Searched refs:in_data (Results 1 - 23 of 23) sorted by relevance

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dmk_req.c56 krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf)
81 in_data, credsp, outbuf);
54 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, char *service, char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
H A Dmk_req_ext.c91 krb5_flags ap_req_options, krb5_data *in_data,
158 if (!in_data && (*auth_context)->checksum_func) {
162 &in_data);
170 if (in_data) {
174 checksum.length = in_data->length;
175 checksum.contents = (krb5_octet *) in_data->data;
190 in_data, &checksum)))
90 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument
H A Dsendauth.c51 krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache,
169 ap_req_options, in_data, credsp,
48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
H A Dsend_tgs.c56 tgs_construct_tgsreq(krb5_context context, krb5_data *in_data, argument
90 in_data, &checksum))) {
/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dsign_mgr.c253 CK_BYTE * in_data,
271 if ((length_only == FALSE) && (! in_data || ! out_data)) {
280 in_data, in_data_len,
285 in_data, in_data_len,
291 in_data, in_data_len,
296 in_data, in_data_len,
306 CK_BYTE * in_data,
309 if (! sess || ! ctx || ! in_data) {
325 in_data, in_data_len));
361 CK_BYTE * in_data,
250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
304 sign_mgr_sign_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
[all...]
H A Dverify_mgr.c233 CK_BYTE * in_data,
248 if (! in_data || ! signature) {
258 in_data, in_data_len,
263 in_data, in_data_len,
269 in_data, in_data_len,
274 in_data, in_data_len,
284 CK_BYTE * in_data,
287 if (! sess || ! ctx || ! in_data) {
303 in_data, in_data_len));
231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
282 verify_mgr_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
H A Dmech_rsa.c32 CK_BYTE *in_data,
54 CK_BYTE * in_data,
75 in_data, in_data_len,
84 CK_BYTE * in_data,
107 in_data, in_data_len,
116 CK_BYTE * in_data,
137 hContext, in_data, in_data_len, out_data,
146 CK_BYTE * in_data,
167 in_data, in_data_len, out_data,
178 CK_BYTE *in_data,
52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument
175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument
475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument
[all...]
H A Dmech_md5.c300 CK_BYTE *in_data,
314 MD5Update(ctx->context.md5ctx, in_data, in_data_len);
324 CK_BYTE * in_data,
435 in_data, in_data_len);
487 CK_BYTE * in_data,
497 if (! sess || ! ctx || ! in_data || ! signature) {
515 in_data, in_data_len, hmac, &len);
297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
H A Dmech_sha.c33 CK_BYTE *in_data,
48 SHA1Update(ctx->context.sha1ctx, in_data, in_data_len);
59 CK_BYTE * in_data,
164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len);
217 CK_BYTE *in_data,
227 if (! sess || ! ctx || ! in_data || ! signature) {
243 in_data, in_data_len, hmac, &len);
30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
H A Ddecr_mgr.c163 CK_BYTE *in_data,
174 if ((length_only == FALSE) && (! in_data || ! out_data)) {
183 ctx, in_data, in_data_len, out_data,
160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Dencr_mgr.c162 CK_BYTE *in_data,
173 if ((length_only == FALSE) && (! in_data || ! out_data)) {
182 ctx, in_data, in_data_len, out_data,
159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Ddig_mgr.c375 CK_BYTE *in_data,
388 if ((length_only == FALSE) && (! in_data || ! out_data)) {
400 in_data, in_data_len, out_data, out_data_len));
406 in_data, in_data_len, out_data, out_data_len));
372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
H A Dtpm_specific.c2469 CK_BYTE * in_data,
2509 chunklen, in_data))) {
2531 in_data += chunklen;
2545 CK_BYTE * in_data,
2558 rc = tpm_decrypt_data(hContext, hKey, in_data, in_data_len,
2567 CK_BYTE * in_data,
2592 in_data))) {
2618 CK_BYTE * in_data,
2645 in_data))) {
2674 CK_BYTE *in_data,
2466 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
2543 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
2565 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument
2616 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
2671 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
2782 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument
2813 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/
H A Dcf2.c54 krb5_data in_data; local
75 in_data.length = (krb5_int32) krb5int_buf_len(&prf_inbuf);
76 in_data.data = krb5int_buf_data(&prf_inbuf);
81 retval = krb5_c_prf(context, k, &in_data, &out_data);
85 in_data.data[0]++;
/osnet-11/usr/src/lib/libdisasm/sparc/
H A Ddis_sparc.h94 } in_data; member in struct:inst
H A Ddis_sparc_fmt.c770 prt_name(dhp, inp->in_data.in_def.in_name, 1);
802 prt_name(dhp, inp->in_data.in_def.in_name, 1);
814 prt_name(dhp, inp->in_data.in_def.in_name, 1);
829 const char *name = inp->in_data.in_def.in_name;
840 uint32_t flags = inp->in_data.in_def.in_flags;
1061 const char *iname = inp->in_data.in_def.in_name;
1062 uint32_t flags = inp->in_data.in_def.in_flags;
1313 prt_name(dhp, inp->in_data.in_def.in_name, 1);
1329 const char *name = inp->in_data.in_def.in_name;
1565 bprintf(dhp, "%-9s %s%s%s%s%s", inp->in_data
[all...]
H A Ddis_sparc.c271 tp = inp->in_data.in_tbl;
H A Dinstr.c40 .in_data = { \
49 .in_data = { \
58 .in_data = { \
70 .in_data = { \
/osnet-11/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c567 uint8_t *in_data, *out_data; local
627 in_data = plaintext->Data;
642 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, block_size,
656 in_data += block_size;
672 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, in_len,
686 in_data += in_len;
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto.h127 unsigned char *in_data, unsigned int in_length,
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c1301 uint8_t *in_data, *out_data; local
1315 in_data = ciphertext->Data;
1321 &out_len, ciphertext->Length, in_data, in_len);
1330 in_data += in_len;
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c2359 uint8_t *in_data, *out_data; local
2403 in_data = ciphertext->Data;
2415 ckrv = C_Decrypt(hSession, in_data, block_len,
2425 in_data += block_len;
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/
H A Dopenssl_spi.c2299 uint8_t *in_data, *out_data; local
2317 in_data = ciphertext->Data;
2323 in_data, out_data, rsa, RSA_PKCS1_PADDING);
2332 in_data += in_len;

Completed in 106 milliseconds