/freebsd-11-stable/crypto/openssl/crypto/asn1/ |
H A D | a_sign.c | 131 ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, 193 if (signature->data != NULL) 194 OPENSSL_free(signature->data); 195 signature->data = buf_out; 197 signature->length = outl; 202 signature->flags &= ~(ASN1_STRING_FLAG_BITS_LEFT | 0x07); 203 signature->flags |= ASN1_STRING_FLAG_BITS_LEFT; 220 X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, 229 return ASN1_item_sign_ctx(it, algor1, algor2, signature, asn, &ctx); 234 ASN1_BIT_STRING *signature, voi 130 ASN1_sign(i2d_of_void *i2d, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, char *data, EVP_PKEY *pkey, const EVP_MD *type) argument 219 ASN1_item_sign(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey, const EVP_MD *type) argument 232 ASN1_item_sign_ctx(const ASN1_ITEM *it, X509_ALGOR *algor1, X509_ALGOR *algor2, ASN1_BIT_STRING *signature, void *asn, EVP_MD_CTX *ctx) argument [all...] |
H A D | a_verify.c | 77 int ASN1_verify(i2d_of_void *i2d, X509_ALGOR *a, ASN1_BIT_STRING *signature, argument 93 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { 117 if (EVP_VerifyFinal(&ctx, (unsigned char *)signature->data, 118 (unsigned int)signature->length, pkey) <= 0) { 137 ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) 150 if (signature->type == V_ASN1_BIT_STRING && signature->flags & 0x7) { 157 /* Convert signature OID into digest and public key OIDs */ 168 ret = pkey->ameth->item_verify(&ctx, it, asn, a, signature, pke 136 ASN1_item_verify(const ASN1_ITEM *it, X509_ALGOR *a, ASN1_BIT_STRING *signature, void *asn, EVP_PKEY *pkey) argument [all...] |
H A D | x_spki.c | 79 ASN1_SIMPLE(NETSCAPE_SPKI, signature, ASN1_BIT_STRING)
|
H A D | t_spki.c | 98 n = spki->signature->length; 99 s = (char *)spki->signature->data;
|
H A D | x_req.c | 111 ASN1_SIMPLE(X509_REQ, signature, ASN1_BIT_STRING)
|
/freebsd-11-stable/sys/xen/interface/hvm/ |
H A D | hvm_info_table.h | 38 char signature[8]; /* "HVM INFO" */ member in struct:hvm_info_table
|
/freebsd-11-stable/sys/dev/qlnx/qlnxe/ |
H A D | mfw_hsi.h | 51 u32 signature; /* Help to identify that the trace is valid */ member in struct:mcp_trace
|
/freebsd-11-stable/usr.sbin/cpucontrol/ |
H A D | amd.c | 84 uint32_t signature; local 88 .level = 1, /* Request signature. */ 108 signature = idargs.data[0]; 111 (signature >> 8) & 0x0f, (signature >> 4) & 0x0f, 112 (signature >> 0) & 0x0f, (signature >> 20) & 0xff, 113 (signature >> 16) & 0x0f); 160 if (signature == fw_header->signature) { [all...] |
H A D | via.c | 88 uint32_t signature; local 117 signature = idargs.data[0]; 135 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, 136 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); 165 if (fw_header->signature != VIA_HEADER_SIGNATURE || 195 if (signature != fw_header->cpu_signature)
|
H A D | via.h | 40 uint32_t signature; /* Signature. */ member in struct:via_fw_header
|
H A D | amd10h.c | 56 uint32_t signature; local 78 signature = idargs.data[0]; 79 family = ((signature >> 8) & 0x0f) + ((signature >> 20) & 0xff); 108 uint32_t signature; local 130 signature = idargs.data[0]; 142 (signature >> 8) & 0x0f, (signature >> 4) & 0x0f, 143 (signature >> 0) & 0x0f, (signature >> 2 [all...] |
H A D | intel.c | 91 uint32_t sig, signature, flags; local 129 signature = idargs.data[0]; 149 (signature >> 12) & 0x03, (signature >> 8) & 0x0f, 150 (signature >> 4) & 0x0f, (signature >> 0) & 0x0f); 214 * Check if there is an extended signature table. 230 WARNX(2, "%s: broken extended signature table", path); 235 * Check the extended table signature. 242 "%s: extended signature tabl [all...] |
/freebsd-11-stable/crypto/openssl/crypto/ecdsa/ |
H A D | ecdsatest.c | 194 ECDSA_SIG *signature = NULL; local 212 /* create the signature */ 214 signature = ECDSA_do_sign(digest, 20, key); 215 if (signature == NULL) 219 /* compare the created signature with the expected signature */ 224 if (BN_cmp(signature->r, r) || BN_cmp(signature->s, s)) 228 /* verify the signature */ 229 if (ECDSA_do_verify(digest, 20, signature, ke 298 unsigned char *signature = NULL; local [all...] |
