/opensolaris-onvv-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | mk_req.c | 61 krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) 88 in_data, credsp, outbuf); 59 krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, char *service, char *hostname, krb5_data *in_data, krb5_ccache ccache, krb5_data *outbuf) argument
|
H A D | mk_req_ext.c | 131 krb5_flags ap_req_options, krb5_data *in_data, 185 if (!in_data &&(*auth_context)->checksum_func) { 189 &in_data); 202 if (in_data) { 207 checksum.length = in_data->length; 208 checksum.contents = (krb5_octet *) in_data->data; 214 in_data, &checksum))) 130 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument
|
H A D | sendauth.c | 47 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument 167 ap_req_options, in_data, credsp,
|
H A D | send_tgs.c | 55 krb5_send_tgs_basic(krb5_context context, krb5_data *in_data, krb5_creds *in_cred, krb5_data *outbuf) argument 68 in_data, &checksum))) {
|
/opensolaris-onvv-gate/usr/src/lib/pkcs11/pkcs11_tpm/common/ |
H A D | sign_mgr.c | 253 CK_BYTE * in_data, 271 if ((length_only == FALSE) && (! in_data || ! out_data)) { 280 in_data, in_data_len, 285 in_data, in_data_len, 291 in_data, in_data_len, 296 in_data, in_data_len, 306 CK_BYTE * in_data, 309 if (! sess || ! ctx || ! in_data) { 325 in_data, in_data_len)); 361 CK_BYTE * in_data, 250 sign_mgr_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 304 sign_mgr_sign_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 358 sign_mgr_sign_recover(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument [all...] |
H A D | verify_mgr.c | 233 CK_BYTE * in_data, 248 if (! in_data || ! signature) { 258 in_data, in_data_len, 263 in_data, in_data_len, 269 in_data, in_data_len, 274 in_data, in_data_len, 284 CK_BYTE * in_data, 287 if (! sess || ! ctx || ! in_data) { 303 in_data, in_data_len)); 231 verify_mgr_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 282 verify_mgr_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument
|
H A D | mech_rsa.c | 32 CK_BYTE *in_data, 54 CK_BYTE * in_data, 75 in_data, in_data_len, 84 CK_BYTE * in_data, 107 in_data, in_data_len, 116 CK_BYTE * in_data, 137 hContext, in_data, in_data_len, out_data, 146 CK_BYTE * in_data, 167 in_data, in_data_len, out_data, 178 CK_BYTE *in_data, 52 ckm_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 82 ckm_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 114 ckm_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 144 ckm_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG out_data_len, OBJECT * key_obj) argument 175 rsa_pkcs_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 218 rsa_pkcs_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 262 rsa_pkcs_sign(SESSION *sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 307 rsa_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 388 rsa_hash_pkcs_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG * sig_len) argument 475 rsa_hash_pkcs_sign_update( SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len) argument 519 rsa_hash_pkcs_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument 604 rsa_hash_pkcs_verify_update(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE *in_data, CK_ULONG in_data_len) argument [all...] |
H A D | mech_md5.c | 300 CK_BYTE *in_data, 314 MD5Update(ctx->context.md5ctx, in_data, in_data_len); 324 CK_BYTE * in_data, 435 in_data, in_data_len); 487 CK_BYTE * in_data, 497 if (! sess || ! ctx || ! in_data || ! signature) { 515 in_data, in_data_len, hmac, &len); 297 md5_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 321 md5_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 485 md5_hmac_verify(SESSION * sess, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * signature, CK_ULONG sig_len) argument
|
H A D | mech_sha.c | 33 CK_BYTE *in_data, 48 SHA1Update(ctx->context.sha1ctx, in_data, in_data_len); 59 CK_BYTE * in_data, 164 rc = digest_mgr_digest_update(sess, &digest_ctx, in_data, in_data_len); 217 CK_BYTE *in_data, 227 if (! sess || ! ctx || ! in_data || ! signature) { 243 in_data, in_data_len, hmac, &len); 30 sha1_hash(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 56 sha1_hmac_sign(SESSION * sess, CK_BBOOL length_only, SIGN_VERIFY_CONTEXT * ctx, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 215 sha1_hmac_verify(SESSION *sess, SIGN_VERIFY_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *signature, CK_ULONG sig_len) argument
|
