/titanic_41/usr/src/uts/common/io/bnxe/ |
H A D | bnxe_fcoe.c | 65 void * pData, in BnxeFcoeCqeIndicate() argument 68 struct fcoe_kcqe * kcqe = (struct fcoe_kcqe *)pData; in BnxeFcoeCqeIndicate() 92 void * pData, in BnxeFcoeInitCqeWork() argument 95 if (!BnxeFcoeCqeIndicate(pUM, pData, dataLen)) in BnxeFcoeInitCqeWork() 127 void * pData, in BnxeFcoeInitWqeWork() argument 130 union fcoe_kwqe * kwqe = (union fcoe_kwqe *)pData; in BnxeFcoeInitWqeWork() 204 void * pData, in BnxeFcoeOffloadConnCqeWork() argument 207 if (!BnxeFcoeCqeIndicate(pUM, pData, dataLen)) in BnxeFcoeOffloadConnCqeWork() 251 void * pData, in BnxeFcoeOffloadConnWqeWork() argument 254 union fcoe_kwqe * kwqe = (union fcoe_kwqe *)pData; in BnxeFcoeOffloadConnWqeWork() [all …]
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softBlowfishCrypt.c | 141 soft_blowfish_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_blowfish_encrypt_common() argument 184 in_buf = pData; in soft_blowfish_encrypt_common() 208 soft_blowfish_ctx->remain_len, pData, in soft_blowfish_encrypt_common() 249 pData, out_len - soft_blowfish_ctx->remain_len); in soft_blowfish_encrypt_common() 257 in_buf = pData; in soft_blowfish_encrypt_common() 285 (void) memcpy(soft_blowfish_ctx->data, pData + in soft_blowfish_encrypt_common() 318 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, in soft_blowfish_decrypt_common() argument 349 if (pData == NULL) { in soft_blowfish_decrypt_common() 361 out_buf = pData; in soft_blowfish_decrypt_common() 372 if (pData != NULL) { in soft_blowfish_decrypt_common() [all …]
|
H A D | softSignUtil.c | 129 soft_sign(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_sign() argument 156 rv = soft_hmac_sign_verify_common(session_p, pData, in soft_sign() 160 rv = soft_hmac_sign_verify_common(session_p, pData, in soft_sign() 176 rv = soft_des_sign_verify_common(session_p, pData, in soft_sign() 181 rv = soft_des_sign_verify_common(session_p, pData, in soft_sign() 193 return (soft_rsa_sign_common(session_p, pData, ulDataLen, in soft_sign() 202 return (soft_rsa_digest_sign_common(session_p, pData, ulDataLen, in soft_sign() 207 return (soft_dsa_sign(session_p, pData, ulDataLen, in soft_sign() 212 return (soft_dsa_digest_sign_common(session_p, pData, ulDataLen, in soft_sign() 217 return (soft_ecc_sign(session_p, pData, ulDataLen, in soft_sign() [all …]
|
H A D | softVerifyUtil.c | 130 soft_verify(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_verify() argument 160 rv = soft_hmac_sign_verify_common(session_p, pData, in soft_verify() 186 rv = soft_des_sign_verify_common(session_p, pData, in soft_verify() 204 return (soft_rsa_verify_common(session_p, pData, ulDataLen, in soft_verify() 213 return (soft_rsa_digest_verify_common(session_p, pData, in soft_verify() 218 return (soft_dsa_verify(session_p, pData, ulDataLen, in soft_verify() 223 return (soft_dsa_digest_verify_common(session_p, pData, in soft_verify() 228 return (soft_ecc_verify(session_p, pData, ulDataLen, in soft_verify() 233 return (soft_ecc_digest_verify_common(session_p, pData, in soft_verify() 440 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_verify_recover() argument [all …]
|
H A D | softAESCrypt.c | 154 soft_aes_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_aes_encrypt_common() argument 232 in_buf = pData; in soft_aes_encrypt_common() 259 soft_aes_ctx->remain_len, pData, ulDataLen); in soft_aes_encrypt_common() 298 pData, out_len - soft_aes_ctx->remain_len); in soft_aes_encrypt_common() 305 in_buf = pData; in soft_aes_encrypt_common() 337 (void) memcpy(soft_aes_ctx->data, pData + in soft_aes_encrypt_common() 372 (void) memcpy(soft_aes_ctx->data, pData + in soft_aes_encrypt_common() 422 (char *)pData, ulDataLen, &out); in soft_aes_encrypt_common() 493 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, in soft_aes_decrypt_common() argument 532 if (pData == NULL) { in soft_aes_decrypt_common() [all …]
|
