/osnet-11/usr/src/grub/grub2/include/grub/i386/coreboot/ |
H A D | lbio.h | 25 char signature[4]; member in struct:grub_linuxbios_table_header
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softFipsPostUtil.c | 90 unsigned char *signature; local 106 /* Check to see if key object supports signature. */ 110 /* Determine length of signature. */ 131 /* Allocate space for signature data. */ 132 signature = (unsigned char *) calloc(1, signature_length); 133 if (signature == NULL) { 140 free(signature); 145 signature, &signature_length); 147 free(signature); 154 free(signature); [all...] |
H A D | softSignUtil.c | 121 * pSignature: pointer to the signature after signing 122 * pulSignatureLen: pointer to the length of the signature 175 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 180 ulDataLen, signature, pulSignatureLen, B_TRUE, 189 (void) memcpy(pSignature, signature, *pulSignatureLen); 309 * pSignature: pointer to the signature after signing 310 * pulSignatureLen: pointer to the length of the signature 362 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 367 signature, pulSignatureLen, B_TRUE, B_TRUE); 375 (void) memcpy(pSignature, signature, *pulSignatureLe [all...] |
H A D | softVerifyUtil.c | 122 * pSignature: pointer to the signature 123 * ulSignatureLen: length of the signature 188 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 196 ulDataLen, signature, &len, B_FALSE, B_FALSE); 203 if (memcmp(signature, pSignature, len) != 0) { 326 * pSignature: pointer to the signature 327 * ulSignatureLen: length of the signature 389 CK_BYTE signature[DES_BLOCK_LEN]; /* use the maximum size */ local 397 signature, &len, B_FALSE, B_TRUE); 404 if (memcmp(signature, pSignatur [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_signing.c | 45 #define SMBSIGOFF 14 /* SMB security signature offset */ 65 uint32_t seqno, uchar_t *signature) 85 uint32_t sig[2]; /* MAC signature, aligned! */ 131 * Finally, store the signature. 134 if (signature) 135 bcopy(digest, signature, SMB_SIG_SIZE); 183 * Verify reply signature. 232 * Compare the computed signature with the 238 DPRINT("BAD signature, MID=0x%x", rqp->rq_mid); 64 smbfs_compute_MAC(struct smb_ctx *ctx, mbuf_t *m, uint32_t seqno, uchar_t *signature) argument
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 489 CK_BYTE * signature, 497 if (! sess || ! ctx || ! in_data || ! signature) { 524 if (memcmp(hmac, signature, hmac_len) != 0) { 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
|
H A D | mech_sha.c | 219 CK_BYTE *signature, 227 if (! sess || ! ctx || ! in_data || ! signature) { 252 if (memcmp(hmac, signature, hmac_len) != 0) { 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
|
H A D | sign_mgr.c | 268 // if the caller just wants the signature length, there is no reason to 335 CK_BYTE * signature, 351 ctx, signature, sig_len)); 376 // if the caller just wants the signature length, there is no reason to 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
|
H A D | verify_mgr.c | 235 CK_BYTE * signature, 248 if (! in_data || ! signature) { 259 signature, sig_len)); 264 signature, sig_len)); 270 signature, sig_len)); 275 signature, sig_len)); 312 CK_BYTE * signature, 328 signature, sig_len)); 338 CK_BYTE * signature, 353 if (! signature || ! out_le 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 310 verify_mgr_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument [all...] |
H A D | mech_rsa.c | 311 CK_BYTE * signature, 338 rc = ckm_rsa_verify(sess->hContext, in_data, in_data_len, signature, 348 CK_BYTE *signature, 382 signature, modulus_bytes, out_data, out_data_len, key_obj); 393 CK_BYTE * signature, 464 ber_data_len, signature, sig_len); 523 CK_BYTE * signature, 593 ber_data_len, signature, sig_len); 648 CK_BYTE * signature, 711 ber_data_len, signature, sig_le 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/loader/i386/pc/ |
H A D | chainloader.c | 147 grub_uint16_t signature; local 191 /* Check the signature. */ 192 signature = *((grub_uint16_t *) (bs + GRUB_DISK_SECTOR_SIZE - 2)); 193 if (signature != grub_le_to_cpu16 (0xaa55) 196 grub_error (GRUB_ERR_BAD_OS, "invalid signature");
|
/osnet-11/usr/src/lib/libresolv2/common/dst/ |
H A D | hmac_link.c | 77 * UPDATE (hash (more) data), FINAL (generate a signature). This 85 * signature location to store signature. 86 * sig_len size of the signature location 88 * N Success on SIG_MODE_FINAL = returns signature length in bytes 96 u_char *signature, const int sig_len) 123 if (signature == NULL || sig_len < MD5_LEN) 125 MD5Final(signature, ctx); 130 MD5Update(ctx, signature, MD5_LEN); 131 MD5Final(signature, ct 94 dst_hmac_md5_sign(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 163 dst_hmac_md5_verify(const int mode, DST_KEY *d_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument [all...] |
