/dports/math/py-PyWavelets/pywt-1.2.0/pywt/_extensions/c/ |
H A D | wt.template.c | 324 if(output_len != dwt_buffer_length(input_len, wavelet->dec_len, mode)){ in CAT() 328 return CAT(TYPE, _downsampling_convolution)(input, input_len, in CAT() 343 if(output_len != dwt_buffer_length(input_len, wavelet->dec_len, mode)) in CAT() 346 return CAT(TYPE, _downsampling_convolution)(input, input_len, in CAT() 397 size_t input_len; in CAT() local 401 input_len = coeffs_a_len; in CAT() 403 input_len = coeffs_a_len; in CAT() 405 input_len = coeffs_d_len; in CAT() 411 if(output_len != idwt_buffer_length(input_len, wavelet->rec_len, mode)) in CAT() 460 if(level > swt_max_level(input_len)) in CAT() [all …]
|
/dports/security/libgsasl/gsasl-1.10.0/lib/digest-md5/ |
H A D | digest-md5.h | 36 const char *input, size_t input_len, 43 size_t input_len, 49 size_t input_len, 57 const char *input, size_t input_len, 64 size_t input_len, 70 size_t input_len,
|
/dports/security/gsasl/gsasl-1.10.0/lib/digest-md5/ |
H A D | digest-md5.h | 36 const char *input, size_t input_len, 43 size_t input_len, 49 size_t input_len, 57 const char *input, size_t input_len, 64 size_t input_len, 70 size_t input_len,
|
/dports/net-mgmt/lldpd/lldpd-1.0.8/src/ |
H A D | ctl.c | 202 ctl_msg_recv_unserialized(uint8_t **input_buffer, size_t *input_len, in ctl_msg_recv_unserialized() argument 210 *input_len < sizeof(struct hmsg_header)) { in ctl_msg_recv_unserialized() 212 return sizeof(struct hmsg_header) - *input_len; in ctl_msg_recv_unserialized() 222 *input_len = 0; in ctl_msg_recv_unserialized() 225 if (*input_len < sizeof(struct hmsg_header) + hdr.len) { in ctl_msg_recv_unserialized() 227 return sizeof(struct hmsg_header) + hdr.len - *input_len; in ctl_msg_recv_unserialized() 252 *input_len -= sizeof(struct hmsg_header) + hdr.len; in ctl_msg_recv_unserialized() 253 if (*input_len == 0) { in ctl_msg_recv_unserialized() 259 *input_len); in ctl_msg_recv_unserialized()
|
/dports/security/libgsasl/gsasl-1.10.0/lib/kerberos_v5/ |
H A D | kerberos_v5.h | 39 size_t input_len, 44 size_t input_len, 50 size_t input_len, 62 size_t input_len, 67 size_t input_len, 73 size_t input_len,
|
/dports/security/gsasl/gsasl-1.10.0/lib/kerberos_v5/ |
H A D | kerberos_v5.h | 39 size_t input_len, 44 size_t input_len, 50 size_t input_len, 62 size_t input_len, 67 size_t input_len, 73 size_t input_len,
|
/dports/security/suricata/suricata-6.0.4/rust/dist/ |
H A D | rust-bindings.h | 712 uint32_t input_len, 940 uint32_t input_len, 1014 uint32_t input_len, 1085 uint32_t input_len, 1109 uint32_t input_len, 1223 uint32_t input_len, 1229 uint32_t input_len, 1385 uint32_t input_len, 1542 uint32_t input_len, 1571 uint32_t input_len, [all …]
|
/dports/textproc/ripgrep-all/ripgrep-all-0.9.6/cargo-crates/nom-2.2.1/src/ |
H A D | multi.rs | 20 if i.input_len() == input.input_len() { 29 if i2.input_len() == input.input_len() { 35 if i3.input_len() == i2.input_len() { 88 if i2.input_len() == input.input_len() { 93 if i3.input_len() == i2.input_len() { 168 let (size,overflowed) = i.overflowing_add(($i).input_len() - input.input_len()); 261 if i.input_len() == input.input_len() { 408 if i.input_len() == input.input_len() { 664 $crate::InputLength::input_len(&($i)) - $crate::InputLength::input_len(&i) 882 if i.input_len() == input.input_len() { [all …]
|
/dports/security/p11-kit/p11-kit-0.24.0/common/ |
H A D | test-url.c | 53 ssize_t input_len, in check_decode_msg() argument 60 if (input_len < 0) in check_decode_msg() 61 input_len = strlen (input); in check_decode_msg() 62 decoded = p11_url_decode (input, input + input_len, "", &length); in check_decode_msg() 80 #define check_decode_success(input, input_len, expected, expected_len) \ argument 81 check_decode_msg (__FILE__, __LINE__, __FUNCTION__, input, input_len, expected, expected_len) 83 #define check_decode_failure(input, input_len) \ argument 84 check_decode_msg (__FILE__, __LINE__, __FUNCTION__, input, input_len, NULL, 0)
|
/dports/editors/encryptpad/EncryptPad-0.5.0.1/deps/botan/src/lib/misc/cryptobox/ |
H A D | cryptobox.cpp | 43 std::string encrypt(const uint8_t input[], size_t input_len, in encrypt() argument 54 secure_vector<uint8_t> out_buf(CRYPTOBOX_HEADER_LEN + input_len); in encrypt() 59 if(input_len > 0) in encrypt() 60 copy_mem(&out_buf[CRYPTOBOX_HEADER_LEN], input, input_len); in encrypt() 87 if(input_len > 0) in encrypt() 88 hmac->update(&out_buf[CRYPTOBOX_HEADER_LEN], input_len); in encrypt() 98 decrypt_bin(const uint8_t input[], size_t input_len, in decrypt_bin() argument 101 DataSource_Memory input_src(input, input_len); in decrypt_bin() 162 std::string decrypt(const uint8_t input[], size_t input_len, in decrypt() argument 165 const secure_vector<uint8_t> bin = decrypt_bin(input, input_len, passphrase); in decrypt()
