/netgear-R7000-V1.0.7.12_1.2.5/src/router/udev/extras/volume_id/lib/ |
H A D | via_raid.c | 33 uint16_t signature; member in struct:via_meta 79 if (le16_to_cpu(via->signature) != VIA_SIGNATURE)
|
H A D | cramfs.c | 34 uint8_t signature[16]; member in struct:cramfs_super
|
H A D | hfs.c | 40 uint8_t signature[2]; member in struct:hfs_mdb 108 uint8_t signature[2]; member in struct:hfsplus_vol_header 176 if (memcmp(hfs->signature, "BD", 2) != 0) 214 if (memcmp(hfsplus->signature, "H+", 2) == 0) 216 if (memcmp(hfsplus->signature, "HX", 2) == 0)
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/pci/ |
H A D | pcbios.c | 13 /* BIOS32 signature: "_32_" */ 16 /* PCI signature: "PCI " */ 19 /* PCI service signature: "$PCI" */ 40 unsigned long signature; /* _32_ */ member in struct:bios32::__anon10657 107 u32 signature, eax, ebx, ecx; local 120 : "=d" (signature), 137 if (status || signature != PCI_SIGNATURE) { 139 status, signature); 307 if (probe_kernel_address(&check->fields.signature, sig)) 310 if (check->fields.signature ! [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/partitions/ |
H A D | mac.c | 48 if (be16_to_cpu(md->signature) != MAC_DRIVER_MAGIC) { 58 if (be16_to_cpu(part->signature) != MAC_PARTITION_MAGIC) { 71 if (be16_to_cpu(part->signature) != MAC_PARTITION_MAGIC)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/ |
H A D | dbus.h | 41 #include <dbus/dbus-signature.h>
|
H A D | dbus-signature.c | 2 /* dbus-signature.c Routines for reading recursive type signatures 26 #include "dbus-signature.h" 37 const char *pos; /**< current position in the signature string */ 51 * @defgroup DBusSignature Type signature parsing 58 * Initializes a #DBusSignatureIter for reading a type signature. This 64 * @param signature the type signature 68 const char *signature) 72 real_iter->pos = signature; 100 * Returns the signature o 67 dbus_signature_iter_init(DBusSignatureIter *iter, const char *signature) argument 233 dbus_signature_validate(const char *signature, DBusError *error) argument 264 dbus_signature_validate_single(const char *signature, DBusError *error) argument [all...] |
H A D | dbus-marshal-recursive-util.c | 30 #include "dbus-signature.h" 152 DBusString signature; member in struct:__anon1675 171 if (!_dbus_string_init (&block->signature)) 176 _dbus_string_free (&block->signature); 180 if (!_dbus_string_insert_bytes (&block->signature, 0, initial_offset, 184 !_dbus_string_append (&block->signature, FENCE_BYTES_STR) || 187 _dbus_string_free (&block->signature); 202 state->saved_sig_len = _dbus_string_get_length (&block->signature) - N_FENCE_BYTES; 210 _dbus_string_delete (&block->signature, 212 _dbus_string_get_length (&block->signature) 1077 const DBusString *signature; member in struct:__anon1677 1462 run_test_nodes_in_one_configuration(TestTypeNode **nodes, int n_nodes, const DBusString *signature, int byte_order, int initial_offset) argument 1501 DBusString signature; local 1596 build_body(TestTypeNode **nodes, int n_nodes, int byte_order, DBusString *signature, DBusString *body) argument 1647 dbus_internal_do_not_use_generate_bodies(int sequence, int byte_order, DBusString *signature, DBusString *body) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/ |
H A D | x_req.c | 111 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/ |
H A D | dsa.h | 11 /*! The DSA signature format used by Crypto++ is as defined by IEEE P1363. 14 /** This function converts between these formats, and returns length of signature in the target format. 17 const byte *signature, size_t signatureLen, DSASignatureFormat fromFormat);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/acpi/ |
H A D | actbl.h | 63 * the wrong signature. 73 #define ACPI_RSDP_NAME "RSDP" /* Short name for RSDP, not signature */ 95 char signature[ACPI_NAME_SIZE]; /* ASCII table signature */ member in struct:acpi_table_header 132 char signature[8]; /* ACPI signature, contains "RSD PTR " */ member in struct:acpi_table_rsdp 169 char signature[4]; /* ASCII table signature */ member in struct:acpi_table_facs 171 u32 hardware_signature; /* Hardware configuration signature */ 325 union acpi_name_union signature; member in struct:acpi_table_desc [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/ |
H A D | cramfs_fs.h | 59 __u8 signature[16]; /* "Compressed ROMFS" */ member in struct:cramfs_super
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | x_req.c | 108 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
|
H A D | t_spki.c | 122 n=spki->signature->length; 123 s=(char *)spki->signature->data;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/ |
H A D | x_req.c | 111 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/ |
H A D | testgen | 40 echo signature on req is wrong
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/utils/amps/langs/ |