H A D | softDigestUtil.c | 168 soft_digest_common(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_digest_common() argument 231 if (pData != NULL) { in soft_digest_common() 238 pData, (uint_t)ulDataLen); in soft_digest_common() 241 pData, ulDataLen); in soft_digest_common() 254 if (pData != NULL) { in soft_digest_common() 262 pData, (uint32_t)ulDataLen); in soft_digest_common() 265 pData, ulDataLen); in soft_digest_common() 281 if (pData != NULL) { in soft_digest_common() 287 pData, ulDataLen); in soft_digest_common() 335 soft_digest(soft_session_t *session_p, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in soft_digest() argument [all …]
|
H A D | softDESCrypt.c | 176 soft_des_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_des_encrypt_common() argument 253 in_buf = pData; in soft_des_encrypt_common() 273 if (pData != NULL) { in soft_des_encrypt_common() 279 soft_des_ctx->remain_len, pData, ulDataLen); in soft_des_encrypt_common() 318 pData, out_len - soft_des_ctx->remain_len); in soft_des_encrypt_common() 325 in_buf = pData; in soft_des_encrypt_common() 363 (void) memcpy(soft_des_ctx->data, pData + in soft_des_encrypt_common() 399 (void) memcpy(soft_des_ctx->data, pData + in soft_des_encrypt_common() 492 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, in soft_des_decrypt_common() argument 531 if (pData == NULL) { in soft_des_decrypt_common() [all …]
|
H A D | softRSA.c | 240 soft_rsa_encrypt_common(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_rsa_encrypt_common() argument 299 rv = pkcs1_encode(PKCS1_ENCRYPT, pData, ulDataLen, plain_data, in soft_rsa_encrypt_common() 307 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData, in soft_rsa_encrypt_common() 331 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, in soft_rsa_decrypt_common() argument 352 if (pData == NULL) { in soft_rsa_decrypt_common() 391 (void) memcpy(pData, &plain_data[num_padding], plain_len); in soft_rsa_decrypt_common() 394 (void) memcpy(pData, plain_data, modulus_len); in soft_rsa_decrypt_common() 523 soft_rsa_sign_common(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_rsa_sign_common() argument 593 rv = pkcs1_encode(PKCS1_SIGN, pData, ulDataLen, plain_data, in soft_rsa_sign_common() 605 (void) memcpy(&plain_data[modulus_len - ulDataLen], pData, in soft_rsa_sign_common() [all …]
|
H A D | softDecryptUtil.c | 44 soft_remove_pkcs7_padding(CK_BYTE *pData, CK_ULONG padded_len, in soft_remove_pkcs7_padding() argument 50 if ((rv = pkcs7_decode(pData, (&padded_len))) != CKR_OK) in soft_remove_pkcs7_padding() 52 if ((rv = pkcs7_decode(pData, (size_t *)(&padded_len))) != CKR_OK) in soft_remove_pkcs7_padding() 353 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, in soft_decrypt_common() argument 376 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 391 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 401 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 412 ulEncryptedLen, pData, pulDataLen)); in soft_decrypt_common() 418 ulEncryptedLen, pData, pulDataLen, mechanism)); in soft_decrypt_common() 446 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, in soft_decrypt() argument [all …]
|
H A D | softVerify.c | 104 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Verify() argument 120 if (pData == NULL) { in C_Verify() 152 rv = soft_verify(session_p, pData, ulDataLen, pSignature, in C_Verify() 333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 365 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover() 368 (pData == NULL && rv == CKR_OK)) { in C_VerifyRecover()
|
H A D | softSign.c | 104 C_Sign(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Sign() argument 120 if ((pData == NULL) || (pulSignatureLen == NULL)) { in C_Sign() 152 rv = soft_sign(session_p, pData, ulDataLen, pSignature, in C_Sign() 361 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, in C_SignRecover() argument 377 if ((pData == NULL) || (pulSignatureLen == NULL)) { in C_SignRecover() 394 rv = soft_sign_recover(session_p, pData, ulDataLen, pSignature, in C_SignRecover()
