/illumos-gate/usr/src/boot/lib/libstand/ |
H A D | cd9660.c | 59 u_char signature [ISODCL ( 5, 6)]; member in struct:__anon1 213 if (sp->signature[0] != 0xbe || sp->signature[1] != 0xef)
|
/illumos-gate/usr/src/boot/sys/amd64/include/pc/ |
H A D | bios.h | 111 struct bios_oem_signature signature[]; member in struct:bios_oem
|
/illumos-gate/usr/src/boot/sys/boot/i386/pmbr/ |
H A D | pmbr.s | 43 .set DISKSIG,440 # Disk signature offset 172 # signature, partition table 4 entries and signature.
|
/illumos-gate/usr/src/boot/sys/i386/include/pc/ |
H A D | bios.h | 281 struct bios_oem_signature signature[]; member in struct:bios_oem
|
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/ |
H A D | signcsr.c | 159 signedCert->certificate.signature = 160 csrdata->signature.algorithmIdentifier; 229 /* Set the signature OID value so KMF knows how to generate the sig */ 281 /* verify the signature first */ 289 cryptoerror(LOG_STDERR, gettext("CSR signature " 391 /* verify the signature first */ 398 cryptoerror(LOG_STDERR, gettext("CSR signature "
|
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/ |
H A D | CryptoAlg.c | 210 mDNSexport mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument 229 return (func->Verify(ctx, key, keylen, signature, siglen));
|
H A D | CryptoAlg.h | 41 // Verify the ctx using the key and compare it against signature/siglen 42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen); 58 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
|
H A D | mDNSEmbeddedAPI.h | 194 kDNSType_SIG, // 24 Security signature 232 kDNSType_TSIG, // 250 Transaction signature 820 //size of rdataRRSIG excluding signerName and signature (which are variable fields) 832 // mDNSu8 *signature 3149 mDNSexport void mDNSASLLog(uuid_t *uuid, const char *subdomain, const char *result, const char *signature, const char *fmt, ...);
|
/illumos-gate/usr/src/cmd/fdisk/ |
H A D | fdisk.c | 1581 if (LE_16(BootCod.signature) != MBB_MAGIC) { 1586 LE_16(BootCod.signature), MBB_MAGIC); 3940 if (LE_16(Bootblk->signature) != MBB_MAGIC) { 4042 Bootblk->signature = LE_16(MBB_MAGIC); 5573 "boot block signature :\n\n");
|
/illumos-gate/usr/src/cmd/fs.d/pcfs/fsck/ |
H A D | bpb.c | 193 if (ltohs(ubpb.mb.signature) != BOOTSECSIG) { 196 gettext("Bad signature on BPB. Giving up.\n"));
|
H A D | pcfs_common.c | 494 if (ltohs(mb.signature) != BOOTSECSIG) { 496 gettext("Bad signature on master boot record (%x)\n"), 497 ltohs(mb.signature)); 598 if (ltohs(extmboot.signature) != MBB_MAGIC) { 600 gettext("Bad signature on "
|
/illumos-gate/usr/src/cmd/fs.d/pcfs/mkfs/ |
H A D | mkfs.c | 652 if (ltohs(mb.signature) != BOOTSECSIG) { 791 if (ltohs(extmboot.signature) != MBB_MAGIC) { 793 gettext("Bad signature on " 1834 if (ltohs(ubpb.mb.signature) != BOOTSECSIG) {
|
/illumos-gate/usr/src/cmd/fstyp/ |
H A D | fstyp.c | 327 if (ltohs(mboot->signature) != MBB_MAGIC) {
|
/illumos-gate/usr/src/cmd/fwflash/plugins/hdrs/ |
H A D | tavor_ib.h | 76 uint32_t signature; /* firmware signature */ member in struct:mlx_xps
|
/illumos-gate/usr/src/cmd/fwflash/plugins/transport/common/ |
H A D | tavor.c | 1448 "tavor: CISCO signature found in HCA's VSD, copying to " 1488 "tavor: CISCO signature not found in HCA's VSD\n"); 1544 * Write zeros to the on-HCA signature and CRC16 fields of sector. 1556 /* signature first, then CRC16 */ 1713 "of xPS' signature at offset from IS 0x%04x: %s\n"), 1745 /* zero the HCA's PPS signature and CRC */ 1749 "tavor: Unable zero HCA's %s signature " 1804 /* invalidate the xps signature and fia fields */ 1805 newxps->signature = 0xffffffff; 1839 newxps->signature [all...] |
