/third_party/curl/src/ |
H A D | var.c | 71 const char *name, size_t nlen) in varcontent() 75 if((strlen(list->name) == nlen) && in varcontent() 76 !strncmp(name, list->name, nlen)) { in varcontent() 237 size_t nlen; in varexpand() local 255 nlen = funcp - envp; in varexpand() 257 nlen = clp - envp; in varexpand() 258 if(!nlen || (nlen >= sizeof(name))) { in varexpand() 272 memcpy(name, envp, nlen); in varexpand() 273 name[nlen] in varexpand() 70 varcontent(struct GlobalConfig *global, const char *name, size_t nlen) varcontent() argument 349 addvariable(struct GlobalConfig *global, const char *name, size_t nlen, const char *content, size_t clen, bool contalloc) addvariable() argument 388 size_t nlen; setvariable() local [all...] |
/third_party/rust/crates/memchr/src/memmem/ |
H A D | twoway.rs | 317 let nlen = needle.len(); in rfind_small_imp() 319 let mut shift = nlen; in rfind_small_imp() 320 while pos >= nlen { in rfind_small_imp() 321 if !self.0.byteset.contains(haystack[pos - nlen]) { in rfind_small_imp() 322 pos -= nlen; in rfind_small_imp() 323 shift = nlen; in rfind_small_imp() 327 while i > 0 && needle[i - 1] == haystack[pos - nlen + i - 1] { in rfind_small_imp() 330 if i > 0 || needle[0] != haystack[pos - nlen] { in rfind_small_imp() 332 shift = nlen; in rfind_small_imp() 335 while j < shift && needle[j] == haystack[pos - nlen in rfind_small_imp() [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 249 size_t nlen; in rsasve_generate() local 251 /* Step (1): nlen = Ceil(len(n)/8) */ in rsasve_generate() 252 nlen = RSA_size(prsactx->rsa); in rsasve_generate() 255 if (nlen == 0) { in rsasve_generate() 262 *outlen = nlen; in rsasve_generate() 264 *secretlen = nlen; in rsasve_generate() 268 * Step (2): Generate a random byte string z of nlen bytes where in rsasve_generate() 271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate() 275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate() 279 *outlen = nlen; in rsasve_generate() 296 size_t nlen; rsasve_recover() local [all...] |
/third_party/openssl/providers/implementations/kem/ |
H A D | rsa_kem.c | 249 size_t nlen; in rsasve_generate() local 251 /* Step (1): nlen = Ceil(len(n)/8) */ in rsasve_generate() 252 nlen = RSA_size(prsactx->rsa); in rsasve_generate() 255 if (nlen == 0) { in rsasve_generate() 262 *outlen = nlen; in rsasve_generate() 264 *secretlen = nlen; in rsasve_generate() 268 * Step (2): Generate a random byte string z of nlen bytes where in rsasve_generate() 271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate() 275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate() 279 *outlen = nlen; in rsasve_generate() 296 size_t nlen; rsasve_recover() local [all...] |
/third_party/icu/icu4c/as_is/os400/ |
H A D | iculd.c | 125 int nlen = n-2; in main() local 127 if(nlen >= 10) { in main() 128 nlen = 10; in main() 142 nlen=strlen(b); in main() 152 strncat(objs,b,nlen); in main() 159 int nlen = n-2; in main() local 161 if(nlen >= 10) { in main() 162 nlen = 10; in main() 176 nlen=strlen(b); in main() 186 strncat(bnddirs,b,nlen); in main() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | ext_password_test.c | 48 size_t nlen; in ext_password_test_get() local 55 nlen = os_strlen(name); in ext_password_test_get() 58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { in ext_password_test_get() 60 pos += nlen + 1; in ext_password_test_get()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | ext_password_test.c | 48 size_t nlen; in ext_password_test_get() local 55 nlen = os_strlen(name); in ext_password_test_get() 58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { in ext_password_test_get() 60 pos += nlen + 1; in ext_password_test_get()
|
/third_party/toybox/toys/posix/ |
