Home
last modified time | relevance | path

Searched refs:out_data (Results 1 – 25 of 27) sorted by relevance

12

/titanic_41/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dsign_mgr.c255 CK_BYTE * out_data, in sign_mgr_sign() argument
271 if ((length_only == FALSE) && (! in_data || ! out_data)) { in sign_mgr_sign()
281 out_data, out_data_len)); in sign_mgr_sign()
286 out_data, out_data_len)); in sign_mgr_sign()
292 out_data, out_data_len)); in sign_mgr_sign()
297 out_data, out_data_len)); in sign_mgr_sign()
363 CK_BYTE * out_data, in sign_mgr_sign_recover() argument
379 if ((length_only == FALSE) && (! in_data || ! out_data)) { in sign_mgr_sign_recover()
389 out_data, out_data_len)); in sign_mgr_sign_recover()
H A Dmech_rsa.c34 CK_BYTE *out_data,
56 CK_BYTE * out_data, in ckm_rsa_encrypt() argument
76 out_data, out_data_len, key_obj); in ckm_rsa_encrypt()
86 CK_BYTE * out_data, in ckm_rsa_decrypt() argument
108 out_data, out_data_len, key_obj); in ckm_rsa_decrypt()
118 CK_BYTE * out_data, in ckm_rsa_sign() argument
137 hContext, in_data, in_data_len, out_data, in ckm_rsa_sign()
148 CK_BYTE * out_data, in ckm_rsa_verify() argument
167 in_data, in_data_len, out_data, in ckm_rsa_verify()
180 CK_BYTE *out_data, in rsa_pkcs_encrypt() argument
[all …]
H A Ddig_mgr.c377 CK_BYTE *out_data, in digest_mgr_digest() argument
388 if ((length_only == FALSE) && (! in_data || ! out_data)) { in digest_mgr_digest()
400 in_data, in_data_len, out_data, out_data_len)); in digest_mgr_digest()
406 in_data, in_data_len, out_data, out_data_len)); in digest_mgr_digest()
H A Ddecr_mgr.c165 CK_BYTE *out_data, in decr_mgr_decrypt() argument
174 if ((length_only == FALSE) && (! in_data || ! out_data)) { in decr_mgr_decrypt()
183 ctx, in_data, in_data_len, out_data, in decr_mgr_decrypt()
H A Dencr_mgr.c164 CK_BYTE *out_data, in encr_mgr_encrypt() argument
173 if ((length_only == FALSE) && (! in_data || ! out_data)) { in encr_mgr_encrypt()
182 ctx, in_data, in_data_len, out_data, in encr_mgr_encrypt()
H A Dmech_md5.c302 CK_BYTE *out_data, in md5_hash() argument
315 MD5Final(out_data, ctx->context.md5ctx); in md5_hash()
326 CK_BYTE * out_data, in md5_hmac_sign() argument
477 (void) memcpy(out_data, hash, hmac_len); in md5_hmac_sign()
H A Dmech_sha.c35 CK_BYTE *out_data, in sha1_hash() argument
50 SHA1Final(out_data, ctx->context.sha1ctx); in sha1_hash()
61 CK_BYTE * out_data, in sha1_hmac_sign() argument
206 (void) memcpy(out_data, hash, hmac_len); in sha1_hmac_sign()
H A Dtpm_specific.c2406 CK_BYTE * out_data, in tpm_decrypt_data() argument
2463 (void) memcpy(out_data + outlen, buf, buf_size); in tpm_decrypt_data()
2482 CK_BYTE * out_data, in token_specific_rsa_decrypt() argument
2494 out_data, out_data_len); in token_specific_rsa_decrypt()
2555 CK_BYTE * out_data, in token_specific_rsa_sign() argument
2598 (void) memcpy(out_data, sig, sig_len); in token_specific_rsa_sign()
2611 CK_BYTE *out_data, in tpm_encrypt_data() argument
2699 (void) memcpy(out_data + outlen, in tpm_encrypt_data()
2721 CK_BYTE * out_data, in token_specific_rsa_encrypt() argument
2733 out_data, out_data_len); in token_specific_rsa_encrypt()
[all …]
H A Dverify_mgr.c340 CK_BYTE * out_data, in verify_mgr_verify_recover() argument
363 ctx, signature, sig_len, out_data, out_len)); in verify_mgr_verify_recover()
