/osnet-11/usr/src/lib/libntfs/common/include/ntfs/ |
H A D | index.h | 45 * @data_len: length in bytes of @data 63 * @entry is the index entry described by this context. @data and @data_len 92 u16 data_len; member in struct:__anon2037
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | dig_mgr.c | 417 CK_ULONG data_len) 430 SHA1Update(ctx->context.sha1ctx, data, data_len); 434 MD5Update(ctx->context.md5ctx, data, data_len); 414 digest_mgr_digest_update(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *data, CK_ULONG data_len) argument
|
H A D | asn1.c | 299 CK_ULONG data_len) 305 * if data_len < 127 use short form length id 306 * if data_len < 256 use long form length id with 308 * if data_len < 65536 use long form length id with 310 * if data_len < 16777216 use long form length id 313 if (data_len < 128) 314 len = 1 + 1 + data_len; 315 else if (data_len < 256) 316 len = 1 + (1 + 1) + data_len; 317 else if (data_len < ( 295 ber_encode_INTEGER(CK_BBOOL length_only, CK_BYTE ** ber_int, CK_ULONG * ber_int_len, CK_BYTE * data, CK_ULONG data_len) argument 384 ber_decode_INTEGER(CK_BYTE * ber_int, CK_BYTE ** data, CK_ULONG * data_len, CK_ULONG * field_len) argument 445 ber_encode_OCTET_STRING(CK_BBOOL length_only, CK_BYTE ** str, CK_ULONG * str_len, CK_BYTE * data, CK_ULONG data_len) argument 535 ber_decode_OCTET_STRING(CK_BYTE * str, CK_BYTE ** data, CK_ULONG * data_len, CK_ULONG * field_len) argument 597 ber_encode_SEQUENCE(CK_BBOOL length_only, CK_BYTE ** seq, CK_ULONG * seq_len, CK_BYTE * data, CK_ULONG data_len) argument 677 ber_decode_SEQUENCE(CK_BYTE * seq, CK_BYTE ** data, CK_ULONG * data_len, CK_ULONG * field_len) argument 747 ber_encode_PrivateKeyInfo(CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len, CK_BYTE * algorithm_id, CK_ULONG algorithm_id_len, CK_BYTE * priv_key, CK_ULONG priv_key_len) argument 828 ber_decode_PrivateKeyInfo(CK_BYTE * data, CK_ULONG data_len, CK_BYTE ** algorithm, CK_ULONG * alg_len, CK_BYTE ** priv_key) argument 879 ber_encode_RSAPrivateKey(CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len, CK_ATTRIBUTE * modulus, CK_ATTRIBUTE * publ_exp, CK_ATTRIBUTE * priv_exp, CK_ATTRIBUTE * prime1, CK_ATTRIBUTE * prime2, CK_ATTRIBUTE * exponent1, CK_ATTRIBUTE * exponent2, CK_ATTRIBUTE * coeff) argument 1049 ber_decode_RSAPrivateKey(CK_BYTE * data, CK_ULONG data_len, CK_ATTRIBUTE ** modulus, CK_ATTRIBUTE ** publ_exp, CK_ATTRIBUTE ** priv_exp, CK_ATTRIBUTE ** prime1, CK_ATTRIBUTE ** prime2, CK_ATTRIBUTE ** exponent1, CK_ATTRIBUTE ** exponent2, CK_ATTRIBUTE ** coeff) argument [all...] |
H A D | key_mgr.c | 244 CK_ULONG data_len; local 301 &data, &data_len); 309 length_only, &data, &data_len); 337 ctx, data, data_len, wrapped_key, wrapped_key_len); 361 CK_ULONG data_len; local 430 data, &data_len); 434 data = (CK_BYTE *)malloc(data_len); 442 data, &data_len); 463 rc = key_mgr_get_private_key_type(data, data_len, &keytype); 479 data_len, fromen [all...] |
H A D | sess_mgr.c | 765 CK_ULONG *data_len) { 790 op_data->data_len = op_data_len - 831 op_data->data_len = op_data_len - 872 op_data->data_len = op_data_len - 912 op_data->data_len = op_data_len - 952 op_data->data_len = op_data_len - 980 *data_len = op_data_len; 1017 if (len != op_data->data_len) { 1060 if (len != op_data->data_len) { 1102 if (len != op_data->data_len) { 762 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument [all...] |