/illumos-gate/usr/src/cmd/fwflash/plugins/vendor/ |
H A D | tavor-MELLANOX.c | 120 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) || 197 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) ||
|
/illumos-gate/usr/src/cmd/hal/hald/ |
H A D | hald_dbus.c | 161 * the wrong signature 3806 HAL_WARNING (("Broken signature for method %s " 4085 const char *signature; local 4093 signature = dbus_message_get_signature (message); 4139 if (d != NULL && interface != NULL && method != NULL && signature != NULL) { 4169 strcmp (sig, signature) == 0) { 4171 HAL_INFO (("OK for method '%s' with signature '%s' on interface '%s' for UDI '%s' and execpath '%s'", method, signature, interface, udi, execpath));
|
/illumos-gate/usr/src/cmd/hal/utils/ |
H A D | fsutils.c | 133 if (ltohs(mboot->signature) != MBB_MAGIC) {
|
/illumos-gate/usr/src/cmd/iscsid/ |
H A D | iscsid.c | 368 err_ind.signature = ISCSI_DOOR_REQ_SIGNATURE; 390 } else if (req->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) {
|
/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/ |
H A D | kmem.c | 3172 "redzone signature\n", addr); 3971 size_t kmo_signature; /* Hash table signature */ 3992 size_t bucket, signature = data_size; local 4019 * Finish computing the hash signature from the stack trace, and then 4023 signature += bcp->bc_stack[i]; 4025 bucket = signature & (kmu->kmu_size - 1); 4028 if (kmo->kmo_signature == signature) { 4055 kmo->kmo_signature = signature;
|
/illumos-gate/usr/src/cmd/mdb/common/modules/libumem/ |
H A D | umem.c | 2828 "redzone signature\n", addr); 3601 size_t umo_signature; /* Hash table signature */ 3622 size_t bucket, signature = data_size; local 3659 * Finish computing the hash signature from the stack trace, and then 3663 signature += bcp->bc_stack[i]; 3665 bucket = signature & (umu->umu_size - 1); 3668 if (umo->umo_signature == signature) { 3695 umo->umo_signature = signature;
|
/illumos-gate/usr/src/cmd/rmformat/ |
H A D | rmf_slice.c | 1186 if (les(boot_sec->signature) != MBB_MAGIC) { 1189 les(boot_sec->signature), MBB_MAGIC);
|
/illumos-gate/usr/src/cmd/tar/ |
H A D | tar.c | 6236 int namehash; /* name's hash signature */ 6291 int signature; local 6304 signature = c->val; 6306 signature = c->namehash; 6307 c->next = table[signature & (HASHSIZE - 1)]; 6308 table[signature & (HASHSIZE - 1)] = c;
|
/illumos-gate/usr/src/common/crypto/dsa/ |
H A D | dsa_impl.h | 80 BIGNUM r; /* r (signature 1st part) */ 81 BIGNUM s; /* s (signature 2st part) */ 99 uchar_t *signature; /* concat(r, s) */ member in struct:__anon1955
|
/illumos-gate/usr/src/common/crypto/ecc/ |
H A D | ec.c | 626 /* Computes the ECDSA signature (a concatenation of two values r and s) 631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, argument 637 mp_int r, s; /* tuple (r, s) is the signature */ 659 if (!key || !signature || !digest || !kb || (kblen < 0)) { 667 if (signature->data == NULL) { 668 /* a call to get the signature length only */ 671 if (signature->len < 2*olen) { 793 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) ); 794 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) ); 796 signature 830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument 868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument [all...] |