/macosx-10.9.5/tcl-102/tcl_ext/tcllib/tcllib/modules/sasl/ |
H A D | sasl.tcl | 100 upvar #0 $context ctx 101 return $ctx(response) 110 upvar #0 $context ctx 111 array set ctx [list step $step response "" valid false count 0] 132 upvar #0 $context ctx 133 array set ctx [list mech {} callback {} proc {} service smtp server {} \ 145 upvar #0 $context ctx 149 set ctx(service) [Pop args 1] 152 set ctx(server) [Pop args 1] 156 set ctx(pro [all...] |
/macosx-10.9.5/Heimdal-323.92.1/base/ |
H A D | json.c | 41 void (*out)(char *, void *), void *ctx) 48 out("[ ", ctx); 51 out(", ", ctx); 52 fail |= heim_base2json(sub, out, ctx); 55 out("]", ctx); 59 out("{ ", ctx); 62 out(", ", ctx); 63 fail |= heim_base2json(key, out, ctx); 64 out(" = ", ctx); 65 fail |= heim_base2json(value, out, ctx); 40 heim_base2json(heim_object_t obj, void (*out)(char *, void *), void *ctx) argument [all...] |
/macosx-10.9.5/bind9-45.100/bind9/contrib/idn/idnkit-1.0-src/wsock/common/ |
H A D | convert.c | 60 idnConvDone(idn_resconf_t ctx) argument 62 if (ctx != NULL) { 64 idn_resconf_destroy(ctx); 72 idn_resconf_t ctx; local 88 if ((r = idn_resconf_create(&ctx)) != idn_success) { 96 if ((r = idn_resconf_loadfile(ctx, NULL)) != idn_success) { 99 if ((r = idn_resconf_setdefaults(ctx)) != idn_success) { 103 idnConvDone(ctx); 113 r = idn_resconf_setlocalconvertername(ctx, encoding, 119 idnConvDone(ctx); 133 idnConvReq(idn_resconf_t ctx, const char FAR *from, char FAR *to, size_t tolen) argument 164 idnConvRsp(idn_resconf_t ctx, const char FAR *from, char FAR *to, size_t tolen) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/ |
H A D | inquire_context.c | 50 gsskrb5_ctx ctx = (gsskrb5_ctx)context_handle; local 59 HEIMDAL_MUTEX_lock(&ctx->ctx_id_mutex); 62 if (ctx->source == NULL) { 67 (gss_name_t)ctx->source, 74 if (ctx->target == NULL) { 79 (gss_name_t)ctx->target, 88 ctx->endtime, 95 *mech_type = ctx->mech; 98 *ctx_flags = ctx->flags; 101 *locally_initiated = ctx [all...] |
/macosx-10.9.5/mDNSResponder-522.92.1/mDNSCore/ |
H A D | CryptoAlg.h | 36 mStatus (*Create)(AlgContext *ctx); 37 mStatus (*Destroy)(AlgContext *ctx); 38 mDNSu32 (*Length)(AlgContext *ctx); 39 mStatus (*Add)(AlgContext *ctx, const void *data, mDNSu32 len); 40 // Verify the ctx using the key and compare it against signature/siglen 41 mStatus (*Verify)(AlgContext *ctx, mDNSu8 *key, mDNSu32 keylen, mDNSu8 *signature, mDNSu32 siglen); 43 mDNSu8* (*Encode)(AlgContext *ctx); 45 mStatus (*Final)(AlgContext *ctx, void *data, mDNSu32 len); 54 extern mStatus AlgDestroy(AlgContext *ctx); 55 extern mDNSu32 AlgLength(AlgContext *ctx); [all...] |
/macosx-10.9.5/hfs-226.1.1/fsck_hfs/ |
