/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/openssl/crypto/ocsp/ |
H A D | ocsp_asn.c | 64 ASN1_SIMPLE(OCSP_SIGNATURE, signature, ASN1_BIT_STRING), 163 ASN1_SIMPLE(OCSP_BASICRESP, signature, ASN1_BIT_STRING),
|
H A D | ocsp_prn.c | 169 X509_signature_print(bp, sig->signatureAlgorithm, sig->signature); 278 if(X509_signature_print(bp, br->signatureAlgorithm, br->signature) <= 0)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/firmware/ |
H A D | pcdp.h | 99 u8 signature[4]; member in struct:pcdp
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/asn1/ |
H A D | t_crl.c | 130 X509_signature_print(out, x->sig_alg, x->signature);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/ocsp/ |
H A D | ocsp_asn.c | 64 ASN1_SIMPLE(OCSP_SIGNATURE, signature, ASN1_BIT_STRING), 163 ASN1_SIMPLE(OCSP_BASICRESP, signature, ASN1_BIT_STRING),
|
H A D | ocsp.h | 138 * signature BIT STRING, 144 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 279 * signature BIT STRING, 283 The value for "signature" is specified in the OCSP rfc2560 as follows: 284 "The value for the signature SHALL be computed on the hash of the DER 290 hash. So, we look at the signature-specification algorithm, and try to do 302 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 377 o->optionalSignature->signature,o->tbsRequest,pkey,md) 381 o->signature,o->tbsResponseData,pkey,md) 385 a->optionalSignature->signature, [all...] |
H A D | ocsp_prn.c | 169 X509_signature_print(bp, sig->signatureAlgorithm, sig->signature); 278 if(X509_signature_print(bp, br->signatureAlgorithm, br->signature) <= 0)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/drivers/acpi/dispatcher/ |
H A D | dsinit.c | 195 table->signature, owner_id, info.object_count,
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/i386/pci/ |
H A D | pci.h | 66 u32 signature; /* PIRQ_SIGNATURE should be here */ member in struct:irq_routing_table
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/fs/ecryptfs/ |
H A D | debug.c | 53 memcpy(sig, auth_tok->token.password.signature, 56 ecryptfs_printk(KERN_DEBUG, " * signature = [%s]\n", sig);
|
H A D | keystore.c | 138 write_tag_64_packet(char *signature, struct ecryptfs_session_key *session_key, argument 173 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); 278 write_tag_66_packet(char *signature, size_t cipher_code, argument 315 memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX); 584 ecryptfs_to_hex((*new_auth_tok)->token.private_key.signature, 1105 "signature found after " 1113 "signature of size [%d]; " 1120 ecryptfs_to_hex(new_auth_tok->token.password.signature, 1122 new_auth_tok->token.password.signature[ 1181 && !strncmp(candidate_auth_tok->token.password.signature, [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/minidlna/ffmpeg-0.5.1/libavformat/ |
H A D | rl2.c | 89 unsigned int signature; local 100 signature = get_be32(pb); 128 if(signature == RLV3_TAG && back_size > 0)
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/i386/kernel/cpu/cpufreq/ |
H A D | speedstep-smi.c | 372 dprintk("signature:0x%.8lx, command:0x%.8lx, event:0x%.8lx, perf_level:0x%.8lx.\n", 373 ist_info.signature, ist_info.command, ist_info.event, ist_info.perf_level); 377 if ((ist_info.signature != 0x47534943) && ( 384 smi_sig = ist_info.signature; 417 MODULE_PARM_DESC(smi_sig, "Set to 1 to fake the IST signature when using the SMI interface.");
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/router/busybox-1.x/e2fsprogs/old_e2fsprogs/blkid/ |
H A D | probe.h | 117 __u8 signature[16]; member in struct:cramfs_super_block 234 unsigned char signature[128]; member in struct:ocfs_volume_header 257 unsigned char signature[8]; member in struct:ocfs2_super_block
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/sound/oss/ |
H A D | opl3.c | 160 unsigned char stat1, signature; local 194 signature = stat1 = inb(ioaddr); /* Status register */ 196 if (signature != 0x00 && signature != 0x06 && signature != 0x02 && 197 signature != 0x0f) 199 MDB(printk(KERN_INFO "OPL3 not detected %x\n", signature)); 203 if (signature == 0x06) /* OPL2 */ 207 else if (signature == 0x00 || signature [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/crypto/x509/ |
