Searched refs:in_data (Results 1 - 25 of 41) sorted by relevance

12

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dmk_req.c61 krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf)
88 in_data, credsp, outbuf);
59 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, char *service, char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
H A Dmk_req_ext.c131 krb5_flags ap_req_options, krb5_data *in_data,
185 if (!in_data &&(*auth_context)->checksum_func) {
189 &in_data);
202 if (in_data) {
207 checksum.length = in_data->length;
208 checksum.contents = (krb5_octet *) in_data->data;
214 in_data, &checksum)))
130 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument
H A Dsendauth.c47 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
167 ap_req_options, in_data, credsp,
H A Dsend_tgs.c56 krb5_send_tgs_basic(krb5_context context, krb5_data *in_data, krb5_creds *in_cred, krb5_data *outbuf) argument
69 in_data, &checksum))) {
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dsign_mgr.c253 CK_BYTE * in_data,
271 if ((length_only == FALSE) && (! in_data || ! out_data)) {
280 in_data, in_data_len,
285 in_data, in_data_len,
291 in_data, in_data_len,
296 in_data, in_data_len,
306 CK_BYTE * in_data,
309 if (! sess || ! ctx || ! in_data) {
325 in_data, in_data_len));
361 CK_BYTE * in_data,
250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
304 sign_mgr_sign_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
[all...]
H A Dverify_mgr.c233 CK_BYTE * in_data,
248 if (! in_data || ! signature) {
258 in_data, in_data_len,
263 in_data, in_data_len,
269 in_data, in_data_len,
274 in_data, in_data_len,
284 CK_BYTE * in_data,
287 if (! sess || ! ctx || ! in_data) {
303 in_data, in_data_len));
231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
282 verify_mgr_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
H A Dmech_rsa.c32 CK_BYTE *in_data,
54 CK_BYTE * in_data,
75 in_data, in_data_len,
84 CK_BYTE * in_data,
107 in_data, in_data_len,
116 CK_BYTE * in_data,
137 hContext, in_data, in_data_len, out_data,
146 CK_BYTE * in_data,
167 in_data, in_data_len, out_data,
178 CK_BYTE *in_data,
52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument
175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument
[all...]
H A Dmech_md5.c300 CK_BYTE *in_data,
314 MD5Update(ctx->context.md5ctx, in_data, in_data_len);
324 CK_BYTE * in_data,
435 in_data, in_data_len);
487 CK_BYTE * in_data,
497 if (! sess || ! ctx || ! in_data || ! signature) {
515 in_data, in_data_len, hmac, &len);
297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
H A Dmech_sha.c33 CK_BYTE *in_data,
48 SHA1Update(ctx->context.sha1ctx, in_data, in_data_len);
59 CK_BYTE * in_data,
164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len);
217 CK_BYTE *in_data,
227 if (! sess || ! ctx || ! in_data || ! signature) {
243 in_data, in_data_len, hmac, &len);
30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
H A Ddecr_mgr.c163 CK_BYTE *in_data,
174 if ((length_only == FALSE) && (! in_data || ! out_data)) {
183 ctx, in_data, in_data_len, out_data,
160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Dencr_mgr.c162 CK_BYTE *in_data,
173 if ((length_only == FALSE) && (! in_data || ! out_data)) {
182 ctx, in_data, in_data_len, out_data,
159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Ddig_mgr.c375 CK_BYTE *in_data,
388 if ((length_only == FALSE) && (! in_data || ! out_data)) {
400 in_data, in_data_len, out_data, out_data_len));
406 in_data, in_data_len, out_data, out_data_len));
372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Dtpm_specific.c2404 CK_BYTE * in_data,
2444 chunklen, in_data))) {
2466 in_data += chunklen;
2480 CK_BYTE * in_data,
2493 rc = tpm_decrypt_data(hContext, hKey, in_data, in_data_len,
2502 CK_BYTE * in_data,
2527 in_data))) {
2553 CK_BYTE * in_data,
2580 in_data))) {
2609 CK_BYTE *in_data,
2401 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
2478 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
2500 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument
2551 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
2606 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
2717 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
2748 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument
[all...]
/illumos-gate/usr/src/lib/libdisasm/common/
H A Ddis_sparc.h86 } in_data; member in struct:inst
H A Ddis_sparc_fmt.c715 prt_name(dhp, inp->in_data.in_def.in_name, 1);
748 prt_name(dhp, inp->in_data.in_def.in_name, 1);
760 prt_name(dhp, inp->in_data.in_def.in_name, 1);
776 const char *name = inp->in_data.in_def.in_name;
787 uint32_t flags = inp->in_data.in_def.in_flags;
1010 const char *iname = inp->in_data.in_def.in_name;
1011 uint32_t flags = inp->in_data.in_def.in_flags;
1263 prt_name(dhp, inp->in_data.in_def.in_name, 1);
1280 const char *name = inp->in_data.in_def.in_name;
1512 bprintf(dhp, "%-9s %s%s%s%s%s", inp->in_data
[all...]
H A Ddis_sparc.c263 tp = inp->in_data.in_tbl;
/illumos-gate/usr/src/uts/common/io/
H A Dsysevent.c433 if (uargs.in_data.len > MAX_CHNAME_LEN ||
437 channel = kmem_alloc(uargs.in_data.len, KM_SLEEP);
439 if (copyin((void *)(uintptr_t)uargs.in_data.name, channel,
440 uargs.in_data.len) != 0) {
441 kmem_free(channel, uargs.in_data.len);
445 if (!sysevent_isstrend(channel, uargs.in_data.len)) {
446 kmem_free(channel, uargs.in_data.len);
468 kmem_free(channel, uargs.in_data.len);
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.ripngd/
H A Ddefs.h150 extern void in_data(struct interface *);
H A Dmain.c286 in_data(ifp);
/illumos-gate/usr/src/uts/common/fs/smbsrv/
H A Dsmb2_query_info.c74 rc = MBC_SHADOW_CHAIN(&qi->in_data, &sr->smb_data,
/illumos-gate/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c559 uint8_t *in_data, *out_data; local
619 in_data = plaintext->Data;
634 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, block_size,
648 in_data += block_size;
664 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, in_len,
678 in_data += in_len;
/illumos-gate/usr/src/uts/common/io/zyd/
H A Dzyd.h404 zyd_res zyd_usb_ioread_req(struct zyd_usb *uc, const void *in_data,
/illumos-gate/usr/src/uts/common/io/usb/clients/usbser/usbftdi/
H A Duftdi_dsd.c1491 usb_ep_data_t *in_data, *out_data; local
1503 in_data = usb_lookup_ep_data(uf->uf_dip, uf->uf_dev_data, ifc, alt,
1509 if (in_data == NULL || out_data == NULL) {
1522 if (in_data->ep_descr.wMaxPacketSize)
1523 uf->uf_ibuf_sz = in_data->ep_descr.wMaxPacketSize;
1533 if (usb_pipe_open(uf->uf_dip, &in_data->ep_descr, &policy,
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.mpathd/
H A Dmpd_tables.h449 extern void in_data(struct phyint_instance *pii);
/illumos-gate/usr/src/cmd/cmd-inet/usr.lib/in.ndpd/
H A Dtables.h317 extern void in_data(struct phyint *pi);

Completed in 123 milliseconds

12