/third_party/rust/crates/nom/src/bytes/ |
H A D | streaming.rs | 39 let tag_len = tag.input_len(); in tag() 44 CompareResult::Incomplete => Err(Err::Incomplete(Needed::new(tag_len - i.input_len()))), in tag() 81 let tag_len = tag.input_len(); in tag_no_case() 86 CompareResult::Incomplete => Err(Err::Incomplete(Needed::new(tag_len - i.input_len()))), in tag_no_case() 302 let len = input.input_len(); in take_while_m_n() 548 while i.input_len() > 0 { in escaped() 549 let current_len = i.input_len(); in escaped() 553 if i2.input_len() == 0 { in escaped() 555 } else if i2.input_len() == current_len { in escaped() 563 // unwrap() should be safe here since index < $i.input_len() in escaped() [all...] |
H A D | complete.rs | 40 let tag_len = tag.input_len(); in tag() 82 let tag_len = tag.input_len(); in tag_no_case() 291 let len = input.input_len(); in take_while_m_n() 532 while i.input_len() > 0 { in escaped() 533 let current_len = i.input_len(); in escaped() 539 if i2.input_len() == 0 { in escaped() 540 return Ok((input.slice(input.input_len()..), input)); in escaped() 541 } else if i2.input_len() == current_len { in escaped() 549 // unwrap() should be safe here since index < $i.input_len() in escaped() 552 if next >= i.input_len() { in escaped() [all...] |
/third_party/rust/crates/nom/src/multi/ |
H A D | mod.rs | 62 let len = i.input_len(); in many0() 68 if i1.input_len() == len { in many0() 123 let len = i.input_len(); in many1() 129 if i1.input_len() == len { in many1() 178 let len = i.input_len(); in many_till() 187 if i1.input_len() == len { in many_till() 251 let len = i.input_len(); in separated_list0() 257 if i1.input_len() == len { in separated_list0() 325 let len = i.input_len(); in separated_list1() 331 if i1.input_len() in separated_list1() [all...] |
/third_party/rust/crates/nom/src/ |
H A D | traits.rs | 21 fn input_len(&self) -> usize; in input_len() functions 26 fn input_len(&self) -> usize { in input_len() functions 33 fn input_len(&self) -> usize { in input_len() functions 40 fn input_len(&self) -> usize { in input_len() functions 536 Err(Err::Incomplete(_)) => Ok(self.take_split(self.input_len())), in split_at_position_complete() 551 if self.input_len() == 0 { in split_at_position1_complete() 554 Ok(self.take_split(self.input_len())) in split_at_position1_complete() 599 None => Ok(self.take_split(self.input_len())), in split_at_position_complete() 618 Ok(self.take_split(self.input_len())) in split_at_position1_complete() 801 if self.input_len() > in compare() 1055 fn input_len(&self) -> usize { input_len() functions 1062 fn input_len(&self) -> usize { input_len() functions [all...] |
/third_party/skia/third_party/externals/abseil-cpp/absl/strings/internal/ |
H A D | escaping.cc | 27 size_t CalculateBase64EscapedLenInternal(size_t input_len, bool do_padding) { in CalculateBase64EscapedLenInternal() argument 42 size_t len = (input_len / 3) * 4; in CalculateBase64EscapedLenInternal() 44 if (input_len % 3 == 0) { in CalculateBase64EscapedLenInternal() 49 } else if (input_len % 3 == 1) { in CalculateBase64EscapedLenInternal() 58 } else { // (input_len % 3 == 2) in CalculateBase64EscapedLenInternal() 69 assert(len >= input_len); // make sure we didn't overflow in CalculateBase64EscapedLenInternal()
|
H A D | escaping.h | 30 size_t CalculateBase64EscapedLenInternal(size_t input_len, bool do_padding);
|
/third_party/node/deps/uvwasi/src/ |
