/macosx-10.9.5/apache-786.1/httpd/modules/mappers/ |
H A D | mod_rewrite.c | 2146 apr_size_t span, inputlen, outlen; local 2151 inputlen = strlen(input); 2154 if (inputlen == span) { 2327 } while (p < input+inputlen);
|
/macosx-10.9.5/curl-78.94.1/curl/lib/ |
H A D | escape.c | 215 size_t inputlen = length; local 217 CURLcode res = Curl_urldecode(handle, string, inputlen, &str, &outputlen,
|
/macosx-10.9.5/dcerpc-58/dcerpc/dcelib/darwin/ |
H A D | wc16str.c | 81 CFIndex inputlen = wchar16_strlen(input); local 87 output = malloc(3 * (inputlen + 1)); 95 input, inputlen, 96 &inputlen, 97 (uint8_t *)output, inputlen * 3, 112 CFIndex inputlen = strlen(input); local 118 output = malloc(sizeof(wchar16_t) *(inputlen + 1)); 126 (const uint8_t *)input, inputlen, 127 &inputlen, 128 output, inputlen * sizeo [all...] |
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael-1.10/ |
H A D | _rijndael.c | 473 block_encrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen, argument 479 nblocks = inputlen / RIJNDAEL_BLOCKSIZE; 542 block_decrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen, argument 548 nblocks = inputlen / RIJNDAEL_BLOCKSIZE;
|
H A D | rijndael.h | 179 block_encrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen, 184 block_decrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen,
|
/macosx-10.9.5/MITKerberosShim-62.1/Kerberos/ |
H A D | krb5.h | 489 size_t inputlen, size_t *length) KERBEROS_APPLE_DEPRECATED("use GSS.framework");
|
/macosx-10.9.5/MITKerberosShim-62.1/mit-include/krb5/ |
H A D | krb5.h | 491 size_t inputlen, size_t *length) KERBEROS_APPLE_DEPRECATED("use GSS.framework");
|
/macosx-10.9.5/MITKerberosShim-62.1/ |
H A D | crypto.c | 244 size_t inputlen, size_t *length) 260 *length = heim_krb5_get_wrapped_length(HC(context), crypto, inputlen); 242 krb5_c_encrypt_length(mit_krb5_context context, mit_krb5_enctype enctype, size_t inputlen, size_t *length) argument
|
/macosx-10.9.5/MITKerberosShim-62.1/include/ |
H A D | mit-krb5.h | 465 size_t inputlen, size_t *length);
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | mit_glue.c | 289 size_t inputlen, 305 *length = krb5_get_wrapped_length(context, crypto, inputlen); 287 krb5_c_encrypt_length(krb5_context context, krb5_enctype enctype, size_t inputlen, size_t *length) argument
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/plugins/ |
H A D | gssapi.c | 431 const unsigned char *input, unsigned inputlen, 447 real_input_token.length = inputlen; 499 const char *input, unsigned inputlen, 505 ret = _plug_decode(&text->decode_context, (const unsigned char *)input, inputlen, 430 gssapi_decode_packet(void *context, const unsigned char *input, unsigned inputlen, unsigned char **output, unsigned *outputlen) argument 498 gssapi_decode(void *context, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument
|
H A D | plugin_common.c | 625 const unsigned char *input, unsigned inputlen, 630 const unsigned char *input, unsigned inputlen, 643 while (inputlen) { /* more input */ 647 tocopy = (inputlen > text->needsize) ? text->needsize : inputlen; 652 inputlen -= tocopy; 723 if (inputlen < diff) { /* not a complete packet, need more input */ 724 memcpy(text->buffer + text->cursize, input, inputlen); 725 text->cursize += inputlen; 732 inputlen 624 _plug_decode(decode_context_t *text, const unsigned char *input, unsigned inputlen, unsigned char **output, unsigned *outputsize, unsigned *outputlen, int (*decode_pkt)(void *rock, const unsigned char *input, unsigned inputlen, unsigned char **output, unsigned *outputlen), void *rock) argument [all...] |
H A D | plugin_common.h | 198 const unsigned char *input, unsigned int inputlen, 201 const unsigned char *input, unsigned int inputlen,
|
