| /src/crypto/external/apache2/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 41 $self->{signature} = ""; 64 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 67 print " Signature Len:".$siglen."\n"; 70 $self->signature($sig); 78 my $sig = $self->signature(); 97 sub signature subroutine 101 $self->{signature} = shift; 103 return $self->{signature};
|
| ServerKeyExchange.pm | 98 $self->signature($sig); 115 if (length($self->signature) > 0) { 116 $data .= pack('n', length($self->signature)); 117 $data .= $self->signature; 157 sub signature subroutine
|
| /src/crypto/external/bsd/openssl/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 33 $self->{signature} = ""; 55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 58 print " Signature Len:".$siglen."\n"; 61 $self->signature($sig); 69 my $sig = $self->signature(); 88 sub signature subroutine 92 $self->{signature} = shift; 94 return $self->{signature};
|
| ServerKeyExchange.pm | 90 $self->signature($sig); 107 if (length($self->signature) > 0) { 108 $data .= pack('n', length($self->signature)); 109 $data .= $self->signature; 149 sub signature subroutine
|
| /src/crypto/external/bsd/openssl.old/dist/util/perl/TLSProxy/ |
| CertificateVerify.pm | 33 $self->{signature} = ""; 55 die "Invalid CertificateVerify signature length" if length($sig) != $siglen; 58 print " Signature Len:".$siglen."\n"; 61 $self->signature($sig); 69 my $sig = $self->signature(); 88 sub signature subroutine 92 $self->{signature} = shift; 94 return $self->{signature};
|
| ServerKeyExchange.pm | 90 $self->signature($sig); 107 if (length($self->signature) > 0) { 108 $data .= pack('n', length($self->signature)); 109 $data .= $self->signature; 149 sub signature subroutine
|
| /src/external/bsd/libarchive/dist/libarchive/test/ |
| test_read_format_rar_filter.c | 33 const char signature[12] = { local 50 assertEqualMem(buff, signature, 12);
|
| test_read_filter_program_signature.c | 34 #define signature archive macro 75 signature, signature_len)); 88 * Test bad signature.
|
| /src/sys/external/mit/xen-include-public/dist/xen/include/public/hvm/ |
| hvm_info_table.h | 46 char signature[8]; /* "HVM INFO" */ member in struct:hvm_info_table
|
| /src/external/mpl/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.h | 26 unsigned char *signature; member in struct:dns_rdata_any_tsig
|
| /src/external/mpl/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 32 unsigned char *signature; member in struct:dns_rdata_rrsig
|
| sig_24.h | 33 unsigned char *signature; member in struct:dns_rdata_sig_t
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/any_255/ |
| tsig_250.h | 27 unsigned char *signature; member in struct:dns_rdata_any_tsig
|
| /src/external/mpl/dhcp/bind/dist/lib/dns/rdata/generic/ |
| rrsig_46.h | 33 unsigned char *signature; member in struct:dns_rdata_rrsig
|
| sig_24.h | 34 unsigned char *signature; member in struct:dns_rdata_sig_t
|
| /src/crypto/external/bsd/heimdal/dist/lib/hx509/ |
| test_soft_pkcs11.c | 79 static char signature[1024]; variable 165 ck_sigsize = sizeof(signature); 167 (CK_BYTE *)signature, &ck_sigsize); 177 ret = (*func->C_Verify)(session, (CK_BYTE *)signature, ck_sigsize, 198 ck_sigsize = sizeof(signature); 200 (CK_BYTE *)signature, &ck_sigsize); 211 ret = (*func->C_Decrypt)(session, (CK_BYTE *)signature, ck_sigsize,
|
| /src/external/apache2/llvm/dist/llvm/include/llvm/DebugInfo/PDB/Native/ |
| ModuleDebugStream.h | 40 uint32_t signature() const { return Signature; } function in class:llvm::pdb::ModuleDebugStreamRef 75 uint32_t Signature;
|
| /src/external/gpl3/gdb.old/dist/gdb/dwarf2/ |
| comp-unit-head.h | 67 /* 64-bit signature of this unit. For type units, it denotes the signature of 71 ULONGEST signature = 0; member in struct:comp_unit_head
|
| /src/external/gpl3/gdb/dist/gdb/dwarf2/ |
| unit-head.h | 68 /* 64-bit signature of this unit. For type units, it denotes the signature of 72 ULONGEST signature = 0; member in struct:unit_head
|
| /src/crypto/external/bsd/openssh/dist/ |
| kexgexs.c | 134 u_char *signature = NULL; local 184 &signature, &slen, hash, hashlen, kex->hostkey_alg)) < 0) 191 (r = sshpkt_put_string(ssh, signature, slen)) != 0 || 212 free(signature);
|
| /src/sys/external/bsd/drm2/dist/drm/nouveau/include/nvfw/ |
| flcn.h | 47 u32 signature[4]; member in struct:flcn_bl_dmem_desc 66 u32 signature[4]; member in struct:flcn_bl_dmem_desc_v1 83 u32 signature[4]; member in struct:flcn_bl_dmem_desc_v2
|
| /src/crypto/external/apache2/openssl/dist/test/ |
| dsa_no_digest_size_test.c | 139 unsigned char *signature = NULL; local 162 TEST_error("Failed to get signature length, len=%d", len); 166 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) 169 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { 174 /* Check that the signature is okay via the EVP interface */ 179 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { 185 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { 191 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { 196 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { 206 OPENSSL_free(signature); [all...] |
| /src/crypto/external/bsd/openssl/dist/test/ |
| dsa_no_digest_size_test.c | 139 unsigned char *signature = NULL; local 164 TEST_error("Failed to get signature length, len=%d", len); 168 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) 171 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { 176 /* Check that the signature is okay via the EVP interface */ 181 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { 187 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { 193 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { 198 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { 208 OPENSSL_free(signature); [all...] |
| /src/crypto/external/bsd/openssl.old/dist/test/ |
| dsa_no_digest_size_test.c | 133 unsigned char *signature = NULL; local 158 TEST_error("Failed to get signature length, len=%d", len); 162 if (!TEST_ptr(signature = OPENSSL_malloc(sigLength))) 165 if (EVP_PKEY_sign(ctx, signature, &sigLength, dataToSign, len) != 1) { 170 /* Check that the signature is okay via the EVP interface */ 175 if (EVP_PKEY_verify(ctx, signature, sigLength, dataToSign, len) != 1) { 181 if (EVP_PKEY_verify(ctx, signature, sigLength, paddedData, digestlen) != 1) { 187 if (DSA_verify(0, dataToSign, len, signature, sigLength, dsakey) != 1) { 192 if (DSA_verify(0, paddedData, digestlen, signature, sigLength, dsakey) != 1) { 202 OPENSSL_free(signature); [all...] |
| /src/external/ibm-public/postfix/dist/src/util/ |
| mymalloc.c | 98 * free() calls we prepend a signature to memory given to the application. 104 int signature; /* set when block is active */ member in struct:MBLOCK 112 #define SIGNATURE 0xdead 119 if (real_ptr->signature != SIGNATURE) \ 121 real_ptr->signature = 0; \ 127 real_ptr->signature = SIGNATURE; \
|