/dports/lang/spidermonkey60/firefox-60.9.0/security/manager/ssl/ |
H A D | ScopedNSSTypes.h | 182 inline void SECITEM_AllocItem(SECItem& item, uint32_t len) { in SECITEM_AllocItem() function 183 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) { in SECITEM_AllocItem() 186 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) in SECITEM_AllocItem() 200 SECITEM_AllocItem(*this, initialAllocatedLen);
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/manager/ssl/ |
H A D | ScopedNSSTypes.h | 187 inline void SECITEM_AllocItem(SECItem& item, uint32_t len) { in SECITEM_AllocItem() function 188 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) { in SECITEM_AllocItem() 191 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) in SECITEM_AllocItem() 205 SECITEM_AllocItem(*this, initialAllocatedLen);
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/freebl_gtest/ |
H A D | ecl_unittest.cc | 56 if (SECITEM_AllocItem(nullptr, params, (2 + oidData->oid.len)) == nullptr) { in ecName2params() 68 ScopedSECItem ecEncodedParams(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive() 86 ScopedSECItem derived_secret(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive()
|
/dports/security/ca_root_nss/nss-3.71/nss/gtests/freebl_gtest/ |
H A D | ecl_unittest.cc | 56 if (SECITEM_AllocItem(nullptr, params, (2 + oidData->oid.len)) == nullptr) { in ecName2params() 68 ScopedSECItem ecEncodedParams(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive() 86 ScopedSECItem derived_secret(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive()
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/freebl_gtest/ |
H A D | ecl_unittest.cc | 56 if (SECITEM_AllocItem(nullptr, params, (2 + oidData->oid.len)) == nullptr) { in ecName2params() 68 ScopedSECItem ecEncodedParams(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive() 86 ScopedSECItem derived_secret(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive()
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/gtests/freebl_gtest/ |
H A D | ecl_unittest.cc | 56 if (SECITEM_AllocItem(nullptr, params, (2 + oidData->oid.len)) == nullptr) { in ecName2params() 68 ScopedSECItem ecEncodedParams(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive() 86 ScopedSECItem derived_secret(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive()
|
/dports/security/nss/nss-3.76.1/nss/gtests/freebl_gtest/ |
H A D | ecl_unittest.cc | 56 if (SECITEM_AllocItem(nullptr, params, (2 + oidData->oid.len)) == nullptr) { in ecName2params() 68 ScopedSECItem ecEncodedParams(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive() 86 ScopedSECItem derived_secret(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive()
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/freebl_gtest/ |
H A D | ecl_unittest.cc | 56 if (SECITEM_AllocItem(nullptr, params, (2 + oidData->oid.len)) == nullptr) { in ecName2params() 68 ScopedSECItem ecEncodedParams(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive() 86 ScopedSECItem derived_secret(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive()
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/gtests/freebl_gtest/ |
H A D | ecl_unittest.cc | 56 if (SECITEM_AllocItem(nullptr, params, (2 + oidData->oid.len)) == nullptr) { in ecName2params() 68 ScopedSECItem ecEncodedParams(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive() 86 ScopedSECItem derived_secret(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TestECDH_Derive()
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/manager/ssl/ |
H A D | ScopedNSSTypes.h | 233 SECITEM_AllocItem(SECItem & item, uint32_t len) in MOZ_TYPE_SPECIFIC_SCOPED_POINTER_TEMPLATE() 235 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) { in MOZ_TYPE_SPECIFIC_SCOPED_POINTER_TEMPLATE() 238 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) in MOZ_TYPE_SPECIFIC_SCOPED_POINTER_TEMPLATE() 254 SECITEM_AllocItem(*this, initialAllocatedLen);
