Searched refs:signature (Results 251 - 275 of 381) sorted by relevance

<<111213141516

/netbsd-current/sys/dev/pci/
H A Darcmsrvar.h75 uint32_t signature; member in struct:arc_msg_firmware_info
/netbsd-current/external/bsd/elftoolchain/dist/libdwarf/
H A Dlibdwarf_info.c250 memcpy(cu->cu_type_sig.signature,
/netbsd-current/sys/arch/x86/x86/
H A Dmpbios.c368 if (mp_cth->signature != MP_CT_SIG) {
369 aprint_error_dev(self, "MP signature mismatch (%x vs %x)\n",
370 MP_CT_SIG, mp_cth->signature);
412 * Look for the MP floating pointer signature in the given physical
432 "scanning 0x%jx to 0x%jx for MP signature\n",
438 if ((m->signature == MP_FP_SIG) &&
H A Dpowernow.c91 * The following CPUs do not have same CPUID signature
95 uint32_t rcpusig; /* Correct cpu signature */
96 uint32_t pcpusig; /* PST cpu signature */
488 * signature in the PST table. Accept to
493 __func__, cpusig, pst->signature));
496 pst->signature);
500 DPRINTF(("%s: pst->signature ok\n",
764 if (cpusig == pst->signature &&
/netbsd-current/sys/dev/isa/
H A Dseagate.c232 const char *signature; member in struct:__anon52
353 signatures[i].signature, signatures[i].length)) {
403 signatures[i].signature, signatures[i].length)) {
/netbsd-current/crypto/external/bsd/openssl.old/dist/apps/
H A Dx509.c139 {"badsig", OPT_BADSIG, '-', "Corrupt last byte of certificate signature (for test)"},
629 const ASN1_BIT_STRING *signature; local
631 X509_get0_signature(&signature, NULL, x);
632 corrupt_signature(signature);
/netbsd-current/crypto/external/bsd/openssl/dist/apps/
H A Dx509.c150 "Corrupt last byte of certificate signature (for test)"},
715 ? "Error while verifying certificate request self-signature\n"
716 : "Certificate request self-signature did not match the contents\n");
719 BIO_printf(bio_err, "Certificate request self-signature ok\n");
904 const ASN1_BIT_STRING *signature; local
906 X509_get0_signature(&signature, NULL, x);
907 corrupt_signature(signature);
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dssh-sk.c172 freezero(r->signature, r->signature_len);
435 resp->signature, resp->signature_len)) != 0 ||
565 /* Prepare and append inner signature object */
677 /* Assemble signature */
738 freezero(rks[i]->key.signature, rks[i]->key.signature_len);
H A Dsshd-session.c1330 struct sshkey *pubkey, u_char **signature, size_t *slenp,
1334 if (mm_sshkey_sign(ssh, privkey, signature, slenp,
1339 if (mm_sshkey_sign(ssh, pubkey, signature, slenp,
1329 sshd_hostkey_sign(struct ssh *ssh, struct sshkey *privkey, struct sshkey *pubkey, u_char **signature, size_t *slenp, const u_char *data, size_t dlen, const char *alg) argument
H A Dsshconnect2.c1182 * only attempt with the key's base signature type.
1191 * The signature algorithm will only differ from the key algorithm
1198 /* Filter base key signature alg against our configuration */
1214 * that also appears in the supported signature algorithms list from
1302 * PKCS#11 tokens may not support all signature algorithms,
1345 u_char *signature = NULL; local
1367 * and use it to complete the signature.
1371 * the signature.
1420 signature = NULL;
1423 error_f("no mutual signature supporte
[all...]
H A Dsk-usbhid.c286 /* generate an invalid signature on FIDO2 tokens */
665 /* generate an invalid signature on FIDO2 tokens */
861 if ((response->signature = calloc(1, len)) == NULL) {
862 skdebug(__func__, "calloc signature failed");
865 memcpy(response->signature, ptr, len);
896 free(response->signature);
927 skdebug(__func__, "calloc signature failed");
960 skdebug(__func__, "calloc signature failed");
/netbsd-current/external/gpl3/binutils.old/dist/gold/
H A Dgdb-index.cc207 uint64_t signature, Dwarf_die*);
333 off_t type_offset, uint64_t signature,
339 signature);
332 visit_type_unit(off_t tu_offset, off_t, off_t type_offset, uint64_t signature, Dwarf_die* root_die) argument
H A Dincremental.cc1672 // For each kept COMDAT group, write the group signature.
2087 const char* signature = this->input_reader_.get_comdat_group_signature(i);
2088 if (signature == NULL || signature[0] == '\0')
2089 this->error(_("COMDAT group has no signature"));
2090 bool keep = layout->find_or_add_kept_section(signature, this, i, true,
2093 incremental_inputs->report_comdat_group(this, signature);
2096 signature);
H A Dobject.cc982 // Look up the group signature, which is the name of a symbol. ELF
1013 // Get the section group signature.
1021 std::string signature(psymnames + sym.get_st_name());
1026 if (signature[0] == '\0' && sym.get_st_type() == elfcpp::STT_SECTION)
1040 signature = section_names + member_shdr.get_sh_name();
1044 // seen one with the same signature.
1056 include_group = layout->find_or_add_kept_section(signature,
1066 incremental_inputs->report_comdat_group(this, signature.c_str());
1133 layout->layout_group(symtab, this, index, name, signature.c_str(),
