Searched refs:signature (Results 201 - 225 of 381) sorted by relevance

1234567891011>>

/netbsd-current/sys/arch/ia64/stand/ia64/efi/
H A Dmain.c87 printf("Bad signature for SAL System Table\n");
337 printf("Bad signature for SAL System Table\n");
515 if (memcmp(tbl->signature, HCDP_SIGNATURE, sizeof(tbl->signature))) {
516 printf("HCDP table has invalid signature\n");
520 printf("Signature = %s\n", hcdp_string(tbl->signature, 4));
/netbsd-current/sys/dev/isa/
H A Dif_ef.c631 const u_char *signature = EF_SIGNATURE; local
633 for (i = 0; i < strlen(signature); i++) {
635 if (ch != signature[i])
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dauthfd.c389 /* encode signature algorithm in flag bits, so we can keep the msg format */
753 /* Binds a session ID to a hostkey via the initial KEX signature. */
756 const struct sshbuf *session_id, const struct sshbuf *signature,
762 if (key == NULL || session_id == NULL || signature == NULL)
770 (r = sshbuf_put_stringb(msg, signature)) != 0 ||
755 ssh_agent_bind_hostkey(int sock, const struct sshkey *key, const struct sshbuf *session_id, const struct sshbuf *signature, int forwarding) argument
H A Dmonitor.c603 u_char *p = NULL, *signature = NULL; local
624 * Otherwise, verify the signature request is for a hostkey
627 * XXX perform similar check for KEX signature requests too?
663 if ((r = sshkey_sign(key, &signature, &siglen, p, datlen, alg,
668 if ((r = ssh_agent_sign(auth_sock, key, &signature, &siglen,
674 debug3_f("%s %s signature len=%zu", alg,
678 if ((r = sshbuf_put_string(m, signature, siglen)) != 0)
683 free(signature);
1165 * mismatches in the signature algorithm. (Signature algorithm checks are
1439 const u_char *signature, *dat local
[all...]
/netbsd-current/external/mpl/dhcp/bind/include/dns/
H A Drdatastruct.h746 unsigned char *signature; member in struct:dns_rdata_sig_t
1432 unsigned char *signature; member in struct:dns_rdata_rrsig
2269 unsigned char *signature; member in struct:dns_rdata_any_tsig
/netbsd-current/external/mpl/bind/include/dns/
H A Drdatastruct.h669 unsigned char *signature; member in struct:dns_rdata_sig_t
1289 unsigned char *signature; member in struct:dns_rdata_rrsig
2046 unsigned char *signature; member in struct:dns_rdata_any_tsig
/netbsd-current/external/gpl3/binutils/dist/binutils/
H A Dod-pe.c720 unsigned int signature = (int) bfd_h_get_16 (abfd, ihdr.nt_signature); local
721 if (signature != IMAGE_NT_SIGNATURE)
723 non_fatal ("file does not have an NT format signature: %#x",
724 signature);
/netbsd-current/external/gpl3/gdb/dist/gdb/dwarf2/
H A Dread-gdb-index.c504 ULONGEST signature; local
514 signature = extract_unsigned_integer (bytes + 16, 8, BFD_ENDIAN_LITTLE);
517 sig_type = per_bfd->allocate_signatured_type (signature);
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/ref/
H A Dpkcs11.h1202 unsigned char *signature,
1209 unsigned char *signature,
1218 unsigned char *signature,
1228 unsigned char *signature,
1235 unsigned char *signature,
1243 unsigned char *signature,
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/openssl/
H A Dx509.h268 ASN1_BIT_STRING *signature; member in struct:Netscape_spki_st
613 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey);
619 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
626 ASN1_BIT_STRING *signature, void *data, EVP_PKEY *pkey);
629 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *data,
632 X509_ALGOR *algor2, ASN1_BIT_STRING *signature,
/netbsd-current/external/gpl3/gdb.old/dist/gdb/dwarf2/
H A Dread.c455 .debug_info calls this "dwo_id", .debug_types calls this "signature".
457 ULONGEST signature; member in struct:dwo_unit
1299 const char *comp_dir, ULONGEST signature, int is_debug_types);
1305 ULONGEST signature);
2110 dwarf2_per_bfd::allocate_signatured_type (ULONGEST signature)
2112 signatured_type_up result (new signatured_type (signature));
2196 ULONGEST signature;
2206 signature = extract_unsigned_integer (bytes + 16, 8, BFD_ENDIAN_LITTLE);
2209 sig_type = per_bfd->allocate_signatured_type (signature);
2257 (cu_header.signature);
2106 allocate_signatured_type(ULONGEST signature) argument
2192 ULONGEST signature; local
6123 gdb::optional<ULONGEST> signature = lookup_dwo_id (cu, comp_unit_die); local
9982 gdb::optional<ULONGEST> signature = lookup_dwo_id (cu, comp_unit_die); local
10535 create_dwo_unit_in_dwp_v1(dwarf2_per_objfile *per_objfile, struct dwp_file *dwp_file, uint32_t unit_index, const char *comp_dir, ULONGEST signature, int is_debug_types) argument
10724 create_dwo_unit_in_dwp_v2(dwarf2_per_objfile *per_objfile, struct dwp_file *dwp_file, uint32_t unit_index, const char *comp_dir, ULONGEST signature, int is_debug_types) argument