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/gtests/der_gtest/ |
H A D | der_quickder_unittest.cc | 65 ScopedSECItem copy_of_input(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TEST_P() 72 ScopedSECItem parsed_value(SECITEM_AllocItem(nullptr, nullptr, 0U)); in TEST_P()
|
/dports/www/firefox-esr/firefox-91.8.0/security/manager/ssl/ |
H A D | ScopedNSSTypes.h | 220 inline void SECITEM_AllocItem(SECItem& item, uint32_t len) { in SECITEM_AllocItem() function 221 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) { in SECITEM_AllocItem() 224 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) in SECITEM_AllocItem() 238 SECITEM_AllocItem(*this, initialAllocatedLen);
|
/dports/www/firefox/firefox-99.0/security/manager/ssl/ |
H A D | ScopedNSSTypes.h | 220 inline void SECITEM_AllocItem(SECItem& item, uint32_t len) { in SECITEM_AllocItem() function 221 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) { in SECITEM_AllocItem() 224 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) in SECITEM_AllocItem() 238 SECITEM_AllocItem(*this, initialAllocatedLen);
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/manager/ssl/ |
H A D | ScopedNSSTypes.h | 220 inline void SECITEM_AllocItem(SECItem& item, uint32_t len) { in SECITEM_AllocItem() function 221 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) { in SECITEM_AllocItem() 224 if (MOZ_UNLIKELY(!SECITEM_AllocItem(nullptr, &item, len))) in SECITEM_AllocItem() 238 SECITEM_AllocItem(*this, initialAllocatedLen);
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/security/ca_root_nss/nss-3.71/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/www/firefox/firefox-99.0/security/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/security/nss/nss-3.76.1/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/certhigh/ |
H A D | ocspsig.c | 54 cs->certStatusInfo.goodInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 59 cs->certStatusInfo.unknownInfo = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 69 SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateCertStatus() 281 sr->nextUpdate = SECITEM_AllocItem(arena, NULL, 0); in ocsp_CreateSingleResponse() 457 if (!SECITEM_AllocItem(NULL, &br->responseSignature.signature, 1)) in CERT_CreateEncodedOCSPSuccessResponse()
|
/dports/archivers/rpm4/rpm-4.16.1.3/rpmio/ |
H A D | digest_nss.c | 257 if ((item=SECITEM_AllocItem(arena, item, nbytes)) == NULL) 321 sig = pgpsig->data = SECITEM_AllocItem(NULL, NULL, siglen); 329 SECItem *signew = SECITEM_AllocItem(NULL, NULL, 0); 442 padded = SECITEM_AllocItem(NULL, NULL, siglen);
|
/dports/www/firefox-legacy/firefox-52.8.0esr/dom/wifi/ |
H A D | WifiCertService.cpp | 109 SECItem* newNick = ::SECITEM_AllocItem(nullptr, nullptr, dummyNameLen + 1); in HandleNicknameCollision() 148 SECItem* newNick = ::SECITEM_AllocItem(nullptr, nullptr, length + 1); in HandleNicknameUpdate() 170 ::SECITEM_AllocItem(nullptr, nullptr, length * sizeof(nsString::char_type))); in ImportPKCS12Blob()
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/pk11wrap/ |
H A D | pk11hpke.c | 300 serializedCx = SECITEM_AllocItem(NULL, NULL, allocLen); in PK11_HPKE_ExportContext() 530 CHECK_FAIL(!SECITEM_AllocItem(pubKey->arena, &pubKey->u.ec.DEREncodedParams, in PK11_HPKE_Deserialize() 623 out = SECITEM_AllocItem(NULL, NULL, prefixLen + labelLen + suiteId->len + (ikm ? ikm->len : 0)); in pk11_hpke_MakeExtractLabel() 764 labeledInfoItem = SECITEM_AllocItem(NULL, NULL, len); in pk11_hpke_LabeledExpand() 877 cx->encapPubKey = SECITEM_AllocItem(NULL, NULL, tmpLen); in pk11_hpke_Encap() 886 kemContext = SECITEM_AllocItem(NULL, NULL, cx->encapPubKey->len + tmpLen); in pk11_hpke_Encap() 973 kemContext = SECITEM_AllocItem(NULL, NULL, encS->len + tmpLen); in pk11_hpke_Decap() 1039 CHECK_FAIL(!SECITEM_AllocItem(NULL, &contextItem, len)); in pk11_hpke_KeySchedule() 1182 ct = SECITEM_AllocItem(NULL, NULL, maxOut); in PK11_HPKE_Seal() 1253 pt = SECITEM_AllocItem(NULL, NULL, ct->len); in PK11_HPKE_Open()
|