deliver
78 if not self.hash:
101 # given hash or compressed hash attribute to a list of the hash
144 # cert, so get the preferred chain hash value from the
162 # Remove any unused hash attributes.
202 # of pkg.chain.<hash al
[all...]
H A Dlicense.py50 __slots__ = ["hash"]
64 self.hash = "NOHASH"
111 "data hash verification failure: expected: "
181 if hasattr(self, "hash"):
182 indices.append(("license", "hash", self.hash, None))
183 indices.append(("license", "content", self.hash, None))
185 # we already have an index entry for self.hash
186 if attr == "hash":
188 hash
[all...]
H A Dfile.py62 __slots__ = ["hash", "replace_required"]
229 # Always verify using the most preferred hash
246 details=_("Action data hash verification "
385 # different size files may have the same content-hash
420 # throw while computing the hash,
426 # content hash that matches
449 "ELF content hash: {0}".format(e))
453 elferror = _("ELF content hash: "
459 # If we failed to compute the "gelf:" content hash, or
460 # the content hash faile
[all...]
H A Dgeneric.py266 The form is the name, followed by the SHA1 hash, if it exists,
267 (this use of a positional SHA1 hash is deprecated, with
268 pkg.*hash.* attributes being preferred over positional hashes)
273 such a way that the hash field is not populated, or not
275 that at the time that __str__() is called, the hash is properly
282 h = self.hash
288 sattrs.append("hash")
290 # No hash to stash.
307 # hash. 'h' will only be in scope if the block
350 if hasattr(self, "hash") an
[all...]
H A D__init__.py253 The "ahash" parameter is used to set the hash value for the action.
318 action.hash = ahash
343 local_path, used_basedir = set_action_data(action.hash, action,
H A Ddepend.py383 if hasattr(act, "hash") and act.hash != "NOHASH":
384 out += " " + act.hash
/pkg/src/modules/flavor/
H A Dbase.py43 def __init__(self, file_path, dirs=None, hash=None):
47 self.hash = hash
52 elif self.hash != "NOHASH":
53 return _("Couldn't find '{hash}' needed for '{path}'"
55 "{dirs}").format(hash=self.hash,
197 return hash(self.key())
/pkg/src/modules/
H A Ddigest.py40 # pkg(7) uses cryptographic hash functions for a number of tasks. We define the
41 # default hash function, along with the hash name here. Note that the use of
49 # Other uses are essentially volatile, and the hash used has no persistence
50 # (e.g. saving the hash to a file in a temporary directory, when the hash gets
62 # support for a certain hash algorithm, but still retain the ability to install
63 # actions using that hash.
67 # the first hash value in the list when using the *old* publication model (ie.
71 # using the "least preferred" hash fo
[all...]
H A Dversion.py106 return hash(tuple(self))
489 # If a timestamp is present, it's enough to hash on, and is
493 return hash(self.timestr)
495 return hash((self.release, self.branch))
804 # If a timestamp is present, it's enough to hash on, and is
808 return hash(self.timestr)
810 return hash((self.release, self.branch))
H A Dfmri.py406 # __hash__ need not generate a unique hash value for all
408 # items which are equal (i.e. a = b) always hash to
413 h = self._hash = hash(self.version) + hash(self.pkg_name)
/pkg/src/util/publish/
H A Dpkgdiff.py312 if (hasattr(old, "hash") and
313 "hash" not in ignoreattrs):
314 if old.hash != new.hash:
315 s.append(" - {0}".format(old.hash))
316 s.append(" + {0}".format(new.hash))
323 if hasattr(old, "hash") and "hash" in onlyattrs:
324 if old.hash != new.hash
[all...]
/pkg/src/modules/bundle/
H A DSolarisPackageDirBundle.py145 # hash set to the package path.