H A D | path_resolver.c | 377 uvwasi_size_t input_len; in uvwasi__resolve_path() local 384 input_len = path_len; in uvwasi__resolve_path() 393 if (1 == uvwasi__is_absolute_path(input, input_len)) { in uvwasi__resolve_path() 397 input_len, in uvwasi__resolve_path() 404 input_len, in uvwasi__resolve_path() 461 input_len = strlen(req.ptr); in uvwasi__resolve_path() 463 link_target = uvwasi__malloc(uvwasi, input_len + 1); in uvwasi__resolve_path() 470 memcpy(link_target, req.ptr, input_len + 1); in uvwasi__resolve_path()
|
/third_party/mbedtls/library/ |
H A D | psa_crypto_invasive.h | 76 psa_status_t psa_crypto_copy_input(const uint8_t *input, size_t input_len, 85 extern void (*psa_input_pre_copy_hook)(const uint8_t *input, size_t input_len); 86 extern void (*psa_input_post_copy_hook)(const uint8_t *input, size_t input_len);
|
H A D | cipher.c | 841 static int get_pkcs_padding(unsigned char *input, size_t input_len, in get_pkcs_padding() argument 851 padding_len = input[input_len - 1]; in get_pkcs_padding() 852 *data_len = input_len - padding_len; in get_pkcs_padding() 854 mbedtls_ct_condition_t bad = mbedtls_ct_uint_gt(padding_len, input_len); in get_pkcs_padding() 858 * so pick input_len, which is usually 8 or 16 (one block) */ in get_pkcs_padding() 859 pad_idx = input_len - padding_len; in get_pkcs_padding() 860 for (i = 0; i < input_len; i++) { in get_pkcs_padding() 886 static int get_one_and_zeros_padding(unsigned char *input, size_t input_len, in get_one_and_zeros_padding() argument 898 for (ptrdiff_t i = (ptrdiff_t) (input_len) - 1; i >= 0; i--) { in get_one_and_zeros_padding() 930 static int get_zeros_and_len_padding(unsigned char *input, size_t input_len, in get_zeros_and_len_padding() argument 971 get_zeros_padding(unsigned char *input, size_t input_len, size_t *data_len) get_zeros_padding() argument 998 get_no_padding(unsigned char *input, size_t input_len, size_t *data_len) get_no_padding() argument [all...] |
H A D | ccm.c | 359 const unsigned char *input, size_t input_len, in mbedtls_ccm_update() 379 if (ctx->tag_len != 0 && ctx->processed + input_len > ctx->plaintext_len) { in mbedtls_ccm_update() 383 if (output_size < input_len) { in mbedtls_ccm_update() 386 *output_len = input_len; in mbedtls_ccm_update() 390 while (input_len > 0) { in mbedtls_ccm_update() 395 if (use_len > input_len) { in mbedtls_ccm_update() 396 use_len = input_len; in mbedtls_ccm_update() 461 input_len -= use_len; in mbedtls_ccm_update() 358 mbedtls_ccm_update(mbedtls_ccm_context *ctx, const unsigned char *input, size_t input_len, unsigned char *output, size_t output_size, size_t *output_len) mbedtls_ccm_update() argument
|
H A D | pem.c | 244 static int pem_check_pkcs_padding(unsigned char *input, size_t input_len, size_t *data_len) in pem_check_pkcs_padding() argument 246 /* input_len > 0 is guaranteed by mbedtls_pem_read_buffer(). */ in pem_check_pkcs_padding() 247 size_t pad_len = input[input_len - 1]; in pem_check_pkcs_padding() 250 if (pad_len > input_len) { in pem_check_pkcs_padding() 254 *data_len = input_len - pad_len; in pem_check_pkcs_padding() 256 for (i = *data_len; i < input_len; i++) { in pem_check_pkcs_padding()
|
H A D | ssl_tls13_keys.h | 448 * a readable buffer whose size \p input_len Bytes. 450 * \param input_len The length of \p input in Bytes. 465 const unsigned char *input, size_t input_len,
|
/third_party/rust/crates/nom/src/number/ |
