/titanic_51/usr/src/uts/common/gssapi/mechs/krb5/krb5/krb/ |
H A D | ser_cksum.c | 65 krb5_checksum *checksum; in krb5_checksum_esize() 73 * checksum->length for contents in krb5_checksum_esize() 77 checksum = (krb5_checksum *) arg; in krb5_checksum_esize() 78 if (checksum) { in krb5_checksum_esize() 83 (size_t) checksum->length); in krb5_checksum_esize() 97 krb5_checksum *checksum; in krb5_checksum_externalize() 107 checksum = (krb5_checksum *) arg; in krb5_checksum_externalize() 108 if (checksum) { in krb5_checksum_externalize() 116 (void) krb5_ser_pack_int32((krb5_int32) checksum->checksum_type, in krb5_checksum_externalize() 120 (void) krb5_ser_pack_int32((krb5_int32) checksum in krb5_checksum_externalize() 64 krb5_checksum *checksum; krb5_checksum_esize() local 95 krb5_checksum *checksum; krb5_checksum_externalize() local 145 krb5_checksum *checksum; krb5_checksum_internalize() local [all...] |
H A D | copy_athctr.c | 59 if (authfrom->checksum && in krb5_copy_authenticator() 60 (retval = krb5_copy_checksum(context, authfrom->checksum, &tempto->checksum))) { in krb5_copy_authenticator() 70 krb5_free_checksum(context, tempto->checksum); in krb5_copy_authenticator() 82 krb5_free_checksum(context, tempto->checksum); in krb5_copy_authenticator()
|
H A D | ser_auth.c | 91 /* Calculate size required by checksum, if appropriate */ in krb5_authenticator_size() 92 if (!kret && authenticator->checksum) in krb5_authenticator_size() 95 (krb5_pointer) authenticator->checksum, in krb5_authenticator_size() 173 /* Now handle checksum, if appropriate */ in krb5_authenticator_externalize() 174 if (!kret && authenticator->checksum) in krb5_authenticator_externalize() 178 authenticator->checksum, in krb5_authenticator_externalize() 283 /* Attempt to read in the checksum */ in krb5_authenticator_internalize() 288 &authenticator->checksum, in krb5_authenticator_internalize()
|
/titanic_51/usr/src/uts/common/fs/zfs/ |
H A D | zio_checksum.c | 39 * In the SPA, everything is checksummed. We support checksum vectors 43 * For SPA metadata, we always want a very strong checksum. 45 * and checksum strength. 56 * Of course, we don't want a checksum upgrade to invalidate existing 57 * data, so we store the checksum *function* in eight bits of the bp. 58 * This gives us room for up to 256 different checksum functions. 60 * When writing a block, we always checksum it with the latest-and-greatest 61 * checksum function of the appropriate strength. When reading a block, 62 * we compare the expected checksum against the actual checksum, whic 230 zio_checksum_template_init(enum zio_checksum checksum,spa_t * spa) zio_checksum_template_init() argument 253 zio_checksum_compute(zio_t * zio,enum zio_checksum checksum,void * data,uint64_t size) zio_checksum_compute() argument 299 uint_t checksum = (bp == NULL ? zio->io_prop.zp_checksum : zio_checksum_error() local 396 for (enum zio_checksum checksum = 0; zio_checksum_templates_free() local [all...] |
/titanic_51/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_req_ext.c | 44 outbuf, ap_req_options, checksum, and ccache are used in the 61 checksum specifies the checksum to be used in the authenticator. 135 krb5_checksum checksum; in krb5_mk_req_extended() local 206 checksum.checksum_type = 0x8003; in krb5_mk_req_extended() 207 checksum.length = in_data->length; in krb5_mk_req_extended() 208 checksum.contents = (krb5_octet *) in_data->data; in krb5_mk_req_extended() 214 in_data, &checksum))) in krb5_mk_req_extended() 217 checksump = &checksum; in krb5_mk_req_extended() 244 (*auth_context)->authentp->checksum in krb5_mk_req_extended() [all...] |
H A D | send_tgs.c | 59 krb5_checksum checksum; in krb5_send_tgs_basic() local 65 /* Generate checksum */ in krb5_send_tgs_basic() 69 in_data, &checksum))) { in krb5_send_tgs_basic() 70 free(checksum.contents); in krb5_send_tgs_basic() 77 authent.checksum = &checksum; in krb5_send_tgs_basic() 82 free(checksum.contents); in krb5_send_tgs_basic() 88 free(checksum.contents); in krb5_send_tgs_basic() 92 free(checksum.contents); in krb5_send_tgs_basic() 247 /* encode the body; then checksum i in krb5_send_tgs2() [all...] |
