/third_party/openssl/providers/implementations/kem/ |
D | rsa_kem.c | 249 size_t nlen; in rsasve_generate() local 252 nlen = RSA_size(prsactx->rsa); in rsasve_generate() 255 if (nlen == 0) { in rsasve_generate() 262 *outlen = nlen; in rsasve_generate() 264 *secretlen = nlen; in rsasve_generate() 271 if (!rsasve_gen_rand_bytes(prsactx->rsa, secret, nlen)) in rsasve_generate() 275 ret = RSA_public_encrypt(nlen, secret, out, prsactx->rsa, RSA_NO_PADDING); in rsasve_generate() 279 *outlen = nlen; in rsasve_generate() 281 *secretlen = nlen; in rsasve_generate() 283 OPENSSL_cleanse(secret, nlen); in rsasve_generate() [all …]
|
/third_party/icu/icu4c/as_is/os400/ |
D | iculd.c | 125 int nlen = n-2; in main() local 127 if(nlen >= 10) { in main() 128 nlen = 10; in main() 142 nlen=strlen(b); in main() 152 strncat(objs,b,nlen); in main() 159 int nlen = n-2; in main() local 161 if(nlen >= 10) { in main() 162 nlen = 10; in main() 176 nlen=strlen(b); in main() 186 strncat(bnddirs,b,nlen); in main()
|
/third_party/rust/crates/memchr/src/memmem/ |
D | twoway.rs | 317 let nlen = needle.len(); in rfind_small_imp() localVariable 319 let mut shift = nlen; in rfind_small_imp() 320 while pos >= nlen { in rfind_small_imp() 321 if !self.0.byteset.contains(haystack[pos - nlen]) { in rfind_small_imp() 322 pos -= nlen; in rfind_small_imp() 323 shift = nlen; in rfind_small_imp() 327 while i > 0 && needle[i - 1] == haystack[pos - nlen + i - 1] { in rfind_small_imp() 330 if i > 0 || needle[0] != haystack[pos - nlen] { in rfind_small_imp() 332 shift = nlen; in rfind_small_imp() 335 while j < shift && needle[j] == haystack[pos - nlen + j] { in rfind_small_imp() [all …]
|
/third_party/toybox/toys/posix/ |
D | cpio.c | 225 unsigned nlen, error = 0, zero = 0; in cpio_main() local 232 nlen = len+1; in cpio_main() 248 nlen, 0); in cpio_main() 250 xwrite(afd, name, nlen); in cpio_main() 253 llen = (llen + nlen) & 3; in cpio_main() 263 nlen = llen > sizeof(toybuf) ? sizeof(toybuf) : llen; in cpio_main() 264 llen -= nlen; in cpio_main() 266 if (nlen != readall(fd, toybuf, nlen)) in cpio_main() 268 xwrite(afd, toybuf, nlen); in cpio_main()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | ext_password_test.c | 48 size_t nlen; in ext_password_test_get() local 55 nlen = os_strlen(name); in ext_password_test_get() 58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { in ext_password_test_get() 60 pos += nlen + 1; in ext_password_test_get()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | ext_password_test.c | 48 size_t nlen; in ext_password_test_get() local 55 nlen = os_strlen(name); in ext_password_test_get() 58 if (os_strncmp(pos, name, nlen) == 0 && pos[nlen] == '=') { in ext_password_test_get() 60 pos += nlen + 1; in ext_password_test_get()
|
/third_party/lwip/src/netif/ppp/ |
