/illumos-gate/usr/src/uts/common/fs/ufs/ |
H A D | ufs_acl.c | 106 int signature; in ufs_si_store() local 1642 int signature; in ufs_si_free() local 1675 signature = sp->s_signature; in ufs_si_free() 1688 signature = sp->s_signature; in ufs_si_free() 1694 si_cache_del(sp, signature); in ufs_si_free() 1844 hash = SI_HASH(signature); in si_cache_del() 1927 int signature = 0; in aclcksum() local 1932 return (signature); in aclcksum() 1947 int signature = sp->s_dev; in si_signature() local 1959 return (signature); in si_signature() [all …]
|
/illumos-gate/usr/src/grub/grub-0.97/netboot/ |
H A D | pci_io.c | 308 unsigned long signature; in check_pcibios() local 329 : "=d" (signature), in check_pcibios() 339 if (present_status || (signature != PCI_SIGNATURE)) { in check_pcibios() 370 if (check->fields.signature != BIOS32_SIGNATURE) in pcibios_init()
|
/illumos-gate/usr/src/lib/libsqlite/test/ |
H A D | memdb.test | 50 # The following procedure computes a "signature" for table "t3". If 51 # T3 changes in any way, the signature should change. 53 # This is used to test ROLLBACK. We gather a signature for t3, then 54 # make lots of changes to t3, then rollback and take another signature. 57 proc signature {{fn {}}} { 70 # Do rollbacks. Make sure the signature does not change. 74 set ::sig [signature one] 91 set sig2 [signature two] 104 signature
|
/illumos-gate/usr/src/uts/common/fs/smbclnt/netsmb/ |
H A D | smb_sign.c | 106 uint32_t seqno, uchar_t *signature) in smb_compute_MAC() argument 190 if (signature != NULL) in smb_compute_MAC() 191 bcopy(digest, signature, SMBSIGLEN); in smb_compute_MAC()
|
H A D | smb2_sign.c | 215 smb2_compute_MAC(struct smb_vc *vcp, mblk_t *mp, uchar_t *signature) in smb2_compute_MAC() argument 268 rc = ops->mac_final(ctx, signature); in smb2_compute_MAC()
|
/illumos-gate/usr/src/uts/common/sys/crypto/ |
H A D | api.h | 115 crypto_data_t *signature, crypto_call_req_t *cr); 126 extern int crypto_sign_final(crypto_context_t ctx, crypto_data_t *signature, 132 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 142 crypto_data_t *data, crypto_ctx_template_t tmpl, crypto_data_t *signature, 154 extern int crypto_verify_final(crypto_context_t ctx, crypto_data_t *signature, 160 crypto_data_t *signature, crypto_ctx_template_t tmpl, crypto_data_t *data,
|
/illumos-gate/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 502 KMF_DATA signature; in elfcertlib_sign() local 535 signature.Data = (uchar_t *)sig; in elfcertlib_sign() 536 signature.Length = *sig_len; in elfcertlib_sign() 549 KMF_OUT_DATA_ATTR, &signature, sizeof (KMF_DATA)); in elfcertlib_sign() 563 *sig_len = signature.Length; in elfcertlib_sign() 581 const uchar_t *signature, size_t sig_len, in elfcertlib_verifysig() argument 594 insig.Data = (uchar_t *)signature; in elfcertlib_verifysig()
|
/illumos-gate/usr/src/cmd/bhyve/ |
H A D | basl.c | 263 basl_get_table_by_signature(const uint8_t signature[ACPI_NAMESEG_SIZE]) 272 if (strncmp(header->Signature, signature, 276 if (strncmp(header->Signature, (char *)signature, 283 warnx("%s: %.4s not found", __func__, signature); 606 const uint8_t signature[ACPI_NAMESEG_SIZE], const uint8_t revision, 616 memcpy(header_le.Signature, signature, ACPI_NAMESEG_SIZE); 621 snprintf(oem_table_id, ACPI_OEM_TABLE_ID_SIZE, "BV%.4s ", signature);
|
H A D | qemu_fwcfg.c | 75 uint8_t signature[4]; member 297 fwcfg_signature->signature[0] = 'Q'; in qemu_fwcfg_add_item_signature() 298 fwcfg_signature->signature[1] = 'E'; in qemu_fwcfg_add_item_signature() 299 fwcfg_signature->signature[2] = 'M'; in qemu_fwcfg_add_item_signature() 300 fwcfg_signature->signature[3] = 'U'; in qemu_fwcfg_add_item_signature()
|
/illumos-gate/usr/src/uts/common/io/cxgbe/t4nex/ |
H A D | cudbg_flash_utils.c | 127 flash_hdr->signature = CUDBG_FL_SIGNATURE; in update_headers() 381 if (flash_hdr.signature == CUDBG_FL_SIGNATURE) { in cudbg_read_flash() 389 if (flash_hdr.signature == CUDBG_FL_SIGNATURE) in cudbg_read_flash() 412 if (flash_hdr.signature == CUDBG_FL_SIGNATURE && in cudbg_read_flash() 451 if (flash_hdr.signature == in cudbg_read_flash()
