/macosx-10.10/Security-57031.1.35/SecurityTests/cspxutils/ccOpensslCompat/ |
H A D | digestCommonExtern.h | 15 extern int md2os(const void *p, unsigned long len, unsigned char *md); 16 extern int md4os(const void *p, unsigned long len, unsigned char *md); 17 extern int md5os(const void *p, unsigned long len, unsigned char *md); 18 extern int sha1os(const void *p, unsigned long len, unsigned char *md); 19 extern int sha224os(const void *p, unsigned long len, unsigned char *md); 20 extern int sha256os(const void *p, unsigned long len, unsigned char *md); 21 extern int sha384os(const void *p, unsigned long len, unsigned char *md); 22 extern int sha512os(const void *p, unsigned long len, unsigned char *md); 26 extern int md2cc(const void *p, unsigned long len, unsigned char *md); 27 extern int md4cc(const void *p, unsigned long len, unsigned char *md); [all...] |
/macosx-10.10/ntp-92/ntpd/ |
H A D | ntp_monitor.c | 154 register struct mon_data *md, *md_next; local 170 md = mon_hash[i]; /* get next list */ 172 while (md != NULL) { 173 md_next = md->hash_next; 174 md->hash_next = mon_free; 175 mon_free = md; 176 md = md_next; 186 struct mon_data *md; local 188 for (md = mon_mru_list.mru_next; md ! 214 register struct mon_data *md; local 365 register struct mon_data *md; local [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/mdc2/ |
H A D | mdc2_one.c | 63 unsigned char *MDC2(const unsigned char *d, size_t n, unsigned char *md) argument 68 if (md == NULL) md=m; 72 MDC2_Final(md,&c); 74 return(md);
|
/macosx-10.10/OpenSSL098-52/src/crypto/ripemd/ |
H A D | rmd_one.c | 65 unsigned char *md) 70 if (md == NULL) md=m; 74 RIPEMD160_Final(md,&c); 76 return(md); 64 RIPEMD160(const unsigned char *d, size_t n, unsigned char *md) argument
|
/macosx-10.10/OpenSSL098-52/src/crypto/sha/ |
H A D | sha1_one.c | 65 unsigned char *SHA1(const unsigned char *d, size_t n, unsigned char *md) argument 70 if (md == NULL) md=m; 74 SHA1_Final(md,&c); 76 return(md);
|
H A D | sha_one.c | 65 unsigned char *SHA(const unsigned char *d, size_t n, unsigned char *md) argument 70 if (md == NULL) md=m; 74 SHA_Final(md,&c); 76 return(md);
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | padata.c | 46 krb5_padata_add(krb5_context context, METHOD_DATA *md, argument 51 pa = realloc (md->val, (md->len + 1) * sizeof(*md->val)); 57 md->val = pa; 59 pa[md->len].padata_type = type; 60 pa[md->len].padata_value.length = len; 61 pa[md->len].padata_value.data = buf; 62 md->len++;
|
/macosx-10.10/tcl-105/tcl_ext/tdom/tdom/generic/ |
H A D | aolstub.cpp | 48 struct mydata *md = (struct mydata*)cd; local 52 Ns_Log(Warning, "can't load module %s: %s", md->modname, 55 Tcl_SetAssocData(interp, "tdom:nsd", NULL, (ClientData)md); 80 struct mydata *md = NULL; 82 md = (struct mydata*)ns_malloc(sizeof(struct mydata)); 83 md->modname = strcpy(ns_malloc(strlen(mod)+1), mod); 84 md->server = strcpy(ns_malloc(strlen(srv)+1), srv); 86 return (Ns_TclInitInterps(srv, NsTdom_Init, (void*)md) == TCL_OK) 79 struct mydata *md = NULL; local
|
/macosx-10.10/tcl-105/tcl_ext/thread/thread/generic/ |