H A D | fsck_messages.c | 82 struct context *ctx = (struct context *)c; local 105 if (ctx->writer) (ctx->writer)(ctx, bufp); 118 if (ctx->writeToLog == 1) { 119 if (ctx->logger) (ctx->logger)(ctx, buf); 121 if (ctx->writer) (ctx 149 struct context *ctx = (struct context*)c; local 298 struct context *ctx = c; local 334 struct context *ctx = c; local 359 struct context *ctx = c; local 372 struct context *ctx = c; local 389 struct context *ctx = c; local 410 struct context *ctx = c; local 434 struct context *ctx = c; local 450 struct context *ctx = c; local 466 struct context *ctx = c; local 483 struct context *ctx = c; local 497 struct context *ctx = c; local 519 struct context *ctx = c; local 599 struct context *ctx = c; local 651 struct context *ctx = c; local 701 findmessage(struct context *ctx, int msgnum) argument 765 fsckPrintString(struct context *ctx, fsck_message_t *m, va_list ap) argument 786 fsckPrintXML(struct context *ctx, fsck_message_t *m, va_list ap) argument 876 fsckPrintGUI(struct context *ctx, fsck_message_t *m, va_list ap) argument 934 fsckPrintNothing(struct context *ctx, fsck_message_t *m, va_list ap) argument 953 struct context *ctx = c; local 1042 struct context *ctx = c; local [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/ |
H A D | base64.c | 111 base64_decode_init(base64_decode_ctx_t *ctx, int length, isc_buffer_t *target) argument 113 ctx->digits = 0; 114 ctx->seen_end = ISC_FALSE; 115 ctx->length = length; 116 ctx->target = target; 120 base64_decode_char(base64_decode_ctx_t *ctx, int c) { argument 123 if (ctx->seen_end) 127 ctx->val[ctx->digits++] = s - base64; 128 if (ctx 171 base64_decode_finish(base64_decode_ctx_t *ctx) argument 181 base64_decode_ctx_t ctx; local 211 base64_decode_ctx_t ctx; local [all...] |
H A D | base32.c | 149 base32_decode_init(base32_decode_ctx_t *ctx, int length, argument 152 ctx->digits = 0; 153 ctx->seen_end = ISC_FALSE; 154 ctx->seen_32 = 0; 155 ctx->length = length; 156 ctx->target = target; 157 ctx->base = base; 161 base32_decode_char(base32_decode_ctx_t *ctx, int c) { argument 165 if (ctx->seen_end) 167 if ((s = strchr(ctx 246 base32_decode_finish(base32_decode_ctx_t *ctx) argument 258 base32_decode_ctx_t ctx; local 298 base32_decode_ctx_t ctx; local 325 base32_decode_ctx_t ctx; local [all...] |
/macosx-10.9.5/ntp-88/lib/isc/ |
H A D | base64.c | 109 base64_decode_init(base64_decode_ctx_t *ctx, int length, isc_buffer_t *target) argument 111 ctx->digits = 0; 112 ctx->seen_end = ISC_FALSE; 113 ctx->length = length; 114 ctx->target = target; 118 base64_decode_char(base64_decode_ctx_t *ctx, int c) { argument 121 if (ctx->seen_end) 125 ctx->val[ctx->digits++] = s - base64; 126 if (ctx 169 base64_decode_finish(base64_decode_ctx_t *ctx) argument 179 base64_decode_ctx_t ctx; local 209 base64_decode_ctx_t ctx; local [all...] |
H A D | base32.c | 147 base32_decode_init(base32_decode_ctx_t *ctx, int length, argument 150 ctx->digits = 0; 151 ctx->seen_end = ISC_FALSE; 152 ctx->seen_32 = 0; 153 ctx->length = length; 154 ctx->target = target; 155 ctx->base = base; 159 base32_decode_char(base32_decode_ctx_t *ctx, int c) { argument 163 if (ctx->seen_end) 165 if ((s = strchr(ctx 244 base32_decode_finish(base32_decode_ctx_t *ctx) argument 256 base32_decode_ctx_t ctx; local 296 base32_decode_ctx_t ctx; local 323 base32_decode_ctx_t ctx; local [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/Security/ |
