/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/ |
H A D | tasn_prn.c | 161 const char *fname, const char *sname, 169 const char *fname, const char *sname, 173 const char *fname, const char *sname, 179 const char *sname; local 183 sname = NULL; 185 sname = it->sname; 187 NULL, sname, 0, pctx); 192 const char *fname, const char *sname, 216 fname, sname, pct 190 asn1_item_print_ctx(BIO *out, ASN1_VALUE **fld, int indent, const ASN1_ITEM *it, const char *fname, const char *sname, int nohdr, const ASN1_PCTX *pctx) argument 343 const char *sname, *fname; local 400 asn1_print_fsname(BIO *out, int indent, const char *fname, const char *sname, const ASN1_PCTX *pctx) argument 519 asn1_primitive_print(BIO *out, ASN1_VALUE **fld, const ASN1_ITEM *it, int indent, const char *fname, const char *sname, const ASN1_PCTX *pctx) argument [all...] |
H A D | tasn_new.c | 106 if (it->sname) 107 CRYPTO_push_info(it->sname); 155 if (it->sname) 183 if (it->sname) 209 if (it->sname) CRYPTO_pop_info(); 216 if (it->sname) CRYPTO_pop_info(); 224 if (it->sname) CRYPTO_pop_info(); 305 if (it->sname)
|
H A D | asn1t.h | 576 const char *sname; /* Structure name */ member in struct:ASN1_ITEM_st 789 #define IMPLEMENT_COMPAT_ASN1(sname) IMPLEMENT_COMPAT_ASN1_type(sname, V_ASN1_SEQUENCE) 791 #define IMPLEMENT_COMPAT_ASN1_type(sname, tag) \ 792 static const ASN1_COMPAT_FUNCS sname##_ff = { \ 793 (ASN1_new_func *)sname##_new, \ 794 (ASN1_free_func *)sname##_free, \ 795 (ASN1_d2i_func *)d2i_##sname, \ 796 (ASN1_i2d_func *)i2d_##sname, \ 798 ASN1_ITEM_start(sname) \ [all...] |
H A D | t_bitst.c | 98 if(!strcmp(bnam->sname, name) ||
|
H A D | tasn_utl.c | 119 fprintf(stderr, "%s: Reference Count: %d\n", it->sname, *lck); 123 fprintf(stderr, "%s, bad reference count\n", it->sname);
|
H A D | tasn_dec.c | 522 ", Type=", it->sname); 524 ERR_add_error_data(2, "Type=", it->sname);
|
H A D | asn1.h | 570 const char *sname; member in struct:BIT_STRING_BITNAME_st
|
/barrelfish-master/include/openssl/ |
H A D | asn1t.h | 576 const char *sname; /* Structure name */ member in struct:ASN1_ITEM_st 789 #define IMPLEMENT_COMPAT_ASN1(sname) IMPLEMENT_COMPAT_ASN1_type(sname, V_ASN1_SEQUENCE) 791 #define IMPLEMENT_COMPAT_ASN1_type(sname, tag) \ 792 static const ASN1_COMPAT_FUNCS sname##_ff = { \ 793 (ASN1_new_func *)sname##_new, \ 794 (ASN1_free_func *)sname##_free, \ 795 (ASN1_d2i_func *)d2i_##sname, \ 796 (ASN1_i2d_func *)i2d_##sname, \ 798 ASN1_ITEM_start(sname) \ [all...] |
H A D | krb5_asn.h | 108 ** sname[2] PrincipalName, 116 KRB5_PRINCNAME *sname; member in struct:krb5_tktbody_st
|
H A D | x509v3.h | 465 char *sname; member in struct:x509_purpose_st 685 int X509_PURPOSE_get_by_sname(char *sname); 689 char *name, char *sname, void *arg);
|
H A D | asn1.h | 570 const char *sname; member in struct:BIT_STRING_BITNAME_st
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/ |
H A D | v3_bitst.c | 119 if(!strcmp(bnam->sname, val->name) ||
|
