/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | decr_mgr.c | 165 CK_BYTE *out_data, 174 if ((length_only == FALSE) && (! in_data || ! out_data)) { 183 ctx, in_data, in_data_len, out_data, 160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | encr_mgr.c | 164 CK_BYTE *out_data, 173 if ((length_only == FALSE) && (! in_data || ! out_data)) { 182 ctx, in_data, in_data_len, out_data, 159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | dig_mgr.c | 377 CK_BYTE *out_data, 388 if ((length_only == FALSE) && (! in_data || ! out_data)) { 400 in_data, in_data_len, out_data, out_data_len)); 406 in_data, in_data_len, out_data, out_data_len)); 372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | mech_md5.c | 302 CK_BYTE *out_data, 315 MD5Final(out_data, ctx->context.md5ctx); 326 CK_BYTE * out_data, 477 (void) memcpy(out_data, hash, hmac_len); 297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | mech_sha.c | 35 CK_BYTE *out_data, 50 SHA1Final(out_data, ctx->context.sha1ctx); 61 CK_BYTE * out_data, 206 (void) memcpy(out_data, hash, hmac_len); 30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | sign_mgr.c | 255 CK_BYTE * out_data, 271 if ((length_only == FALSE) && (! in_data || ! out_data)) { 281 out_data, out_data_len)); 286 out_data, out_data_len)); 292 out_data, out_data_len)); 297 out_data, out_data_len)); 363 CK_BYTE * out_data, 379 if ((length_only == FALSE) && (! in_data || ! out_data)) { 389 out_data, out_data_len)); 250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | verify_mgr.c | 340 CK_BYTE * out_data, 363 ctx, signature, sig_len, out_data, out_len)); 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
|
H A D | mech_rsa.c | 34 CK_BYTE *out_data, 56 CK_BYTE * out_data, 76 out_data, out_data_len, key_obj); 86 CK_BYTE * out_data, 108 out_data, out_data_len, key_obj); 118 CK_BYTE * out_data, 137 hContext, in_data, in_data_len, out_data, 148 CK_BYTE * out_data, 167 in_data, in_data_len, out_data, 180 CK_BYTE *out_data, 52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument [all...] |
H A D | tpm_specific.c | 2406 CK_BYTE * out_data, 2463 (void) memcpy(out_data + outlen, buf, buf_size); 2482 CK_BYTE * out_data, 2494 out_data, out_data_len); 2555 CK_BYTE * out_data, 2598 (void) memcpy(out_data, sig, sig_len); 2611 CK_BYTE *out_data, 2699 (void) memcpy(out_data + outlen, 2721 CK_BYTE * out_data, 2733 out_data, out_data_le 2401 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2478 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2551 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2606 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2717 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2748 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument [all...] |
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | pac.c | 181 krb5_data *out_data) 245 if (out_data != NULL) { 246 out_data->data = pac->data.data + pac->pac->Buffers[i].Offset; 247 out_data->length = data->length; 176 k5_pac_add_buffer(krb5_context context, krb5_pac pac, krb5_ui_4 type, const krb5_data *data, krb5_boolean zerofill, krb5_data *out_data) argument
|
/illumos-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 559 uint8_t *in_data, *out_data; local 620 out_data = ciphertext->Data; 635 (CK_BYTE_PTR)out_data, &out_len); 646 out_data += out_len; 665 (CK_BYTE_PTR)out_data, &out_len); 676 out_data += out_len;
|
/illumos-gate/usr/src/uts/common/io/zyd/ |
H A D | zyd_usb.c | 711 * out_data pointer to response buffer 716 const void *in_data, size_t in_len, void *out_data, size_t out_len) 723 uc->io_read.buffer = out_data; 715 zyd_usb_ioread_req(struct zyd_usb *uc, const void *in_data, size_t in_len, void *out_data, size_t out_len) argument
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_clnt.c | 136 krb5_data *out_data = NULL; local 190 nonce, &cksum, request->server, &out_data); 191 if (retval || !out_data->length) { 222 return_pa_data[0]->length = out_data->length; 223 return_pa_data[0]->contents = (krb5_octet *) out_data->data; 251 if (out_data != NULL) 252 free(out_data); 262 if (out_data) { 263 free(out_data->data); 264 free(out_data); [all...] |
