Searched refs:signature (Results 26 - 50 of 134) sorted by relevance

123456

/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/
H A Discsi_thread.h59 uint32_t signature; member in struct:_iscsi_thread
H A DiscsiAuthClient.c1517 if (!client || client->signature != iscsiAuthClientSignature) {
1556 if (!client || client->signature != iscsiAuthClientSignature) {
1719 if (!client || client->signature != iscsiAuthClientSignature) {
1801 if (!client || client->signature != iscsiAuthClientSignature) {
1841 if (!client || client->signature != iscsiAuthClientSignature) {
1889 if (!client || client->signature != iscsiAuthClientSignature) {
1913 if (!client || client->signature != iscsiAuthClientSignature) {
1994 client->signature = iscsiAuthClientSignature;
2046 if (!client || client->signature != iscsiAuthClientSignature) {
2071 if (!client || client->signature !
[all...]
/illumos-gate/usr/src/uts/common/sys/dktp/
H A Dfdisk.h67 #define MBB_MAGIC 0xAA55 /* magic number for mboot.signature */
152 ushort_t signature; member in struct:mboot
/illumos-gate/usr/src/lib/libslp/clib/
H A Dslp_ami.h123 struct ami_algid *signature; member in struct:ami_cert_info
141 ami_bitstring signature; member in struct:ami_cert
211 ami_algid signature; member in struct:ami_cert_list_contents
227 ami_bitstring signature; member in struct:ami_cert_list
262 ami_bitstring signature; member in struct:ami_keypkg
314 struct ami_algid *signature; member in struct:ami_crl_info
327 ami_bitstring signature; member in struct:ami_crl
347 ami_bitstring signature; member in struct:ami_extcert
497 ami_bitstring signature; member in struct:ami_certreq
520 ami_bitstring signature; member in struct:ami_signed_pubkey_and_challenge
[all...]
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dcertop.c66 &SignerCert->signature.algorithmIdentifier.algorithm);
194 * public key is used for verifying a signature on
220 * public key is used with a digital signature mechanism
295 NODATA(tbs_cert->signature.algorithm) ||
386 * Determine a default signature type to use based on
556 * If the signature OID was not given, check
654 * returns the the signature in output
669 KMF_DATA signature = { 0, NULL }; local
779 * For DSA, NSS returns an encoded signature. Decode the
780 * signature an
3109 KMF_DATA signature; local
3124 KMF_DATA signature; local
3169 KMF_DATA signature = { 0, NULL }; local
3260 KMF_DATA signature; local
[all...]
/illumos-gate/usr/src/uts/common/sys/crypto/
H A Dapi.h115 crypto_data_t *signature, crypto_call_req_t *cr);
126 extern int crypto_sign_final(crypto_context_t ctx, crypto_data_t *signature,
132 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature,
142 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature,
154 extern int crypto_verify_final(crypto_context_t ctx, crypto_data_t *signature,
160 crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data,
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dmech_rsa.c311 CK_BYTE * signature,
338 rc = ckm_rsa_verify(sess->hContext, in_data, in_data_len, signature,
348 CK_BYTE *signature,
382 signature, modulus_bytes, out_data, out_data_len, key_obj);
393 CK_BYTE * signature,
464 ber_data_len, signature, sig_len);
523 CK_BYTE * signature,
593 ber_data_len, signature, sig_len);
648 CK_BYTE * signature,
711 ber_data_len, signature, sig_le
307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
645 rsa_hash_pkcs_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
728 rsa_hash_pkcs_verify_final(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len) argument
[all...]
H A Dmech_md5.c489 CK_BYTE * signature,
497 if (! sess || ! ctx || ! in_data || ! signature) {
524 if (memcmp(hmac, signature, hmac_len) != 0) {
485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
H A Dmech_sha.c219 CK_BYTE *signature,
227 if (! sess || ! ctx || ! in_data || ! signature) {
252 if (memcmp(hmac, signature, hmac_len) != 0) {
215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
H A Dsign_mgr.c268 // if the caller just wants the signature length, there is no reason to
335 CK_BYTE * signature,
351 ctx, signature, sig_len));
376 // if the caller just wants the signature length, there is no reason to
332 sign_mgr_sign_final(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG * sig_len) argument
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dcrypto.c34 /* Release the storage for a signature */
211 * the result in signature.
213 * Note signature should already be allocated and be large enough to
214 * hold the signature after its been encrypted. If keys is null, then
222 dh_signature_t signature /* The resulting MIC */)
237 /* Copy the digest to the signature */
238 memcpy(signature->dh_signature_val, (void *)md5_ctx.digest, 16);
240 buf.length = signature->dh_signature_len;
241 buf.value = signature->dh_signature_val;
294 * __alloc_sig: Allocate a signature fo
[all...]
/illumos-gate/usr/src/lib/libzfs_jni/common/
H A Dlibzfs_jni_util.c204 char signature[1024]; local
206 (void) snprintf(signature, sizeof (signature), "L%s;",
211 env, class, field_name, signature);
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/
H A Discsi_door.h50 uint32_t signature; member in struct:_iscsi_door_msg_hdr
