/osnet-11/usr/src/lib/libkmf/mappers/kmf_mapper_cn/common/ |
H A D | mapper_cn.c | 117 if (oid->Length == KMFOID_CommonName.Length && 119 oid->Length) == 0) { 120 if ((cn = malloc(data->Length + 1)) == NULL) { 124 (void) memcpy(cn, data->Data, data->Length); 126 cn[data->Length] = '\0'; 127 name->Length = data->Length + 1; 146 * mapped_name->Length returned is greater than zero the caller is expected to 162 mapped_name->Length [all...] |
/osnet-11/usr/src/lib/libkmf/ber_der/common/ |
H A D | clasn1.c | 36 algoid->parameters.Length == 0) { 45 algoid->parameters.Length, 0); 62 data->Length = 0; 282 algoid->algorithm.Length = algoid_data.bv_len; 284 algoid->parameters.Length = 0; 295 algoid->algorithm.Length = AlgOID.bv_len; 301 algoid->parameters.Length = 0; 305 algoid->parameters.Length = 0; 329 algoid->parameters.Length = size; 343 if (src && dst && src->Data != NULL && src->Length > [all...] |
/osnet-11/usr/src/grub/grub-0.97/stage2/ |
H A D | common.c | 137 && desc->BaseAddr + desc->Length > top) 139 top = desc->BaseAddr + desc->Length; 228 if (desc->Type == MB_ARD_MEMORY && desc->Length > 0 229 && desc->BaseAddr + desc->Length > max_addr) 230 max_addr = desc->BaseAddr + desc->Length; 253 fakemap[0].Length = (mbi.mem_lower << 10); 254 fakemap[1].Length = (memtmp << 10); 255 fakemap[2].Length = cont;
|
H A D | mb_info.h | 49 unsigned long long Length; member in struct:AddrRangeDesc
|
H A D | builtins.c | 1444 " Length: 0x%x X 4GB + 0x%x bytes\n", 1448 (unsigned long) (map->Length >> 32), 1449 (unsigned long) (map->Length & 0xFFFFFFFF));
|
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | certop.c | 279 #define NODATA(d) (d.Data == NULL || d.Length == NULL) 304 encodedCert->Length = 0; 789 output->Length = signature.Length; 790 (void) memcpy(output->Data, signature.Data, signature.Length); 1045 if (ret == KMF_OK && derkey.Length > 0) { 1451 (void) memcpy(uri, data->Data, data->Length); 1452 uri[data->Length] = '\0'; 1457 path = malloc(data->Length + 1); 1462 (void) strncpy(path, uri, data->Length); [all...] |
H A D | pk11keys.c | 277 (CK_ULONG)KeyParts[KMF_RSA_MODULUS].Length) || 282 (CK_ULONG)KeyParts[KMF_RSA_PUBLIC_EXPONENT].Length)) { 291 (CK_ULONG)KeyParts[KMF_DSA_PRIME].Length) || 295 (CK_ULONG)KeyParts[KMF_DSA_SUB_PRIME].Length) || 299 (CK_ULONG)KeyParts[KMF_DSA_BASE].Length) || 303 (CK_ULONG)KeyParts[KMF_DSA_PUBLIC_VALUE].Length)) { 312 (CK_ULONG)KeyParts[KMF_ECDSA_POINT].Length) || 317 (CK_ULONG)KeyParts[KMF_ECDSA_PARAMS].Length)) { 467 datalen = data->Length; 479 hashData.Length [all...] |
H A D | rdn_parser.c | 275 dst->Data = malloc(src->Length); 279 dst->Length = src->Length; 280 (void) memcpy(dst->Data, src->Data, src->Length); 306 ava->value.Length = strlen(value); 469 return ((d1->Length == d2->Length) && 470 !memcmp(d1->Data, d2->Data, d1->Length));
|
H A D | certgetsetop.c | 48 if (src->Length == 0) { 49 dst->Length = 0; 55 dst->Data = malloc(src->Length); 59 dst->Length = src->Length; 60 (void) memcpy(dst->Data, src->Data, src->Length); 80 dstext->extnId.Length = srcext->extnId.Length; 284 if (extn.value.tagAndValue->value.Length > 1) { 324 exdata.bv_len = asn1data->Length; [all...] |
H A D | algoid.c | 96 if ((Oid == NULL) || (Oid->Data == NULL) || (Oid->Length == 0)) {
|
H A D | csrcrlop.c | 151 csrdata->Data, csrdata->Length, 155 pemdata.Length = (size_t)len; 164 if (write(fd, pemdata.Data, pemdata.Length) != 165 pemdata.Length) { 169 if (write(fd, csrdata->Data, csrdata->Length) != 170 csrdata->Length) { 279 foundextn->BERvalue.Length, &olddata, &oldsize); 328 foundextn->BERvalue.Length = extdata->bv_len; 337 newextn.BERvalue.Length = extdata->bv_len; 378 SignedCsr->Length [all...] |
