/external/boringssl/src/crypto/x509v3/ |
D | v3_sxnet.c | 157 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen) in SXNET_add_id_asc() argument 164 return SXNET_add_id_INTEGER(psx, izone, user, userlen); in SXNET_add_id_asc() 170 int userlen) in SXNET_add_id_ulong() argument 178 return SXNET_add_id_INTEGER(psx, izone, user, userlen); in SXNET_add_id_ulong() 188 int userlen) in SXNET_add_id_INTEGER() argument 196 if (userlen == -1) in SXNET_add_id_INTEGER() 197 userlen = strlen(user); in SXNET_add_id_INTEGER() 198 if (userlen > 64) { in SXNET_add_id_INTEGER() 217 if (userlen == -1) in SXNET_add_id_INTEGER() 218 userlen = strlen(user); in SXNET_add_id_INTEGER() [all …]
|
/external/curl/lib/vauth/ |
D | ntlm.c | 538 size_t userlen = 0; in Curl_auth_create_ntlm_type3_message() local 553 userlen = strlen(user); in Curl_auth_create_ntlm_type3_message() 579 result = Curl_ntlm_core_mk_ntlmv2_hash(user, userlen, domain, domlen, in Curl_auth_create_ntlm_type3_message() 669 userlen = userlen * 2; in Curl_auth_create_ntlm_type3_message() 681 hostoff = useroff + userlen; in Curl_auth_create_ntlm_type3_message() 750 SHORTPAIR(userlen), in Curl_auth_create_ntlm_type3_message() 751 SHORTPAIR(userlen), in Curl_auth_create_ntlm_type3_message() 809 if(size + userlen + domlen + hostlen >= NTLM_BUFSIZE) { in Curl_auth_create_ntlm_type3_message() 824 unicodecpy(&ntlmbuf[size], user, userlen / 2); in Curl_auth_create_ntlm_type3_message() 826 memcpy(&ntlmbuf[size], user, userlen); in Curl_auth_create_ntlm_type3_message() [all …]
|
/external/curl/lib/ |
D | curl_ntlm_core.c | 592 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen, in Curl_ntlm_core_mk_ntlmv2_hash() argument 604 if((userlen > SIZE_T_MAX/2) || in Curl_ntlm_core_mk_ntlmv2_hash() 606 ((userlen + domlen) > SIZE_T_MAX/2)) in Curl_ntlm_core_mk_ntlmv2_hash() 609 identity_len = (userlen + domlen) * 2; in Curl_ntlm_core_mk_ntlmv2_hash() 615 ascii_uppercase_to_unicode_le(identity, user, userlen); in Curl_ntlm_core_mk_ntlmv2_hash() 616 ascii_to_unicode_le(identity + (userlen << 1), domain, domlen); in Curl_ntlm_core_mk_ntlmv2_hash()
|
D | curl_ntlm_core.h | 81 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen,
|
/external/curl/src/ |
D | tool_paramhlp.c | 485 size_t userlen = strlen(*userpwd); in checkpasswd() local 511 userlen + 1); /* an extra for the zero */ in checkpasswd() 516 passptr[userlen] = ':'; in checkpasswd() 517 memcpy(&passptr[userlen + 1], passwd, passwdlen + 1); in checkpasswd()
|
/external/icu/android_icu4j/src/main/java/android/icu/math/ |
D | BigDecimal.java | 990 int userlen; in add() local 1038 userlen = rhs.mant.length; in add() 1050 if (newlen >= ((userlen + reqdig) + 1)) in add() 1068 userlen = userlen - tlen; in add() 1075 newlen = (userlen + rhs.exp) - lhs.exp; in add() 1082 if (userlen < reqdig) { // need 0 padding in add() 1084 res.exp = res.exp - ((reqdig - userlen)); in add() 1098 if (newlen > userlen) in add() 1099 userlen = newlen; // need to pad RHS in add() 1125 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add() [all …]
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/math/ |
D | BigDecimal.java | 1014 int userlen; in add() local 1062 userlen = rhs.mant.length; in add() 1074 if (newlen >= ((userlen + reqdig) + 1)) in add() 1092 userlen = userlen - tlen; in add() 1099 newlen = (userlen + rhs.exp) - lhs.exp; in add() 1106 if (userlen < reqdig) { // need 0 padding in add() 1108 res.exp = res.exp - ((reqdig - userlen)); in add() 1122 if (newlen > userlen) in add() 1123 userlen = newlen; // need to pad RHS in add() 1149 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add() [all …]
|
/external/icu/icu4j/eclipse-build/plugins.template/com.ibm.icu.base/src/com/ibm/icu/math/ |
D | BigDecimal.java | 1012 int userlen; in add() local 1060 userlen = rhs.mant.length; in add() 1072 if (newlen >= ((userlen + reqdig) + 1)) in add() 1090 userlen = userlen - tlen; in add() 1097 newlen = (userlen + rhs.exp) - lhs.exp; in add() 1104 if (userlen < reqdig) { // need 0 padding in add() 1106 res.exp = res.exp - ((reqdig - userlen)); in add() 1120 if (newlen > userlen) in add() 1121 userlen = newlen; // need to pad RHS in add() 1147 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_teap.c | 1220 u8 userlen, passlen; in eap_teap_process_basic_auth_resp() local 1239 userlen = *pos++; in eap_teap_process_basic_auth_resp() 1240 if (end - pos < userlen) { in eap_teap_process_basic_auth_resp() 1247 pos += userlen; in eap_teap_process_basic_auth_resp() 1250 username, userlen); in eap_teap_process_basic_auth_resp() 1279 if (eap_user_get(sm, username, userlen, 1) != 0) { in eap_teap_process_basic_auth_resp() 1301 new_id = os_memdup(username, userlen); in eap_teap_process_basic_auth_resp() 1305 sm->identity_len = userlen; in eap_teap_process_basic_auth_resp()
|
/external/ipsec-tools/src/racoon/ |
D | racoonctl.c | 837 size_t userlen; local 843 userlen = strlen(user); 844 if ((user == NULL) || (userlen > LOGINLEN)) 847 buf = vmalloc(sizeof(*head) + userlen); 857 strncpy((char *)(head + 1), user, userlen);
|
/external/boringssl/src/include/openssl/ |
D | x509v3.h | 523 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen); 524 int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, char *user, int userlen); 525 int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *izone, char *user, int userlen);
|
/external/scapy/scapy/contrib/ |
D | mqtt.py | 127 length_from=lambda pkt: pkt.userlen),
|
/external/ppp/pppd/ |
D | auth.c | 1365 check_passwd(unit, auser, userlen, apasswd, passwdlen, msg) in check_passwd() argument 1368 int userlen; 1390 slprintf(user, sizeof(user), "%.*v", userlen, auser);
|