/titanic_41/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sign_mgr.c | 255 CK_BYTE * out_data, in sign_mgr_sign() argument 271 if ((length_only == FALSE) && (! in_data || ! out_data)) { in sign_mgr_sign() 281 out_data, out_data_len)); in sign_mgr_sign() 286 out_data, out_data_len)); in sign_mgr_sign() 292 out_data, out_data_len)); in sign_mgr_sign() 297 out_data, out_data_len)); in sign_mgr_sign() 363 CK_BYTE * out_data, in sign_mgr_sign_recover() argument 379 if ((length_only == FALSE) && (! in_data || ! out_data)) { in sign_mgr_sign_recover() 389 out_data, out_data_len)); in sign_mgr_sign_recover()
|
H A D | mech_rsa.c | 34 CK_BYTE *out_data, 56 CK_BYTE * out_data, in ckm_rsa_encrypt() argument 76 out_data, out_data_len, key_obj); in ckm_rsa_encrypt() 86 CK_BYTE * out_data, in ckm_rsa_decrypt() argument 108 out_data, out_data_len, key_obj); in ckm_rsa_decrypt() 118 CK_BYTE * out_data, in ckm_rsa_sign() argument 137 hContext, in_data, in_data_len, out_data, in ckm_rsa_sign() 148 CK_BYTE * out_data, in ckm_rsa_verify() argument 167 in_data, in_data_len, out_data, in ckm_rsa_verify() 180 CK_BYTE *out_data, in rsa_pkcs_encrypt() argument [all …]
|
H A D | dig_mgr.c | 377 CK_BYTE *out_data, in digest_mgr_digest() argument 388 if ((length_only == FALSE) && (! in_data || ! out_data)) { in digest_mgr_digest() 400 in_data, in_data_len, out_data, out_data_len)); in digest_mgr_digest() 406 in_data, in_data_len, out_data, out_data_len)); in digest_mgr_digest()
|
H A D | decr_mgr.c | 165 CK_BYTE *out_data, in decr_mgr_decrypt() argument 174 if ((length_only == FALSE) && (! in_data || ! out_data)) { in decr_mgr_decrypt() 183 ctx, in_data, in_data_len, out_data, in decr_mgr_decrypt()
|
H A D | encr_mgr.c | 164 CK_BYTE *out_data, in encr_mgr_encrypt() argument 173 if ((length_only == FALSE) && (! in_data || ! out_data)) { in encr_mgr_encrypt() 182 ctx, in_data, in_data_len, out_data, in encr_mgr_encrypt()
|
H A D | mech_md5.c | 302 CK_BYTE *out_data, in md5_hash() argument 315 MD5Final(out_data, ctx->context.md5ctx); in md5_hash() 326 CK_BYTE * out_data, in md5_hmac_sign() argument 477 (void) memcpy(out_data, hash, hmac_len); in md5_hmac_sign()
|
H A D | mech_sha.c | 35 CK_BYTE *out_data, in sha1_hash() argument 50 SHA1Final(out_data, ctx->context.sha1ctx); in sha1_hash() 61 CK_BYTE * out_data, in sha1_hmac_sign() argument 206 (void) memcpy(out_data, hash, hmac_len); in sha1_hmac_sign()
|
H A D | tpm_specific.c | 2406 CK_BYTE * out_data, in tpm_decrypt_data() argument 2463 (void) memcpy(out_data + outlen, buf, buf_size); in tpm_decrypt_data() 2482 CK_BYTE * out_data, in token_specific_rsa_decrypt() argument 2494 out_data, out_data_len); in token_specific_rsa_decrypt() 2555 CK_BYTE * out_data, in token_specific_rsa_sign() argument 2598 (void) memcpy(out_data, sig, sig_len); in token_specific_rsa_sign() 2611 CK_BYTE *out_data, in tpm_encrypt_data() argument 2699 (void) memcpy(out_data + outlen, in tpm_encrypt_data() 2721 CK_BYTE * out_data, in token_specific_rsa_encrypt() argument 2733 out_data, out_data_len); in token_specific_rsa_encrypt() [all …]
|
H A D | verify_mgr.c | 340 CK_BYTE * out_data, in verify_mgr_verify_recover() argument 363 ctx, signature, sig_len, out_data, out_len)); in verify_mgr_verify_recover()
|
/titanic_41/usr/src/uts/common/io/ |
