Home
last modified time | relevance | path

Searched refs:nlen (Results 1 - 25 of 114) sorted by relevance

12345

/third_party/curl/src/
H A Dvar.c71 const char *name, size_t nlen) in varcontent()
75 if((strlen(list->name) == nlen) && in varcontent()
76 !strncmp(name, list->name, nlen)) { in varcontent()
237 size_t nlen; in varexpand() local
255 nlen = funcp - envp; in varexpand()
257 nlen = clp - envp; in varexpand()
258 if(!nlen || (nlen >= sizeof(name))) { in varexpand()
272 memcpy(name, envp, nlen); in varexpand()
273 name[nlen] in varexpand()
70 varcontent(struct GlobalConfig *global, const char *name, size_t nlen) varcontent() argument
349 addvariable(struct GlobalConfig *global, const char *name, size_t nlen, const char *content, size_t clen, bool contalloc) addvariable() argument
388 size_t nlen; setvariable() local
[all...]
/third_party/rust/crates/memchr/src/memmem/
H A Dtwoway.rs317 let nlen = needle.len(); in rfind_small_imp()
319 let mut shift = nlen; in rfind_small_imp()
320 while pos >= nlen { in rfind_small_imp()
321 if !self.0.byteset.contains(haystack[pos - nlen]) { in rfind_small_imp()
322 pos -= nlen; in rfind_small_imp()
323 shift = nlen; in rfind_small_imp()
327 while i > 0 && needle[i - 1] == haystack[pos - nlen + i - 1] { in rfind_small_imp()
330 if i > 0 || needle[0] != haystack[pos - nlen] { in rfind_small_imp()
332 shift = nlen; in rfind_small_imp()
335 while j < shift && needle[j] == haystack[pos - nlen in rfind_small_imp()
[all...]
/third_party/node/deps/openssl/openssl/providers/implementations/kem/
H A Drsa_kem.c249 size_t nlen; in rsasve_generate() local
251 /* Step (1): nlen = Ceil(len(n)/8) */ in rsasve_generate()
252 nlen = RSA_size(prsactx->rsa); in rsasve_generate()
255 if (nlen == 0) { in rsasve_generate()
262 *outlen = nlen; in rsasve_generate()
264 *secretlen = nlen; in rsasve_generate()
268 * Step (2): Generate a random byte string z of nlen bytes where in rsasve_generate()
271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate()
275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate()
279 *outlen = nlen; in rsasve_generate()
296 size_t nlen; rsasve_recover() local
[all...]
/third_party/openssl/providers/implementations/kem/
H A Drsa_kem.c249 size_t nlen; in rsasve_generate() local
251 /* Step (1): nlen = Ceil(len(n)/8) */ in rsasve_generate()
252 nlen = RSA_size(prsactx->rsa); in rsasve_generate()
255 if (nlen == 0) { in rsasve_generate()
262 *outlen = nlen; in rsasve_generate()
264 *secretlen = nlen; in rsasve_generate()
268 * Step (2): Generate a random byte string z of nlen bytes where in rsasve_generate()
271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate()
275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate()
279 *outlen = nlen; in rsasve_generate()
296 size_t nlen; rsasve_recover() local
[all...]
/third_party/icu/icu4c/as_is/os400/
H A Diculd.c125 int nlen = n-2; in main() local
127 if(nlen >= 10) { in main()
128 nlen = 10; in main()
142 nlen=strlen(b); in main()
152 strncat(objs,b,nlen); in main()
159 int nlen = n-2; in main() local
161 if(nlen >= 10) { in main()
162 nlen = 10; in main()
176 nlen=strlen(b); in main()
186 strncat(bnddirs,b,nlen); in main()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
H A Dext_password_test.c48 size_t nlen; in ext_password_test_get() local
55 nlen = os_strlen(name); in ext_password_test_get()
58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { in ext_password_test_get()
60 pos += nlen + 1; in ext_password_test_get()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
H A Dext_password_test.c48 size_t nlen; in ext_password_test_get() local
55 nlen = os_strlen(name); in ext_password_test_get()
58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { in ext_password_test_get()
60 pos += nlen + 1; in ext_password_test_get()
/third_party/toybox/toys/posix/
H A Dcpio.c225 unsigned nlen, error = 0, zero = 0; in cpio_main() local
