/freebsd-11-stable/contrib/wpa/src/crypto/ |
H A D | tls_openssl_ocsp.c | 159 * signature BIT STRING, 165 ASN1_BIT_STRING *signature; member in struct:__anon4278 213 ASN1_SIMPLE(BasicOCSPResponse, signature, ASN1_BIT_STRING), 634 basic->signatureAlgorithm, basic->signature, 637 "OpenSSL: BasicOCSPResponse signature is invalid"); 643 "OpenSSL: Found OCSP signer certificate %s and verified BasicOCSPResponse signature",
|
/freebsd-11-stable/stand/libsa/ |
H A D | cd9660.c | 60 u_char signature [ISODCL ( 5, 6)]; member in struct:__anon4057 212 if (sp->signature[0] != 0xbe || sp->signature[1] != 0xef)
|
/freebsd-11-stable/contrib/llvm-project/lldb/source/Plugins/Process/minidump/ |
H A D | MinidumpParser.cpp | 55 // Read the CV record signature 56 const llvm::support::ulittle32_t *signature = nullptr; local 57 Status error = consumeObject(cv_record, signature); 62 static_cast<CvSignature>(static_cast<uint32_t>(*signature));
|
/freebsd-11-stable/include/rpcsvc/ |
H A D | nis.x | 262 nis_name requester; /* Host principal name for signature */ 269 opaque signature<>; /* Signature of the source */
|
/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | x_crl.c | 92 * the original encoding the signature wont be affected by reordering of the 340 ASN1_SIMPLE(X509_CRL, signature, ASN1_BIT_STRING) 401 crl->sig_alg, crl->signature, crl->crl, r));
|
H A D | t_req.c | 242 if (!X509_signature_print(bp, x->sig_alg, x->signature))
|
/freebsd-11-stable/stand/i386/pmbr/ |
H A D | pmbr.s | 41 .set DISKSIG,440 # Disk signature offset 96 # Load the GPT header and verify signature. Try LBA 1 for the primary one and
|
/freebsd-11-stable/sys/i386/include/pc/ |
H A D | bios.h | 284 struct bios_oem_signature signature[]; member in struct:bios_oem
|
/freebsd-11-stable/sys/dev/usb/storage/ |
H A D | cfumass.c | 615 uint32_t signature; local 628 signature = UGETDW(sc->sc_cbw->dCBWSignature); 629 if (signature != CBWSIGNATURE) { 631 "should be 0x%08x", signature, CBWSIGNATURE);
|
/freebsd-11-stable/sys/dev/cxgbe/cudbg/ |
H A D | cudbg.h | 117 "No signature", 321 u32 signature; member in struct:cudbg_flash_hdr
|
/freebsd-11-stable/sys/dev/hptmv/ |
H A D | vdevice.h | 265 USHORT signature; /* set to 0xAA55 to indicate PC MBR format */ member in struct:_Master_Boot_Record
|
/freebsd-11-stable/stand/i386/mbr/ |
H A D | mbr.s | 121 # Now that we've loaded the bootstrap, check for the 0xaa55 signature. If it
|
/freebsd-11-stable/usr.sbin/tcpdump/tcpdump/ |
H A D | Makefile | 170 signature.c \
|
/freebsd-11-stable/contrib/llvm-project/openmp/runtime/src/ |
H A D | kmp_utility.cpp | 156 p->signature = buf.eax;
|
/freebsd-11-stable/contrib/llvm-project/lldb/source/Plugins/SymbolFile/DWARF/ |
H A D | DWARFASTParserClang.h | 243 DWARFFormValue signature; member in struct:ParsedDWARFTypeAttributes
|
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_read_support_format_lha.c | 482 const char *signature; local 504 signature = __archive_read_ahead(a, sizeof(signature[0]), NULL); 505 if (signature == NULL || signature[0] == 0) 510 signature = (const char *)p; 512 signature[0] == 'M' && signature[1] == 'Z') { 520 signature = (const char *)p; 522 /* signature[ [all...] |
/freebsd-11-stable/sys/geom/raid/ |
H A D | md_jmicron.c | 52 u_int8_t signature[2]; member in struct:jmicron_raid_conf 148 printf("signature <%c%c>\n", meta->signature[0], meta->signature[1]); 282 if (strncmp(meta->signature, JMICRON_MAGIC, strlen(JMICRON_MAGIC))) { 283 G_RAID_DEBUG(1, "JMicron signature check failed on %s", pp->name); 1410 strncpy(meta->signature, JMICRON_MAGIC, 2);
|
/freebsd-11-stable/sys/dev/drm2/i915/ |
H A D | intel_bios.c | 705 if (memcmp(vbt->signature, "$VBT", 4) == 0) { 707 vbt->signature); 722 /* Scour memory looking for the VBT signature */ 731 DRM_DEBUG_DRIVER("VBT signature missing\n");
|
/freebsd-11-stable/sys/dev/ie/ |
H A D | if_ie_isa.c | 289 u_char * signature = "*3COM*"; local 293 if (inb(port + i) != signature[i])
|
/freebsd-11-stable/crypto/openssh/ |
H A D | ssh_api.c | 537 u_char **signature, size_t *slen, const u_char *data, size_t dlen, 540 return sshkey_sign(privkey, signature, slen, data, dlen, alg, compat); 536 _ssh_host_key_sign(struct sshkey *privkey, struct sshkey *pubkey, u_char **signature, size_t *slen, const u_char *data, size_t dlen, const char *alg, u_int compat) argument
|
/freebsd-11-stable/usr.sbin/mptable/ |
H A D | mptable.c | 441 printf( " signature:\t\t\t'" ); 442 pnstr( mpfps->signature, 4 ); 550 printf( " signature:\t\t\t'" ); 551 pnstr( cth->signature, 4 );
|
/freebsd-11-stable/sys/dev/usb/wlan/ |
H A D | if_rsureg.h | 179 uint16_t signature; member in struct:r92s_fw_priv 236 uint16_t signature; member in struct:r92s_fw_hdr
|
/freebsd-11-stable/contrib/elftoolchain/libdwarf/ |
H A D | libdwarf_info.c | 215 memcpy(cu->cu_type_sig.signature,
|
/freebsd-11-stable/sys/dev/nand/ |
H A D | nand_generic.c | 373 * validated by a signature of "ONFI" and a crc. There is a very strange 374 * rule that the signature is valid if any 2 of the 4 bytes are correct. 378 sigcount = params.signature[0] == 'O'; 379 sigcount += params.signature[1] == 'N'; 380 sigcount += params.signature[2] == 'F'; 381 sigcount += params.signature[3] == 'I';
|
/freebsd-11-stable/sys/dev/ips/ |
H A D | ipsreg.h | 277 u_int32_t signature; member in struct:__anon10308
|