Searched refs:rr (Results 26 - 50 of 201) sorted by relevance

123456789

/macosx-10.10/tcl-105/tcl/tcl/libtommath/
H A Dbn_mp_mul_2.c34 register mp_digit r, rr, *tmpa, *tmpb; local
49 rr = *tmpa >> ((mp_digit)(DIGIT_BIT - 1));
57 r = rr;
H A Dbn_mp_div_2d.c21 mp_digit D, r, rr; local
76 rr = *tmpc & mask;
83 r = rr;
H A Dbn_mp_mul_2d.c47 register mp_digit *tmpc, shift, mask, r, rr; local
63 rr = (*tmpc >> shift) & mask;
70 r = rr;
/macosx-10.10/OpenSSL098-52/src/crypto/bn/
H A Dbn_sqr.c69 BIGNUM *tmp,*rr; local
84 rr=(a != r) ? r : BN_CTX_get(ctx);
86 if (!rr || !tmp) goto err;
89 if (bn_wexpand(rr,max) == NULL) goto err;
95 bn_sqr_normal(rr->d,a->d,4,t);
97 bn_sqr_comba4(rr->d,a->d);
104 bn_sqr_normal(rr->d,a->d,8,t);
106 bn_sqr_comba8(rr->d,a->d);
115 bn_sqr_normal(rr->d,a->d,al,t);
127 bn_sqr_recursive(rr
[all...]
H A Dbn_exp.c123 BIGNUM *v,*rr; local
134 rr = BN_CTX_get(ctx);
136 rr = r;
138 if (rr == NULL || v == NULL) goto err;
144 { if (BN_copy(rr,a) == NULL) goto err; }
145 else { if (!BN_one(rr)) goto err; }
152 if (!BN_mul(rr,rr,v,ctx)) goto err;
157 if (r != rr) BN_copy(r,rr);
372 BN_mod_exp_mont(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) argument
572 BN_mod_exp_mont_consttime(BIGNUM *rr, const BIGNUM *a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) argument
725 BN_mod_exp_mont_word(BIGNUM *rr, BN_ULONG a, const BIGNUM *p, const BIGNUM *m, BN_CTX *ctx, BN_MONT_CTX *in_mont) argument
[all...]
/macosx-10.10/OpenSSL098-52/src/ssl/
H A Ds3_pkt.c244 SSL3_RECORD *rr; local
252 rr= &(s->s3->rrec);
279 rr->type= *(p++);
283 n2s(p,rr->length);
305 if (rr->length > SSL3_RT_MAX_ENCRYPTED_LENGTH+extra)
317 if (rr->length > s->packet_length-SSL3_RT_HEADER_LENGTH)
320 i=rr->length;
323 /* now n == rr->length,
324 * and s->packet_length == SSL3_RT_HEADER_LENGTH + rr->length */
329 /* At this point, s->packet_length == SSL3_RT_HEADER_LNGTH + rr
492 SSL3_RECORD *rr; local
833 SSL3_RECORD *rr; local
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/libtommath/demo/
H A Dtiming.c87 unsigned rr; local
113 rr = 0;
121 } while (++rr < 100000);
134 rr = 0;
142 } while (++rr < 100000);
166 rr = 0;
174 } while (++rr < 100);
186 rr = 0;
194 } while (++rr < 100);
246 for (rr
[all...]
/macosx-10.10/Security-57031.1.35/Security/libsecurity_apple_csp/open_ssl/bn/
H A Dbn_sqr.c87 BIGNUM *tmp,*rr; local
102 rr=(a != r) ? r : BN_CTX_get(ctx);
107 if (bn_wexpand(rr,max+1) == NULL) goto err;
114 bn_sqr_normal(rr->d,a->d,4,t);
116 bn_sqr_comba4(rr->d,a->d);
123 bn_sqr_normal(rr->d,a->d,8,t);
125 bn_sqr_comba8(rr->d,a->d);
134 bn_sqr_normal(rr->d,a->d,al,t);
147 bn_sqr_recursive(rr->d,a->d,al,tmp->d);
152 bn_sqr_normal(rr
[all...]
