Searched refs:signature (Results 76 - 100 of 381) sorted by relevance

1234567891011>>

/netbsd-current/sys/dev/cardbus/
H A Dcardbus_exrom.c58 * 0x00 1 signature byte 1 (0x55)
59 * 0x01 1 signature byte 2 (0xAA)
66 * 0x00 4 signature (PCIR)
108 "bad header signature in ROM image %u: 0x%04x\n",
145 char signature[4];
164 memcpy(header->signature, hdr + PCI_EXROM_DATA_SIGNATURE, 4);
/netbsd-current/crypto/external/bsd/netpgp/dist/src/netpgpverify/
H A Dlibverify.c123 /* a signature sub packet */
170 /* a signature packet */
178 /* a one-pass signature packet */
295 int64_t sigtime; /* time of signature */
296 char why[PGPV_REASON_LEN]; /* reason for bad signature */
384 /* signature mpi indices in bignumber array */
391 /* signature types */
394 #define SIGTYPE_STANDALONE 0x02 /* Standalone signature */
405 #define SIGTYPE_KEY_REVOCATION 0x20 /* Key revocation signature */
406 #define SIGTYPE_SUBKEY_REVOCATION 0x28 /* Subkey revocation signature */
1601 recog_signature(pgpv_t *pgp, pgpv_signature_t *signature) argument
1619 pgpv_signature_t signature; local
1653 pgpv_signature_t signature; local
1680 pgpv_signature_t signature; local
2143 valid_dates(pgpv_signature_t *signature, pgpv_pubkey_t *pubkey, char *buf, size_t size) argument
2458 pgpv_signature_t signature; local
2842 match_sig(pgpv_cursor_t *cursor, pgpv_signature_t *signature, pgpv_pubkey_t *pubkey, uint8_t *data, size_t size) argument
2890 fixup_ssh_keyid(pgpv_t *pgp, pgpv_signature_t *signature, const char *hashtype) argument
2948 match_sig_id(pgpv_cursor_t *cursor, pgpv_t *pgp, pgpv_signature_t *signature, pgpv_litdata_t *litdata, unsigned primary, unsigned sub) argument
3160 pgpv_signature_t *signature; local
[all...]
/netbsd-current/sys/external/bsd/drm2/dist/drm/amd/include/
H A Ddiscovery.h74 uint32_t signature; /* Table Signature */ member in struct:ip_discovery_header
149 uint32_t signature; /* Table Signature */ member in struct:harvest_info_header
/netbsd-current/sys/external/bsd/drm2/dist/drm/nouveau/include/nvfw/
H A Dacr.h81 struct lsf_signature signature; member in struct:lsb_header
88 struct lsf_signature_v1 signature; member in struct:lsb_header_v1
/netbsd-current/lib/libresolv/
H A Ddst_internal.h92 u_int8_t *signature, const int sig_len);
95 const u_int8_t *signature, const int sig_len);
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/
H A Ddsa_no_digest_size_test.c133 unsigned char *signature = NULL; local
158 TEST_error("Failed to get signature length, len=%d", len);
162 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength)))
165 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) {
170 /* Check that the signature is okay via the EVP interface */
175 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) {
181 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) {
187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) {
192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) {
202 OPENSSL_free(signature);
[all...]
/netbsd-current/external/bsd/openresolv/dist/
H A Dlibc.in110 signature="# Generated by resolvconf"
176 newconf="$signature$NL"
215 # If the old file does not have our signature, back it up.
216 # If the new file just has our signature, restore the backup.
218 if [ "$newconf" = "$signature$NL" ]; then
224 if [ "$line" != "$signature" ]; then
/netbsd-current/crypto/external/bsd/openssl/dist/test/
H A Ddsa_no_digest_size_test.c139 unsigned char *signature = NULL; local
164 TEST_error("Failed to get signature length, len=%d", len);
168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength)))
171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) {
176 /* Check that the signature is okay via the EVP interface */
181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) {
187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) {
193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) {
198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) {
208 OPENSSL_free(signature);
[all...]
/netbsd-current/external/bsd/unbound/dist/validator/
H A Dval_secalgo.c54 #error "Need crypto library to do digital signature cryptography"
399 * @param sig: input is signature output alloced ptr (unless failure).
448 * Setup the ECDSA signature in its encoding that the library wants.
450 * @param sig: input is signature, output alloced ptr (unless failure).
718 * Check a canonical sig+rrset and signature against a dnskey
722 * @param sigblock: signature rdata field from RRSIG
757 /* if it is a DSA signature in bind format, convert to DER format */
777 *reason = "use of signature for ECDSA crypto failed";
785 /* do the signature cryptography work */
835 verbose(VERB_QUERY, "verify: signature mismatc
1760 struct dsa_signature signature; local
1847 mpz_t signature; local
1926 struct dsa_signature signature; local
[all...]
/netbsd-current/external/bsd/openldap/dist/contrib/slapd-modules/comp_match/