H A D | srp.c | 290 unsigned long inputlen, tmpnum; local 299 for (i = 0, inputlen = 0; i < numiov; i++) 300 inputlen += invec[i].iov_len; 306 inputlen + /* for content */ 316 inputlen = invec[i].iov_len; 324 input, inputlen); 329 inputlen = *outputlen - 4; 333 memcpy(text->encode_buf + *outputlen, input, inputlen); 334 *outputlen += inputlen; 380 unsigned inputlen, 378 srp_decode_packet(void *context, const char *input, unsigned inputlen, char **output, unsigned *outputlen) argument 457 srp_decode(void *context, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument [all...] |
H A D | passdss.c | 155 unsigned long inputlen; local 167 for (i = 0, inputlen = 0; i < numiov; i++) 168 inputlen += invec[i].iov_len; 174 inputlen + /* content */ 226 padlen = text->blk_siz - ((inputlen + hmaclen) % text->blk_siz) - 1; 260 unsigned inputlen, 275 &(text->decode_pkt_buf_len), inputlen); 281 (char *) input, inputlen); 292 padlen = text->decode_pkt_buf[inputlen - 1] + 1; 293 inputlen 258 passdss_decode_packet(void *context, const char *input, unsigned inputlen, char **output, unsigned *outputlen) argument 305 input, inputlen, hmac, &hmaclen); local 320 passdss_decode(void *context, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument [all...] |
/macosx-10.9.5/apache-786.1/httpd/modules/ssl/ |
H A D | ssl_expr_scan.c | 1968 + ssl_expr_info.inputlen
|
H A D | ssl_expr.c | 45 ssl_expr_info.inputlen = strlen(expr);
|
H A D | ssl_expr.h | 89 int inputlen; member in struct:__anon6068
|
/macosx-10.9.5/tcl-102/tcl_ext/tkimg/tkimg/compat/libtiff/contrib/iptcutil/ |
H A D | iptcutil.c | 473 inputlen = BUFFER_SZ; local 475 line = (char *) malloc(inputlen); 477 while((line = super_fgets(line,&inputlen,ifile))!=NULL) 482 token = (char *) malloc(inputlen); 483 newstr = (char *) malloc(inputlen); 484 while(tokenizer(0, token, inputlen, line, "", "=", "\"", 0, 499 while(tokenizer(0, newstr, inputlen, token, "", "#", "", 0, 525 while(tokenizer(0, newstr, inputlen, token, "", "&", "", 0,
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/lib/ |
H A D | common.c | 206 unsigned inputlen, 213 if(!input || !inputlen || !output || !outputlen) 222 tmp.iov_len = inputlen; 275 const char *input, unsigned inputlen, 298 if(inputlen > conn->props.maxbufsize) { 309 memcpy(conn->decode_buf, input, inputlen); 310 conn->decode_buf[inputlen] = '\0'; 312 *outputlen = inputlen; 316 result = conn->oparams.decode(conn->context, input, inputlen, output, outputlen); 205 sasl_encode(sasl_conn_t *conn, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument 274 sasl_decode(sasl_conn_t *conn, const char *input, unsigned inputlen, const char **output, unsigned *outputlen) argument
|
H A D | plugin_common.c | 603 const unsigned char *input, unsigned inputlen, 608 const unsigned char **input, unsigned int *inputlen, 617 while (inputlen!=0) 620 ret = decode_pkt(context, &input, &inputlen, &tmp, &tmplen); 601 _plug_decode(const sasl_utils_t *utils, void *context, const unsigned char *input, unsigned inputlen, unsigned char **output, unsigned int *outputsize, unsigned int *outputlen, int (*decode_pkt)(void *context, const unsigned char **input, unsigned int *inputlen, unsigned char **output, unsigned int *outputlen)) argument
|
H A D | plugin_common.h | 161 const unsigned char *input, unsigned int inputlen, 164 const unsigned char **input, unsigned int *inputlen,
|
/macosx-10.9.5/CPANInternal-140/Crypt-Rijndael/ |
H A D | _rijndael.c | 473 block_encrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen, argument 479 nblocks = inputlen / RIJNDAEL_BLOCKSIZE; 542 block_decrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen, argument 548 nblocks = inputlen / RIJNDAEL_BLOCKSIZE;
|
H A D | rijndael.h | 178 block_encrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen, 183 block_decrypt(RIJNDAEL_context *ctx, UINT8 *input, int inputlen,
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/include/ |
H A D | sasl.h | 1006 * inputlen & input -- client data 1195 * SASL_BADPARAM -- inputlen is greater than the SASL_MAXOUTBUF 1198 const char *input, unsigned inputlen, 1225 const char *input, unsigned inputlen,
|