Home
last modified time | relevance | path

Searched refs:pulDataLen (Results 1 – 23 of 23) sorted by relevance

/illumos-gate/usr/src/lib/libsmbfs/smb/
H A Dspnego.c411 unsigned long * pulDataLen ) in spnegoTokenGetBinary() argument
418 NULL != pulDataLen ) in spnegoTokenGetBinary()
423 pSpnegoToken->ulBinaryDataLen > *pulDataLen ) in spnegoTokenGetBinary()
425 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary()
431 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary()
776 …echToken( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbTokenData, unsigned long* pulDataLen ) in spnegoGetMechToken() argument
784 NULL != pulDataLen ) in spnegoGetMechToken()
802 pSpnegoElement->nDatalength > *pulDataLen ) in spnegoGetMechToken()
804 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken()
811 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken()
[all …]
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftDecryptUtil.c47 CK_ULONG *pulDataLen) in soft_remove_pkcs7_padding() argument
58 *pulDataLen = padded_len; in soft_remove_pkcs7_padding()
271 CK_ULONG_PTR pulDataLen, boolean_t Update) in soft_decrypt_common() argument
284 *pulDataLen = 0; in soft_decrypt_common()
293 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common()
303 ulEncryptedLen, pData, pulDataLen)); in soft_decrypt_common()
306 ulEncryptedLen, pData, pulDataLen)); in soft_decrypt_common()
312 *pulDataLen = 0; in soft_decrypt_common()
317 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common()
322 *pulDataLen = 0; in soft_decrypt_common()
[all …]
H A DsoftBlowfishCrypt.c315 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, in soft_blowfish_decrypt_common() argument
347 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common()
352 if (*pulDataLen < ulEncryptedLen) { in soft_blowfish_decrypt_common()
353 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common()
378 *pulDataLen = 0; in soft_blowfish_decrypt_common()
396 *pulDataLen = out_len; in soft_blowfish_decrypt_common()
403 if (*pulDataLen < out_len) { in soft_blowfish_decrypt_common()
404 *pulDataLen = out_len; in soft_blowfish_decrypt_common()
442 *pulDataLen = out_len; in soft_blowfish_decrypt_common()
458 *pulDataLen = 0; in soft_blowfish_decrypt_common()
H A DsoftDESCrypt.c489 CK_ULONG_PTR pulDataLen, boolean_t update) in soft_des_decrypt_common() argument
528 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common()
534 if (*pulDataLen < ulEncryptedLen) { in soft_des_decrypt_common()
535 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common()
547 if (*pulDataLen < (ulEncryptedLen - DES_BLOCK_LEN)) { in soft_des_decrypt_common()
548 *pulDataLen = ulEncryptedLen - DES_BLOCK_LEN; in soft_des_decrypt_common()
585 *pulDataLen = 0; in soft_des_decrypt_common()
616 *pulDataLen = out_len; in soft_des_decrypt_common()
623 if (*pulDataLen < out_len) { in soft_des_decrypt_common()
624 *pulDataLen = out_len; in soft_des_decrypt_common()
[all …]
H A DsoftAESCrypt.c636 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_aes_decrypt() argument
647 .cd_length = *pulDataLen, in soft_aes_decrypt()
649 .cd_raw.iov_len = *pulDataLen in soft_aes_decrypt()
688 *pulDataLen = out.cd_offset; in soft_aes_decrypt()
737 *pulDataLen = length_needed; in soft_aes_decrypt()
741 if (*pulDataLen < length_needed) { in soft_aes_decrypt()
742 *pulDataLen = length_needed; in soft_aes_decrypt()
748 ulEncryptedDataLen, pData, pulDataLen); in soft_aes_decrypt()
761 out.cd_offset = *pulDataLen; in soft_aes_decrypt()
786 *pulDataLen = out.cd_offset; in soft_aes_decrypt()
[all …]
H A DsoftRSA.c332 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) in soft_rsa_decrypt_common() argument
357 *pulDataLen = modulus_len; in soft_rsa_decrypt_common()
363 if (*pulDataLen < (CK_ULONG)modulus_len) { in soft_rsa_decrypt_common()
364 *pulDataLen = modulus_len; in soft_rsa_decrypt_common()
385 if (ulEncryptedLen - num_padding > *pulDataLen) { in soft_rsa_decrypt_common()
386 *pulDataLen = plain_len; in soft_rsa_decrypt_common()
392 *pulDataLen = plain_len; in soft_rsa_decrypt_common()
395 *pulDataLen = modulus_len; in soft_rsa_decrypt_common()