232 nlen = len+1; in cpio_main()
248 nlen, 0); in cpio_main()
250 xwrite(afd, name, nlen); in cpio_main()
253 llen = (llen + nlen) & 3; in cpio_main()
263 nlen = llen > sizeof(toybuf) ? sizeof(toybuf) : llen; in cpio_main()
264 llen -= nlen; in cpio_main()
266 if (nlen != readall(fd, toybuf, nlen)) in cpio_main()
268 xwrite(afd, toybuf, nlen); in cpio_main()
[all...]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/
H A Deap_ikev2_common.c24 size_t nlen; in eap_ikev2_derive_keymat() local
30 nlen = i_nonce_len + r_nonce_len; in eap_ikev2_derive_keymat()
31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/
H A Dbgscan.c32 size_t nlen; in bgscan_init() local
41 nlen = os_strlen(name); in bgscan_init()
43 nlen = params - name; in bgscan_init()
48 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) { in bgscan_init()
H A Dautoscan.c44 size_t nlen; in autoscan_init() local
67 nlen = os_strlen(name); in autoscan_init()
69 nlen = params - name; in autoscan_init()
74 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) { in autoscan_init()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/
H A Deap_ikev2_common.c24 size_t nlen; in eap_ikev2_derive_keymat() local
30 nlen = i_nonce_len + r_nonce_len; in eap_ikev2_derive_keymat()
31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat()
37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/
H A Dbgscan.c32 size_t nlen; in bgscan_init() local
41 nlen = os_strlen(name); in bgscan_init()
43 nlen = params - name; in bgscan_init()
48 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) { in bgscan_init()
H A Dautoscan.c44 size_t nlen; in autoscan_init() local
67 nlen = os_strlen(name); in autoscan_init()
69 nlen = params - name; in autoscan_init()
74 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) { in autoscan_init()
/third_party/lwip/src/netif/ppp/
H A Dchap-new.c258 int clen = 1, nlen, len; in chap_generate_challenge() local
266 nlen = strlen(pcb->chap_server.name); in chap_generate_challenge()
267 memcpy(p + 1 + clen, pcb->chap_server.name, nlen); in chap_generate_challenge()
269 len = CHAP_HDRLEN + 1 + clen + nlen; in chap_generate_challenge()
437 int clen, nlen; local
457 nlen = len - (clen + 1);
460 ppp_slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1);
483 nlen = strlen(pcb->chap_client.name);
484 memcpy(outp + clen + 1, pcb->chap_client.name, nlen);
487 len = CHAP_HDRLEN + clen + 1 + nlen;
596 int clen, nlen; global() local
[all...]
/third_party/node/deps/openssl/openssl/crypto/bn/
H A Dbn_rsa_fips186_4.c148 * nlen The bit length of the modulus (the key size).
157 const BIGNUM *Xp2, int nlen, in ossl_bn_rsa_fips186_4_gen_prob_primes()
177 bitlen = bn_rsa_fips186_5_aux_prime_min_size(nlen); in ossl_bn_rsa_fips186_4_gen_prob_primes()
202 bn_rsa_fips186_5_aux_prime_max_sum_size_for_prob_primes(nlen)) in ossl_bn_rsa_fips186_4_gen_prob_primes()
205 if (!ossl_bn_rsa_fips186_4_derive_prime(p, Xpout, Xp, p1i, p2i, nlen, e, in ossl_bn_rsa_fips186_4_gen_prob_primes()
236 * nlen The desired length of n (the RSA modulus).
246 int nlen, const BIGNUM *e, BN_CTX *ctx, in ossl_bn_rsa_fips186_4_derive_prime()
251 int bits = nlen >> 1; in ossl_bn_rsa_fips186_4_derive_prime()
272 * 1/sqrt(2) * 2^(nlen/2) <= X < 2^(nlen/ in ossl_bn_rsa_fips186_4_derive_prime()
154 ossl_bn_rsa_fips186_4_gen_prob_primes(BIGNUM *p, BIGNUM *Xpout, BIGNUM *p1, BIGNUM *p2, const BIGNUM *Xp, const BIGNUM *Xp1, const BIGNUM *Xp2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_gen_prob_primes() argument
244 ossl_bn_rsa_fips186_4_derive_prime(BIGNUM *Y, BIGNUM *X, const BIGNUM *Xin, const BIGNUM *r1, const BIGNUM *r2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_derive_prime() argument
[all...]
/third_party/openssl/crypto/bn/
H A Dbn_rsa_fips186_4.c148 * nlen The bit length of the modulus (the key size).
157 const BIGNUM *Xp2, int nlen, in ossl_bn_rsa_fips186_4_gen_prob_primes()
