Home
last modified time | relevance | path

Searched refs:pulDataLen (Results 1 – 22 of 22) sorted by relevance

/titanic_44/usr/src/lib/libsmbfs/smb/
H A Dspnego.c310 unsigned long * pulDataLen ) in spnegoTokenGetBinary() argument
317 NULL != pulDataLen ) in spnegoTokenGetBinary()
322 pSpnegoToken->ulBinaryDataLen > *pulDataLen ) in spnegoTokenGetBinary()
324 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary()
330 *pulDataLen = pSpnegoToken->ulBinaryDataLen; in spnegoTokenGetBinary()
675 …echToken( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbTokenData, unsigned long* pulDataLen ) in spnegoGetMechToken() argument
683 NULL != pulDataLen ) in spnegoGetMechToken()
701 pSpnegoElement->nDatalength > *pulDataLen ) in spnegoGetMechToken()
703 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken()
710 *pulDataLen = pSpnegoElement->nDatalength; in spnegoGetMechToken()
[all …]
H A Dspnego.h210 unsigned long * pulDataLen );
234 …chToken( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbTokenData, unsigned long* pulDataLen );
237 …chListMIC( SPNEGO_TOKEN_HANDLE hSpnegoToken, unsigned char* pbMICData, unsigned long* pulDataLen );
/titanic_44/usr/src/lib/pkcs11/pkcs11_softtoken/common/
H A DsoftAESCrypt.c494 CK_ULONG_PTR pulDataLen, boolean_t update) in soft_aes_decrypt_common() argument
533 *pulDataLen = ulEncryptedLen; in soft_aes_decrypt_common()
539 if (*pulDataLen < ulEncryptedLen) { in soft_aes_decrypt_common()
540 *pulDataLen = ulEncryptedLen; in soft_aes_decrypt_common()
550 if (*pulDataLen < (ulEncryptedLen - AES_BLOCK_LEN)) { in soft_aes_decrypt_common()
551 *pulDataLen = ulEncryptedLen - AES_BLOCK_LEN; in soft_aes_decrypt_common()
589 *pulDataLen = 0; in soft_aes_decrypt_common()
620 *pulDataLen = out_len; in soft_aes_decrypt_common()
627 if (*pulDataLen < out_len) { in soft_aes_decrypt_common()
628 *pulDataLen = out_len; in soft_aes_decrypt_common()
[all …]
H A DsoftBlowfishCrypt.c318 CK_ULONG ulEncryptedLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen, in soft_blowfish_decrypt_common() argument
350 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common()
355 if (*pulDataLen < ulEncryptedLen) { in soft_blowfish_decrypt_common()
356 *pulDataLen = ulEncryptedLen; in soft_blowfish_decrypt_common()
381 *pulDataLen = 0; in soft_blowfish_decrypt_common()
399 *pulDataLen = out_len; in soft_blowfish_decrypt_common()
406 if (*pulDataLen < out_len) { in soft_blowfish_decrypt_common()
407 *pulDataLen = out_len; in soft_blowfish_decrypt_common()
445 *pulDataLen = out_len; in soft_blowfish_decrypt_common()
461 *pulDataLen = 0; in soft_blowfish_decrypt_common()
H A DsoftDecryptUtil.c45 CK_ULONG *pulDataLen) in soft_remove_pkcs7_padding() argument
56 *pulDataLen = padded_len; in soft_remove_pkcs7_padding()
354 CK_ULONG_PTR pulDataLen, boolean_t Update) in soft_decrypt_common() argument
367 *pulDataLen = 0; in soft_decrypt_common()
376 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common()
383 *pulDataLen = 0; in soft_decrypt_common()
391 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common()
396 *pulDataLen = 0; in soft_decrypt_common()
401 ulEncryptedLen, pData, pulDataLen, Update)); in soft_decrypt_common()
406 *pulDataLen = 0; in soft_decrypt_common()
[all …]
H A DsoftDESCrypt.c493 CK_ULONG_PTR pulDataLen, boolean_t update) in soft_des_decrypt_common() argument
532 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common()
538 if (*pulDataLen < ulEncryptedLen) { in soft_des_decrypt_common()
539 *pulDataLen = ulEncryptedLen; in soft_des_decrypt_common()
551 if (*pulDataLen < (ulEncryptedLen - DES_BLOCK_LEN)) { in soft_des_decrypt_common()
552 *pulDataLen = ulEncryptedLen - DES_BLOCK_LEN; in soft_des_decrypt_common()
589 *pulDataLen = 0; in soft_des_decrypt_common()
620 *pulDataLen = out_len; in soft_des_decrypt_common()
627 if (*pulDataLen < out_len) { in soft_des_decrypt_common()
628 *pulDataLen = out_len; in soft_des_decrypt_common()
[all …]
H A DsoftRSA.c332 CK_ULONG_PTR pulDataLen, CK_MECHANISM_TYPE mechanism) in soft_rsa_decrypt_common() argument
357 *pulDataLen = modulus_len; in soft_rsa_decrypt_common()
363 if (*pulDataLen < (CK_ULONG)modulus_len) { in soft_rsa_decrypt_common()