/titanic_41/usr/src/uts/common/io/
H A Dsysevent.c398 if (uargs.out_data.len == 0 || uargs.out_data.len > EVCH_MAX_DATA_SIZE) in sysevent_channames()
401 buf = kmem_alloc(uargs.out_data.len, KM_SLEEP); in sysevent_channames()
403 if ((len = evch_usrgetchnames(buf, uargs.out_data.len)) == -1) { in sysevent_channames()
408 ASSERT(len <= uargs.out_data.len); in sysevent_channames()
410 (void *)(uintptr_t)uargs.out_data.name, len) != 0) { in sysevent_channames()
415 kmem_free(buf, uargs.out_data.len); in sysevent_channames()
434 uargs.out_data.len > EVCH_MAX_DATA_SIZE) in sysevent_chandata()
450 buf = kmem_alloc(uargs.out_data.len, KM_SLEEP); in sysevent_chandata()
452 len = evch_usrgetchdata(channel, buf, uargs.out_data.len); in sysevent_chandata()
460 ASSERT(len <= uargs.out_data.len); in sysevent_chandata()
[all …]
/titanic_41/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_srv.c695 krb5_data *out_data = NULL; in pkinit_server_return_padata() local
993 retval = k5int_encode_krb5_pa_pk_as_rep(rep, &out_data); in pkinit_server_return_padata()
997 retval = k5int_encode_krb5_pa_pk_as_rep_draft9(rep9, &out_data); in pkinit_server_return_padata()
1005 if (out_data != NULL) in pkinit_server_return_padata()
1006 print_buffer_bin((unsigned char *)out_data->data, out_data->length, in pkinit_server_return_padata()
1013 free(out_data->data); in pkinit_server_return_padata()
1014 free(out_data); in pkinit_server_return_padata()
1015 out_data = NULL; in pkinit_server_return_padata()
1028 (*send_pa)->length = out_data->length; in pkinit_server_return_padata()
1029 (*send_pa)->contents = (krb5_octet *) out_data->data; in pkinit_server_return_padata()
[all …]
H A Dpkinit_clnt.c136 krb5_data *out_data = NULL; local
190 nonce, &cksum, request->server, &out_data);
191 if (retval || !out_data->length) {
222 return_pa_data[0]->length = out_data->length;
223 return_pa_data[0]->contents = (krb5_octet *) out_data->data;
251 if (out_data != NULL)
252 free(out_data);
262 if (out_data) {
263 free(out_data->data);
264 free(out_data);
H A Dpkinit_crypto_openssl.c2629 krb5_data **out_data) in pkinit_create_sequence_of_principal_identifiers() argument
2691 *out_data = (krb5_data *)malloc(sizeof(krb5_data)); in pkinit_create_sequence_of_principal_identifiers()
2692 (*out_data)->length = data->length; in pkinit_create_sequence_of_principal_identifiers()
2693 (*out_data)->data = (char *)malloc(data->length); in pkinit_create_sequence_of_principal_identifiers()
2694 (void) memcpy((*out_data)->data, data->data, data->length); in pkinit_create_sequence_of_principal_identifiers()
2722 krb5_data **out_data) in pkinit_create_td_trusted_certifiers() argument
2728 TD_TRUSTED_CERTIFIERS, out_data); in pkinit_create_td_trusted_certifiers()
2739 krb5_data **out_data) in pkinit_create_td_invalid_certificate() argument
2745 TD_INVALID_CERTIFICATES, out_data); in pkinit_create_td_invalid_certificate()
2757 krb5_data **out_data) in pkinit_create_td_dh_parameters() argument
[all …]
H A Dpkinit_crypto_openssl.h216 int type, krb5_data **out_data);
/titanic_41/usr/src/lib/libkmf/libkmf/common/
H A Dpk11keys.c559 uint8_t *in_data, *out_data; in PKCS_EncryptData() local
620 out_data = ciphertext->Data; in PKCS_EncryptData()
635 (CK_BYTE_PTR)out_data, &out_len); in PKCS_EncryptData()
