/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 572 KMF_X509_ALGORITHM_IDENTIFIER signature; member in struct:__anon3457 584 * This structure contains a cryptographic digital signature. 595 * values with the signature covering those values. 600 KMF_X509_SIGNATURE signature; member in struct:__anon3459 603 #define CERT_ALG_OID(c) &c->certificate.signature.algorithm 604 #define CERT_SIG_OID(c) &c->signature.algorithmIdentifier.algorithm 625 KMF_X509_SIGNATURE signature; member in struct:__anon3461
|
/illumos-gate/usr/src/cmd/fs.d/pcfs/fsck/ |
H A D | pcfs_common.c | 494 if (ltohs(mb.signature) != BOOTSECSIG) { 496 gettext("Bad signature on master boot record (%x)\n"), 497 ltohs(mb.signature)); 598 if (ltohs(extmboot.signature) != MBB_MAGIC) { 600 gettext("Bad signature on "
|
H A D | bpb.c | 193 if (ltohs(ubpb.mb.signature) != BOOTSECSIG) { 196 gettext("Bad signature on BPB. Giving up.\n"));
|
/illumos-gate/usr/src/boot/sys/boot/i386/pmbr/ |
H A D | pmbr.s | 43 .set DISKSIG,440 # Disk signature offset 172 # signature, partition table 4 entries and signature.
|
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | iso9660.h | 148 u_int16_t signature; member in struct:rock_ridge
|
/illumos-gate/usr/src/cmd/fwflash/plugins/hdrs/ |
H A D | tavor_ib.h | 76 uint32_t signature; /* firmware signature */ member in struct:mlx_xps
|
/illumos-gate/usr/src/uts/common/io/scsi/adapters/iscsi/ |
H A D | iscsiAuthClient.h | 243 unsigned long signature; member in struct:iscsiAuthClient_t
|
/illumos-gate/usr/src/uts/common/io/usb/scsa2usb/ |
H A D | usb_ms_bulkonly.c | 166 * - check length equals 13, signature, and matching tag 570 uint_t signature, tag, status; local 602 signature = SCSA2USB_MK_32BIT(csw.csw_dCSWSignature3, 613 signature, status, tag, residue); 616 if ((signature != CSW_SIGNATURE) || (tag != cmd->cmd_tag) ||
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | iscsi_authclient.h | 244 unsigned long signature; member in struct:iscsiAuthClient_t
|
/illumos-gate/usr/src/uts/sun4u/blade/os/ |
H A D | blade.c | 79 /* Set the CPU signature function pointer */ 268 * Send an updated CPU signature to the BSC. 277 sc.sig_info.signature = CPU_SIG_BLD(sig, state, sub_state);
|
/illumos-gate/usr/src/uts/common/io/i40e/core/ |
H A D | i40e_hmc.h | 104 u32 signature; member in struct:i40e_hmc_info
|
/illumos-gate/usr/src/uts/common/sys/fibre-channel/fca/qlc/ |
H A D | ql_xioctl.h | 254 uint8_t signature[2]; member in struct:__anon7792 261 uint8_t signature[4]; member in struct:__anon7793
|
/illumos-gate/usr/src/uts/common/crypto/io/ |
H A D | dca.c | 4175 crypto_data_t *signature, crypto_req_handle_t req) 4190 error = dca_rsastart(ctx, data, signature, req, DCA_RSA_SIGN); 4193 error = dca_dsa_sign(ctx, data, signature, req); 4230 dca_sign_final(crypto_ctx_t *ctx, crypto_data_t *signature, argument 4253 crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, 4269 data, signature, KM_SLEEP, req, DCA_RSA_SIGN); 4273 data, signature, KM_SLEEP, req, DCA_DSA_SIGN); 4324 crypto_data_t *signature, crypto_req_handle_t req) 4339 error = dca_rsastart(ctx, data, signature, req, DCA_RSA_SIGNR); 4355 crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, 4174 dca_sign(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 4251 dca_sign_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4323 dca_sign_recover(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 4353 dca_sign_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4429 dca_verify(crypto_ctx_t *ctx, crypto_data_t *data, crypto_data_t *signature, crypto_req_handle_t req) argument 4485 dca_verify_final(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_req_handle_t req) argument 4506 dca_verify_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument 4577 dca_verify_recover(crypto_ctx_t *ctx, crypto_data_t *signature, crypto_data_t *data, crypto_req_handle_t req) argument 4606 dca_verify_recover_atomic(crypto_provider_handle_t provider, crypto_session_id_t session_id, crypto_mechanism_t *mechanism, crypto_key_t *key, crypto_data_t *data, crypto_data_t *signature, crypto_spi_ctx_template_t ctx_template, crypto_req_handle_t req) argument [all...] |
/illumos-gate/usr/src/grub/grub-0.97/netboot/ |
H A D | sis900.c | 167 u16 signature; local 171 signature = (u16) sis900_read_eeprom( EEPROMSignature); 172 if (signature == 0xffff || signature == 0x0000) { 173 printf ("sis900_probe: Error EERPOM read %hX\n", signature); 195 * The signature field in SiS962 or SiS963 spec is meaningless.
