Searched defs:data_len (Results 1 - 24 of 24) sorted by relevance

/osnet-11/usr/src/lib/libntfs/common/include/ntfs/
H A Dindex.h45 * @data_len: length in bytes of @data
63 * @entry is the index entry described by this context. @data and @data_len
92 u16 data_len; member in struct:__anon2037
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Ddig_mgr.c417 CK_ULONG data_len)
430 SHA1Update(ctx->context.sha1ctx, data, data_len);
434 MD5Update(ctx->context.md5ctx, data, data_len);
414 digest_mgr_digest_update(SESSION *sess, DIGEST_CONTEXT *ctx, CK_BYTE *data, CK_ULONG data_len) argument
H A Dasn1.c299 CK_ULONG data_len)
305 * if data_len < 127 use short form length id
306 * if data_len < 256 use long form length id with
308 * if data_len < 65536 use long form length id with
310 * if data_len < 16777216 use long form length id
313 if (data_len < 128)
314 len = 1 + 1 + data_len;
315 else if (data_len < 256)
316 len = 1 + (1 + 1) + data_len;
317 else if (data_len < (
295 ber_encode_INTEGER(CK_BBOOL length_only, CK_BYTE ** ber_int, CK_ULONG * ber_int_len, CK_BYTE * data, CK_ULONG data_len) argument
384 ber_decode_INTEGER(CK_BYTE * ber_int, CK_BYTE ** data, CK_ULONG * data_len, CK_ULONG * field_len) argument
445 ber_encode_OCTET_STRING(CK_BBOOL length_only, CK_BYTE ** str, CK_ULONG * str_len, CK_BYTE * data, CK_ULONG data_len) argument
535 ber_decode_OCTET_STRING(CK_BYTE * str, CK_BYTE ** data, CK_ULONG * data_len, CK_ULONG * field_len) argument
597 ber_encode_SEQUENCE(CK_BBOOL length_only, CK_BYTE ** seq, CK_ULONG * seq_len, CK_BYTE * data, CK_ULONG data_len) argument
677 ber_decode_SEQUENCE(CK_BYTE * seq, CK_BYTE ** data, CK_ULONG * data_len, CK_ULONG * field_len) argument
747 ber_encode_PrivateKeyInfo(CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len, CK_BYTE * algorithm_id, CK_ULONG algorithm_id_len, CK_BYTE * priv_key, CK_ULONG priv_key_len) argument
828 ber_decode_PrivateKeyInfo(CK_BYTE * data, CK_ULONG data_len, CK_BYTE ** algorithm, CK_ULONG * alg_len, CK_BYTE ** priv_key) argument
879 ber_encode_RSAPrivateKey(CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len, CK_ATTRIBUTE * modulus, CK_ATTRIBUTE * publ_exp, CK_ATTRIBUTE * priv_exp, CK_ATTRIBUTE * prime1, CK_ATTRIBUTE * prime2, CK_ATTRIBUTE * exponent1, CK_ATTRIBUTE * exponent2, CK_ATTRIBUTE * coeff) argument
1049 ber_decode_RSAPrivateKey(CK_BYTE * data, CK_ULONG data_len, CK_ATTRIBUTE ** modulus, CK_ATTRIBUTE ** publ_exp, CK_ATTRIBUTE ** priv_exp, CK_ATTRIBUTE ** prime1, CK_ATTRIBUTE ** prime2, CK_ATTRIBUTE ** exponent1, CK_ATTRIBUTE ** exponent2, CK_ATTRIBUTE ** coeff) argument
[all...]
H A Dkey_mgr.c244 CK_ULONG data_len; local
301 &data, &data_len);
309 length_only, &data, &data_len);
337 ctx, data, data_len, wrapped_key, wrapped_key_len);
361 CK_ULONG data_len; local
430 data, &data_len);
434 data = (CK_BYTE *)malloc(data_len);
442 data, &data_len);
463 rc = key_mgr_get_private_key_type(data, data_len, &keytype);
479 data_len, fromen
[all...]
H A Dsess_mgr.c765 CK_ULONG *data_len) {
790 op_data->data_len = op_data_len -
831 op_data->data_len = op_data_len -
872 op_data->data_len = op_data_len -
912 op_data->data_len = op_data_len -
952 op_data->data_len = op_data_len -
980 *data_len = op_data_len;
1017 if (len != op_data->data_len) {
1060 if (len != op_data->data_len) {
1102 if (len != op_data->data_len) {
762 session_mgr_get_op_state(SESSION *sess, CK_BBOOL length_only, CK_BYTE *data, CK_ULONG *data_len) argument
[all...]