H A D | streaming.rs | 35 if input.input_len() < bound { in be_u8() 65 if input.input_len() < bound { in be_u16() 66 Err(Err::Incomplete(Needed::new(bound - input.input_len()))) in be_u16() 98 if input.input_len() < bound { in be_u24() 99 Err(Err::Incomplete(Needed::new(bound - input.input_len()))) in be_u24() 131 if input.input_len() < bound { in be_u32() 132 Err(Err::Incomplete(Needed::new(bound - input.input_len()))) in be_u32() 164 if input.input_len() < bound { in be_u64() 165 Err(Err::Incomplete(Needed::new(bound - input.input_len()))) in be_u64() 196 if input.input_len() < boun in be_u128() [all...] |
H A D | complete.rs | 37 if input.input_len() < bound { in be_u8() 67 if input.input_len() < bound { in be_u16() 100 if input.input_len() < bound { in be_u24() 133 if input.input_len() < bound { in be_u32() 166 if input.input_len() < bound { in be_u64() 199 if input.input_len() < bound { in be_u128() 379 if input.input_len() < bound { in le_u8() 409 if input.input_len() < bound { in le_u16() 442 if input.input_len() < bound { in le_u24() 475 if input.input_len() < boun in le_u32() [all...] |
/third_party/skia/third_party/externals/libpng/ |
H A D | pngwutil.c | 472 png_alloc_size_t input_len; /* Its length */ member 479 png_alloc_size_t input_len) in png_text_compress_init() 482 comp->input_len = input_len; in png_text_compress_init() 503 ret = png_deflate_claim(png_ptr, chunk_name, comp->input_len); in png_text_compress() 516 png_alloc_size_t input_len = comp->input_len; /* may be zero! */ in png_text_compress() local 531 if (avail_in > input_len) in png_text_compress() 532 avail_in = (uInt)input_len; in png_text_compress() 534 input_len in png_text_compress() 478 png_text_compress_init(compression_state *comp, png_const_bytep input, png_alloc_size_t input_len) png_text_compress_init() argument 931 png_compress_IDAT(png_structrp png_ptr, png_const_bytep input, png_alloc_size_t input_len, int flush) png_compress_IDAT() argument [all...] |
/third_party/skia/third_party/externals/freetype/src/gzip/ |
H A D | ftgzip.c | 731 FT_ULong input_len ) in FT_EXPORT_DEF() 745 stream.avail_in = (uInt)input_len; in FT_EXPORT_DEF() 813 FT_ULong input_len ) in FT_EXPORT_DEF() 819 FT_UNUSED( input_len ); in FT_EXPORT_DEF()
|
/third_party/openssl/test/ |
H A D | evp_test.c | 231 * Return an allocated buffer, set |out_len|. If |input_len| 234 static unsigned char* unescape(const char *input, size_t input_len, in unescape() argument 240 if (input_len == 0) { in unescape() 246 if (!TEST_ptr(ret = p = OPENSSL_malloc(input_len))) in unescape() 249 for (i = 0; i < input_len; i++) { in unescape() 251 if (i == input_len - 1 || *++input != 'n') { in unescape() 1124 size_t input_len; member 1244 return parse_bin(value, &mdata->input, &mdata->input_len); in mac_test_parse() 1376 if (!EVP_DigestSignUpdate(mctx, expected->input, expected->input_len)) { in mac_test_run_pkey() 1544 if (!EVP_MAC_update(ctx, expected->input, expected->input_len)) { in mac_test_run_mac() 1669 size_t input_len; global() member 2252 size_t input_len; global() member [all...] |
/third_party/skia/third_party/externals/freetype/include/freetype/ |
H A D | ftgzip.h | 111 * input_len :: 141 FT_ULong input_len );
|
/third_party/mbedtls/tests/src/test_helpers/ |
