/freebsd-11.0-release/sys/dev/pms/freebsd/driver/common/ |
H A D | lxencrypt.c | 344 if(p->dekIndex != DEK_INDEX_INVALID) 345 i += careful_write(buf, i, PAGE_SIZE, " %u:%u:%u: %x %8x %8x %16lx %16lx %08x:%08x %1x\n", chan, device, lun, p->dekTable, p->dekIndex, p->kekIndex, p->lbaMin, p->lbaMax, p->keyTag[1], p->keyTag[0], p->keyTagCheck); 491 dek_index = dek_map->dekMapEntry[0].dek.dekIndex; 537 p->dekIndex == dek_index && 562 p->dekIndex = dek_index; 865 bit32 dek_index = dek_add->dekIndex; 904 printf("%s: Invalidating dek at index 0x%x, table %x\n", __FUNCTION__, dek_to_invalidate->dek.dekIndex, dek_to_invalidate->dek.dekTable); 906 rc = tiCOMEncryptDekInvalidate(tiRoot, dek_to_invalidate->dek.dekTable, dek_to_invalidate->dek.dekIndex); 922 printf("%s: Host %u: Mapping %u:%u:%u (%llx to %llx) to dek at index 0x%x, table %x, keytag %08x:%08x\n", __FUNCTION__, p_dek_map->dekMap[0].host, p_dek_map->dekMap[0].channel, p_dek_map->dekMap[0].device, p_dek_map->dekMap[0].lun, p_dek_map->dekMap[0].dekMapEntry[0].startLBA, p_dek_map->dekMap[0].dekMapEntry[0].endLBA, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekIndex, p_dek_map->dekMap[0].dekMapEntry[0].dek.dekTable, p_dek_map->dekMap[0].keytag[1], p_dek_map->dekMap[0].keytag[0]); 1135 perr->ioerr.dek_index = pccb->tiSuperScsiRequest.Encrypt.dekInfo.dekIndex; [all...] |
H A D | encrypt_ioctl.h | 67 bit32 dekIndex; member in struct:IoctlEncryptDekAdd_s
|
/freebsd-11.0-release/sys/dev/pms/RefTisa/sallsdk/spc/ |
H A D | saport.c | 968 * @param dekIndex 981 bit32 dekIndex, 997 SA_DBG2(("saEncryptDekCacheUpdate, dekIndex 0x%x dekNumberOfEntries 0x%x dekBlobFormat 0x%x dekTableKeyEntrySize 0x%x\n", 998 dekIndex, 1013 OSSA_OFFSET_OF(agsaDekManagementCmd_t, dekIndex), 1014 dekIndex); 1052 * @param dekIndex 1062 bit32 dekIndex 1070 SA_DBG2(("saEncryptDekCacheInvalidate,dekTable 0x%x dekIndex 0x%x\n",dekTable,dekIndex)); 973 saEncryptDekCacheUpdate( agsaRoot_t *agRoot, agsaContext_t *agContext, bit32 queueNum, bit32 kekIndex, bit32 dekTableSelect, bit32 dekAddrHi, bit32 dekAddrLo, bit32 dekIndex, bit32 dekNumberOfEntries, bit32 dekBlobFormat, bit32 dekTableKeyEntrySize ) argument [all...] |
H A D | sampidefs.h | 1753 bit32 dekIndex; member in struct:agsaDekManagementCmd_s 1764 bit32 dekIndex; member in struct:agsaDekManagementRsp_s
|
H A D | sassp.c | 1112 SA_DBG3(("saSSPStart,ENC dekTable 0x%08X dekIndex 0x%08X\n", 1114 pIRequest->encrypt.dekInfo.dekIndex)); 1149 encryptFlags |= (pIRequest->encrypt.dekInfo.dekIndex & 0xFFFFFF) << SHIFT8;
|
H A D | sasata.c | 410 encryptFlags |= (agSATAReq->encrypt.dekInfo.dekIndex & 0xFFFFFF) << SHIFT8;
|
H A D | sampicmd.c | 2414 agDekMgmt->dekIndex, 2872 dw14 = agDifEncOffload->encrypt.dekInfo.dekIndex << SHIFT8 |
|
H A D | sampirsp.c | 7196 bit32 flags, status, errorQualifier, tag, dekIndex; local 7206 OSSA_READ_LE_32(AGROOT, &dekIndex, pIomb, OSSA_OFFSET_OF(agsaDekManagementRsp_t, dekIndex)); 7212 SA_DBG2(("mpiDekManagementRsp:dekIndex =0x%x\n",dekIndex )); 7233 agEvent.param = (void *) (bitptr) dekIndex;
|
/freebsd-11.0-release/sys/dev/pms/RefTisa/sat/api/ |
H A D | sm.h | 219 bit32 dekIndex; member in struct:smEncryptDek
|
/freebsd-11.0-release/sys/dev/pms/RefTisa/tisa/api/ |
H A D | tiapi.h | 183 bit32 dekIndex, 192 bit32 dekIndex
|
H A D | titypes.h | 315 bit32 dekIndex; member in struct:tiEncryptDek
|
/freebsd-11.0-release/sys/dev/pms/RefTisa/sallsdk/api/ |
H A D | saapi.h | 616 bit32 dekIndex, 627 bit32 dekIndex
|
H A D | sa.h | 2858 bit32 dekIndex; member in struct:agsaEncryptDek_s
|
/freebsd-11.0-release/sys/dev/pms/freebsd/driver/ini/src/ |
H A D | agtiapi.h | 155 bit32 dekIndex; member in struct:ag_encrypt_map_s
|
/freebsd-11.0-release/sys/dev/pms/RefTisa/tisa/sassata/common/ |
H A D | tdport.c | 5556 * dekIndex: Number of the first entry in the DEK table that will inserted in the cache 5571 bit32 dekIndex, 5606 dekIndex, 5638 * dekIndex: DEK table entry that will be affected. The value 0xfffffff clears the cache. 5649 bit32 dekIndex) 5670 TI_DBG1(("tiCOMEncryptDekInvalidate:dekTable 0x%x dekIndex 0x%x\n", dekTable, dekIndex)); 5672 returnCode = saEncryptDekCacheInvalidate(agRoot, agNULL, 0, dekTable, dekIndex); 5694 tiEncryptDek.dekIndex = dekIndex; 5566 tiCOMEncryptDekAdd(tiRoot_t *tiRoot, bit32 kekIndex, bit32 dekTableSelect, bit32 dekAddrHi, bit32 dekAddrLo, bit32 dekIndex, bit32 dekNumberOfEntries, bit32 dekBlobFormat, bit32 dekTableKeyEntrySize ) argument 5647 tiCOMEncryptDekInvalidate(tiRoot_t *tiRoot, bit32 dekTable, bit32 dekIndex) argument [all...] |