/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 435 KMF_DATA *signature) 536 (CK_BYTE *)signature->Data, 537 (CK_ULONG)signature->Length); 431 PKCS_VerifyData(KMF_HANDLE_T handle, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *data, KMF_DATA *signature) argument
|
H A D | certop.c | 66 &SignerCert->signature.algorithmIdentifier.algorithm); 194 * public key is used for verifying a signature on 220 * public key is used with a digital signature mechanism 295 NODATA(tbs_cert->signature.algorithm) || 386 * Determine a default signature type to use based on 556 * If the signature OID was not given, check 654 * returns the the signature in output 669 KMF_DATA signature = {0, NULL}; local 779 * For DSA, NSS returns an encoded signature. Decode the 780 * signature an 3114 KMF_DATA signature; local 3129 KMF_DATA signature; local 3174 KMF_DATA signature = { 0, NULL }; local 3265 KMF_DATA signature; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt-grub/cipher/ |
H A D | rsa.c | 102 gcry_mpi_t signature = gcry_mpi_new (nbits); 125 /* Create another random plaintext as data for signature checking. */ 128 /* Use the RSA secret function to create a signature of the plaintext. */ 129 secret (signature, plaintext, sk); 131 /* Use the RSA public function to verify this signature. */ 132 public (decr_plaintext, signature, &pk); 136 /* Modify the signature and check that the signing fails. */ 137 gcry_mpi_add_ui (signature, signature, 1); 138 public (decr_plaintext, signature, 101 gcry_mpi_t signature = gcry_mpi_new (nbits); local [all...] |
/osnet-11/usr/src/grub/grub2/include/grub/i386/pc/ |
H A D | vbe.h | 71 grub_uint8_t signature[4]; member in struct:grub_vbe_info_block
|
H A D | pxe.h | 170 grub_uint8_t signature[6]; /* 'PXENV+'. */ member in struct:grub_pxenv 192 grub_uint8_t signature[4]; member in struct:grub_pxe_bangpxe
|
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | sis900.c | 167 u16 signature; local 171 signature = (u16) sis900_read_eeprom( EEPROMSignature); 172 if (signature == 0xffff || signature == 0x0000) { 173 printf ("sis900_probe: Error EERPOM read %hX\n", signature); 195 * The signature field in SiS962 or SiS963 spec is meaningless.
|
H A D | undi.h | 107 uint32_t signature; member in struct:pnp_bios 120 uint16_t signature; member in struct:rom 129 uint32_t signature; member in struct:pcir_header 136 uint32_t signature; member in struct:pnp_header 158 uint32_t signature; member in struct:undi_rom_id
|
H A D | pci.h | 246 /* PCI signature: "PCI " */ 249 /* PCI service signature: "$PCI" */ 254 unsigned long signature; /* _32_ */ member in struct:bios32::__anon221
|
/osnet-11/usr/src/grub/grub2/grub-core/lib/libgcrypt/cipher/ |
H A D | rsa.c | 103 gcry_mpi_t signature = gcry_mpi_new (nbits); 126 /* Create another random plaintext as data for signature checking. */ 129 /* Use the RSA secret function to create a signature of the plaintext. */ 130 secret (signature, plaintext, sk); 132 /* Use the RSA public function to verify this signature. */ 133 public (decr_plaintext, signature, &pk); 137 /* Modify the signature and check that the signing fails. */ 138 gcry_mpi_add_ui (signature, signature, 1); 139 public (decr_plaintext, signature, 102 gcry_mpi_t signature = gcry_mpi_new (nbits); local [all...] |
/osnet-11/usr/src/grub/grub2/include/grub/arc/ |
H A D | arc.h | 229 grub_arc_ulong_t signature; member in struct:grub_arc_system_parameter_block
|
/osnet-11/usr/src/grub/grub2/include/grub/efi/ |
H A D | pe32.h | 250 char signature[GRUB_PE32_SIGNATURE_SIZE]; member in struct:grub_pe32_header
|
H A D | api.h | 141 grub_uint32_t signature; member in struct:grub_efi_sal_system_table 787 grub_efi_uint64_t signature; member in struct:grub_efi_table_header
|
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | iso9660.h | 148 u_int16_t signature; member in struct:rock_ridge
|
H A D | shared.h | 57 /* Boot signature related defines for the findroot command */ 431 unsigned long header; /* Magic signature "HdrS" */ 460 unsigned char signature[4]; member in struct:vbe_controller
|
/osnet-11/usr/src/lib/libparted/common/libparted/labels/ |