H A D | utility.c | 501 CK_ULONG data_len, 505 attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) + data_len); 510 attr->ulValueLen = data_len; 512 if (data_len > 0) { 514 (void) memcpy(attr->pValue, data, data_len); 527 UINT32 data_len, 533 pad_len = block_size - (data_len % block_size); 536 if (data_len + pad_len > total_len) { 549 UINT32 *data_len) 556 *data_len 499 build_attribute(CK_ATTRIBUTE_TYPE type, CK_BYTE *data, CK_ULONG data_len, CK_ATTRIBUTE **attrib) argument 525 add_pkcs_padding(CK_BYTE * ptr, UINT32 block_size, UINT32 data_len, UINT32 total_len) argument 546 strip_pkcs_padding( CK_BYTE *ptr, UINT32 total_len, UINT32 *data_len) argument [all...] |
H A D | key.c | 656 CK_ULONG data_len) 669 rc = rsa_priv_unwrap(tmpl, data, data_len); 951 CK_ULONG data_len, 965 rc = generic_secret_unwrap(tmpl, data, data_len, fromend); 1433 CK_ULONG *data_len) 1473 rc = ber_encode_RSAPrivateKey(length_only, data, data_len, 1639 CK_ULONG * data_len) 1645 if (! tmpl || ! data_len) { 1653 *data_len = attr->ulValueLen; 1671 CK_ULONG data_len, 653 priv_key_unwrap(TEMPLATE *tmpl, CK_ULONG keytype, CK_BYTE *data, CK_ULONG data_len) argument 948 secret_key_unwrap(TEMPLATE *tmpl, CK_ULONG keytype, CK_BYTE *data, CK_ULONG data_len, CK_BBOOL fromend) argument 1430 rsa_priv_wrap_get_data(TEMPLATE *tmpl, CK_BBOOL length_only, CK_BYTE **data, CK_ULONG *data_len) argument 1636 generic_secret_wrap_get_data(TEMPLATE * tmpl, CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len) argument 1669 generic_secret_unwrap(TEMPLATE *tmpl, CK_BYTE *data, CK_ULONG data_len, CK_BBOOL fromend) argument [all...] |
H A D | tpmtok_int.h | 361 CK_ULONG data_len; member in struct:_OP_STATE_DATA
|
/osnet-11/usr/src/lib/libsmb/common/ |
H A D | smb_crypt.c | 91 int data_len, 124 rv = C_SignUpdate(hSession, (CK_BYTE_PTR)data, data_len); 90 smb_auth_hmac_md5(const unsigned char *data, int data_len, const unsigned char *key, int key_len, unsigned char *digest) argument
|
H A D | smb_auth.c | 336 int data_len; local 345 data_len = strlen(username) + strlen(ntdomain); 346 buf = (unsigned char *)malloc((data_len + 1) * sizeof (char)); 350 (void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain); 351 data = (smb_wchar_t *)malloc((data_len + 1) * sizeof (smb_wchar_t)); 357 data_len = smb_auth_qnd_unicode(data, (char *)buf, data_len); 358 rc = SMBAUTH_HMACT64((unsigned char *)data, data_len, ntlm_hash,
|
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | boot.c | 46 unsigned long flags = 0, text_len = 0, data_len = 0, bss_len = 0; local 151 data_len = 0; 210 data_len = pu.aout->a_data; 267 data_len = setup_sects << 9; 268 text_len = filemax - data_len - SECTOR_SIZE; 284 (big_linux ? "bzImage" : "zImage"), data_len, text_len); 378 if (data_len + SECTOR_SIZE <= MULTIBOOT_SEARCH) 380 data_len + SECTOR_SIZE); 385 data_len + SECTOR_SIZE - MULTIBOOT_SEARCH); 444 grub_seek (data_len [all...] |
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/ |
H A D | kmsAESCrypt.c | 39 kms_add_pkcs7_padding(CK_BYTE *buf, int block_size, CK_ULONG data_len) argument 45 pad_len = block_size - (data_len % block_size);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softEncryptUtil.c | 44 soft_add_pkcs7_padding(CK_BYTE *buf, int block_size, CK_ULONG data_len) argument 46 (void) pkcs7_encode(NULL, data_len, buf, block_size, block_size);
|
H A D | softRSA.c | 689 size_t data_len = modulus_len; local 691 rv = pkcs1_decode(PKCS1_VERIFY, plain_data, &data_len); 696 if ((CK_ULONG)data_len != ulDataLen) { 700 &plain_data[modulus_len - data_len], 1226 size_t data_len = modulus_len; local 1228 rv = pkcs1_decode(PKCS1_VERIFY, plain_data, &data_len); 1238 *pulDataLen = data_len; 1244 if (*pulDataLen < (CK_ULONG)data_len) { 1245 *pulDataLen = data_len; 1251 &plain_data[modulus_len - data_len], data_le [all...] |