|
H A D | softMAC.c | 459 soft_hmac_sign_verify_common(soft_session_t *session_p, CK_BYTE_PTR pData, in soft_hmac_sign_verify_common() argument 502 if (pData != NULL) { in soft_hmac_sign_verify_common() 505 pData, datalen); in soft_hmac_sign_verify_common() 514 if (pData != NULL) { in soft_hmac_sign_verify_common() 517 pData, datalen); in soft_hmac_sign_verify_common() 524 if (pData != NULL) in soft_hmac_sign_verify_common() 527 pData, datalen); in soft_hmac_sign_verify_common() 535 if (pData != NULL) in soft_hmac_sign_verify_common() 538 pData, datalen); in soft_hmac_sign_verify_common() 548 if (pData != NULL) in soft_hmac_sign_verify_common() [all …]
|
/titanic_41/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelSoftCommon.c | 46 do_soft_digest(void **s, CK_MECHANISM_PTR pMechanism, CK_BYTE_PTR pData, in do_soft_digest() argument 82 rv = soft_digest(session_p, pData, ulDataLen, in do_soft_digest() 86 rv = soft_digest_update(session_p, pData, ulDataLen); in do_soft_digest() 148 do_soft_hmac_update(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, int opflag) in do_soft_hmac_update() argument 158 pData, ulDataLen, opflag & OP_SIGN)); in do_soft_hmac_update() 165 do_soft_hmac_sign(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in do_soft_hmac_sign() argument 177 rv = soft_hmac_sign_verify_common(session_p, pData, ulDataLen, in do_soft_hmac_sign() 191 do_soft_hmac_verify(void **s, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in do_soft_hmac_verify() argument 208 rv = soft_hmac_sign_verify_common(session_p, pData, in do_soft_hmac_verify()
|
H A D | kernelDecrypt.c | 189 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in kernel_decrypt() argument 240 decrypt.cd_databuf = (char *)pData; in kernel_decrypt() 244 ((inplace && (pData != NULL)) || (pData == pEncryptedData)) && in kernel_decrypt() 271 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 294 rv = kernel_decrypt(session_p, pEncryptedData, ulEncryptedData, pData, in C_Decrypt() 298 (rv == CKR_OK && pData == NULL)) { in C_Decrypt()
|
/titanic_41/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaSign.c | 76 CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Sign() argument 86 if (pData == NULL || pulSignatureLen == NULL) { in meta_Sign() 93 pData, ulDataLen, pSignature, pulSignatureLen); in meta_Sign() 199 meta_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, in meta_SignRecover() argument 209 if (pData == NULL || pulSignatureLen == NULL) { in meta_SignRecover() 216 pData, ulDataLen, pSignature, pulSignatureLen); in meta_SignRecover()
|
H A D | pkcs11Sign.c | 96 CK_BYTE_PTR pData, in C_Sign() argument 106 return (fast_funcs->C_Sign(hSession, pData, ulDataLen, in C_Sign() 122 rv = FUNCLIST(sessp->se_slotid)->C_Sign(sessp->se_handle, pData, in C_Sign() 274 C_SignRecover(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, in C_SignRecover() argument 282 return (fast_funcs->C_SignRecover(hSession, pData, ulDataLen, in C_SignRecover() 297 rv = FUNCLIST(sessp->se_slotid)->C_SignRecover(sessp->se_handle, pData, in C_SignRecover()
|
H A D | pkcs11Verify.c | 95 C_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in C_Verify() argument 103 return (fast_funcs->C_Verify(hSession, pData, ulDataLen, in C_Verify() 119 rv = FUNCLIST(sessp->se_slotid)->C_Verify(sessp->se_handle, pData, in C_Verify() 274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 282 ulSignatureLen, pData, pulDataLen)); in C_VerifyRecover() 298 pSignature, ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | metaVerify.c | 75 meta_Verify(CK_SESSION_HANDLE hSession, CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Verify() argument 86 if (pData == NULL || pSignature == NULL) { in meta_Verify() 93 pData, ulDataLen, pSignature, &ulSignatureLen); in meta_Verify() 205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_VerifyRecover() argument 221 pSignature, ulSignatureLen, pData, pulDataLen); in meta_VerifyRecover()
