Lines Matching defs:in
99 * code. Integers in the range 0..255 are also accepted.
212 * The cryptographic data in a DNSSEC key is malformed.
221 * A DNSSEC verification failed because fields in the DNSKEY and RRSIG records
323 readBigInteger(DNSInput in, int len) throws IOException {
324 byte [] b = in.readByteArray(len);
329 readBigInteger(DNSInput in) {
330 byte [] b = in.readByteArray();
345 DNSInput in = new DNSInput(r.getKey());
346 int exponentLength = in.readU8();
348 exponentLength = in.readU16();
349 BigInteger exponent = readBigInteger(in, exponentLength);
350 BigInteger modulus = readBigInteger(in);
360 DNSInput in = new DNSInput(r.getKey());
362 int t = in.readU8();
366 BigInteger q = readBigInteger(in, 20);
367 BigInteger p = readBigInteger(in, 64 + t*8);
368 BigInteger g = readBigInteger(in, 64 + t*8);
369 BigInteger y = readBigInteger(in, 64 + t*8);
418 DNSInput in = new DNSInput(r.getKey());
421 BigInteger x = readBigInteger(in, keyinfo.length);
422 BigInteger y = readBigInteger(in, keyinfo.length);
578 DNSInput in = new DNSInput(dns);
581 int t = in.readU8();
583 byte [] r = in.readByteArray(DSA_LEN);
588 byte [] s = in.readByteArray(DSA_LEN);
613 DNSInput in = new DNSInput(signature);
618 int tmp = in.readU8();
621 int seqlen = in.readU8();
623 tmp = in.readU8();
626 int rlen = in.readU8();
628 if (in.readU8() != 0)
632 byte [] bytes = in.readByteArray(DSA_LEN);
635 tmp = in.readU8();
638 int slen = in.readU8();
640 if (in.readU8() != 0)
644 bytes = in.readByteArray(DSA_LEN);
657 DNSInput in = new DNSInput(signature);
660 byte [] r = in.readByteArray(keyinfo.length);
665 byte [] s = in.readByteArray(keyinfo.length);
690 DNSInput in = new DNSInput(signature);
693 int tmp = in.readU8();
696 int seqlen = in.readU8();
698 tmp = in.readU8();
701 int rlen = in.readU8();
703 if (in.readU8() != 0)
707 byte[] bytes = in.readByteArray(keyinfo.length);
710 tmp = in.readU8();
713 int slen = in.readU8();
715 if (in.readU8() != 0)
719 bytes = in.readByteArray(keyinfo.length);