/macosx-10.10/postfix-255/postfix/src/dns/
H A Ddns_sa_to_rr.c93 DNS_RR *rr; local
106 if ((rr = dns_sa_to_rr(argv[0], 0, res->ai_addr)) == 0)
108 if (dns_rr_to_pa(rr, &hostaddr) == 0)
112 dns_rr_free(rr);
H A Ddns.h195 #define DNS_RR_EQ_SA(rr, sa) \
196 ((SOCK_ADDR_IN_FAMILY(sa) == AF_INET && (rr)->type == T_A \
197 && SOCK_ADDR_IN_ADDR(sa).s_addr == IN_ADDR((rr)->data).s_addr) \
198 || (SOCK_ADDR_IN_FAMILY(sa) == AF_INET6 && (rr)->type == T_AAAA \
200 (rr)->data, (rr)->data_len) == 0))
202 #define DNS_RR_EQ_SA(rr, sa) \
203 (SOCK_ADDR_IN_FAMILY(sa) == AF_INET && (rr)->type == T_A \
204 && SOCK_ADDR_IN_ADDR(sa).s_addr == IN_ADDR((rr)->data).s_addr)
/macosx-10.10/mDNSResponder-561.1.1/mDNSCore/
H A DDNSCommon.c164 const CacheRecord *rr; local
165 FORALL_CACHERECORDS(slot, cg, rr)
167 if (rr->resrec.InterfaceID == id)
334 mDNSexport void NSEC3Parse(const ResourceRecord *const rr, mDNSu8 **salt, int *hashLength, mDNSu8 **nxtName, int *bitmaplen, mDNSu8 **bitmap) argument
336 const RDataBody2 *const rdb = (RDataBody2 *)rr->rdata->u.data;
358 *bitmaplen = rr->rdlength - (int)(p - rdb->data);
366 mDNSexport char *GetRRDisplayString_rdb(const ResourceRecord *const rr, const RDataBody *const rd1, char *const buffer) argument
371 mDNSu32 length = mDNS_snprintf(buffer, MaxMsg-1, "%4d %##s %s ", rr->rdlength, rr->name->c, DNSTypeName(rr
1354 mDNS_SetupResourceRecord(AuthRecord *rr, RData *RDataStorage, mDNSInterfaceID InterfaceID, mDNSu16 rrtype, mDNSu32 ttl, mDNSu8 RecordType, AuthRecType artype, mDNSRecordCallback Callback, void *Context) argument
1485 RDataHashValue(const ResourceRecord *const rr) argument
1674 RRAssertsExistence(const ResourceRecord *const rr, mDNSu16 type) argument
1692 RRAssertsNonexistence(const ResourceRecord *const rr, mDNSu16 type) argument
1700 DNSSECRecordAnswersQuestion(const ResourceRecord *const rr, const DNSQuestion *const q, mDNSBool *checkType) argument
1770 SameNameRecordAnswersQuestion(const ResourceRecord *const rr, const DNSQuestion *const q) argument
1820 ResourceRecordAnswersQuestion(const ResourceRecord *const rr, const DNSQuestion *const q) argument
1839 ResourceRecord *rr = &ar->resrec; local
1907 AnyTypeRecordAnswersQuestion(const ResourceRecord *const rr, const DNSQuestion *const q) argument
1946 ResourceRecordAnswersUnicastResponse(const ResourceRecord *const rr, const DNSQuestion *const q) argument
1970 GetRDLength(const ResourceRecord *const rr, mDNSBool estimate) argument
2223 putRData(const DNSMessage *const msg, mDNSu8 *ptr, const mDNSu8 *const limit, const ResourceRecord *const rr) argument
2439 PutResourceRecordTTLWithLimit(DNSMessage *const msg, mDNSu8 *ptr, mDNSu16 *count, ResourceRecord *rr, mDNSu32 ttl, const mDNSu8 *limit) argument
2495 putEmptyResourceRecord(DNSMessage *const msg, mDNSu8 *ptr, const mDNSu8 *const limit, mDNSu16 *count, const AuthRecord *rr) argument
2546 putDeletionRecord(DNSMessage *msg, mDNSu8 *ptr, ResourceRecord *rr) argument
2557 putDeletionRecordWithLimit(DNSMessage *msg, mDNSu8 *ptr, ResourceRecord *rr, mDNSu8 *limit) argument
2607 AuthRecord rr; local
2622 AuthRecord rr; local
2636 AuthRecord rr; local
2697 SetNewRData(ResourceRecord *const rr, RData *NewRData, mDNSu16 rdlength) argument
2849 CacheRecord *const rr = &largecr->r; local
3429 CacheRecord *const rr = &largecr->r; local
3873 AuthRecord *rr; local
3924 AuthRecord *rr; local
[all...]
