Lines Matching refs:Length

36 	    algoid->parameters.Length == 0) {
45 algoid->parameters.Length, 0);
62 data->Length = 0;
282 algoid->algorithm.Length = algoid_data.bv_len;
284 algoid->parameters.Length = 0;
295 algoid->algorithm.Length = AlgOID.bv_len;
301 algoid->parameters.Length = 0;
305 algoid->parameters.Length = 0;
329 algoid->parameters.Length = size;
343 if (src && dst && src->Data != NULL && src->Length > 0) {
344 dst->Length = src->Length;
345 dst->Data = malloc(dst->Length);
348 (void) memcpy(dst->Data, src->Data, src->Length);
369 spki->subjectPublicKey.Length * 8) == -1)
398 EncodedSPKI->Length = result->bv_len;
420 spki->subjectPublicKey.Length = size / 8;
430 spki->subjectPublicKey.Length = 0;
448 if (rawdata->Data == NULL || rawdata->Length == 0)
459 n = rawdata->Length/2;
472 signature->Length = buf->bv_len;
536 buf.bv_len = encoded->Length;
543 signature->Length = 0;
552 signature->Length = R->bv_len + S->bv_len;
568 signature->Length++;
570 signature->Length++;
572 signature->Data = malloc(signature->Length);
632 bv.bv_len = EncodedSPKI->Length;
725 validity->notBefore.time.Length = strlen(t1str);
729 validity->notAfter.time.Length = strlen(t2str);
792 attrtvpair->value.Length) == -1) {
1029 newpair.type.Length = AttrOID.bv_len;
1032 newpair.value.Length = strlen(AttrValue);
1067 data->Length = sizeof (int);
1097 kmfber_calc_lenlen(id->Length * 8) + id->Length;
1099 id->Data, id->Length * 8) == -1)
1114 v.bv_len = extns->extensions[i].extnId.Length;
1131 extns->extensions[i].BERvalue.Length) == -1) {
1241 ex->extnId.Length = extOID.bv_len;
1245 ex->BERvalue.Length = extValue.bv_len;
1275 ex->value.tagAndValue->value.Length = size;
1278 if (size != ex->value.tagAndValue->value.Length) {
1426 tbscert->issuerUniqueIdentifier.Length =
1437 tbscert->subjectUniqueIdentifier.Length =
1472 if (!tbscert || !Value || !Value->Data || !Value->Length)
1476 rawcert.bv_len = Value->Length;
1523 if (!signed_cert_ptr_ptr || !Value || !Value->Data || !Value->Length)
1527 rawcert.bv_len = Value->Length;
1576 certptr->signature.encrypted.Length = size / 8;
1579 certptr->signature.encrypted.Length = 0;
1612 bv.bv_len = Data->Length;
1640 bv.bv_len = encodedname->Length;
1677 encodedname->Length = bv->bv_len;
1696 if (tbscert->version.Length > sizeof (int))
1700 tbscert->version.Length);
1736 if (tbscert->issuerUniqueIdentifier.Length > 0) {
1743 if (tbscert->subjectUniqueIdentifier.Length > 0) {
1784 enc_tbs_cert_ptr->Length = 0;
1796 enc_tbs_cert_ptr->Length = tbsdata->bv_len;
1825 encodedcert->Length = 0;
1850 if (signature->encrypted.Length > 0) {
1852 signature->encrypted.Length * 8) == -1) {
1869 encodedcert->Length = tbsdata->bv_len;
1898 x509.bv_len = x509cert->Length;
1926 tbscert->Length = size;
1929 size = kmfber_read(der, (char *)tbscert->Data, tbscert->Length);
1930 if (size != tbscert->Length) {
1947 (ber_len_t *)&signature->Length) == -1) {
1952 signature->Length = signature->Length / 8;
2056 if (!tbscsr || !Value || !Value->Data || !Value->Length)
2060 rawcsr.bv_len = Value->Length;
2096 if (!signed_csr_ptr_ptr || !Value || !Value->Data || !Value->Length)
2100 rawcsr.bv_len = Value->Length;
2146 csrptr->signature.encrypted.Length = size / 8;
2149 csrptr->signature.encrypted.Length = 0;
2278 tbscsr->version.Length);
2329 encodedkey->Length = dsadata->bv_len;
2367 encodedkey->Length = rsadata->bv_len;
2400 if (kmfber_printf(asn1, "l", eckey->params.Length) == -1) {
2405 eckey->params.Length, 0) == -1) {
2418 encodedkey->Length = data->bv_len;
2437 enc_tbs_csr_ptr->Length = 0;
2452 enc_tbs_csr_ptr->Length = tbsdata->bv_len;
2500 if (signature->encrypted.Length > 0) {
2502 signature->encrypted.Length * 8) == -1) {
2519 encodedcsr->Length = tbsdata->bv_len;
2542 dst->Data = malloc(src->Length);
2546 dst->Length = src->Length;
2547 (void) memcpy(dst->Data, src->Data, src->Length);
2574 PubKeyParams.bv_len = pKey->algorithm.parameters.Length;
2583 pKeyParts[KMF_DSA_PRIME].Length = P->bv_len;
2586 pKeyParts[KMF_DSA_SUB_PRIME].Length = Q->bv_len;
2588 pKeyParts[KMF_DSA_BASE].Length = G->bv_len;
2597 PubKeyData.bv_len = pKey->subjectPublicKey.Length;
2609 pKeyParts[KMF_DSA_PUBLIC_VALUE].Length = PubKey->bv_len;
2632 PubKeyData.bv_len = pKey->subjectPublicKey.Length;
2643 pKeyParts[KMF_RSA_MODULUS].Length = Mod->bv_len;
2646 pKeyParts[KMF_RSA_PUBLIC_EXPONENT].Length = Exp->bv_len;