H A D | pkinit_srv.c | 695 krb5_data *out_data = NULL; local 993 retval = k5int_encode_krb5_pa_pk_as_rep(rep, &out_data); 997 retval = k5int_encode_krb5_pa_pk_as_rep_draft9(rep9, &out_data); 1005 if (out_data != NULL) 1006 print_buffer_bin((unsigned char *)out_data->data, out_data->length, 1013 free(out_data->data); 1014 free(out_data); 1015 out_data = NULL; 1028 (*send_pa)->length = out_data [all...] |
H A D | pkinit_crypto_openssl.c | 2629 krb5_data **out_data) 2691 *out_data = (krb5_data *)malloc(sizeof(krb5_data)); 2692 (*out_data)->length = data->length; 2693 (*out_data)->data = (char *)malloc(data->length); 2694 (void) memcpy((*out_data)->data, data->data, data->length); 2722 krb5_data **out_data) 2728 TD_TRUSTED_CERTIFIERS, out_data); 2739 krb5_data **out_data) 2745 TD_INVALID_CERTIFICATES, out_data); 2757 krb5_data **out_data) 2623 pkinit_create_sequence_of_principal_identifiers( krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int type, krb5_data **out_data) argument 2718 pkinit_create_td_trusted_certifiers(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_data **out_data) argument 2734 pkinit_create_td_invalid_certificate( krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_data **out_data) argument 2752 pkinit_create_td_dh_parameters(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, pkinit_plg_opts *opts, krb5_data **out_data) argument 4753 decode_data(unsigned char **out_data, unsigned int *out_data_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey, X509 *cert) argument [all...] |
/illumos-gate/usr/src/uts/common/io/usb/clients/usbecm/ |
H A D | usbecm.c | 2897 usb_ep_data_t *in_data, *out_data, *intr_pipe; local 2914 out_data = ecmp->ecm_bulk_out_ep; 2917 if ((in_data == NULL) || (out_data == NULL)) { 2941 out_data->ep_descr.bEndpointAddress); 2968 if (usb_pipe_open(ecmp->ecm_dip, &out_data->ep_descr, &policy,
|
/illumos-gate/usr/src/uts/common/io/usb/clients/usbser/usbftdi/ |
H A D | uftdi_dsd.c | 1491 usb_ep_data_t *in_data, *out_data; local 1506 out_data = usb_lookup_ep_data(uf->uf_dip, uf->uf_dev_data, ifc, alt, 1509 if (in_data == NULL || out_data == NULL) { 1526 if (out_data->ep_descr.wMaxPacketSize) 1527 uf->uf_obuf_sz = out_data->ep_descr.wMaxPacketSize; 1537 if (usb_pipe_open(uf->uf_dip, &out_data->ep_descr, &policy,
|
/illumos-gate/usr/src/uts/common/io/usb/clients/usbser/usbsprl/ |
H A D | pl2303_dsd.c | 1461 usb_ep_data_t *in_data, *out_data; local 1470 out_data = usb_lookup_ep_data(plp->pl_dip, plp->pl_dev_data, ifc, alt, 1473 if ((in_data == NULL) || (out_data == NULL)) { 1489 if (usb_pipe_open(plp->pl_dip, &out_data->ep_descr, &policy,
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1301 uint8_t *in_data, *out_data; local 1314 out_data = output->Data; 1320 rv = PK11_PrivDecryptPKCS1(NSSprivkey, out_data, 1328 out_data += out_len;
|
/illumos-gate/usr/src/uts/common/io/usb/clients/usbser/usbsacm/ |
H A D | usbsacm.c | 1987 usb_ep_data_t *in_data, *out_data, *intr_pipe; local 2000 out_data = usb_lookup_ep_data(acmp->acm_dip, acmp->acm_dev_data, 2005 if ((in_data == NULL) || (out_data == NULL)) { 2038 if (usb_pipe_open(acmp->acm_dip, &out_data->ep_descr, &policy,
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2330 uint8_t *in_data, *out_data; local 2373 out_data = output->Data; 2387 out_data, (CK_ULONG *)&out_len); 2394 out_data += out_len;
|
/illumos-gate/usr/src/uts/common/sys/ |
H A D | sysevent_impl.h | 566 sev_box_t out_data; member in struct:chandata
|
/illumos-gate/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2301 uint8_t *in_data, *out_data; local 2318 out_data = output->Data; 2325 in_data, out_data, rsa, RSA_PKCS1_PADDING); 2332 out_data += out_len;
|
/illumos-gate/usr/src/uts/common/io/scsi/targets/ |
H A D | sd.c | 3604 uchar_t *out_data; local 3628 out_data = kmem_zalloc(SD_PROFILE_HEADER_LEN, KM_SLEEP); 3632 out_data, SD_PROFILE_HEADER_LEN, path_flag); 3642 if ((out_data[6] == 0) && (out_data[7] == 0x12)) { 3644 kmem_free(out_data, SD_PROFILE_HEADER_LEN); 3650 kmem_free(out_data, SD_PROFILE_HEADER_LEN); 23421 uchar_t *out_data; local 23434 out_data = kmem_zalloc(SD_PROFILE_HEADER_LEN, KM_SLEEP); 23453 SENSE_LENGTH, out_data, SD_PROFILE_HEADER_LE [all...] |