/barrelfish-2018-10-04/usr/eclipseclp/Kernel/src/ |
H A D | lnsrv.c | 67 nsrv_aport_register(key,name,signature,port) 70 nsrv_name_t signature; 77 nsrv_aport_deregister(key,name,signature) 80 nsrv_name_t signature; 95 nsrv_bport_register(key,name,signature,port) 98 nsrv_name_t signature; 105 nsrv_bport_deregister(key,name,signature) 108 nsrv_name_t signature; 123 nsrv_bdomain_register(key,name,signature,domain) 126 nsrv_name_t signature; [all...] |
H A D | bip_mps.c | 108 ** uniqueness of the signature is ensured by taking the combination 111 ** signature: <hostname>.<pid> 219 char * signature; local 228 Get_Name(v_signature, t_signature, signature); 238 nret = nsrv_aport_register(key,name,signature,&port); 277 char * signature; local 286 Get_Name(v_signature, t_signature, signature); 293 nret = nsrv_aport_deregister(key,name,signature);
|
/barrelfish-2018-10-04/usr/eclipseclp/Pds/src/ |
H A D | lnsrv.c | 55 nsrv_aport_register(key,name,signature,port) 58 nsrv_name_t signature; 65 nsrv_aport_deregister(key,name,signature) 68 nsrv_name_t signature; 83 nsrv_bport_register(key,name,signature,port) 86 nsrv_name_t signature; 93 nsrv_bport_deregister(key,name,signature) 96 nsrv_name_t signature; 111 nsrv_bdomain_register(key,name,signature,domain) 114 nsrv_name_t signature; [all...] |
H A D | nsrv_int.h | 169 nsrv_name_t signature; member in struct:__anon1735 180 nsrv_name_t signature; member in struct:__anon1736 191 nsrv_name_t signature; member in struct:__anon1737 202 nsrv_name_t signature; member in struct:__anon1738 219 nsrv_name_t signature; member in struct:__anon1740 228 nsrv_name_t signature; member in struct:__anon1741 312 nsrv_name_t signature, 316 nsrv_name_t signature); 322 nsrv_name_t signature, 326 nsrv_name_t signature); [all...] |
H A D | nsrv.h | 48 #define NSRV_NOT_YOURS (PDS_RET_MAX + 3) /* signature mismatch */ 153 nsrv_name_t signature, 157 nsrv_name_t signature); 163 nsrv_name_t signature, 167 nsrv_name_t signature); 173 nsrv_name_t signature, 177 nsrv_name_t signature); 181 extern nsrv_ret_t nsrv_new_bport_id(nsrv_name_t signature, 183 extern nsrv_ret_t nsrv_free_bport_id(nsrv_name_t signature, 185 extern nsrv_ret_t nsrv_new_bdomain_id(nsrv_name_t signature, [all...] |
H A D | nsrv_client.c | 691 nsrv_aport_register(key,name,signature,port) 694 nsrv_name_t signature; 702 if (!key || !name || !signature || !port) 709 return(nsrv_aport_register_i(key,name,signature,port)); 724 xdr_nsrv_name(&xdrs,&signature) && 749 strcpy(request->signature,signature); 767 nsrv_aport_deregister(key,name,signature) 770 nsrv_name_t signature; 777 if (!key || !name || !signature) [all...] |
H A D | nsrv_int.c | 73 nsrv_name_t signature; member in struct:ht_item 164 printf("signature: %s \n", item->signature); 187 printf(" signature: %s \n", item->signature); 220 printf(" signature: %s \n", 221 item_1->signature); 272 printf(" signature: %s \n", 273 item_1->signature); 320 printf(" signature [all...] |
H A D | nsrv_server.c | 311 request->signature, 343 request->signature); 420 request->signature, 497 request->signature, 581 nret = nsrv_new_bport_id_i(request->signature,&bport_id); 611 nret = nsrv_free_bport_id_i(request->signature, 649 nret = nsrv_new_bdomain_id_i(request->signature,&domain_id); 679 nret = nsrv_free_bdomain_id_i(request->signature, 1190 nsrv_name_t signature; local 1218 nsrv_signature = signature; [all...] |
/barrelfish-2018-10-04/kernel/include/arch/k1om/kernel_boot_param/ |
H A D | ist_bios.h | 23 uint32_t signature; member in struct:ist_info
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ecdsa/ |
H A D | ecdsatest.c | 190 ECDSA_SIG *signature = NULL; local 207 /* create the signature */ 208 signature = ECDSA_do_sign(digest, 20, key); 209 if (signature == NULL) 213 /* compare the created signature with the expected signature */ 219 if (BN_cmp(signature->r ,r) || BN_cmp(signature->s, s)) 223 /* verify the signature */ 224 if (ECDSA_do_verify(digest, 20, signature, ke 291 unsigned char *signature = NULL; local [all...] |
/barrelfish-2018-10-04/lib/openssl-1.0.0d/test/ |
