Searched refs:signature (Results 51 - 75 of 372) sorted by relevance

1234567891011>>

/netgear-R7000-V1.0.7.12_1.2.5/src/router/udev/extras/volume_id/lib/
H A Dvia_raid.c33 uint16_t signature; member in struct:via_meta
79 if (le16_to_cpu(via->signature) != VIA_SIGNATURE)
H A Dcramfs.c34 uint8_t signature[16]; member in struct:cramfs_super
H A Dhfs.c40 uint8_t signature[2]; member in struct:hfs_mdb
108 uint8_t signature[2]; member in struct:hfsplus_vol_header
176 if (memcmp(hfs->signature, "BD", 2) != 0)
214 if (memcmp(hfsplus->signature, "H+", 2) == 0)
216 if (memcmp(hfsplus->signature, "HX", 2) == 0)
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/arch/x86/pci/
H A Dpcbios.c13 /* BIOS32 signature: "_32_" */
16 /* PCI signature: "PCI " */
19 /* PCI service signature: "$PCI" */
40 unsigned long signature; /* _32_ */ member in struct:bios32::__anon10657
107 u32 signature, eax, ebx, ecx; local
120 : "=d" (signature),
137 if (status || signature != PCI_SIGNATURE) {
139 status, signature);
307 if (probe_kernel_address(&check->fields.signature, sig))
310 if (check->fields.signature !
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/partitions/
H A Dmac.c48 if (be16_to_cpu(md->signature) != MAC_DRIVER_MAGIC) {
58 if (be16_to_cpu(part->signature) != MAC_PARTITION_MAGIC) {
71 if (be16_to_cpu(part->signature) != MAC_PARTITION_MAGIC)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iserver/dbus-1.6.8/dbus/
H A Ddbus.h41 #include <dbus/dbus-signature.h>
H A Ddbus-signature.c2 /* dbus-signature.c Routines for reading recursive type signatures
26 #include "dbus-signature.h"
37 const char *pos; /**< current position in the signature string */
51 * @defgroup DBusSignature Type signature parsing
58 * Initializes a #DBusSignatureIter for reading a type signature. This
64 * @param signature the type signature
68 const char *signature)
72 real_iter->pos = signature;
100 * Returns the signature o
67 dbus_signature_iter_init(DBusSignatureIter *iter, const char *signature) argument
233 dbus_signature_validate(const char *signature, DBusError *error) argument
264 dbus_signature_validate_single(const char *signature, DBusError *error) argument
[all...]
H A Ddbus-marshal-recursive-util.c30 #include "dbus-signature.h"
152 DBusString signature; member in struct:__anon1675
171 if (!_dbus_string_init (&block->signature))
176 _dbus_string_free (&block->signature);
180 if (!_dbus_string_insert_bytes (&block->signature, 0, initial_offset,
184 !_dbus_string_append (&block->signature, FENCE_BYTES_STR) ||
187 _dbus_string_free (&block->signature);
202 state->saved_sig_len = _dbus_string_get_length (&block->signature) - N_FENCE_BYTES;
210 _dbus_string_delete (&block->signature,
212 _dbus_string_get_length (&block->signature)
1077 const DBusString *signature; member in struct:__anon1677
1462 run_test_nodes_in_one_configuration(TestTypeNode **nodes, int n_nodes, const DBusString *signature, int byte_order, int initial_offset) argument
1501 DBusString signature; local
1596 build_body(TestTypeNode **nodes, int n_nodes, int byte_order, DBusString *signature, DBusString *body) argument
1647 dbus_internal_do_not_use_generate_bodies(int sequence, int byte_order, DBusString *signature, DBusString *body) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/asn1/
H A Dx_req.c111 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/libcryptoxx-5.6.0/
H A Ddsa.h11 /*! The DSA signature format used by Crypto++ is as defined by IEEE P1363.
14 /** This function converts between these formats, and returns length of signature in the target format.
17 const byte *signature, size_t signatureLen, DSASignatureFormat fromFormat);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/acpi/
H A Dactbl.h63 * the wrong signature.
73 #define ACPI_RSDP_NAME "RSDP" /* Short name for RSDP, not signature */
95 char signature[ACPI_NAME_SIZE]; /* ASCII table signature */ member in struct:acpi_table_header
132 char signature[8]; /* ACPI signature, contains "RSD PTR " */ member in struct:acpi_table_rsdp
169 char signature[4]; /* ASCII table signature */ member in struct:acpi_table_facs
171 u32 hardware_signature; /* Hardware configuration signature */
325 union acpi_name_union signature; member in struct:acpi_table_desc
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/
H A Dcramfs_fs.h59 __u8 signature[16]; /* "Compressed ROMFS" */ member in struct:cramfs_super
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/
H A Dx_req.c108 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
H A Dt_spki.c122 n=spki->signature->length;
123 s=(char *)spki->signature->data;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/asn1/
H A Dx_req.c111 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/test/
H A Dtestgen40 echo signature on req is wrong
