Searched refs:signature (Results 1 - 25 of 134) sorted by path

123456

/illumos-gate/usr/src/boot/lib/libstand/
H A Dcd9660.c59 u_char signature [ISODCL ( 5, 6)]; member in struct:__anon1
213 if (sp->signature[0] != 0xbe || sp->signature[1] != 0xef)
/illumos-gate/usr/src/boot/sys/amd64/include/pc/
H A Dbios.h111 struct bios_oem_signature signature[]; member in struct:bios_oem
/illumos-gate/usr/src/boot/sys/boot/i386/pmbr/
H A Dpmbr.s43 .set DISKSIG,440 # Disk signature offset
172 # signature, partition table 4 entries and signature.
/illumos-gate/usr/src/boot/sys/i386/include/pc/
H A Dbios.h281 struct bios_oem_signature signature[]; member in struct:bios_oem
/illumos-gate/usr/src/cmd/cmd-crypto/pktool/
H A Dsigncsr.c159 signedCert->certificate.signature =
160 csrdata->signature.algorithmIdentifier;
229 /* Set the signature OID value so KMF knows how to generate the sig */
281 /* verify the signature first */
289 cryptoerror(LOG_STDERR, gettext("CSR signature "
391 /* verify the signature first */
398 cryptoerror(LOG_STDERR, gettext("CSR signature "
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/mdnsd/
H A DCryptoAlg.c210 mDNSexport mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen) argument
229 return (func->Verify(ctx, key, keylen, signature, siglen));
H A DCryptoAlg.h41 // Verify the ctx using the key and compare it against signature/siglen
42 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
58 extern mStatus AlgVerify(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
H A DmDNSEmbeddedAPI.h194 kDNSType_SIG, // 24 Security signature
232 kDNSType_TSIG, // 250 Transaction signature
820 //size of rdataRRSIG excluding signerName and signature (which are variable fields)
832 // mDNSu8 *signature
3149 mDNSexport void mDNSASLLog(uuid_t *uuid, const char *subdomain, const char *result, const char *signature, const char *fmt, ...);
/illumos-gate/usr/src/cmd/fdisk/
H A Dfdisk.c1581 if (LE_16(BootCod.signature) != MBB_MAGIC) {
1586 LE_16(BootCod.signature), MBB_MAGIC);
3940 if (LE_16(Bootblk->signature) != MBB_MAGIC) {
4042 Bootblk->signature = LE_16(MBB_MAGIC);
5573 "boot block signature :\n\n");
/illumos-gate/usr/src/cmd/fs.d/pcfs/fsck/
H A Dbpb.c193 if (ltohs(ubpb.mb.signature) != BOOTSECSIG) {
196 gettext("Bad signature on BPB. Giving up.\n"));
H A Dpcfs_common.c494 if (ltohs(mb.signature) != BOOTSECSIG) {
496 gettext("Bad signature on master boot record (%x)\n"),
497 ltohs(mb.signature));
598 if (ltohs(extmboot.signature) != MBB_MAGIC) {
600 gettext("Bad signature on "
/illumos-gate/usr/src/cmd/fs.d/pcfs/mkfs/
H A Dmkfs.c652 if (ltohs(mb.signature) != BOOTSECSIG) {
791 if (ltohs(extmboot.signature) != MBB_MAGIC) {
793 gettext("Bad signature on "
1834 if (ltohs(ubpb.mb.signature) != BOOTSECSIG) {
/illumos-gate/usr/src/cmd/fstyp/
H A Dfstyp.c327 if (ltohs(mboot->signature) != MBB_MAGIC) {
/illumos-gate/usr/src/cmd/fwflash/plugins/hdrs/
H A Dtavor_ib.h76 uint32_t signature; /* firmware signature */ member in struct:mlx_xps
/illumos-gate/usr/src/cmd/fwflash/plugins/transport/common/
H A Dtavor.c1448 "tavor: CISCO signature found in HCA's VSD, copying to "
1488 "tavor: CISCO signature not found in HCA's VSD\n");
1544 * Write zeros to the on-HCA signature and CRC16 fields of sector.
1556 /* signature first, then CRC16 */
1713 "of xPS' signature at offset from IS 0x%04x: %s\n"),
1745 /* zero the HCA's PPS signature and CRC */
1749 "tavor: Unable zero HCA's %s signature "