H A D | sysevent.c | 398 if (uargs.out_data.len == 0 || uargs.out_data.len > EVCH_MAX_DATA_SIZE) in sysevent_channames() 401 buf = kmem_alloc(uargs.out_data.len, KM_SLEEP); in sysevent_channames() 403 if ((len = evch_usrgetchnames(buf, uargs.out_data.len)) == -1) { in sysevent_channames() 408 ASSERT(len <= uargs.out_data.len); in sysevent_channames() 410 (void *)(uintptr_t)uargs.out_data.name, len) != 0) { in sysevent_channames() 415 kmem_free(buf, uargs.out_data.len); in sysevent_channames() 434 uargs.out_data.len > EVCH_MAX_DATA_SIZE) in sysevent_chandata() 450 buf = kmem_alloc(uargs.out_data.len, KM_SLEEP); in sysevent_chandata() 452 len = evch_usrgetchdata(channel, buf, uargs.out_data.len); in sysevent_chandata() 460 ASSERT(len <= uargs.out_data.len); in sysevent_chandata() [all …]
|
/titanic_41/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_srv.c | 695 krb5_data *out_data = NULL; in pkinit_server_return_padata() local 993 retval = k5int_encode_krb5_pa_pk_as_rep(rep, &out_data); in pkinit_server_return_padata() 997 retval = k5int_encode_krb5_pa_pk_as_rep_draft9(rep9, &out_data); in pkinit_server_return_padata() 1005 if (out_data != NULL) in pkinit_server_return_padata() 1006 print_buffer_bin((unsigned char *)out_data->data, out_data->length, in pkinit_server_return_padata() 1013 free(out_data->data); in pkinit_server_return_padata() 1014 free(out_data); in pkinit_server_return_padata() 1015 out_data = NULL; in pkinit_server_return_padata() 1028 (*send_pa)->length = out_data->length; in pkinit_server_return_padata() 1029 (*send_pa)->contents = (krb5_octet *) out_data->data; in pkinit_server_return_padata() [all …]
|
H A D | pkinit_clnt.c | 136 krb5_data *out_data = NULL; local 190 nonce, &cksum, request->server, &out_data); 191 if (retval || !out_data->length) { 222 return_pa_data[0]->length = out_data->length; 223 return_pa_data[0]->contents = (krb5_octet *) out_data->data; 251 if (out_data != NULL) 252 free(out_data); 262 if (out_data) { 263 free(out_data->data); 264 free(out_data);
|
H A D | pkinit_crypto_openssl.c | 2629 krb5_data **out_data) in pkinit_create_sequence_of_principal_identifiers() argument 2691 *out_data = (krb5_data *)malloc(sizeof(krb5_data)); in pkinit_create_sequence_of_principal_identifiers() 2692 (*out_data)->length = data->length; in pkinit_create_sequence_of_principal_identifiers() 2693 (*out_data)->data = (char *)malloc(data->length); in pkinit_create_sequence_of_principal_identifiers() 2694 (void) memcpy((*out_data)->data, data->data, data->length); in pkinit_create_sequence_of_principal_identifiers() 2722 krb5_data **out_data) in pkinit_create_td_trusted_certifiers() argument 2728 TD_TRUSTED_CERTIFIERS, out_data); in pkinit_create_td_trusted_certifiers() 2739 krb5_data **out_data) in pkinit_create_td_invalid_certificate() argument 2745 TD_INVALID_CERTIFICATES, out_data); in pkinit_create_td_invalid_certificate() 2757 krb5_data **out_data) in pkinit_create_td_dh_parameters() argument [all …]
|
H A D | pkinit_crypto_openssl.h | 216 int type, krb5_data **out_data);
|
/titanic_41/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 559 uint8_t *in_data, *out_data; in PKCS_EncryptData() local 620 out_data = ciphertext->Data; in PKCS_EncryptData() 635 (CK_BYTE_PTR)out_data, &out_len); in PKCS_EncryptData() 646 out_data += out_len; in PKCS_EncryptData() 665 (CK_BYTE_PTR)out_data, &out_len); in PKCS_EncryptData() 676 out_data += out_len; in PKCS_EncryptData()