364 *pulDataLen = modulus_len; in soft_rsa_decrypt_common()
385 if (ulEncryptedLen - num_padding > *pulDataLen) { in soft_rsa_decrypt_common()
386 *pulDataLen = plain_len; in soft_rsa_decrypt_common()
392 *pulDataLen = plain_len; in soft_rsa_decrypt_common()
395 *pulDataLen = modulus_len; in soft_rsa_decrypt_common()
1176 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_rsa_verify_recover() argument
1223 *pulDataLen = data_len; in soft_rsa_verify_recover()
[all …]
H A DsoftDecrypt.c105 CK_ULONG ulEncryptedDataLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
135 if (pulDataLen == NULL) { in C_Decrypt()
168 pData, pulDataLen); in C_Decrypt()
H A DsoftVerify.c333 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
348 if ((pSignature == NULL) || (pulDataLen == NULL)) { in C_VerifyRecover()
365 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
H A DsoftVerifyUtil.c440 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in soft_verify_recover() argument
451 ulSignatureLen, pData, pulDataLen)); in soft_verify_recover()
/titanic_44/usr/src/lib/pkcs11/pkcs11_kernel/common/
H A DkernelDecrypt.c189 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in kernel_decrypt() argument
232 if (ulEncryptedData < *pulDataLen && inplace) { in kernel_decrypt()
235 decrypt.cd_datalen = *pulDataLen; in kernel_decrypt()
259 *pulDataLen = decrypt.cd_datalen; in kernel_decrypt()
271 CK_ULONG ulEncryptedData, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
289 if (pulDataLen == NULL) { in C_Decrypt()
295 pulDataLen); in C_Decrypt()
H A DkernelVerify.c564 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
581 if (pSignature == NULL || pulDataLen == NULL) { in C_VerifyRecover()
603 verify_recover.vr_datalen = *pulDataLen; in C_VerifyRecover()
619 *pulDataLen = verify_recover.vr_datalen; in C_VerifyRecover()
/titanic_44/usr/src/lib/pkcs11/libpkcs11/common/
H A DmetaVerify.c205 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_VerifyRecover() argument
214 if (pSignature == NULL || pulDataLen == NULL) { in meta_VerifyRecover()
221 pSignature, ulSignatureLen, pData, pulDataLen); in meta_VerifyRecover()
H A Dpkcs11Verify.c274 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
282 ulSignatureLen, pData, pulDataLen)); in C_VerifyRecover()
298 pSignature, ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
H A DmetaCrypt.c203 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen) in meta_Decrypt() argument
212 if (pEncryptedData == NULL || pulDataLen == NULL) { in meta_Decrypt()
219 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in meta_Decrypt()
H A Dpkcs11Crypt.c283 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
291 ulEncryptedDataLen, pData, pulDataLen)); in C_Decrypt()
307 pEncryptedData, ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt()
H A DmetaGlobal.h764 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
802 CK_ULONG ulSignatureLen, CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
/titanic_44/usr/src/lib/pkcs11/include/
H A Dpkcs11f.h441 CK_ULONG_PTR pulDataLen /* gets p-text size */
694 CK_ULONG_PTR pulDataLen /* gets signed data len */
/titanic_44/usr/src/lib/pkcs11/pkcs11_tpm/common/
H A Dnew_host.c1412 CK_ULONG_PTR pulDataLen) in SC_Decrypt() argument
1428 if (! pEncryptedData || ! pulDataLen) { in SC_Decrypt()
1446 pulDataLen); in SC_Decrypt()
2129 CK_ULONG_PTR pulDataLen) in SC_VerifyRecover() argument
2146 if (!pSignature || !pulDataLen) { in SC_VerifyRecover()
2161 pData, pulDataLen); in SC_VerifyRecover()
H A Dapi_interface.c554 CK_ULONG_PTR pulDataLen) in C_Decrypt() argument
567 ulEncryptedDataLen, pData, pulDataLen); in C_Decrypt()
2203 CK_ULONG_PTR pulDataLen) in C_VerifyRecover() argument
2216 ulSignatureLen, pData, pulDataLen); in C_VerifyRecover()
/titanic_44/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.h231 CK_BYTE_PTR pData, CK_ULONG_PTR pulDataLen);
H A Dpkinit_crypto_openssl.c4525 CK_ULONG_PTR pulDataLen) in pkinit_C_Decrypt() argument
4530 ulEncryptedDataLen, pData, pulDataLen); in pkinit_C_Decrypt()
4532 pkiDebug("pData %x *pulDataLen %d\n", (int) pData, (int) *pulDataLen); in pkinit_C_Decrypt()