| /src/crypto/external/apache2/openssl/dist/providers/common/include/prov/ |
| der_rsa.h.in | 25 /* PSS parameters */ 27 const RSA_PSS_PARAMS_30 *pss); 32 const RSA_PSS_PARAMS_30 *pss);
|
| /src/crypto/external/bsd/openssl/dist/providers/common/include/prov/ |
| der_rsa.h.in | 23 /* PSS parameters */ 25 const RSA_PSS_PARAMS_30 *pss); 30 const RSA_PSS_PARAMS_30 *pss);
|
| /src/external/gpl3/binutils/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN); 128 tcontext_size = pss.threadcnt * sizeof (core_st_t); 142 pss.ssize, 143 pss.slimit, 150 pss.data_len + pss.bss_len [all...] |
| /src/external/gpl3/binutils.old/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN); 128 tcontext_size = pss.threadcnt * sizeof (core_st_t); 142 pss.ssize, 143 pss.slimit, 150 pss.data_len + pss.bss_len [all...] |
| /src/external/gpl3/gdb/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN); 128 tcontext_size = pss.threadcnt * sizeof (core_st_t); 142 pss.ssize, 143 pss.slimit, 150 pss.data_len + pss.bss_len [all...] |
| /src/external/gpl3/gdb.old/dist/bfd/ |
| lynx-core.c | 92 struct pssentry pss; local 103 /* Get the pss entry from the core file */ 108 amt = sizeof pss; 109 if (bfd_read (&pss, amt, abfd) != amt) 123 strncpy (core_command (abfd), pss.pname, PNMLEN + 1); 127 tcontext_size = pss.threadcnt * sizeof (core_st_t); 141 pss.ssize, 142 pss.slimit, 149 pss.data_len + pss.bss_len [all...] |
| /src/crypto/external/apache2/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_rsa.txt | 224 # RSA PSS key tests 226 # PSS only key, no parameter restrictions 227 PrivateKey = RSA-PSS 257 # PSS public key default parameters 258 PublicKey = RSA-PSS-DEFAULT 269 PrivPubKeyPair = RSA-PSS:RSA-PSS-DEFAULT 274 Ctrl = rsa_padding_mode:pss 283 Verify = RSA-PSS-DEFAULT 288 Decrypt = RSA-PSS [all...] |
| evppkey_rsa_common.txt | 829 # RSA PSS key tests 831 # PSS only key, no parameter restrictions 832 PrivateKey = RSA-PSS 862 # PSS public key default parameters 863 PublicKey = RSA-PSS-DEFAULT 874 PrivPubKeyPair = RSA-PSS:RSA-PSS-DEFAULT 877 PublicKey = RSA-PSS-BAD 888 PrivPubKeyPair = RSA-PSS:RSA-PSS-BA [all...] |
| /src/crypto/external/bsd/openssl/dist/test/recipes/30-test_evp_data/ |
| evppkey_rsa.txt | 206 # RSA PSS key tests 208 # PSS only key, no parameter restrictions 209 PrivateKey = RSA-PSS 239 # PSS public key default parameters 240 PublicKey = RSA-PSS-DEFAULT 251 PrivPubKeyPair = RSA-PSS:RSA-PSS-DEFAULT 256 Ctrl = rsa_padding_mode:pss 265 Verify = RSA-PSS-DEFAULT 270 Decrypt = RSA-PSS [all...] |
| /src/crypto/external/bsd/openssl.old/dist/crypto/rsa/ |
| rsa_ameth.c | 41 /* If no PSS parameters we omit parameters entirely */ 42 if (rsa->pss == NULL) { 46 /* Encode PSS parameters */ 47 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) 69 rsa->pss = rsa_pss_decode(alg); 70 if (rsa->pss == NULL) 232 static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, 241 if (pss == NULL) { 242 if (BIO_puts(bp, "No PSS parameter restrictions\n") <= 0) 246 if (BIO_puts(bp, "PSS parameter restrictions:") <= 0 430 RSA_PSS_PARAMS *pss; local 454 RSA_PSS_PARAMS *pss = rsa_pss_decode(sigalg); local 623 RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new(); local 650 RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx); local 673 RSA_PSS_PARAMS *pss; local 867 RSA_PSS_PARAMS *pss; local [all...] |
| /src/crypto/external/apache2/openssl/dist/crypto/rsa/ |
| rsa_backend.c | 306 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, 309 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { 310 int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); 311 int maskgenalg_nid = ossl_rsa_pss_params_30_maskgenalg(pss); 312 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); 313 int saltlen = ossl_rsa_pss_params_30_saltlen(pss); 333 * we make sure that at least one PSS-related parameter is passed, even 508 /* we always copy the PSS parameters regardless of selection */ 539 if (rsa->pss != NULL) { 540 dupkey->pss = RSA_PSS_PARAMS_dup(rsa->pss) 563 RSA_PSS_PARAMS *pss; local 585 RSA_PSS_PARAMS_30 *pss = NULL; local 652 RSA_PSS_PARAMS *pss; local [all...] |
| rsa_ameth.c | 40 /* If no PSS parameters we omit parameters entirely */ 41 if (rsa->pss == NULL) { 45 /* Encode PSS parameters */ 46 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) 205 static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, 214 if (pss == NULL) { 215 if (BIO_puts(bp, "No PSS parameter restrictions\n") <= 0) 219 if (BIO_puts(bp, "PSS parameter restrictions:") <= 0) 222 } else if (pss == NULL) { 223 if (BIO_puts(bp, "(INVALID PSS PARAMETERS)\n") <= 0 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); local 497 RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new(); local 524 RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx); local 547 RSA_PSS_PARAMS *pss; local 729 RSA_PSS_PARAMS *pss; local [all...] |
