Home
last modified time | relevance | path

Searched refs:userlen (Results 1 – 13 of 13) sorted by relevance

/external/boringssl/src/crypto/x509v3/
Dv3_sxnet.c157 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen) in SXNET_add_id_asc() argument
164 return SXNET_add_id_INTEGER(psx, izone, user, userlen); in SXNET_add_id_asc()
170 int userlen) in SXNET_add_id_ulong() argument
178 return SXNET_add_id_INTEGER(psx, izone, user, userlen); in SXNET_add_id_ulong()
188 int userlen) in SXNET_add_id_INTEGER() argument
196 if (userlen == -1) in SXNET_add_id_INTEGER()
197 userlen = strlen(user); in SXNET_add_id_INTEGER()
198 if (userlen > 64) { in SXNET_add_id_INTEGER()
217 if (userlen == -1) in SXNET_add_id_INTEGER()
218 userlen = strlen(user); in SXNET_add_id_INTEGER()
[all …]
/external/curl/lib/vauth/
Dntlm.c538 size_t userlen = 0; in Curl_auth_create_ntlm_type3_message() local
553 userlen = strlen(user); in Curl_auth_create_ntlm_type3_message()
579 result = Curl_ntlm_core_mk_ntlmv2_hash(user, userlen, domain, domlen, in Curl_auth_create_ntlm_type3_message()
669 userlen = userlen * 2; in Curl_auth_create_ntlm_type3_message()
681 hostoff = useroff + userlen; in Curl_auth_create_ntlm_type3_message()
750 SHORTPAIR(userlen), in Curl_auth_create_ntlm_type3_message()
751 SHORTPAIR(userlen), in Curl_auth_create_ntlm_type3_message()
809 if(size + userlen + domlen + hostlen >= NTLM_BUFSIZE) { in Curl_auth_create_ntlm_type3_message()
824 unicodecpy(&ntlmbuf[size], user, userlen / 2); in Curl_auth_create_ntlm_type3_message()
826 memcpy(&ntlmbuf[size], user, userlen); in Curl_auth_create_ntlm_type3_message()
[all …]
/external/curl/lib/
Dcurl_ntlm_core.c592 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen, in Curl_ntlm_core_mk_ntlmv2_hash() argument
604 if((userlen > SIZE_T_MAX/2) || in Curl_ntlm_core_mk_ntlmv2_hash()
606 ((userlen + domlen) > SIZE_T_MAX/2)) in Curl_ntlm_core_mk_ntlmv2_hash()
609 identity_len = (userlen + domlen) * 2; in Curl_ntlm_core_mk_ntlmv2_hash()
615 ascii_uppercase_to_unicode_le(identity, user, userlen); in Curl_ntlm_core_mk_ntlmv2_hash()
616 ascii_to_unicode_le(identity + (userlen << 1), domain, domlen); in Curl_ntlm_core_mk_ntlmv2_hash()
Dcurl_ntlm_core.h81 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen,
/external/curl/src/
Dtool_paramhlp.c485 size_t userlen = strlen(*userpwd); in checkpasswd() local
511 userlen + 1); /* an extra for the zero */ in checkpasswd()
516 passptr[userlen] = ':'; in checkpasswd()
517 memcpy(&passptr[userlen + 1], passwd, passwdlen + 1); in checkpasswd()
/external/icu/android_icu4j/src/main/java/android/icu/math/
DBigDecimal.java990 int userlen; in add() local
1038 userlen = rhs.mant.length; in add()
1050 if (newlen >= ((userlen + reqdig) + 1)) in add()
1068 userlen = userlen - tlen; in add()
1075 newlen = (userlen + rhs.exp) - lhs.exp; in add()
1082 if (userlen < reqdig) { // need 0 padding in add()
1084 res.exp = res.exp - ((reqdig - userlen)); in add()
1098 if (newlen > userlen) in add()
1099 userlen = newlen; // need to pad RHS in add()
1125 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add()
[all …]
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/math/
DBigDecimal.java1014 int userlen; in add() local
1062 userlen = rhs.mant.length; in add()
1074 if (newlen >= ((userlen + reqdig) + 1)) in add()
1092 userlen = userlen - tlen; in add()
1099 newlen = (userlen + rhs.exp) - lhs.exp; in add()
1106 if (userlen < reqdig) { // need 0 padding in add()
1108 res.exp = res.exp - ((reqdig - userlen)); in add()
1122 if (newlen > userlen) in add()
1123 userlen = newlen; // need to pad RHS in add()
1149 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add()
[all …]
/external/icu/icu4j/eclipse-build/plugins.template/com.ibm.icu.base/src/com/ibm/icu/math/
DBigDecimal.java1012 int userlen; in add() local
1060 userlen = rhs.mant.length; in add()
1072 if (newlen >= ((userlen + reqdig) + 1)) in add()
1090 userlen = userlen - tlen; in add()
1097 newlen = (userlen + rhs.exp) - lhs.exp; in add()
1104 if (userlen < reqdig) { // need 0 padding in add()
1106 res.exp = res.exp - ((reqdig - userlen)); in add()
1120 if (newlen > userlen) in add()
1121 userlen = newlen; // need to pad RHS in add()
1147 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add()
[all …]
/external/wpa_supplicant_8/src/eap_server/
Deap_server_teap.c1220 u8 userlen, passlen; in eap_teap_process_basic_auth_resp() local
1239 userlen = *pos++; in eap_teap_process_basic_auth_resp()
1240 if (end - pos < userlen) { in eap_teap_process_basic_auth_resp()
1247 pos += userlen; in eap_teap_process_basic_auth_resp()
1250 username, userlen); in eap_teap_process_basic_auth_resp()
1279 if (eap_user_get(sm, username, userlen, 1) != 0) { in eap_teap_process_basic_auth_resp()
1301 new_id = os_memdup(username, userlen); in eap_teap_process_basic_auth_resp()
1305 sm->identity_len = userlen; in eap_teap_process_basic_auth_resp()
/external/ipsec-tools/src/racoon/
Dracoonctl.c837 size_t userlen; local
843 userlen = strlen(user);
844 if ((user == NULL) || (userlen > LOGINLEN))
847 buf = vmalloc(sizeof(*head) + userlen);
857 strncpy((char *)(head + 1), user, userlen);
/external/boringssl/src/include/openssl/
Dx509v3.h523 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen);
524 int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, char *user, int userlen);
525 int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *izone, char *user, int userlen);
/external/scapy/scapy/contrib/
Dmqtt.py127 length_from=lambda pkt: pkt.userlen),
/external/ppp/pppd/
Dauth.c1365 check_passwd(unit, auser, userlen, apasswd, passwdlen, msg) in check_passwd() argument
1368 int userlen;
1390 slprintf(user, sizeof(user), "%.*v", userlen, auser);