H A Dutility.c501 CK_ULONG data_len,
505 attr = (CK_ATTRIBUTE *)malloc(sizeof (CK_ATTRIBUTE) + data_len);
510 attr->ulValueLen = data_len;
512 if (data_len > 0) {
514 (void) memcpy(attr->pValue, data, data_len);
527 UINT32 data_len,
533 pad_len = block_size - (data_len % block_size);
536 if (data_len + pad_len > total_len) {
549 UINT32 *data_len)
556 *data_len
499 build_attribute(CK_ATTRIBUTE_TYPE type, CK_BYTE *data, CK_ULONG data_len, CK_ATTRIBUTE **attrib) argument
525 add_pkcs_padding(CK_BYTE * ptr, UINT32 block_size, UINT32 data_len, UINT32 total_len) argument
546 strip_pkcs_padding( CK_BYTE *ptr, UINT32 total_len, UINT32 *data_len) argument
[all...]
H A Dkey.c656 CK_ULONG data_len)
669 rc = rsa_priv_unwrap(tmpl, data, data_len);
951 CK_ULONG data_len,
965 rc = generic_secret_unwrap(tmpl, data, data_len, fromend);
1433 CK_ULONG *data_len)
1473 rc = ber_encode_RSAPrivateKey(length_only, data, data_len,
1639 CK_ULONG * data_len)
1645 if (! tmpl || ! data_len) {
1653 *data_len = attr->ulValueLen;
1671 CK_ULONG data_len,
653 priv_key_unwrap(TEMPLATE *tmpl, CK_ULONG keytype, CK_BYTE *data, CK_ULONG data_len) argument
948 secret_key_unwrap(TEMPLATE *tmpl, CK_ULONG keytype, CK_BYTE *data, CK_ULONG data_len, CK_BBOOL fromend) argument
1430 rsa_priv_wrap_get_data(TEMPLATE *tmpl, CK_BBOOL length_only, CK_BYTE **data, CK_ULONG *data_len) argument
1636 generic_secret_wrap_get_data(TEMPLATE * tmpl, CK_BBOOL length_only, CK_BYTE ** data, CK_ULONG * data_len) argument
1669 generic_secret_unwrap(TEMPLATE *tmpl, CK_BYTE *data, CK_ULONG data_len, CK_BBOOL fromend) argument
[all...]
H A Dtpmtok_int.h361 CK_ULONG data_len; member in struct:_OP_STATE_DATA
/osnet-11/usr/src/lib/libsmb/common/
H A Dsmb_crypt.c91 int data_len,
124 rv = C_SignUpdate(hSession, (CK_BYTE_PTR)data, data_len);
90 smb_auth_hmac_md5(const unsigned char *data, int data_len, const unsigned char *key, int key_len, unsigned char *digest) argument
H A Dsmb_auth.c336 int data_len; local
345 data_len = strlen(username) + strlen(ntdomain);
346 buf = (unsigned char *)malloc((data_len + 1) * sizeof (char));
350 (void) snprintf((char *)buf, data_len + 1, "%s%s", username, ntdomain);
351 data = (smb_wchar_t *)malloc((data_len + 1) * sizeof (smb_wchar_t));
357 data_len = smb_auth_qnd_unicode(data, (char *)buf, data_len);
358 rc = SMBAUTH_HMACT64((unsigned char *)data, data_len, ntlm_hash,
/osnet-11/usr/src/grub/grub-0.97/stage2/
H A Dboot.c46 unsigned long flags = 0, text_len = 0, data_len = 0, bss_len = 0; local
151 data_len = 0;
210 data_len = pu.aout->a_data;
267 data_len = setup_sects << 9;
268 text_len = filemax - data_len - SECTOR_SIZE;
284 (big_linux ? "bzImage" : "zImage"), data_len, text_len);
378 if (data_len + SECTOR_SIZE <= MULTIBOOT_SEARCH)
380 data_len + SECTOR_SIZE);
385 data_len + SECTOR_SIZE - MULTIBOOT_SEARCH);
444 grub_seek (data_len
[all...]
