Lines Matching defs:Data

36 	} else if (algoid->parameters.Data == NULL ||
45 (void) kmfber_write(asn1, (char *)algoid->parameters.Data,
58 if (data == NULL || data->Data == NULL)
61 free(data->Data);
62 data->Data = NULL;
266 algoid->algorithm.Data = (uchar_t *)algoid_data.bv_val;
268 algoid->parameters.Data = NULL;
278 algoid->algorithm.Data = (uchar_t *)AlgOID.bv_val;
284 algoid->parameters.Data = NULL;
288 algoid->parameters.Data = NULL;
302 algoid->parameters.Data = malloc(size);
303 if (algoid->parameters.Data == NULL) {
308 if (kmfber_read(oidasn1, (char *)algoid->parameters.Data,
327 if (src && dst && src->Data != NULL && src->Length > 0) {
329 dst->Data = malloc(dst->Length);
330 if (dst->Data == NULL)
332 (void) memcpy(dst->Data, src->Data, src->Length);
352 if (kmfber_printf(asn1, "B}", spki->subjectPublicKey.Data,
381 EncodedSPKI->Data = (uchar_t *)result->bv_val;
403 spki->subjectPublicKey.Data = (uchar_t *)bitstr;
413 spki->subjectPublicKey.Data = NULL;
432 if (rawdata->Data == NULL || rawdata->Length == 0)
445 rawdata->Data, n, &rawdata->Data[n], n) == -1) {
455 signature->Data = (uchar_t *)buf->bv_val;
519 buf.bv_val = (char *)encoded->Data;
522 if (encoded == NULL || encoded->Data == NULL ||
526 signature->Data = NULL;
556 signature->Data = malloc(signature->Length);
557 if (signature->Data == NULL) {
561 fixedR.bv_val = (char *)signature->Data;
565 fixedS.bv_val = (char *)(signature->Data + fixedR.bv_len);
609 if (EncodedSPKI == NULL || EncodedSPKI->Data == NULL ||
615 bv.bv_val = (char *)EncodedSPKI->Data;
677 validity->notBefore.time.Data,
679 validity->notAfter.time.Data);
708 validity->notBefore.time.Data = (uchar_t *)t1str;
712 validity->notAfter.time.Data = (uchar_t *)t2str;
773 attrtvpair->value.Data,
960 newpair->type.Data = (uchar_t *)AttrOID.bv_val;
963 newpair->value.Data = (uchar_t *)AttrValue;
987 data->Data = malloc(sizeof (int));
988 if (data->Data == NULL)
992 (void) memcpy((void *)data->Data, (const void *)&value, sizeof (int));
1023 id->Data, id->Length * 8) == -1)
1037 v.bv_val = (char *)extns->extensions[i].extnId.Data;
1054 extns->extensions[i].BERvalue.Data,
1164 ex->extnId.Data = (uchar_t *)extOID.bv_val;
1168 ex->BERvalue.Data = (uchar_t *)extValue.bv_val;
1198 ex->value.tagAndValue->value.Data = malloc(size);
1201 (char *)ex->value.tagAndValue->value.Data, size);
1348 tbscert->issuerUniqueIdentifier.Data =
1359 tbscert->subjectUniqueIdentifier.Data =
1396 if (!tbscert || !Value || !Value->Data || !Value->Length)
1399 rawcert.bv_val = (char *)Value->Data;
1447 if (!signed_cert_ptr_ptr || !Value || !Value->Data || !Value->Length)
1450 rawcert.bv_val = (char *)Value->Data;
1498 certptr->signature.encrypted.Data =
1502 certptr->signature.encrypted.Data = NULL;
1529 DerDecodeExtension(KMF_DATA *Data, KMF_X509_EXTENSION **extn)
1535 bv.bv_val = (char *)Data->Data;
1536 bv.bv_len = Data->Length;
1563 bv.bv_val = (char *)encodedname->Data;
1600 encodedname->Data = (uchar_t *)bv->bv_val;
1623 (void) memcpy(&version, tbscert->version.Data,
1707 enc_tbs_cert_ptr->Data = NULL;
1719 enc_tbs_cert_ptr->Data = (uchar_t *)tbsdata->bv_val;
1748 encodedcert->Data = NULL;
1775 if (kmfber_printf(asn1, "B", signature->encrypted.Data,
1792 encodedcert->Data = (uchar_t *)tbsdata->bv_val;
1821 x509.bv_val = (char *)x509cert->Data;
1845 tbscert->Data = malloc(size);
1846 if (tbscert->Data == NULL) {
1853 size = kmfber_read(der, (char *)tbscert->Data, tbscert->Length);
1870 if (kmfber_scanf(der, "B", (char **)&signature->Data,
1900 if (memcmp(oid.bv_val, extension_request_oid.Data,
1980 if (!tbscsr || !Value || !Value->Data || !Value->Length)
1983 rawcsr.bv_val = (char *)Value->Data;
2020 if (!signed_csr_ptr_ptr || !Value || !Value->Data || !Value->Length)
2023 rawcsr.bv_val = (char *)Value->Data;
2069 csrptr->signature.encrypted.Data = (uchar_t *)signature;
2072 csrptr->signature.encrypted.Data = NULL;
2081 if (csrptr->signature.encrypted.Data)
2082 free(csrptr->signature.encrypted.Data);
2201 (void) memcpy(&version, tbscsr->version.Data,
2252 encodedkey->Data = (uchar_t *)dsadata->bv_val;
2290 encodedkey->Data = (uchar_t *)rsadata->bv_val;
2328 if (kmfber_write(asn1, (char *)eckey->params.Data,
2341 encodedkey->Data = (uchar_t *)data->bv_val;
2360 enc_tbs_csr_ptr->Data = NULL;
2375 enc_tbs_csr_ptr->Data = (uchar_t *)tbsdata->bv_val;
2425 if (kmfber_printf(asn1, "B", signature->encrypted.Data,
2442 encodedcsr->Data = (uchar_t *)tbsdata->bv_val;
2466 dst->Data = malloc(src->Length);
2467 if (dst->Data == NULL)
2471 (void) memcpy(dst->Data, src->Data, src->Length);
2497 (char *)pKey->algorithm.parameters.Data;
2506 pKeyParts[KMF_DSA_PRIME].Data = (uchar_t *)P->bv_val;
2508 pKeyParts[KMF_DSA_SUB_PRIME].Data =
2511 pKeyParts[KMF_DSA_BASE].Data = (uchar_t *)G->bv_val;
2520 PubKeyData.bv_val = (char *)pKey->subjectPublicKey.Data;
2531 pKeyParts[KMF_DSA_PUBLIC_VALUE].Data =
2555 PubKeyData.bv_val = (char *)pKey->subjectPublicKey.Data;
2565 pKeyParts[KMF_RSA_MODULUS].Data =
2568 pKeyParts[KMF_RSA_PUBLIC_EXPONENT].Data =