/external/boringssl/src/crypto/x509v3/ |
D | v3_sxnet.c | 157 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen) in SXNET_add_id_asc() argument 164 return SXNET_add_id_INTEGER(psx, izone, user, userlen); in SXNET_add_id_asc() 170 int userlen) in SXNET_add_id_ulong() argument 178 return SXNET_add_id_INTEGER(psx, izone, user, userlen); in SXNET_add_id_ulong() 188 int userlen) in SXNET_add_id_INTEGER() argument 196 if (userlen == -1) in SXNET_add_id_INTEGER() 197 userlen = strlen(user); in SXNET_add_id_INTEGER() 198 if (userlen > 64) { in SXNET_add_id_INTEGER() 217 if (userlen == -1) in SXNET_add_id_INTEGER() 218 userlen = strlen(user); in SXNET_add_id_INTEGER() [all …]
|
/external/curl/lib/vauth/ |
D | ntlm.c | 531 size_t userlen = 0; in Curl_auth_create_ntlm_type3_message() local 546 userlen = strlen(user); in Curl_auth_create_ntlm_type3_message() 572 result = Curl_ntlm_core_mk_ntlmv2_hash(user, userlen, domain, domlen, in Curl_auth_create_ntlm_type3_message() 660 userlen = userlen * 2; in Curl_auth_create_ntlm_type3_message() 672 hostoff = useroff + userlen; in Curl_auth_create_ntlm_type3_message() 741 SHORTPAIR(userlen), in Curl_auth_create_ntlm_type3_message() 742 SHORTPAIR(userlen), in Curl_auth_create_ntlm_type3_message() 797 if(size + userlen + domlen + hostlen >= NTLM_BUFSIZE) { in Curl_auth_create_ntlm_type3_message() 812 unicodecpy(&ntlmbuf[size], user, userlen / 2); in Curl_auth_create_ntlm_type3_message() 814 memcpy(&ntlmbuf[size], user, userlen); in Curl_auth_create_ntlm_type3_message() [all …]
|
/external/curl/lib/ |
D | curl_ntlm_core.c | 661 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen, in Curl_ntlm_core_mk_ntlmv2_hash() argument 673 if((userlen > SIZE_T_MAX/2) || in Curl_ntlm_core_mk_ntlmv2_hash() 675 ((userlen + domlen) > SIZE_T_MAX/2)) in Curl_ntlm_core_mk_ntlmv2_hash() 678 identity_len = (userlen + domlen) * 2; in Curl_ntlm_core_mk_ntlmv2_hash() 684 ascii_uppercase_to_unicode_le(identity, user, userlen); in Curl_ntlm_core_mk_ntlmv2_hash() 685 ascii_to_unicode_le(identity + (userlen << 1), domain, domlen); in Curl_ntlm_core_mk_ntlmv2_hash()
|
D | curl_ntlm_core.h | 83 CURLcode Curl_ntlm_core_mk_ntlmv2_hash(const char *user, size_t userlen,
|
/external/curl/src/ |
D | tool_paramhlp.c | 446 size_t userlen = strlen(*userpwd); in checkpasswd() local 473 userlen + 1); /* an extra for the zero */ in checkpasswd() 478 passptr[userlen] = ':'; in checkpasswd() 479 memcpy(&passptr[userlen + 1], passwd, passwdlen + 1); in checkpasswd()
|
/external/icu/android_icu4j/src/main/java/android/icu/math/ |
D | BigDecimal.java | 990 int userlen; in add() local 1038 userlen = rhs.mant.length; in add() 1050 if (newlen >= ((userlen + reqdig) + 1)) in add() 1068 userlen = userlen - tlen; in add() 1075 newlen = (userlen + rhs.exp) - lhs.exp; in add() 1082 if (userlen < reqdig) { // need 0 padding in add() 1084 res.exp = res.exp - ((reqdig - userlen)); in add() 1098 if (newlen > userlen) in add() 1099 userlen = newlen; // need to pad RHS in add() 1125 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add() [all …]
|
/external/icu/icu4j/eclipse-build/plugins.template/com.ibm.icu.base/src/com/ibm/icu/math/ |
D | BigDecimal.java | 1012 int userlen; in add() local 1060 userlen = rhs.mant.length; in add() 1072 if (newlen >= ((userlen + reqdig) + 1)) in add() 1090 userlen = userlen - tlen; in add() 1097 newlen = (userlen + rhs.exp) - lhs.exp; in add() 1104 if (userlen < reqdig) { // need 0 padding in add() 1106 res.exp = res.exp - ((reqdig - userlen)); in add() 1120 if (newlen > userlen) in add() 1121 userlen = newlen; // need to pad RHS in add() 1147 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add() [all …]
|
/external/icu/icu4j/main/classes/core/src/com/ibm/icu/math/ |
D | BigDecimal.java | 1014 int userlen; in add() local 1062 userlen = rhs.mant.length; in add() 1074 if (newlen >= ((userlen + reqdig) + 1)) in add() 1092 userlen = userlen - tlen; in add() 1099 newlen = (userlen + rhs.exp) - lhs.exp; in add() 1106 if (userlen < reqdig) { // need 0 padding in add() 1108 res.exp = res.exp - ((reqdig - userlen)); in add() 1122 if (newlen > userlen) in add() 1123 userlen = newlen; // need to pad RHS in add() 1149 } else if ((usellen < userlen) | (lhs.ind == iszero)) { // original B bigger in add() [all …]
|
/external/syslinux/core/lwip/src/netif/ppp/ |
D | auth.c | 862 check_passwd( int unit, char *auser, int userlen, char *apasswd, int passwdlen, char **msg, int *ms… in check_passwd() argument 867 LWIP_UNUSED_ARG(userlen); in check_passwd() 885 BCOPY(auser, user, userlen); in check_passwd() 886 user[userlen] = '\0'; in check_passwd()
|
/external/ipsec-tools/src/racoon/ |
D | racoonctl.c | 837 size_t userlen; local 843 userlen = strlen(user); 844 if ((user == NULL) || (userlen > LOGINLEN)) 847 buf = vmalloc(sizeof(*head) + userlen); 857 strncpy((char *)(head + 1), user, userlen);
|
/external/boringssl/src/include/openssl/ |
D | x509v3.h | 523 int SXNET_add_id_asc(SXNET **psx, char *zone, char *user, int userlen); 524 int SXNET_add_id_ulong(SXNET **psx, unsigned long lzone, char *user, int userlen); 525 int SXNET_add_id_INTEGER(SXNET **psx, ASN1_INTEGER *izone, char *user, int userlen);
|
/external/scapy/scapy/contrib/ |
D | mqtt.py | 127 length_from=lambda pkt: pkt.userlen),
|
/external/ppp/pppd/ |
D | auth.c | 1365 check_passwd(unit, auser, userlen, apasswd, passwdlen, msg) in check_passwd() argument 1368 int userlen; 1390 slprintf(user, sizeof(user), "%.*v", userlen, auser);
|