/third_party/node/deps/openssl/openssl/crypto/rand/ |
H A D | rand_pool.c | 23 size_t min_len, size_t max_len) in ossl_rand_pool_new() 33 pool->min_len = min_len; in ossl_rand_pool_new() 36 pool->alloc_len = min_len < min_alloc_size ? min_alloc_size : min_len; in ossl_rand_pool_new() 85 pool->min_len = pool->max_len = pool->alloc_len = pool->len; in ossl_rand_pool_attach() 185 if (pool->len < pool->min_len) in ossl_rand_pool_entropy_available() 264 if (pool->len < pool->min_len && in ossl_rand_pool_bytes_needed() 265 bytes_needed < pool->min_len - pool->len) in ossl_rand_pool_bytes_needed() 266 /* to meet the min_len requiremen in ossl_rand_pool_bytes_needed() 22 ossl_rand_pool_new(int entropy_requested, int secure, size_t min_len, size_t max_len) ossl_rand_pool_new() argument [all...] |
H A D | prov_seed.c | 17 size_t min_len, size_t max_len) in ossl_rand_get_entropy() 23 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in ossl_rand_get_entropy() 48 unsigned char **pout, size_t min_len, size_t max_len, in ossl_rand_get_nonce() 54 pool = ossl_rand_pool_new(0, 0, min_len, max_len); in ossl_rand_get_nonce() 15 ossl_rand_get_entropy(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, int entropy, size_t min_len, size_t max_len) ossl_rand_get_entropy() argument 47 ossl_rand_get_nonce(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) ossl_rand_get_nonce() argument
|
/third_party/openssl/crypto/rand/ |
H A D | rand_pool.c | 23 size_t min_len, size_t max_len) in ossl_rand_pool_new() 33 pool->min_len = min_len; in ossl_rand_pool_new() 36 pool->alloc_len = min_len < min_alloc_size ? min_alloc_size : min_len; in ossl_rand_pool_new() 85 pool->min_len = pool->max_len = pool->alloc_len = pool->len; in ossl_rand_pool_attach() 185 if (pool->len < pool->min_len) in ossl_rand_pool_entropy_available() 264 if (pool->len < pool->min_len && in ossl_rand_pool_bytes_needed() 265 bytes_needed < pool->min_len - pool->len) in ossl_rand_pool_bytes_needed() 266 /* to meet the min_len requiremen in ossl_rand_pool_bytes_needed() 22 ossl_rand_pool_new(int entropy_requested, int secure, size_t min_len, size_t max_len) ossl_rand_pool_new() argument [all...] |
H A D | prov_seed.c | 17 size_t min_len, size_t max_len) in ossl_rand_get_entropy() 23 pool = ossl_rand_pool_new(entropy, 1, min_len, max_len); in ossl_rand_get_entropy() 48 unsigned char **pout, size_t min_len, size_t max_len, in ossl_rand_get_nonce() 54 pool = ossl_rand_pool_new(0, 0, min_len, max_len); in ossl_rand_get_nonce() 15 ossl_rand_get_entropy(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, int entropy, size_t min_len, size_t max_len) ossl_rand_get_entropy() argument 47 ossl_rand_get_nonce(ossl_unused const OSSL_CORE_HANDLE *handle, unsigned char **pout, size_t min_len, size_t max_len, const void *salt, size_t salt_len) ossl_rand_get_nonce() argument
|
/third_party/node/deps/openssl/openssl/providers/common/ |
H A D | provider_seeding.c | 48 int entropy, size_t min_len, size_t max_len) in ossl_prov_get_entropy() 53 pout, entropy, min_len, max_len); in ossl_prov_get_entropy() 64 size_t min_len, size_t max_len, in ossl_prov_get_nonce() 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce() 47 ossl_prov_get_entropy(PROV_CTX *prov_ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) ossl_prov_get_entropy() argument 63 ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt,size_t salt_len) ossl_prov_get_nonce() argument
|
/third_party/openssl/providers/common/ |
