/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/char/ |
H A D | cyclades.c | 332 readl(&fw_id->signature) == ZFIRM_ID; 1549 readl(&firm_id->signature) == 3553 if (__cyz_fpga_loaded(ctl_addr) && readl(&fid->signature) == ZFIRM_ID) { 3623 while ((status = readl(&fid->signature)) != ZFIRM_ID && i++ < 40) 3633 dev_warn(&pdev->dev, "fid->signature = 0x%x... Waiting " 3635 while ((status = readl(&fid->signature)) != ZFIRM_ID && 3640 "Giving up. (fid->signature = 0x%x)\n",
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | s3_srvr.c | 1974 /* send signature algorithm */ 2996 /* we now have a signature that we need to verify */ 3000 * If key is GOST and n is exactly 64, it is bare signature without 3086 /* bad signature */ 3099 /* bad signature */ 3108 unsigned char signature[64]; local 3123 fprintf(stderr, "GOST signature length is %d", i); 3126 signature[63 - idx] = p[idx]; 3128 j = EVP_PKEY_verify(pctx, signature, 64, s->s3->tmp.cert_verify_md,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/qla2xxx/ |
H A D | qla_iocb.c | 438 rsp->ring_ptr->signature != RESPONSE_PROCESSED) 1294 rsp->ring_ptr->signature != RESPONSE_PROCESSED) 1474 rsp->ring_ptr->signature != RESPONSE_PROCESSED)
|
H A D | qla_init.c | 1327 ha->fw_dump->signature[0] = 'Q'; 1328 ha->fw_dump->signature[1] = 'L'; 1329 ha->fw_dump->signature[2] = 'G'; 1330 ha->fw_dump->signature[3] = 'C'; 1539 pkt->signature = RESPONSE_PROCESSED;
|
H A D | qla_fw.h | 1835 uint8_t signature[4]; /* "HQOS" signature of config data */ member in struct:qla_fcp_prio_cfg
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | s3_srvr.c | 1974 /* send signature algorithm */ 2996 /* we now have a signature that we need to verify */ 3000 * If key is GOST and n is exactly 64, it is bare signature without 3086 /* bad signature */ 3099 /* bad signature */ 3108 unsigned char signature[64]; local 3123 fprintf(stderr, "GOST signature length is %d", i); 3126 signature[63 - idx] = p[idx]; 3128 j = EVP_PKEY_verify(pctx, signature, 64, s->s3->tmp.cert_verify_md,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/ |
H A D | sm_make_chunk.c | 1540 /* Pad out the cookie to a multiple to make the signature 1595 crypto_hash_digest(&desc, &sg, bodysize, cookie->signature)) 1656 /* Check the signature. */ 1670 if (memcmp(digest, cookie->signature, SCTP_SIGNATURE_SIZE)) { 1680 if (memcmp(digest, cookie->signature, SCTP_SIGNATURE_SIZE)) { 1681 /* Yikes! Still bad signature! */
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/ |
H A D | zipfile.c | 143 # define ZIP64_CENTRAL_DIR_TAIL_SIG 0x06064B50L /* zip64 central dir tail signature */ 144 # define ZIP64_CENTRAL_DIR_TAIL_END_SIG 0x07064B50L /* zip64 end of cen dir locator signature */ 1914 /* look for signature */ 2120 /* Read next signature */ 2226 local file header signature 4 bytes (0x04034b50) 2369 /* detect spanning signature */ 2381 /* back up 4k blocks and look for End Of CD signature */ 2448 zipwarn("missing end signature--probably not a zip file (did you", ""); 2454 * Check for a Zip64 EOCD Locator signature - 12/10/04 EG 2467 /* first 4 bytes are the signature i [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/ |
H A D | openssl.c | 2268 j = asn1_object_dump(cinf->signature->algorithm, bufp, CERTBUFFERSIZE); 2334 X509_signature(data, i, x->signature);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/aic7xxx/ |
H A D | aic7xxx_pci.c | 1319 * the 'ADPT' signature is found in SCB2. 1493 if (sc->signature == CFSIGNATURE 1494 || sc->signature == CFSIGNATURE2) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/video/cx23885/ |