H A D | ecdsatest.c | 190 ECDSA_SIG *signature = NULL; local 207 /* create the signature */ 208 signature = ECDSA_do_sign(digest, 20, key); 209 if (signature == NULL) 213 /* compare the created signature with the expected signature */ 219 if (BN_cmp(signature->r ,r) || BN_cmp(signature->s, s)) 223 /* verify the signature */ 224 if (ECDSA_do_verify(digest, 20, signature, ke 291 unsigned char *signature = NULL; local [all...] |
H A D | testgen | 40 echo signature on req is wrong
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | a_sign.c | 131 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 196 if (signature->data != NULL) OPENSSL_free(signature->data); 197 signature->data=buf_out; 199 signature->length=outl; 203 signature->flags&= ~(ASN1_STRING_FLAG_BITS_LEFT|0x07); 204 signature->flags|=ASN1_STRING_FLAG_BITS_LEFT; 217 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, 282 if (signature->data != NULL) OPENSSL_free(signature 130 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) argument 216 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, const EVP_MD *type) argument [all...] |
H A D | a_verify.c | 77 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, argument 110 if (EVP_VerifyFinal(&ctx,(unsigned char *)signature->data, 111 (unsigned int)signature->length,pkey) <= 0) 129 int ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, argument 141 /* Convert signature OID into digest and public key OIDs */ 181 if (EVP_VerifyFinal(&ctx,(unsigned char *)signature->data, 182 (unsigned int)signature->length,pkey) <= 0)
|
H A D | t_spki.c | 97 n=spki->signature->length; 98 s=(char *)spki->signature->data;
|
H A D | x_spki.c | 78 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
|
H A D | x_req.c | 109 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
|
H A D | x_x509.c | 69 ASN1_SIMPLE(X509_CINF, signature, X509_ALGOR), 138 ASN1_SIMPLE(X509, signature, ASN1_BIT_STRING)
|
H A D | t_crl.c | 129 X509_signature_print(out, x->sig_alg, x->signature);
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/demos/asn1/ |
H A D | ocsp.c | 79 signature BIT STRING, 115 signature BIT STRING, 185 ASN1_BIT_STRING *signature; member in struct:__anon1308 237 ASN1_BIT_STRING *signature; member in struct:__anon1317 287 ASN1_SIMPLE(Signature, signature, ASN1_BIT_STRING), 363 ASN1_SIMPLE(BasicOCSPResponse, signature, ASN1_BIT_STRING),
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/x509/ |
H A D | x_all.c | 76 a->signature,a->cert_info,r)); 82 a->sig_alg,a->signature,a->req_info,r)); 88 a->sig_algor,a->signature,a->spkac,r)); 94 return(ASN1_item_sign(ASN1_ITEM_rptr(X509_CINF), x->cert_info->signature, 95 x->sig_alg, x->signature, x->cert_info,pkey,md)); 101 x->signature, x->req_info,pkey,md)); 108 x->sig_alg, x->signature, x->crl,pkey,md)); 114 x->signature, x->spkac,pkey,md));
|
/barrelfish-2018-10-04/lib/openssl-1.0.0d/crypto/ocsp/ |
H A D | ocsp_asn.c | 64 ASN1_SIMPLE(OCSP_SIGNATURE, signature, ASN1_BIT_STRING), 163 ASN1_SIMPLE(OCSP_BASICRESP, signature, ASN1_BIT_STRING),
|
H A D | ocsp.h | 139 * signature BIT STRING, 145 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 284 * signature BIT STRING, 288 The value for "signature" is specified in the OCSP rfc2560 as follows: 289 "The value for the signature SHALL be computed on the hash of the DER 295 hash. So, we look at the signature-specification algorithm, and try to do 307 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 382 o->optionalSignature->signature,o->tbsRequest,pkey,md) 386 o->signature,o->tbsResponseData,pkey,md) 390 a->optionalSignature->signature, [all...] |
/barrelfish-2018-10-04/usr/drivers/vbe/ |
H A D | vbe.h | 25 char signature[4]; member in struct:vbeinfoblock
|
/barrelfish-2018-10-04/include/openssl/ |
H A D | ocsp.h | 139 * signature BIT STRING, 145 ASN1_BIT_STRING *signature; member in struct:ocsp_signature_st 284 * signature BIT STRING, 288 The value for "signature" is specified in the OCSP rfc2560 as follows: 289 "The value for the signature SHALL be computed on the hash of the DER 295 hash. So, we look at the signature-specification algorithm, and try to do 307 ASN1_BIT_STRING *signature; member in struct:ocsp_basic_response_st 382 o->optionalSignature->signature,o->tbsRequest,pkey,md) 386 o->signature,o->tbsResponseData,pkey,md) 390 a->optionalSignature->signature, [all...] |