/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/ecdsa/ |
H A D | ecdsatest.c | 189 ECDSA_SIG *signature = NULL; local 206 /* create the signature */ 207 signature = ECDSA_do_sign(digest, 20, key); 208 if (signature == NULL) 212 /* compare the created signature with the expected signature */ 217 if (BN_cmp(signature->r, r) || BN_cmp(signature->s, s)) 221 /* verify the signature */ 222 if (ECDSA_do_verify(digest, 20, signature, ke 291 unsigned char *signature = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/ecdsa/ |
H A D | ecdsatest.c | 189 ECDSA_SIG *signature = NULL; local 206 /* create the signature */ 207 signature = ECDSA_do_sign(digest, 20, key); 208 if (signature == NULL) 212 /* compare the created signature with the expected signature */ 217 if (BN_cmp(signature->r, r) || BN_cmp(signature->s, s)) 221 /* verify the signature */ 222 if (ECDSA_do_verify(digest, 20, signature, ke 291 unsigned char *signature = NULL; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/acpi/acpica/ |
H A D | tbutils.c | 215 acpi_tb_fix_string(out_header->signature, ACPI_NAME_SIZE); 244 if (ACPI_COMPARE_NAME(header->signature, ACPI_SIG_FACS)) { 246 /* FACS only has signature and length fields */ 249 header->signature, ACPI_CAST_PTR(void, address), 251 } else if (ACPI_COMPARE_NAME(header->signature, ACPI_SIG_RSDP)) { 276 local_header.signature, ACPI_CAST_PTR(void, address), 313 table->signature, table->checksum, 433 * Signature - Table signature, NULL if no need to 448 char *signature, u32 table_index) 459 signature)); 447 acpi_tb_install_table(acpi_physical_address address, char *signature, u32 table_index) argument [all...] |
H A D | tbxface.c | 268 * PARAMETERS: Signature - ACPI signature of needed table 281 acpi_get_table_header(char *signature, 290 if (!signature || !out_table_header) { 299 (&(acpi_gbl_root_table_list.tables[i].signature), 300 signature)) { 384 * PARAMETERS: Signature - ACPI signature of needed table 394 acpi_get_table_with_size(char *signature, 404 if (!signature || !out_table) { 413 (&(acpi_gbl_root_table_list.tables[i].signature), 414 signature)) { 440 acpi_get_table(char *signature, u32 instance, struct acpi_table_header **out_table) argument [all...] |
H A D | actables.h | 60 acpi_tb_find_table(char *signature, 116 char *signature, u32 table_index);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/ |
H A D | dbus-marshal-validate-util.c | 227 "not a valid signature", 445 _dbus_assert_not_reached ("invalid signature"); 460 _dbus_assert_not_reached ("valid signature"); 481 _dbus_assert_not_reached ("validated too-long signature"); 523 DBusString signature; local 526 if (!_dbus_string_init (&signature) || !_dbus_string_init (&body)) 532 &signature, &body)) 536 validity = _dbus_validate_body_with_reason (&signature, 0, 544 _dbus_verbose_bytes_of_string (&signature, 0, _dbus_string_get_length (&signature)); [all...] |
H A D | dbus-signature.h | 55 const char *signature); 74 dbus_bool_t dbus_signature_validate (const char *signature, 78 dbus_bool_t dbus_signature_validate_single (const char *signature,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | x_spki.c | 79 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
|
H A D | t_spki.c | 98 n = spki->signature->length; 99 s = (char *)spki->signature->data;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/contrib/src/mmedia/ |
H A D | sndaiff.cpp | 102 wxUint32 signature, len, ssnd; local 113 FAIL_WITH(m_input->Read(&signature, 4).LastRead() != 4, wxSOUND_INVSTRM); 114 FAIL_WITH(wxUINT32_SWAP_ON_BE(signature) != FORM_SIGNATURE, wxSOUND_INVSTRM); 122 FAIL_WITH(m_input->Read(&signature, 4).LastRead() != 4, wxSOUND_INVSTRM); 124 wxUINT32_SWAP_ON_BE(signature) != AIFF_SIGNATURE && 125 wxUINT32_SWAP_ON_BE(signature) != AIFC_SIGNATURE, wxSOUND_INVSTRM); 130 FAIL_WITH(m_input->Read(&signature, 4).LastRead() != 4, wxSOUND_INVSTRM); 135 switch (wxUINT32_SWAP_ON_BE(signature)) {
|
H A D | sndwav.cpp | 85 // Get the second signature 92 // Test the second signature 180 wxUint32 signature, len; local 191 // Get the first signature 192 FAIL_WITH(m_input->Read(&signature, 4).LastRead() != 4, wxSOUND_INVSTRM); 193 FAIL_WITH(wxUINT32_SWAP_ON_BE(signature) != RIFF_SIGNATURE, wxSOUND_INVSTRM); 201 // Get the second signature 202 FAIL_WITH(m_input->Read(&signature, 4).LastRead() != 4, wxSOUND_INVSTRM); 203 FAIL_WITH(wxUINT32_SWAP_ON_BE(signature) != WAVE_SIGNATURE, wxSOUND_INVSTRM); 209 FAIL_WITH(m_input->Read(&signature, 326 wxUint32 signature; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/utils/amps/langs/ |
H A D | de.inc | 56 $text["signature"] = "Signatur"; 63 $text["sigfileerr"] = "Konnte Signaturdatei nicht öffnen (Couldn't open signature file)";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | x_spki.c | 78 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | x_spki.c | 79 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
|
H A D | t_spki.c | 98 n = spki->signature->length; 99 s = (char *)spki->signature->data;
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/udev/extras/volume_id/lib/ |
H A D | jmicron_raid.c | 30 int8_t signature[2]; member in struct:jmicron_meta 54 if (memcmp(jm->signature, "JM", 2) != 0)
|
H A D | ddf_raid.c | 37 uint32_t signature; member in struct:ddf_header 58 if (ddf->signature != cpu_to_be32(DDF_HEADER))
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/afpd/ |
H A D | afp_config.h | 21 const void *defoptions, *signature; member in struct:AFPConfig
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/input/mouse/ |
H A D | alps.h | 16 unsigned char signature[3]; member in struct:alps_model_info
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/kernel/acpi/realmode/ |
H A D | wakeup.lds.S | 36 .signature : {
|
H A D | wakeup.h | 32 u32 signature; /* To check we have correct structure */ member in struct:wakeup_header
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/include/asm/ |
H A D | mpspec_def.h | 29 char signature[4]; /* "_MP_" */ member in struct:mpf_intel 44 char signature[4]; member in struct:mpc_table 156 char signature[4]; member in struct:mpc_oemtable
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | dlltest.cpp | 133 byte signature[40]; local 136 signer.SignMessage(rng, message, 3, signature); 139 if (!verifier.VerifyMessage(message, 3, signature, sizeof(signature))) 141 cerr << "DSA signature and verification failed.\n"; 144 cout << "7. DSA signature and verification succeeded.\n"; 147 // try to verify an invalid signature 148 signature[0] ^= 1; 149 if (verifier.VerifyMessage(message, 3, signature, sizeof(signature))) [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | cycx_cfm.h | 78 * @signature - CFM file signature 87 char signature[80]; member in struct:cycx_firmware
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/examples/pcap2nbench/ |
H A D | smb.hpp | 39 uint8_t signature[8]; member in struct:smb
|