/osnet-11/usr/src/lib/pkcs11/pkcs11_kms/common/
H A DkmsAESCrypt.c39 kms_add_pkcs7_padding(CK_BYTE *buf, int block_size, CK_ULONG data_len) argument
45 pad_len = block_size - (data_len % block_size);
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftEncryptUtil.c44 soft_add_pkcs7_padding(CK_BYTE *buf, int block_size, CK_ULONG data_len) argument
46 (void) pkcs7_encode(NULL, data_len, buf, block_size, block_size);
H A DsoftRSA.c689 size_t data_len = modulus_len; local
691 rv = pkcs1_decode(PKCS1_VERIFY, plain_data, &data_len);
696 if ((CK_ULONG)data_len != ulDataLen) {
700 &plain_data[modulus_len - data_len],
1226 size_t data_len = modulus_len; local
1228 rv = pkcs1_decode(PKCS1_VERIFY, plain_data, &data_len);
1238 *pulDataLen = data_len;
1244 if (*pulDataLen < (CK_ULONG)data_len) {
1245 *pulDataLen = data_len;
1251 &plain_data[modulus_len - data_len], data_le
[all...]
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_ntlm.c305 const uchar_t *data, size_t data_len)
344 MD5Update(&context, data, data_len); /* then data of datagram */
303 smbfs_HMACT64(uchar_t *digest, const uchar_t *key, size_t key_len, const uchar_t *data, size_t data_len) argument
/osnet-11/usr/src/lib/libsoftcrypto/common/
H A Dcrypt.c758 ucrypto_sign_update(crypto_ctx_t *context, uchar_t *data_str, size_t data_len) argument
760 return (ucrypto_common_update(context, data_str, data_len,
773 void *iv, size_t iv_len, uchar_t *data_str, size_t data_len,
777 data_str, data_len, sig_str, sig_len, UCRYPTO_SIGN));
790 ucrypto_verify_update(crypto_ctx_t *context, uchar_t *data_str, size_t data_len) argument
792 return (ucrypto_common_update(context, data_str, data_len,
805 void *iv, size_t iv_len, uchar_t *data_str, size_t data_len,
809 data_str, data_len, sig_str, sig_len, UCRYPTO_VERIFY));
772 ucrypto_sign(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument
804 ucrypto_verify(ucrypto_mech_t mech_type, uchar_t *key_str, size_t key_len, void *iv, size_t iv_len, uchar_t *data_str, size_t data_len, uchar_t *sig_str, size_t *sig_len) argument
/osnet-11/usr/src/lib/libelfsign/common/
H A Delfcertlib.c469 * data_len
478 const uchar_t *data, size_t data_len,
498 MD5Update(&ctx, data, data_len);
513 tobesigned.Length = data_len;
556 * data_len
563 const uchar_t *data, size_t data_len)
574 indata.Length = data_len;
477 elfcertlib_sign(ELFsign_t ess, ELFCert_t cert, const uchar_t *data, size_t data_len, uchar_t *sig, size_t *sig_len) argument
561 elfcertlib_verifysig(ELFsign_t ess, ELFCert_t cert, const uchar_t *signature, size_t sig_len, const uchar_t *data, size_t data_len) argument
/osnet-11/usr/src/lib/libntfs/common/libntfs/
H A Ddir.c1250 int data_len; local
1255 data_len = offsetof(INTX_FILE, u.s.device_end);
1256 data = ntfs_malloc(data_len);
1269 data_len = sizeof(INTX_FILE_TYPES) +
1271 data = ntfs_malloc(data_len);
1282 data_len = 1;
1286 data_len = 0;
1291 data_len)) {
/osnet-11/usr/src/lib/libfru/libfruraw/
H A Dfruraw.c569 fru_tag_t tag, uint8_t *data, size_t data_len)
590 uint8_t **data, size_t *data_len)
601 uint8_t *data, size_t data_len)
568 frt_add_tag_to_seg(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, uint8_t *data, size_t data_len) argument
588 frt_get_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t **data, size_t *data_len) argument
599 frt_set_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t *data, size_t data_len) argument
/osnet-11/usr/src/lib/libfru/libfrupicl/
H A Dfrupicl.c680 fru_tag_t tag, uint8_t *data, size_t data_len)
708 if (data_len >= (buf_size - get_tag_size(get_tag_type(&tag)))) {
719 data, data_len);
853 uint8_t **data, size_t *data_len)
886 *data_len = buf_len;
894 uint8_t *data, size_t data_len)
912 if ((picl_err = picl_set_propval(tagHdl, data, data_len))
679 fpt_add_tag_to_seg(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, uint8_t *data, size_t data_len) argument
851 fpt_get_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t **data, size_t *data_len) argument
892 fpt_set_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t *data, size_t data_len) argument
/osnet-11/usr/src/lib/libfru/libfrupicltree/
H A Dfrupicltree.c691 fru_tag_t tag, uint8_t *data, size_t data_len)
720 if (data_len >= (buf_size - get_tag_size(get_tag_type(&tag)))) {
731 data, data_len);
865 uint8_t **data, size_t *data_len)
898 *data_len = buf_len;