H A D | generalop.c | 731 pdata->Length = amount_to_read; 827 for (i = 1; i < oid->Length; i++) { 858 for (i = 1; i < oid->Length; i++) { 864 if (i+1 < oid->Length) 883 if ((buf == NULL) || (data->Length < 8)) 1013 if (check_for_pkcs12(buf, data->Length) == TRUE) { 1015 } else if ((data->Length >= 2) && (buf[0] == 0x30) && (buf[1] & 0x80)) { 1018 } else if ((data->Length >= 8) && (check_for_pem(data, fmt) != TRUE)) { 1046 if (filebuf.Length < 8) { 1173 datablock->Length [all...] |
H A D | policy.c | 280 oid->Length = oldoid->Length; 281 oid->Data = malloc(oid->Length); 286 (void) memcpy(oid->Data, oldoid->Data, oid->Length); 315 if (oid->Length == EKUList[i].oid->Length && 316 !memcmp(oid->Data, EKUList[i].oid->Data, oid->Length)) { 337 newoid.Length = 0; 371 ekus->ekulist[ekus->eku_count-1].Length = 372 newoid.Length; [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 312 kmfcert->certificate.Length = value_len; 335 kmfcert->certificate.Length = 0; 411 name.Length = certattr.ulValueLen; 432 name.Length = certattr.ulValueLen; 761 kmf_cert->certificate.Length = 0; 813 Modulus.Length); 815 Exponent.Data, Exponent.Length); 824 Modulus.Length = rsaTemplate[2].ulValueLen; 825 Modulus.Data = malloc(Modulus.Length); 829 Exponent.Length [all...] |
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 355 kmf_cert->certificate.Length = nss_cert->derCert.len; 359 kmf_cert->certificate.Length = 0; 468 der.Length = node->cert->derIssuer.len; 482 der.Length = node->cert->derSubject.len; 676 kmf_cert->certificate.Length = 0; 944 ecparams = SECITEM_AllocItem(NULL, NULL, (eccoid->Length)); 948 (void) memcpy(ecparams->data, eccoid->Data, eccoid->Length); 1066 tobesigned->Length, NSSprivkey, signAlgTag); 1073 if (signed_data.len <= output->Length) { 1075 output->Length [all...] |
/osnet-11/usr/src/lib/libelfsign/common/ |
H A D | elfcertlib.c | 510 tobesigned.Length = sizeof (MD5_DER_PREFIX) + derlen; 513 tobesigned.Length = data_len; 517 signature.Length = *sig_len; 544 *sig_len = signature.Length; 574 indata.Length = data_len; 576 insig.Length = sig_len;
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 381 derdata.Length = i2d_X509_NAME(sslDN, NULL); 382 if ((tmp = derdata.Data = (uchar_t *)OPENSSL_malloc(derdata.Length)) 443 cert->Length = len; 450 cert->Length = 0; 651 if (adata->Length > bdata->Length) 653 if (adata->Length < bdata->Length) 682 certs->Length = 0; 811 filebuf.bv_len = filedata->Length; [all...] |
/osnet-11/usr/src/lib/libxcurses/h/posix/ |
H A D | mkslocal.h | 793 #define M_L_CUSERID 16 /* Length of longest user id returned by 1490 * Many mail systems support the non-standard "Content-Length" header
|
/osnet-11/usr/src/lib/libldap4/include/ |
H A D | fe.h | 226 int Length; member in struct:_fe_values
|
/osnet-11/usr/src/grub/grub-0.97/netboot/ |
H A D | forcedeth.c | 288 u16 Length; member in struct:ring_desc 532 rx_ring[i].Length = cpu_to_le16(RX_NIC_BUFSIZE); 820 len = cpu_to_le16(prd->Length); 864 tx_ring[nr].Length = cpu_to_le16(s - 1);
|
H A D | pxe.h | 90 uint8_t Length; /* structure length */ member in struct:__anon226 258 uint16_t HwAddrLen; /* Length of hardware address */ 340 uint16_t BufferLength; /* Length of Frame */ 342 uint16_t FrameHeaderLength; /* Length of the media header in Frame */
|
/osnet-11/usr/src/lib/libkmf/include/ |
H A D | kmftypes.h | 37 size_t Length; /* in bytes */ member in struct:kmf_data
|