/osnet-11/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sign_mgr.c | 255 CK_BYTE * out_data, 271 if ((length_only == FALSE) && (! in_data || ! out_data)) { 281 out_data, out_data_len)); 286 out_data, out_data_len)); 292 out_data, out_data_len)); 297 out_data, out_data_len)); 363 CK_BYTE * out_data, 379 if ((length_only == FALSE) && (! in_data || ! out_data)) { 389 out_data, out_data_len)); 250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | decr_mgr.c | 165 CK_BYTE *out_data, 174 if ((length_only == FALSE) && (! in_data || ! out_data)) { 183 ctx, in_data, in_data_len, out_data, 160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | encr_mgr.c | 164 CK_BYTE *out_data, 173 if ((length_only == FALSE) && (! in_data || ! out_data)) { 182 ctx, in_data, in_data_len, out_data, 159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | mech_rsa.c | 34 CK_BYTE *out_data, 56 CK_BYTE * out_data, 76 out_data, out_data_len, key_obj); 86 CK_BYTE * out_data, 108 out_data, out_data_len, key_obj); 118 CK_BYTE * out_data, 137 hContext, in_data, in_data_len, out_data, 148 CK_BYTE * out_data, 167 in_data, in_data_len, out_data, 180 CK_BYTE *out_data, 52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 345 rsa_pkcs_verify_recover(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *signature, CK_ULONG sig_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument [all...] |
H A D | dig_mgr.c | 377 CK_BYTE *out_data, 388 if ((length_only == FALSE) && (! in_data || ! out_data)) { 400 in_data, in_data_len, out_data, out_data_len)); 406 in_data, in_data_len, out_data, out_data_len)); 372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | mech_md5.c | 302 CK_BYTE *out_data, 315 MD5Final(out_data, ctx->context.md5ctx); 326 CK_BYTE * out_data, 477 (void) memcpy(out_data, hash, hmac_len); 297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | mech_sha.c | 35 CK_BYTE *out_data, 50 SHA1Final(out_data, ctx->context.sha1ctx); 61 CK_BYTE * out_data, 206 (void) memcpy(out_data, hash, hmac_len); 30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument
|
H A D | verify_mgr.c | 340 CK_BYTE * out_data, 363 ctx, signature, sig_len, out_data, out_len)); 335 verify_mgr_verify_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * signature, CK_ULONG sig_len, CK_BYTE * out_data, CK_ULONG * out_len) argument
|
H A D | tpm_specific.c | 2471 CK_BYTE * out_data, 2528 (void) memcpy(out_data + outlen, buf, buf_size); 2547 CK_BYTE * out_data, 2559 out_data, out_data_len); 2620 CK_BYTE * out_data, 2663 (void) memcpy(out_data, sig, sig_len); 2676 CK_BYTE *out_data, 2764 (void) memcpy(out_data + outlen, 2786 CK_BYTE * out_data, 2798 out_data, out_data_le 2466 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2543 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2616 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2671 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2782 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2813 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | cf2.c | 53 krb5_data out_data; local 77 out_data.length = prflen; 78 out_data.data = buffer; 81 retval = krb5_c_prf(context, k, &in_data, &out_data); 84 out_data.data += prflen;
|
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_srv.c | 695 krb5_data *out_data = NULL; local 1006 retval = k5int_encode_krb5_pa_pk_as_rep(rep, &out_data); 1010 retval = k5int_encode_krb5_pa_pk_as_rep_draft9(rep9, &out_data); 1018 if (out_data != NULL) 1019 print_buffer_bin((unsigned char *)out_data->data, out_data->length, 1026 free(out_data->data); 1027 free(out_data); 1028 out_data = NULL; 1041 (*send_pa)->length = out_data [all...] |
H A D | pkinit_clnt.c | 92 krb5_data *out_data = NULL; local 146 nonce, &cksum, request->client, request->server, &out_data); 147 if (retval || !out_data->length) { 178 return_pa_data[0]->length = out_data->length; 179 return_pa_data[0]->contents = (krb5_octet *) out_data->data; 201 free(out_data); 209 if (out_data) { 210 free(out_data->data); 211 free(out_data);
|
H A D | pkinit_crypto.h | 128 unsigned char **out_data, unsigned int *out_data_len);
|
H A D | pkinit_crypto_openssl.h | 216 int type, krb5_data **out_data);
|
H A D | pkinit_crypto_openssl.c | 924 unsigned char **out_data, unsigned int *out_data_len) 949 if ((p = *out_data = malloc(*out_data_len)) == NULL) 2808 krb5_data **out_data) 2870 *out_data = (krb5_data *)malloc(sizeof(krb5_data)); 2871 (*out_data)->length = data->length; 2872 (*out_data)->data = (char *)malloc(data->length); 2873 (void) memcpy((*out_data)->data, data->data, data->length); 2901 krb5_data **out_data) 2907 TD_TRUSTED_CERTIFIERS, out_data); 2918 krb5_data **out_data) 918 cms_contentinfo_create(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int cms_msg_type, unsigned char *data, unsigned int data_len, unsigned char **out_data, unsigned int *out_data_len) argument 2802 pkinit_create_sequence_of_principal_identifiers( krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, int type, krb5_data **out_data) argument 2897 pkinit_create_td_trusted_certifiers(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_data **out_data) argument 2913 pkinit_create_td_invalid_certificate( krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, krb5_data **out_data) argument 2931 pkinit_create_td_dh_parameters(krb5_context context, pkinit_plg_crypto_context plg_cryptoctx, pkinit_req_crypto_context req_cryptoctx, pkinit_identity_crypto_context id_cryptoctx, pkinit_plg_opts *opts, krb5_data **out_data) argument 4935 decode_data(unsigned char **out_data, unsigned int *out_data_len, unsigned char *data, unsigned int data_len, EVP_PKEY *pkey, X509 *cert) argument [all...] |
/osnet-11/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 567 uint8_t *in_data, *out_data; local 628 out_data = ciphertext->Data; 643 (CK_BYTE_PTR)out_data, &out_len); 654 out_data += out_len; 673 (CK_BYTE_PTR)out_data, &out_len); 684 out_data += out_len;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | pac.c | 95 krb5_data *out_data) 159 if (out_data != NULL) { 160 out_data->data = pac->data.data + pac->pac->Buffers[i].Offset; 161 out_data->length = data->length; 90 k5_pac_add_buffer(krb5_context context, krb5_pac pac, krb5_ui_4 type, const krb5_data *data, krb5_boolean zerofill, krb5_data *out_data) argument
|
H A D | preauth2.c | 1099 krb5_data out_data = {0, 0, NULL}; local 1180 &out_data); 1188 free(out_data.data); 1193 (*out_padata)->length = out_data.length; 1194 (*out_padata)->contents = (krb5_octet *)out_data.data;
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1301 uint8_t *in_data, *out_data; local 1314 out_data = output->Data; 1320 rv = PK11_PrivDecryptPKCS1(NSSprivkey, out_data, 1328 out_data += out_len;
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2359 uint8_t *in_data, *out_data; local 2402 out_data = output->Data; 2416 out_data, (CK_ULONG *)&out_len); 2423 out_data += out_len;
|
/osnet-11/usr/src/lib/libkmf/plugins/kmf_openssl/common/ |
H A D | openssl_spi.c | 2299 uint8_t *in_data, *out_data; local 2316 out_data = output->Data; 2323 in_data, out_data, rsa, RSA_PKCS1_PADDING); 2330 out_data += out_len;
|