/titanic_44/usr/src/lib/libsmbfs/smb/ |
H A D | spnego.c | 310 unsigned long * pulDataLen ) in spnegoTokenGetBinary() argument 317 NULL != pulDataLen ) in spnegoTokenGetBinary() 322 pSpnegoToken->ulBinaryDataLen > *pulDataLen ) in spnegoTokenGetBinary() 324 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary() 330 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary() 675 …echToken( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbTokenData, unsigned long* pulDataLen ) in spnegoGetMechToken() argument 683 NULL != pulDataLen ) in spnegoGetMechToken() 701 pSpnegoElement->nDatalength > *pulDataLen ) in spnegoGetMechToken() 703 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken() 710 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken() [all …]
|
H A D | spnego.h | 210 unsigned long * pulDataLen ); 234 …chToken( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbTokenData, unsigned long* pulDataLen ); 237 …chListMIC( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbMICData, unsigned long* pulDataLen );
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softAESCrypt.c | 494 CK_ULONG_PTR pulDataLen, boolean_t update) in soft_aes_decrypt_common() argument 533 *pulDataLen = ulEncryptedLen; in soft_aes_decrypt_common() 539 if (*pulDataLen < ulEncryptedLen) { in soft_aes_decrypt_common() 540 *pulDataLen = ulEncryptedLen; in soft_aes_decrypt_common() 550 if (*pulDataLen < (ulEncryptedLen - AES_BLOCK_LEN)) { in soft_aes_decrypt_common() 551 *pulDataLen = ulEncryptedLen - AES_BLOCK_LEN; in soft_aes_decrypt_common() 589 *pulDataLen = 0; in soft_aes_decrypt_common() 620 *pulDataLen = out_len; in soft_aes_decrypt_common() 627 if (*pulDataLen < out_len) { in soft_aes_decrypt_common() 628 *pulDataLen = out_len; in soft_aes_decrypt_common() [all …]
|
H A D | softBlowfishCrypt.c | 318 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, in soft_blowfish_decrypt_common() argument 350 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common() 355 if (*pulDataLen < ulEncryptedLen) { in soft_blowfish_decrypt_common() 356 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common() 381 *pulDataLen = 0; in soft_blowfish_decrypt_common() 399 *pulDataLen = out_len; in soft_blowfish_decrypt_common() 406 if (*pulDataLen < out_len) { in soft_blowfish_decrypt_common() 407 *pulDataLen = out_len; in soft_blowfish_decrypt_common() 445 *pulDataLen = out_len; in soft_blowfish_decrypt_common() 461 *pulDataLen = 0; in soft_blowfish_decrypt_common()
|
H A D | softDecryptUtil.c | 45 CK_ULONG *pulDataLen) in soft_remove_pkcs7_padding() argument 56 *pulDataLen = padded_len; in soft_remove_pkcs7_padding() 354 CK_ULONG_PTR pulDataLen, boolean_t Update) in soft_decrypt_common() argument 367 *pulDataLen = 0; in soft_decrypt_common() 376 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 383 *pulDataLen = 0; in soft_decrypt_common() 391 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 396 *pulDataLen = 0; in soft_decrypt_common() 401 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common() 406 *pulDataLen = 0; in soft_decrypt_common() [all …]
|
H A D | softDESCrypt.c | 493 CK_ULONG_PTR pulDataLen, boolean_t update) in soft_des_decrypt_common() argument 532 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common() 538 if (*pulDataLen < ulEncryptedLen) { in soft_des_decrypt_common() 539 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common() 551 if (*pulDataLen < (ulEncryptedLen - DES_BLOCK_LEN)) { in soft_des_decrypt_common() 552 *pulDataLen = ulEncryptedLen - DES_BLOCK_LEN; in soft_des_decrypt_common() 589 *pulDataLen = 0; in soft_des_decrypt_common() 620 *pulDataLen = out_len; in soft_des_decrypt_common() 627 if (*pulDataLen < out_len) { in soft_des_decrypt_common() 628 *pulDataLen = out_len; in soft_des_decrypt_common() [all …]
|