H A D | provider_seeding.c | 48 int entropy, size_t min_len, size_t max_len) in ossl_prov_get_entropy() 53 pout, entropy, min_len, max_len); in ossl_prov_get_entropy() 64 size_t min_len, size_t max_len, in ossl_prov_get_nonce() 70 min_len, max_len, salt, salt_len); in ossl_prov_get_nonce() 47 ossl_prov_get_entropy(PROV_CTX *prov_ctx, unsigned char **pout, int entropy, size_t min_len, size_t max_len) ossl_prov_get_entropy() argument 63 ossl_prov_get_nonce(PROV_CTX *prov_ctx, unsigned char **pout, size_t min_len, size_t max_len, const void *salt,size_t salt_len) ossl_prov_get_nonce() argument
|
/third_party/toybox/toys/posix/ |
H A D | cmp.c | 31 int i, len1, len2, min_len, size = sizeof(toybuf)/2; in do_cmp() local 50 min_len = len1 < len2 ? len1 : len2; in do_cmp() 51 for (i=0; i<min_len; i++) { in do_cmp()
|
/third_party/elfutils/src/ |
H A D | strings.c | 104 static size_t min_len = 4; variable 267 min_len = atoi (arg); in parse_opt() 299 if (min_len <= 0 || min_len > INT_MAX / bytes_per_char) in parse_opt() 301 min_len_bytes = min_len * bytes_per_char; in parse_opt() 343 if (curlen >= min_len) in process_chunk_mb() 376 if (len <= min_len) in process_chunk_mb() 411 if (curlen >= min_len) in process_chunk() 439 if (len <= min_len) in process_chunk()
|
/third_party/openssl/ohos_lite/include/crypto/ |
H A D | rand.h | 47 int entropy, size_t min_len, size_t max_len, 53 int entropy, size_t min_len, size_t max_len); 65 size_t min_len, size_t max_len);
|
/third_party/python/Objects/ |
H A D | structseq.c | 139 Py_ssize_t len, min_len, max_len, i, n_unnamed_fields; in structseq_new_impl() local 141 min_len = VISIBLE_SIZE_TP(type); in structseq_new_impl() 142 if (min_len < 0) { in structseq_new_impl() 169 if (min_len != max_len) { in structseq_new_impl() 170 if (len < min_len) { in structseq_new_impl() 173 type->tp_name, min_len, len); in structseq_new_impl() 187 if (len != min_len) { in structseq_new_impl() 190 type->tp_name, min_len, len); in structseq_new_impl()
|
/third_party/musl/porting/linux/user/src/linux/ |
H A D | getprocpid.c | 20 static int __find_and_convert_pid(char *buf, int len, int min_len) in __find_and_convert_pid() argument 26 if (len <= min_len) { in __find_and_convert_pid()
|
/third_party/musl/src/linux/linux/ |
H A D | getprocpid.c | 35 static int __find_and_convert_pid(char *buf, int len, int min_len) in __find_and_convert_pid() argument 41 if (len <= min_len) { in __find_and_convert_pid()
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | rand_pool.h | 78 size_t min_len; /* minimum number of random bytes requested */ member 86 size_t min_len, size_t max_len);
|
H A D | rand.h | 113 size_t min_len, size_t max_len); 117 unsigned char **pout, size_t min_len, size_t max_len,
|
/third_party/openssl/include/crypto/ |
H A D | rand_pool.h | 78 size_t min_len; /* minimum number of random bytes requested */ member 86 size_t min_len, size_t max_len);
|
H A D | rand.h | 113 size_t min_len, size_t max_len); 117 unsigned char **pout, size_t min_len, size_t max_len,
|
/third_party/node/deps/openssl/openssl/providers/implementations/rands/ |
H A D | crngt.c | 104 int entropy, size_t min_len, size_t max_len, in ossl_crngt_get_entropy() 143 if (bytes_needed < min_len) in ossl_crngt_get_entropy() 144 bytes_needed = min_len; in ossl_crngt_get_entropy() 102 ossl_crngt_get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) ossl_crngt_get_entropy() argument
|