H A D | ssl_helpers.c | 138 const unsigned char *input, size_t input_len) in mbedtls_test_ssl_buffer_put() 146 /* Reduce input_len to a number that fits in the buffer. */ in mbedtls_test_ssl_buffer_put() 147 if ((buf->content_length + input_len) > buf->capacity) { in mbedtls_test_ssl_buffer_put() 148 input_len = buf->capacity - buf->content_length; in mbedtls_test_ssl_buffer_put() 152 return (input_len == 0) ? 0 : -1; in mbedtls_test_ssl_buffer_put() 161 if (buf->start + buf->content_length + input_len in mbedtls_test_ssl_buffer_put() 163 overflow = (buf->start + buf->content_length + input_len) in mbedtls_test_ssl_buffer_put() 168 input_len - overflow); in mbedtls_test_ssl_buffer_put() 169 memcpy(buf->buffer, input + input_len - overflow, overflow); in mbedtls_test_ssl_buffer_put() 174 input, input_len); in mbedtls_test_ssl_buffer_put() 137 mbedtls_test_ssl_buffer_put(mbedtls_test_ssl_buffer *buf, const unsigned char *input, size_t input_len) mbedtls_test_ssl_buffer_put() argument [all...] |
/third_party/rust/crates/nom/src/combinator/ |
H A D | mod.rs | 36 Ok((input.slice(input.input_len()..), input)) in rest() 52 let len = input.input_len(); in rest_len() 334 if input.input_len() == 0 { in eof() 391 if input.input_len() == 0 { in all_consuming()
|
/third_party/mbedtls/programs/ssl/ |
H A D | ssl_server2.c | 1137 size_t input_len; member 1157 size_t input_len) in ssl_async_start() 1197 if (input_len > SSL_ASYNC_INPUT_MAX_SIZE) { in ssl_async_start() 1208 memcpy(ctx->input, input, input_len); in ssl_async_start() 1209 ctx->input_len = input_len; in ssl_async_start() 1234 size_t input_len) in ssl_async_decrypt() 1238 input, input_len); in ssl_async_decrypt() 1263 ctx->input, ctx->input_len, in ssl_async_resume() 1270 ctx->input, ctx->input_len, in ssl_async_resume() 1152 ssl_async_start(mbedtls_ssl_context *ssl, mbedtls_x509_crt *cert, ssl_async_operation_type_t op_type, mbedtls_md_type_t md_alg, const unsigned char *input, size_t input_len) ssl_async_start() argument 1231 ssl_async_decrypt(mbedtls_ssl_context *ssl, mbedtls_x509_crt *cert, const unsigned char *input, size_t input_len) ssl_async_decrypt() argument [all...] |
/third_party/mbedtls/include/mbedtls/ |
H A D | ccm.h | 418 * mbedtls_ccm_finish(). The lengths \p input_len of the 441 * \p output_size >= \p input_len + 15. 442 * - If \p input_len is a multiple of 16 for all the calls 445 * =\p input_len. 453 * \param input The buffer holding the input data. If \p input_len 455 * of at least \p input_len bytes. 456 * \param input_len The length of the input data in bytes. 474 const unsigned char *input, size_t input_len,
|
/third_party/rust/crates/nom/src/character/ |
H A D | complete.rs | 189 None => Ok((input.slice(input.input_len()..), input)), in not_line_ending() 318 None => Ok((input.slice(input.input_len()..), c.as_char())), in anychar() 741 if i.input_len() == 0 { 780 Ok((i.slice(i.input_len()..), value)) 802 if i.input_len() == 0 { 823 Ok((i.slice(i.input_len()..), value))
|
/third_party/protobuf/src/google/protobuf/stubs/ |
H A D | strutil.cc | 1646 int CalculateBase64EscapedLen(int input_len, bool do_padding) { in CalculateBase64EscapedLen() argument 1662 int len = (input_len / 3) * 4; in CalculateBase64EscapedLen() 1664 if (input_len % 3 == 0) { in CalculateBase64EscapedLen() 1669 } else if (input_len % 3 == 1) { in CalculateBase64EscapedLen() 1678 } else { // (input_len % 3 == 2) in CalculateBase64EscapedLen() 1689 assert(len >= input_len); // make sure we didn't overflow in CalculateBase64EscapedLen() 1694 int CalculateBase64EscapedLen(int input_len) { in CalculateBase64EscapedLen() argument 1695 return CalculateBase64EscapedLen(input_len, true); in CalculateBase64EscapedLen()
|
/third_party/rust/crates/rust-cexpr/src/ |
H A D | literal.rs | 102 if i.input_len() == 0 { in full()
|