/freebsd-11.0-release/crypto/openssl/crypto/asn1/ |
H A D | a_sign.c | 131 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 193 if (signature->data != NULL) 194 OPENSSL_free(signature->data); 195 signature->data = buf_out; 197 signature->length = outl; 202 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 203 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; 220 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, 229 return ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, &ctx); 234 ASN1_BIT_STRING *signature, voi 130 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) argument 219 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, const EVP_MD *type) argument 232 ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx) argument [all...] |
H A D | a_verify.c | 77 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, argument 93 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { 117 if (EVP_VerifyFinal(&ctx, (unsigned char *)signature->data, 118 (unsigned int)signature->length, pkey) <= 0) { 137 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 150 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { 157 /* Convert signature OID into digest and public key OIDs */ 168 ret = pkey->ameth->item_verify(&ctx, it, asn, a, signature, pke 136 ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) argument [all...] |
H A D | x_spki.c | 79 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
|
H A D | t_spki.c | 98 n = spki->signature->length; 99 s = (char *)spki->signature->data;
|
H A D | x_req.c | 111 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
|
/freebsd-11.0-release/sys/xen/interface/hvm/ |
H A D | hvm_info_table.h | 38 char signature[8]; /* "HVM INFO" */ member in struct:hvm_info_table
|
/freebsd-11.0-release/usr.sbin/cpucontrol/ |
H A D | amd.h | 42 uint32_t signature; /* Low byte of cpuid(0). */ member in struct:amd_fw_header
|
H A D | amd.c | 82 uint32_t signature; local 86 .level = 1, /* Request signature. */ 106 signature = idargs.data[0]; 109 (signature >> 8) & 0x0f, (signature >> 4) & 0x0f, 110 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, 111 (signature >> 16) & 0x0f); 158 if (signature == fw_header->signature) { [all...] |
H A D | via.c | 86 uint32_t signature; local 115 signature = idargs.data[0]; 133 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, 134 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); 163 if (fw_header->signature != VIA_HEADER_SIGNATURE || 193 if (signature != fw_header->cpu_signature)
|
H A D | via.h | 38 uint32_t signature; /* Signature. */ member in struct:via_fw_header
|
H A D | intel.c | 89 uint32_t signature, flags; local 121 signature = idargs.data[0]; 140 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, 141 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); 205 * Check if there is an extended signature table. 221 WARNX(2, "%s: broken extended signature table", path); 226 * Check the extended table signature. 232 WARNX(2, "%s: extended signature tabl [all...] |
/freebsd-11.0-release/crypto/openssl/crypto/ecdsa/ |
H A D | ecdsatest.c | 189 ECDSA_SIG *signature = NULL; local 206 /* create the signature */ 207 signature = ECDSA_do_sign(digest, 20, key); 208 if (signature == NULL) 212 /* compare the created signature with the expected signature */ 217 if (BN_cmp(signature->r, r) || BN_cmp(signature->s, s)) 221 /* verify the signature */ 222 if (ECDSA_do_verify(digest, 20, signature, ke 291 unsigned char *signature = NULL; local [all...] |
/freebsd-11.0-release/contrib/gdb/gdb/ |
H A D | jv-lang.c | 309 char *signature = name; local 310 int namelen = java_demangled_signature_length (signature); 313 java_demangled_signature_copy (name, signature); 622 java_primitive_type (int signature) argument 624 switch (signature) 645 error ("unknown signature '%c' for primitive type", (char) signature); 694 signature string SIGNATURE. */ 697 java_demangled_signature_length (char *signature) argument 700 for (; *signature 715 java_demangled_signature_copy(char *result, char *signature) argument 757 java_demangle_type_signature(char *signature) argument [all...] |
H A D | jv-lang.h | 54 extern struct type *java_primitive_type (int signature);
|
/freebsd-11.0-release/contrib/libarchive/libarchive/ |
H A D | archive_read_support_filter_program.c | 72 const char *cmd, const void *signature, size_t signature_len) 75 cmd, signature, signature_len); 86 * The bidder object stores the command and the signature to watch for. 93 void *signature; member in struct:program_bidder 128 struct program_bidder *state, const void *signature, size_t signature_len) 131 if (signature != NULL && signature_len > 0) { 133 state->signature = malloc(signature_len); 134 memcpy(state->signature, signature, signature_len); 150 const char *cmd, const void *signature, size_ 71 archive_read_support_compression_program_signature(struct archive *a, const char *cmd, const void *signature, size_t signature_len) argument 127 set_bidder_signature(struct archive_read_filter_bidder *bidder, struct program_bidder *state, const void *signature, size_t signature_len) argument 149 archive_read_support_filter_program_signature(struct archive *_a, const char *cmd, const void *signature, size_t signature_len) argument [all...] |
/freebsd-11.0-release/crypto/heimdal/lib/hx509/ |
H A D | test_soft_pkcs11.c | 77 static char signature[1024]; variable 163 ck_sigsize = sizeof(signature); 165 (CK_BYTE *)signature, &ck_sigsize); 175 ret = (*func->C_Verify)(session, (CK_BYTE *)signature, ck_sigsize, 196 ck_sigsize = sizeof(signature); 198 (CK_BYTE *)signature, &ck_sigsize); 209 ret = (*func->C_Decrypt)(session, (CK_BYTE *)signature, ck_sigsize,
|
/freebsd-11.0-release/crypto/openssh/ |
H A D | kexc25519c.c | 79 u_char *server_host_key_blob = NULL, *signature = NULL; local 109 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, 166 free(signature);
|
H A D | kexc25519s.c | 61 u_char *server_host_key_blob = NULL, *signature = NULL; local 137 if ((r = kex->sign(server_host_private, server_host_public, &signature, 145 (r = sshpkt_put_string(ssh, signature, slen)) != 0 || 155 free(signature);
|
H A D | kexecdhs.c | 71 u_char *server_host_key_blob = NULL, *signature = NULL; local 172 if ((r = kex->sign(server_host_private, server_host_public, &signature, 183 (r = sshpkt_put_string(ssh, signature, slen)) != 0 || 204 free(signature);
|
/freebsd-11.0-release/sys/dev/mwl/ |
H A D | mwldiag.h | 89 uint32_t signature; /* f/w ready signature */ member in struct:__anon11030
|
/freebsd-11.0-release/tools/tools/pirtool/ |
H A D | pirtable.h | 64 uint32_t signature; /* $PIR */ member in struct:__anon13719
|
/freebsd-11.0-release/sys/dev/powermac_nvram/ |
H A D | powermac_nvramvar.h | 68 uint8_t signature; member in struct:chrp_header
|
/freebsd-11.0-release/contrib/openresolv/ |
H A D | libc.in | 110 signature="# Generated by resolvconf" 176 newconf="$signature$NL" 215 # If the old file does not have our signature, back it up. 216 # If the new file just has our signature, restore the backup. 218 if [ "$newconf" = "$signature$NL" ]; then 224 if [ "$line" != "$signature" ]; then
|
H A D | pdnsd.in | 37 signature="# Generated by resolvconf" 141 remove_markers "$signature" "$signature_end" "$pdnsd_conf" > "$cf" 143 echo "$signature" >> "$cf"
|
/freebsd-11.0-release/contrib/libarchive/libarchive/test/ |
H A D | test_read_filter_program_signature.c | 35 #define signature archive macro 76 signature, signature_len)); 89 * Test bad signature.
|