H A D | sslHandshakeHello.c | 51 SSLContext *ctx, 55 if ((ctx->isDTLS) 56 ? peerVersion > ctx->minProtocolVersion 57 : peerVersion < ctx->minProtocolVersion) { 60 if ((ctx->isDTLS) 61 ? peerVersion < ctx->maxProtocolVersion 62 : peerVersion > ctx->maxProtocolVersion) { 63 if (ctx->protocolSide == kSSLClientSide) { 66 *negVersion = ctx->maxProtocolVersion; 84 SSLEncodeServerHello(SSLRecord *serverHello, SSLContext *ctx) argument 50 sslVerifyProtVersion( SSLContext *ctx, SSLProtocolVersion peerVersion, SSLProtocolVersion *negVersion) argument 165 SSLEncodeServerHelloVerifyRequest(SSLRecord *helloVerifyRequest, SSLContext *ctx) argument 198 SSLProcessServerHelloVerifyRequest(SSLBuffer message, SSLContext *ctx) argument 239 SSLProcessServerHelloExtension_SecureRenegotiation(SSLContext *ctx, UInt16 extLen, UInt8 *p) argument 260 SSLProcessServerHelloExtensions(SSLContext *ctx, UInt16 extensionsLen, UInt8 *p) argument 328 SSLProcessServerHello(SSLBuffer message, SSLContext *ctx) argument 435 SSLEncodeClientHello(SSLRecord *clientHello, SSLContext *ctx) argument 744 SSLProcessClientHello(SSLBuffer message, SSLContext *ctx) argument 994 SSLEncodeRandom(unsigned char *p, SSLContext *ctx) argument 1010 SSLInitMessageHashes(SSLContext *ctx) argument [all...] |
H A D | sslHandshakeFinish.c | 39 SSLEncodeFinishedMessage(SSLRecord *finished, SSLContext *ctx) argument 48 switch(ctx->negProtocolVersion) { 62 finished->protocolVersion = ctx->negProtocolVersion; 70 p = SSLEncodeHandshakeHeader(ctx, finished, SSL_HdskFinished, finishedSize); 75 isServerMsg = (ctx->protocolSide == kSSLServerSide) ? true : false; 76 err = ctx->sslTslCalls->computeFinishedMac(ctx, finishedMsg, isServerMsg); 82 SSLFreeBuffer(&ctx->ownVerifyData); 83 return SSLCopyBuffer(&finishedMsg, &ctx->ownVerifyData); 87 SSLProcessFinished(SSLBuffer message, SSLContext *ctx) argument 135 SSLEncodeServerHelloDone(SSLRecord *helloDone, SSLContext *ctx) argument 152 SSLProcessServerHelloDone(SSLBuffer message, SSLContext *ctx) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/lib/ |
H A D | sslHandshakeHello.c | 51 SSLContext *ctx, 55 if ((ctx->isDTLS) 56 ? peerVersion > ctx->minProtocolVersion 57 : peerVersion < ctx->minProtocolVersion) { 60 if ((ctx->isDTLS) 61 ? peerVersion < ctx->maxProtocolVersion 62 : peerVersion > ctx->maxProtocolVersion) { 63 if (ctx->protocolSide == kSSLClientSide) { 66 *negVersion = ctx->maxProtocolVersion; 84 SSLEncodeServerHello(SSLRecord *serverHello, SSLContext *ctx) argument 50 sslVerifyProtVersion( SSLContext *ctx, SSLProtocolVersion peerVersion, SSLProtocolVersion *negVersion) argument 165 SSLEncodeServerHelloVerifyRequest(SSLRecord *helloVerifyRequest, SSLContext *ctx) argument 198 SSLProcessServerHelloVerifyRequest(SSLBuffer message, SSLContext *ctx) argument 239 SSLProcessServerHelloExtension_SecureRenegotiation(SSLContext *ctx, UInt16 extLen, UInt8 *p) argument 260 SSLProcessServerHelloExtensions(SSLContext *ctx, UInt16 extensionsLen, UInt8 *p) argument 328 SSLProcessServerHello(SSLBuffer message, SSLContext *ctx) argument 435 SSLEncodeClientHello(SSLRecord *clientHello, SSLContext *ctx) argument 744 SSLProcessClientHello(SSLBuffer message, SSLContext *ctx) argument 994 SSLEncodeRandom(unsigned char *p, SSLContext *ctx) argument 1010 SSLInitMessageHashes(SSLContext *ctx) argument [all...] |
