/macosx-10.10/OpenSSH-189/openssh/ |
H A D | schnorr.h | 48 const u_char *id, u_int idlen, BIGNUM **r_p, BIGNUM **e_p); 51 const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, 55 const EVP_MD *evp_md, const BIGNUM *g_x, const u_char *id, u_int idlen, 60 const BIGNUM *g_x, const u_char *id, u_int idlen,
|
H A D | schnorr.c | 68 const u_char *id, u_int idlen) 89 buffer_put_string(&b, id, idlen); 119 * 'idlen' bytes from 'id' will be included in the signature hash as an anti- 129 const u_char *id, u_int idlen, BIGNUM **r_p, BIGNUM **e_p) 179 id, idlen)) == NULL) { 215 * 'idlen' bytes from 'id' will be included in the signature hash as an anti- 222 const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, 229 x, g_x, id, idlen, &r, &e) != 0) 254 * Signature hash will be salted with 'idlen' bytes from 'id'. 259 const EVP_MD *evp_md, const BIGNUM *g_x, const u_char *id, u_int idlen, 66 schnorr_hash(const BIGNUM *p, const BIGNUM *q, const BIGNUM *g, const EVP_MD *evp_md, const BIGNUM *g_v, const BIGNUM *g_x, const u_char *id, u_int idlen) argument 127 schnorr_sign(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const EVP_MD *evp_md, const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, BIGNUM **r_p, BIGNUM **e_p) argument 221 schnorr_sign_buf(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const BIGNUM *x, const BIGNUM *g_x, const u_char *id, u_int idlen, u_char **sig, u_int *siglen) argument 258 schnorr_verify(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const EVP_MD *evp_md, const BIGNUM *g_x, const u_char *id, u_int idlen, const BIGNUM *r, const BIGNUM *e) argument 359 schnorr_verify_buf(const BIGNUM *grp_p, const BIGNUM *grp_q, const BIGNUM *grp_g, const BIGNUM *g_x, const u_char *id, u_int idlen, const u_char *sig, u_int siglen) argument [all...] |
/macosx-10.10/apache-793/httpd/include/ |
H A D | ap_socache.h | 69 * @param idlen Length of id blob 81 unsigned int idlen, 144 * @param idlen Length of id blob 152 const unsigned char *id, unsigned int idlen, 163 * @param idlen Length of id blob 172 const unsigned char *id, unsigned int idlen, 182 * @param idlen Length of id blob 186 const unsigned char *id, unsigned int idlen,
|
/macosx-10.10/procmail-14/procmail/src/ |
H A D | fields.c | 52 { register struct field*p,**pp;int idlen; local 54 (*pp=p=malloc(FLD_HEADSIZ+totlen))->fld_next=0;idlen=breakfield(text,totlen); 55 p->id_len=idlen>0?idlen:pp==&rdheader?0:-idlen; /* copy contents */ 112 { int idlen; local 114 if((idlen=breakfield(buf,buffilled))<=0) /* not the start of a valid field */ 116 if(idlen==STRLEN(FROM)&&eqFrom_(buf)) /* it's a From_ line */
|
/macosx-10.10/apache-793/httpd/modules/cache/ |
H A D | mod_socache_dc.c | 94 const unsigned char *id, unsigned int idlen, 105 if (!DC_CTX_add_session(ctx->dc, id, idlen, der, der_len, 115 const unsigned char *id, unsigned int idlen, 122 if (!DC_CTX_get_session(ctx->dc, id, idlen, dest, *destlen, &data_len)) { 137 unsigned int idlen, apr_pool_t *p) 140 if (!DC_CTX_remove_session(ctx->dc, id, idlen)) { 93 socache_dc_store(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_time_t expiry, unsigned char *der, unsigned int der_len, apr_pool_t *p) argument 114 socache_dc_retrieve(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, unsigned char *dest, unsigned int *destlen, apr_pool_t *p) argument 135 socache_dc_remove(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_pool_t *p) argument
