/illumos-gate/usr/src/lib/libsmbfs/smb/ |
H A D | spnego.c | 411 unsigned long * pulDataLen ) in spnegoTokenGetBinary() argument 418 NULL != pulDataLen ) in spnegoTokenGetBinary() 423 pSpnegoToken->ulBinaryDataLen > *pulDataLen ) in spnegoTokenGetBinary() 425 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary() 431 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary() 776 …echToken( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbTokenData, unsigned long* pulDataLen ) in spnegoGetMechToken() argument 784 NULL != pulDataLen ) in spnegoGetMechToken() 802 pSpnegoElement->nDatalength > *pulDataLen ) in spnegoGetMechToken() 804 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken() 811 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken() [all …]
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softDecryptUtil.c | 47 CK_ULONG *pulDataLen) in soft_remove_pkcs7_padding() argument 58 *pulDataLen = padded_len; in soft_remove_pkcs7_padding() 271 CK_ULONG_PTR pulDataLen, boolean_t Update) in soft_decrypt_common() argument 284 *pulDataLen = 0; in soft_decrypt_common() 293 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 303 ulEncryptedLen, pData, pulDataLen)); in soft_decrypt_common() 306 ulEncryptedLen, pData, pulDataLen)); in soft_decrypt_common() 312 *pulDataLen = 0; in soft_decrypt_common() 317 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 322 *pulDataLen = 0; in soft_decrypt_common() [all …]
|
H A D | softBlowfishCrypt.c | 315 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, in soft_blowfish_decrypt_common() argument 347 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common() 352 if (*pulDataLen < ulEncryptedLen) { in soft_blowfish_decrypt_common() 353 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common() 378 *pulDataLen = 0; in soft_blowfish_decrypt_common() 396 *pulDataLen = out_len; in soft_blowfish_decrypt_common() 403 if (*pulDataLen < out_len) { in soft_blowfish_decrypt_common() 404 *pulDataLen = out_len; in soft_blowfish_decrypt_common() 442 *pulDataLen = out_len; in soft_blowfish_decrypt_common() 458 *pulDataLen = 0; in soft_blowfish_decrypt_common()
|
H A D | softDESCrypt.c | 489 CK_ULONG_PTR pulDataLen, boolean_t update) in soft_des_decrypt_common() argument 528 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common() 534 if (*pulDataLen < ulEncryptedLen) { in soft_des_decrypt_common() 535 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common() 547 if (*pulDataLen < (ulEncryptedLen - DES_BLOCK_LEN)) { in soft_des_decrypt_common() 548 *pulDataLen = ulEncryptedLen - DES_BLOCK_LEN; in soft_des_decrypt_common() 585 *pulDataLen = 0; in soft_des_decrypt_common() 616 *pulDataLen = out_len; in soft_des_decrypt_common() 623 if (*pulDataLen < out_len) { in soft_des_decrypt_common() 624 *pulDataLen = out_len; in soft_des_decrypt_common() [all …]
|
H A D | softAESCrypt.c | 636 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_aes_decrypt() argument 647 .cd_length = *pulDataLen, in soft_aes_decrypt() 649 .cd_raw.iov_len = *pulDataLen in soft_aes_decrypt() 688 *pulDataLen = out.cd_offset; in soft_aes_decrypt() 737 *pulDataLen = length_needed; in soft_aes_decrypt() 741 if (*pulDataLen < length_needed) { in soft_aes_decrypt() 742 *pulDataLen = length_needed; in soft_aes_decrypt() 748 ulEncryptedDataLen, pData, pulDataLen); in soft_aes_decrypt() 761 out.cd_offset = *pulDataLen; in soft_aes_decrypt() 786 *pulDataLen = out.cd_offset; in soft_aes_decrypt() [all …]
|
H A D | softRSA.c | 332 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) in soft_rsa_decrypt_common() argument 357 *pulDataLen = modulus_len; in soft_rsa_decrypt_common() 363 if (*pulDataLen < (CK_ULONG)modulus_len) { in soft_rsa_decrypt_common() 364 *pulDataLen = modulus_len; in soft_rsa_decrypt_common() 385 if (ulEncryptedLen - num_padding > *pulDataLen) { in soft_rsa_decrypt_common() 386 *pulDataLen = plain_len; in soft_rsa_decrypt_common() 392 *pulDataLen = plain_len; in soft_rsa_decrypt_common() 395 *pulDataLen = modulus_len; in soft_rsa_decrypt_common() 1176 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_rsa_verify_recover() argument 1223 *pulDataLen = data_len; in soft_rsa_verify_recover() [all …]