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_ntlm.c | 305 const uchar_t *data, size_t data_len) 344 MD5Update(&context, data, data_len); /* then data of datagram */ 303 smbfs_HMACT64(uchar_t *digest, const uchar_t *key, size_t key_len, const uchar_t *data, size_t data_len) argument
|
/osnet-11/usr/src/lib/libsoftcrypto/common/ |
H A D | crypt.c | 758 ucrypto_sign_update(crypto_ctx_t *context, uchar_t *data_str, size_t data_len) argument 760 return (ucrypto_common_update(context, data_str, data_len, 773 void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, 777 data_str, data_len, sig_str, sig_len, UCRYPTO_SIGN)); 790 ucrypto_verify_update(crypto_ctx_t *context, uchar_t *data_str, size_t data_len) argument 792 return (ucrypto_common_update(context, data_str, data_len, 805 void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, 809 data_str, data_len, sig_str, sig_len, UCRYPTO_VERIFY)); 772 ucrypto_sign(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument 804 ucrypto_verify(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument
|
/osnet-11/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 469 * data_len 478 const uchar_t *data, size_t data_len, 498 MD5Update(&ctx, data, data_len); 513 tobesigned.Length = data_len; 556 * data_len 563 const uchar_t *data, size_t data_len) 574 indata.Length = data_len; 477 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument 561 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
|
/osnet-11/usr/src/lib/libntfs/common/libntfs/ |
H A D | dir.c | 1250 int data_len; local 1255 data_len = offsetof(INTX_FILE, u.s.device_end); 1256 data = ntfs_malloc(data_len); 1269 data_len = sizeof(INTX_FILE_TYPES) + 1271 data = ntfs_malloc(data_len); 1282 data_len = 1; 1286 data_len = 0; 1291 data_len)) {
|
/osnet-11/usr/src/lib/libfru/libfruraw/ |
H A D | fruraw.c | 569 fru_tag_t tag, uint8_t *data, size_t data_len) 590 uint8_t **data, size_t *data_len) 601 uint8_t *data, size_t data_len) 568 frt_add_tag_to_seg(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, uint8_t *data, size_t data_len) argument 588 frt_get_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t **data, size_t *data_len) argument 599 frt_set_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t *data, size_t data_len) argument
|
/osnet-11/usr/src/lib/libfru/libfrupicl/ |
H A D | frupicl.c | 680 fru_tag_t tag, uint8_t *data, size_t data_len) 708 if (data_len >= (buf_size - get_tag_size(get_tag_type(&tag)))) { 719 data, data_len); 853 uint8_t **data, size_t *data_len) 886 *data_len = buf_len; 894 uint8_t *data, size_t data_len) 912 if ((picl_err = picl_set_propval(tagHdl, data, data_len)) 679 fpt_add_tag_to_seg(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, uint8_t *data, size_t data_len) argument 851 fpt_get_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t **data, size_t *data_len) argument 892 fpt_set_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t *data, size_t data_len) argument
|
/osnet-11/usr/src/lib/libfru/libfrupicltree/ |
H A D | frupicltree.c | 691 fru_tag_t tag, uint8_t *data, size_t data_len) 720 if (data_len >= (buf_size - get_tag_size(get_tag_type(&tag)))) { 731 data, data_len); 865 uint8_t **data, size_t *data_len) 898 *data_len = buf_len; 906 uint8_t *data, size_t data_len) 924 if ((picl_err = ptree_update_propval(tagHdl, data, data_len)) 690 fpt_add_tag_to_seg(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, uint8_t *data, size_t data_len) argument 863 fpt_get_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t **data, size_t *data_len) argument 904 fpt_set_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t *data, size_t data_len) argument