H A D | rd_safe.c | 69 if (!krb5_c_valid_cksumtype(message->checksum->checksum_type)) { in krb5_rd_safe_basic() 73 if (!krb5_c_is_coll_proof_cksum(message->checksum->checksum_type) || in krb5_rd_safe_basic() 74 !krb5_c_is_keyed_cksum(message->checksum->checksum_type)) { in krb5_rd_safe_basic() 105 /* verify the checksum */ in krb5_rd_safe_basic() 108 * without checksum and then have the cryptographic subsystem verify in krb5_rd_safe_basic() 109 * the checksum for us. This is because some checksum methods have in krb5_rd_safe_basic() 110 * a confounder encrypted as part of the checksum. in krb5_rd_safe_basic() 112 his_cksum = message->checksum; in krb5_rd_safe_basic() 118 message->checksum in krb5_rd_safe_basic() [all...] |
/titanic_51/usr/src/contrib/ast/lib/package/ |
H A D | package.mk | 87 checksum = md5 758 $(SUM) -x $(checksum) < $(source) > $(source:D:B:S=.$(checksum)) 1047 $(SUM) -x $(checksum) < $(source) > $(source:D:B:S=.$(checksum)) 1051 $(SUM) -x $(checksum) < $(old.new.source) > $(old.new.source:D:B:S=.$(checksum)) 1081 $(SUM) -x $(checksum) < $(source) > $(source:D:B:S=.$(checksum)) 1209 $(SUM) -x $(checksum) < [all...] |
/titanic_51/usr/src/contrib/ast/src/cmd/INIT/ |
H A D | package.mk | 87 checksum = md5 758 $(SUM) -x $(checksum) < $(source) > $(source:D:B:S=.$(checksum)) 1047 $(SUM) -x $(checksum) < $(source) > $(source:D:B:S=.$(checksum)) 1051 $(SUM) -x $(checksum) < $(old.new.source) > $(old.new.source:D:B:S=.$(checksum)) 1081 $(SUM) -x $(checksum) < $(source) > $(source:D:B:S=.$(checksum)) 1209 $(SUM) -x $(checksum) < [all...] |
H A D | ditto.sh | 11 # (with md5 checksum b35adb5213ca9657e911e9befb180842) # 52 [c:checksum?Copy if the \btw\b(1) 32x4 checksum mismatches.] 131 typeset checksum='"-"' pax="pax" 145 c) checksum=checksum ;; 163 tw[ntw++]=--expr=\''action:printf("%d\t%d\t%s\t%s\t%s\t%-.1s\t%o\t%s\t%s\n", size, mtime, '$checksum', uid, gid, mode, perm, path, symlink);'\'
|
/titanic_51/usr/src/uts/common/gssapi/mechs/krb5/crypto/arcfour/ |
H A D | k5_arcfour.c | 32 /* checksum + (confounder + inputlen, in even blocksize) */ 84 krb5_data d1, d2, d3, salt, plaintext, checksum, ciphertext, confounder; local 109 * checksum field. 'd2' == 'd1' when not using the exportable 129 * k3 = HMAC(k1, checksum) 170 checksum.length=hashsize; 171 checksum.data=output->data; 220 * Compute the HMAC checksum field. 221 * checksum = HMAC(k1/k2, plaintext); 225 ret = krb5_hmac(context, kptr, &plaintext, &checksum); 227 ret = krb5_hmac(context, hash, kptr, 1, &plaintext, &checksum); 280 krb5_data d1,d2,d3,salt,ciphertext,plaintext,checksum; global() local [all...] |
/titanic_51/usr/src/uts/common/io/ixgbe/core/ |
H A D | ixgbe_x540.c | 474 * ixgbe_calc_eeprom_checksum_X540 - Calculates and returns the checksum 481 * Returns a negative error code on error, or the 16-bit checksum 486 u16 checksum = 0; in ixgbe_calc_eeprom_checksum_X540() local 500 /* Include 0x0-0x3F in the checksum */ in ixgbe_calc_eeprom_checksum_X540() 507 checksum += word; in ixgbe_calc_eeprom_checksum_X540() 542 checksum += word; in ixgbe_calc_eeprom_checksum_X540() 546 checksum = (u16)IXGBE_EEPROM_SUM - checksum; in ixgbe_calc_eeprom_checksum_X540() 548 return (s32)checksum; in ixgbe_calc_eeprom_checksum_X540() 552 * ixgbe_validate_eeprom_checksum_X540 - Validate EEPROM checksum 563 u16 checksum; ixgbe_validate_eeprom_checksum_X540() local 625 u16 checksum; ixgbe_update_eeprom_checksum_X540() local [all...] |
/titanic_51/usr/src/cmd/boot/common/ |
H A D | mboot_extra.c | 43 /* mboot checksum routine. */ 83 /* Found magic signature -- check checksum. */ in find_multiboot() 85 if (mboot->checksum != cksum) { in find_multiboot() 86 BOOT_DEBUG("multiboot magic found at %p, but checksum " in find_multiboot() 88 mboot->checksum, cksum); in find_multiboot() 128 BOOT_DEBUG("Extended information header checksum is %x\n", cksum); in find_einfo() 130 if (cksum != ext_header->checksum) { in find_einfo() 186 ext_hdr->checksum = compute_checksum((char *)dest, ext_hdr->size); in add_einfo()