H A D | sslHandshakeFinish.c | 39 SSLEncodeFinishedMessage(SSLRecord *finished, SSLContext *ctx) argument 48 switch(ctx->negProtocolVersion) { 62 finished->protocolVersion = ctx->negProtocolVersion; 70 p = SSLEncodeHandshakeHeader(ctx, finished, SSL_HdskFinished, finishedSize); 75 isServerMsg = (ctx->protocolSide == kSSLServerSide) ? true : false; 76 err = ctx->sslTslCalls->computeFinishedMac(ctx, finishedMsg, isServerMsg); 82 SSLFreeBuffer(&ctx->ownVerifyData); 83 return SSLCopyBuffer(&finishedMsg, &ctx->ownVerifyData); 87 SSLProcessFinished(SSLBuffer message, SSLContext *ctx) argument 135 SSLEncodeServerHelloDone(SSLRecord *helloDone, SSLContext *ctx) argument 152 SSLProcessServerHelloDone(SSLBuffer message, SSLContext *ctx) argument [all...] |
/macosx-10.9.5/Security-55471.14.18/libsecurity_ssl/security_ssl/ |
H A D | sslHandshakeHello.c | 51 SSLContext *ctx, 55 if ((ctx->isDTLS) 56 ? peerVersion > ctx->minProtocolVersion 57 : peerVersion < ctx->minProtocolVersion) { 60 if ((ctx->isDTLS) 61 ? peerVersion < ctx->maxProtocolVersion 62 : peerVersion > ctx->maxProtocolVersion) { 63 if (ctx->protocolSide == kSSLClientSide) { 66 *negVersion = ctx->maxProtocolVersion; 84 SSLEncodeServerHello(SSLRecord *serverHello, SSLContext *ctx) argument 50 sslVerifyProtVersion( SSLContext *ctx, SSLProtocolVersion peerVersion, SSLProtocolVersion *negVersion) argument 165 SSLEncodeServerHelloVerifyRequest(SSLRecord *helloVerifyRequest, SSLContext *ctx) argument 198 SSLProcessServerHelloVerifyRequest(SSLBuffer message, SSLContext *ctx) argument 239 SSLProcessServerHelloExtension_SecureRenegotiation(SSLContext *ctx, UInt16 extLen, UInt8 *p) argument 260 SSLProcessServerHelloExtensions(SSLContext *ctx, UInt16 extensionsLen, UInt8 *p) argument 328 SSLProcessServerHello(SSLBuffer message, SSLContext *ctx) argument 435 SSLEncodeClientHello(SSLRecord *clientHello, SSLContext *ctx) argument 744 SSLProcessClientHello(SSLBuffer message, SSLContext *ctx) argument 994 SSLEncodeRandom(unsigned char *p, SSLContext *ctx) argument 1010 SSLInitMessageHashes(SSLContext *ctx) argument [all...] |
H A D | sslHandshakeFinish.c | 39 SSLEncodeFinishedMessage(SSLRecord *finished, SSLContext *ctx) argument 48 switch(ctx->negProtocolVersion) { 62 finished->protocolVersion = ctx->negProtocolVersion; 70 p = SSLEncodeHandshakeHeader(ctx, finished, SSL_HdskFinished, finishedSize); 75 isServerMsg = (ctx->protocolSide == kSSLServerSide) ? true : false; 76 err = ctx->sslTslCalls->computeFinishedMac(ctx, finishedMsg, isServerMsg); 82 SSLFreeBuffer(&ctx->ownVerifyData); 83 return SSLCopyBuffer(&finishedMsg, &ctx->ownVerifyData); 87 SSLProcessFinished(SSLBuffer message, SSLContext *ctx) argument 135 SSLEncodeServerHelloDone(SSLRecord *helloDone, SSLContext *ctx) argument 152 SSLProcessServerHelloDone(SSLBuffer message, SSLContext *ctx) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/otp/ |
