/illumos-gate/usr/src/uts/common/io/cpqary3/ |
H A D | cpqary3_talk2ctlr.c | 437 uint8_t signature[4] = { 'C', 'I', 'S', 'S' }; local 472 * Validate the signature - should be "CISS" 479 signature[cntr]) {
|
/illumos-gate/usr/src/uts/common/io/bnxe/ |
H A D | bnxe_rx.c | 160 pRxPkt->signature) 772 pRxPkt->signature = pUM->rxBufSignature[LM_CHAIN_IDX_CLI(pLM, idx)]; 807 /* set the rx buffer signature for this plumb */ 896 /* reset the signature for this unplumb */
|
/illumos-gate/usr/src/uts/sun4u/starcat/os/ |
H A D | starcat.c | 95 * The IOSRAM driver is loaded in load_platform_drivers() any cpu signature 156 /* Set the CPU signature function pointer */ 797 * Update the signature(s) in the IOSRAM's domain data section. 823 new_sgn.signature = CPU_SIG_BLD(sgn, state, sub_state); 829 * Under certain conditions we don't update the signature 840 * Update the signature(s) in the IOSRAM's domain data section for all CPUs. 848 new_sgn.signature = CPU_SIG_BLD(sgn, state, sub_state); 851 * First update the domain_state signature
|
/illumos-gate/usr/src/lib/libdtrace_jni/common/ |
H A D | dtj_util.c | 146 /* Comparison functions, uu_compare_fn_t signature */ 334 dtj_java_method_create(JNIEnv *jenv, jmethodID *jm, char *name, char *signature, argument 342 m->djm_signature = signature; 353 char *signature, uu_list_pool_t *methodpool) 355 dtj_java_method_t *m = dtj_java_method_create(jenv, jm, name, signature, 689 * signature. 730 "%s.%s signature: %s", c->djc_name, 352 dtj_java_static_method_create(JNIEnv *jenv, jmethodID *jm, char *name, char *signature, uu_list_pool_t *methodpool) argument
|
/illumos-gate/usr/src/grub/grub-0.97/netboot/ |
H A D | pci.h | 246 /* PCI signature: "PCI " */ 249 /* PCI service signature: "$PCI" */ 254 unsigned long signature; /* _32_ */ member in struct:bios32::__anon2097
|
/illumos-gate/usr/src/cmd/fstyp/ |
H A D | fstyp.c | 327 if (ltohs(mboot->signature) != MBB_MAGIC) {
|
/illumos-gate/usr/src/uts/common/io/i40e/core/ |
H A D | i40e_lan_hmc.c | 116 hw->hmc.signature = I40E_HMC_INFO_SIGNATURE; 331 if (I40E_HMC_INFO_SIGNATURE != info->hmc_info->signature) { 333 DEBUGOUT("i40e_create_lan_hmc_object: bad signature\n"); 572 if (I40E_HMC_INFO_SIGNATURE != info->hmc_info->signature) { 574 DEBUGOUT("i40e_delete_hmc_object: bad hmc_info->signature\n"); 1258 if (I40E_HMC_INFO_SIGNATURE != hmc_info->signature) { 1260 DEBUGOUT("i40e_hmc_get_object_va: bad hmc_info->signature\n");
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 436 KMF_DATA *signature) 528 (CK_BYTE *)signature->Data, 529 (CK_ULONG)signature->Length); 432 PKCS_VerifyData(KMF_HANDLE_T handle, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *data, KMF_DATA *signature) argument
|
H A D | generalop.c | 1179 kmf_free_algoid(&csr->signature.algorithmIdentifier); 1180 kmf_free_data(&csr->signature.encrypted); 1216 kmf_free_algoid(&tbscert->signature); 1244 kmf_free_algoid(&certptr->signature.algorithmIdentifier); 1245 kmf_free_data(&certptr->signature.encrypted);
|
/illumos-gate/usr/src/lib/libefi/common/ |
H A D | rdwr_efi.c | 280 "Bad EFI signature: 0x%llx != 0x%llx\n", 586 * Preserve any boot code and disk signature if the first block is 596 mb.signature = LE_16(MBB_MAGIC); 599 if (mb.signature != LE_16(MBB_MAGIC)) { 601 mb.signature = LE_16(MBB_MAGIC);
|
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/qlge/ |
H A D | qlge_dbg.c | 1373 iltds_ptr->iltds_table_header.signature = 1594 ql_dump_image_header_ptr->signature = DUMP_IMAGE_HEADER_SIGNATURE; 1604 (ql_dump_image_header_ptr->signature 1631 ql_dump_image_header_ptr->signature = 1647 (ql_dump_image_header_ptr->signature 1689 /* add QTSB signature */ 1690 ql_dump_header_ptr->signature = DUMP_DESCRIPTION_HEADER_SIGNATURE; 1735 ql_dump_footer_ptr->signature = DUMP_DESCRIPTION_FOOTER_SIGNATURE;