|
/titanic_51/usr/src/boot/sys/cddl/boot/zfs/ |
H A D | README | 6 fletcher.c checksum support 7 sha256.c checksum support 11 zfssubr.c checksum, compression and raidz support
|
H A D | zfssubr.c | 72 * Signature for checksum functions. 82 /* ZIO embedded checksum */ 93 * Information about each checksum function. 96 /* checksum function for each byteorder */ 227 * Calls the template init function of a checksum which supports context 231 zio_checksum_template_init(enum zio_checksum checksum, const spa_t *spa) in zio_checksum_template_init() argument 233 zio_checksum_info_t *ci = &zio_checksum_table[checksum]; in zio_checksum_template_init() 238 if (spa->spa_cksum_tmpls[checksum] != NULL) in zio_checksum_template_init() 243 if (spa->spa_cksum_tmpls[checksum] == NULL) { in zio_checksum_template_init() 244 spa->spa_cksum_tmpls[checksum] in zio_checksum_template_init() 256 unsigned int checksum; zio_checksum_verify() local [all...] |
/titanic_51/usr/src/boot/sys/boot/uboot/lib/ |
H A D | glue.c | 49 uint32_t checksum; in valid_sig() local 55 * Clear the checksum field (in the local copy) so as to calculate the in valid_sig() 60 s.checksum = 0; in valid_sig() 62 checksum = crc32((void *)&s, sizeof(struct api_signature)); in valid_sig() 64 if (checksum != sig->checksum) in valid_sig()
|
/titanic_51/usr/src/boot/sys/boot/i386/libi386/ |
H A D | pxe.c | 153 uint8_t checksum; in pxe_init() local 174 * do byte checksum: in pxe_init() 177 checksum = 0; in pxe_init() 180 checksum += *checkptr++; in pxe_init() 181 if (checksum != 0) { in pxe_init() 182 printf("PXENV+ structure failed checksum, ignoring\n"); in pxe_init() 189 * the checksum fails. in pxe_init() 198 checksum = 0; in pxe_init() 202 checksum += *checkptr++; in pxe_init() 203 if (checksum ! in pxe_init() [all...] |
/titanic_51/usr/src/test/zfs-tests/tests/functional/rsend/ |
H A D | rsend_012_pos.ksh | 133 rand_set_prop $fs checksum "on" "off" "fletcher2" "fletcher4" "sha256" 136 rand_set_prop $fs checksum "on" "off" "fletcher2" "fletcher4" "sha256" 152 rand_set_prop $vol checksum "on" "off" "fletcher2" "fletcher4" "sha256"
|
/titanic_51/usr/src/test/zfs-tests/tests/functional/cli_user/zfs_list/ |
H A D | setup.ksh | 40 # create datasets and set checksum options 58 log_must $ZFS set checksum=${cksumarray[$index]} \ 61 log_must $ZFS set checksum=${cksumarray[$index]} \
|
/titanic_51/usr/src/test/zfs-tests/tests/functional/nopwrite/ |
H A D | nopwrite_volume.ksh | 47 log_must $ZFS set checksum=sha256 $origin 53 log_must $ZFS set checksum=sha256 $clone
|
H A D | nopwrite_promoted_clone.ksh | 28 # 2. Disable compression and checksum on the clone, and promote it. 46 log_must $ZFS set checksum=sha256 $origin 52 log_must $ZFS set checksum=off $TESTPOOL/clone
|
H A D | nopwrite_negative.ksh | 28 # 2. The file in the origin ds is written before sha256 checksum is turned on. 30 # 4. The clone does not have the appropriate checksum. 50 log_must $ZFS set checksum=sha256 $origin/clone 57 # Data written to origin fs before checksum enabled 61 log_must $ZFS set checksum=sha256 $origin 85 log_must $ZFS clone -o checksum=fletcher4 $origin@a $origin/clone
|
/titanic_51/usr/src/boot/sys/boot/i386/common/ |
H A D | edd.h | 76 uint8_t checksum; member 93 uint8_t checksum; member
|
/titanic_51/usr/src/grub/grub-0.97/stage2/ |
H A D | smp-imps.h | 109 unsigned char checksum; member 124 unsigned char checksum; member
|
/titanic_51/usr/src/cmd/picl/plugins/sun4u/snowbird/lib/libctsmc/ |
H A D | libctsmc.c | 73 #define IPMI_REQ_HDR_LEN 0x8 /* includes command & data checksum */ 89 uint8_t checksum; /* checksum for dest and netfn_lun */ member 191 * checksum - returns a 2-complement check sum 194 checksum(uint8_t buf[], int start, int end) in checksum() function 341 ipmi_header.checksum = checksum(data, 0, 1); in smc_init_ipmi_msg() 454 checksum(req_msg->data, 4, (IPMI_REQ_HDR_LEN-2)+dsize); in smc_send_msg()
|