/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_req.c | 56 krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) 81 in_data, credsp, outbuf); 54 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, char *service, char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
|
H A D | mk_req_ext.c | 91 krb5_flags ap_req_options, krb5_data *in_data, 158 if (!in_data && (*auth_context)->checksum_func) { 162 &in_data); 170 if (in_data) { 174 checksum.length = in_data->length; 175 checksum.contents = (krb5_octet *) in_data->data; 190 in_data, &checksum))) 90 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument
|
H A D | sendauth.c | 51 krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, 169 ap_req_options, in_data, credsp, 48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
|
H A D | send_tgs.c | 56 tgs_construct_tgsreq(krb5_context context, krb5_data *in_data, argument 90 in_data, &checksum))) {
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sign_mgr.c | 253 CK_BYTE * in_data, 271 if ((length_only == FALSE) && (! in_data || ! out_data)) { 280 in_data, in_data_len, 285 in_data, in_data_len, 291 in_data, in_data_len, 296 in_data, in_data_len, 306 CK_BYTE * in_data, 309 if (! sess || ! ctx || ! in_data) { 325 in_data, in_data_len)); 361 CK_BYTE * in_data, 250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 304 sign_mgr_sign_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument [all...] |
H A D | verify_mgr.c | 233 CK_BYTE * in_data, 248 if (! in_data || ! signature) { 258 in_data, in_data_len, 263 in_data, in_data_len, 269 in_data, in_data_len, 274 in_data, in_data_len, 284 CK_BYTE * in_data, 287 if (! sess || ! ctx || ! in_data) { 303 in_data, in_data_len)); 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 282 verify_mgr_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
|
H A D | mech_rsa.c | 32 CK_BYTE *in_data, 54 CK_BYTE * in_data, 75 in_data, in_data_len, 84 CK_BYTE * in_data, 107 in_data, in_data_len, 116 CK_BYTE * in_data, 137 hContext, in_data, in_data_len, out_data, 146 CK_BYTE * in_data, 167 in_data, in_data_len, out_data, 178 CK_BYTE *in_data, 52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument [all...] |
H A D | mech_md5.c | 300 CK_BYTE *in_data, 314 MD5Update(ctx->context.md5ctx, in_data, in_data_len); 324 CK_BYTE * in_data, 435 in_data, in_data_len); 487 CK_BYTE * in_data, 497 if (! sess || ! ctx || ! in_data || ! signature) { 515 in_data, in_data_len, hmac, &len); 297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
|
H A D | mech_sha.c | 33 CK_BYTE *in_data, 48 SHA1Update(ctx->context.sha1ctx, in_data, in_data_len); 59 CK_BYTE * in_data, 164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len); 217 CK_BYTE *in_data, 227 if (! sess || ! ctx || ! in_data || ! signature) { 243 in_data, in_data_len, hmac, &len); 30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
|
H A D | decr_mgr.c | 163 CK_BYTE *in_data, 174 if ((length_only == FALSE) && (! in_data || ! out_data)) { 183 ctx, in_data, in_data_len, out_data, 160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | encr_mgr.c | 162 CK_BYTE *in_data, 173 if ((length_only == FALSE) && (! in_data || ! out_data)) { 182 ctx, in_data, in_data_len, out_data, 159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | dig_mgr.c | 375 CK_BYTE *in_data, 388 if ((length_only == FALSE) && (! in_data || ! out_data)) { 400 in_data, in_data_len, out_data, out_data_len)); 406 in_data, in_data_len, out_data, out_data_len)); 372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | tpm_specific.c | 2469 CK_BYTE * in_data, 2509 chunklen, in_data))) { 2531 in_data += chunklen; 2545 CK_BYTE * in_data, 2558 rc = tpm_decrypt_data(hContext, hKey, in_data, in_data_len, 2567 CK_BYTE * in_data, 2592 in_data))) { 2618 CK_BYTE * in_data, 2645 in_data))) { 2674 CK_BYTE *in_data, 2466 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2543 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2565 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument 2616 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2671 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2782 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2813 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | cf2.c | 54 krb5_data in_data; local 75 in_data.length = (krb5_int32) krb5int_buf_len(&prf_inbuf); 76 in_data.data = krb5int_buf_data(&prf_inbuf); 81 retval = krb5_c_prf(context, k, &in_data, &out_data); 85 in_data.data[0]++;
|
/osnet-11/usr/src/lib/libdisasm/sparc/ |
H A D | dis_sparc.h | 94 } in_data; member in struct:inst
|
H A D | dis_sparc_fmt.c | 770 prt_name(dhp, inp->in_data.in_def.in_name, 1); 802 prt_name(dhp, inp->in_data.in_def.in_name, 1); 814 prt_name(dhp, inp->in_data.in_def.in_name, 1); 829 const char *name = inp->in_data.in_def.in_name; 840 uint32_t flags = inp->in_data.in_def.in_flags; 1061 const char *iname = inp->in_data.in_def.in_name; 1062 uint32_t flags = inp->in_data.in_def.in_flags; 1313 prt_name(dhp, inp->in_data.in_def.in_name, 1); 1329 const char *name = inp->in_data.in_def.in_name; 1565 bprintf(dhp, "%-9s %s%s%s%s%s", inp->in_data [all...] |
H A D | dis_sparc.c | 271 tp = inp->in_data.in_tbl;
|
H A D | instr.c | 40 .in_data = { \ 49 .in_data = { \ 58 .in_data = { \ 70 .in_data = { \
|
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 567 uint8_t *in_data, *out_data; local 627 in_data = plaintext->Data; 642 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, block_size, 656 in_data += block_size; 672 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, in_len, 686 in_data += in_len;
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto.h | 127 unsigned char *in_data, unsigned int in_length,
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1301 uint8_t *in_data, *out_data; local 1315 in_data = ciphertext->Data; 1321 &out_len, ciphertext->Length, in_data, in_len); 1330 in_data += in_len;
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2359 uint8_t *in_data, *out_data; local 2403 in_data = ciphertext->Data; 2415 ckrv = C_Decrypt(hSession, in_data, block_len, 2425 in_data += block_len;
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2299 uint8_t *in_data, *out_data; local 2317 in_data = ciphertext->Data; 2323 in_data, out_data, rsa, RSA_PKCS1_PADDING); 2332 in_data += in_len;
|