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dprov.c | 2686 crypto_data_t *signature, crypto_req_handle_t req) 2699 NULL, NULL, data, signature, ctx, 0, KM_NOSLEEP); 2731 dprov_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, argument 2745 NULL, NULL, NULL, signature, ctx, 0, KM_NOSLEEP); 2756 crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, 2779 mechanism, key, data, signature, NULL, session_id, KM_SLEEP); 2817 crypto_data_t *signature, crypto_req_handle_t req) 2830 NULL, NULL, data, signature, ctx, 0, KM_NOSLEEP); 2841 crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, 2858 mechanism, key, data, signature, NUL 2685 dprov_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 2754 dprov_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2816 dprov_sign_recover(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 2839 dprov_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 2904 dprov_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 2951 dprov_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 2974 dprov_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 3037 dprov_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument 3061 dprov_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 5092 dprov_sign_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument 5119 dprov_verify_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument [all...] |
/illumos-gate/usr/src/cmd/fwflash/plugins/transport/common/ |
H A D | tavor.c | 1448 "tavor: CISCO signature found in HCA's VSD, copying to " 1488 "tavor: CISCO signature not found in HCA's VSD\n"); 1544 * Write zeros to the on-HCA signature and CRC16 fields of sector. 1556 /* signature first, then CRC16 */ 1713 "of xPS' signature at offset from IS 0x%04x: %s\n"), 1745 /* zero the HCA's PPS signature and CRC */ 1749 "tavor: Unable zero HCA's %s signature " 1804 /* invalidate the xps signature and fia fields */ 1805 newxps->signature = 0xffffffff; 1839 newxps->signature [all...] |
/illumos-gate/usr/src/uts/i86pc/os/ |
H A D | fakebop.c | 2033 find_fw_table(char *signature) argument 2044 if (strlen(signature) != ACPI_NAME_SIZE) 2101 * Scan the table headers looking for a signature match 2111 if (strncmp(tp->Signature, signature, ACPI_NAME_SIZE) == 0) {
|
/illumos-gate/usr/src/uts/common/io/bnxe/577xx/hsi/mcp/ |
H A D | nvm_map.h | 645 u16_t signature; member in struct:iscsi_flash_meta_data
|
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/pmcs/ |
H A D | pmcs_def.h | 310 uint32_t signature; member in struct:__anon8953
|
H A D | pmcs_iomb.h | 232 uint32_t signature; /* DWORD 4 */ member in struct:pmcs_set_nvmd_cmd_s
|
/illumos-gate/usr/src/uts/common/io/e1000api/ |
H A D | e1000_manage.c | 166 /* If either the checksums or signature don't match, then 170 if ((hdr_csum != csum) || (hdr->signature != E1000_IAMT_SIGNATURE)) {
|
/illumos-gate/usr/src/uts/common/io/sata/adapters/si3124/ |
H A D | si3124.c | 183 * while reading the device signature. [Such a big timeout values 184 * for device signature were found needed during cold reboots 2166 * Soft-reset the port to find the signature of the device connected to 2177 uint32_t slot_status, signature; local 2251 /* Read device signature from command slot. */ 2252 signature = ddi_get32(si_ctlp->sictl_port_acc_handle, 2254 signature <<= 8; 2255 signature |= (0xff & ddi_get32(si_ctlp->sictl_port_acc_handle, 2259 SIDBG_P(SIDBG_INIT, si_portp, "Device signature: 0x%x", signature); [all...] |
/illumos-gate/usr/src/uts/common/sys/fibre-channel/fca/qlc/ |
H A D | exioct.h | 914 UINT8 signature[2]; member in struct:_PCI_HEADER_T 924 UINT8 signature[4]; member in struct:_PCI_DATA_T
|
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/qlc/ |
H A D | ql_xioctl.c | 557 * val_sig: Pointer to a function to validate the ioctl signature. 562 * EINVAL: Invalid version, signature. 591 * Check signature and the version. 598 EL(ha, "failed, signature\n"); 620 * Validate the signature string for an external ioctl call. 623 * sg: Pointer to EXT_IOCTL signature to validate. 636 * Check signature. 638 * If signature is not valid then neither is the rest of 6763 * checks the passed buffer for a valid pci signature and 6845 fwh.signature[ [all...] |
/illumos-gate/usr/src/uts/intel/io/acpica/ |
H A D | osl.c | 265 char signature[5]; local 273 acpica_strncpy(signature, ExistingTable->Signature, 4); 279 (void) strcat(acpi_table_loc, signature); /* for example, DSDT */
|
/illumos-gate/usr/src/lib/libdiskmgt/common/ |
H A D | partition.c | 595 if (les(bootblk.signature) != MBB_MAGIC) {
|
/illumos-gate/usr/src/uts/common/io/nge/ |
H A D | nge.h | 427 uint32_t signature; /* buffer signature */ member in struct:dma_area 500 uint32_t buf_sign; /* buffer ring signature */
|
/illumos-gate/usr/src/uts/intel/io/scsi/adapters/arcmsr/ |
H A D | arcmsr.h | 370 uint32_t signature; member in struct:FIRMWARE_INFO 471 * byte 0 : 0xaa <-- signature 472 * byte 1 : 0x55 <-- signature 483 /* signature of set and get firmware config */
|