| /src/crypto/external/bsd/openssl/dist/crypto/rsa/ |
| rsa_backend.c | 171 int ossl_rsa_pss_params_30_todata(const RSA_PSS_PARAMS_30 *pss, 174 if (!ossl_rsa_pss_params_30_is_unrestricted(pss)) { 175 int hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); 176 int maskgenalg_nid = ossl_rsa_pss_params_30_maskgenalg(pss); 177 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); 178 int saltlen = ossl_rsa_pss_params_30_saltlen(pss); 199 * we make sure that at least one PSS-related parameter is passed, even 378 /* we always copy the PSS parameters regardless of selection */ 411 if (rsa->pss != NULL) { 412 dupkey->pss = RSA_PSS_PARAMS_dup(rsa->pss) 435 RSA_PSS_PARAMS *pss; local 457 RSA_PSS_PARAMS_30 *pss = NULL; local 524 RSA_PSS_PARAMS *pss; local [all...] |
| rsa_ameth.c | 40 /* If no PSS parameters we omit parameters entirely */ 41 if (rsa->pss == NULL) { 45 /* Encode PSS parameters */ 46 if (ASN1_item_pack(rsa->pss, ASN1_ITEM_rptr(RSA_PSS_PARAMS), pstr) == NULL) 205 static int rsa_pss_param_print(BIO *bp, int pss_key, RSA_PSS_PARAMS *pss, 214 if (pss == NULL) { 215 if (BIO_puts(bp, "No PSS parameter restrictions\n") <= 0) 219 if (BIO_puts(bp, "PSS parameter restrictions:") <= 0) 222 } else if (pss == NULL) { 223 if (BIO_puts(bp,"(INVALID PSS PARAMETERS)\n") <= 0 406 RSA_PSS_PARAMS *pss = ossl_rsa_pss_decode(sigalg); local 479 RSA_PSS_PARAMS *pss = RSA_PSS_PARAMS_new(); local 506 RSA_PSS_PARAMS *pss = rsa_ctx_to_pss(pkctx); local 529 RSA_PSS_PARAMS *pss; local 711 RSA_PSS_PARAMS *pss; local [all...] |
| /src/external/gpl3/binutils/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/binutils.old/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gcc/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gcc.old/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gdb/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/external/gpl3/gdb.old/dist/libiberty/ |
| physmem.c | 96 struct pst_static pss; local 97 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0)) 99 double pages = pss.physical_memory; 100 double pagesize = pss.page_size; 200 struct pst_static pss; local 202 if (0 <= pstat_getstatic (&pss, sizeof pss, 1, 0) 206 double pagesize = pss.page_size;
|
| /src/crypto/external/apache2/openssl/dist/providers/common/der/ |
| der_rsa_key.c | 247 const RSA_PSS_PARAMS_30 *pss) 249 if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) { 250 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); 283 const RSA_PSS_PARAMS_30 *pss) 296 * intent. Therefore, we assert that here, the PSS parameters must show 299 if (!ossl_assert(pss != NULL 300 && !ossl_rsa_pss_params_30_is_unrestricted(pss))) 303 hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); 304 saltlen = ossl_rsa_pss_params_30_saltlen(pss); [all...] |
| /src/crypto/external/bsd/openssl/dist/providers/common/der/ |
| der_rsa_key.c | 248 const RSA_PSS_PARAMS_30 *pss) 250 if (pss != NULL && ossl_rsa_pss_params_30_maskgenalg(pss) == NID_mgf1) { 251 int maskgenhashalg_nid = ossl_rsa_pss_params_30_maskgenhashalg(pss); 284 const RSA_PSS_PARAMS_30 *pss) 297 * intent. Therefore, we assert that here, the PSS parameters must show 300 if (!ossl_assert(pss != NULL 301 && !ossl_rsa_pss_params_30_is_unrestricted(pss))) 304 hashalg_nid = ossl_rsa_pss_params_30_hashalg(pss); 305 saltlen = ossl_rsa_pss_params_30_saltlen(pss); [all...] |
| /src/external/gpl3/gcc/dist/libgcc/ |
| generic-morestack.c | 391 struct stack_segment *pss; local 436 pss = (struct stack_segment *) space; 438 pss->prev = NULL; 439 pss->next = NULL; 440 pss->size = allocate - overhead; 441 pss->dynamic_allocation = NULL; 442 pss->free_dynamic_allocation = NULL; 443 pss->extra = NULL; 445 return pss; 489 struct stack_segment *pss; local 816 struct stack_segment *pss; local [all...] |
| /src/external/gpl3/gcc.old/dist/libgcc/ |
| generic-morestack.c | 391 struct stack_segment *pss; local 436 pss = (struct stack_segment *) space; 438 pss->prev = NULL; 439 pss->next = NULL; 440 pss->size = allocate - overhead; 441 pss->dynamic_allocation = NULL; 442 pss->free_dynamic_allocation = NULL; 443 pss->extra = NULL; 445 return pss; 489 struct stack_segment *pss; local 816 struct stack_segment *pss; local [all...] |
| /src/sys/dev/raidframe/ |
| rf_netbsd.h | 75 struct pool pss; /* Parity Stripe Status */ member in struct:RF_Pools_s 101 char pss[RF_MAX_POOLNAMELEN]; /* Parity Stripe Status */ member in struct:RF_PoolNames_s
|