Searched refs:ctx (Results 101 - 125 of 1548) sorted by relevance

1234567891011>>

/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/sasl/
H A Dsasl.tcl100 upvar #0 $context ctx
101 return $ctx(response)
110 upvar #0 $context ctx
111 array set ctx [list step $step response "" valid false count 0]
132 upvar #0 $context ctx
133 array set ctx [list mech {} callback {} proc {} service smtp server {} \
145 upvar #0 $context ctx
149 set ctx(service) [Pop args 1]
152 set ctx(server) [Pop args 1]
156 set ctx(pro
[all...]
/macosx-10.9.5/Heimdal-323.92.1/base/
H A Djson.c41 void (*out)(char *, void *), void *ctx)
48 out("[ ", ctx);
51 out(", ", ctx);
52 fail |= heim_base2json(sub, out, ctx);
55 out("]", ctx);
59 out("{ ", ctx);
62 out(", ", ctx);
63 fail |= heim_base2json(key, out, ctx);
64 out(" = ", ctx);
65 fail |= heim_base2json(value, out, ctx);
40 heim_base2json(heim_object_t obj, void (*out)(char *, void *), void *ctx) argument
[all...]
/macosx-10.9.5/bind9-45.100/bind9/contrib/idn/idnkit-1.0-src/wsock/common/
H A Dconvert.c60 idnConvDone(idn_resconf_t ctx) argument
62 if (ctx != NULL) {
64 idn_resconf_destroy(ctx);
72 idn_resconf_t ctx; local
88 if ((r = idn_resconf_create(&ctx)) != idn_success) {
96 if ((r = idn_resconf_loadfile(ctx, NULL)) != idn_success) {
99 if ((r = idn_resconf_setdefaults(ctx)) != idn_success) {
103 idnConvDone(ctx);
113 r = idn_resconf_setlocalconvertername(ctx, encoding,
119 idnConvDone(ctx);
133 idnConvReq(idn_resconf_t ctx, const char FAR *from, char FAR *to, size_t tolen) argument
164 idnConvRsp(idn_resconf_t ctx, const char FAR *from, char FAR *to, size_t tolen) argument
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/
H A Dinquire_context.c50 gsskrb5_ctx ctx = (gsskrb5_ctx)context_handle; local
59 HEIMDAL_MUTEX_lock(&ctx->ctx_id_mutex);
62 if (ctx->source == NULL) {
67 (gss_name_t)ctx->source,
74 if (ctx->target == NULL) {
79 (gss_name_t)ctx->target,
88 ctx->endtime,
95 *mech_type = ctx->mech;
98 *ctx_flags = ctx->flags;
101 *locally_initiated = ctx
[all...]
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/
H A DCryptoAlg.h36 mStatus (*Create)(AlgContext *ctx);
37 mStatus (*Destroy)(AlgContext *ctx);
38 mDNSu32 (*Length)(AlgContext *ctx);
39 mStatus (*Add)(AlgContext *ctx, const void *data, mDNSu32 len);
40 // Verify the ctx using the key and compare it against signature/siglen
41 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen);
43 mDNSu8* (*Encode)(AlgContext *ctx);
45 mStatus (*Final)(AlgContext *ctx, void *data, mDNSu32 len);
54 extern mStatus AlgDestroy(AlgContext *ctx);
55 extern mDNSu32 AlgLength(AlgContext *ctx);
[all...]
/macosx-10.9.5/hfs-226.1.1/fsck_hfs/
H A Dfsck_messages.c82 struct context *ctx = (struct context *)c; local
105 if (ctx->writer) (ctx->writer)(ctx, bufp);
118 if (ctx->writeToLog == 1) {
119 if (ctx->logger) (ctx->logger)(ctx, buf);
121 if (ctx->writer) (ctx
149 struct context *ctx = (struct context*)c; local
298 struct context *ctx = c; local
334 struct context *ctx = c; local
359 struct context *ctx = c; local
372 struct context *ctx = c; local
389 struct context *ctx = c; local
410 struct context *ctx = c; local
434 struct context *ctx = c; local
450 struct context *ctx = c; local
466 struct context *ctx = c; local
483 struct context *ctx = c; local
497 struct context *ctx = c; local
519 struct context *ctx = c; local
599 struct context *ctx = c; local
651 struct context *ctx = c; local
701 findmessage(struct context *ctx, int msgnum) argument
765 fsckPrintString(struct context *ctx, fsck_message_t *m, va_list ap) argument
786 fsckPrintXML(struct context *ctx, fsck_message_t *m, va_list ap) argument
876 fsckPrintGUI(struct context *ctx, fsck_message_t *m, va_list ap) argument
934 fsckPrintNothing(struct context *ctx, fsck_message_t *m, va_list ap) argument
953 struct context *ctx = c; local
1042 struct context *ctx = c; local
[all...]