H A Dnsec.c121 // rr: The NSEC record that should be verified
132 mDNSexport void VerifyNSEC(mDNS *const m, ResourceRecord *rr, RRVerifier *rv, DNSSECVerifier *pdv, CacheRecord *ncr, DNSSECVerifierCallback callback) argument
139 if (!rv && !rr)
141 LogDNSSEC("VerifyNSEC: Both rr and rv are NULL");
154 if (rr)
156 name = rr->name;
157 rrtype = rr->rrtype;
175 if (AddRRSetToVerifier(dv, rr, rv, RRVS_rr) != mStatus_NoError)
327 mDNSlocal mDNSBool NSECAnswersENT(const ResourceRecord *const rr, domainname *qname) argument
329 const domainname *oname = rr
354 NSECClosestEncloser(ResourceRecord *rr, domainname *qname) argument
378 NSECNameExists(mDNS *const m, ResourceRecord *rr, domainname *name, mDNSu16 qtype) argument
610 NSECNoDataError(mDNS *const m, ResourceRecord *rr, domainname *name, mDNSu16 qtype, domainname **wildcard) argument
935 NSECNoWildcard(mDNS *const m, ResourceRecord *rr, domainname *qname, mDNSu16 qtype) argument
[all...]
/macosx-10.10/ksh-23/ksh/src/lib/libast/uwin/
H A Dlgamma.c213 struct Double rr; local
234 rr = __log__D(z);
235 rr.b += a0_lo; rr.a += a0_hi;
236 return(((r+rr.b)+t+rr.a));
239 default: rr = __log__D(x);
240 rr.a -= a0_hi; rr.b -= a0_lo;
241 return(((r - rr
[all...]
/macosx-10.10/tcl-105/tcl_ext/expect/expect/
H A Dexp_select.c86 static rr = 0; /* round robin ptr */
106 rr++;
107 if (rr >= n) rr = 0;
109 m = masters[rr];
180 rr++;
181 if (rr >= n) rr = 0; /* ">" catches previous readys that */
184 if (FD_ISSET(masters[rr],&rdrs)) {
185 *master_out = masters[rr];
[all...]
/macosx-10.10/network_cmds-457/rtadvd.tproj/
H A Drrenum.c241 do_pco(struct icmp6_router_renum *rr, int len, struct rr_pco_match *rpm) argument
269 if ((rr->rr_flags & ICMP6_RR_FLAGS_FORCEAPPLY) == 0 &&
291 do_rr(int len, struct icmp6_router_renum *rr) argument
296 lim = (char *)rr + len;
297 cp = (char *)(rr + 1);
317 if (do_pco(rr, rpmlen, rpm)) {
335 rr_command_check(int len, struct icmp6_router_renum *rr, struct in6_addr *from, argument
340 /* omit rr minimal length check. hope kernel have done it. */
359 if (rro.rro_seqnum > rr->rr_seqnum) {
362 __func__, (u_int32_t)ntohl(rr
392 rr_command_input(int len, struct icmp6_router_renum *rr, struct in6_addr *from, struct in6_addr *dst) argument
418 rr_input(int len, struct icmp6_router_renum *rr, struct in6_pktinfo *pi, struct sockaddr_in6 *from, struct in6_addr *dst) argument
[all...]
/macosx-10.10/mDNSResponder-561.1.1/mDNSPosix/
H A DProxyResponder.c54 mDNSlocal void HostNameCallback(mDNS *const m, AuthRecord *const rr, mStatus result) argument
56 ProxyHost *f = (ProxyHost*)rr->RecordContext;
58 debugf("Host name successfully registered: %##s", rr->resrec.name->c);
61 debugf("Host name conflict for %##s", rr->resrec.name->c);
175 mDNSlocal void NoSuchServiceCallback(mDNS *const m, AuthRecord *const rr, mStatus result) argument
177 const domainname *proxyhostname = (const domainname *)rr->RecordContext;
180 case mStatus_NoError: debugf("Callback: %##s Name Registered", rr->resrec.name->c); break;
181 case mStatus_NameConflict: debugf("Callback: %##s Name Conflict", rr->resrec.name->c); break;
182 case mStatus_MemFree: debugf("Callback: %##s Memory Free", rr->resrec.name->c); break;
183 default: debugf("Callback: %##s Unknown Result %ld", rr
207 RegisterNoSuchService(mDNS *m, AuthRecord *const rr, domainname *proxyhostname, const char name[], const char type[], const char domain[]) argument
[all...]