|
/titanic_41/usr/src/uts/common/io/usb/clients/usbser/usbftdi/ |
H A D | uftdi_dsd.c | 1491 usb_ep_data_t *in_data, *out_data; in uftdi_open_pipes() local 1506 out_data = usb_lookup_ep_data(uf->uf_dip, uf->uf_dev_data, ifc, alt, in uftdi_open_pipes() 1509 if (in_data == NULL || out_data == NULL) { in uftdi_open_pipes() 1526 if (out_data->ep_descr.wMaxPacketSize) in uftdi_open_pipes() 1527 uf->uf_obuf_sz = out_data->ep_descr.wMaxPacketSize; in uftdi_open_pipes() 1537 if (usb_pipe_open(uf->uf_dip, &out_data->ep_descr, &policy, in uftdi_open_pipes()
|
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | pac.c | 181 krb5_data *out_data) in k5_pac_add_buffer() argument 245 if (out_data != NULL) { in k5_pac_add_buffer() 246 out_data->data = pac->data.data + pac->pac->Buffers[i].Offset; in k5_pac_add_buffer() 247 out_data->length = data->length; in k5_pac_add_buffer()
|
/titanic_41/usr/src/uts/common/io/zyd/ |
H A D | zyd.h | 405 size_t in_len, void *out_data, size_t out_len);
|
H A D | zyd_usb.c | 716 const void *in_data, size_t in_len, void *out_data, size_t out_len) in zyd_usb_ioread_req() argument 723 uc->io_read.buffer = out_data; in zyd_usb_ioread_req()
|
/titanic_41/usr/src/uts/common/io/usb/clients/usbser/usbsprl/ |
H A D | pl2303_dsd.c | 1461 usb_ep_data_t *in_data, *out_data; in pl2303_open_pipes() local 1470 out_data = usb_lookup_ep_data(plp->pl_dip, plp->pl_dev_data, ifc, alt, in pl2303_open_pipes() 1473 if ((in_data == NULL) || (out_data == NULL)) { in pl2303_open_pipes() 1489 if (usb_pipe_open(plp->pl_dip, &out_data->ep_descr, &policy, in pl2303_open_pipes()
|
/titanic_41/usr/src/uts/common/io/usb/clients/usbecm/ |
H A D | usbecm.c | 2897 usb_ep_data_t *in_data, *out_data, *intr_pipe; in usbecm_open_pipes() local 2914 out_data = ecmp->ecm_bulk_out_ep; in usbecm_open_pipes() 2917 if ((in_data == NULL) || (out_data == NULL)) { in usbecm_open_pipes() 2941 out_data->ep_descr.bEndpointAddress); in usbecm_open_pipes() 2968 if (usb_pipe_open(ecmp->ecm_dip, &out_data->ep_descr, &policy, in usbecm_open_pipes()
|
/titanic_41/usr/src/uts/common/sys/ |
H A D | sysevent_impl.h | 566 sev_box_t out_data; member
|
/titanic_41/usr/src/uts/common/io/usb/clients/usbser/usbsacm/ |
H A D | usbsacm.c | 1987 usb_ep_data_t *in_data, *out_data, *intr_pipe; in usbsacm_open_port_pipes() local 2000 out_data = usb_lookup_ep_data(acmp->acm_dip, acmp->acm_dev_data, in usbsacm_open_port_pipes() 2005 if ((in_data == NULL) || (out_data == NULL)) { in usbsacm_open_port_pipes() 2038 if (usb_pipe_open(acmp->acm_dip, &out_data->ep_descr, &policy, in usbsacm_open_port_pipes()
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_nss/common/ |
H A D | nss_spi.c | 1301 uint8_t *in_data, *out_data; in NSS_DecryptData() local 1314 out_data = output->Data; in NSS_DecryptData() 1320 rv = PK11_PrivDecryptPKCS1(NSSprivkey, out_data, in NSS_DecryptData() 1328 out_data += out_len; in NSS_DecryptData()
|
/titanic_41/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/ |
H A D | pkcs11_spi.c | 2330 uint8_t *in_data, *out_data; in KMFPK11_DecryptData() local 2373 out_data = output->Data; in KMFPK11_DecryptData() 2387 out_data, (CK_ULONG *)&out_len); in KMFPK11_DecryptData() 2394 out_data += out_len; in KMFPK11_DecryptData()
|