/illumos-gate/usr/src/cmd/fwflash/plugins/vendor/ |
H A D | sd-GENERIC.c | 49 extern struct vrfyplugin *verifier; 62 * All that we need to do here is set the various verifier fields 70 if (verifier->imgsize > MAXIMGSIZE) { 72 gettext("\nsd-GENERIC firmware image verifier: " 75 verifier->imgfile, MAXIMGSIZE); 80 "sd-GENERIC verifier for device\n" 86 verifier->flashbuf = 0;
|
H A D | tavor-MELLANOX.c | 53 extern struct vrfyplugin *verifier; 82 * NOTE that since verifier->fwimage is an array of ints, 86 firmware = verifier->fwimage; 101 gettext("%s firmware image verifier: " 102 "Invariant Sector is invalid\n"), verifier->vendor); 114 gettext("%s firmware image verifier: " 116 "Sector verification\n"), verifier->vendor); 123 gettext("%s firmware image verifier: " 125 verifier->vendor); 162 gettext("%s firmware image verifier [all...] |
H A D | hermon-MELLANOX.c | 50 extern struct vrfyplugin *verifier; 83 * NOTE verifier->fwimage is where file is read to. 85 if (cnx_is_magic_pattern_present(&verifier->fwimage[0], 1) != 87 logmsg(MSG_ERROR, gettext("%s firmware image verifier: " 89 verifier->vendor, verifier->imgfile); 94 logmsg(MSG_INFO, "%s firmware image verifier: " 96 verifier->vendor); 127 verifier->imgfile, devicenode->drvname); 131 logmsg(MSG_INFO, "%s firmware image verifier [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | token.c | 128 &token->verifier)) 161 __free_signature(&token->verifier); 195 __free_signature(&token->verifier); 200 __free_signature(&token->verifier); 224 &token->verifier)) 234 __free_signature(&token->verifier); 248 __free_signature(&token->verifier); 253 __free_signature(&token->verifier); 404 gss_buffer_t msg, /* Optional message to generate verifier over */ 461 &objp->verifier); [all...] |
H A D | crypto.c | 65 verifier_t verifier; /* Verifier entry to use for integrity */ member in struct:QOP_entry 208 * MD5_verifier: This is a verifier routine suitable for use in a 209 * verifier entry. It calculates the MD5 check sum over an optional 308 /* Get the verifier entry from the QOP entry */ 309 v = QOP_table[qop].verifier; 334 /* Get the verifier entry */ 335 verifier_t v = QOP_table[qop].verifier; 371 /* Grab the verifier entry for the qop */ 372 v = QOP_table[qop].verifier; 390 * as the token verifier [all...] |
H A D | dhmech_prot.x | 133 * protocal. We will always have a verifier follow this versioned body 145 * verifier as the last part of a token. In this way we will always 152 dh_signature verifier;
|
H A D | context.c | 328 token.verifier.dh_signature_len = sigsize; 329 token.verifier.dh_signature_val = 0;
|
H A D | MICwrap.c | 266 __free_signature(&tok.verifier);
|
/illumos-gate/usr/src/cmd/fwflash/common/ |
H A D | fwflash.c | 57 struct vrfyplugin *verifier; variable in typeref:struct:vrfyplugin 533 * verifier for this device has already been loaded. If it 538 if (verifier != NULL) { 539 verifier->imgsize = 0; 540 verifier->flashbuf = 0; /* set by the verifier function */ 542 if (verifier->imgfile != NULL) { 543 free(verifier->imgfile); 544 verifier->imgfile = NULL; 547 if (verifier [all...] |
H A D | fwflash.h | 289 * Once the verifier has figured out what sort of image 313 * case, it is the verifier plugin that determines the 348 extern struct vrfyplugin *verifier;
|
/illumos-gate/usr/src/lib/rpcsec_gss/ |
H A D | rpcsec_gss.c | 91 struct opaque_auth *verifier; /* rpc reply verifier saved for */ member in struct:_rpc_gss_data 495 * Marshall verifier. The verifier is the checksum of the RPC header 512 * If context is not established yet, use NULL verifier. 564 * the verifier which is a checksum of the sequence window. 577 tok_buf.length = ap->verifier->oa_length; 578 tok_buf.value = ap->verifier->oa_base; 586 * Validate RPC response verifier from server. The response verifier [all...] |
/illumos-gate/usr/src/grub/grub-0.97/netboot/ |
H A D | nfs.h | 55 uint32_t verifier; member in struct:rpc_t::__anon2093::__anon2095
|
/illumos-gate/usr/src/cmd/fwflash/plugins/transport/common/ |
H A D | ses.c | 140 extern struct vrfyplugin *verifier; 183 * If verifier is null, then we haven't been called following a firmware 198 if ((verifier == NULL) || (verifier->imgsize == 0) || 199 (verifier->fwimage == NULL)) { 221 verifier->flashbuf) != 0) { 230 (uint8_t *)verifier->fwimage, verifier->imgsize) != 0) { 262 flashdev->drvname, verifier->imgfile, 703 * If the bufferid isn't 2, then the verifier ha [all...] |
