/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsi_thread.h | 59 uint32_t signature; member in struct:_iscsi_thread
|
H A D | iscsiAuthClient.c | 1517 if (!client || client->signature != iscsiAuthClientSignature) { 1556 if (!client || client->signature != iscsiAuthClientSignature) { 1719 if (!client || client->signature != iscsiAuthClientSignature) { 1801 if (!client || client->signature != iscsiAuthClientSignature) { 1841 if (!client || client->signature != iscsiAuthClientSignature) { 1889 if (!client || client->signature != iscsiAuthClientSignature) { 1913 if (!client || client->signature != iscsiAuthClientSignature) { 1994 client->signature = iscsiAuthClientSignature; 2046 if (!client || client->signature != iscsiAuthClientSignature) { 2071 if (!client || client->signature ! [all...] |
/illumos-gate/usr/src/uts/common/sys/dktp/ |
H A D | fdisk.h | 67 #define MBB_MAGIC 0xAA55 /* magic number for mboot.signature */ 152 ushort_t signature; member in struct:mboot
|
/illumos-gate/usr/src/lib/libslp/clib/ |
H A D | slp_ami.h | 123 struct ami_algid *signature; member in struct:ami_cert_info 141 ami_bitstring signature; member in struct:ami_cert 211 ami_algid signature; member in struct:ami_cert_list_contents 227 ami_bitstring signature; member in struct:ami_cert_list 262 ami_bitstring signature; member in struct:ami_keypkg 314 struct ami_algid *signature; member in struct:ami_crl_info 327 ami_bitstring signature; member in struct:ami_crl 347 ami_bitstring signature; member in struct:ami_extcert 497 ami_bitstring signature; member in struct:ami_certreq 520 ami_bitstring signature; member in struct:ami_signed_pubkey_and_challenge [all...] |
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 66 &SignerCert->signature.algorithmIdentifier.algorithm); 194 * public key is used for verifying a signature on 220 * public key is used with a digital signature mechanism 295 NODATA(tbs_cert->signature.algorithm) || 386 * Determine a default signature type to use based on 556 * If the signature OID was not given, check 654 * returns the the signature in output 669 KMF_DATA signature = { 0, NULL }; local 779 * For DSA, NSS returns an encoded signature. Decode the 780 * signature an 3109 KMF_DATA signature; local 3124 KMF_DATA signature; local 3169 KMF_DATA signature = { 0, NULL }; local 3260 KMF_DATA signature; local [all...] |
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | api.h | 115 crypto_data_t *signature, crypto_call_req_t *cr); 126 extern int crypto_sign_final(crypto_context_t ctx, crypto_data_t *signature, 132 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 142 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 154 extern int crypto_verify_final(crypto_context_t ctx, crypto_data_t *signature, 160 crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data,
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_rsa.c | 311 CK_BYTE * signature, 338 rc = ckm_rsa_verify(sess->hContext, in_data, in_data_len, signature, 348 CK_BYTE *signature, 382 signature, modulus_bytes, out_data, out_data_len, key_obj); 393 CK_BYTE * signature, 464 ber_data_len, signature, sig_len); 523 CK_BYTE * signature, 593 ber_data_len, signature, sig_len); 648 CK_BYTE * signature, 711 ber_data_len, signature, sig_le 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument 728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument [all...] |
H A D | mech_md5.c | 489 CK_BYTE * signature, 497 if (! sess || ! ctx || ! in_data || ! signature) { 524 if (memcmp(hmac, signature, hmac_len) != 0) { 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
|
H A D | mech_sha.c | 219 CK_BYTE *signature, 227 if (! sess || ! ctx || ! in_data || ! signature) { 252 if (memcmp(hmac, signature, hmac_len) != 0) { 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
|
H A D | sign_mgr.c | 268 // if the caller just wants the signature length, there is no reason to 335 CK_BYTE * signature, 351 ctx, signature, sig_len)); 376 // if the caller just wants the signature length, there is no reason to 332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 34 /* Release the storage for a signature */ 211 * the result in signature. 213 * Note signature should already be allocated and be large enough to 214 * hold the signature after its been encrypted. If keys is null, then 222 dh_signature_t signature /* The resulting MIC */) 237 /* Copy the digest to the signature */ 238 memcpy(signature->dh_signature_val, (void *)md5_ctx.digest, 16); 240 buf.length = signature->dh_signature_len; 241 buf.value = signature->dh_signature_val; 294 * __alloc_sig: Allocate a signature fo [all...] |
/illumos-gate/usr/src/lib/libzfs_jni/common/ |
H A D | libzfs_jni_util.c | 204 char signature[1024]; local 206 (void) snprintf(signature, sizeof (signature), "L%s;", 211 env, class, field_name, signature);
|
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/ |
H A D | iscsi_door.h | 50 uint32_t signature; member in struct:_iscsi_door_msg_hdr
|
/illumos-gate/usr/src/uts/sun4/sys/ |
