Searched refs:signature (Results 326 - 350 of 372) sorted by relevance

<<1112131415

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/char/
H A Dcyclades.c332 readl(&fw_id->signature) == ZFIRM_ID;
1549 readl(&firm_id->signature) ==
3553 if (__cyz_fpga_loaded(ctl_addr) && readl(&fid->signature) == ZFIRM_ID) {
3623 while ((status = readl(&fid->signature)) != ZFIRM_ID && i++ < 40)
3633 dev_warn(&pdev->dev, "fid->signature = 0x%x... Waiting "
3635 while ((status = readl(&fid->signature)) != ZFIRM_ID &&
3640 "Giving up. (fid->signature = 0x%x)\n",
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Ds3_srvr.c1974 /* send signature algorithm */
2996 /* we now have a signature that we need to verify */
3000 * If key is GOST and n is exactly 64, it is bare signature without
3086 /* bad signature */
3099 /* bad signature */
3108 unsigned char signature[64]; local
3123 fprintf(stderr, "GOST signature length is %d", i);
3126 signature[63 - idx] = p[idx];
3128 j = EVP_PKEY_verify(pctx, signature, 64, s->s3->tmp.cert_verify_md,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/qla2xxx/
H A Dqla_iocb.c438 rsp->ring_ptr->signature != RESPONSE_PROCESSED)
1294 rsp->ring_ptr->signature != RESPONSE_PROCESSED)
1474 rsp->ring_ptr->signature != RESPONSE_PROCESSED)
H A Dqla_init.c1327 ha->fw_dump->signature[0] = 'Q';
1328 ha->fw_dump->signature[1] = 'L';
1329 ha->fw_dump->signature[2] = 'G';
1330 ha->fw_dump->signature[3] = 'C';
1539 pkt->signature = RESPONSE_PROCESSED;
H A Dqla_fw.h1835 uint8_t signature[4]; /* "HQOS" signature of config data */ member in struct:qla_fcp_prio_cfg
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Ds3_srvr.c1974 /* send signature algorithm */
2996 /* we now have a signature that we need to verify */
3000 * If key is GOST and n is exactly 64, it is bare signature without
3086 /* bad signature */
3099 /* bad signature */
3108 unsigned char signature[64]; local
3123 fprintf(stderr, "GOST signature length is %d", i);
3126 signature[63 - idx] = p[idx];
3128 j = EVP_PKEY_verify(pctx, signature, 64, s->s3->tmp.cert_verify_md,
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/sctp/
H A Dsm_make_chunk.c1540 /* Pad out the cookie to a multiple to make the signature
1595 crypto_hash_digest(&desc, &sg, bodysize, cookie->signature))
1656 /* Check the signature. */
1670 if (memcmp(digest, cookie->signature, SCTP_SIGNATURE_SIZE)) {
1680 if (memcmp(digest, cookie->signature, SCTP_SIGNATURE_SIZE)) {
1681 /* Yikes! Still bad signature! */
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/zip30/
H A Dzipfile.c143 # define ZIP64_CENTRAL_DIR_TAIL_SIG 0x06064B50L /* zip64 central dir tail signature */
144 # define ZIP64_CENTRAL_DIR_TAIL_END_SIG 0x07064B50L /* zip64 end of cen dir locator signature */
1914 /* look for signature */
2120 /* Read next signature */
2226 local file header signature 4 bytes (0x04034b50)
2369 /* detect spanning signature */
2381 /* back up 4k blocks and look for End Of CD signature */
2448 zipwarn("missing end signature--probably not a zip file (did you", "");
2454 * Check for a Zip64 EOCD Locator signature - 12/10/04 EG
2467 /* first 4 bytes are the signature i
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/curl/curl-7.36.0/lib/vtls/
H A Dopenssl.c2268 j = asn1_object_dump(cinf->signature->algorithm, bufp, CERTBUFFERSIZE);
2334 X509_signature(data, i, x->signature);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/aic7xxx/
H A Daic7xxx_pci.c1319 * the 'ADPT' signature is found in SCB2.
