Searched refs:signature (Results 126 - 150 of 170) sorted by relevance

1234567

/freebsd-10.2-release/sys/dev/qlxgb/
H A Dqla_hw.c414 uint32_t signature; local
421 signature = 0xcafe0000 | 0x0100 | ha->pci_func;
430 WRITE_OFFSET32(ha, Q8_NX_CDRP_SIGNATURE, signature);
465 Q8_NX_CDRP_SIGNATURE, signature,
/freebsd-10.2-release/sys/dev/advansys/
H A Dadvlib.c469 u_int16_t signature; local
472 signature = bus_read_2(res, ADV_SIGNATURE_WORD);
473 if ((signature == ADV_1000_ID0W)
474 || (signature == ADV_1000_ID0W_FIX))
/freebsd-10.2-release/contrib/libucl/uthash/
H A Duthash.h158 (head)->hh.tbl->signature = HASH_SIGNATURE; \
672 /* random signature used only to find hash tables in external analysis */
700 uint32_t signature; /* used only to find hash tables in external analysis */ member in struct:UT_hash_table
/freebsd-10.2-release/sys/dev/nand/
H A Dnandsim_chip.c121 bcopy("onfi", &chip_param->signature, 4);
644 nandchip_set_data(chip, (uint8_t *)&params->signature,
/freebsd-10.2-release/sys/dev/aic7xxx/
H A Daic79xx.h914 uint16_t signature; /* BIOS Signature */ member in struct:seeprom_config
947 uint16_t signature; member in struct:vpd_config
H A Daic7xxx_pci.c1416 * the 'ADPT' signature is found in SCB2.
1590 if (sc->signature == CFSIGNATURE
1591 || sc->signature == CFSIGNATURE2) {
/freebsd-10.2-release/crypto/openssh/
H A Dkey.c1495 error("%s: Invalid signature key type %s (%d)", __func__,
1505 break; /* Good signature */
1507 error("%s: Invalid signature on certificate", __func__);
1510 error("%s: Certificate signature verification failed",
1788 * key_verify returns 1 for a correct signature, 0 for an incorrect signature
1794 const u_char *signature, u_int signaturelen,
1804 return ssh_dss_verify(key, signature, signaturelen, data, datalen);
1808 return ssh_ecdsa_verify(key, signature, signaturelen, data, datalen);
1813 return ssh_rsa_verify(key, signature, signaturele
1792 key_verify( const Key *key, const u_char *signature, u_int signaturelen, const u_char *data, u_int datalen) argument
[all...]
/freebsd-10.2-release/sys/dev/ata/chipsets/
H A Data-promise.c794 u_int32_t signature = ch->hw.softreset(dev, ATA_PM); local
797 device_printf(dev, "SIGNATURE: %08x\n", signature);
799 switch (signature >> 16) {
813 "No signature, assuming disk device\n");
/freebsd-10.2-release/contrib/tcpdump/
H A Dprint-tcp.c61 #include <signature.h>
/freebsd-10.2-release/sys/dev/qlxge/
H A Dqls_hw.c75 static int qls_flash_validate(qla_host_t *ha, const char *signature);
1832 qls_flash_validate(qla_host_t *ha, const char *signature) argument
1838 if (bcmp(ha->flash.id, signature, 4)) {
1839 QL_DPRINT1((ha->pci_dev, "%s: invalid signature "
1842 signature));
/freebsd-10.2-release/sys/i386/i386/
H A Dbios.c90 /* look for the signature */
193 * Search some or all of the BIOS region for a signature string.
200 * (sig) is a pointer to the byte(s) of the signature.
201 * (siglen) number of bytes in the signature.
202 * (paralen) signature paragraph (alignment) size.
203 * (sigofs) offset of the signature within the paragraph.
205 * Returns the _physical_ address of the found signature, 0 if the
206 * signature was not found.
494 sig = oem->signature;
/freebsd-10.2-release/sys/dev/ciss/
H A Dcissreg.h397 char signature[4]; /* "CISS" */ member in struct:ciss_config_table
H A Dciss.c685 if (strncmp(sc->ciss_cfg->signature, "CISS", 4)) {
686 ciss_printf(sc, "config signature mismatch (got '%c%c%c%c')\n",
687 sc->ciss_cfg->signature[0], sc->ciss_cfg->signature[1],
688 sc->ciss_cfg->signature[2], sc->ciss_cfg->signature[3]);
1256 ciss_printf(sc, " signature '%.4s'\n", sc->ciss_cfg->signature);
/freebsd-10.2-release/sys/dev/bktr/
H A Dbktr_reg.h712 u_char signature[Bt848_MAX_SIGN]; member in struct:bt848_card_sig
/freebsd-10.2-release/sys/dev/pms/RefTisa/sallsdk/spc/
H A Dsampicmd.c1693 /* set up signature */
1694 OSSA_WRITE_LE_32(agRoot, &payload, OSSA_OFFSET_OF(agsaSetNVMDataCmd_t, Data.indirectData.signature), NVMDInfo->signature);
1706 /* set up signature */
1707 OSSA_WRITE_LE_32(agRoot, &payload, OSSA_OFFSET_OF(agsaSetNVMDataCmd_t, Data.indirectData.signature), NVMDInfo->signature);
/freebsd-10.2-release/crypto/heimdal/lib/hx509/
H A Drevoke.c232 "OCSP signer signature invalid");
246 &ocsp->ocsp.signature);
249 "OCSP signature invalid");
515 "CRL signature invalid");
588 /* check signature is aligned */