H A D | cpio.c | 225 unsigned nlen, error = 0, zero = 0; in cpio_main() local 232 nlen = len+1; in cpio_main() 248 nlen, 0); in cpio_main() 250 xwrite(afd, name, nlen); in cpio_main() 253 llen = (llen + nlen) & 3; in cpio_main() 263 nlen = llen > sizeof(toybuf) ? sizeof(toybuf) : llen; in cpio_main() 264 llen -= nlen; in cpio_main() 266 if (nlen != readall(fd, toybuf, nlen)) in cpio_main() 268 xwrite(afd, toybuf, nlen); in cpio_main() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
H A D | eap_ikev2_common.c | 24 size_t nlen; in eap_ikev2_derive_keymat() local 30 nlen = i_nonce_len + r_nonce_len; in eap_ikev2_derive_keymat() 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
H A D | bgscan.c | 32 size_t nlen; in bgscan_init() local 41 nlen = os_strlen(name); in bgscan_init() 43 nlen = params - name; in bgscan_init() 48 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) { in bgscan_init()
|
H A D | autoscan.c | 44 size_t nlen; in autoscan_init() local 67 nlen = os_strlen(name); in autoscan_init() 69 nlen = params - name; in autoscan_init() 74 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) { in autoscan_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
H A D | eap_ikev2_common.c | 24 size_t nlen; in eap_ikev2_derive_keymat() local 30 nlen = i_nonce_len + r_nonce_len; in eap_ikev2_derive_keymat() 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
H A D | bgscan.c | 32 size_t nlen; in bgscan_init() local 41 nlen = os_strlen(name); in bgscan_init() 43 nlen = params - name; in bgscan_init() 48 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) { in bgscan_init()
|
H A D | autoscan.c | 44 size_t nlen; in autoscan_init() local 67 nlen = os_strlen(name); in autoscan_init() 69 nlen = params - name; in autoscan_init() 74 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) { in autoscan_init()
|
/third_party/lwip/src/netif/ppp/ |
H A D | chap-new.c | 258 int clen = 1, nlen, len; in chap_generate_challenge() local 266 nlen = strlen(pcb->chap_server.name); in chap_generate_challenge() 267 memcpy(p + 1 + clen, pcb->chap_server.name, nlen); in chap_generate_challenge() 269 len = CHAP_HDRLEN + 1 + clen + nlen; in chap_generate_challenge() 437 int clen, nlen; local 457 nlen = len - (clen + 1); 460 ppp_slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1); 483 nlen = strlen(pcb->chap_client.name); 484 memcpy(outp + clen + 1, pcb->chap_client.name, nlen); 487 len = CHAP_HDRLEN + clen + 1 + nlen; 596 int clen, nlen; global() local [all...] |
/third_party/node/deps/openssl/openssl/crypto/bn/ |
H A D | bn_rsa_fips186_4.c | 148 * nlen The bit length of the modulus (the key size). 157 const BIGNUM *Xp2, int nlen, in ossl_bn_rsa_fips186_4_gen_prob_primes() 177 bitlen = bn_rsa_fips186_5_aux_prime_min_size(nlen); in ossl_bn_rsa_fips186_4_gen_prob_primes() 202 bn_rsa_fips186_5_aux_prime_max_sum_size_for_prob_primes(nlen)) in ossl_bn_rsa_fips186_4_gen_prob_primes() 205 if (!ossl_bn_rsa_fips186_4_derive_prime(p, Xpout, Xp, p1i, p2i, nlen, e, in ossl_bn_rsa_fips186_4_gen_prob_primes() 236 * nlen The desired length of n (the RSA modulus). 246 int nlen, const BIGNUM *e, BN_CTX *ctx, in ossl_bn_rsa_fips186_4_derive_prime() 251 int bits = nlen >> 1; in ossl_bn_rsa_fips186_4_derive_prime() 272 * 1/sqrt(2) * 2^(nlen/2) <= X < 2^(nlen/ in ossl_bn_rsa_fips186_4_derive_prime() 154 ossl_bn_rsa_fips186_4_gen_prob_primes(BIGNUM *p, BIGNUM *Xpout, BIGNUM *p1, BIGNUM *p2, const BIGNUM *Xp, const BIGNUM *Xp1, const BIGNUM *Xp2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_gen_prob_primes() argument 244 ossl_bn_rsa_fips186_4_derive_prime(BIGNUM *Y, BIGNUM *X, const BIGNUM *Xin, const BIGNUM *r1, const BIGNUM *r2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_derive_prime() argument [all...] |
/third_party/openssl/crypto/bn/ |