H A D | dst_api.c | 216 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature 225 * SIG_MODE_FINAL 4 Generate signature 226 * from signature 233 * signature 234 * The location to which the signature will be written. 235 * sig_len Length of the signature field in bytes. 245 u_char *signature, const int sig_len) 250 (in_key->dk_KEY_struct == NULL || signature == NULL)) 255 signature, sig_len)); 263 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature 243 dst_sign_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 286 dst_verify_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument [all...] |
/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | dmraid_nvidia.c | 53 grub_uint32_t signature[NV_SIGNATURES]; member in struct:grub_nv_array 145 array->uuid_len = sizeof (sb.array.signature); 146 array->uuid = grub_malloc (sizeof (sb.array.signature)); 150 grub_memcpy (array->uuid, (char *) &sb.array.signature, 151 sizeof (sb.array.signature));
|
H A D | usbms.c | 34 grub_uint32_t signature; member in struct:grub_usbms_cbw 45 grub_uint32_t signature; member in struct:grub_usbms_csw 254 cbw.signature = grub_cpu_to_le32 (0x43425355); 264 cbw.signature, cbw.tag, cbw.transfer_length); 356 status.signature, status.tag, status.residue); 359 /* If phase error or not valid signature, do bulk-only reset device. */ 361 (status.signature != grub_cpu_to_le32(0x53425355)))
|
/osnet-11/usr/src/grub/grub2/include/grub/ |
H A D | msdos_partition.h | 29 /* The signature. */ 104 /* The signature 0xaa55. */ 105 grub_uint16_t signature; member in struct:grub_msdos_partition_mbr
|
H A D | acpi.h | 29 grub_uint8_t signature[8]; member in struct:grub_acpi_rsdp_v10 47 grub_uint8_t signature[4]; member in struct:grub_acpi_table_header
|
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | pci_io.c | 308 unsigned long signature; local 329 : "=d" (signature), 339 if (present_status || (signature != PCI_SIGNATURE)) { 370 if (check->fields.signature != BIOS32_SIGNATURE)
|
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | smp-imps.h | 148 unsigned signature; member in struct:imps_processor
|
/osnet-11/usr/src/lib/libzfs_jni/common/ |
H A D | libzfs_jni_property.c | 190 char signature[1024]; local 203 (void) snprintf(signature, sizeof (signature), 208 env, class, "<init>", signature); 216 (void) snprintf(signature, sizeof (signature), 222 env, class, "<init>", signature); 283 char signature[1024]; local 290 (void) snprintf(signature, sizeof (signature), 336 char signature[1024]; local 407 char signature[1024]; local 432 char signature[1024]; local [all...] |
H A D | libzfs_jni_util.c | 204 char signature[1024]; local 206 (void) snprintf(signature, sizeof (signature), "L%s;", 211 env, class, field_name, signature);
|
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | csrcrlop.c | 213 &CsrData->signature.algorithmIdentifier.algorithm, 216 &CsrData->signature.algorithmIdentifier.parameters, 425 ret = copy_algoid(&subj_csr.signature.algorithmIdentifier, algo); 438 * signature correctly. 440 KMF_DATA signature; local 442 ret = DerEncodeDSASignature(&signed_data, &signature); 448 subj_csr.signature.encrypted = signature; 450 subj_csr.signature.encrypted = signed_data; 453 /* Now, re-encode the CSR with the new signature */ 602 KMF_DATA signature; local 617 KMF_DATA signature; local [all...] |
/osnet-11/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 470 * OUT sig - must be big enough to hold the signature of data 483 KMF_DATA signature; local 516 signature.Data = (uchar_t *)sig; 517 signature.Length = *sig_len; 530 KMF_OUT_DATA_ATTR, &signature, sizeof (KMF_DATA)); 544 *sig_len = signature.Length; 553 * signature 562 const uchar_t *signature, size_t sig_len, 575 insig.Data = (uchar_t *)signature; 561 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
|
/osnet-11/usr/src/grub/grub2/grub-core/commands/ |
H A D | acpi.c | 330 if (grub_memcmp (fadt->hdr.signature, GRUB_ACPI_FADT_SIGNATURE, 331 sizeof (fadt->hdr.signature)) == 0) 360 grub_memcpy (&(rsdt->signature), "RSDT", 4); 384 grub_memcpy (&(rsdpv1_new->signature), "RSD PTR ", 385 sizeof (rsdpv1_new->signature)); 414 grub_memcpy (&(xsdt->signature), "XSDT", 4); 428 grub_memcpy (&(rsdpv2_new->rsdpv1.signature), "RSD PTR ", 429 sizeof (rsdpv2_new->rsdpv1.signature)); 517 char signature[5]; local 521 signature[ [all...] |
/osnet-11/usr/src/common/crypto/ecc/ |
H A D | ec.c | 622 /* Computes the ECDSA signature (a concatenation of two values r and s) 627 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, argument 633 mp_int r, s; /* tuple (r, s) is the signature */ 655 if (!key || !signature || !digest || !kb || (kblen < 0)) { 663 if (signature->data == NULL) { 664 /* a call to get the signature length only */ 667 if (signature->len < 2*olen) { 789 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) ); 790 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) ); 792 signature 826 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument 864 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument [all...] |