Lines Matching defs:data

59                            void *data)
71 UI_add_user_data(ui, data);
102 void *data;
114 pass_data->data = ui_data;
121 static int file_get_pem_pass(char *buf, int num, int w, void *data)
123 struct pem_pass_data *pass_data = data;
126 pass_data->data);
155 * create an OSSL_STORE_INFO with a generic data pointer and arbitrary
166 /* This is the embedded data */
180 struct embedded_st *data;
182 if (info != NULL && (data = get0_EMBEDDED(info)) != NULL) {
183 BUF_MEM_free(data->blob);
184 OPENSSL_free(data->pem_name);
185 OPENSSL_free(data);
194 struct embedded_st *data = NULL;
196 if ((data = OPENSSL_zalloc(sizeof(*data))) == NULL
197 || (info = OSSL_STORE_INFO_new(STORE_INFO_EMBEDDED, data)) == NULL) {
199 OPENSSL_free(data);
203 data->blob = embedded;
204 data->pem_name =
207 if (new_pem_name != NULL && data->pem_name == NULL) {
220 * Each possible data type has its own decoder, which either operates
222 * it's given is decodable for its data type. The assumption is that
223 * only the correct data type will match the content.
227 * The try_decode function is called to check if the blob of data can
229 * OpenSSL type and returns a OSSL_STORE_INFO with the decoded data.
237 * blob: The blob of data to match with what this handler
245 * matchcount: A pointer to an int to count matches for this data.
247 * be higher in the (unlikely) event that the data matches
251 * or any other interactive data.
252 * ui_data: Application data to be passed to ui_method when
269 * The eof function should return 1 if there's no more data to be found
293 * extracting all the interesting data from it and storing them internally,
476 if (!PKCS12_pbe_crypt(dalg, pass, strlen(pass), doct->data, doct->length,
480 mem->data = (char *)new_data;
765 * In most cases, we can try to interpret the serialized data as a trusted
1175 unsigned char *data, size_t len,
1207 handler->try_decode(pem_name, pem_header, data, len,
1261 /* "steal" the embedded data */
1264 data = (unsigned char *)new_mem->data;
1309 unsigned char **data, long *len,
1314 ? PEM_read_bio_ex(bp, pem_name, pem_header, data, len,
1316 : PEM_read_bio(bp, pem_name, pem_header, data, len);
1334 || !PEM_do_header(&cipher, *data, len, file_get_pem_pass,
1412 static int file_read_asn1(BIO *bp, unsigned char **data, long *len)
1419 *data = (unsigned char *)mem->data;
1427 char **data)
1430 assert(data != NULL);
1436 *data = OPENSSL_zalloc(calculated_length);
1437 if (*data == NULL) {
1442 OPENSSL_strlcat(*data, ctx->uri, calculated_length);
1443 OPENSSL_strlcat(*data, pathsep, calculated_length);
1444 OPENSSL_strlcat(*data, name, calculated_length);
1571 unsigned char *data = NULL; /* DER encoded data */
1572 long len = 0; /* DER encoded data length */
1577 &data, &len, ui_method, ui_data, ctx->uri,
1590 if (!file_read_asn1(ctx->_.file.file, &data, &len)) {
1596 result = file_load_try_decode(ctx, pem_name, pem_header, data, len,
1630 pem_free_flag(data, (ctx->flags & FILE_FLAG_SECMEM) != 0, len);