/barrelfish-master/lib/openssl-1.0.0d/crypto/ |
H A D | o_str.c | 72 int OPENSSL_strncasecmp(const char *str1, const char *str2, size_t n) argument 75 while (*str1 && *str2 && n) 77 int res = toupper(*str1) - toupper(*str2); 79 str1++; 85 if (*str1) 94 return strncasecmp(str1, str2, n); 97 int OPENSSL_strcasecmp(const char *str1, const char *str2) argument 100 return OPENSSL_strncasecmp(str1, str2, (size_t)-1); 102 return strcasecmp(str1, str2);
|
H A D | o_str.h | 64 int OPENSSL_strcasecmp(const char *str1, const char *str2); 65 int OPENSSL_strncasecmp(const char *str1, const char *str2, size_t n);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/pkcs7/ |
H A D | example.h | 57 int get_signed_seq2string(PKCS7_SIGNER_INFO *si, char **str1, char **str2);
|
H A D | example.c | 75 int add_signed_seq2string(PKCS7_SIGNER_INFO *si, char *str1, char *str2) argument 91 ASN1_OCTET_STRING_set(os1,(unsigned char*)str1,strlen(str1)); 92 ASN1_OCTET_STRING_set(os2,(unsigned char*)str1,strlen(str1)); 115 int get_signed_seq2string(PKCS7_SIGNER_INFO *si, char **str1, char **str2) argument 148 *str1=malloc(os1->length+1); 150 memcpy(*str1,os1->data,os1->length); 152 (*str1)[os1->length]='\0'; 238 X509_ATTRIBUTE *add_seq2string(PKCS7_SIGNER_INFO *si, char *str1, cha argument [all...] |
H A D | verify.c | 181 char *str1,*str2; local 196 if (get_signed_seq2string(si,&str1,&str2)) 198 BIO_printf(bio_out,"String 1 is %s\n",str1);
|
/barrelfish-master/lib/libc/iconv/ |
H A D | citrus_bcs.c | 42 _citrus_bcs_strcasecmp(const char * __restrict str1, argument 50 c1 = _bcs_toupper(*str1++); 61 _citrus_bcs_strncasecmp(const char * __restrict str1, argument 69 c1 = _bcs_toupper(*str1++);
|
/barrelfish-master/lib/lwip2/src/core/ |
H A D | def.c | 128 lwip_stricmp(const char* str1, const char* str2) argument 133 c1 = *str1++; 163 lwip_strnicmp(const char* str1, const char* str2, size_t len) argument 168 c1 = *str1++;
|
/barrelfish-master/lib/openssl-1.0.0d/demos/tunala/ |
H A D | cb.c | 22 const char *str1, *str2; local 29 str1 = (w & SSL_ST_CONNECT ? "SSL_connect" : (w & SSL_ST_ACCEPT ? 34 fprintf(fp_cb_ssl_info, "(%s) %s\n", str1, str2); 37 fprintf(fp_cb_ssl_info, "(%s) failed in %s\n", str1, str2); 44 fprintf(fp_cb_ssl_info, "%s:error in %s\n", str1, str2);
|
H A D | tunala.c | 216 static int err_str1(const char *fmt, const char *str1) argument 218 fprintf(stderr, fmt, str1);
|
/barrelfish-master/include/lwip2/lwip/ |
H A D | def.h | 127 int lwip_strnicmp(const char* str1, const char* str2, size_t len); 131 int lwip_stricmp(const char* str1, const char* str2);
|
/barrelfish-master/lib/openssl-1.0.0d/crypto/dsa/ |
H A D | dsatest.c | 131 static const unsigned char str1[]="12345678901234567890"; variable 210 DSA_sign(0, str1, 20, sig, &siglen, dsa); 211 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 216 DSA_sign(0, str1, 20, sig, &siglen, dsa); 217 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|
/barrelfish-master/lib/openssl-1.0.0d/test/ |
H A D | dsatest.c | 131 static const unsigned char str1[]="12345678901234567890"; variable 210 DSA_sign(0, str1, 20, sig, &siglen, dsa); 211 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1) 216 DSA_sign(0, str1, 20, sig, &siglen, dsa); 217 if (DSA_verify(0, str1, 20, sig, siglen, dsa) == 1)
|