D | chap-new.c | 258 int clen = 1, nlen, len; in chap_generate_challenge() local 266 nlen = strlen(pcb->chap_server.name); in chap_generate_challenge() 267 memcpy(p + 1 + clen, pcb->chap_server.name, nlen); in chap_generate_challenge() 269 len = CHAP_HDRLEN + 1 + clen + nlen; in chap_generate_challenge() 437 int clen, nlen; local 457 nlen = len - (clen + 1); 460 ppp_slprintf(rname, sizeof(rname), "%.*v", nlen, pkt + clen + 1); 483 nlen = strlen(pcb->chap_client.name); 484 memcpy(outp + clen + 1, pcb->chap_client.name, nlen); 487 len = CHAP_HDRLEN + clen + 1 + nlen; [all …]
|
/third_party/node/deps/cares/src/lib/ |
D | ares_expand_name.c | 127 } nlen; in ares__expand_name_validated() local 129 nlen.sig = name_length(encoded, abuf, alen, is_hostname); in ares__expand_name_validated() 130 if (nlen.sig < 0) in ares__expand_name_validated() 133 *s = ares_malloc(nlen.uns + 1); in ares__expand_name_validated() 138 if (nlen.uns == 0) { in ares__expand_name_validated()
|
D | ares_search.c | 216 size_t nlen = strlen(name); in ares__cat_domain() local 219 *s = ares_malloc(nlen + 1 + dlen + 1); in ares__cat_domain() 222 memcpy(*s, name, nlen); in ares__cat_domain() 223 (*s)[nlen] = '.'; in ares__cat_domain() 224 memcpy(*s + nlen + 1, domain, dlen); in ares__cat_domain() 225 (*s)[nlen + 1 + dlen] = 0; in ares__cat_domain()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | bgscan.c | 32 size_t nlen; in bgscan_init() local 41 nlen = os_strlen(name); in bgscan_init() 43 nlen = params - name; in bgscan_init() 48 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) { in bgscan_init()
|
D | autoscan.c | 44 size_t nlen; in autoscan_init() local 67 nlen = os_strlen(name); in autoscan_init() 69 nlen = params - name; in autoscan_init() 74 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) { in autoscan_init()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | bgscan.c | 32 size_t nlen; in bgscan_init() local 41 nlen = os_strlen(name); in bgscan_init() 43 nlen = params - name; in bgscan_init() 48 if (os_strncmp(name, bgscan_modules[i]->name, nlen) == 0) { in bgscan_init()
|
D | autoscan.c | 44 size_t nlen; in autoscan_init() local 67 nlen = os_strlen(name); in autoscan_init() 69 nlen = params - name; in autoscan_init() 74 if (os_strncmp(name, autoscan_modules[i]->name, nlen) == 0) { in autoscan_init()
|
/third_party/zlib/contrib/puff/ |
D | puff.c | 667 int nlen, ndist, ncode; /* number of lengths in descriptor */ in dynamic() local 684 nlen = bits(s, 5) + 257; in dynamic() 687 if (nlen > MAXLCODES || ndist > MAXDCODES) in dynamic() 703 while (index < nlen + ndist) { in dynamic() 724 if (index + symbol > nlen + ndist) in dynamic() 736 err = construct(&lencode, lengths, nlen); in dynamic() 737 if (err && (err < 0 || nlen != lencode.count[0] + lencode.count[1])) in dynamic() 741 err = construct(&distcode, lengths + nlen, ndist); in dynamic()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_common/ |
D | eap_ikev2_common.c | 24 size_t nlen; in eap_ikev2_derive_keymat() local 30 nlen = i_nonce_len + r_nonce_len; in eap_ikev2_derive_keymat() 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_common/ |
D | eap_ikev2_common.c | 24 size_t nlen; in eap_ikev2_derive_keymat() local 30 nlen = i_nonce_len + r_nonce_len; in eap_ikev2_derive_keymat() 31 nonces = os_malloc(nlen); in eap_ikev2_derive_keymat() 37 if (ikev2_prf_plus(prf, keys->SK_d, keys->SK_d_len, nonces, nlen, in eap_ikev2_derive_keymat()
