Searched refs:sname (Results 1 - 23 of 23) sorted by relevance

/barrelfish-master/lib/openssl-1.0.0d/crypto/asn1/
H A Dtasn_prn.c161 const char *fname, const char *sname,
169 const char *fname, const char *sname,
173 const char *fname, const char *sname,
179 const char *sname; local
183 sname = NULL;
185 sname = it->sname;
187 NULL, sname, 0, pctx);
192 const char *fname, const char *sname,
216 fname, sname, pct
190 asn1_item_print_ctx(BIO *out, ASN1_VALUE **fld, int indent, const ASN1_ITEM *it, const char *fname, const char *sname, int nohdr, const ASN1_PCTX *pctx) argument
343 const char *sname, *fname; local
400 asn1_print_fsname(BIO *out, int indent, const char *fname, const char *sname, const ASN1_PCTX *pctx) argument
519 asn1_primitive_print(BIO *out, ASN1_VALUE **fld, const ASN1_ITEM *it, int indent, const char *fname, const char *sname, const ASN1_PCTX *pctx) argument
[all...]
H A Dtasn_new.c106 if (it->sname)
107 CRYPTO_push_info(it->sname);
155 if (it->sname)
183 if (it->sname)
209 if (it->sname) CRYPTO_pop_info();
216 if (it->sname) CRYPTO_pop_info();
224 if (it->sname) CRYPTO_pop_info();
305 if (it->sname)
H A Dasn1t.h576 const char *sname; /* Structure name */ member in struct:ASN1_ITEM_st
789 #define IMPLEMENT_COMPAT_ASN1(sname) IMPLEMENT_COMPAT_ASN1_type(sname, V_ASN1_SEQUENCE)
791 #define IMPLEMENT_COMPAT_ASN1_type(sname, tag) \
792 static const ASN1_COMPAT_FUNCS sname##_ff = { \
793 (ASN1_new_func *)sname##_new, \
794 (ASN1_free_func *)sname##_free, \
795 (ASN1_d2i_func *)d2i_##sname, \
796 (ASN1_i2d_func *)i2d_##sname, \
798 ASN1_ITEM_start(sname) \
[all...]
H A Dt_bitst.c98 if(!strcmp(bnam->sname, name) ||
H A Dtasn_utl.c119 fprintf(stderr, "%s: Reference Count: %d\n", it->sname, *lck);
123 fprintf(stderr, "%s, bad reference count\n", it->sname);
H A Dtasn_dec.c522 ", Type=", it->sname);
524 ERR_add_error_data(2, "Type=", it->sname);
H A Dasn1.h570 const char *sname; member in struct:BIT_STRING_BITNAME_st
/barrelfish-master/include/openssl/
H A Dasn1t.h576 const char *sname; /* Structure name */ member in struct:ASN1_ITEM_st
789 #define IMPLEMENT_COMPAT_ASN1(sname) IMPLEMENT_COMPAT_ASN1_type(sname, V_ASN1_SEQUENCE)
791 #define IMPLEMENT_COMPAT_ASN1_type(sname, tag) \
792 static const ASN1_COMPAT_FUNCS sname##_ff = { \
793 (ASN1_new_func *)sname##_new, \
794 (ASN1_free_func *)sname##_free, \
795 (ASN1_d2i_func *)d2i_##sname, \
796 (ASN1_i2d_func *)i2d_##sname, \
798 ASN1_ITEM_start(sname) \
[all...]
H A Dkrb5_asn.h108 ** sname[2] PrincipalName,
116 KRB5_PRINCNAME *sname; member in struct:krb5_tktbody_st
H A Dx509v3.h465 char *sname; member in struct:x509_purpose_st
685 int X509_PURPOSE_get_by_sname(char *sname);
689 char *name, char *sname, void *arg);
H A Dasn1.h570 const char *sname; member in struct:BIT_STRING_BITNAME_st
/barrelfish-master/lib/openssl-1.0.0d/crypto/x509v3/
H A Dv3_bitst.c119 if(!strcmp(bnam->sname, val->name) ||
H A Dv3_purp.c148 int X509_PURPOSE_get_by_sname(char *sname) argument
154 if(!strcmp(xptmp->sname, sname)) return i;
174 char *name, char *sname, void *arg)
196 OPENSSL_free(ptmp->sname);
200 ptmp->sname = BUF_strdup(sname);
201 if(!ptmp->name || !ptmp->sname) {
236 OPENSSL_free(p->sname);
262 return xp->sname;
172 X509_PURPOSE_add(int id, int trust, int flags, int (*ck)(const X509_PURPOSE *, const X509 *, int), char *name, char *sname, void *arg) argument
[all...]