|
H A D | undi.c | 210 if ( undi.pnp_bios->signature == PNP_BIOS_SIGNATURE ) { 281 if ( undi.rom->signature == ROM_SIGNATURE ) { 292 if ( pcir_header->signature != PCIR_SIGNATURE ) { 293 DBG ( "invalid PCI signature\n..." ); 311 if ( pnp_header->signature != PNP_SIGNATURE ) { 312 DBG ( "invalid $PnP signature\n..." ); 345 if ( undi.undi_rom_id->signature != UNDI_SIGNATURE ) { 346 DBG ( "Invalid UNDI signature\n" ); 492 DBG ( "invalid signature\n" ); 1214 DBG ("invalid !PXE signature a [all...] |
/illumos-gate/usr/src/uts/common/io/ntxn/ |
H A D | unm_nic_ctx.c | 177 u32 signature = 0; local 180 signature = NX_CDRP_SIGNATURE_MAKE(pci_fn, version); 187 HOST_TO_LE_32(signature));
|
/illumos-gate/usr/src/boot/lib/libstand/ |
H A D | cd9660.c | 59 u_char signature [ISODCL ( 5, 6)]; member in struct:__anon1 213 if (sp->signature[0] != 0xbe || sp->signature[1] != 0xef)
|
/illumos-gate/usr/src/cmd/iscsid/ |
H A D | iscsid.c | 368 err_ind.signature = ISCSI_DOOR_REQ_SIGNATURE; 390 } else if (req->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) {
|
/illumos-gate/usr/src/uts/common/sys/fibre-channel/fca/qlge/ |
H A D | qlge_hw.h | 1413 uint32_t signature; /* QTSB */ member in struct:ql_dump_header 1425 uint32_t signature; /* QDMP */ member in struct:ql_dump_image_header 1445 uint32_t signature; /* QTSE */ member in struct:ql_dump_footer 2327 uint8_t signature[2]; member in struct:__anon7820 2334 uint8_t signature[4]; member in struct:__anon7821 2366 uint32_t signature; member in struct:ql_fltds 2376 uint32_t signature; member in struct:ql_iltds_header 2477 uint32_t signature; member in struct:ql_nic_config
|
/illumos-gate/usr/src/uts/common/io/nge/ |
H A D | nge_rx.c | 85 if (bufp->signature != brp->buf_sign) { 114 if (bufp->signature != brp->buf_sign)
|
/illumos-gate/usr/src/cmd/hal/utils/ |
H A D | fsutils.c | 133 if (ltohs(mboot->signature) != MBB_MAGIC) {
|
/illumos-gate/usr/src/boot/sys/i386/include/pc/ |
H A D | bios.h | 281 struct bios_oem_signature signature[]; member in struct:bios_oem
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | certgetsetop.c | 1914 &CertData->certificate.signature.algorithm, 1916 (void) copy_data(&CertData->certificate.signature.parameters, 1921 &CertData->signature.algorithmIdentifier.algorithm, 1922 &CertData->certificate.signature.algorithm); 1924 &CertData->signature.algorithmIdentifier.parameters, 1925 &CertData->certificate.signature.parameters);
|
/illumos-gate/usr/src/common/net/wanboot/ |
H A D | boot_http.c | 90 uint_t signature; /* Cookie indicating this is a handle */ member in struct:http_conn_t 316 c_id->signature = HTTP_CONN_INFO; 1393 c_id->signature = 0; 1458 if (c_id == NULL || c_id->signature != HTTP_CONN_INFO) { 1745 if (c_id == NULL || c_id->signature != HTTP_CONN_INFO) 2829 if (c_id == NULL || c_id->signature != HTTP_CONN_INFO) {
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | signcsr.c | 159 signedCert->certificate.signature = 160 csrdata->signature.algorithmIdentifier; 229 /* Set the signature OID value so KMF knows how to generate the sig */ 281 /* verify the signature first */ 289 cryptoerror(LOG_STDERR, gettext("CSR signature " 391 /* verify the signature first */ 398 cryptoerror(LOG_STDERR, gettext("CSR signature "
|