H A D | bn_rsa_fips186_4.c | 148 * nlen The bit length of the modulus (the key size). 157 const BIGNUM *Xp2, int nlen, in ossl_bn_rsa_fips186_4_gen_prob_primes() 177 bitlen = bn_rsa_fips186_5_aux_prime_min_size(nlen); in ossl_bn_rsa_fips186_4_gen_prob_primes() 202 bn_rsa_fips186_5_aux_prime_max_sum_size_for_prob_primes(nlen)) in ossl_bn_rsa_fips186_4_gen_prob_primes() 205 if (!ossl_bn_rsa_fips186_4_derive_prime(p, Xpout, Xp, p1i, p2i, nlen, e, in ossl_bn_rsa_fips186_4_gen_prob_primes() 236 * nlen The desired length of n (the RSA modulus). 246 int nlen, const BIGNUM *e, BN_CTX *ctx, in ossl_bn_rsa_fips186_4_derive_prime() 251 int bits = nlen >> 1; in ossl_bn_rsa_fips186_4_derive_prime() 272 * 1/sqrt(2) * 2^(nlen/2) <= X < 2^(nlen/ in ossl_bn_rsa_fips186_4_derive_prime() 154 ossl_bn_rsa_fips186_4_gen_prob_primes(BIGNUM *p, BIGNUM *Xpout, BIGNUM *p1, BIGNUM *p2, const BIGNUM *Xp, const BIGNUM *Xp1, const BIGNUM *Xp2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_gen_prob_primes() argument 244 ossl_bn_rsa_fips186_4_derive_prime(BIGNUM *Y, BIGNUM *X, const BIGNUM *Xin, const BIGNUM *r1, const BIGNUM *r2, int nlen, const BIGNUM *e, BN_CTX *ctx, BN_GENCB *cb) ossl_bn_rsa_fips186_4_derive_prime() argument [all...] |
/third_party/musl/src/network/ |
H A D | dn_comp.c | 37 const char *end, const unsigned char *lens, int nlen) in match() 44 l = lens[--nlen]; in match() 51 if (nlen) m++; in match() 52 if (!nlen || !noff) return m; in match() 36 match(int *offset, const unsigned char *base, const unsigned char *dn, const char *end, const unsigned char *lens, int nlen) match() argument
|
/third_party/ltp/testcases/kernel/syscalls/sysctl/ |
H A D | sysctl04.c | 9 * 1) Call sysctl(2) with nlen set to 0, and expect ENOTDIR. 10 * 2) Call sysctl(2) with nlen greater than CTL_MAXNAME, and expect ENOTDIR. 31 int nlen; member 47 .nlen = tc->nlen, in verify_sysctl()
|
/third_party/curl/lib/ |
H A D | cookie.c | 526 size_t nlen; in Curl_cookie_add() local 532 nlen = strcspn(ptr, ";\t\r\n="); in Curl_cookie_add() 533 if(nlen) { in Curl_cookie_add() 539 ptr += nlen; in Curl_cookie_add() 542 while(nlen && ISBLANK(namep[nlen - 1])) in Curl_cookie_add() 543 nlen--; in Curl_cookie_add() 578 if(nlen >= (MAX_NAME-1) || vlen >= (MAX_NAME-1) || in Curl_cookie_add() 579 ((nlen + vlen) > MAX_NAME)) { in Curl_cookie_add() 582 nlen, vle in Curl_cookie_add() [all...] |
/third_party/node/deps/cares/src/lib/ |
H A D | ares_search.c | 244 size_t nlen = ares_strlen(name); in ares__cat_domain() local 247 *s = ares_malloc(nlen + 1 + dlen + 1); in ares__cat_domain() 251 memcpy(*s, name, nlen); in ares__cat_domain() 252 (*s)[nlen] = '.'; in ares__cat_domain() 258 memcpy(*s + nlen + 1, domain, dlen); in ares__cat_domain() 259 (*s)[nlen + 1 + dlen] = 0; in ares__cat_domain()
|
/third_party/node/deps/openssl/openssl/crypto/x509/ |
H A D | v3_info.c | 66 int i, nlen; 81 nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1; 82 ntmp = OPENSSL_malloc(nlen); 85 BIO_snprintf(ntmp, nlen, "%s - %s", objtmp, vtmp->name);
|
/third_party/openssl/crypto/x509/ |
H A D | v3_info.c | 66 int i, nlen; 81 nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1; 82 ntmp = OPENSSL_malloc(nlen); 85 BIO_snprintf(ntmp, nlen, "%s - %s", objtmp, vtmp->name);
|
/third_party/zlib/contrib/puff/ |
H A D | puff.c | 647 * - Given the number of literal/length code lengths (nlen) and distance code 648 * lengths (ndist), then they are treated as one long list of nlen + ndist 667 int nlen, ndist, ncode; /* number of lengths in descriptor */ in dynamic() local 684 nlen = bits(s, 5) + 257; in dynamic() 687 if (nlen > MAXLCODES || ndist > MAXDCODES) in dynamic() 703 while (index < nlen + ndist) { in dynamic() 724 if (index + symbol > nlen + ndist) in dynamic() 736 err = construct(&lencode, lengths, nlen); in dynamic() 737 if (err && (err < 0 || nlen != lencode.count[0] + lencode.count[1])) in dynamic() 741 err = construct(&distcode, lengths + nlen, ndis in dynamic() [all...] |
/third_party/ltp/testcases/network/tcp_cmds/sendfile/ |
H A D | testsf_c.c | 36 int nlen, gai; in main() local 108 nlen = 0; /* init size of info received */ in main() 112 nlen += nbyte; in main()
|