H A D | sd.c | 110 extern struct vrfyplugin *verifier; 156 if ((verifier == NULL) || (verifier->imgsize == 0) || 157 (verifier->fwimage == NULL)) { 182 (void *)verifier->fwimage, (size_t)verifier->imgsize); 187 wb_cdb->wbc_bufferid = verifier->flashbuf; 194 (verifier->imgsize & 0xff0000) >> 16; 195 wb_cdb->wbc_parameter_list_len[1] = (verifier->imgsize & 0xff00) >> 8; 196 wb_cdb->wbc_parameter_list_len[2] = (verifier [all...] |
H A D | hermon.c | 60 extern struct vrfyplugin *verifier; 135 * If verifier is null, then we haven't been called following a firmware 156 * If we get here, then the verifier has _already_ checked that 166 "HCA %s"), verifier->imgfile, flashdev->access_devname); 174 verifier->imgfile, flashdev->access_devname); 589 addr = ntohl(verifier->fwimage[CNX_NGUIDPTR_OFFSET / 4]) / 4; 598 verifier->fwimage[addr] = guids[0]; 599 verifier->fwimage[addr + 1] = guids[1]; 603 verifier->fwimage[addr + 2] = guids[2]; 604 verifier [all...] |
H A D | tavor.c | 84 extern struct vrfyplugin *verifier; 344 * If verifier is null, then we haven't been called following a firmware 363 * we've read in to the verifier->fwimage field, and are 463 iinv = (struct mlx_is *)&verifier->fwimage[0]; 465 ipps = (struct mlx_xps *)&verifier->fwimage[sectsz/4]; 466 isps = (struct mlx_xps *)&verifier->fwimage[sectsz/2]; 469 * If we get here, then the verifier has _already_ checked that 480 verifier->imgfile, flashdev->access_devname); 488 verifier->imgfile, flashdev->access_devname); 518 verifier [all...] |
/illumos-gate/usr/src/uts/common/fs/zfs/ |
H A D | zio_checksum.c | 200 * Set the external verifier for a gang block based on <vdev, offset, txg>, 215 * Set the external verifier for a label block based on its offset. 310 zio_cksum_t verifier; local 333 zio_checksum_gang_verifier(&verifier, bp); 335 zio_checksum_label_verifier(&verifier, offset); 337 verifier = bp->blk_cksum; 342 byteswap_uint64_array(&verifier, sizeof (zio_cksum_t)); 345 eck->zec_cksum = verifier;
|
/illumos-gate/usr/src/uts/common/rpc/sec_gss/ |
H A D | rpcsec_gss.c | 92 struct opaque_auth *verifier; /* rpc reply verifier saved for */ member in struct:_rpc_gss_data 927 * Marshall verifier. The verifier is the checksum of the RPC header 944 * If context is not established yet, use NULL verifier. 977 * the verifier which is a checksum of the sequence window. 987 ASSERT(ap->verifier); 992 tok_buf.length = ap->verifier->oa_length; 993 tok_buf.value = ap->verifier->oa_base; 1002 ap->verifier [all...] |
/illumos-gate/usr/src/boot/sys/cddl/boot/zfs/ |
H A D | zfssubr.c | 201 * Set the external verifier for a gang block based on <vdev, offset, txg>, 216 * Set the external verifier for a label block based on its offset. 258 zio_cksum_t actual_cksum, expected_cksum, verifier; local 280 zio_checksum_gang_verifier(&verifier, bp); 282 zio_checksum_label_verifier(&verifier, 285 verifier = bp->blk_cksum; 290 byteswap_uint64_array(&verifier, sizeof (zio_cksum_t)); 293 eck->zec_cksum = verifier;
|
/illumos-gate/usr/src/cmd/keyserv/ |
H A D | keyserv_cache.c | 57 des_block verifier; /* Checksum */ member in struct:skck 897 skck->verifier = key; 942 /* Decrypt and check verifier */ 953 if (memcmp(key.c, skck->verifier.c, sizeof (skck->verifier.c)) != 0) {
|
/illumos-gate/usr/src/head/rpcsvc/ |
H A D | nfs4_prot.x | 571 verifier4 verifier;
|
/illumos-gate/usr/src/uts/common/fs/nfs/ |
H A D | nfs4_state.c | 542 * build iovecs to read in the file_version, verifier and id_len 546 iov[1].iov_base = (caddr_t)&cl_ss->cl_id4.verifier; 567 * id_len is zero or the combination of the verifier, 1022 iov[1].iov_base = (caddr_t)&(cl_id4->verifier); 1680 cp->rc_nfs_client.verifier = client->verifier; 1690 /* Init the value for the SETCLIENTID_CONFIRM verifier */ 1734 * Caller wants to generate/update the setclientid_confirm verifier 1743 /* Init the value for the SETCLIENTID_CONFIRM verifier */
|
H A D | nfs4_vfsops.c | 3441 s_args->client.verifier = np->clidtosend.verifier; 3547 "verifier = %" PRIx64 "\n", cid.foo[0], cid.foo[1], verf); 3901 * the verifier is useful and that the identification is 3909 np->clidtosend.verifier = nfs4clientid_verifier.un_verifier;
|
/illumos-gate/usr/src/uts/common/nfs/ |
H A D | nfs4_kprot.h | 608 verifier4 verifier; member in struct:nfs_client_id4
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/snoop/ |
H A D | nfs4_xdr.c | 958 if (!xdr_verifier4(xdrs, objp->verifier))
|