906 uint8_t *data, size_t data_len)
924 if ((picl_err = ptree_update_propval(tagHdl, data, data_len))
690 fpt_add_tag_to_seg(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, uint8_t *data, size_t data_len) argument
863 fpt_get_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t **data, size_t *data_len) argument
904 fpt_set_tag_data(fru_treehdl_t handle, const char *seg_name, fru_tag_t tag, int instance, uint8_t *data, size_t data_len) argument
/osnet-11/usr/src/grub/grub2/util/
H A Dgetroot.c778 mach_msg_type_number_t num_ports = 0, num_ints = 0, num_offsets = 0, data_len = 0; local
789 &data, &data_len);
799 if (name_len < data_len)
804 os_dev = xmalloc (strlen ("/dev/") + data_len);
806 memcpy (os_dev + strlen ("/dev/"), data, data_len);
824 if (data && data_len > 0)
825 munmap (data, data_len);
/osnet-11/usr/src/lib/libfru/libfru/
H A Dlibfru.cc1632 void **data, size_t *data_len,
1638 *data_len = 0;
1670 *data_len = payloadLen;
1681 data, data_len);
1629 fru_read_field(fru_nodehdl_t container, char **seg_name, unsigned int instance, const char *field_path, void **data, size_t *data_len, char **found_path) argument
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.c879 ASN1_OBJECT *oid, unsigned char *data, size_t data_len,
895 (unsigned char *) data, data_len)) {
923 unsigned char *data, unsigned int data_len,
936 data, data_len, &p7);
980 unsigned int data_len,
1114 alen = data_len;
1120 EVP_DigestUpdate(&ctx, data, data_len);
1237 (int)data_len)) {
1331 unsigned int *data_len,
1396 *data_len
877 create_contentinfo(krb5_context context, pkinit_plg_crypto_context plg_crypto_context, ASN1_OBJECT *oid, unsigned char *data, size_t data_len, PKCS7 **out_p7) argument
918 cms_contentinfo_create(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int cms_msg_type, unsigned char *data, unsigned int data_len, unsigned char **out_data, unsigned int *out_data_len) argument
973 cms_signeddata_create(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int cms_msg_type, int include_certchain, unsigned char *data, unsigned int data_len, unsigned char **signed_data, unsigned int *signed_data_len) argument
1322 cms_signeddata_verify(krb5_context context, pkinit_plg_crypto_context plgctx, pkinit_req_crypto_context reqctx, pkinit_identity_crypto_context idctx, int cms_msg_type, int require_crl_checking, unsigned char *signed_data, unsigned int signed_data_len, unsigned char **data, unsigned int *data_len, unsigned char **authz_data, unsigned int *authz_data_len, int *is_signed) argument
1826 cms_envelopeddata_verify(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_preauthtype pa_type, int require_crl_checking, unsigned char *enveloped_data, unsigned int enveloped_data_len, unsigned char **data, unsigned int *data_len) argument
2468 long data_len; local
2584 server_process_dh(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context cryptoctx, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **dh_pubkey, unsigned int *dh_pubkey_len, unsigned char **server_key, unsigned int *server_key_len) argument
3401 wrap_signeddata(unsigned char *data, unsigned int data_len, unsigned char **out, unsigned int *out_len, int is_longhorn_server) argument
3454 wrap_signeddata(unsigned char *data, unsigned int data_len, unsigned char **out, unsigned int *out_len) argument
4684 pkinit_decode_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument
4721 pkinit_decode_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument
4795 pkinit_decode_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **decoded_data, unsigned int *decoded_data_len) argument
4818 pkinit_sign_data_fs(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument
4835 pkinit_sign_data_pkcs11(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument
4912 pkinit_sign_data(krb5_context context, pkinit_identity_crypto_context id_cryptoctx, unsigned char *data, unsigned int data_len, unsigned char **sig, unsigned int *sig_len) argument
4935 decode_data(unsigned char **out_data, unsigned int *out_data_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey, X509 *cert) argument
4976 create_signature(unsigned char **sig, unsigned int *sig_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey) argument
6836 der_decode_data(unsigned char *data, long data_len, unsigned char **out, long *out_len) argument
[all...]

Completed in 112 milliseconds