H A D | x509.h | 239 ASN1_BIT_STRING *signature; member in struct:X509_req_st 247 X509_ALGOR *signature; member in struct:x509_cinf_st 276 ASN1_BIT_STRING *signature; member in struct:x509_st 448 /* actual signature */ 451 ASN1_BIT_STRING *signature; member in struct:X509_crl_st 510 ASN1_BIT_STRING *signature; member in struct:Netscape_spki_st 577 a->signature,(char *)a->cert_info,r) 579 a->sig_alg,a->signature,(char *)a->req_info,r) 581 a->sig_alg, a->signature,(char *)a->crl,r) 584 ASN1_sign((int (*)())i2d_X509_CINF, x->cert_info->signature, \ [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/openssl-0.9.8e/include/openssl/ |
H A D | x509.h | 239 ASN1_BIT_STRING *signature; member in struct:X509_req_st 247 X509_ALGOR *signature; member in struct:x509_cinf_st 276 ASN1_BIT_STRING *signature; member in struct:x509_st 448 /* actual signature */ 451 ASN1_BIT_STRING *signature; member in struct:X509_crl_st 510 ASN1_BIT_STRING *signature; member in struct:Netscape_spki_st 577 a->signature,(char *)a->cert_info,r) 579 a->sig_alg,a->signature,(char *)a->req_info,r) 581 a->sig_alg, a->signature,(char *)a->crl,r) 584 ASN1_sign((int (*)())i2d_X509_CINF, x->cert_info->signature, \ [all...] |
H A D | ocsp.h | 138 * signature BIT STRING, 144 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 279 * signature BIT STRING, 283 The value for "signature" is specified in the OCSP rfc2560 as follows: 284 "The value for the signature SHALL be computed on the hash of the DER 290 hash. So, we look at the signature-specification algorithm, and try to do 302 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 377 o->optionalSignature->signature,o->tbsRequest,pkey,md) 381 o->signature,o->tbsResponseData,pkey,md) 385 a->optionalSignature->signature, [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/db-4.7.25.NC/java/src/com/sleepycat/asm/ |
H A D | ClassReader.java | 333 String signature; 373 signature = null; 397 signature = readUTF8(v + 6, c); 431 signature, 497 signature = null; 515 signature = readUTF8(u + 6, c); 543 signature, 579 signature = null; 610 signature = readUTF8(u, c); 655 signature, [all...] |
H A D | MethodWriter.java | 90 * The signature of this method. 92 String signature; field in class:MethodWriter 507 * @param signature the method's signature. May be <tt>null</tt>. 518 final String signature, 533 this.signature = signature; 1033 final String signature, 1038 if (signature != null) { 1046 .putShort(cw.newUTF8(signature)) 513 MethodWriter( final ClassWriter cw, final int access, final String name, final String desc, final String signature, final String[] exceptions, final boolean computeMaxs) argument 1030 visitLocalVariable( final String name, final String desc, final String signature, final Label start, final Label end, final int index) argument [all...] |
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/ia64/hp/sim/boot/ |
H A D | fw-emu.c | 289 efi_systab->hdr.signature = EFI_SYSTEM_TABLE_SIGNATURE; 298 efi_runtime->hdr.signature = EFI_RUNTIME_SERVICES_SIGNATURE; 316 memcpy(sal_systab->signature, "SST_", 4);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/include/atalk/ |
H A D | globals.h | 85 unsigned char signature[16]; member in struct:afp_options
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.5/include/atalk/ |
H A D | globals.h | 89 unsigned char signature[16]; member in struct:afp_options
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/ap/gpl/timemachine/netatalk-2.2.0/contrib/shell_utils/ |
H A D | asip-status.pl | 244 my ($signature) = join("", @packet[$signature_offset..$signature_offset+15]); 247 hexdump($signature);
|
/netgear-WNDR4500v2-V1.0.0.60_1.0.38/src/linux/linux-2.6/arch/i386/boot/ |
H A D | setup.S | 38 .ascii "HdrS" # header signature 155 # Check signature at end of setup 193 no_sig_mess: .string "No setup signature found ..." 514 cmpw $0x0504d, %bx # Check for "PM" signature 515 jne done_apm_bios # No signature, no APM BIOS 546 cmpw $0x0504d, %bx # check for "PM" signature 1015 # Setup signature -- must be last
|