1493 if (sc->signature == CFSIGNATURE
1494 || sc->signature == CFSIGNATURE2) {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/media/video/cx23885/
H A Dcx23885-417.c779 "or corrupted, signature = 0x%x, cmd = %s\n", value,
871 u32 signature[4] = { local
882 if (value == signature[signaturecnt])
887 dprintk(1, "Mailbox signature found at 0x%x\n", i+1);
891 printk(KERN_ERR "Mailbox signature values not found!\n");
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/
H A Dstex.c273 u32 signature[2]; member in struct:st_drvver
652 ver.signature[0] = PASSTHRU_SIGNATURE;
995 "(%s): no handshake signature\n",
1045 "(%s): no signature after handshake frame\n",
1114 "(%s): no signature after handshake frame\n",
H A Deata_pio.c632 if (cpu_to_be32(EATA_SIGNATURE) != buf->signature)
H A Dips.h767 uint32_t signature; member in struct:__anon14566
H A Dwd7000.c21 * before; namely, by looking for a BIOS signature. Thus, the location of
22 * the BIOS signature determines the board configuration. Until I have
98 * one of the FD boards, it would be nice to come up with a signature
326 typedef struct signature { struct
374 #define SCAN_OGMBS 0xc0 /* start multiple commands, signature (n) */
H A Dips.c2050 if ((le32_to_cpu(ha->nvram->signature) == IPS_NVRAM_P5_SIG) &&
2077 if (le32_to_cpu(ha->nvram->signature) == IPS_NVRAM_P5_SIG) {
5692 /* signature */
5693 if (le32_to_cpu(ha->nvram->signature) != IPS_NVRAM_P5_SIG) {
5695 "(%s%d) NVRAM page 5 has an invalid signature: %X.",
5696 ips_name, ha->host_num, ha->nvram->signature);
5697 ha->nvram->signature = IPS_NVRAM_P5_SIG;
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/libpng/libpng-1.2.50/
H A Dpngget.c384 return(info_ptr->signature);
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/amule/wxWidgets-2.8.12/src/png/
H A Dpngget.c353 return(info_ptr->signature);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/e1000e/
H A Dhw.h716 u32 signature; member in struct:e1000_host_mng_dhcp_cookie
H A Dlib.c41 /* Intel(R) Active Management Technology signature */
2370 * If either the checksums or signature don't match, then
2374 if ((hdr_csum != csum) || (hdr->signature != E1000_IAMT_SIGNATURE)) {
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/wireless/p54/
H A Dp54usb.c502 memcpy(hdr->signature, X2_SIGNATURE, X2_SIGNATURE_SIZE);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/net/sctp/
H A Dstructs.h443 __u8 signature[SCTP_SECRET_SIZE]; member in struct:sctp_signed_cookie
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/net/e1000/
H A De1000_hw.h324 #define E1000_IAMT_SIGNATURE 0x544D4149 /* Intel(R) Active Management Technology signature */
346 u32 signature; member in struct:e1000_host_mng_dhcp_cookie
357 u32 signature; member in struct:e1000_host_mng_dhcp_cookie
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/fs/ocfs2/
H A Dsuper.c760 if (memcmp(hdr->signature, OCFS1_VOLUME_SIGNATURE,
762 mlog(ML_ERROR, "incompatible volume signature: %8s\n",
763 hdr->signature);
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/drivers/scsi/pm8001/
H A Dpm8001_hwi.c53 pm8001_ha->main_cfg_tbl.signature = pm8001_mr32(address, 0x00);
728 * @signature: signature in host scratch pad0 register.
731 pm8001_chip_soft_rst(struct pm8001_hba_info *pm8001_ha, u32 signature) argument
793 /* set signature in host scratch pad0 register to tell SPC that the
795 pm8001_cw32(pm8001_ha, 0, MSGU_HOST_SCRATCH_PAD_0, signature);
984 if (signature == SPC_SOFT_RESET_SIGNATURE) {

Completed in 441 milliseconds

<<1112131415