H A D | otp_db.c | 90 otp_delete (void *v, OtpContext *ctx) argument 95 key.dsize = strlen(ctx->user); 96 key.dptr = ctx->user; 106 otp_get_internal (void *v, OtpContext *ctx, int lockp) argument 113 key.dsize = strlen(ctx->user); 114 key.dptr = ctx->user; 118 ctx->err = "Entry not found"; 124 ctx->lock_time = then; 128 ctx->err = "Entry locked"; 134 ctx 159 otp_get(void *v, OtpContext *ctx) argument 169 otp_simple_get(void *v, OtpContext *ctx) argument 179 otp_put(void *v, OtpContext *ctx) argument [all...] |
/macosx-10.9.5/xnu-2422.115.4/bsd/dev/random/YarrowCoreLib/src/ |
H A D | comp.c | 41 comp_error_status comp_init(__unused COMP_CTX* ctx) argument 47 comp_error_status comp_add_data( __unused COMP_CTX* ctx, argument 54 comp_error_status comp_get_ratio( __unused COMP_CTX* ctx,float* out ) argument 60 comp_error_status comp_end( __unused COMP_CTX* ctx ) 84 #define CTXCHECK(ctx) \ 85 PCHECK(ctx) \ 86 MMPCHECK(ctx->buf) 97 comp_error_status comp_init(COMP_CTX* ctx) argument 99 ctx->buf = mmMalloc(BUFSIZE); 100 if(ctx 112 comp_add_data(COMP_CTX* ctx,Bytef* inp,uInt inplen) argument 145 comp_get_ratio(COMP_CTX* ctx,float* out) argument 178 comp_end(COMP_CTX* ctx) argument [all...] |
/macosx-10.9.5/OpenSSH-186/osslshim/ossl/ |
H A D | ossl-evp.c | 147 * @param ctx variable to initiate. 150 EVP_MD_CTX_init(EVP_MD_CTX *ctx) argument 152 memset(ctx, 0, sizeof(*ctx)); 159 * @param ctx context to free. 162 EVP_MD_CTX_destroy(EVP_MD_CTX *ctx) argument 164 EVP_MD_CTX_cleanup(ctx); 165 free(ctx); 172 * @param ctx the context to free the resources from. 177 EVP_MD_CTX_cleanup(EVP_MD_CTX *ctx) argument 200 EVP_MD_CTX_md(EVP_MD_CTX *ctx) argument 214 EVP_MD_CTX_size(EVP_MD_CTX *ctx) argument 228 EVP_MD_CTX_block_size(EVP_MD_CTX *ctx) argument 277 EVP_DigestInit_ex(EVP_MD_CTX *ctx, const EVP_MD *md, ENGINE *engine) argument 297 EVP_DigestInit(EVP_MD_CTX *ctx, const EVP_MD *md) argument 316 EVP_DigestUpdate(EVP_MD_CTX *ctx, const void *data, size_t size) argument 334 EVP_DigestFinal_ex(EVP_MD_CTX *ctx, void *hash, unsigned int *size) argument 345 EVP_DigestFinal(EVP_MD_CTX *ctx, void *hash, unsigned int *size) argument 372 EVP_MD_CTX ctx; local 772 EVP_CIPHER_CTX_cipher(EVP_CIPHER_CTX *ctx) argument 786 EVP_CIPHER_CTX_block_size(const EVP_CIPHER_CTX *ctx) argument 800 EVP_CIPHER_CTX_key_length(const EVP_CIPHER_CTX *ctx) argument 815 EVP_CIPHER_CTX_iv_length(const EVP_CIPHER_CTX *ctx) argument 829 EVP_CIPHER_CTX_flags(const EVP_CIPHER_CTX *ctx) argument 843 EVP_CIPHER_CTX_mode(const EVP_CIPHER_CTX *ctx) argument 857 EVP_CIPHER_CTX_get_app_data(EVP_CIPHER_CTX *ctx) argument 870 EVP_CIPHER_CTX_set_app_data(EVP_CIPHER_CTX *ctx, void *data) argument 890 EVP_CipherInit_ex(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *c, ENGINE *engine, const void *key, const void *iv, int encp) argument 950 EVP_CipherInit(EVP_CIPHER_CTX *ctx, const EVP_CIPHER *c, const void *key, const void *iv, int encp) argument 974 EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, void *out, int *outlen, void *in, size_t inlen) argument 1060 EVP_CipherFinal_ex(EVP_CIPHER_CTX *ctx, void *out, int *outlen) argument 1103 EVP_Cipher(EVP_CIPHER_CTX *ctx, void *out, const void *in, size_t size) argument 1113 enc_null_init(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int encp) argument 1123 enc_null_do_cipher(EVP_CIPHER_CTX *ctx, unsigned char *out, const unsigned char *in, unsigned int size) argument 1134 enc_null_cleanup(EVP_CIPHER_CTX *ctx) argument 1701 EVP_CIPHER_CTX_rand_key(EVP_CIPHER_CTX *ctx, void *key) argument 1724 EVP_CIPHER_CTX_ctrl(EVP_CIPHER_CTX *ctx, int type, int arg, void *data) argument 1957 EVP_EncodeInit(EVP_ENCODE_CTX *ctx) argument 1966 EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) argument 2012 EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) argument 2061 EVP_DecodeInit(EVP_ENCODE_CTX *ctx) argument 2075 EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl, const unsigned char *in, int inl) argument 2250 EVP_DecodeFinal(EVP_ENCODE_CTX *ctx, unsigned char *out, int *outl) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/mech/ |
H A D | gss_get_mic.c | 38 struct _gss_context *ctx = (struct _gss_context *) context_handle; local 42 if (ctx == NULL) { 47 m = ctx->gc_mech; 49 return (m->gm_get_mic(minor_status, ctx->gc_ctx, qop_req,
|
H A D | gss_verify_mic.c | 38 struct _gss_context *ctx = (struct _gss_context *) context_handle; local 43 if (ctx == NULL) { 48 m = ctx->gc_mech; 50 return (m->gm_verify_mic(minor_status, ctx->gc_ctx,
|
H A D | gss_wrap_size_limit.c | 39 struct _gss_context *ctx = (struct _gss_context *) context_handle; local 43 if (ctx == NULL) { 48 m = ctx->gc_mech; 50 return (m->gm_wrap_size_limit(minor_status, ctx->gc_ctx,
|
/macosx-10.9.5/bind9-45.100/bind9/lib/isc/include/isc/ |
H A D | app.h | 109 isc_result_t (*ctxstart)(isc_appctx_t *ctx); 110 isc_result_t (*ctxrun)(isc_appctx_t *ctx); 111 isc_result_t (*ctxsuspend)(isc_appctx_t *ctx); 112 isc_result_t (*ctxshutdown)(isc_appctx_t *ctx); 113 void (*ctxfinish)(isc_appctx_t *ctx); 114 void (*settaskmgr)(isc_appctx_t *ctx, 116 void (*setsocketmgr)(isc_appctx_t *ctx, 118 void (*settimermgr)(isc_appctx_t *ctx, 144 isc_app_ctxstart(isc_appctx_t *ctx); 156 * 'ctx' i [all...] |
/macosx-10.9.5/bind9-45.100/bind9/lib/lwres/ |
H A D | context_p.h | 27 * Helper functions, assuming the context is always called "ctx" in 30 #define CTXMALLOC(len) ctx->malloc(ctx->arg, (len)) 31 #define CTXFREE(addr, len) ctx->free(ctx->arg, (addr), (len))
|
/macosx-10.9.5/ntp-88/lib/isc/include/isc/ |
H A D | md5.h | 60 isc_md5_init(isc_md5_t *ctx); 63 isc_md5_invalidate(isc_md5_t *ctx); 66 isc_md5_update(isc_md5_t *ctx, const unsigned char *buf, unsigned int len); 69 isc_md5_final(isc_md5_t *ctx, unsigned char *digest);
|