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/
H A Dbase64.c111 base64_decode_init(base64_decode_ctx_t *ctx, int length, isc_buffer_t *target) argument
113 ctx->digits = 0;
114 ctx->seen_end = ISC_FALSE;
115 ctx->length = length;
116 ctx->target = target;
120 base64_decode_char(base64_decode_ctx_t *ctx, int c) { argument
123 if (ctx->seen_end)
127 ctx->val[ctx->digits++] = s - base64;
128 if (ctx
171 base64_decode_finish(base64_decode_ctx_t *ctx) argument
181 base64_decode_ctx_t ctx; local
211 base64_decode_ctx_t ctx; local
[all...]
H A Dbase32.c149 base32_decode_init(base32_decode_ctx_t *ctx, int length, argument
152 ctx->digits = 0;
153 ctx->seen_end = ISC_FALSE;
154 ctx->seen_32 = 0;
155 ctx->length = length;
156 ctx->target = target;
157 ctx->base = base;
161 base32_decode_char(base32_decode_ctx_t *ctx, int c) { argument
165 if (ctx->seen_end)
167 if ((s = strchr(ctx
246 base32_decode_finish(base32_decode_ctx_t *ctx) argument
258 base32_decode_ctx_t ctx; local
298 base32_decode_ctx_t ctx; local
325 base32_decode_ctx_t ctx; local
[all...]
/macosx-10.9.5/ntp-88/lib/isc/
H A Dbase64.c109 base64_decode_init(base64_decode_ctx_t *ctx, int length, isc_buffer_t *target) argument
111 ctx->digits = 0;
112 ctx->seen_end = ISC_FALSE;
113 ctx->length = length;
114 ctx->target = target;
118 base64_decode_char(base64_decode_ctx_t *ctx, int c) { argument
121 if (ctx->seen_end)
125 ctx->val[ctx->digits++] = s - base64;
126 if (ctx
169 base64_decode_finish(base64_decode_ctx_t *ctx) argument
179 base64_decode_ctx_t ctx; local
209 base64_decode_ctx_t ctx; local
[all...]
H A Dbase32.c147 base32_decode_init(base32_decode_ctx_t *ctx, int length, argument
150 ctx->digits = 0;
151 ctx->seen_end = ISC_FALSE;
152 ctx->seen_32 = 0;
153 ctx->length = length;
154 ctx->target = target;
155 ctx->base = base;
159 base32_decode_char(base32_decode_ctx_t *ctx, int c) { argument
163 if (ctx->seen_end)
165 if ((s = strchr(ctx
244 base32_decode_finish(base32_decode_ctx_t *ctx) argument
256 base32_decode_ctx_t ctx; local
296 base32_decode_ctx_t ctx; local
323 base32_decode_ctx_t ctx; local
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/
H A DsslHandshakeHello.c51 SSLContext *ctx,
55 if ((ctx->isDTLS)
56 ? peerVersion > ctx->minProtocolVersion
57 : peerVersion < ctx->minProtocolVersion) {
60 if ((ctx->isDTLS)
61 ? peerVersion < ctx->maxProtocolVersion
62 : peerVersion > ctx->maxProtocolVersion) {
63 if (ctx->protocolSide == kSSLClientSide) {
66 *negVersion = ctx->maxProtocolVersion;
84 SSLEncodeServerHello(SSLRecord *serverHello, SSLContext *ctx) argument
50 sslVerifyProtVersion( SSLContext *ctx, SSLProtocolVersion peerVersion, SSLProtocolVersion *negVersion) argument
165 SSLEncodeServerHelloVerifyRequest(SSLRecord *helloVerifyRequest, SSLContext *ctx) argument
198 SSLProcessServerHelloVerifyRequest(SSLBuffer message, SSLContext *ctx) argument
239 SSLProcessServerHelloExtension_SecureRenegotiation(SSLContext *ctx, UInt16 extLen, UInt8 *p) argument
260 SSLProcessServerHelloExtensions(SSLContext *ctx, UInt16 extensionsLen, UInt8 *p) argument
328 SSLProcessServerHello(SSLBuffer message, SSLContext *ctx) argument
435 SSLEncodeClientHello(SSLRecord *clientHello, SSLContext *ctx) argument
744 SSLProcessClientHello(SSLBuffer message, SSLContext *ctx) argument
994 SSLEncodeRandom(unsigned char *p, SSLContext *ctx) argument
1010 SSLInitMessageHashes(SSLContext *ctx) argument
[all...]