H A D | softRSA.c | 332 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) in soft_rsa_decrypt_common() argument 357 *pulDataLen = modulus_len; in soft_rsa_decrypt_common() 363 if (*pulDataLen < (CK_ULONG)modulus_len) { in soft_rsa_decrypt_common() 364 *pulDataLen = modulus_len; in soft_rsa_decrypt_common() 385 if (ulEncryptedLen - num_padding > *pulDataLen) { in soft_rsa_decrypt_common() 386 *pulDataLen = plain_len; in soft_rsa_decrypt_common() 392 *pulDataLen = plain_len; in soft_rsa_decrypt_common() 395 *pulDataLen = modulus_len; in soft_rsa_decrypt_common() 1176 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_rsa_verify_recover() argument 1223 *pulDataLen = data_len; in soft_rsa_verify_recover() [all …]
|
H A D | softDecrypt.c | 105 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 135 if (pulDataLen == NULL) { in C_Decrypt() 168 pData, pulDataLen); in C_Decrypt()
|
H A D | softVerify.c | 333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 348 if ((pSignature == NULL) || (pulDataLen == NULL)) { in C_VerifyRecover() 365 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | softVerifyUtil.c | 440 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_verify_recover() argument 451 ulSignatureLen, pData, pulDataLen)); in soft_verify_recover()
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_kernel/common/ |
H A D | kernelDecrypt.c | 189 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in kernel_decrypt() argument 232 if (ulEncryptedData < *pulDataLen && inplace) { in kernel_decrypt() 235 decrypt.cd_datalen = *pulDataLen; in kernel_decrypt() 259 *pulDataLen = decrypt.cd_datalen; in kernel_decrypt() 271 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 289 if (pulDataLen == NULL) { in C_Decrypt() 295 pulDataLen); in C_Decrypt()
|
H A D | kernelVerify.c | 564 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 581 if (pSignature == NULL || pulDataLen == NULL) { in C_VerifyRecover() 603 verify_recover.vr_datalen = *pulDataLen; in C_VerifyRecover() 619 *pulDataLen = verify_recover.vr_datalen; in C_VerifyRecover()
|
/titanic_44/usr/src/lib/pkcs11/libpkcs11/common/ |
H A D | metaVerify.c | 205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_VerifyRecover() argument 214 if (pSignature == NULL || pulDataLen == NULL) { in meta_VerifyRecover() 221 pSignature, ulSignatureLen, pData, pulDataLen); in meta_VerifyRecover()
|
H A D | pkcs11Verify.c | 274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 282 ulSignatureLen, pData, pulDataLen)); in C_VerifyRecover() 298 pSignature, ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
H A D | metaCrypt.c | 203 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_Decrypt() argument 212 if (pEncryptedData == NULL || pulDataLen == NULL) { in meta_Decrypt() 219 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in meta_Decrypt()
|
H A D | pkcs11Crypt.c | 283 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 291 ulEncryptedDataLen, pData, pulDataLen)); in C_Decrypt() 307 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt()
|
H A D | metaGlobal.h | 764 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen); 802 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
|
/titanic_44/usr/src/lib/pkcs11/include/ |
H A D | pkcs11f.h | 441 CK_ULONG_PTR pulDataLen /* gets p-text size */ 694 CK_ULONG_PTR pulDataLen /* gets signed data len */
|
/titanic_44/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | new_host.c | 1412 CK_ULONG_PTR pulDataLen) in SC_Decrypt() argument 1428 if (! pEncryptedData || ! pulDataLen) { in SC_Decrypt() 1446 pulDataLen); in SC_Decrypt() 2129 CK_ULONG_PTR pulDataLen) in SC_VerifyRecover() argument 2146 if (!pSignature || !pulDataLen) { in SC_VerifyRecover() 2161 pData, pulDataLen); in SC_VerifyRecover()
|
H A D | api_interface.c | 554 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument 567 ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt() 2203 CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument 2216 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
|
/titanic_44/usr/src/lib/krb5/plugins/preauth/pkinit/ |
H A D | pkinit_crypto_openssl.h | 231 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
|
H A D | pkinit_crypto_openssl.c | 4525 CK_ULONG_PTR pulDataLen) in pkinit_C_Decrypt() argument 4530 ulEncryptedDataLen, pData, pulDataLen); in pkinit_C_Decrypt() 4532 pkiDebug("pData %x *pulDataLen %d\n", (int) pData, (int) *pulDataLen); in pkinit_C_Decrypt()
|