|
/third_party/openssl/crypto/bn/ |
D | bn_rsa_fips186_4.c | 157 const BIGNUM *Xp2, int nlen, in ossl_bn_rsa_fips186_4_gen_prob_primes() argument 177 bitlen = bn_rsa_fips186_5_aux_prime_min_size(nlen); in ossl_bn_rsa_fips186_4_gen_prob_primes() 202 bn_rsa_fips186_5_aux_prime_max_sum_size_for_prob_primes(nlen)) in ossl_bn_rsa_fips186_4_gen_prob_primes() 205 if (!ossl_bn_rsa_fips186_4_derive_prime(p, Xpout, Xp, p1i, p2i, nlen, e, in ossl_bn_rsa_fips186_4_gen_prob_primes() 246 int nlen, const BIGNUM *e, BN_CTX *ctx, in ossl_bn_rsa_fips186_4_derive_prime() argument 251 int bits = nlen >> 1; in ossl_bn_rsa_fips186_4_derive_prime()
|
/third_party/musl/src/network/ |
D | dn_comp.c | 37 const char *end, const unsigned char *lens, int nlen) in match() argument 44 l = lens[--nlen]; in match() 51 if (nlen) m++; in match() 52 if (!nlen || !noff) return m; in match()
|
/third_party/ltp/testcases/kernel/syscalls/sysctl/ |
D | sysctl04.c | 31 int nlen; member 47 .nlen = tc->nlen, in verify_sysctl()
|
/third_party/openssl/crypto/x509/ |
D | v3_info.c | 66 int i, nlen; variable 81 nlen = strlen(objtmp) + 3 + strlen(vtmp->name) + 1; 82 ntmp = OPENSSL_malloc(nlen); 85 BIO_snprintf(ntmp, nlen, "%s - %s", objtmp, vtmp->name);
|
/third_party/nghttp2/src/ |
D | shrpx_log.h | 158 size_t nlen = 0; in write_hex() local 159 for (auto t = n; t; t >>= 8, ++nlen) in write_hex() 162 nlen *= 2; in write_hex() 164 if (wleft() < 2 /* for "0x" */ + nlen) { in write_hex() 172 last_ += nlen; in write_hex()
|
/third_party/gstreamer/gstplugins_good/tests/icles/ |
D | test-accurate-seek.c | 35 _memmem (const guint8 * haystack, gsize hlen, const guint8 * needle, gsize nlen) in _memmem() argument 41 if (!nlen) in _memmem() 46 while (plen >= nlen && (p = memchr (p, needle_first, plen - nlen + 1))) { in _memmem() 47 if (!memcmp (p, needle, nlen)) in _memmem()
|
/third_party/ltp/testcases/network/tcp_cmds/sendfile/ |
D | testsf_c.c | 36 int nlen, gai; in main() local 108 nlen = 0; /* init size of info received */ in main() 112 nlen += nbyte; in main()
|
/third_party/mesa3d/src/gallium/auxiliary/gallivm/ |
D | lp_bld_pack.c | 652 int nlen = 128 / src_type.width; in lp_build_pack2() local 653 int lo_off = swap_intrinsic_operands ? nlen : 0; in lp_build_pack2() 654 int hi_off = swap_intrinsic_operands ? 0 : nlen; in lp_build_pack2() 666 lo, i*nlen*2 + lo_off, nlen); in lp_build_pack2() 668 lo, i*nlen*2 + hi_off, nlen); in lp_build_pack2() 677 hi, i*nlen*2 + lo_off, nlen); in lp_build_pack2() 679 hi, i*nlen*2 + hi_off, nlen); in lp_build_pack2()
|
/third_party/selinux/libselinux/src/ |
D | get_context_list.c | 305 size_t plen, nlen; in get_failsafe_context() local 321 nlen = strlen(user) + 1 + plen + 1; in get_failsafe_context() 322 *newcon = malloc(nlen); in get_failsafe_context() 325 rc = snprintf(*newcon, nlen, "%s:%s", user, ptr); in get_failsafe_context() 326 if (rc < 0 || (size_t) rc >= nlen) { in get_failsafe_context()
|