Searched refs:signature (Results 76 - 100 of 134) sorted by relevance

123456

/illumos-gate/usr/src/uts/common/io/cpqary3/
H A Dcpqary3_talk2ctlr.c437 uint8_t signature[4] = { 'C', 'I', 'S', 'S' }; local
472 * Validate the signature - should be "CISS"
479 signature[cntr]) {
/illumos-gate/usr/src/uts/common/io/bnxe/
H A Dbnxe_rx.c160 pRxPkt->signature)
772 pRxPkt->signature = pUM->rxBufSignature[LM_CHAIN_IDX_CLI(pLM, idx)];
807 /* set the rx buffer signature for this plumb */
896 /* reset the signature for this unplumb */
/illumos-gate/usr/src/uts/sun4u/starcat/os/
H A Dstarcat.c95 * The IOSRAM driver is loaded in load_platform_drivers() any cpu signature
156 /* Set the CPU signature function pointer */
797 * Update the signature(s) in the IOSRAM's domain data section.
823 new_sgn.signature = CPU_SIG_BLD(sgn, state, sub_state);
829 * Under certain conditions we don't update the signature
840 * Update the signature(s) in the IOSRAM's domain data section for all CPUs.
848 new_sgn.signature = CPU_SIG_BLD(sgn, state, sub_state);
851 * First update the domain_state signature
/illumos-gate/usr/src/lib/libdtrace_jni/common/
H A Ddtj_util.c146 /* Comparison functions, uu_compare_fn_t signature */
334 dtj_java_method_create(JNIEnv *jenv, jmethodID *jm, char *name, char *signature, argument
342 m->djm_signature = signature;
353 char *signature, uu_list_pool_t *methodpool)
355 dtj_java_method_t *m = dtj_java_method_create(jenv, jm, name, signature,
689 * signature.
730 "%s.%s signature: %s", c->djc_name,
352 dtj_java_static_method_create(JNIEnv *jenv, jmethodID *jm, char *name, char *signature, uu_list_pool_t *methodpool) argument
/illumos-gate/usr/src/grub/grub-0.97/netboot/
H A Dpci.h246 /* PCI signature: "PCI " */
249 /* PCI service signature: "$PCI" */
254 unsigned long signature; /* _32_ */ member in struct:bios32::__anon2097
/illumos-gate/usr/src/cmd/fstyp/
H A Dfstyp.c327 if (ltohs(mboot->signature) != MBB_MAGIC) {
/illumos-gate/usr/src/uts/common/io/i40e/core/
H A Di40e_lan_hmc.c116 hw->hmc.signature = I40E_HMC_INFO_SIGNATURE;
331 if (I40E_HMC_INFO_SIGNATURE != info->hmc_info->signature) {
333 DEBUGOUT("i40e_create_lan_hmc_object: bad signature\n");
572 if (I40E_HMC_INFO_SIGNATURE != info->hmc_info->signature) {
574 DEBUGOUT("i40e_delete_hmc_object: bad hmc_info->signature\n");
1258 if (I40E_HMC_INFO_SIGNATURE != hmc_info->signature) {
1260 DEBUGOUT("i40e_hmc_get_object_va: bad hmc_info->signature\n");
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c436 KMF_DATA *signature)
528 (CK_BYTE *)signature->Data,
529 (CK_ULONG)signature->Length);
432 PKCS_VerifyData(KMF_HANDLE_T handle, KMF_ALGORITHM_INDEX AlgorithmId, KMF_X509_SPKI *keyp, KMF_DATA *data, KMF_DATA *signature) argument
H A Dgeneralop.c1179 kmf_free_algoid(&csr->signature.algorithmIdentifier);
1180 kmf_free_data(&csr->signature.encrypted);
1216 kmf_free_algoid(&tbscert->signature);
1244 kmf_free_algoid(&certptr->signature.algorithmIdentifier);
1245 kmf_free_data(&certptr->signature.encrypted);
/illumos-gate/usr/src/lib/libefi/common/
H A Drdwr_efi.c280 "Bad EFI signature: 0x%llx != 0x%llx\n",
586 * Preserve any boot code and disk signature if the first block is
596 mb.signature = LE_16(MBB_MAGIC);
599 if (mb.signature != LE_16(MBB_MAGIC)) {
601 mb.signature = LE_16(MBB_MAGIC);
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/qlge/
H A Dqlge_dbg.c1373 iltds_ptr->iltds_table_header.signature =
1594 ql_dump_image_header_ptr->signature = DUMP_IMAGE_HEADER_SIGNATURE;
1604 (ql_dump_image_header_ptr->signature
1631 ql_dump_image_header_ptr->signature =
1647 (ql_dump_image_header_ptr->signature
1689 /* add QTSB signature */
1690 ql_dump_header_ptr->signature = DUMP_DESCRIPTION_HEADER_SIGNATURE;
1735 ql_dump_footer_ptr->signature = DUMP_DESCRIPTION_FOOTER_SIGNATURE;
/illumos-gate/usr/src/uts/common/crypto/io/
H A Ddprov.c2686 crypto_data_t *signature, crypto_req_handle_t req)
2699 NULL, NULL, data, signature, ctx, 0, KM_NOSLEEP);
2731 dprov_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, argument
2745 NULL, NULL, NULL, signature, ctx, 0, KM_NOSLEEP);
2756 crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature,
2779 mechanism, key, data, signature, NULL, session_id, KM_SLEEP);
2817 crypto_data_t *signature, crypto_req_handle_t req)
2830 NULL, NULL, data, signature, ctx, 0, KM_NOSLEEP);
2841 crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature,
2858 mechanism, key, data, signature, NUL
2685 dprov_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument
2754 dprov_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2816 dprov_sign_recover(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument
2839 dprov_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
2904 dprov_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument
2951 dprov_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument
2974 dprov_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
3037 dprov_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument
3061 dprov_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *signature, crypto_data_t *data, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument
5092 dprov_sign_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument
5119 dprov_verify_submit_req(dprov_req_type_t req_type, dprov_state_t *softc, crypto_req_handle_t req, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_ctx_t *ctx, crypto_session_id_t sid, int kmflag) argument
[all...]
/illumos-gate/usr/src/cmd/fwflash/plugins/transport/common/
H A Dtavor.c1448 "tavor: CISCO signature found in HCA's VSD, copying to "
1488 "tavor: CISCO signature not found in HCA's VSD\n");
1544 * Write zeros to the on-HCA signature and CRC16 fields of sector.
1556 /* signature first, then CRC16 */
1713 "of xPS' signature at offset from IS 0x%04x: %s\n"),
1745 /* zero the HCA's PPS signature and CRC */
1749 "tavor: Unable zero HCA's %s signature "
1804 /* invalidate the xps signature and fia fields */
1805 newxps->signature = 0xffffffff;
1839 newxps->signature
[all...]
/illumos-gate/usr/src/uts/i86pc/os/
H A Dfakebop.c2033 find_fw_table(char *signature) argument
2044 if (strlen(signature) != ACPI_NAME_SIZE)
2101 * Scan the table headers looking for a signature match
2111 if (strncmp(tp->Signature, signature, ACPI_NAME_SIZE) == 0) {
/illumos-gate/usr/src/uts/common/io/bnxe/577xx/hsi/mcp/
H A Dnvm_map.h645 u16_t signature; member in struct:iscsi_flash_meta_data
/illumos-gate/usr/src/uts/common/sys/scsi/adapters/pmcs/
H A Dpmcs_def.h310 uint32_t signature; member in struct:__anon8953
H A Dpmcs_iomb.h232 uint32_t signature; /* DWORD 4 */ member in struct:pmcs_set_nvmd_cmd_s
/illumos-gate/usr/src/uts/common/io/e1000api/
H A De1000_manage.c166 /* If either the checksums or signature don't match, then
170 if ((hdr_csum != csum) || (hdr->signature != E1000_IAMT_SIGNATURE)) {
/illumos-gate/usr/src/uts/common/io/sata/adapters/si3124/
H A Dsi3124.c183 * while reading the device signature. [Such a big timeout values
184 * for device signature were found needed during cold reboots
2166 * Soft-reset the port to find the signature of the device connected to
2177 uint32_t slot_status, signature; local
2251 /* Read device signature from command slot. */
2252 signature = ddi_get32(si_ctlp->sictl_port_acc_handle,
2254 signature <<= 8;
2255 signature |= (0xff & ddi_get32(si_ctlp->sictl_port_acc_handle,
2259 SIDBG_P(SIDBG_INIT, si_portp, "Device signature: 0x%x", signature);
[all...]
/illumos-gate/usr/src/uts/common/sys/fibre-channel/fca/qlc/
H A Dexioct.h914 UINT8 signature[2]; member in struct:_PCI_HEADER_T
924 UINT8 signature[4]; member in struct:_PCI_DATA_T
/illumos-gate/usr/src/uts/common/io/fibre-channel/fca/qlc/
H A Dql_xioctl.c557 * val_sig: Pointer to a function to validate the ioctl signature.
562 * EINVAL: Invalid version, signature.
591 * Check signature and the version.
598 EL(ha, "failed, signature\n");
620 * Validate the signature string for an external ioctl call.
623 * sg: Pointer to EXT_IOCTL signature to validate.
636 * Check signature.
638 * If signature is not valid then neither is the rest of
6763 * checks the passed buffer for a valid pci signature and
6845 fwh.signature[
[all...]
/illumos-gate/usr/src/uts/intel/io/acpica/
H A Dosl.c265 char signature[5]; local
273 acpica_strncpy(signature, ExistingTable->Signature, 4);
279 (void) strcat(acpi_table_loc, signature); /* for example, DSDT */
/illumos-gate/usr/src/lib/libdiskmgt/common/
H A Dpartition.c595 if (les(bootblk.signature) != MBB_MAGIC) {
/illumos-gate/usr/src/uts/common/io/nge/
H A Dnge.h427 uint32_t signature; /* buffer signature */ member in struct:dma_area
500 uint32_t buf_sign; /* buffer ring signature */
/illumos-gate/usr/src/uts/intel/io/scsi/adapters/arcmsr/
H A Darcmsr.h370 uint32_t signature; member in struct:FIRMWARE_INFO
471 * byte 0 : 0xaa <-- signature
472 * byte 1 : 0x55 <-- signature
483 /* signature of set and get firmware config */

Completed in 247 milliseconds

123456