|
H A D | cudbg_lib_common.h | 71 u32 signature; member 98 u32 signature; member
|
/illumos-gate/usr/src/lib/libzfs_jni/common/ |
H A D | libzfs_jni_util.c | 202 char signature[1024]; in zjni_int_to_enum() local 204 (void) snprintf(signature, sizeof (signature), "L%s;", in zjni_int_to_enum() 209 env, class, field_name, signature); in zjni_int_to_enum()
|
/illumos-gate/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | crypto.c | 222 dh_signature_t signature /* The resulting MIC */) in MD5_verifier() argument 238 memcpy(signature->dh_signature_val, (void *)md5_ctx.digest, 16); in MD5_verifier() 240 buf.length = signature->dh_signature_len; in MD5_verifier() 241 buf.value = signature->dh_signature_val; in MD5_verifier()
|
/illumos-gate/usr/src/lib/libresolv2/common/dst/ |
H A D | dst_internal.h | 82 u_int8_t *signature, const int sig_len); 85 const u_int8_t *signature, const int sig_len);
|
H A D | dst_api.c | 241 u_char *signature, const int sig_len) in dst_sign_data() argument 246 (in_key->dk_KEY_struct == NULL || signature == NULL)) in dst_sign_data() 251 signature, sig_len)); in dst_sign_data() 284 const u_char *signature, const int sig_len) in dst_verify_data() argument 288 (in_key->dk_KEY_struct == NULL || signature == NULL)) in dst_verify_data() 294 signature, sig_len)); in dst_verify_data()
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | mech_md5.c | 489 CK_BYTE * signature, in md5_hmac_verify() argument 497 if (! sess || ! ctx || ! in_data || ! signature) { in md5_hmac_verify() 524 if (memcmp(hmac, signature, hmac_len) != 0) { in md5_hmac_verify()
|
H A D | mech_sha.c | 219 CK_BYTE *signature, in sha1_hmac_verify() argument 227 if (! sess || ! ctx || ! in_data || ! signature) { in sha1_hmac_verify() 252 if (memcmp(hmac, signature, hmac_len) != 0) { in sha1_hmac_verify()
|
/illumos-gate/usr/src/contrib/bhyve/x86/ |
H A D | mptable.h | 46 uint8_t signature[4]; member 63 uint8_t signature[4]; member
|
/illumos-gate/usr/src/boot/i386/isoboot/ |
H A D | cd9660read.c | 52 uint8_t signature [ISODCL(5, 6)]; member 158 if (sp->signature[0] != 0xbe || sp->signature[1] != 0xef) { in rrip_check()
|
/illumos-gate/usr/src/grub/grub-0.97/stage2/ |
H A D | fsys_iso9660.c | 225 rr_ptr.rr->signature & 0xFF, in iso9660_dir() 226 rr_ptr.rr->signature >> 8); in iso9660_dir() 231 switch (rr_ptr.rr->signature) in iso9660_dir()
|
/illumos-gate/usr/src/tools/smatch/src/Documentation/ |
H A D | IR.rst | 58 They all follow the same signature: 95 They all follow the same signature: 114 They all follow the same signature: 130 They all have the following signature: 167 They all have the same signature as the integer compares. 259 They all have the following signature:
|
/illumos-gate/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 572 KMF_X509_ALGORITHM_IDENTIFIER signature; member 600 KMF_X509_SIGNATURE signature; member 603 #define CERT_ALG_OID(c) &c->certificate.signature.algorithm 604 #define CERT_SIG_OID(c) &c->signature.algorithmIdentifier.algorithm 625 KMF_X509_SIGNATURE signature; member
|
/illumos-gate/usr/src/tools/scripts/ |
H A D | onu.sh.in | 92 --set-property signature-policy=verify \ 97 --set-property signature-policy=verify -O $uri $redistpub
|
/illumos-gate/usr/src/uts/common/io/qede/579xx/hsi/ |
H A D | mfw_hsi.h | 56 u32 signature; /* Help to identify that the trace is valid */ member
|
/illumos-gate/usr/src/uts/common/io/usb/scsa2usb/ |
H A D | usb_ms_bulkonly.c | 570 uint_t signature, tag, status; in scsa2usb_handle_csw_result() local 602 signature = SCSA2USB_MK_32BIT(csw.csw_dCSWSignature3, in scsa2usb_handle_csw_result() 613 signature, status, tag, residue); in scsa2usb_handle_csw_result() 616 if ((signature != CSW_SIGNATURE) || (tag != cmd->cmd_tag) || in scsa2usb_handle_csw_result()
|