|
H A D | pkcs11Crypt.c | 97 CK_BYTE_PTR pData, in C_Encrypt() argument 107 return (fast_funcs->C_Encrypt(hSession, pData, ulDataLen, in C_Encrypt() 123 rv = FUNCLIST(sessp->se_slotid)->C_Encrypt(sessp->se_handle, pData, in C_Encrypt() 282 CK_BYTE_PTR pData, in C_Decrypt() argument 291 ulEncryptedDataLen, pData, pulDataLen)); in C_Decrypt() 307 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt()
|
H A D | metaCrypt.c | 76 CK_BYTE_PTR pData, CK_ULONG ulDataLen, in meta_Encrypt() argument 86 if (pData == NULL || pulEncryptedDataLen == NULL) { in meta_Encrypt() 93 pData, ulDataLen, pEncryptedData, pulEncryptedDataLen); in meta_Encrypt() 203 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_Decrypt() argument 219 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in meta_Decrypt()
|
/titanic_41/usr/src/lib/libsqlite/src/ |
H A D | btree_rb.c | 64 void *pData; member 127 void *pData; member 755 void * pData; in memRbtreeInsert() local 769 pData = sqliteMallocRaw(nData); in memRbtreeInsert() 771 memcpy(pData, pDataInput, nData); in memRbtreeInsert() 793 pNode->pData = pData; in memRbtreeInsert() 846 pOp->pData = pCur->pNode->pData; in memRbtreeInsert() 850 sqliteFree( pCur->pNode->pData ); in memRbtreeInsert() 854 pCur->pNode->pData = pData; in memRbtreeInsert() 951 pOp->pData = pZ->pData; in memRbtreeDelete() [all …]
|
H A D | main.c | 39 static void corruptSchema(InitData *pData, const char *zExtra){ in corruptSchema() argument 40 sqliteSetString(pData->pzErrMsg, "malformed database schema", in corruptSchema() 60 InitData *pData = (InitData*)pInit; in sqliteInitCallback() local 66 corruptSchema(pData, 0); in sqliteInitCallback() 73 sqlite *db = pData->db; in sqliteInitCallback() 75 corruptSchema(pData, 0); in sqliteInitCallback() 90 corruptSchema(pData, zErr); in sqliteInitCallback() 143 InitData *pData = (InitData*)pInit; in upgrade_3_callback() local 149 pTab = sqliteFindTable(pData->db, argv[0], 0); in upgrade_3_callback() 156 rc = sqlite_exec_printf(pData->db, in upgrade_3_callback() [all …]
|
H A D | pager.c | 1119 Pgno sqlitepager_pagenumber(void *pData){ in sqlitepager_pagenumber() argument 1120 PgHdr *p = DATA_TO_PGHDR(pData); in sqlitepager_pagenumber() 1158 int sqlitepager_ref(void *pData){ in sqlitepager_ref() argument 1159 PgHdr *pPg = DATA_TO_PGHDR(pData); in sqlitepager_ref() 1592 int sqlitepager_unref(void *pData){ in sqlitepager_unref() argument 1597 pPg = DATA_TO_PGHDR(pData); in sqlitepager_unref() 1620 pPager->xDestructor(pData); in sqlitepager_unref() 1723 int sqlitepager_begin(void *pData){ in sqlitepager_begin() argument 1724 PgHdr *pPg = DATA_TO_PGHDR(pData); in sqlitepager_begin() 1762 int sqlitepager_write(void *pData){ in sqlitepager_write() argument [all …]
|
/titanic_41/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | memcache.c | 110 typedef int (*PutDataPtr)(void **ppTableData, void *key, void *pData); 113 typedef int (*MiscFuncPtr)(void **ppTableData, void *key, void *pData); 114 typedef void (*ClrTableNodePtr)(void **ppTableData, void *pData); 118 void *pData; member 224 static int htable_put(HashTable *pTable, void *key, void *pData); 226 static int htable_misc(HashTable *pTable, void *key, void *pData); 228 static int htable_removeall(HashTable *pTable, void *pData); 236 static int msgid_putdata(void **ppTableData, void *key, void *pData); 239 static int msgid_clear_ld_items(void **ppTableData, void *key, void *pData); 240 static void msgid_clearnode(void **ppTableData, void *pData); [all …]
|
/titanic_41/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 388 CK_BYTE_PTR pData, /* the plaintext data */ 440 CK_BYTE_PTR pData, /* gets plaintext */ 490 CK_BYTE_PTR pData, /* data to be digested */ 558 CK_BYTE_PTR pData, /* the data to sign */ 609 CK_BYTE_PTR pData, /* the data to sign */ 640 CK_BYTE_PTR pData, /* signed data */ 693 CK_BYTE_PTR pData, /* gets signed data */
|