Lines Matching refs:data

140 		return (gettext("data invalid"));
142 return (gettext("data len range"));
150 return (gettext("encrypted data invalid"));
152 return (gettext("encrypted data len range"));
589 "id-pkcs7-data", "PKCS7 data");
879 ASN1_OBJECT *oid, unsigned char *data, size_t data_len,
895 (unsigned char *) data, data_len)) {
900 pkiDebug("failed to add pkcs7 data\n");
923 unsigned char *data, unsigned int data_len,
936 data, data_len, &p7);
952 /* DER encode PKCS7 data */
979 unsigned char *data,
1015 /* start creating PKCS7 data */
1113 abuf = data;
1120 EVP_DigestUpdate(&ctx, data, data_len);
1228 /* start on adding data to the pkcs7 signed */
1236 if (!ASN1_OCTET_STRING_set(pkinit_data->value.octet_string, data,
1242 pkiDebug("failed to add pkcs7 data\n");
1266 /* DER encode PKCS7 data */
1330 unsigned char **data,
1368 /* Do this early enough to create the shadow OID for pkcs7-data if needed */
1383 /* Handle the case in pkinit anonymous where we get unsigned data. */
1404 *data = d;
1596 print_buffer(etype->data,
1619 /* transfer the data from CMS message into return buffer */
1623 if ((*data = realloc(*data, size + 1024 * 10)) == NULL)
1625 remain = BIO_read(out, &((*data)[size]), 1024 * 10);
1635 /* generate authorization data */
1655 print_buffer_bin((unsigned char *)authz->data, authz->length,
1663 (void) memcpy(*authz_data, authz->data, authz->length);
1737 pkiDebug("failed to create pkcs7 signed data\n");
1834 unsigned char **data,
1911 * If this is the RFC style, wrap the signed data to make
1918 * The Longhorn server returns the expected RFC-style data, but
1963 data, data_len, NULL, NULL, NULL);
2067 name.data = (char *)gen->d.otherName->value->value.sequence->data;
2072 print_buffer_bin((unsigned char *)name.data, name.length,
2086 ret = krb5_parse_name(context, name.data, &upns[u]);
2104 __FUNCTION__, gen->d.dNSName->data);
2106 strdup((char *)gen->d.dNSName->data);
2315 random_data.data = (char *)buf;
2417 * data element
2467 unsigned char *data = NULL;
2473 &data, &data_len) != 0) {
2486 p = data;
2504 if (data != NULL)
2505 free (data);
2515 if (data != NULL)
2516 free (data);
2535 tmp = dh_params->data;
2588 unsigned char *data,
2612 p = data;
2643 * data element
2753 ai.data = NULL;
2762 if (ai.data != NULL) {
2763 OPENSSL_free(ai.data);
2764 ai.data = NULL;
2775 if (ai.data != NULL) {
2776 OPENSSL_free(ai.data);
2777 ai.data = NULL;
2789 if (ai.data != NULL) {
2790 OPENSSL_free(ai.data);
2791 ai.data = NULL;
2812 krb5_data *td_certifiers = NULL, *data = NULL;
2843 print_buffer_bin((unsigned char *)td_certifiers->data,
2859 typed_data[0]->data = (unsigned char *)td_certifiers->data;
2861 &data);
2867 print_buffer_bin((unsigned char *)data->data, data->length,
2871 (*out_data)->length = data->length;
2872 (*out_data)->data = (char *)malloc(data->length);
2873 (void) memcpy((*out_data)->data, data->data, data->length);
2881 if (data != NULL) {
2882 if (data->data != NULL)
2883 free(data->data);
2884 free(data);
2943 krb5_data *data = NULL, *encoded_algId = NULL;
2980 algId[0]->parameters.data = (unsigned char *)malloc(buf2_len);
2981 if (algId[0]->parameters.data == NULL)
2983 (void) memcpy(algId[0]->parameters.data, buf2, buf2_len);
2990 algId[1]->parameters.data = (unsigned char *)malloc(buf3_len);
2991 if (algId[1]->parameters.data == NULL)
2993 (void) memcpy(algId[1]->parameters.data, buf3, buf3_len);
3000 algId[2]->parameters.data = (unsigned char *)malloc(buf1_len);
3001 if (algId[2]->parameters.data == NULL)
3003 (void) memcpy(algId[2]->parameters.data, buf1, buf1_len);
3015 algId[0]->parameters.data = (unsigned char *)malloc(buf2_len);
3016 if (algId[0]->parameters.data == NULL)
3018 (void) memcpy(algId[0]->parameters.data, buf2, buf2_len);
3025 algId[1]->parameters.data = (unsigned char *)malloc(buf3_len);
3026 if (algId[1]->parameters.data == NULL)
3028 (void) memcpy(algId[1]->parameters.data, buf3, buf3_len);
3040 algId[0]->parameters.data = (unsigned char *)malloc(buf3_len);
3041 if (algId[0]->parameters.data == NULL)
3043 (void) memcpy(algId[0]->parameters.data, buf3, buf3_len);
3052 print_buffer_bin((unsigned char *)encoded_algId->data,
3068 typed_data[0]->data = (unsigned char *)encoded_algId->data;
3070 &data);
3076 print_buffer_bin((unsigned char *)data->data, data->length,