H A D | v3_purp.c | 148 int X509_PURPOSE_get_by_sname(char *sname) argument 154 if(!strcmp(xptmp->sname, sname)) return i; 174 char *name, char *sname, void *arg) 196 OPENSSL_free(ptmp->sname); 200 ptmp->sname = BUF_strdup(sname); 201 if(!ptmp->name || !ptmp->sname) { 236 OPENSSL_free(p->sname); 262 return xp->sname; 172 X509_PURPOSE_add(int id, int trust, int flags, int (*ck)(const X509_PURPOSE *, const X509 *, int), char *name, char *sname, void *arg) argument [all...] |
H A D | x509v3.h | 465 char *sname; member in struct:x509_purpose_st 685 int X509_PURPOSE_get_by_sname(char *sname); 689 char *name, char *sname, void *arg);
|
H A D | v3_crld.c | 228 if (!strcmp(pbn->sname, bnam))
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/krb5/ |
H A D | krb5_asn.h | 108 ** sname[2] PrincipalName, 116 KRB5_PRINCNAME *sname; member in struct:krb5_tktbody_st
|
H A D | krb5_asn.c | 84 ASN1_EXP(KRB5_TKTBODY, sname, KRB5_PRINCNAME, 2),
|
/barrelfish-master/include/lwip2/lwip/prot/ |
H A D | dhcp.h | 79 PACK_STRUCT_FLD_8(u8_t sname[DHCP_SNAME_LEN]); 154 #define DHCP_OPTION_OVERLOAD 52 /* RFC2132 9.3, use file and/or sname field for options */ 172 /* possible combinations of overloading the file and sname fields with options */
|
/barrelfish-master/lib/openssl-1.0.0d/apps/ |
H A D | ecparam.c | 366 const char *sname; local 368 sname = OBJ_nid2sn(curves[n].nid); 371 if (sname == NULL) 372 sname = ""; 374 BIO_printf(out, " %-10s: ", sname);
|
/barrelfish-master/include/lwip/lwip/ |
H A D | dhcp.h | 94 PACK_STRUCT_FIELD(u8_t sname[DHCP_SNAME_LEN]); 212 #define DHCP_OPTION_OVERLOAD 52 /* RFC2132 9.3, use file and/or sname field for options */ 231 /** possible combinations of overloading the file and sname fields with options */
|
/barrelfish-master/lib/openssl-1.0.0d/ssl/ |
H A D | kssl.c | 1241 asn1ticket->sname == NULL || 1242 sk_ASN1_GENERALSTRING_num(asn1ticket->sname->namestring) < 2) 1258 gstr_svc = sk_ASN1_GENERALSTRING_value(asn1ticket->sname->namestring, 0); 1259 gstr_host = sk_ASN1_GENERALSTRING_value(asn1ticket->sname->namestring, 1); 1275 asn1ticket->sname->nametype->data[0];
|
/barrelfish-master/lib/lwip/src/core/ |
H A D | dhcp.c | 46 * - Proper parsing of DHCP messages exploiting file/sname field overloading. 1654 dhcp->msg_out->sname[i] = 0; 1746 /* are the sname and/or file field overloaded with options? */ 1782 ("overloaded sname field\n")); 1783 options = (u8_t *) & dhcp->msg_in->sname; 1788 ("overloaded sname and file field\n")); 1789 options = (u8_t *) & dhcp->msg_in->sname;
|
/barrelfish-master/lib/lwip2/src/core/ipv4/ |
H A D | dhcp.c | 1560 /* decode overload only in options, not in file/sname: invalid packet */ 1561 LWIP_ERROR("overload in file/sname", options_idx == DHCP_OPTIONS_OFS, return ERR_VAL;); 1637 LWIP_DEBUGF(DHCP_DEBUG | LWIP_DBG_TRACE, ("overloaded sname field\n")); 1641 LWIP_DEBUGF(DHCP_DEBUG | LWIP_DBG_TRACE, ("overloaded sname and file field\n")); 1650 /* copy bootp file name, don't care for sname (server hostname) */ 1660 /* if both are overloaded, parse file first and then sname (RFC 2131 ch. 4.1) */ 1876 dhcp->msg_out->sname[i] = 0;
|