Searched refs:signature (Results 51 - 75 of 381) sorted by relevance

1234567891011>>

/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/x509/
H A Dx_req.c63 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
H A Dx_all.c24 if (X509_ALGOR_cmp(&a->sig_alg, &a->cert_info.signature))
27 &a->signature, &a->cert_info, r));
33 &a->sig_alg, a->signature, &a->req_info, r));
39 &a->sig_algor, a->signature, a->spkac, r));
52 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), &x->cert_info.signature,
53 &x->sig_alg, &x->signature, &x->cert_info, pkey,
61 &x->cert_info.signature,
62 &x->sig_alg, &x->signature, &x->cert_info, ctx);
77 x->signature, &x->req_info, pkey, md));
84 &x->sig_alg, NULL, x->signature,
[all...]
/netbsd-current/external/gpl3/gdb/dist/gdb/testsuite/gdb.dwarf2/
H A Dstruct-with-sig.exp32 {signature 0x0000000000000001 ref_sig8}
48 {signature 0x0000000000000002 ref_sig8}
H A Dstruct-with-sig-2.exp96 {signature 0x0000000000000001 ref_sig8}
112 {signature 0x0000000000000002 ref_sig8}
/netbsd-current/external/gpl3/gdb.old/dist/gdb/testsuite/gdb.dwarf2/
H A Dstruct-with-sig.exp34 {signature 0x0000000000000001 ref_sig8}
50 {signature 0x0000000000000002 ref_sig8}
/netbsd-current/external/bsd/libbind/dist/dst/
H A Dhmac_link.c73 * UPDATE (hash (more) data), FINAL (generate a signature). This
81 * signature location to store signature.
82 * sig_len size of the signature location
84 * N Success on SIG_MODE_FINAL = returns signature length in bytes
92 u_char *signature, const int sig_len)
119 if (signature == NULL || sig_len < MD5_LEN)
121 MD5Final(signature, ctx);
126 MD5Update(ctx, signature, MD5_LEN);
127 MD5Final(signature, ct
90 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
159 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
[all...]
H A Ddst_internal.h84 u_int8_t *signature, const int sig_len);
87 const u_int8_t *signature, const int sig_len);
/netbsd-current/lib/libresolv/
H A Dhmac_link.c63 * UPDATE (hash (more) data), FINAL (generate a signature). This
71 * signature location to store signature.
72 * sig_len size of the signature location
74 * N Success on SIG_MODE_FINAL = returns signature length in bytes
82 u_char *signature, const int sig_len)
109 if (signature == NULL || sig_len < MD5_LEN)
111 MD5Final(signature, ctx);
116 MD5Update(ctx, signature, MD5_LEN);
117 MD5Final(signature, ct
80 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
149 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
[all...]
/netbsd-current/external/bsd/libarchive/dist/libarchive/test/
H A Dtest_read_filter_program_signature.c34 #define signature archive macro
75 signature, signature_len));
88 * Test bad signature.
/netbsd-current/external/bsd/openresolv/dist/
H A Dpdnsd.in37 signature="# Generated by resolvconf"
143 remove_markers "$signature" "$signature_end" "$pdnsd_conf" > "$cf"
145 echo "$signature" >> "$cf"
/netbsd-current/external/gpl3/binutils.old/dist/gprofng/src/
H A DDbeJarFile.cc175 // 0 4 central file header signature = 0x02014b50
195 uint32_t signature = get_u4 (b); local
196 if (signature != 0x02014b50)
198 append_msg (CMSG_ERROR, GTXT ("%s: wrong header signature (%lld (total %lld), offset=0x%016llx last=0x%016llx"),
247 // 0 4 local file header signature = 0x04034b50
268 uint32_t signature = get_u4 (b); local
269 if (signature != 0x04034b50)
272 GTXT ("%s: wrong local header signature ('%s' offset=%lld (0x%llx)"),
380 // 0 4 end of central directory signature = 0x06054b50
403 uint32_t signature local
448 uint32_t signature = get_u4 (b); local
[all...]
H A DFunction.h203 return signature;
209 signature = dbe_strdup (s);
218 char *signature; member in class:JMethod
/netbsd-current/external/gpl3/binutils/dist/gprofng/src/
H A DDbeJarFile.cc175 // 0 4 central file header signature = 0x02014b50
195 uint32_t signature = get_u4 (b); local
196 if (signature != 0x02014b50)
198 append_msg (CMSG_ERROR, GTXT ("%s: wrong header signature (%lld (total %lld), offset=0x%016llx last=0x%016llx"),
247 // 0 4 local file header signature = 0x04034b50
268 uint32_t signature = get_u4 (b); local
269 if (signature != 0x04034b50)
272 GTXT ("%s: wrong local header signature ('%s' offset=%lld (0x%llx)"),
380 // 0 4 end of central directory signature = 0x06054b50
403 uint32_t signature local
448 uint32_t signature = get_u4 (b); local
[all...]
H A DFunction.h203 return signature;
209 signature = dbe_strdup (s);
218 char *signature; member in class:JMethod
/netbsd-current/external/bsd/ntp/dist/sntp/libevent/
H A Devthread.c166 unsigned signature; member in struct:debug_lock
