Lines Matching refs:data

285     PRSocketOptionData data;  in mod_nss_io_ctor()  local
286 data.option = PR_SockOpt_Nonblocking; in mod_nss_io_ctor()
287 data.value.non_blocking = PR_TRUE; in mod_nss_io_ctor()
288 if (PR_SetSocketOption(prfd, &data) != PR_SUCCESS) { in mod_nss_io_ctor()
336 char *data = fdevent_load_file(fn, &dlen, errh, PORT_Alloc, PORT_Free); in mod_nss_load_file() local
337 if (NULL == data) return -1; in mod_nss_load_file()
339 d->data = (unsigned char *)data; in mod_nss_load_file()
350 if (d->data) { in mod_nss_secitem_wipe()
351 if (d->len) ck_memzero(d->data, d->len); /*safer than PORT_Memset()*/ in mod_nss_secitem_wipe()
352 PORT_Free(d->data); /* ck_memzero() is safer than PORT_ZFree() */ in mod_nss_secitem_wipe()
353 d->data = NULL; in mod_nss_secitem_wipe()
467 char *b = (char *)f.data; in mod_nss_load_pem_file()
470 b = (char *)f.data; in mod_nss_load_pem_file()
475 if (NULL != strstr((char *)f.data, "-----")) { in mod_nss_load_pem_file()
506 memcpy(chain->certs[0].data, f.data, (chain->certs[0].len = f.len)); in mod_nss_load_pem_file()
512 for (char *e = (char *)f.data; (b = strstr(e, PEM_BEGIN_CERT)); ++i) { in mod_nss_load_pem_file()
523 for (char *e=(char *)f.data; (b=strstr(e,PEM_BEGIN_TRUSTED_CERT)); ++i){ in mod_nss_load_pem_file()
661 char *b = (char *)f.data; in mod_nss_load_config_crls()
688 for (char *e = (char *)f.data; (b = strstr(e,PEM_BEGIN_X509_CRL)); ++i){ in mod_nss_load_config_crls()
697 chain->certs[i].data = NULL; in mod_nss_load_config_crls()
761 if ((b = strstr((char *)f.data, PEM_BEGIN_PKEY)) in mod_nss_load_config_pkey()
764 else if ((b = strstr((char *)f.data, PEM_BEGIN_EC_PKEY)) in mod_nss_load_config_pkey()
767 else if ((b = strstr((char *)f.data, PEM_BEGIN_RSA_PKEY)) in mod_nss_load_config_pkey()
770 else if ((b = strstr((char *)f.data, PEM_BEGIN_DSA_PKEY)) in mod_nss_load_config_pkey()
773 else if ((b = strstr((char *)f.data, PEM_BEGIN_ANY_PKEY)) in mod_nss_load_config_pkey()
776 else if (NULL == strstr((char *)f.data, "-----")) { in mod_nss_load_config_pkey()
779 f.data = NULL; in mod_nss_load_config_pkey()
781 b = (char *)der.data; in mod_nss_load_config_pkey()
788 if (NULL == der.data in mod_nss_load_config_pkey()
796 *(const unsigned char **)&nickname.data = (unsigned char *)fn; in mod_nss_load_config_pkey()
813 if (der.data) { in mod_nss_load_config_pkey()
815 PORT_Free(der.data); in mod_nss_load_config_pkey()
861 PORT_Free(pc->OCSPResponse.data); in mod_nss_free_config()
1078 PORT_Free(pc->OCSPResponse.data); in mod_nss_reload_stapling_file()
1079 pc->OCSPResponse.data = f.data; in mod_nss_reload_stapling_file()
1197 pc->OCSPResponse.data = NULL; in network_nss_load_pemfile()
1280 SSLExtraServerCertData *data = NULL; in mod_nss_acme_tls_1() local
1283 data = &d; in mod_nss_acme_tls_1()
1289 SSL_ConfigServerCert(hctx->ssl, ssl_pemfile_x509, pkey, data, dlen); in mod_nss_acme_tls_1()
1362 && 0 == PORT_Memcmp(protos+i+1, alpn[j].data, alpn[j].len)) { in mod_nss_alpn_select_cb()
1392 memcpy(protoOut, alpn[j].data, alpn[j].len); in mod_nss_alpn_select_cb()
1418 "NSS: SNI name too long %.*s", (int)sn->len,(char *)sn->data); in mod_nss_SNI()
1423 buffer_copy_string_len_lc(&r->uri.authority,(const char *)sn->data,sn->len); in mod_nss_SNI()
1535 data_string *ds = (data_string *)s->ssl_conf_cmd->data[i]; in mod_nss_ssl_conf_cmd()
2189 char *data = local_send_buffer; in connection_write_cq_ssl() local
2195 if (0 != chunkqueue_peek_data(cq, &data, &data_len, errh)) return -1; in connection_write_cq_ssl()
2215 wr = PR_Write(ssl, data, (PRInt32)wr_len); in connection_write_cq_ssl()
2221 data += wr; in connection_write_cq_ssl()
2559 s = (char *)crt->serialNumber.data; in https_add_ssl_client_entries()