/freebsd-13-stable/sys/dev/pms/freebsd/driver/common/ |
H A D | lxencrypt.c | 345 i += careful_write(buf, i, PAGE_SIZE, " %u:%u:%u: %x %8x %8x %16lx %16lx %08x:%08x %1x\n", chan, device, lun, p->dekTable, p->dekIndex, p->kekIndex, p->lbaMin, p->lbaMax, p->keyTag[1], p->keyTag[0], p->keyTagCheck); 490 dek_table = dek_map->dekMapEntry[0].dek.dekTable; 536 p->dekTable == dek_table && 561 p->dekTable = dek_table; 866 bit32 dek_table = dek_add->dekTable; 904 printf("%s: Invalidating dek at index 0x%x, table %x\n", __FUNCTION__, dek_to_invalidate->dek.dekIndex, dek_to_invalidate->dek.dekTable); 906 rc = tiCOMEncryptDekInvalidate(tiRoot, dek_to_invalidate->dek.dekTable, dek_to_invalidate->dek.dekIndex); 922 printf("%s: Host %u: Mapping %u:%u:%u (%llx to %llx) to dek at index 0x%x, table %x, keytag %08x:%08x\n", __FUNCTION__, p_dek_map->dekMap[0].host, p_dek_map->dekMap[0].channel, p_dek_map->dekMap[0].device, p_dek_map->dekMap[0].lun, p_dek_map->dekMap[0].dekMapEntry[0].startLBA, p_dek_map->dekMap[0].dekMapEntry[0].endLBA, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekIndex, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekTable, p_dek_map->dekMap[0].keytag[1], p_dek_map->dekMap[0].keytag[0]); 1136 perr->ioerr.dek_table = pccb->tiSuperScsiRequest.Encrypt.dekInfo.dekTable;
|
H A D | encrypt_ioctl.h | 66 bit32 dekTable; member in struct:IoctlEncryptDekAdd_s
|
/freebsd-13-stable/sys/dev/pms/RefTisa/sat/api/ |
H A D | sm.h | 218 bit32 dekTable; member in struct:smEncryptDek
|
/freebsd-13-stable/sys/dev/pms/freebsd/driver/ini/src/ |
H A D | agtiapi.h | 154 dek_table_e dekTable; member in struct:ag_encrypt_map_s
|
/freebsd-13-stable/sys/dev/pms/RefTisa/sallsdk/spc/ |
H A D | saport.c | 1049 * @param dekTable 1061 bit32 dekTable, 1070 SA_DBG2(("saEncryptDekCacheInvalidate,dekTable 0x%x dekIndex 0x%x\n",dekTable,dekIndex)); 1078 (dekTable << SHIFT8) | DEK_MGMT_SUBOP_INVALIDATE); 1057 saEncryptDekCacheInvalidate( agsaRoot_t *agRoot, agsaContext_t *agContext, bit32 queueNum, bit32 dekTable, bit32 dekIndex ) argument
|
H A D | sassp.c | 1112 SA_DBG3(("saSSPStart,ENC dekTable 0x%08X dekIndex 0x%08X\n", 1113 pIRequest->encrypt.dekInfo.dekTable, 1145 encryptFlags |= pIRequest->encrypt.dekInfo.dekTable << SHIFT2;
|
H A D | sasata.c | 408 encryptFlags |= agSATAReq->encrypt.dekInfo.dekTable << SHIFT2;
|
H A D | sampicmd.c | 2873 (agDifEncOffload->encrypt.dekInfo.dekTable & 0x3) << SHIFT2 |
|
/freebsd-13-stable/sys/dev/pms/RefTisa/tisa/api/ |
H A D | tiapi.h | 191 bit32 dekTable,
|
H A D | titypes.h | 314 bit32 dekTable; member in struct:tiEncryptDek
|
/freebsd-13-stable/sys/dev/pms/RefTisa/sallsdk/api/ |
H A D | saapi.h | 626 bit32 dekTable,
|
H A D | sa.h | 2857 bit32 dekTable; member in struct:agsaEncryptDek_s
|
/freebsd-13-stable/sys/dev/pms/RefTisa/tisa/sassata/common/ |
H A D | tdport.c | 5637 * dekTable DEK table that will be affected 5648 bit32 dekTable, 5670 TI_DBG1(("tiCOMEncryptDekInvalidate:dekTable 0x%x dekIndex 0x%x\n", dekTable, dekIndex)); 5672 returnCode = saEncryptDekCacheInvalidate(agRoot, agNULL, 0, dekTable, dekIndex); 5693 tiEncryptDek.dekTable = dekTable; 5647 tiCOMEncryptDekInvalidate(tiRoot_t *tiRoot, bit32 dekTable, bit32 dekIndex) argument
|