|
H A D | mod_socache_memcache.c | 181 const unsigned char *id, unsigned int idlen, 186 if (idlen * 2 + ctx->taglen >= keylen) 190 ap_bin2hex(id, idlen, cp); 196 const unsigned char *id, unsigned int idlen, 204 if (socache_mc_id2key(ctx, id, idlen, buf, sizeof buf)) { 222 const unsigned char *id, unsigned int idlen, 230 if (socache_mc_id2key(ctx, id, idlen, buf, sizeof buf)) { 259 unsigned int idlen, apr_pool_t *p) 264 if (socache_mc_id2key(ctx, id, idlen, buf, sizeof buf)) { 180 socache_mc_id2key(ap_socache_instance_t *ctx, const unsigned char *id, unsigned int idlen, char *key, apr_size_t keylen) argument 195 socache_mc_store(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_time_t expiry, unsigned char *ucaData, unsigned int nData, apr_pool_t *p) argument 221 socache_mc_retrieve(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, unsigned char *dest, unsigned int *destlen, apr_pool_t *p) argument 257 socache_mc_remove(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_pool_t *p) argument
|
H A D | mod_socache_dbm.c | 76 unsigned int idlen, apr_pool_t *p); 192 unsigned int idlen, apr_time_t expiry, 203 if ((idlen + nData) >= PAIRMAX) { 206 (idlen + nData), PAIRMAX); 210 if ((idlen + nData) >= 950 /* at least less than approx. 1KB */) { 213 (idlen + nData), 950); 220 dbmkey.dsize = idlen; 260 const unsigned char *id, unsigned int idlen, 277 dbmkey.dsize = idlen; 318 socache_dbm_remove(ctx, s, id, idlen, 190 socache_dbm_store(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_time_t expiry, unsigned char *ucaData, unsigned int nData, apr_pool_t *pool) argument 259 socache_dbm_retrieve(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, unsigned char *dest, unsigned int *destlen, apr_pool_t *p) argument 325 socache_dbm_remove(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_pool_t *p) argument [all...] |
H A D | mod_socache_shmcb.c | 261 const unsigned char *id, unsigned int idlen, 479 unsigned int idlen, apr_time_t expiry, 492 if (idlen < 4) { 494 "(%u bytes)", idlen); 497 tryreplace = shmcb_subcache_remove(s, header, subcache, id, idlen); 499 len_encoded, id, idlen, expiry)) { 517 const unsigned char *id, unsigned int idlen, 530 rv = shmcb_subcache_retrieve(s, header, subcache, id, idlen, 544 unsigned int idlen, apr_pool_t *p) 553 if (idlen < 477 socache_shmcb_store(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_time_t expiry, unsigned char *encoded, unsigned int len_encoded, apr_pool_t *p) argument 515 socache_shmcb_retrieve(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, unsigned char *dest, unsigned int *destlen, apr_pool_t *p) argument 542 socache_shmcb_remove(ap_socache_instance_t *ctx, server_rec *s, const unsigned char *id, unsigned int idlen, apr_pool_t *p) argument 824 shmcb_subcache_retrieve(server_rec *s, SHMCBHeader *header, SHMCBSubcache *subcache, const unsigned char *id, unsigned int idlen, unsigned char *dest, unsigned int *destlen) argument 886 shmcb_subcache_remove(server_rec *s, SHMCBHeader *header, SHMCBSubcache *subcache, const unsigned char *id, unsigned int idlen) argument [all...] |
