Searched refs:signature (Results 151 - 175 of 840) sorted by relevance

1234567891011>>

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/gdb/include/nlm/
H A Dalpha-ext.h71 /* The signature field identifies the file as an NLM. It must contain
72 the signature string, which depends upon the NLM target. */
74 unsigned char signature[24]; member in struct:nlm32_alpha_external_fixed_header
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/toolchains/hndtools-arm-linux-2.6.36-uclibc-4.5.3/usr/include/linux/
H A Dcramfs_fs.h59 __u8 signature[16]; /* "Compressed ROMFS" */ member in struct:cramfs_super
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/udev/extras/volume_id/lib/
H A Dcramfs.c34 uint8_t signature[16]; member in struct:cramfs_super
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/toolchains/hndtools-arm-linux-2.6.36-uclibc-4.5.3/arm-linux/sysroot/usr/include/linux/
H A Dcramfs_fs.h59 __u8 signature[16]; /* "Compressed ROMFS" */ member in struct:cramfs_super
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/crypto/asn1/
H A Dx_req.c109 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/toolchains/hndtools-arm-linux-2.6.36-uclibc-4.5.3/arm-brcm-linux-uclibcgnueabi/sysroot/usr/include/linux/
H A Dcramfs_fs.h59 __u8 signature[16]; /* "Compressed ROMFS" */ member in struct:cramfs_super
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/asn1/
H A Dx_req.c111 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
/asuswrt-rt-n18u-9.0.0.4.380.2695/toolchain/tools/firmware-utils/src/
H A Dfw.h54 typedef struct signature { struct
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/test/
H A Dtestgen40 echo signature on req is wrong
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl-1.0.0q/test/
H A Dtestgen40 echo signature on req is wrong
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl-1.0.0q/test/
H A Dtestgen40 echo signature on req is wrong
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/test/
H A Dtestgen40 echo signature on req is wrong
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/test/
H A Dtestgen40 echo signature on req is wrong
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl-1.0.0q/test/
H A Dtestgen40 echo signature on req is wrong
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/iproute2/misc/
H A Drtacct.c71 char signature[128]; member in struct:rtacct_data
163 fprintf(fp, "#%s\n", kern_db->signature);
225 fprintf(fp, "#%s\n", kern_db->signature);
371 sprintf(kern_db->signature,
602 if (hist_db && hist_db->signature[0] &&
603 strcmp(kern_db->signature, hist_db->signature)) {
612 if (hist_db && hist_db->signature[0] &&
613 strcmp(hist_db->signature, "kernel")) {
619 strcpy(kern_db->signature, "kerne
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/iproute2-3.x/misc/
H A Drtacct.c71 char signature[128]; member in struct:rtacct_data
163 fprintf(fp, "#%s\n", kern_db->signature);
225 fprintf(fp, "#%s\n", kern_db->signature);
371 sprintf(kern_db->signature,
605 if (hist_db && hist_db->signature[0] &&
606 strcmp(kern_db->signature, hist_db->signature)) {
615 if (hist_db && hist_db->signature[0] &&
616 strcmp(hist_db->signature, "kernel")) {
622 strcpy(kern_db->signature, "kerne
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/iproute2/misc/
H A Drtacct.c71 char signature[128]; member in struct:rtacct_data
163 fprintf(fp, "#%s\n", kern_db->signature);
225 fprintf(fp, "#%s\n", kern_db->signature);
371 sprintf(kern_db->signature,
602 if (hist_db && hist_db->signature[0] &&
603 strcmp(kern_db->signature, hist_db->signature)) {
612 if (hist_db && hist_db->signature[0] &&
613 strcmp(hist_db->signature, "kernel")) {
619 strcpy(kern_db->signature, "kerne
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/iproute2-3.x/misc/
H A Drtacct.c71 char signature[128]; member in struct:rtacct_data
163 fprintf(fp, "#%s\n", kern_db->signature);
225 fprintf(fp, "#%s\n", kern_db->signature);
371 sprintf(kern_db->signature,