H A D | aolstub.cpp | 49 struct mydata *md = (struct mydata*)cd; local 53 Ns_Log(Warning, "can't load module %s: %s", md->modname, 57 Tcl_SetAssocData(interp, "thread:nsd", NULL, (ClientData)md); 82 struct mydata *md = NULL; 84 md = (struct mydata*)ns_malloc(sizeof(struct mydata)); 85 md->modname = strcpy(ns_malloc(strlen(mod)+1), mod); 86 md->server = strcpy(ns_malloc(strlen(srv)+1), srv); 88 return (Ns_TclInitInterps(srv, NsThread_Init, (void*)md) == TCL_OK) 81 struct mydata *md = NULL; local
|
/macosx-10.10/bind9-45.101/bind9/lib/dns/rdata/generic/ |
H A D | md_3.h | 27 dns_name_t md; member in struct:dns_rdata_md
|
/macosx-10.10/rsync-45/rsync/lib/ |
H A D | mdfour.h | 29 void mdfour_begin(struct mdfour *md); 30 void mdfour_update(struct mdfour *md, unsigned char *in, uint32 n); 31 void mdfour_result(struct mdfour *md, unsigned char *out);
|
/macosx-10.10/ruby-106/ruby/lib/rexml/dtd/ |
H A D | entitydecl.rb | 15 md = nil 17 md = src.match( PUBLIC, true ) 19 @content = "#{md[2]} #{md[4]}" 21 md = src.match( SYSTEM, true ) 23 @content = md[2] 25 md = src.match( PLAIN, true ) 27 @content = md[2] 29 md = src.match( PERCENT, true ) 31 @content = md[ [all...] |
H A D | notationdecl.rb | 12 md = src.match( PUBLIC, true ) 14 md = src.match( SYSTEM, true ) 18 @name = md[1] 19 @middle = md[2] 20 @rest = md[3] 33 md = source.match( PATTERN_RE, true ) 34 thing = md[0].squeeze(" \t\n\r")
|
/macosx-10.10/OpenSSL098-52/src/crypto/md2/ |
H A D | md2_one.c | 66 unsigned char *MD2(const unsigned char *d, size_t n, unsigned char *md) argument 71 if (md == NULL) md=m; 91 MD2_Final(md,&c); 93 return(md);
|
/macosx-10.10/ruby-106/ruby/ext/tk/sample/tkextlib/iwidgets/sample/ |
H A D | messagedialog.rb | 10 md = Tk::Iwidgets::Messagedialog.new(:title=>'Message Dialog', 14 md.buttonconfigure('OK', :text=>'Yes') 15 md.buttonconfigure('Cancel', :text=>'No') 17 if TkComm.bool(md.activate) 18 md.text('Are you really sure ? ') 19 if TkComm.bool(md.activate) 28 md.destroy
|
/macosx-10.10/OpenSSL098-52/src/crypto/evp/ |
H A D | names.c | 79 int EVP_add_digest(const EVP_MD *md) argument 87 name=OBJ_nid2sn(md->type); 88 r=OBJ_NAME_add(name,OBJ_NAME_TYPE_MD_METH,(const char *)md); 90 r=OBJ_NAME_add(OBJ_nid2ln(md->type),OBJ_NAME_TYPE_MD_METH,(const char *)md); 93 if (md->pkey_type && md->type != md->pkey_type) 95 r=OBJ_NAME_add(OBJ_nid2sn(md->pkey_type), 98 r=OBJ_NAME_add(OBJ_nid2ln(md [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hcrypto/ |
H A D | hmac.c | 55 memset(ctx->opad, 0, EVP_MD_block_size(ctx->md)); 60 memset(ctx->ipad, 0, EVP_MD_block_size(ctx->md)); 73 return EVP_MD_size(ctx->md); 80 const EVP_MD *md, 86 if (ctx->md != md) { 87 ctx->md = md; 92 ctx->key_length = EVP_MD_size(ctx->md); 99 if (keylen > EVP_MD_block_size(ctx->md)) { 77 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md, ENGINE *engine) argument 138 HMAC_Final(HMAC_CTX *ctx, void *md, unsigned int *len) argument 149 HMAC(const EVP_MD *md, const void *key, size_t key_size, const void *data, size_t data_size, void *hash, unsigned int *hash_len) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/md4/ |
H A D | md4test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL); 110 p=pt(md); 127 static char *pt(unsigned char *md) argument 133 sprintf(&(buf[i*2]),"%02x",md[i]);
|
H A D | md4_one.c | 68 unsigned char *MD4(const unsigned char *d, size_t n, unsigned char *md) argument 73 if (md == NULL) md=m; 93 MD4_Final(md,&c); 95 return(md);
|
/macosx-10.10/OpenSSL098-52/src/fips/hmac/ |