H A D | cx23885-417.c | 779 "or corrupted, signature = 0x%x, cmd = %s\n", value, 871 u32 signature[4] = { local 882 if (value == signature[signaturecnt]) 887 dprintk(1, "Mailbox signature found at 0x%x\n", i+1); 891 printk(KERN_ERR "Mailbox signature values not found!\n");
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/ |
H A D | stex.c | 273 u32 signature[2]; member in struct:st_drvver 652 ver.signature[0] = PASSTHRU_SIGNATURE; 995 "(%s): no handshake signature\n", 1045 "(%s): no signature after handshake frame\n", 1114 "(%s): no signature after handshake frame\n",
|
H A D | eata_pio.c | 632 if (cpu_to_be32(EATA_SIGNATURE) != buf->signature)
|
H A D | ips.h | 767 uint32_t signature; member in struct:__anon14566
|
H A D | wd7000.c | 21 * before; namely, by looking for a BIOS signature. Thus, the location of 22 * the BIOS signature determines the board configuration. Until I have 98 * one of the FD boards, it would be nice to come up with a signature 326 typedef struct signature { struct 374 #define SCAN_OGMBS 0xc0 /* start multiple commands, signature (n) */
|
H A D | ips.c | 2050 if ((le32_to_cpu(ha->nvram->signature) == IPS_NVRAM_P5_SIG) && 2077 if (le32_to_cpu(ha->nvram->signature) == IPS_NVRAM_P5_SIG) { 5692 /* signature */ 5693 if (le32_to_cpu(ha->nvram->signature) != IPS_NVRAM_P5_SIG) { 5695 "(%s%d) NVRAM page 5 has an invalid signature: %X.", 5696 ips_name, ha->host_num, ha->nvram->signature); 5697 ha->nvram->signature = IPS_NVRAM_P5_SIG;
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/libpng/libpng-1.2.50/ |
H A D | pngget.c | 384 return(info_ptr->signature);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/png/ |
H A D | pngget.c | 353 return(info_ptr->signature);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/e1000e/ |
H A D | hw.h | 716 u32 signature; member in struct:e1000_host_mng_dhcp_cookie
|
H A D | lib.c | 41 /* Intel(R) Active Management Technology signature */ 2370 * If either the checksums or signature don't match, then 2374 if ((hdr_csum != csum) || (hdr->signature != E1000_IAMT_SIGNATURE)) {
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/p54/ |
H A D | p54usb.c | 502 memcpy(hdr->signature, X2_SIGNATURE, X2_SIGNATURE_SIZE);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/sctp/ |
H A D | structs.h | 443 __u8 signature[SCTP_SECRET_SIZE]; member in struct:sctp_signed_cookie
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/e1000/ |
H A D | e1000_hw.h | 324 #define E1000_IAMT_SIGNATURE 0x544D4149 /* Intel(R) Active Management Technology signature */ 346 u32 signature; member in struct:e1000_host_mng_dhcp_cookie 357 u32 signature; member in struct:e1000_host_mng_dhcp_cookie
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ocfs2/ |
H A D | super.c | 760 if (memcmp(hdr->signature, OCFS1_VOLUME_SIGNATURE, 762 mlog(ML_ERROR, "incompatible volume signature: %8s\n", 763 hdr->signature);
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/pm8001/ |
H A D | pm8001_hwi.c | 53 pm8001_ha->main_cfg_tbl.signature = pm8001_mr32(address, 0x00); 728 * @signature: signature in host scratch pad0 register. 731 pm8001_chip_soft_rst(struct pm8001_hba_info *pm8001_ha, u32 signature) argument 793 /* set signature in host scratch pad0 register to tell SPC that the 795 pm8001_cw32(pm8001_ha, 0, MSGU_HOST_SCRATCH_PAD_0, signature); 984 if (signature == SPC_SOFT_RESET_SIGNATURE) {
|