646 out_data += out_len; in PKCS_EncryptData()
665 (CK_BYTE_PTR)out_data, &out_len); in PKCS_EncryptData()
676 out_data += out_len; in PKCS_EncryptData()
/titanic_41/usr/src/uts/common/io/usb/clients/usbser/usbftdi/
H A Duftdi_dsd.c1491 usb_ep_data_t *in_data, *out_data; in uftdi_open_pipes() local
1506 out_data = usb_lookup_ep_data(uf->uf_dip, uf->uf_dev_data, ifc, alt, in uftdi_open_pipes()
1509 if (in_data == NULL || out_data == NULL) { in uftdi_open_pipes()
1526 if (out_data->ep_descr.wMaxPacketSize) in uftdi_open_pipes()
1527 uf->uf_obuf_sz = out_data->ep_descr.wMaxPacketSize; in uftdi_open_pipes()
1537 if (usb_pipe_open(uf->uf_dip, &out_data->ep_descr, &policy, in uftdi_open_pipes()
/titanic_41/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dpac.c181 krb5_data *out_data) in k5_pac_add_buffer() argument
245 if (out_data != NULL) { in k5_pac_add_buffer()
246 out_data->data = pac->data.data + pac->pac->Buffers[i].Offset; in k5_pac_add_buffer()
247 out_data->length = data->length; in k5_pac_add_buffer()
/titanic_41/usr/src/uts/common/io/zyd/
H A Dzyd.h405 size_t in_len, void *out_data, size_t out_len);
H A Dzyd_usb.c716 const void *in_data, size_t in_len, void *out_data, size_t out_len) in zyd_usb_ioread_req() argument
723 uc->io_read.buffer = out_data; in zyd_usb_ioread_req()
/titanic_41/usr/src/uts/common/io/usb/clients/usbser/usbsprl/
H A Dpl2303_dsd.c1461 usb_ep_data_t *in_data, *out_data; in pl2303_open_pipes() local
1470 out_data = usb_lookup_ep_data(plp->pl_dip, plp->pl_dev_data, ifc, alt, in pl2303_open_pipes()
1473 if ((in_data == NULL) || (out_data == NULL)) { in pl2303_open_pipes()
1489 if (usb_pipe_open(plp->pl_dip, &out_data->ep_descr, &policy, in pl2303_open_pipes()
/titanic_41/usr/src/uts/common/io/usb/clients/usbecm/
H A Dusbecm.c2897 usb_ep_data_t *in_data, *out_data, *intr_pipe; in usbecm_open_pipes() local
2914 out_data = ecmp->ecm_bulk_out_ep; in usbecm_open_pipes()
2917 if ((in_data == NULL) || (out_data == NULL)) { in usbecm_open_pipes()
2941 out_data->ep_descr.bEndpointAddress); in usbecm_open_pipes()
2968 if (usb_pipe_open(ecmp->ecm_dip, &out_data->ep_descr, &policy, in usbecm_open_pipes()
/titanic_41/usr/src/uts/common/sys/
H A Dsysevent_impl.h566 sev_box_t out_data; member
/titanic_41/usr/src/uts/common/io/usb/clients/usbser/usbsacm/
H A Dusbsacm.c1987 usb_ep_data_t *in_data, *out_data, *intr_pipe; in usbsacm_open_port_pipes() local
2000 out_data = usb_lookup_ep_data(acmp->acm_dip, acmp->acm_dev_data, in usbsacm_open_port_pipes()
2005 if ((in_data == NULL) || (out_data == NULL)) { in usbsacm_open_port_pipes()
2038 if (usb_pipe_open(acmp->acm_dip, &out_data->ep_descr, &policy, in usbsacm_open_port_pipes()
/titanic_41/usr/src/lib/libkmf/plugins/kmf_nss/common/
H A Dnss_spi.c1301 uint8_t *in_data, *out_data; in NSS_DecryptData() local
1314 out_data = output->Data; in NSS_DecryptData()
1320 rv = PK11_PrivDecryptPKCS1(NSSprivkey, out_data, in NSS_DecryptData()
1328 out_data += out_len; in NSS_DecryptData()
/titanic_41/usr/src/lib/libkmf/plugins/kmf_pkcs11/common/
H A Dpkcs11_spi.c2330 uint8_t *in_data, *out_data; in KMFPK11_DecryptData() local
2373 out_data = output->Data; in KMFPK11_DecryptData()
2387 out_data, (CK_ULONG *)&out_len); in KMFPK11_DecryptData()
2394 out_data += out_len; in KMFPK11_DecryptData()

12