H A DsslHandshakeFinish.c39 SSLEncodeFinishedMessage(SSLRecord *finished, SSLContext *ctx) argument
48 switch(ctx->negProtocolVersion) {
62 finished->protocolVersion = ctx->negProtocolVersion;
70 p = SSLEncodeHandshakeHeader(ctx, finished, SSL_HdskFinished, finishedSize);
75 isServerMsg = (ctx->protocolSide == kSSLServerSide) ? true : false;
76 err = ctx->sslTslCalls->computeFinishedMac(ctx, finishedMsg, isServerMsg);
82 SSLFreeBuffer(&ctx->ownVerifyData);
83 return SSLCopyBuffer(&finishedMsg, &ctx->ownVerifyData);
87 SSLProcessFinished(SSLBuffer message, SSLContext *ctx) argument
135 SSLEncodeServerHelloDone(SSLRecord *helloDone, SSLContext *ctx) argument
152 SSLProcessServerHelloDone(SSLBuffer message, SSLContext *ctx) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/
H A DsslHandshakeHello.c51 SSLContext *ctx,
55 if ((ctx->isDTLS)
56 ? peerVersion > ctx->minProtocolVersion
57 : peerVersion < ctx->minProtocolVersion) {
60 if ((ctx->isDTLS)
61 ? peerVersion < ctx->maxProtocolVersion
62 : peerVersion > ctx->maxProtocolVersion) {
63 if (ctx->protocolSide == kSSLClientSide) {
66 *negVersion = ctx->maxProtocolVersion;
84 SSLEncodeServerHello(SSLRecord *serverHello, SSLContext *ctx) argument
50 sslVerifyProtVersion( SSLContext *ctx, SSLProtocolVersion peerVersion, SSLProtocolVersion *negVersion) argument
165 SSLEncodeServerHelloVerifyRequest(SSLRecord *helloVerifyRequest, SSLContext *ctx) argument
198 SSLProcessServerHelloVerifyRequest(SSLBuffer message, SSLContext *ctx) argument
239 SSLProcessServerHelloExtension_SecureRenegotiation(SSLContext *ctx, UInt16 extLen, UInt8 *p) argument
260 SSLProcessServerHelloExtensions(SSLContext *ctx, UInt16 extensionsLen, UInt8 *p) argument
328 SSLProcessServerHello(SSLBuffer message, SSLContext *ctx) argument
435 SSLEncodeClientHello(SSLRecord *clientHello, SSLContext *ctx) argument
744 SSLProcessClientHello(SSLBuffer message, SSLContext *ctx) argument
994 SSLEncodeRandom(unsigned char *p, SSLContext *ctx) argument
1010 SSLInitMessageHashes(SSLContext *ctx) argument
[all...]
H A DsslHandshakeFinish.c39 SSLEncodeFinishedMessage(SSLRecord *finished, SSLContext *ctx) argument
48 switch(ctx->negProtocolVersion) {
62 finished->protocolVersion = ctx->negProtocolVersion;
70 p = SSLEncodeHandshakeHeader(ctx, finished, SSL_HdskFinished, finishedSize);
75 isServerMsg = (ctx->protocolSide == kSSLServerSide) ? true : false;
76 err = ctx->sslTslCalls->computeFinishedMac(ctx, finishedMsg, isServerMsg);
82 SSLFreeBuffer(&ctx->ownVerifyData);
83 return SSLCopyBuffer(&finishedMsg, &ctx->ownVerifyData);
87 SSLProcessFinished(SSLBuffer message, SSLContext *ctx) argument
135 SSLEncodeServerHelloDone(SSLRecord *helloDone, SSLContext *ctx) argument
152 SSLProcessServerHelloDone(SSLBuffer message, SSLContext *ctx) argument
[all...]