10891 create_dwo_unit_in_dwp_v5(dwarf2_per_objfile *per_objfile, struct dwp_file *dwp_file, uint32_t unit_index, const char *comp_dir, ULONGEST signature, int is_debug_types) argument
11063 lookup_dwo_unit_in_dwp(dwarf2_per_objfile *per_objfile, struct dwp_file *dwp_file, const char *comp_dir, ULONGEST signature, int is_debug_types) argument
11661 lookup_dwo_cutu(dwarf2_cu *cu, const char *dwo_name, const char *comp_dir, ULONGEST signature, int is_debug_types) argument
11776 lookup_dwo_comp_unit(dwarf2_cu *cu, const char *dwo_name, const char *comp_dir, ULONGEST signature) argument
11804 ULONGEST signature = dwo_unit->signature; local
21502 ULONGEST signature = attr->as_signature (); local
22849 ULONGEST signature = attr->as_signature (); local
22883 get_signatured_type(struct die_info *die, ULONGEST signature, struct dwarf2_cu *cu) argument
[all...]
/netbsd-current/sbin/amrctl/
H A Damrctl.c101 const uint32_t signature; member in struct:__anon260
276 if (cardtype == prodtable[i].signature) {
282 product = "unknown card signature";
/netbsd-current/external/bsd/openldap/dist/contrib/slapd-modules/comp_match/
H A Dcrl.h285 ComponentAlgorithmIdentifier* signature; /* AlgorithmIdentifier */ member in struct:TBSCertList
314 ComponentBits signature; /* BIT STRING */ member in struct:CertificateList
H A Dcertificate.h326 ComponentAlgorithmIdentifier* signature; /* AlgorithmIdentifier */ member in struct:TBSCertificate
357 ComponentBits signature; /* BIT STRING */ member in struct:Certificate
/netbsd-current/sys/external/bsd/drm2/dist/drm/nouveau/nvkm/subdev/acr/
H A Dnouveau_nvkm_subdev_acr_gm200.c112 if (WARN_ON(lsfw->sig->size != sizeof(hdr.signature)))
115 memcpy(&hdr.signature, lsfw->sig->data, lsfw->sig->size);
290 /* Patch the appropriate signature (production/debug) into the FW
299 nvkm_debug(subdev, "patching production signature\n");
304 nvkm_debug(subdev, "patching debug signature\n");
/netbsd-current/sys/fs/hfs/
H A Dlibhfs.h252 uint16_t signature; member in struct:__anon23
413 uint16_t signature; member in struct:__anon36
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/
H A Dct_test.c429 "\x04\x03" /* hash and signature algorithms */
430 "\x00\x47" /* signature length */
431 /* signature */
454 const char signature[] = "BAMARzBAMiBIL2dRrzXbplQ2vh/WZA89v5pBQpSVkkUwKI+j5" local
465 extensions, signature)))
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/x509/
H A Dx_crl.c44 * the original encoding the signature won't be affected by reordering of the
318 ASN1_EMBED(X509_CRL, signature, ASN1_BIT_STRING)
380 &crl->sig_alg, &crl->signature, &crl->crl, r));
/netbsd-current/external/bsd/dhcpcd/dist/hooks/
H A Ddhcpcd-run-hooks8 signature="$signature_base $from $ifname"
H A D20-resolv.conf105 conf="$signature$NL"
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/x509/
H A Dx_crl.c44 * the original encoding the signature won't be affected by reordering of the
327 ASN1_EMBED(X509_CRL, signature, ASN1_BIT_STRING)
401 &crl->sig_alg, &crl->signature, &crl->crl, NULL,
/netbsd-current/crypto/external/bsd/openssl/dist/test/
H A Dct_test.c422 "\x04\x03" /* hash and signature algorithms */
423 "\x00\x47" /* signature length */
424 /* signature */
445 const char signature[] = "BAMARzBAMiBIL2dRrzXbplQ2vh/WZA89v5pBQpSVkkUwKI+j5" local
460 extensions, signature)))
/netbsd-current/external/mpl/dhcp/bind/dist/lib/dns/
H A Ddnssec.c263 * The actual contents of sig.signature are not important yet, since
266 sig.signature = isc_mem_get(mctx, sig.siglen);
354 isc_buffer_init(&sigbuf, sig.signature, sig.siglen);
374 isc_mem_put(mctx, sig.signature, sig.siglen);
480 * Digest the SIG rdata (not including the signature).
566 r.base = sig.signature;
988 sig.signature = NULL;
1030 sig.signature = isc_mem_get(mctx, sig.siglen);
1032 isc_buffer_init(&sigbuf, sig.signature, sig.siglen);
1043 isc_mem_put(mctx, sig.signature, si
[all...]
/netbsd-current/external/mpl/bind/dist/lib/dns/
H A Ddnssec.c259 * The actual contents of sig.signature are not important yet, since
262 sig.signature = isc_mem_get(mctx, sig.siglen);
350 isc_buffer_init(&sigbuf, sig.signature, sig.siglen);
370 isc_mem_put(mctx, sig.signature, sig.siglen);
476 * Digest the SIG rdata (not including the signature).
562 r.base = sig.signature;
988 sig.signature = NULL;
1030 sig.signature = isc_mem_get(mctx, sig.siglen);
1032 isc_buffer_init(&sigbuf, sig.signature, sig.siglen);
1043 isc_mem_put(mctx, sig.signature, si
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/
H A Dtest_ca.in294 echo "sign CMS signature (generate key)"
300 echo "verify CMS signature (generate key)"
429 --signature-algorithm=rsa-with-sha256 \
442 --signature-algorithm=rsa-with-sha1 \

Completed in 319 milliseconds

1234567891011>>