1804 /* invalidate the xps signature and fia fields */
1805 newxps->signature = 0xffffffff;
1839 newxps->signature
[all...]
/illumos-gate/usr/src/cmd/fwflash/plugins/vendor/
H A Dtavor-MELLANOX.c120 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) ||
197 if ((MLXSWAPBITS32(vps->signature) != FLASH_PS_SIGNATURE) ||
/illumos-gate/usr/src/cmd/hal/hald/
H A Dhald_dbus.c161 * the wrong signature
3806 HAL_WARNING (("Broken signature for method %s "
4085 const char *signature; local
4093 signature = dbus_message_get_signature (message);
4139 if (d != NULL && interface != NULL && method != NULL && signature != NULL) {
4169 strcmp (sig, signature) == 0) {
4171 HAL_INFO (("OK for method '%s' with signature '%s' on interface '%s' for UDI '%s' and execpath '%s'", method, signature, interface, udi, execpath));
/illumos-gate/usr/src/cmd/hal/utils/
H A Dfsutils.c133 if (ltohs(mboot->signature) != MBB_MAGIC) {
/illumos-gate/usr/src/cmd/iscsid/
H A Discsid.c368 err_ind.signature = ISCSI_DOOR_REQ_SIGNATURE;
390 } else if (req->hdr.signature != ISCSI_DOOR_REQ_SIGNATURE) {
/illumos-gate/usr/src/cmd/mdb/common/modules/genunix/
H A Dkmem.c3172 "redzone signature\n", addr);
3971 size_t kmo_signature; /* Hash table signature */
3992 size_t bucket, signature = data_size; local
4019 * Finish computing the hash signature from the stack trace, and then
4023 signature += bcp->bc_stack[i];
4025 bucket = signature & (kmu->kmu_size - 1);
4028 if (kmo->kmo_signature == signature) {
4055 kmo->kmo_signature = signature;
/illumos-gate/usr/src/cmd/mdb/common/modules/libumem/
H A Dumem.c2828 "redzone signature\n", addr);
3601 size_t umo_signature; /* Hash table signature */
3622 size_t bucket, signature = data_size; local
3659 * Finish computing the hash signature from the stack trace, and then
3663 signature += bcp->bc_stack[i];
3665 bucket = signature & (umu->umu_size - 1);
3668 if (umo->umo_signature == signature) {
3695 umo->umo_signature = signature;
/illumos-gate/usr/src/cmd/rmformat/
H A Drmf_slice.c1186 if (les(boot_sec->signature) != MBB_MAGIC) {
1189 les(boot_sec->signature), MBB_MAGIC);
/illumos-gate/usr/src/cmd/tar/
H A Dtar.c6236 int namehash; /* name's hash signature */
6291 int signature; local
6304 signature = c->val;
6306 signature = c->namehash;
6307 c->next = table[signature & (HASHSIZE - 1)];
6308 table[signature & (HASHSIZE - 1)] = c;
/illumos-gate/usr/src/common/crypto/dsa/
H A Ddsa_impl.h80 BIGNUM r; /* r (signature 1st part) */
81 BIGNUM s; /* s (signature 2st part) */
99 uchar_t *signature; /* concat(r, s) */ member in struct:__anon1955
/illumos-gate/usr/src/common/crypto/ecc/
H A Dec.c626 /* Computes the ECDSA signature (a concatenation of two values r and s)
631 ECDSA_SignDigestWithSeed(ECPrivateKey *key, SECItem *signature, argument
637 mp_int r, s; /* tuple (r, s) is the signature */
659 if (!key || !signature || !digest || !kb || (kblen < 0)) {
667 if (signature->data == NULL) {
668 /* a call to get the signature length only */
671 if (signature->len < 2*olen) {
793 CHECK_MPI_OK( mp_to_fixlen_octets(&r, signature->data, olen) );
794 CHECK_MPI_OK( mp_to_fixlen_octets(&s, signature->data + olen, olen) );
796 signature
830 ECDSA_SignDigest(ECPrivateKey *key, SECItem *signature, const SECItem *digest, int kmflag) argument
868 ECDSA_VerifyDigest(ECPublicKey *key, const SECItem *signature, const SECItem *digest, int kmflag) argument
[all...]

Completed in 1187 milliseconds

123456