H A Dcrl.c572 rc = MatchingComponentAlgorithmIdentifier ( oid, (ComponentSyntaxInfo*)((ComponentTBSCertList*)csi_attr)->signature, (ComponentSyntaxInfo*)((ComponentTBSCertList*)csi_assert)->signature );
609 if ( ( comp->signature->identifier.bv_val && strncmp(comp->signature->identifier.bv_val, cr->cr_curr->ci_val.ci_identifier.bv_val,cr->cr_curr->ci_val.ci_identifier.bv_len) == 0 ) || ( strncmp(comp->signature->id_buf, cr->cr_curr->ci_val.ci_identifier.bv_val,cr->cr_curr->ci_val.ci_identifier.bv_len) == 0 ) ) {
611 return comp->signature;
614 return ExtractingComponentAlgorithmIdentifier ( mem_op, cr, comp->signature );
706 rc = BDecComponentAlgorithmIdentifier (mem_op, b, tagId1, elmtLen1, (&k->signature), &totalElmtsLen1, mode);
708 (k->signature)->identifier.bv_val = (k->signature)
[all...]
/netbsd-current/sys/arch/i386/pci/
H A Dpcibios.h70 uint32_t signature; /* $PIR */ member in struct:pcibios_pir_header
/netbsd-current/external/apache2/llvm/dist/llvm/include/llvm/DebugInfo/PDB/Native/
H A DModuleDebugStream.h40 uint32_t signature() const { return Signature; } function in class:llvm::pdb::ModuleDebugStreamRef
/netbsd-current/crypto/external/bsd/openssh/dist/
H A Dsk-api.h47 uint8_t *signature; member in struct:sk_enroll_response
H A Dkexgexs.c133 u_char *signature = NULL; local
183 &signature, &slen, hash, hashlen, kex->hostkey_alg)) < 0)
190 (r = sshpkt_put_string(ssh, signature, slen)) != 0 ||
211 free(signature);
/netbsd-current/crypto/external/bsd/openssl.old/dist/test/recipes/
H A D70-test_sslsignature.t55 #Test 2: Corrupting a server CertVerify signature in TLSv1.3 should fail
61 #Test x: Corrupting a client CertVerify signature in TLSv1.3 should fail
76 #signature and responds with an appropriate alert. However s_client never
88 #Test 3: Corrupting a CertVerify signature in <=TLSv1.2 should fail
99 #Test 4: Corrupting a ServerKeyExchange signature in <=TLSv1.2 should
133 my $sig = $message->signature();
137 #Flip bits in final byte of signature to corrupt the sig
140 $message->signature($sigbase.pack("C", $sigend));
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/x509/
H A Dx509_req.c294 *psig = req->signature;
301 if (req->signature)
302 ASN1_BIT_STRING_free(req->signature);
303 req->signature = psig;
/netbsd-current/crypto/external/bsd/openssl.old/dist/include/crypto/
H A Dsm2.h30 * SM2 signature operation. Computes Z and then signs H(Z || msg) using SM2
40 const ECDSA_SIG *signature,
46 * SM2 signature generation.
52 * SM2 signature verification.
H A Dx509.h72 X509_ALGOR sig_alg; /* signature algorithm */
73 ASN1_BIT_STRING *signature; /* signature */ member in struct:X509_req_st
80 X509_ALGOR sig_alg; /* signature algorithm */
91 X509_ALGOR sig_alg; /* CRL signature algorithm */
92 ASN1_BIT_STRING signature; /* CRL signature */ member in struct:X509_crl_st
149 X509_ALGOR signature; member in struct:x509_cinf_st
163 ASN1_BIT_STRING signature; member in struct:x509_st
/netbsd-current/crypto/external/bsd/openssl/dist/test/recipes/
H A D70-test_sslsignature.t57 #Test 2: Corrupting a server CertVerify signature in TLSv1.3 should fail
63 #Test x: Corrupting a client CertVerify signature in TLSv1.3 should fail
78 #signature and responds with an appropriate alert. However s_client never
90 #Test 3: Corrupting a CertVerify signature in <=TLSv1.2 should fail
101 #Test 4: Corrupting a ServerKeyExchange signature in <=TLSv1.2 should
135 my $sig = $message->signature();
139 #Flip bits in final byte of signature to corrupt the sig
142 $message->signature($sigbase.pack("C", $sigend));
/netbsd-current/crypto/external/bsd/netpgp/lib/netpgp/
H A DMakefile10 SRCS+= packet-print.c packet-show.c reader.c signature.c
/netbsd-current/crypto/external/bsd/openssl/dist/include/crypto/
H A Dsm2.h35 * SM2 signature operation. Computes Z and then signs H(Z || msg) using SM2
45 const ECDSA_SIG *signature,
51 * SM2 signature generation.
58 * SM2 signature verification.
/netbsd-current/external/gpl3/binutils/dist/gas/
H A Dcodeview.h50 uint32_t signature; member in struct:OBJNAMESYM
/netbsd-current/external/gpl3/gdb/dist/gdb/dwarf2/
H A Dcomp-unit-head.h67 /* 64-bit signature of this unit. For type units, it denotes the signature of
71 ULONGEST signature = 0; member in struct:comp_unit_head
/netbsd-current/external/gpl3/gdb.old/dist/gdb/dwarf2/
H A Dcomp-unit-head.h62 /* 64-bit signature of this unit. For type units, it denotes the signature of
66 ULONGEST signature; member in struct:comp_unit_head
/netbsd-current/sys/external/bsd/drm2/dist/drm/i915/gvt/
H A Dopregion.c51 u8 signature[16]; member in struct:opregion_header
147 v->header.signature[0] = '$';
148 v->header.signature[1] = 'V';
149 v->header.signature[2] = 'B';
150 v->header.signature[3] = 'T';
158 strcpy(&v->bdb_header.signature[0], "BIOS_DATA_BLOCK");
245 memcpy(header->signature, opregion_signature,

Completed in 219 milliseconds

1234567891011>>