H A D | drbg.c | 145 int entropy, size_t min_len, in ossl_drbg_get_seed() 155 if (bytes_needed < min_len) in ossl_drbg_get_seed() 156 bytes_needed = min_len; in ossl_drbg_get_seed() 195 size_t min_len, size_t max_len, in get_entropy() 203 return ossl_crngt_get_entropy(drbg, pout, entropy, min_len, max_len, in get_entropy() 206 return ossl_prov_get_entropy(drbg->provctx, pout, entropy, min_len, in get_entropy() 242 min_len, max_len, prediction_resistance, in get_entropy() 313 size_t min_len, size_t max_len) in prov_drbg_get_nonce() 348 return ossl_prov_get_nonce(drbg->provctx, pout, min_len, max_len, in prov_drbg_get_nonce() 144 ossl_drbg_get_seed(void *vdrbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance, const unsigned char *adin, size_t adin_len) ossl_drbg_get_seed() argument 194 get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) get_entropy() argument 312 prov_drbg_get_nonce(PROV_DRBG *drbg, unsigned char **pout, size_t min_len, size_t max_len) prov_drbg_get_nonce() argument
|
H A D | seed_src.c | 178 int entropy, size_t min_len, size_t max_len, in seed_get_seed() 192 if (bytes_needed < min_len) in seed_get_seed() 193 bytes_needed = min_len; in seed_get_seed() 177 seed_get_seed(void *vseed, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance, const unsigned char *adin, size_t adin_len) seed_get_seed() argument
|
/third_party/openssl/providers/implementations/rands/ |
H A D | crngt.c | 104 int entropy, size_t min_len, size_t max_len, in ossl_crngt_get_entropy() 143 if (bytes_needed < min_len) in ossl_crngt_get_entropy() 144 bytes_needed = min_len; in ossl_crngt_get_entropy() 102 ossl_crngt_get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) ossl_crngt_get_entropy() argument
|
H A D | drbg.c | 145 int entropy, size_t min_len, in ossl_drbg_get_seed() 155 if (bytes_needed < min_len) in ossl_drbg_get_seed() 156 bytes_needed = min_len; in ossl_drbg_get_seed() 195 size_t min_len, size_t max_len, in get_entropy() 203 return ossl_crngt_get_entropy(drbg, pout, entropy, min_len, max_len, in get_entropy() 206 return ossl_prov_get_entropy(drbg->provctx, pout, entropy, min_len, in get_entropy() 242 min_len, max_len, prediction_resistance, in get_entropy() 313 size_t min_len, size_t max_len) in prov_drbg_get_nonce() 348 return ossl_prov_get_nonce(drbg->provctx, pout, min_len, max_len, in prov_drbg_get_nonce() 144 ossl_drbg_get_seed(void *vdrbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance, const unsigned char *adin, size_t adin_len) ossl_drbg_get_seed() argument 194 get_entropy(PROV_DRBG *drbg, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance) get_entropy() argument 312 prov_drbg_get_nonce(PROV_DRBG *drbg, unsigned char **pout, size_t min_len, size_t max_len) prov_drbg_get_nonce() argument
|
H A D | seed_src.c | 178 int entropy, size_t min_len, size_t max_len, in seed_get_seed() 192 if (bytes_needed < min_len) in seed_get_seed() 193 bytes_needed = min_len; in seed_get_seed() 177 seed_get_seed(void *vseed, unsigned char **pout, int entropy, size_t min_len, size_t max_len, int prediction_resistance, const unsigned char *adin, size_t adin_len) seed_get_seed() argument
|
/third_party/ffmpeg/libavutil/ |
H A D | tx.c | 283 .min_len = 1, 346 if (cd->min_len != cd->max_len) in print_cd_info() 347 av_bprintf(&bp, "[%i, ", cd->min_len); in print_cd_info() 354 av_bprintf(&bp, "%s, factors: [", cd->min_len != cd->max_len ? "]" : ""); in print_cd_info() 521 if ((len < cd->min_len) || (cd->max_len != -1 && (len > cd->max_len))) in ff_tx_init_subtx() 557 if ((len == cd->min_len) && (len == cd->max_len)) in ff_tx_init_subtx()
|
/third_party/python/Lib/idlelib/ |
H A D | autocomplete_w.py | 65 min_len = min(len(self.start), len(newstart)) 67 while i < min_len and self.start[i] == newstart[i]: 117 min_len = min(len(first_comp), len(last_comp)) 119 while i < min_len and first_comp[i] == last_comp[i]: 137 min_len = min(len(lts), len(selstart)) 139 while i < min_len and lts[i] == selstart[i]:
|
/third_party/openssl/ohos_lite/include/openssl/ |
H A D | rand_drbg.h | 108 int entropy, size_t min_len, 114 int entropy, size_t min_len,
|