H A D | fips_hmac.c | 67 const EVP_MD *md, ENGINE *impl) 72 if (md != NULL) 75 ctx->md=md; 78 md=ctx->md; 82 if (FIPS_mode() && !(md->flags & EVP_MD_FLAG_FIPS) 90 j=M_EVP_MD_block_size(md); 94 EVP_DigestInit_ex(&ctx->md_ctx,md, impl); 114 EVP_DigestInit_ex(&ctx->i_ctx,md, imp 66 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md, ENGINE *impl) argument 125 HMAC_Init(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md) argument 138 HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) argument 167 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/test/ |
H A D | md4test.c | 96 static char *pt(unsigned char *md); 102 unsigned char md[MD4_DIGEST_LENGTH]; local 109 EVP_Digest(&(P[0][0]),strlen((char *)*P),md,NULL,EVP_md4(), NULL); 110 p=pt(md); 127 static char *pt(unsigned char *md) argument 133 sprintf(&(buf[i*2]),"%02x",md[i]);
|
/macosx-10.10/OpenSSL098-52/src/crypto/hmac/ |
H A D | hmac.c | 67 const EVP_MD *md, ENGINE *impl) 72 if (md != NULL) 75 ctx->md=md; 78 md=ctx->md; 83 j=EVP_MD_block_size(md); 87 EVP_DigestInit_ex(&ctx->md_ctx,md, impl); 107 EVP_DigestInit_ex(&ctx->i_ctx,md, impl); 108 EVP_DigestUpdate(&ctx->i_ctx,pad,EVP_MD_block_size(md)); 66 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md, ENGINE *impl) argument 118 HMAC_Init(HMAC_CTX *ctx, const void *key, int len, const EVP_MD *md) argument 131 HMAC_Final(HMAC_CTX *ctx, unsigned char *md, unsigned int *len) argument 157 HMAC(const EVP_MD *evp_md, const void *key, int key_len, const unsigned char *d, size_t n, unsigned char *md, unsigned int *md_len) argument [all...] |
/macosx-10.10/pcre-7/pcre/ |
H A D | pcre_exec.c | 49 #define NLBLOCK md /* Block containing newline information */ 103 is_subject TRUE if printing from within md->start_subject 104 md pointer to matching data block, if is_subject is TRUE 110 pchars(const uschar *p, int length, BOOL is_subject, match_data *md) argument 113 if (is_subject && length > md->end_subject - p) length = md->end_subject - p; 132 md points to match data block 139 match_ref(int offset, register USPTR eptr, int length, match_data *md, argument 142 USPTR p = md->start_subject + md 456 match(REGISTER USPTR eptr, REGISTER const uschar *ecode, USPTR mstart, USPTR markptr, int offset_top, match_data *md, unsigned long int ims, eptrblock *eptrb, int flags, unsigned int rdepth) argument 5192 match_data *md = &match_block; local [all...] |
/macosx-10.10/OpenSSH-189/osslshim/ossl/ |
H A D | ossl-hmac.c | 83 return (EVP_MD_size(ctx->md)); 91 const EVP_MD *md, 97 if (md != NULL) { 99 ctx->md = md; 101 md = ctx->md; 106 blksize = EVP_MD_block_size(md); 110 EVP_DigestInit_ex(&ctx->md_ctx, md, engine); 129 EVP_DigestInit_ex(&ctx->i_ctx, md, engin 88 HMAC_Init_ex(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md, ENGINE *engine) argument 144 HMAC_Init(HMAC_CTX *ctx, const void *key, size_t keylen, const EVP_MD *md) argument 161 HMAC_Final(HMAC_CTX *ctx, void *md, unsigned int *len) argument 174 HMAC(const EVP_MD *md, const void *key, size_t key_size, const void *data, size_t data_size, void *hash, unsigned int *hash_len) argument [all...] |
/macosx-10.10/OpenSSL098-52/src/crypto/md5/ |
H A D | md5_one.c | 68 unsigned char *MD5(const unsigned char *d, size_t n, unsigned char *md) argument 73 if (md == NULL) md=m; 93 MD5_Final(md,&c); 95 return(md);
|