|
H A D | softDecrypt.c | 105 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 135 if (pulDataLen == NULL) { in C_Decrypt() 168 pData, pulDataLen); in C_Decrypt()
|
H A D | softVerify.c | 333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 348 if ((pSignature == NULL) || (pulDataLen == NULL)) { in C_VerifyRecover() 365 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | softVerifyUtil.c | 504 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_verify_recover() argument 515 ulSignatureLen, pData, pulDataLen)); in soft_verify_recover()
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDecrypt.c | 211 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in kernel_decrypt() argument 254 if (ulEncryptedData < *pulDataLen && inplace) { in kernel_decrypt() 257 decrypt.cd_datalen = *pulDataLen; in kernel_decrypt() 281 *pulDataLen = decrypt.cd_datalen; in kernel_decrypt() 293 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 311 if (pulDataLen == NULL) { in C_Decrypt() 317 pulDataLen); in C_Decrypt()
|
H A D | kernelVerify.c | 564 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 581 if (pSignature == NULL || pulDataLen == NULL) { in C_VerifyRecover() 603 verify_recover.vr_datalen = *pulDataLen; in C_VerifyRecover() 619 *pulDataLen = verify_recover.vr_datalen; in C_VerifyRecover()
|
/illumos-gate/usr/src/lib/libsmbfs/netsmb/ |
H A D | spnego.h | 217 unsigned char *pbTokenData, unsigned long *pulDataLen); 252 unsigned char *pbTokenData, unsigned long *pulDataLen); 256 unsigned char *pbMICData, unsigned long *pulDataLen);
|
/illumos-gate/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaVerify.c | 203 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_VerifyRecover() argument 212 if (pSignature == NULL || pulDataLen == NULL) { in meta_VerifyRecover() 219 pSignature, ulSignatureLen, pData, pulDataLen); in meta_VerifyRecover()
|
H A D | pkcs11Verify.c | 272 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 280 ulSignatureLen, pData, pulDataLen)); in C_VerifyRecover() 296 pSignature, ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | metaCrypt.c | 213 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_Decrypt() argument 222 if (pEncryptedData == NULL || pulDataLen == NULL) { in meta_Decrypt() 229 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in meta_Decrypt()
|
H A D | pkcs11Crypt.c | 281 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 289 ulEncryptedDataLen, pData, pulDataLen)); in C_Decrypt() 305 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt()
|
H A D | metaGlobal.h | 764 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen); 802 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
|
/illumos-gate/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 453 CK_ULONG_PTR pulDataLen /* gets p-text size */ 723 CK_ULONG_PTR pulDataLen /* gets signed data len */
|
/illumos-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 1412 CK_ULONG_PTR pulDataLen) in SC_Decrypt() argument 1428 if (! pEncryptedData || ! pulDataLen) { in SC_Decrypt() 1446 pulDataLen); in SC_Decrypt() 2129 CK_ULONG_PTR pulDataLen) in SC_VerifyRecover() argument 2146 if (!pSignature || !pulDataLen) { in SC_VerifyRecover() 2161 pData, pulDataLen); in SC_VerifyRecover()
|
H A D | api_interface.c | 554 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 567 ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt() 2203 CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 2216 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | tpm_specific.c | 2755 CK_ULONG_PTR pulDataLen, in token_specific_rsa_verify_recover() argument 2797 *pulDataLen = data_len; in token_specific_rsa_verify_recover()
|
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.h | 240 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
|
H A D | pkinit_crypto_openssl.c | 4713 CK_ULONG_PTR pulDataLen) in pkinit_C_Decrypt() argument 4718 ulEncryptedDataLen, pData, pulDataLen); in pkinit_C_Decrypt() 4720 pkiDebug("pData %x *pulDataLen %d\n", (int) pData, (int) *pulDataLen); in pkinit_C_Decrypt()
|