/illumos-gate/usr/src/uts/sun4/sys/
H A Dcpu_sgnblk_defs.h44 * Build a CPU signature given a signature, state and sub-state.
50 * Definition of a CPU signature.
58 uint32_t signature; member in union:__anon9757
62 * CPU Signatures - the signature defines the entity that the CPU is executing.
63 * This entity can be the OS, OPB or the debugger. This signature consists of
/illumos-gate/usr/src/boot/sys/amd64/include/pc/
H A Dbios.h111 struct bios_oem_signature signature[]; member in struct:bios_oem
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/
H A Dsmb_sign.c73 #define SMBSIGLEN 8 /* SMB signature length */
74 #define SMBSIGOFF 14 /* SMB signature offset */
84 uint32_t seqno, uchar_t *signature)
107 uint32_t sig[2]; /* MAC signature, aligned! */
179 * Finally, store the signature.
182 if (signature)
183 bcopy(mac, signature, SMBSIGLEN);
231 * Verify reply signature.
266 * Compute the expected signature in sigbuf.
280 * Compare the computed signature wit
83 smb_compute_MAC(struct smb_vc *vcp, mblk_t *mp, uint32_t seqno, uchar_t *signature) argument
[all...]
/illumos-gate/usr/src/uts/common/fs/ufs/
H A Dufs_acl.c106 int signature; local
370 signature = oldsp->s_signature;
380 si_cache_del(oldsp, signature);
1648 int signature; local
1681 signature = sp->s_signature;
1694 signature = sp->s_signature;
1700 si_cache_del(sp, signature);
1833 * signature - the signature for the acl for lookup in the hash table
1838 si_cache_del(si_t *sp, int signature) argument
1933 int signature = 0; local
1953 int signature = sp->s_dev; local
2101 int signature; local
[all...]
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/qlge/
H A Dqlge_flash.c52 QL_PRINT(DBG_FLASH, ("%s(%d) flash electronic signature is %x \n",
303 * checks the passed buffer for a valid pci signature and
336 if (pcih->signature[0] != PCI_HEADER0 /* '55' */ ||
337 pcih->signature[1] != PCI_HEADER1 /* 'AA' */ || doff > 50) {
340 pcih->signature[0], pcih->signature[1], doff);
347 if (pcid->signature[0] != 'P' || pcid->signature[1] != 'C' ||
348 pcid->signature[2] != 'I' || pcid->signature[
[all...]
/illumos-gate/usr/src/lib/libelfsign/common/
H A Delfcertlib.c489 * OUT sig - must be big enough to hold the signature of data
502 KMF_DATA signature; local
535 signature.Data = (uchar_t *)sig;
536 signature.Length = *sig_len;
549 KMF_OUT_DATA_ATTR, &signature, sizeof (KMF_DATA));
563 *sig_len = signature.Length;
572 * signature
581 const uchar_t *signature, size_t sig_len,
594 insig.Data = (uchar_t *)signature;
580 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
/illumos-gate/usr/src/lib/libresolv2/common/dst/
H A Ddst_api.c216 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature
225 * SIG_MODE_FINAL 4 Generate signature
226 * from signature
233 * signature
234 * The location to which the signature will be written.
235 * sig_len Length of the signature field in bytes.
245 u_char *signature, const int sig_len)
250 (in_key->dk_KEY_struct == NULL || signature == NULL))
255 signature, sig_len));
263 * Then data is hashed (SIG_MODE_UPDATE). Finally the signature
243 dst_sign_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, u_char *signature, const int sig_len) argument
286 dst_verify_data(const int mode, DST_KEY *in_key, void **context, const u_char *data, const int len, const u_char *signature, const int sig_len) argument
[all...]
/illumos-gate/usr/src/grub/grub-0.97/stage2/
H A Dfsys_iso9660.c225 rr_ptr.rr->signature & 0xFF,
226 rr_ptr.rr->signature >> 8);
231 switch (rr_ptr.rr->signature)
/illumos-gate/usr/src/uts/sun4u/serengeti/os/
H A Dserengeti.c1219 uint32_t signature = CPU_SIG_BLD(sig, state, sub_state); local
1232 " cannot write signature 0x%x for CPU(s) or domain\n",
1233 signature);
1240 * setting of the substate of the signature.
1246 * A panic reboot is detected by a current (previous) domain signature
1247 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT.
1248 * The domain signature state SIGST_EXIT is used as the panic flow
1259 " could not check current domain signature\n");
1265 signature = CPU_SIG_BLD(sig, state,
1275 SG_SGNBLK_CPUSIG_OFFSET(cpuid), (char *)&signature,
[all...]
/illumos-gate/usr/src/uts/sun4u/lw8/os/
H A Dlw8_platmod.c1234 uint32_t signature = CPU_SIG_BLD(sig, state, sub_state); local
1247 " cannot write signature 0x%x for CPU(s) or domain\n",
1248 signature);
1255 * setting of the substate of the signature.
1261 * A panic reboot is detected by a current (previous) domain signature
1262 * state of SIGST_EXIT, and a new signature substate of SIGSUBST_REBOOT.
1263 * The domain signature state SIGST_EXIT is used as the panic flow
1274 " could not check current domain signature\n");
1280 signature = CPU_SIG_BLD(sig, state,
1290 SG_SGNBLK_CPUSIG_OFFSET(cpuid), (char *)&signature,
[all...]
/illumos-gate/usr/src/cmd/fwflash/plugins/vendor/
H A Dtavor-MELLANOX.c120 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) ||
197 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) ||
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DCryptoAlg.c210 mDNSexport mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument
229 return (func->Verify(ctx, key, keylen, signature, siglen));

Completed in 1080 milliseconds

123456