config root man

Current Path : /usr/local/include/sasl1/

FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64
Upload File :
Current File : //usr/local/include/sasl1/saslutil.h

/* saslutil.h -- various utility functions in SASL library
 */
/*234567890123456789012345678901234567890123456789012345678901234567890123456*/

#ifndef SASLUTIL_H
#define SASLUTIL_H 1

#include "sasl.h"

/* base64 decode
 *  in     -- input data
 *  inlen  -- length of input data
 *  out    -- output data (may be same as in, must have enough space)
 * result:
 *  outlen -- actual output length
 *
 * returns SASL_BADPROT on bad base64, SASL_OK on success
 */
LIBSASL_API int sasl_decode64(const char *in, unsigned inlen,
			      char *out, unsigned *outlen);

/* base64 encode
 *  in      -- input data
 *  inlen   -- input data length
 *  out     -- output buffer (will be NUL terminated)
 *  outmax  -- max size of output buffer
 * result:
 *  outlen  -- gets actual length of output buffer (optional)
 * 
 * Returns SASL_OK on success, SASL_BUFOVER if result won't fit
 */
LIBSASL_API int sasl_encode64(const char *in, unsigned inlen,
			      char *out, unsigned outmax, unsigned *outlen);

/* make a challenge string (NUL terminated)
 *  buf      -- buffer for result
 *  maxlen   -- max length of result
 *  hostflag -- 0 = don't include hostname, 1 = include hostname
 * returns final length or 0 if not enough space
 */
LIBSASL_API int sasl_mkchal(sasl_conn_t *conn, char *buf,
			    unsigned maxlen, int hostflag);

/* verify a string is valid UTF-8
 *  if len == 0, strlen(str) will be used.
 * returns SASL_BADPROT on error, SASL_OK on success
 */
LIBSASL_API int sasl_utf8verify(const char *str, unsigned len);

/* create random pool seeded with OS-based params
 */
LIBSASL_API int sasl_randcreate(sasl_rand_t **rpool);

/* free random pool from randcreate
 */
LIBSASL_API void sasl_randfree(sasl_rand_t **rpool);

/* seed random number generator
 */
LIBSASL_API void sasl_randseed(sasl_rand_t *rpool,
			       const char *seed,
			       unsigned len);

/* generate "random" octets. in reality, these should ONLY be used for
 * nonces, where it's important that a nonce be unique (with high
 * probability) but not necessary cryptographically random. 
 *
 * an interesting thing to think about is forking, causing the pool to be
 * reused. */
LIBSASL_API void sasl_rand(sasl_rand_t *rpool,
			   char *buf,
			   unsigned len);

/* churn data into random number generator
 */
LIBSASL_API void sasl_churn(sasl_rand_t *rpool, 
			    const char *data,
			    unsigned len);
#ifdef WIN32
LIBSASL_API int getopt(int argc, char **argv, char *optstring);
LIBSASL_API char * getpass(const char *prompt);
#endif /* WIN32 */

#endif /* SASLUTIL_H */

Man Man