/macosx-10.10/bind9-45.101/bind9/bin/pkcs11/ |
H A D | pkcs11-keygen.c | 100 int idlen = 0; local 114 {CKA_ID, &idbuf, idlen} 124 {CKA_ID, &idbuf, idlen} 157 idlen = 4; 207 if (idlen == 0) { 211 idlen = 2; 212 publickey_template[5].ulValueLen = idlen; 213 privatekey_template[6].ulValueLen = idlen;
|
/macosx-10.10/apache-793/httpd/modules/ssl/ |
H A D | ssl_scache.c | 113 BOOL ssl_scache_store(server_rec *s, UCHAR *id, int idlen, argument 137 rv = mc->sesscache->store(mc->sesscache_context, s, id, idlen, 147 SSL_SESSION *ssl_scache_retrieve(server_rec *s, UCHAR *id, int idlen, argument 160 rv = mc->sesscache->retrieve(mc->sesscache_context, s, id, idlen, 176 void ssl_scache_remove(server_rec *s, UCHAR *id, int idlen, argument 185 mc->sesscache->remove(mc->sesscache_context, s, id, idlen, p);
|
H A D | ssl_util_ssl.c | 523 char *SSL_SESSION_id2sz(unsigned char *id, int idlen, argument 526 if (idlen > SSL_MAX_SSL_SESSION_ID_LENGTH) 527 idlen = SSL_MAX_SSL_SESSION_ID_LENGTH; 531 if (idlen > (strsize-1) / 2) 532 idlen = (strsize-1) / 2; 534 ap_bin2hex(id, idlen, str);
|
H A D | ssl_engine_kernel.c | 1640 unsigned int idlen, 1661 SSL_SESSION_id2sz(id, idlen, buf, sizeof(buf)), 1680 unsigned int idlen; local 1693 id = (unsigned char *)SSL_SESSION_get_id(session, &idlen); 1696 idlen = session->session_id_length; 1699 rc = ssl_scache_store(s, id, idlen, 1704 ssl_session_log(s, "SET", id, idlen, 1724 int idlen, int *do_copy) 1734 session = ssl_scache_retrieve(s, id, idlen, conn->pool); 1736 ssl_session_log(s, "GET", id, idlen, 1637 ssl_session_log(server_rec *s, const char *request, unsigned char *id, unsigned int idlen, const char *status, const char *result, long timeout) argument 1722 ssl_callback_GetSessionCacheEntry(SSL *ssl, unsigned char *id, int idlen, int *do_copy) argument 1763 unsigned int idlen; local [all...] |
/macosx-10.10/ipsec-286.1.1/ipsec-tools/racoon/ |
H A D | localconf.c | 223 int idlen = id_p->l - sizeof(struct ipsecdoi_id_b); local 241 peer_id = racoon_malloc(1 + idlen); 244 memcpy(peer_id, id_p->v + sizeof(struct ipsecdoi_id_b), idlen); 245 *(peer_id + idlen) = '\0'; 258 idlen, 267 idlen,
|
H A D | oakley.c | 1812 oakley_check_certid_in_certchain(cert_t *certchain, int idtype, int idlen, void *id) argument 1817 if (oakley_check_certid_1(&p->cert, idtype, idlen, id, &p->status) == 0) { 1829 int idlen; local 1843 idlen = iph1->id_p->l - sizeof(*id_b); 1845 if (oakley_check_certid_1(&p->cert, id_b->type, idlen, peers_id, &p->status) == 0) { 1859 int idlen; local 1871 idlen = iph1->id_p->l - sizeof(*id_b); 1873 return oakley_check_certid_in_certchain(iph1->cert_p, doi_type, idlen, peers_id); 1878 oakley_check_certid_1(vchar_t *cert, int idtype, int idlen, void *id, cert_status_t *certStatus) argument 1916 if (idlen ! [all...] |
/macosx-10.10/postfix-255/postfix/src/tls/ |