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/
H A DsslHandshakeHello.c51 SSLContext *ctx,
55 if ((ctx->isDTLS)
56 ? peerVersion > ctx->minProtocolVersion
57 : peerVersion < ctx->minProtocolVersion) {
60 if ((ctx->isDTLS)
61 ? peerVersion < ctx->maxProtocolVersion
62 : peerVersion > ctx->maxProtocolVersion) {
63 if (ctx->protocolSide == kSSLClientSide) {
66 *negVersion = ctx->maxProtocolVersion;
84 SSLEncodeServerHello(SSLRecord *serverHello, SSLContext *ctx) argument
50 sslVerifyProtVersion( SSLContext *ctx, SSLProtocolVersion peerVersion, SSLProtocolVersion *negVersion) argument
165 SSLEncodeServerHelloVerifyRequest(SSLRecord *helloVerifyRequest, SSLContext *ctx) argument
198 SSLProcessServerHelloVerifyRequest(SSLBuffer message, SSLContext *ctx) argument
239 SSLProcessServerHelloExtension_SecureRenegotiation(SSLContext *ctx, UInt16 extLen, UInt8 *p) argument
260 SSLProcessServerHelloExtensions(SSLContext *ctx, UInt16 extensionsLen, UInt8 *p) argument
328 SSLProcessServerHello(SSLBuffer message, SSLContext *ctx) argument
435 SSLEncodeClientHello(SSLRecord *clientHello, SSLContext *ctx) argument
744 SSLProcessClientHello(SSLBuffer message, SSLContext *ctx) argument
994 SSLEncodeRandom(unsigned char *p, SSLContext *ctx) argument
1010 SSLInitMessageHashes(SSLContext *ctx) argument
[all...]
H A DsslHandshakeFinish.c39 SSLEncodeFinishedMessage(SSLRecord *finished, SSLContext *ctx) argument
48 switch(ctx->negProtocolVersion) {
62 finished->protocolVersion = ctx->negProtocolVersion;
70 p = SSLEncodeHandshakeHeader(ctx, finished, SSL_HdskFinished, finishedSize);
75 isServerMsg = (ctx->protocolSide == kSSLServerSide) ? true : false;
76 err = ctx->sslTslCalls->computeFinishedMac(ctx, finishedMsg, isServerMsg);
82 SSLFreeBuffer(&ctx->ownVerifyData);
83 return SSLCopyBuffer(&finishedMsg, &ctx->ownVerifyData);
87 SSLProcessFinished(SSLBuffer message, SSLContext *ctx) argument
135 SSLEncodeServerHelloDone(SSLRecord *helloDone, SSLContext *ctx) argument
152 SSLProcessServerHelloDone(SSLBuffer message, SSLContext *ctx) argument
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/otp/
H A Dotp_db.c90 otp_delete (void *v, OtpContext *ctx) argument
95 key.dsize = strlen(ctx->user);
96 key.dptr = ctx->user;
106 otp_get_internal (void *v, OtpContext *ctx, int lockp) argument
113 key.dsize = strlen(ctx->user);
114 key.dptr = ctx->user;
118 ctx->err = "Entry not found";
124 ctx->lock_time = then;
128 ctx->err = "Entry locked";
134 ctx
159 otp_get(void *v, OtpContext *ctx) argument
169 otp_simple_get(void *v, OtpContext *ctx) argument
179 otp_put(void *v, OtpContext *ctx) argument
[all...]
/macosx-10.9.5/xnu-2422.115.4/bsd/dev/random/YarrowCoreLib/src/
H A Dcomp.c41 comp_error_status comp_init(__unused COMP_CTX* ctx) argument
47 comp_error_status comp_add_data( __unused COMP_CTX* ctx, argument
54 comp_error_status comp_get_ratio( __unused COMP_CTX* ctx,float* out ) argument
60 comp_error_status comp_end( __unused COMP_CTX* ctx )
84 #define CTXCHECK(ctx) \
85 PCHECK(ctx) \
86 MMPCHECK(ctx->buf)
97 comp_error_status comp_init(COMP_CTX* ctx) argument
99 ctx->buf = mmMalloc(BUFSIZE);
100 if(ctx
112 comp_add_data(COMP_CTX* ctx,Bytef* inp,uInt inplen) argument
145 comp_get_ratio(COMP_CTX* ctx,float* out) argument
178 comp_end(COMP_CTX* ctx) argument
[all...]
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/
H A Dossl-evp.c147 * @param ctx variable to initiate.
150 EVP_MD_CTX_init(EVP_MD_CTX *ctx) argument
152 memset(ctx, 0, sizeof(*ctx));
159 * @param ctx context to free.