H A D | fr.inc | 36 // try to keep these next three short, otherwise the signature 60 $text["signature"] = "Signature"; 67 $text["sigfileerr"] = "Impossible d'ouvrir le fichier de signature";
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/ |
H A D | testgen | 40 echo signature on req is wrong
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/ |
H A D | testgen | 40 echo signature on req is wrong
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/misc/ |
H A D | rtacct.c | 71 char signature[128]; member in struct:rtacct_data 163 fprintf(fp, "#%s\n", kern_db->signature); 225 fprintf(fp, "#%s\n", kern_db->signature); 371 sprintf(kern_db->signature, 602 if (hist_db && hist_db->signature[0] && 603 strcmp(kern_db->signature, hist_db->signature)) { 612 if (hist_db && hist_db->signature[0] && 613 strcmp(hist_db->signature, "kernel")) { 619 strcpy(kern_db->signature, "kerne [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/ |
H A D | x_all.c | 76 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) 79 a->signature, a->cert_info, r)); 85 a->sig_alg, a->signature, a->req_info, r)); 91 a->sig_algor, a->signature, a->spkac, r)); 97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 98 x->sig_alg, x->signature, x->cert_info, pkey, md)); 105 x->cert_info->signature, 106 x->sig_alg, x->signature, x->cert_info, ctx); 118 x->signature, x->req_info, pkey, md)); 124 x->sig_alg, NULL, x->signature, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/ |
H A D | x_all.c | 76 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature)) 79 a->signature, a->cert_info, r)); 85 a->sig_alg, a->signature, a->req_info, r)); 91 a->sig_algor, a->signature, a->spkac, r)); 97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 98 x->sig_alg, x->signature, x->cert_info, pkey, md)); 105 x->cert_info->signature, 106 x->sig_alg, x->signature, x->cert_info, ctx); 118 x->signature, x->req_info, pkey, md)); 124 x->sig_alg, NULL, x->signature, [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/ |
H A D | wsseapi.c | 166 digital signature to protect its integrity. It is common for the wsse plugin 168 cross-referencing XML elements. The signature engine of the wsse plugin is 200 digitally signed by the signature engine further preventing tampering with its 242 security tokens. A certificate is used to verify the digital signature of a 250 Certificates are automatically verified by the wsse plugin signature engine 263 by the wsse plugin's signature verification engine or manually as follows: 344 To use a certificate for signature verification, add a direct security token 368 of a signature value. 425 Next, we decide which signature algorithm is appropriate to use: 442 to verify the signature 1407 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local 1520 { ds__SignatureType *signature = soap_wsse_Signature(soap); local 1580 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local 1638 { ds__SignatureType *signature = soap_wsse_Signature(soap); local 1931 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local 1946 { ds__SignatureType *signature = soap_wsse_Signature(soap); local 2872 { ds__SignatureType *signature = soap_wsse_Signature(soap); local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/ |
H A D | wsseapi.c | 166 digital signature to protect its integrity. It is common for the wsse plugin 168 cross-referencing XML elements. The signature engine of the wsse plugin is 200 digitally signed by the signature engine further preventing tampering with its 242 security tokens. A certificate is used to verify the digital signature of a 250 Certificates are automatically verified by the wsse plugin signature engine 263 by the wsse plugin's signature verification engine or manually as follows: 344 To use a certificate for signature verification, add a direct security token 368 of a signature value. 425 Next, we decide which signature algorithm is appropriate to use: 442 to verify the signature 1407 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local 1520 { ds__SignatureType *signature = soap_wsse_Signature(soap); local 1580 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local 1638 { ds__SignatureType *signature = soap_wsse_Signature(soap); local 1931 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local 1946 { ds__SignatureType *signature = soap_wsse_Signature(soap); local 2872 { ds__SignatureType *signature = soap_wsse_Signature(soap); local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libgpo/ |
H A D | gpo_parse.c | 87 #define GPTTMPL_PARAMETER_SIGNATURE "signature" 94 const char *signature = NULL; 97 if ((signature = iniparser_getstring(d, GPTTMPL_SECTION_VERSION 102 if (!strequal(signature, GPTTMPL_CHICAGO)) { 297 signature="$CHICAGO$"
|