H A D | tls_client.c | 516 int idlen; local 546 if ((idlen = strlen(certid)) > (domlen = strlen(domain)) + 1 547 && certid[idlen - domlen - 1] == '.' 548 && !strcasecmp(certid + (idlen - domlen), domain)) 563 && (idlen = strlen(certid + 1)) <= (domlen = strlen(parent)) 565 parent + domlen - idlen,
|
/macosx-10.10/UserNotification-29/Libunc/ |
H A D | UNCUserNotification.c | 272 size_t idlen; 289 idlen = strlen(sessionID); 290 if (idlen > MAX_PORT_NAME_LENGTH) idlen = MAX_PORT_NAME_LENGTH; 291 userNotification->_sessionID = (char *)malloc(idlen + 1); 292 strncpy(userNotification->_sessionID, sessionID, idlen); 293 userNotification->_sessionID[idlen] = '\0';
|
/macosx-10.10/OpenSSL098-52/src/crypto/cms/ |
H A D | cms.h | 182 unsigned char *id, size_t idlen); 200 unsigned char *id, size_t idlen, 216 const unsigned char *id, size_t idlen); 303 CMS_ReceiptRequest *CMS_ReceiptRequest_create0(unsigned char *id, int idlen,
|
H A D | cms_ess.c | 92 CMS_ReceiptRequest *CMS_ReceiptRequest_create0(unsigned char *id, int idlen, argument 103 ASN1_STRING_set0(rr->signedContentIdentifier, id, idlen);
|
H A D | cms_env.c | 408 const unsigned char *id, size_t idlen) 421 tmp_os.length = (int)idlen; 447 unsigned char *id, size_t idlen, 533 ASN1_STRING_set0(kekri->kekid->keyIdentifier, id, idlen); 407 CMS_RecipientInfo_kekri_id_cmp(CMS_RecipientInfo *ri, const unsigned char *id, size_t idlen) argument 445 CMS_add0_recipient_key(CMS_ContentInfo *cms, int nid, unsigned char *key, size_t keylen, unsigned char *id, size_t idlen, ASN1_GENERALIZEDTIME *date, ASN1_OBJECT *otherTypeId, ASN1_TYPE *otherType) argument
|
/macosx-10.10/tcl-105/tcl_ext/tcllib/tcllib/modules/bench/ |
H A D | bench_wtext.tcl | 61 set idlen [string length $n] 75 lappend LINES " [PADL $idlen $n]: [PADR $vlen $v] $ip"
|
/macosx-10.10/OpenSSL098-52/src/ssl/ |
H A D | t1_lib.c | 229 long extlen, idlen, itmp; local 232 idlen = 0; 239 idlen += itmp + 2; 251 if ((long)(limit - ret - 7 - extlen - idlen) < 0) return NULL; 253 if (extlen + idlen > 0xFFF0) 255 s2n(extlen + idlen + 5, ret); 257 s2n(idlen, ret);
|
/macosx-10.10/ppp-786.1.1/Helpers/pppd/ |
H A D | ipv6cp.c | 638 int idlen = CILEN_IFACEID; \ 639 if (len >= idlen) { \ 641 PUTCHAR(idlen, ucp); \ 643 len -= idlen; \ 696 int idlen = CILEN_IFACEID; \ 697 if ((len -= idlen) < 0) \ 701 if (cilen != idlen || \
|
/macosx-10.10/ipsec-286.1.1/ipsec-tools/setkey/ |
H A D | test-pfkey.c | 405 u_int idlen = strlen(str), len; local 407 len = sizeof(m_id) + PFKEY_ALIGN8(idlen); 416 str, idlen);
|
/macosx-10.10/tcl-105/tcl_ext/tkimg/tkimg/compat/libjpeg/ |
H A D | rdtarga.c | 337 int idlen, cmaptype, subtype, flags, interlace_type, components; local 351 idlen = UCH(targaheader[0]); 444 while (idlen--) /* Throw away ID field */
|
/macosx-10.10/xnu-2782.1.97/bsd/nfs/ |
H A D | nfs4_subs.c | 1235 nfs4_guid2id(guid_t *guidp, char *id, int *idlen, int isgroup) argument 1260 if (compare || (*idlen < MAXPATHLEN)) { 1268 id1len = *idlen; 1299 len = strlcpy(id, id1, *idlen); 1300 if (len >= *idlen) 1303 *idlen = len; 1391 len = strlcpy(id, id2, *idlen); 1392 if (len >= *idlen) 1395 *idlen = len; 1414 len = strlcpy(id, id1, *idlen); [all...] |