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/aMule-2.3.1/src/utils/amps/langs/
H A Dfr.inc36 // try to keep these next three short, otherwise the signature
60 $text["signature"] = "Signature";
67 $text["sigfileerr"] = "Impossible d'ouvrir le fichier de signature";
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/test/
H A Dtestgen40 echo signature on req is wrong
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/test/
H A Dtestgen40 echo signature on req is wrong
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/misc/
H A Drtacct.c71 char signature[128]; member in struct:rtacct_data
163 fprintf(fp, "#%s\n", kern_db->signature);
225 fprintf(fp, "#%s\n", kern_db->signature);
371 sprintf(kern_db->signature,
602 if (hist_db && hist_db->signature[0] &&
603 strcmp(kern_db->signature, hist_db->signature)) {
612 if (hist_db && hist_db->signature[0] &&
613 strcmp(hist_db->signature, "kernel")) {
619 strcpy(kern_db->signature, "kerne
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/crypto/x509/
H A Dx_all.c76 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
79 a->signature, a->cert_info, r));
85 a->sig_alg, a->signature, a->req_info, r));
91 a->sig_algor, a->signature, a->spkac, r));
97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
98 x->sig_alg, x->signature, x->cert_info, pkey, md));
105 x->cert_info->signature,
106 x->sig_alg, x->signature, x->cert_info, ctx);
118 x->signature, x->req_info, pkey, md));
124 x->sig_alg, NULL, x->signature,
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/crypto/x509/
H A Dx_all.c76 if (X509_ALGOR_cmp(a->sig_alg, a->cert_info->signature))
79 a->signature, a->cert_info, r));
85 a->sig_alg, a->signature, a->req_info, r));
91 a->sig_algor, a->signature, a->spkac, r));
97 return (ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature,
98 x->sig_alg, x->signature, x->cert_info, pkey, md));
105 x->cert_info->signature,
106 x->sig_alg, x->signature, x->cert_info, ctx);
118 x->signature, x->req_info, pkey, md));
124 x->sig_alg, NULL, x->signature,
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source/gsoap/plugin/
H A Dwsseapi.c166 digital signature to protect its integrity. It is common for the wsse plugin
168 cross-referencing XML elements. The signature engine of the wsse plugin is
200 digitally signed by the signature engine further preventing tampering with its
242 security tokens. A certificate is used to verify the digital signature of a
250 Certificates are automatically verified by the wsse plugin signature engine
263 by the wsse plugin's signature verification engine or manually as follows:
344 To use a certificate for signature verification, add a direct security token
368 of a signature value.
425 Next, we decide which signature algorithm is appropriate to use:
442 to verify the signature
1407 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local
1520 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
1580 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local
1638 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
1931 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local
1946 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
2872 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/gsoap/source_build_platform/gsoap/plugin/
H A Dwsseapi.c166 digital signature to protect its integrity. It is common for the wsse plugin
168 cross-referencing XML elements. The signature engine of the wsse plugin is
200 digitally signed by the signature engine further preventing tampering with its
242 security tokens. A certificate is used to verify the digital signature of a
250 Certificates are automatically verified by the wsse plugin signature engine
263 by the wsse plugin's signature verification engine or manually as follows:
344 To use a certificate for signature verification, add a direct security token
368 of a signature value.
425 Next, we decide which signature algorithm is appropriate to use:
442 to verify the signature
1407 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local
1520 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
1580 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local
1638 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
1931 { ds__SignatureType *signature = soap_wsse_add_Signature(soap); local
1946 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
2872 { ds__SignatureType *signature = soap_wsse_Signature(soap); local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libgpo/
H A Dgpo_parse.c87 #define GPTTMPL_PARAMETER_SIGNATURE "signature"
94 const char *signature = NULL;
97 if ((signature = iniparser_getstring(d, GPTTMPL_SECTION_VERSION
102 if (!strequal(signature, GPTTMPL_CHICAGO)) {
297 signature="$CHICAGO$"

Completed in 372 milliseconds

1234567891011>>