|
/osnet-11/usr/src/grub/grub2/util/ |
H A D | getroot.c | 778 mach_msg_type_number_t num_ports = 0, num_ints = 0, num_offsets = 0, data_len = 0; local 789 &data, &data_len); 799 if (name_len < data_len) 804 os_dev = xmalloc (strlen ("/dev/") + data_len); 806 memcpy (os_dev + strlen ("/dev/"), data, data_len); 824 if (data && data_len > 0) 825 munmap (data, data_len);
|
/osnet-11/usr/src/lib/libfru/libfru/ |
H A D | libfru.cc | 1632 void **data, size_t *data_len, 1638 *data_len = 0; 1670 *data_len = payloadLen; 1681 data, data_len); 1629 fru_read_field(fru_nodehdl_t container, char **seg_name, unsigned int instance, const char *field_path, void **data, size_t *data_len, char **found_path) argument
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.c | 879 ASN1_OBJECT *oid, unsigned char *data, size_t data_len, 895 (unsigned char *) data, data_len)) { 923 unsigned char *data, unsigned int data_len, 936 data, data_len, &p7); 980 unsigned int data_len, 1114 alen = data_len; 1120 EVP_DigestUpdate(&ctx, data, data_len); 1237 (int)data_len)) { 1331 unsigned int *data_len, 1396 *data_len 877 create_contentinfo(krb5_context context, pkinit_plg_crypto_context plg_crypto_context, ASN1_OBJECT *oid, unsigned char *data, size_t data_len, PKCS7 **out_p7) argument 918 cms_contentinfo_create(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int cms_msg_type, unsigned char *data, unsigned int data_len, unsigned char **out_data, unsigned int *out_data_len) argument 973 cms_signeddata_create(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int cms_msg_type, int include_certchain, unsigned char *data, unsigned int data_len, unsigned char **signed_data, unsigned int *signed_data_len) argument 1322 cms_signeddata_verify(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, int cms_msg_type, int require_crl_checking, unsigned char *signed_data, unsigned int signed_data_len, unsigned char **data, unsigned int *data_len, unsigned char **authz_data, unsigned int *authz_data_len, int *is_signed) argument 1826 cms_envelopeddata_verify(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_preauthtype pa_type, int require_crl_checking, unsigned char *enveloped_data, unsigned int enveloped_data_len, unsigned char **data, unsigned int *data_len) argument 2468 long data_len; local 2584 server_process_dh(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **dh_pubkey, unsigned int *dh_pubkey_len, unsigned char **server_key, unsigned int *server_key_len) argument 3401 wrap_signeddata(unsigned char *data, unsigned int data_len, unsigned char **out, unsigned int *out_len, int is_longhorn_server) argument 3454 wrap_signeddata(unsigned char *data, unsigned int data_len, unsigned char **out, unsigned int *out_len) argument 4684 pkinit_decode_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument 4721 pkinit_decode_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument 4795 pkinit_decode_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument 4818 pkinit_sign_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4835 pkinit_sign_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4912 pkinit_sign_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument 4935 decode_data(unsigned char **out_data, unsigned int *out_data_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey, X509 *cert) argument 4976 create_signature(unsigned char **sig, unsigned int *sig_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey) argument 6836 der_decode_data(unsigned char *data, long data_len, unsigned char **out, long *out_len) argument [all...] |