H A D | decr_mgr.c | 163 CK_BYTE *in_data, 174 if ((length_only == FALSE) && (! in_data || ! out_data)) { 183 ctx, in_data, in_data_len, out_data, 160 decr_mgr_decrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | encr_mgr.c | 162 CK_BYTE *in_data, 173 if ((length_only == FALSE) && (! in_data || ! out_data)) { 182 ctx, in_data, in_data_len, out_data, 159 encr_mgr_encrypt(SESSION *sess, CK_BBOOL length_only, ENCR_DECR_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | dig_mgr.c | 375 CK_BYTE *in_data, 388 if ((length_only == FALSE) && (! in_data || ! out_data)) { 400 in_data, in_data_len, out_data, out_data_len)); 406 in_data, in_data_len, out_data, out_data_len)); 372 digest_mgr_digest(SESSION *sess, CK_BBOOL length_only, DIGEST_CONTEXT *ctx, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument
|
H A D | tpm_specific.c | 2407 CK_BYTE * in_data, 2447 chunklen, in_data))) { 2469 in_data += chunklen; 2483 CK_BYTE * in_data, 2496 rc = tpm_decrypt_data(hContext, hKey, in_data, in_data_len, 2505 CK_BYTE * in_data, 2530 in_data))) { 2556 CK_BYTE * in_data, 2583 in_data))) { 2612 CK_BYTE *in_data, 2404 tpm_decrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len) argument 2481 token_specific_rsa_decrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2503 token_specific_rsa_verify( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * sig, CK_ULONG sig_len, OBJECT * key_obj) argument 2554 token_specific_rsa_sign( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2609 tpm_encrypt_data( TSS_HCONTEXT hContext, TSS_HKEY hKey, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len) argument 2720 token_specific_rsa_encrypt( TSS_HCONTEXT hContext, CK_BYTE * in_data, CK_ULONG in_data_len, CK_BYTE * out_data, CK_ULONG * out_data_len, OBJECT * key_obj) argument 2751 token_specific_rsa_verify_recover( TSS_HCONTEXT hContext, CK_BYTE *in_data, CK_ULONG in_data_len, CK_BYTE *out_data, CK_ULONG *out_data_len, OBJECT *key_obj) argument [all...] |
/opensolaris-onvv-gate/usr/src/lib/libdisasm/sparc/ |
H A D | dis_sparc.h | 94 } in_data; member in struct:inst
|
H A D | dis_sparc_fmt.c | 715 prt_name(dhp, inp->in_data.in_def.in_name, 1); 747 prt_name(dhp, inp->in_data.in_def.in_name, 1); 759 prt_name(dhp, inp->in_data.in_def.in_name, 1); 774 const char *name = inp->in_data.in_def.in_name; 785 uint32_t flags = inp->in_data.in_def.in_flags; 1006 const char *iname = inp->in_data.in_def.in_name; 1007 uint32_t flags = inp->in_data.in_def.in_flags; 1258 prt_name(dhp, inp->in_data.in_def.in_name, 1); 1274 const char *name = inp->in_data.in_def.in_name; 1505 bprintf(dhp, "%-9s %s%s%s%s%s", inp->in_data [all...] |
H A D | dis_sparc.c | 271 tp = inp->in_data.in_tbl;
|
/opensolaris-onvv-gate/usr/src/uts/common/io/ |
H A D | sysevent.c | 433 if (uargs.in_data.len > MAX_CHNAME_LEN || 437 channel = kmem_alloc(uargs.in_data.len, KM_SLEEP); 439 if (copyin((void *)(uintptr_t)uargs.in_data.name, channel, 440 uargs.in_data.len) != 0) { 441 kmem_free(channel, uargs.in_data.len); 445 if (!sysevent_isstrend(channel, uargs.in_data.len)) { 446 kmem_free(channel, uargs.in_data.len); 468 kmem_free(channel, uargs.in_data.len);
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/in.ripngd/ |
H A D | defs.h | 150 extern void in_data(struct interface *);
|
H A D | main.c | 286 in_data(ifp);
|
H A D | input.c | 71 in_data(struct interface *ifp) function 93 syslog(LOG_ERR, "in_data: recvmsg: %m");
|
/opensolaris-onvv-gate/usr/src/lib/libkmf/libkmf/common/ |
H A D | pk11keys.c | 559 uint8_t *in_data, *out_data; local 619 in_data = plaintext->Data; 634 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, block_size, 648 in_data += block_size; 664 ckRv = C_Encrypt(ckSession, (CK_BYTE_PTR)in_data, in_len, 678 in_data += in_len;
|
/opensolaris-onvv-gate/usr/src/uts/common/io/zyd/ |
H A D | zyd.h | 404 zyd_res zyd_usb_ioread_req(struct zyd_usb *uc, const void *in_data,
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/in.mpathd/ |
H A D | mpd_tables.h | 449 extern void in_data(struct phyint_instance *pii);
|
/opensolaris-onvv-gate/usr/src/cmd/cmd-inet/usr.lib/in.ndpd/ |
H A D | tables.h | 317 extern void in_data(struct phyint *pi);
|
/opensolaris-onvv-gate/usr/src/uts/common/io/usb/clients/usbecm/ |
H A D | usbecm.c | 2897 usb_ep_data_t *in_data, *out_data, *intr_pipe; local 2913 in_data = ecmp->ecm_bulk_in_ep; 2917 if ((in_data == NULL) || (out_data == NULL)) { 2940 in_data->ep_descr.bEndpointAddress, 2959 if (usb_pipe_open(ecmp->ecm_dip, &in_data->ep_descr, &policy, 2998 ecmp->ecm_bulkin_sz = in_data->ep_descr.wMaxPacketSize;
|