707 /* verify signature in ocsp if not already done */
795 /* verify signature in crl if not already done */
957 * default signature algorithm,
1169 * expired. Doesn't verify signature the OCSP reply or it's done by a
1454 ret = copy_AlgorithmIdentifier(sigalg, &c.tbsCertList.signature);
[all...]
H A Dca.c1100 /* signature AlgorithmIdentifier, */
1101 ret = copy_AlgorithmIdentifier(sigalg, &tbsc->signature);
/freebsd-10.2-release/contrib/netbsd-tests/usr.bin/netpgpverify/
H A Dt_netpgpverify.sh534 and a new signature was generated for this hashes file on 15 October 2012.
8422 Good signature for b.gpg made Mon Sep 10 00:15:38 2012
8423 signature 2048/RSA (Encrypt or Sign) 1b68dcfcc0596823 2004-01-12
8434 Good signature for a.gpg made Sun Sep 9 17:44:11 2012
8435 signature 2048/RSA (Encrypt or Sign) 1b68dcfcc0596823 2004-01-12
8446 Good signature for gpgsigned-a.gpg made Sun Sep 9 17:43:01 2012
8447 signature 2048/RSA (Encrypt or Sign) 1b68dcfcc0596823 2004-01-12
8458 Good signature for NetBSD-6.0_RC2_hashes.asc made Wed Sep 19 07:53:18 2012
8459 signature 4096/RSA (Encrypt or Sign) 064973ac4c4a706e 2009-06-23
8487 Good signature fo
[all...]
/freebsd-10.2-release/sys/dev/pms/RefTisa/tisa/sassata/common/
H A Dtdport.c7614 * \param Signature Pointer to SATA signature
7699 /* saving signature */
7706 oneDeviceData->satDevData.satDeviceType = tdssSATADeviceTypeDecode(agSATADeviceInfo->signature);
7710 /* print device signature - Word8 */
7711 TI_DBG3(("tdssNewAddSATAToSharedcontext: Word8 %x signature: %x %x %x %x %x %x %x %x\n",
7713 agSATADeviceInfo->signature[0], agSATADeviceInfo->signature[1],
7714 agSATADeviceInfo->signature[2], agSATADeviceInfo->signature[3],
7715 agSATADeviceInfo->signature[
[all...]
/freebsd-10.2-release/sys/dev/pms/RefTisa/tisa/sassata/sata/host/
H A Dossasat.c3339 * This routine decodes ATA signature
3341 * \param pSignature: ATA signature
3345 * TRUE if ATA signature
3363 && (pSignature)[4] == 0xA0 ) /* this is the signature of a Hitachi SATA HDD*/
3467 devicetype = tdssSATADeviceTypeDecode(agSATADeviceInfo->signature);
3508 TI_DBG1(("ossaDiscoverSataCB: signature: 0x%x 0x%x 0x%x 0x%x 0x%x 0x%x 0x%x 0x%x\n",
3509 agSATADeviceInfo->signature[0], agSATADeviceInfo->signature[1],
3510 agSATADeviceInfo->signature[2], agSATADeviceInfo->signature[
[all...]
/freebsd-10.2-release/crypto/openssl/ssl/
H A Ds3_srvr.c2012 * For TLS1.2 and later send signature algorithm
2999 /* we now have a signature that we need to verify */
3003 * If key is GOST and n is exactly 64, it is bare signature without
3018 /* Check key type is consistent with signature */
3101 /* bad signature */
3114 /* bad signature */
3123 unsigned char signature[64]; local
3128 fprintf(stderr, "GOST signature length is %d", i);
3131 signature[63 - idx] = p[idx];
3133 j = EVP_PKEY_verify(pctx, signature, 6
[all...]
/freebsd-10.2-release/sys/dev/pms/RefTisa/sallsdk/api/
H A Dsa.h1950 bit32 signature; member in struct:agsaNVMDData_s
2046 bit32 signature; /* coherent controller information */ member in struct:agsaControllerInfo_s
2668 bit8 signature[8]; /**< The signature of SATA in Task member in struct:agsaSATADeviceInfo_s
/freebsd-10.2-release/sys/dev/usb/wlan/
H A Dif_rsu.c2160 if (hdr->signature != htole16(0x8712) &&
2161 hdr->signature != htole16(0x8192)) {
2163 "invalid firmware signature 0x%x\n",
2164 le16toh(hdr->signature));
/freebsd-10.2-release/sys/dev/cxgbe/common/
H A Dt4_hw.c1213 u8 signature[2]; /* ROM Signature. Should be 0xaa55 */ member in struct:pci_expansion_rom_header
1220 u8 signature[2]; /* ROM Signature. Should be 0xaa55 */ member in struct:legacy_pci_expansion_rom_header
1230 u8 signature[2]; // ROM signature. The value 0xaa55 member in struct:efi_pci_expansion_rom_header
1249 u8 signature[4]; /* Signature. The string "PCIR" */ member in struct:pcir_data_structure
1274 BOOT_SIGNATURE = 0xaa55, /* signature of BIOS boot ROM */
1279 PCIR_SIGNATURE = 0x52494350 /* PCIR signature */
1424 * Check BOOT ROM header signature
1426 if (le16_to_cpu(*(u16*)header->signature) != BOOT_SIGNATURE ) {
1427 CH_ERR(adap, "Boot image missing signature\
[all...]
/freebsd-10.2-release/sys/dev/dpt/
H A Ddpt.h438 u_int32_t signature; /* Signature MUST be "EATA". ntohl()`ed */ member in struct:get_conf
824 u_int8_t SigVersion; /* signature version (currently 1) */

Completed in 540 milliseconds

1234567