177 bitlen = bn_rsa_fips186_5_aux_prime_min_size(nlen); in ossl_bn_rsa_fips186_4_gen_prob_primes()
202 bn_rsa_fips186_5_aux_prime_max_sum_size_for_prob_primes(nlen)) in ossl_bn_rsa_fips186_4_gen_prob_primes()
205 if (!ossl_bn_rsa_fips186_4_derive_prime(p, Xpout, Xp, p1i, p2i, nlen, e, in ossl_bn_rsa_fips186_4_gen_prob_primes()
236 * nlen The desired length of n (the RSA modulus).
246 int nlen, const BIGNUM *e, BN_CTX *ctx, in ossl_bn_rsa_fips186_4_derive_prime()
251 int bits = nlen >> 1; in ossl_bn_rsa_fips186_4_derive_prime()
272 * 1/sqrt(2) * 2^(nlen/2) <= X < 2^(nlen/ in ossl_bn_rsa_fips186_4_derive_prime()
154 ossl_bn_rsa_fips186_4_gen_prob_primes(BIGNUM *p, BIGNUM *Xpout, BIGNUM *p1, BIGNUM *p2, const BIGNUM *Xp, const BIGNUM *Xp1, const BIGNUM *Xp2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_gen_prob_primes() argument
244 ossl_bn_rsa_fips186_4_derive_prime(BIGNUM *Y, BIGNUM *X, const BIGNUM *Xin, const BIGNUM *r1, const BIGNUM *r2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_derive_prime() argument
[all...]
/third_party/musl/src/network/
H A Ddn_comp.c37 const char *end, const unsigned char *lens, int nlen) in match()
44 l = lens[--nlen]; in match()
51 if (nlen) m++; in match()
52 if (!nlen || !noff) return m; in match()
36 match(int *offset, const unsigned char *base, const unsigned char *dn, const char *end, const unsigned char *lens, int nlen) match() argument
/third_party/ltp/testcases/kernel/syscalls/sysctl/
H A Dsysctl04.c9 * 1) Call sysctl(2) with nlen set to 0, and expect ENOTDIR.
10 * 2) Call sysctl(2) with nlen greater than CTL_MAXNAME, and expect ENOTDIR.
31 int nlen; member
47 .nlen = tc->nlen, in verify_sysctl()
/third_party/curl/lib/
H A Dcookie.c526 size_t nlen; in Curl_cookie_add() local
532 nlen = strcspn(ptr, ";\t\r\n="); in Curl_cookie_add()
533 if(nlen) { in Curl_cookie_add()
539 ptr += nlen; in Curl_cookie_add()
542 while(nlen && ISBLANK(namep[nlen - 1])) in Curl_cookie_add()
543 nlen--; in Curl_cookie_add()
578 if(nlen >= (MAX_NAME-1) || vlen >= (MAX_NAME-1) || in Curl_cookie_add()
579 ((nlen + vlen) > MAX_NAME)) { in Curl_cookie_add()
582 nlen, vle in Curl_cookie_add()
[all...]
/third_party/node/deps/cares/src/lib/
H A Dares_search.c244 size_t nlen = ares_strlen(name); in ares__cat_domain() local
247 *s = ares_malloc(nlen + 1 + dlen + 1); in ares__cat_domain()
251 memcpy(*s, name, nlen); in ares__cat_domain()
252 (*s)[nlen] = '.'; in ares__cat_domain()
258 memcpy(*s + nlen + 1, domain, dlen); in ares__cat_domain()
259 (*s)[nlen + 1 + dlen] = 0; in ares__cat_domain()
/third_party/node/deps/openssl/openssl/crypto/x509/
H A Dv3_info.c66 int i, nlen;
81 nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1;
82 ntmp = OPENSSL_malloc(nlen);
85 BIO_snprintf(ntmp, nlen, "%s - %s", objtmp, vtmp->name);
/third_party/openssl/crypto/x509/
H A Dv3_info.c66 int i, nlen;
81 nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1;
82 ntmp = OPENSSL_malloc(nlen);
85 BIO_snprintf(ntmp, nlen, "%s - %s", objtmp, vtmp->name);
/third_party/zlib/contrib/puff/
H A Dpuff.c647 * - Given the number of literal/length code lengths (nlen) and distance code
648 * lengths (ndist), then they are treated as one long list of nlen + ndist
667 int nlen, ndist, ncode; /* number of lengths in descriptor */ in dynamic() local
684 nlen = bits(s, 5) + 257; in dynamic()
687 if (nlen > MAXLCODES || ndist > MAXDCODES) in dynamic()
703 while (index < nlen + ndist) { in dynamic()
724 if (index + symbol > nlen + ndist) in dynamic()
736 err = construct(&lencode, lengths, nlen); in dynamic()
737 if (err && (err < 0 || nlen != lencode.count[0] + lencode.count[1])) in dynamic()
741 err = construct(&distcode, lengths + nlen, ndis in dynamic()
[all...]
/third_party/ltp/testcases/network/tcp_cmds/sendfile/
H A Dtestsf_c.c36 int nlen, gai; in main() local
108 nlen = 0; /* init size of info received */ in main()
112 nlen += nbyte; in main()

Completed in 28 milliseconds

12345