162 EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) argument
164 EVP_MD_CTX_cleanup(ctx);
165 free(ctx);
172 * @param ctx the context to free the resources from.
177 EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) argument
200 EVP_MD_CTX_md(EVP_MD_CTX *ctx) argument
214 EVP_MD_CTX_size(EVP_MD_CTX *ctx) argument
228 EVP_MD_CTX_block_size(EVP_MD_CTX *ctx) argument
277 EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *md, ENGINE *engine) argument
297 EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *md) argument
316 EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t size) argument
334 EVP_DigestFinal_ex(EVP_MD_CTX *ctx, void *hash, unsigned int *size) argument
345 EVP_DigestFinal(EVP_MD_CTX *ctx, void *hash, unsigned int *size) argument
372 EVP_MD_CTX ctx; local
772 EVP_CIPHER_CTX_cipher(EVP_CIPHER_CTX *ctx) argument
786 EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) argument
800 EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) argument
815 EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) argument
829 EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) argument
843 EVP_CIPHER_CTX_mode(const EVP_CIPHER_CTX *ctx) argument
857 EVP_CIPHER_CTX_get_app_data(EVP_CIPHER_CTX *ctx) argument
870 EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) argument
890 EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *c, ENGINE *engine, const void *key, const void *iv, int encp) argument
950 EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *c, const void *key, const void *iv, int encp) argument
974 EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, void *out, int *outlen, void *in, size_t inlen) argument
1060 EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, void *out, int *outlen) argument
1103 EVP_Cipher(EVP_CIPHER_CTX *ctx, void *out, const void *in, size_t size) argument
1113 enc_null_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int encp) argument
1123 enc_null_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int size) argument
1134 enc_null_cleanup(EVP_CIPHER_CTX *ctx) argument
1701 EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, void *key) argument
1724 EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *data) argument
1957 EVP_EncodeInit(EVP_ENCODE_CTX *ctx) argument
1966 EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) argument
2012 EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) argument
2061 EVP_DecodeInit(EVP_ENCODE_CTX *ctx) argument
2075 EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) argument
2250 EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) argument
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/mech/
H A Dgss_get_mic.c38 struct _gss_context *ctx = (struct _gss_context *) context_handle; local
42 if (ctx == NULL) {
47 m = ctx->gc_mech;
49 return (m->gm_get_mic(minor_status, ctx->gc_ctx, qop_req,
H A Dgss_verify_mic.c38 struct _gss_context *ctx = (struct _gss_context *) context_handle; local
43 if (ctx == NULL) {
48 m = ctx->gc_mech;
50 return (m->gm_verify_mic(minor_status, ctx->gc_ctx,
H A Dgss_wrap_size_limit.c39 struct _gss_context *ctx = (struct _gss_context *) context_handle; local
43 if (ctx == NULL) {
48 m = ctx->gc_mech;
50 return (m->gm_wrap_size_limit(minor_status, ctx->gc_ctx,
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/include/isc/
H A Dapp.h109 isc_result_t (*ctxstart)(isc_appctx_t *ctx);
110 isc_result_t (*ctxrun)(isc_appctx_t *ctx);
111 isc_result_t (*ctxsuspend)(isc_appctx_t *ctx);
112 isc_result_t (*ctxshutdown)(isc_appctx_t *ctx);
113 void (*ctxfinish)(isc_appctx_t *ctx);
114 void (*settaskmgr)(isc_appctx_t *ctx,
116 void (*setsocketmgr)(isc_appctx_t *ctx,
118 void (*settimermgr)(isc_appctx_t *ctx,
144 isc_app_ctxstart(isc_appctx_t *ctx);
156 * 'ctx' i
[all...]
/macosx-10.9.5/bind9-45.100/bind9/lib/lwres/
H A Dcontext_p.h27 * Helper functions, assuming the context is always called "ctx" in
30 #define CTXMALLOC(len) ctx->malloc(ctx->arg, (len))
31 #define CTXFREE(addr, len) ctx->free(ctx->arg, (addr), (len))
/macosx-10.9.5/ntp-88/lib/isc/include/isc/
H A Dmd5.h60 isc_md5_init(isc_md5_t *ctx);
63 isc_md5_invalidate(isc_md5_t *ctx);
66 isc_md5_update(isc_md5_t *ctx, const unsigned char *buf, unsigned int len);
69 isc_md5_final(isc_md5_t *ctx, unsigned char *digest);

Completed in 178 milliseconds

1234567891011>>