3082 (*out_data)->length = data->length;
3083 (*out_data)->data = (char *)malloc(data->length);
3084 if ((*out_data)->data == NULL) {
3089 (void) memcpy((*out_data)->data, data->data, data->length);
3100 if (data != NULL) {
3101 if (data->data != NULL)
3102 free(data->data);
3103 free(data);
3112 if (algId[i]->parameters.data != NULL)
3113 free(algId[i]->parameters.data);
3209 memcmp(algId[i]->algorithm.data, dh_oid.data, dh_oid.length))
3212 tmp = algId[i]->parameters.data;
3328 pkiDebug("%s: Creating shadow instance of pkcs7-data oid\n",
3330 nid = OBJ_create("1.2.840.113549.1.7.1", "id-pkcs7-data",
3331 "PKCS7 data");
3353 wrap_signeddata(unsigned char *data, unsigned int data_len,
3365 /* Get length to wrap the original data with SEQUENCE tag */
3389 memcpy(p, data, data_len);
3401 wrap_signeddata(unsigned char *data, unsigned int data_len,
3419 /* Get length to wrap the original data with SEQUENCE tag */
3444 (void) memcpy(p, data, data_len);
3454 wrap_signeddata(unsigned char *data, unsigned int data_len,
3462 /* Get length to wrap the original data with SEQUENCE tag */
3480 (void) memcpy(p, data, data_len);
3637 rdat.data = NULL;
3640 if ((rdat.data = strdup(id_cryptoctx->PIN)) == NULL)
3675 rdat.data = malloc(tip->ulMaxPinLen + 2);
3688 (u_char *) rdat.data, rdat.length);
3702 if (rdat.data) {
3703 (void) memset(rdat.data, 0, rdat.length);
3704 free(rdat.data);
3738 reply.data = tmpbuf;
3790 reply.data = tmpbuf;
3871 char *cp = reply.data;
3878 tmpchoice = (int) strtol(reply.data, (char **)NULL, 10);
4686 unsigned char *data,
4691 if (decode_data(decoded_data, decoded_data_len, data, data_len,
4694 pkiDebug("failed to decode data\n");
4723 unsigned char *data,
4772 pkiDebug("session %x edata %x edata_len %d data %x datalen @%x %d\n",
4773 (int) id_cryptoctx->session, (int) data, (int) data_len, (int) cp,
4775 if ((r = pkinit_C_Decrypt(id_cryptoctx, data, (CK_ULONG) data_len,
4778 if ((r = id_cryptoctx->p11->C_Decrypt(id_cryptoctx->session, data,
4797 unsigned char *data,
4805 retval = pkinit_decode_data_fs(context, id_cryptoctx, data, data_len,
4809 retval = pkinit_decode_data_pkcs11(context, id_cryptoctx, data,
4820 unsigned char *data,
4825 if (create_signature(sig, sig_len, data, data_len,
4837 unsigned char *data,
4890 r = id_cryptoctx->p11->C_Sign(id_cryptoctx->session, data,
4896 r = id_cryptoctx->p11->C_Sign(id_cryptoctx->session, data,
4914 unsigned char *data,
4922 retval = pkinit_sign_data_fs(context, id_cryptoctx, data, data_len,
4926 retval = pkinit_sign_data_pkcs11(context, id_cryptoctx, data, data_len,
4936 unsigned char *data, unsigned int data_len,
4959 len = EVP_PKEY_decrypt_old(buf, data, (int)data_len, pkey);
4961 len = EVP_PKEY_decrypt(buf, data, (int)data_len, pkey);
4964 pkiDebug("unable to decrypt received data (len=%d)\n", data_len);
4977 unsigned char *data, unsigned int data_len, EVP_PKEY *pkey)
4987 EVP_SignUpdate(&md_ctx, data, data_len);
5096 rdat.data = id_cryptoctx->PIN;
5100 rdat.data = prompt_reply;
5122 ret = PKCS12_parse(p12, rdat.data, &y, &x, NULL);
5816 /* get the san data */
5853 /* get the KU and EKU data */
6263 krb5_cas[i]->subjectName.data = NULL;
6267 if ((p = krb5_cas[i]->subjectName.data = (unsigned char *)malloc((size_t) len)) == NULL)
6275 krb5_cas[i]->issuerAndSerialNumber.data = NULL;
6285 if ((p = krb5_cas[i]->issuerAndSerialNumber.data =
6297 krb5_cas[i]->subjectKeyIdentifier.data = NULL;
6309 if ((p = krb5_cas[i]->subjectKeyIdentifier.data =
6399 loids[0]->parameters.data = NULL;
6471 krb5_cas[i]->u.caName.data = NULL;
6475 if ((p = krb5_cas[i]->u.caName.data =
6483 krb5_cas[i]->u.issuerAndSerial.data = NULL;
6490 if ((p = krb5_cas[i]->u.issuerAndSerial.data =
6558 BIO *data)
6582 BIO_write(data, buf, i);
6616 if (krb5_trusted_certifiers[i]->subjectName.data != NULL) {
6617 p = krb5_trusted_certifiers[i]->subjectName.data;
6630 if (krb5_trusted_certifiers[i]->issuerAndSerialNumber.data != NULL) {
6631 p = krb5_trusted_certifiers[i]->issuerAndSerialNumber.data;
6646 if (krb5_trusted_certifiers[i]->subjectKeyIdentifier.data != NULL) {
6647 p = krb5_trusted_certifiers[i]->subjectKeyIdentifier.data;
6811 bio = BIO_new_mem_buf(data_body->data, data_body->length);
6836 der_decode_data(unsigned char *data, long data_len,
6842 const unsigned char *p = data;
6851 (void) memcpy(*out, s->data, (size_t) s->length);