605 if (hist_db && hist_db->signature[0] &&
606 strcmp(kern_db->signature, hist_db->signature)) {
615 if (hist_db && hist_db->signature[0] &&
616 strcmp(hist_db->signature, "kernel")) {
622 strcpy(kern_db->signature, "kerne
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/iproute2/misc/
H A Drtacct.c71 char signature[128]; member in struct:rtacct_data
163 fprintf(fp, "#%s\n", kern_db->signature);
225 fprintf(fp, "#%s\n", kern_db->signature);
371 sprintf(kern_db->signature,
602 if (hist_db && hist_db->signature[0] &&
603 strcmp(kern_db->signature, hist_db->signature)) {
612 if (hist_db && hist_db->signature[0] &&
613 strcmp(hist_db->signature, "kernel")) {
619 strcpy(kern_db->signature, "kerne
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/iproute2-3.x/misc/
H A Drtacct.c71 char signature[128]; member in struct:rtacct_data
163 fprintf(fp, "#%s\n", kern_db->signature);
225 fprintf(fp, "#%s\n", kern_db->signature);
371 sprintf(kern_db->signature,
605 if (hist_db && hist_db->signature[0] &&
606 strcmp(kern_db->signature, hist_db->signature)) {
615 if (hist_db && hist_db->signature[0] &&
616 strcmp(hist_db->signature, "kernel")) {
622 strcpy(kern_db->signature, "kerne
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/openssl/crypto/x509/
H A Dx_all.c76 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
79 a->signature, a->cert_info, r));
85 a->sig_alg, a->signature, a->req_info, r));
91 a->sig_algor, a->signature, a->spkac, r));
97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
98 x->sig_alg, x->signature, x->cert_info, pkey, md));
105 x->cert_info->signature,
106 x->sig_alg, x->signature, x->cert_info, ctx);
118 x->signature, x->req_info, pkey, md));
124 x->sig_alg, NULL, x->signature,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/auth/kerberos/
H A Dkerberos_pac.c45 cksum.checksum.length = sig->signature.length;
46 cksum.checksum.data = sig->signature.data;
218 DEBUG(0,("can't parse the KDC signature: %s\n",
228 DEBUG(0,("can't parse the SRV signature: %s\n",
234 memset(kdc_sig_wipe->signature.data, '\0', kdc_sig_wipe->signature.length);
235 memset(srv_sig_wipe->signature.data, '\0', srv_sig_wipe->signature.length);
244 DEBUG(0,("can't repack the KDC signature: %s\n",
254 DEBUG(0,("can't repack the SRV signature
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/auth/kerberos/
H A Dkerberos_pac.c45 cksum.checksum.length = sig->signature.length;
46 cksum.checksum.data = sig->signature.data;
218 DEBUG(0,("can't parse the KDC signature: %s\n",
228 DEBUG(0,("can't parse the SRV signature: %s\n",
234 memset(kdc_sig_wipe->signature.data, '\0', kdc_sig_wipe->signature.length);
235 memset(srv_sig_wipe->signature.data, '\0', srv_sig_wipe->signature.length);
244 DEBUG(0,("can't repack the KDC signature: %s\n",
254 DEBUG(0,("can't repack the SRV signature
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/openssl/crypto/x509/
H A Dx_all.c76 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
79 a->signature, a->cert_info, r));
85 a->sig_alg, a->signature, a->req_info, r));
91 a->sig_algor, a->signature, a->spkac, r));
97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
98 x->sig_alg, x->signature, x->cert_info, pkey, md));
105 x->cert_info->signature,
106 x->sig_alg, x->signature, x->cert_info, ctx);
118 x->signature, x->req_info, pkey, md));
124 x->sig_alg, NULL, x->signature,
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/openssl/crypto/x509/
H A Dx_all.c76 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
79 a->signature, a->cert_info, r));
85 a->sig_alg, a->signature, a->req_info, r));
91 a->sig_algor, a->signature, a->spkac, r));
97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
98 x->sig_alg, x->signature, x->cert_info, pkey, md));
105 x->cert_info->signature,
106 x->sig_alg, x->signature, x->cert_info, ctx);
118 x->signature, x->req_info, pkey, md));
124 x->sig_alg, NULL, x->signature,
[all...]

Completed in 272 milliseconds

1234567891011>>