190 result->signature = DEBUG_LOCK_SIG;
203 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
210 lock->signature = 0x12300fda;
217 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
250 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
283 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
/netbsd-current/external/bsd/libevent/dist/
H A Devthread.c189 unsigned signature; member in struct:debug_lock
213 result->signature = DEBUG_LOCK_SIG;
226 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
233 lock->signature = 0x12300fda;
240 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
273 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
306 EVUTIL_ASSERT(DEBUG_LOCK_SIG == lock->signature);
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dssh-pkcs11-helper.c182 u_char *blob, *data, *signature = NULL; local
188 /* XXX support SHA2 signature flags */
203 signature = xmalloc(slen);
204 ret = RSA_private_encrypt(dlen, data, signature,
213 signature = xmalloc(xslen);
215 ret = ECDSA_sign(-1, data, dlen, signature,
233 (r = sshbuf_put_string(msg, signature, slen)) != 0)
241 free(signature);
H A Dkexgexc.c151 u_char *signature = NULL; local
172 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 ||
203 if ((r = sshkey_verify(server_host_key, signature, slen, hash,
211 /* save initial signature and hostkey */
221 if ((r = sshbuf_put(kex->initial_sig, signature, slen)) != 0)
236 free(signature);
H A Dsshsig.c70 error_fr(r, "base64 encode signature");
106 error("Couldn't parse signature: missing header");
129 error("Couldn't parse signature: missing footer");
194 /* If using RSA keys then default to a good signature algorithm */
221 error_fr(r, "assemble signature object");
247 error("Couldn't verify signature: invalid format");
270 sshsig_peek_hashalg(struct sshbuf *signature, char **hashalgp) argument
278 if ((buf = sshbuf_fromb(signature)) == NULL)
287 error_fr(r, "parse signature object");
302 sshsig_wrap_verify(struct sshbuf *signature, cons argument
472 sshsig_verifyb(struct sshbuf *signature, const struct sshbuf *message, const char *expect_namespace, struct sshkey **sign_keyp, struct sshkey_sig_details **sig_details) argument
600 sshsig_verify_fd(struct sshbuf *signature, int fd, const char *expect_namespace, struct sshkey **sign_keyp, struct sshkey_sig_details **sig_details) argument
1144 sshsig_get_pubkey(struct sshbuf *signature, struct sshkey **pubkey) argument
[all...]
/netbsd-current/external/bsd/pkg_install/dist/lib/
H A Dpkcs7.c111 const char *signature, size_t signature_len,
142 sig = BIO_new_mem_buf(__UNCONST(signature), signature_len);
147 warnx("Failed to parse the signature");
152 warnx("Failed to verify signature");
231 char **signature, size_t *signature_len,
298 warnx("Failed to create signature structure");
305 *signature = xmalloc(*signature_len);
306 memcpy(*signature, tmp_sig, *signature_len);
110 easy_pkcs7_verify(const char *content, size_t len, const char *signature, size_t signature_len, const char *anchor, int is_pkg) argument
230 easy_pkcs7_sign(const char *content, size_t len, char **signature, size_t *signature_len, const char *key_file, const char *cert_file) argument
/netbsd-current/crypto/external/cpl/trousers/dist/src/tspi/daa/
H A Ddaa_structs.c1101 e_2_i_TSS_DAA_SIGNATURE(TSS_DAA_SIGNATURE* signature) argument
1107 signature_intern->zeta = bi_set_as_nbin( signature->zetaLength, signature->zeta);
1108 signature_intern->capitalT = bi_set_as_nbin( signature->capitalTLength,
1109 signature->capitalT);
1110 signature_intern->challenge_length = signature->challengeLength;
1111 signature_intern->challenge = (BYTE *)malloc( signature->challengeLength);
1113 signature->challenge,
1114 signature->challengeLength);
1115 signature_intern->nonce_tpm_length = signature
1133 free_TSS_DAA_SIGNATURE_internal(TSS_DAA_SIGNATURE_internal *signature) argument
[all...]
/netbsd-current/lib/libc/arch/powerpc64/string/
H A Dbzero.S36 mr 5, 4 # translate to memcpy signature
/netbsd-current/sys/arch/x86/include/
H A Dpowernow.h142 char signature[10]; /* AMDK7PNOW! */ member in struct:powernow_psb_s
151 uint32_t signature; member in struct:powernow_pst_s
/netbsd-current/external/bsd/wpa/dist/src/tls/
H A Dx509v3.h55 struct x509_algorithm_identifier signature; member in struct:x509_certificate
139 struct x509_algorithm_identifier *signature,
/netbsd-current/sys/compat/netbsd32/
H A Dnetbsd32_exec_elf32.c86 extern int ELFNAME2(netbsd,signature)(struct lwp *, struct exec_package *,
95 if ((error = ELFNAME2(netbsd,signature)(l, epp, eh)) != 0)

Completed in 489 milliseconds

1234567891011>>