/macosx-10.10/libresolv-57/
H A Dres_findzonecut.c327 ns_rr rr; local
329 if (ns_parserr(&msg, sect, i, &rr) < 0) {
334 if (ns_rr_type(rr) == ns_t_cname ||
335 ns_rr_type(rr) == ns_t_dname)
337 if (ns_rr_type(rr) != ns_t_soa ||
338 ns_rr_class(rr) != class)
340 t = ns_rr_name(rr);
369 rdata = ns_rr_rdata(rr);
370 rdlen = ns_rr_rdlen(rr);
504 ns_rr rr; local
562 ns_rr rr; local
680 ns_rr rr; local
[all...]
H A Dns_parse.c139 ns_parserr(ns_msg *handle, ns_sect section, int rrnum, ns_rr *rr) { argument
167 handle->_msg_ptr, rr->name, NS_MAXDNAME);
173 NS_GET16(rr->type, handle->_msg_ptr);
174 NS_GET16(rr->rr_class, handle->_msg_ptr);
176 rr->ttl = 0;
177 rr->rdlength = 0;
178 rr->rdata = NULL;
182 NS_GET32(rr->ttl, handle->_msg_ptr);
183 NS_GET16(rr->rdlength, handle->_msg_ptr);
184 if (handle->_msg_ptr + rr
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/libtommath/
H A Dbn_mp_div_2d.c21 mp_digit D, r, rr; local
76 rr = *tmpc & mask;
83 r = rr;
H A Dbn_mp_mul_2d.c47 register mp_digit *tmpc, shift, mask, r, rr; local
63 rr = (*tmpc >> shift) & mask;
70 r = rr;
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dget_host_realm.c56 struct rk_resource_record *rr; local
59 for(n = 0, rr = head; rr; rr = rr->next)
60 if (rr->type == rk_ns_t_txt)
73 for (i = 0, rr = head; rr; rr = rr
[all...]
/macosx-10.10/postfix-255/postfix/src/smtp/
H A Dsmtp_addr.c131 DNS_RR *rr; local
166 for (rr = addr; rr; rr = rr->next)
167 rr->pref = pref;
242 DNS_RR *rr; local
266 for (rr = mx_names; rr; rr
[all...]
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dgetrrsetbyname-ldns.c78 ldns_rr *rr; local
200 rr = ldns_rr_list_rr(ldns_pkt_answer(pkt), i);
202 if (ldns_rr_get_class(rr) == rrset->rri_rdclass &&
203 ldns_rr_get_type(rr) == rrset->rri_rdtype) {
207 if (rr->_rr_class == rrset->rri_rdclass &&
208 rr->_rr_type == LDNS_RR_TYPE_RRSIG &&
217 for (j=0; j< rr->_rd_count; j++) {
219 ldns_rdf_size(ldns_rr_rdf(rr, j));
229 for (j=0; j< rr->_rd_count; j++) {
230 len = ldns_rdf_size(ldns_rr_rdf(rr,
[all...]
/macosx-10.10/postfix-255/postfix/src/dnsblog/
H A Ddnsblog.c141 DNS_RR *rr; local
189 for (rr = addr_list; rr != 0; rr = rr->next) {
190 if (dns_rr_to_pa(rr, &hostaddr) == 0) {
192 myname, dns_strtype(rr->type), STR(query));
/macosx-10.10/bind9-45.101/bind9/bin/tests/system/upforwd/ans4/
H A Dans.pl114 while (my $rr = $packet->pop("additional")) {
115 if ($rr->type eq "TSIG") {
116 $prev_tsig = $rr;
186 my $rr;
193 ($rr, $offset) = Net::DNS::RR->parse(\$data, $offset);
196 ($rr, $offset) = Net::DNS::RR->parse(\$data, $offset);
199 ($rr, $offset) = Net::DNS::RR->parse(\$data, $offset);
260 while (my $rr = $packet->pop("additional")) {
261 if ($rr->type eq "TSIG") {
262 $prev_tsig = $rr;
[all...]

Completed in 547 milliseconds

123456789