/netbsd-current/external/bsd/libbind/dist/nameser/ |
H A D | ns_sign.c | 69 *\li querysiglen (response), the length of the signature in the query 81 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 85 querysig, querysiglen, sig, siglen, 91 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 167 if (querysiglen > 0 && querysig != NULL) { 168 u_int16_t len_n = htons(querysiglen); 172 querysig, querysiglen, NULL, 0); 254 ns_sign_tcp_init(void *k, const u_char *querysig, int querysiglen, argument 258 if (state == NULL || k == NULL || querysig == NULL || querysiglen < 0) 264 if (querysiglen > (in 80 ns_sign(u_char *msg, int *msglen, int msgsize, int error, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned) argument 90 ns_sign2(u_char *msg, int *msglen, int msgsize, int error, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned, u_char **dnptrs, u_char **lastdnptr) argument [all...] |
H A D | ns_verify.c | 119 *\li querysiglen (response), the length of the signature in the query 138 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 242 if (querysiglen > 0 && querysig != NULL) { 243 u_int16_t len_n = htons(querysiglen); 247 querysig, querysiglen, NULL, 0); 325 ns_verify_tcp_init(void *k, const u_char *querysig, int querysiglen, argument 329 if (state == NULL || k == NULL || querysig == NULL || querysiglen < 0) 335 if (querysiglen > (int)sizeof(state->sig)) 337 memcpy(state->sig, querysig, querysiglen); 338 state->siglen = querysiglen; 137 ns_verify(u_char *msg, int *msglen, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t *timesigned, int nostrip) argument [all...] |
/netbsd-current/lib/libresolv/ |
H A D | ns_sign.c | 71 *\li querysiglen (response), the length of the signature in the query 83 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 87 querysig, querysiglen, sig, siglen, 93 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 170 if (querysiglen > 0 && querysig != NULL) { 171 u_int16_t len_n = htons(querysiglen); 175 querysig, querysiglen, NULL, 0); 257 ns_sign_tcp_init(void *k, const u_char *querysig, int querysiglen, argument 261 if (state == NULL || k == NULL || querysig == NULL || querysiglen < 0) 267 if (querysiglen > (in 82 ns_sign(u_char *msg, int *msglen, int msgsize, int error, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned) argument 92 ns_sign2(u_char *msg, int *msglen, int msgsize, int error, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t in_timesigned, u_char **dnptrs, u_char **lastdnptr) argument [all...] |
H A D | ns_verify.c | 118 *\li querysiglen (response), the length of the signature in the query 137 const u_char *querysig, int querysiglen, u_char *sig, int *siglen, 241 if (querysiglen > 0 && querysig != NULL) { 242 u_int16_t len_n = htons(querysiglen); 246 querysig, querysiglen, NULL, 0); 324 ns_verify_tcp_init(void *k, const u_char *querysig, int querysiglen, argument 328 if (state == NULL || k == NULL || querysig == NULL || querysiglen < 0) 334 if (querysiglen > (int)sizeof(state->sig)) 336 memcpy(state->sig, querysig, querysiglen); 337 state->siglen = querysiglen; 136 ns_verify(u_char *msg, int *msglen, void *k, const u_char *querysig, int querysiglen, u_char *sig, int *siglen, time_t *timesigned, int nostrip) argument [all...] |