146 yield act.hash, act
189 if act.hash == "NOHASH" and \
192 act.hash = data[len(self.filename) + 1:]
206 if act.hash == "NOHASH" and \
209 act.hash = data[len(self.filename) + 1:]
H A DSolarisPackageDatastreamBundle.py173 act.hash = "install/copyright"
/pkg/src/modules/client/transport/
H A Dexception.py213 return hash(self.key())
271 return hash(self.key())
310 return hash(self.key())
349 return hash(self.key())
354 """Raised when the content's hash/chash doesn't verify, or the
392 return hash(self.key())
442 return hash(self.key())
483 return hash(self.key())
/pkg/src/
H A Dsysrepo.py316 pub_info[uri] = [[prefix, cert, key, hash of the uri, proxy], ... ]
422 [[prefix, cert, key, hash of the uri, proxy, uri type], ... ]
439 # map URIs to (pub.prefix, cert, key, hash, proxy, utype) tuples
515 hash = _uri_hash(uri)
521 (prefix, cert, key, hash, proxy_map.get(uri), utype)
671 for (pub, cert_path, key_path, hash, proxy, utype) in \
701 for (pub, cert, key, hash, proxy, utype) in \
706 (uri, cert, key, hash, proxy, utype))
713 for (uri, cert_path, key_path, hash, proxy, utype) in \
720 [htdocs_path, pub, hash]
[all...]
H A Dpublish.py66 "pkg.content-hash",
446 path = pkg.actions.set_action_data(a.hash, a,
555 path, bd = pkg.actions.set_action_data(a.hash, a,
695 if "path" in action.attrs and hasattr(action, "hash") \
696 and action.hash == "NOHASH":
697 action.hash = action.attrs["path"]
H A Dpull.py323 if a.has_payload and a.hash not in hashes:
324 hashes.add(a.hash)
340 if a.has_payload and a.hash not in hashes:
342 hashes.add(a.hash)
719 if hasattr(act, "hash"):
727 "allowed.".format(act.hash))
1639 fhash = a.hash
1662 # preferred hash.
H A Dsign.py218 usage(_("The {0} hash algorithm does not use a key or "
299 a.hash = cert_path
311 # The hash of 'a' is currently a path, we need
312 # to find the hash of that file to allow
316 # Action identity still uses the 'hash'
318 # stay with the sha1 hash.
/pkg/src/tests/cli/
H A Dt_sysrepo.py396 hash = hashlib.sha1(misc.force_bytes("file://" +
398 url = "http://localhost:{port}/{pub}/{hash}/".format(
399 port=self.sysrepo_port, hash=hash,
437 hash = hashlib.sha1(misc.force_bytes(
439 url = "http://localhost:{port}/test1/{hash}/".format(
440 port=self.sysrepo_port, hash=hash)
568 hash = hashlib.sha1(misc.force_bytes(p5p_url.rstrip("/"))).hexdigest()
569 url = "http://localhost:{port}/test1/{hash}/"
[all...]
H A Dt_pkgrecv.py371 if not hasattr(a, "hash"):
374 ifile = open(os.path.join(basedir, a.hash),
418 if not hasattr(a, "hash"):
421 old = orepo.file(a.hash)
423 f.get_dir_path(), a.hash)
456 if not hasattr(a, "hash"):
459 old = orepo.file(a.hash)
460 new = nrepo.file(a.hash)
491 if not hasattr(a, "hash"):
494 old = orepo.file(a.hash)
[all...]
H A Dt_pkg_info.py832 license {hash} license=foo chash={chash} pkg.csize={csize} \
834 hash=a.hash, variable in class:TestPkgInfoPerTestRepo
/pkg/src/modules/client/
H A Dpkgplan.py253 # No need to generate hash of on-disk content as verify
254 # short-circuits hash comparison by setting replace_required
419 src.hash == dest.hash:
/pkg/src/tests/api/
H A Dt_action.py235 # Make sure that the hash member of the action object properly
236 # contains the value of the "hash" named attribute.
237 a = action.fromstr("file hash=abc123 path=usr/bin/foo mode=0755 owner=root group=bin")
238 self.assertTrue(a.hash == "abc123")
292 # the payload hash as the named attribute "hash", in which case
293 # the resulting re-stringification emits the payload hash as a
295 s = "file hash=abc123 path=usr/bin/foo mode=0755 owner=root group=bin"
300 self.assertTrue("hash=abc123" not in s2)
304 # ... unless of course the hash ca
[all...]
/pkg/src/modules/publish/
H A Dtransaction.py348 "pkg.content-hash" in
352 "pkg.content-hash" in
387 # If any of the default content hash attributes we need
422 self.add_file(path, basename=action.hash,
431 # Set the hash member for backwards compatibility and
433 action.hash = hashes.pop("hash", None)
436 # Add file content-hash when preferred_hash is SHA2 or higher.
444 action.attrs["pkg.content-hash"] = "{0}:{1}".format(
447 # Now set the hash valu
[all...]

Completed in 58 milliseconds

12