Lines Matching defs:Data

35 	} else if (algoid->parameters.Data == NULL ||
44 (void) kmfber_write(asn1, (char *)algoid->parameters.Data,
57 if (data == NULL || data->Data == NULL)
60 free(data->Data);
61 data->Data = NULL;
281 algoid->algorithm.Data = (uchar_t *)algoid_data.bv_val;
283 algoid->parameters.Data = NULL;
294 algoid->algorithm.Data = (uchar_t *)AlgOID.bv_val;
300 algoid->parameters.Data = NULL;
304 algoid->parameters.Data = NULL;
318 algoid->parameters.Data = malloc(size);
319 if (algoid->parameters.Data == NULL) {
324 if (kmfber_read(oidasn1, (char *)algoid->parameters.Data,
343 if (src && dst && src->Data != NULL && src->Length > 0) {
345 dst->Data = malloc(dst->Length);
346 if (dst->Data == NULL)
348 (void) memcpy(dst->Data, src->Data, src->Length);
368 if (kmfber_printf(asn1, "B}", spki->subjectPublicKey.Data,
397 EncodedSPKI->Data = (uchar_t *)result->bv_val;
419 spki->subjectPublicKey.Data = (uchar_t *)bitstr;
429 spki->subjectPublicKey.Data = NULL;
448 if (rawdata->Data == NULL || rawdata->Length == 0)
461 rawdata->Data, n, &rawdata->Data[n], n) == -1) {
471 signature->Data = (uchar_t *)buf->bv_val;
535 buf.bv_val = (char *)encoded->Data;
538 if (encoded == NULL || encoded->Data == NULL ||
542 signature->Data = NULL;
572 signature->Data = malloc(signature->Length);
573 if (signature->Data == NULL) {
577 fixedR.bv_val = (char *)signature->Data;
581 fixedS.bv_val = (char *)(signature->Data + fixedR.bv_len);
625 if (EncodedSPKI == NULL || EncodedSPKI->Data == NULL ||
631 bv.bv_val = (char *)EncodedSPKI->Data;
693 validity->notBefore.time.Data,
695 validity->notAfter.time.Data);
724 validity->notBefore.time.Data = (uchar_t *)t1str;
728 validity->notAfter.time.Data = (uchar_t *)t2str;
791 attrtvpair->value.Data,
1028 newpair.type.Data = (uchar_t *)AttrOID.bv_val;
1031 newpair.value.Data = (uchar_t *)AttrValue;
1063 data->Data = malloc(sizeof (int));
1064 if (data->Data == NULL)
1068 (void) memcpy((void *)data->Data, (const void *)&value, sizeof (int));
1099 id->Data, id->Length * 8) == -1)
1113 v.bv_val = (char *)extns->extensions[i].extnId.Data;
1130 extns->extensions[i].BERvalue.Data,
1240 ex->extnId.Data = (uchar_t *)extOID.bv_val;
1244 ex->BERvalue.Data = (uchar_t *)extValue.bv_val;
1274 ex->value.tagAndValue->value.Data = malloc(size);
1277 (char *)ex->value.tagAndValue->value.Data, size);
1424 tbscert->issuerUniqueIdentifier.Data =
1435 tbscert->subjectUniqueIdentifier.Data =
1472 if (!tbscert || !Value || !Value->Data || !Value->Length)
1475 rawcert.bv_val = (char *)Value->Data;
1523 if (!signed_cert_ptr_ptr || !Value || !Value->Data || !Value->Length)
1526 rawcert.bv_val = (char *)Value->Data;
1574 certptr->signature.encrypted.Data =
1578 certptr->signature.encrypted.Data = NULL;
1605 DerDecodeExtension(KMF_DATA *Data, KMF_X509_EXTENSION **extn)
1611 bv.bv_val = (char *)Data->Data;
1612 bv.bv_len = Data->Length;
1639 bv.bv_val = (char *)encodedname->Data;
1676 encodedname->Data = (uchar_t *)bv->bv_val;
1699 (void) memcpy(&version, tbscert->version.Data,
1783 enc_tbs_cert_ptr->Data = NULL;
1795 enc_tbs_cert_ptr->Data = (uchar_t *)tbsdata->bv_val;
1824 encodedcert->Data = NULL;
1851 if (kmfber_printf(asn1, "B", signature->encrypted.Data,
1868 encodedcert->Data = (uchar_t *)tbsdata->bv_val;
1897 x509.bv_val = (char *)x509cert->Data;
1921 tbscert->Data = malloc(size);
1922 if (tbscert->Data == NULL) {
1929 size = kmfber_read(der, (char *)tbscert->Data, tbscert->Length);
1946 if (kmfber_scanf(der, "B", (char **)&signature->Data,
1976 if (memcmp(oid.bv_val, extension_request_oid.Data,
2056 if (!tbscsr || !Value || !Value->Data || !Value->Length)
2059 rawcsr.bv_val = (char *)Value->Data;
2096 if (!signed_csr_ptr_ptr || !Value || !Value->Data || !Value->Length)
2099 rawcsr.bv_val = (char *)Value->Data;
2145 csrptr->signature.encrypted.Data = (uchar_t *)signature;
2148 csrptr->signature.encrypted.Data = NULL;
2157 if (csrptr->signature.encrypted.Data)
2158 free(csrptr->signature.encrypted.Data);
2277 (void) memcpy(&version, tbscsr->version.Data,
2328 encodedkey->Data = (uchar_t *)dsadata->bv_val;
2366 encodedkey->Data = (uchar_t *)rsadata->bv_val;
2404 if (kmfber_write(asn1, (char *)eckey->params.Data,
2417 encodedkey->Data = (uchar_t *)data->bv_val;
2436 enc_tbs_csr_ptr->Data = NULL;
2451 enc_tbs_csr_ptr->Data = (uchar_t *)tbsdata->bv_val;
2501 if (kmfber_printf(asn1, "B", signature->encrypted.Data,
2518 encodedcsr->Data = (uchar_t *)tbsdata->bv_val;
2542 dst->Data = malloc(src->Length);
2543 if (dst->Data == NULL)
2547 (void) memcpy(dst->Data, src->Data, src->Length);
2573 (char *)pKey->algorithm.parameters.Data;
2582 pKeyParts[KMF_DSA_PRIME].Data = (uchar_t *)P->bv_val;
2584 pKeyParts[KMF_DSA_SUB_PRIME].Data =
2587 pKeyParts[KMF_DSA_BASE].Data = (uchar_t *)G->bv_val;
2596 PubKeyData.bv_val = (char *)pKey->subjectPublicKey.Data;
2607 pKeyParts[KMF_DSA_PUBLIC_VALUE].Data =
2631 PubKeyData.bv_val = (char *)pKey->subjectPublicKey.Data;
2641 pKeyParts[KMF_RSA_MODULUS].Data =
2644 pKeyParts[KMF_RSA_PUBLIC_EXPONENT].Data =