1149 // signature
[all...]
H A Dlayout.cc1385 const char* signature,
1398 // We need to find a symbol with the signature in the symbol table.
1400 Symbol* sym = symtab->lookup(signature, NULL);
1409 // We will wind up using a symbol whose name is the signature.
1410 // So just put the signature in the symbol name pool to save it.
1411 signature = symtab->canonicalize_name(signature);
1412 this->group_signatures_.push_back(Group_signature(os, signature));
2533 Symbol* sym = symtab->lookup(p->signature, NULL);
2539 // signature, an
[all...]
/netbsd-current/external/gpl3/binutils/dist/gold/
H A Dgdb-index.cc207 uint64_t signature, Dwarf_die*);
333 off_t type_offset, uint64_t signature,
339 signature);
332 visit_type_unit(off_t tu_offset, off_t, off_t type_offset, uint64_t signature, Dwarf_die* root_die) argument
H A Dincremental.cc1672 // For each kept COMDAT group, write the group signature.
2087 const char* signature = this->input_reader_.get_comdat_group_signature(i);
2088 if (signature == NULL || signature[0] == '\0')
2089 this->error(_("COMDAT group has no signature"));
2090 bool keep = layout->find_or_add_kept_section(signature, this, i, true,
2093 incremental_inputs->report_comdat_group(this, signature);
2096 signature);
H A Dobject.cc982 // Look up the group signature, which is the name of a symbol. ELF
1013 // Get the section group signature.
1021 std::string signature(psymnames + sym.get_st_name());
1026 if (signature[0] == '\0' && sym.get_st_type() == elfcpp::STT_SECTION)
1040 signature = section_names + member_shdr.get_sh_name();
1044 // seen one with the same signature.
1056 include_group = layout->find_or_add_kept_section(signature,
1066 incremental_inputs->report_comdat_group(this, signature.c_str());
1133 layout->layout_group(symtab, this, index, name, signature.c_str(),
1149 // signature
[all...]
H A Dlayout.cc1388 const char* signature,
1401 // We need to find a symbol with the signature in the symbol table.
1403 Symbol* sym = symtab->lookup(signature, NULL);
1412 // We will wind up using a symbol whose name is the signature.
1413 // So just put the signature in the symbol name pool to save it.
1414 signature = symtab->canonicalize_name(signature);
1415 this->group_signatures_.push_back(Group_signature(os, signature));
2537 Symbol* sym = symtab->lookup(p->signature, NULL);
2543 // signature, an
[all...]
/netbsd-current/external/bsd/libarchive/dist/libarchive/
H A Darchive_read_support_format_mtree.c670 const char *signature = "#mtree"; local
676 p = __archive_read_ahead(a, strlen(signature), NULL);
680 if (memcmp(p, signature, strlen(signature)) == 0)
681 return (8 * (int)strlen(signature));
684 * There is not a mtree signature. Let's try to detect mtree format.
/netbsd-current/external/gpl3/binutils.old/dist/binutils/
H A Dresbin.c424 rc_uint_type signature; local
436 signature = windres_get_16 (wrbfd, data + 2, 2);
437 if (signature != 0xffff)
980 unsigned long signature, fiv; local
988 signature = windres_get_32 (wrbfd, data, 4);
989 if (signature != 0xfeef04bd)
990 fatal (_("unexpected fixed version signature %lu"), signature);
/netbsd-current/external/gpl3/binutils/dist/binutils/
H A Dresbin.c424 rc_uint_type signature; local
436 signature = windres_get_16 (wrbfd, data + 2, 2);
437 if (signature != 0xffff)
980 unsigned long signature, fiv; local
988 signature = windres_get_32 (wrbfd, data, 4);
989 if (signature != 0xfeef04bd)
990 fatal (_("unexpected fixed version signature %lu"), signature);
/netbsd-current/external/bsd/wpa/dist/src/common/
H A Ddpp.c4593 unsigned char *signature = NULL; local
4618 wpa_printf(MSG_DEBUG, "DPP: Unknown signature algorithm");
4718 signature = os_malloc(signature_len);
4719 if (!signature)
4721 if (EVP_DigestSignFinal(md_ctx, signature, &signature_len) != 1) {
4726 wpa_hexdump(MSG_DEBUG, "DPP: signedConnector ECDSA signature (DER)",
4727 signature, signature_len);
4729 p = signature;
4734 if (dpp_bn2bin_pad(r, signature, curve->prime_len) < 0 ||
4735 dpp_bn2bin_pad(s, signature
5562 unsigned char *prot_hdr = NULL, *signature = NULL; local
8215 unsigned char *signature = NULL; local
[all...]
/netbsd-current/crypto/external/bsd/heimdal/dist/lib/hx509/
H A Dcms.c343 * @param encryptedContent in case of detached signature, this
771 * Decode SignedData and verify that the signature is correct.
781 * @param signedContent external data used for signature.
881 if (signer_info->signature.length == 0) {
924 "but messageDigest (signature) "
932 "messageDigest (signature)");
943 "messageDigest (signature)");
1029 &signer_info->signature);
1032 "Failed to verify signature in "
1139 * Decode SignedData and verify that the signature i
[all...]
/netbsd-current/sys/dev/pci/bktr/
H A Dbktr_reg.h597 u_char signature[Bt848_MAX_SIGN]; member in struct:bt848_card_sig

Completed in 416 milliseconds

<<111213141516