1176 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_rsa_verify_recover() argument
1223 *pulDataLen = data_len; in soft_rsa_verify_recover()
[all …]
H A DsoftDecrypt.c105 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
135 if (pulDataLen == NULL) { in C_Decrypt()
168 pData, pulDataLen); in C_Decrypt()
H A DsoftVerify.c333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
348 if ((pSignature == NULL) || (pulDataLen == NULL)) { in C_VerifyRecover()
365 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
H A DsoftVerifyUtil.c504 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_verify_recover() argument
515 ulSignatureLen, pData, pulDataLen)); in soft_verify_recover()
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelDecrypt.c211 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in kernel_decrypt() argument
254 if (ulEncryptedData < *pulDataLen && inplace) { in kernel_decrypt()
257 decrypt.cd_datalen = *pulDataLen; in kernel_decrypt()
281 *pulDataLen = decrypt.cd_datalen; in kernel_decrypt()
293 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
311 if (pulDataLen == NULL) { in C_Decrypt()
317 pulDataLen); in C_Decrypt()
H A DkernelVerify.c564 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
581 if (pSignature == NULL || pulDataLen == NULL) { in C_VerifyRecover()
603 verify_recover.vr_datalen = *pulDataLen; in C_VerifyRecover()
619 *pulDataLen = verify_recover.vr_datalen; in C_VerifyRecover()
/illumos-gate/usr/src/lib/libsmbfs/netsmb/
H A Dspnego.h217 unsigned char *pbTokenData, unsigned long *pulDataLen);
252 unsigned char *pbTokenData, unsigned long *pulDataLen);
256 unsigned char *pbMICData, unsigned long *pulDataLen);
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaVerify.c203 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_VerifyRecover() argument
212 if (pSignature == NULL || pulDataLen == NULL) { in meta_VerifyRecover()
219 pSignature, ulSignatureLen, pData, pulDataLen); in meta_VerifyRecover()
H A Dpkcs11Verify.c272 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
280 ulSignatureLen, pData, pulDataLen)); in C_VerifyRecover()
296 pSignature, ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
H A DmetaCrypt.c213 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_Decrypt() argument
222 if (pEncryptedData == NULL || pulDataLen == NULL) { in meta_Decrypt()
229 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in meta_Decrypt()
H A Dpkcs11Crypt.c281 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
289 ulEncryptedDataLen, pData, pulDataLen)); in C_Decrypt()
305 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt()
H A DmetaGlobal.h764 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
802 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
/illumos-gate/usr/src/lib/pkcs11/include/
H A Dpkcs11f.h453 CK_ULONG_PTR pulDataLen /* gets p-text size */
723 CK_ULONG_PTR pulDataLen /* gets signed data len */
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dnew_host.c1412 CK_ULONG_PTR pulDataLen) in SC_Decrypt() argument
1428 if (! pEncryptedData || ! pulDataLen) { in SC_Decrypt()
1446 pulDataLen); in SC_Decrypt()
2129 CK_ULONG_PTR pulDataLen) in SC_VerifyRecover() argument
2146 if (!pSignature || !pulDataLen) { in SC_VerifyRecover()
2161 pData, pulDataLen); in SC_VerifyRecover()
H A Dapi_interface.c554 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
567 ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt()
2203 CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
2216 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
H A Dtpm_specific.c2755 CK_ULONG_PTR pulDataLen, in token_specific_rsa_verify_recover() argument
2797 *pulDataLen = data_len; in token_specific_rsa_verify_recover()
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.h240 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
H A Dpkinit_crypto_openssl.c4713 CK_ULONG_PTR pulDataLen) in pkinit_C_Decrypt() argument
4718 ulEncryptedDataLen, pData, pulDataLen); in pkinit_C_Decrypt()
4720 pkiDebug("pData %x *pulDataLen %d\n", (int) pData, (int) *pulDataLen); in pkinit_C_Decrypt()