H A Dx509v3.h465 char *sname; member in struct:x509_purpose_st
685 int X509_PURPOSE_get_by_sname(char *sname);
689 char *name, char *sname, void *arg);
H A Dv3_crld.c228 if (!strcmp(pbn->sname, bnam))
/barrelfish-master/lib/openssl-1.0.0d/crypto/krb5/
H A Dkrb5_asn.h108 ** sname[2] PrincipalName,
116 KRB5_PRINCNAME *sname; member in struct:krb5_tktbody_st
H A Dkrb5_asn.c84 ASN1_EXP(KRB5_TKTBODY, sname, KRB5_PRINCNAME, 2),
/barrelfish-master/include/lwip2/lwip/prot/
H A Ddhcp.h79 PACK_STRUCT_FLD_8(u8_t sname[DHCP_SNAME_LEN]);
154 #define DHCP_OPTION_OVERLOAD 52 /* RFC2132 9.3, use file and/or sname field for options */
172 /* possible combinations of overloading the file and sname fields with options */
/barrelfish-master/lib/openssl-1.0.0d/apps/
H A Decparam.c366 const char *sname; local
368 sname = OBJ_nid2sn(curves[n].nid);
371 if (sname == NULL)
372 sname = "";
374 BIO_printf(out, " %-10s: ", sname);
/barrelfish-master/include/lwip/lwip/
H A Ddhcp.h94 PACK_STRUCT_FIELD(u8_t sname[DHCP_SNAME_LEN]);
212 #define DHCP_OPTION_OVERLOAD 52 /* RFC2132 9.3, use file and/or sname field for options */
231 /** possible combinations of overloading the file and sname fields with options */
/barrelfish-master/lib/openssl-1.0.0d/ssl/
H A Dkssl.c1241 asn1ticket->sname == NULL ||
1242 sk_ASN1_GENERALSTRING_num(asn1ticket->sname->namestring) < 2)
1258 gstr_svc = sk_ASN1_GENERALSTRING_value(asn1ticket->sname->namestring, 0);
1259 gstr_host = sk_ASN1_GENERALSTRING_value(asn1ticket->sname->namestring, 1);
1275 asn1ticket->sname->nametype->data[0];
/barrelfish-master/lib/lwip/src/core/
H A Ddhcp.c46 * - Proper parsing of DHCP messages exploiting file/sname field overloading.
1654 dhcp->msg_out->sname[i] = 0;
1746 /* are the sname and/or file field overloaded with options? */
1782 ("overloaded sname field\n"));
1783 options = (u8_t *) & dhcp->msg_in->sname;
1788 ("overloaded sname and file field\n"));
1789 options = (u8_t *) & dhcp->msg_in->sname;
/barrelfish-master/lib/lwip2/src/core/ipv4/
H A Ddhcp.c1560 /* decode overload only in options, not in file/sname: invalid packet */
1561 LWIP_ERROR("overload in file/sname", options_idx == DHCP_OPTIONS_OFS, return ERR_VAL;);
1637 LWIP_DEBUGF(DHCP_DEBUG | LWIP_DBG_TRACE, ("overloaded sname field\n"));
1641 LWIP_DEBUGF(DHCP_DEBUG | LWIP_DBG_TRACE, ("overloaded sname and file field\n"));
1650 /* copy bootp file name, don't care for sname (server hostname) */
1660 /* if both are overloaded, parse file first and then sname (RFC 2131 ch. 4.1) */
1876 dhcp->msg_out->sname[i] = 0;

Completed in 114 milliseconds