/freebsd-11-stable/contrib/gdb/gdb/ |
H A D | jv-lang.c | 309 char *signature = name; local 310 int namelen = java_demangled_signature_length (signature); 313 java_demangled_signature_copy (name, signature); 622 java_primitive_type (int signature) argument 624 switch (signature) 645 error ("unknown signature '%c' for primitive type", (char) signature); 694 signature string SIGNATURE. */ 697 java_demangled_signature_length (char *signature) argument 700 for (; *signature 715 java_demangled_signature_copy(char *result, char *signature) argument 757 java_demangle_type_signature(char *signature) argument [all...] |
H A D | jv-lang.h | 54 extern struct type *java_primitive_type (int signature);
|
/freebsd-11-stable/contrib/libarchive/libarchive/ |
H A D | archive_read_support_filter_program.c | 72 const char *cmd, const void *signature, size_t signature_len) 75 cmd, signature, signature_len); 86 * The bidder object stores the command and the signature to watch for. 93 void *signature; member in struct:program_bidder 128 struct program_bidder *state, const void *signature, size_t signature_len) 131 if (signature != NULL && signature_len > 0) { 133 state->signature = malloc(signature_len); 134 memcpy(state->signature, signature, signature_len); 150 const char *cmd, const void *signature, size_ 71 archive_read_support_compression_program_signature(struct archive *a, const char *cmd, const void *signature, size_t signature_len) argument 127 set_bidder_signature(struct archive_read_filter_bidder *bidder, struct program_bidder *state, const void *signature, size_t signature_len) argument 149 archive_read_support_filter_program_signature(struct archive *_a, const char *cmd, const void *signature, size_t signature_len) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/hx509/ |
H A D | test_soft_pkcs11.c | 77 static char signature[1024]; variable 163 ck_sigsize = sizeof(signature); 165 (CK_BYTE *)signature, &ck_sigsize); 175 ret = (*func->C_Verify)(session, (CK_BYTE *)signature, ck_sigsize, 196 ck_sigsize = sizeof(signature); 198 (CK_BYTE *)signature, &ck_sigsize); 209 ret = (*func->C_Decrypt)(session, (CK_BYTE *)signature, ck_sigsize,
|
/freebsd-11-stable/crypto/openssh/ |
H A D | kexc25519c.c | 79 u_char *server_host_key_blob = NULL, *signature = NULL; local 109 (r = sshpkt_get_string(ssh, &signature, &slen)) != 0 || 144 if ((r = sshkey_verify(server_host_key, signature, slen, hash, hashlen, 166 free(signature);
|
H A D | kexc25519s.c | 61 u_char *server_host_key_blob = NULL, *signature = NULL; local 137 if ((r = kex->sign(server_host_private, server_host_public, &signature, 145 (r = sshpkt_put_string(ssh, signature, slen)) != 0 || 155 free(signature);
|
H A D | kexecdhs.c | 71 u_char *server_host_key_blob = NULL, *signature = NULL; local 172 if ((r = kex->sign(server_host_private, server_host_public, &signature, 183 (r = sshpkt_put_string(ssh, signature, slen)) != 0 || 204 free(signature);
|
/freebsd-11-stable/sys/dev/powermac_nvram/ |
H A D | powermac_nvramvar.h | 68 uint8_t signature; member in struct:chrp_header
|
/freebsd-11-stable/sys/dev/mwl/ |
H A D | mwldiag.h | 89 uint32_t signature; /* f/w ready signature */ member in struct:__anon11032
|
/freebsd-11-stable/tools/tools/pirtool/ |
H A D | pirtable.h | 64 uint32_t signature; /* $PIR */ member in struct:__anon13722
|
/freebsd-11-stable/contrib/libarchive/libarchive/test/ |
H A D | test_read_filter_program_signature.c | 35 #define signature archive macro 76 signature, signature_len)); 89 * Test bad signature.
|
/freebsd-11-stable/contrib/openresolv/ |
H A D | libc.in | 109 signature="# Generated by resolvconf" 175 newconf="$signature$NL" 214 # If the old file does not have our signature, back it up. 215 # If the new file just has our signature, restore the backup. 217 if [ "$newconf" = "$signature$NL" ]; then 223 if [ "$line" != "$signature" ]; then
|