H A D | mac.c | 101 uint16_t signature; /* expected to be MAC_PARTITION_MAGIC */ member in struct:_MacRawPartition 125 uint16_t signature; /* expected to be MAC_DRIVER_MAGIC */ member in struct:_MacRawDisk 188 if (PED_BE16_TO_CPU (raw_disk->signature) != MAC_DISK_MAGIC) { 195 _("Invalid signature %x for Mac disk labels."), 196 (int) PED_BE16_TO_CPU (raw_disk->signature)) 207 int sig = (int) PED_BE16_TO_CPU (raw_part->signature); 519 _("Partition %d has an invalid signature %x."), 521 (int) PED_BE16_TO_CPU (raw_part->signature)) 863 ghost_entry->signature = PED_CPU_TO_BE16 (MAC_PARTITION_MAGIC_2); 931 part_map_entry->signature [all...] |
/osnet-11/usr/src/lib/libdtrace_jni/common/ |
H A D | dtj_util.c | 146 /* Comparison functions, uu_compare_fn_t signature */ 334 dtj_java_method_create(JNIEnv *jenv, jmethodID *jm, char *name, char *signature, argument 342 m->djm_signature = signature; 353 char *signature, uu_list_pool_t *methodpool) 355 dtj_java_method_t *m = dtj_java_method_create(jenv, jm, name, signature, 689 * signature. 730 "%s.%s signature: %s", c->djc_name, 352 dtj_java_static_method_create(JNIEnv *jenv, jmethodID *jm, char *name, char *signature, uu_list_pool_t *methodpool) argument
|
/osnet-11/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 185 free_algoid(&tbscert->signature); 210 free_algoid(&certptr->signature.algorithmIdentifier); 211 free_data(&certptr->signature.encrypted); 439 DerEncodeDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) argument 445 if (rawdata == NULL || signature == NULL) 456 * The [EC]DSA signature is the concatenation of 2 471 signature->Data = (uchar_t *)buf->bv_val; 472 signature->Length = buf->bv_len; 484 DerEncodeECDSASignature(KMF_DATA *rawdata, KMF_DATA *signature) argument 486 return (DerEncodeDSASignature(rawdata, signature)); 528 DerDecodeDSASignature(KMF_DATA *encoded, KMF_DATA *signature) argument 612 DerDecodeECDSASignature(KMF_DATA *encoded, KMF_DATA *signature) argument 1519 char *signature; local 1817 KMF_X509_SIGNATURE *signature = NULL; local 1885 ExtractX509CertParts(KMF_DATA *x509cert, KMF_DATA *tbscert, KMF_DATA *signature) argument 2092 char *signature; local 2473 KMF_X509_SIGNATURE *signature = NULL; local [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/fs/ |
H A D | btrfs.c | 60 grub_uint8_t signature[sizeof (GRUB_BTRFS_SIGNATURE) - 1]; member in struct:grub_btrfs_superblock 256 if (grub_memcmp ((char *) sblock.signature, GRUB_BTRFS_SIGNATURE,
|
/osnet-11/usr/src/cmd/hal/hald/ |
H A D | hald_dbus.c | 161 * the wrong signature 3806 HAL_WARNING (("Broken signature for method %s " 4085 const char *signature; local 4093 signature = dbus_message_get_signature (message); 4139 if (d != NULL && interface != NULL && method != NULL && signature != NULL) { 4169 strcmp (sig, signature) == 0) { 4171 HAL_INFO (("OK for method '%s' with signature '%s' on interface '%s' for UDI '%s' and execpath '%s'", method, signature, interface, udi, execpath));
|
/osnet-11/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 123 struct ami_algid *signature; member in struct:ami_cert_info 141 ami_bitstring signature; member in struct:ami_cert 211 ami_algid signature; member in struct:ami_cert_list_contents 227 ami_bitstring signature; member in struct:ami_cert_list 262 ami_bitstring signature; member in struct:ami_keypkg 314 struct ami_algid *signature; member in struct:ami_crl_info 327 ami_bitstring signature; member in struct:ami_crl 347 ami_bitstring signature; member in struct:ami_extcert 497 ami_bitstring signature; member in struct:ami_certreq 520 ami_bitstring signature; member in struct:ami_signed_pubkey_and_challenge [all...] |
/osnet-11/usr/src/lib/libparted/common/libparted/fs/hfs/ |
H A D | hfs.h | 152 uint16_t signature; member in struct:_HfsMasterDirectoryBlock 183 uint16_t signature; member in struct:_HfsMasterDirectoryBlock::__anon2234::__anon2236 425 uint16_t signature; member in struct:_HfsPVolumeHeader
|
/osnet-11/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 572 KMF_X509_ALGORITHM_IDENTIFIER signature; member in struct:__anon1885 584 * This structure contains a cryptographic digital signature. 595 * values with the signature covering those values. 600 KMF_X509_SIGNATURE signature; member in struct:__anon1887 603 #define CERT_ALG_OID(c) &c->certificate.signature.algorithm 604 #define CERT_SIG_OID(c) &c->signature.algorithmIdentifier.algorithm 625 KMF_X509_SIGNATURE signature; member in struct:__anon1889
|