H A D | cpu_sgnblk_defs.h | 44 * Build a CPU signature given a signature, state and sub-state. 50 * Definition of a CPU signature. 58 uint32_t signature; member in union:__anon9757 62 * CPU Signatures - the signature defines the entity that the CPU is executing. 63 * This entity can be the OS, OPB or the debugger. This signature consists of
|
/illumos-gate/usr/src/boot/sys/amd64/include/pc/ |
H A D | bios.h | 111 struct bios_oem_signature signature[]; member in struct:bios_oem
|
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_sign.c | 73 #define SMBSIGLEN 8 /* SMB signature length */ 74 #define SMBSIGOFF 14 /* SMB signature offset */ 84 uint32_t seqno, uchar_t *signature) 107 uint32_t sig[2]; /* MAC signature, aligned! */ 179 * Finally, store the signature. 182 if (signature) 183 bcopy(mac, signature, SMBSIGLEN); 231 * Verify reply signature. 266 * Compute the expected signature in sigbuf. 280 * Compare the computed signature wit 83 smb_compute_MAC(struct smb_vc *vcp, mblk_t *mp, uint32_t seqno, uchar_t *signature) argument [all...] |
/illumos-gate/usr/src/uts/common/fs/ufs/ |
H A D | ufs_acl.c | 106 int signature; local 370 signature = oldsp->s_signature; 380 si_cache_del(oldsp, signature); 1648 int signature; local 1681 signature = sp->s_signature; 1694 signature = sp->s_signature; 1700 si_cache_del(sp, signature); 1833 * signature - the signature for the acl for lookup in the hash table 1838 si_cache_del(si_t *sp, int signature) argument 1933 int signature = 0; local 1953 int signature = sp->s_dev; local 2101 int signature; local [all...] |
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/qlge/ |
H A D | qlge_flash.c | 52 QL_PRINT(DBG_FLASH, ("%s(%d) flash electronic signature is %x \n", 303 * checks the passed buffer for a valid pci signature and 336 if (pcih->signature[0] != PCI_HEADER0 /* '55' */ || 337 pcih->signature[1] != PCI_HEADER1 /* 'AA' */ || doff > 50) { 340 pcih->signature[0], pcih->signature[1], doff); 347 if (pcid->signature[0] != 'P' || pcid->signature[1] != 'C' || 348 pcid->signature[2] != 'I' || pcid->signature[ [all...] |
/illumos-gate/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 489 * OUT sig - must be big enough to hold the signature of data 502 KMF_DATA signature; local 535 signature.Data = (uchar_t *)sig; 536 signature.Length = *sig_len; 549 KMF_OUT_DATA_ATTR, &signature, sizeof (KMF_DATA)); 563 *sig_len = signature.Length; 572 * signature 581 const uchar_t *signature, size_t sig_len, 594 insig.Data = (uchar_t *)signature; 580 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | dst_api.c | 216 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature 225 * SIG_MODE_FINAL 4 Generate signature 226 * from signature 233 * signature 234 * The location to which the signature will be written. 235 * sig_len Length of the signature field in bytes. 245 u_char *signature, const int sig_len) 250 (in_key->dk_KEY_struct == NULL || signature == NULL)) 255 signature, sig_len)); 263 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature 243 dst_sign_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument 286 dst_verify_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument [all...] |
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | fsys_iso9660.c | 225 rr_ptr.rr->signature & 0xFF, 226 rr_ptr.rr->signature >> 8); 231 switch (rr_ptr.rr->signature)
|
/illumos-gate/usr/src/uts/sun4u/serengeti/os/ |
H A D | serengeti.c | 1219 uint32_t signature = CPU_SIG_BLD(sig, state, sub_state); local 1232 " cannot write signature 0x%x for CPU(s) or domain\n", 1233 signature); 1240 * setting of the substate of the signature. 1246 * A panic reboot is detected by a current (previous) domain signature 1247 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT. 1248 * The domain signature state SIGST_EXIT is used as the panic flow 1259 " could not check current domain signature\n"); 1265 signature = CPU_SIG_BLD(sig, state, 1275 SG_SGNBLK_CPUSIG_OFFSET(cpuid), (char *)&signature, [all...] |
/illumos-gate/usr/src/uts/sun4u/lw8/os/ |
H A D | lw8_platmod.c | 1234 uint32_t signature = CPU_SIG_BLD(sig, state, sub_state); local 1247 " cannot write signature 0x%x for CPU(s) or domain\n", 1248 signature); 1255 * setting of the substate of the signature. 1261 * A panic reboot is detected by a current (previous) domain signature 1262 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT. 1263 * The domain signature state SIGST_EXIT is used as the panic flow 1274 " could not check current domain signature\n"); 1280 signature = CPU_SIG_BLD(sig, state, 1290 SG_SGNBLK_CPUSIG_OFFSET(cpuid), (char *)&signature, [all...] |
/illumos-gate/usr/src/cmd/fwflash/plugins/vendor/ |
H A D | tavor-MELLANOX.c | 120 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) || 197 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) ||
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.c | 210 mDNSexport mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument 229 return (func->Verify(ctx, key, keylen, signature, siglen));
|