|
/dports/mail/thunderbird/thunderbird-91.8.0/comm/third_party/botan/src/lib/misc/cryptobox/ |
H A D | cryptobox.cpp | 43 std::string encrypt(const uint8_t input[], size_t input_len, in encrypt() argument 54 secure_vector<uint8_t> out_buf(CRYPTOBOX_HEADER_LEN + input_len); in encrypt() 59 if(input_len > 0) in encrypt() 60 copy_mem(&out_buf[CRYPTOBOX_HEADER_LEN], input, input_len); in encrypt() 87 if(input_len > 0) in encrypt() 88 hmac->update(&out_buf[CRYPTOBOX_HEADER_LEN], input_len); in encrypt() 98 decrypt_bin(const uint8_t input[], size_t input_len, in decrypt_bin() argument 101 DataSource_Memory input_src(input, input_len); in decrypt_bin() 162 std::string decrypt(const uint8_t input[], size_t input_len, in decrypt() argument 165 const secure_vector<uint8_t> bin = decrypt_bin(input, input_len, passphrase); in decrypt()
|
/dports/security/botan2/Botan-2.18.2/src/lib/misc/cryptobox/ |
H A D | cryptobox.cpp | 43 std::string encrypt(const uint8_t input[], size_t input_len, in encrypt() argument 54 secure_vector<uint8_t> out_buf(CRYPTOBOX_HEADER_LEN + input_len); in encrypt() 59 if(input_len > 0) in encrypt() 60 copy_mem(&out_buf[CRYPTOBOX_HEADER_LEN], input, input_len); in encrypt() 87 if(input_len > 0) in encrypt() 88 hmac->update(&out_buf[CRYPTOBOX_HEADER_LEN], input_len); in encrypt() 98 decrypt_bin(const uint8_t input[], size_t input_len, in decrypt_bin() argument 101 DataSource_Memory input_src(input, input_len); in decrypt_bin() 162 std::string decrypt(const uint8_t input[], size_t input_len, in decrypt() argument 165 const secure_vector<uint8_t> bin = decrypt_bin(input, input_len, passphrase); in decrypt()
|
/dports/mail/dovecot/dovecot-2.3.17/src/lib-mail/ |
H A D | test-istream-dot.c | 22 size_t outsize, input_len, output_len; in test_istream_dot_one() local 30 input_len = strlen(test->input); in test_istream_dot_one() 33 (test->input[input_len-1] == '\n' || in test_istream_dot_one() 75 test_istream_set_size(test_input, input_len); in test_istream_dot_one() 78 test_istream_set_size(test_input, input_len); in test_istream_dot_one() 116 size_t outsize, input_len; in test_istream_dot_error() local 123 input_len = strlen(input_str); in test_istream_dot_error() 150 test_istream_set_size(test_input, input_len); in test_istream_dot_error() 153 test_istream_set_size(test_input, input_len); in test_istream_dot_error() 154 for (i = 1; i <= input_len; i++) { in test_istream_dot_error()
|
/dports/www/mod_security/modsecurity-2.9.3/apache2/ |
H A D | msc_util.c | 118 len = input_len * 4 + 1; in utf8_unicode_inplace_ex() 526 int len = input_len; in remove_quotes() 549 int len = input_len; in remove_escape() 734 len = input_len * 3 + 1; in url_encode() 1339 while(i < input_len) { in _log_escape() 1477 while (i < input_len) { in js_decode_nonstrict_inplace() 1599 while (i < input_len) { in urldecode_uni_nonstrict_inplace_ex() 1727 while (i < input_len) { in urldecode_nonstrict_inplace_ex() 1783 while((i < input_len)&&(count < input_len)) { in html_entities_decode_inplace() 1899 while(i < input_len) { in ansi_c_sequences_decode_inplace() [all …]
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/www/firefox/firefox-99.0/security/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/security/ca_root_nss/nss-3.71/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/security/nss/nss-3.76.1/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/lib/pkcs7/ |
H A D | p7local.c | 288 return input_len; in sec_PKCS7DecryptLength() 344 return input_len; in sec_PKCS7EncryptLength() 442 input_len--; in sec_PKCS7Decrypt() 450 if (input_len == 0 && !final) { in sec_PKCS7Decrypt() 508 ifraglen = input_len; in sec_PKCS7Decrypt() 511 if (ifraglen != input_len) { in sec_PKCS7Decrypt() 520 pcount = input_len - ifraglen; in sec_PKCS7Decrypt() 640 input_len--; in sec_PKCS7Encrypt() 679 if (input_len) { in sec_PKCS7Encrypt() 682 blocks = input_len / bsize; in sec_PKCS7Encrypt() [all …]
|
/dports/security/suricata/suricata-6.0.4/src/ |
H A D | app-layer-modbus.c | 1284 while (input_len > 0) { in ModbusParseRequest() 1285 uint32_t adu_len = input_len; in ModbusParseRequest() 1294 if (adu_len > input_len) in ModbusParseRequest() 1315 input_len -= adu_len; in ModbusParseRequest() 1349 while (input_len > 0) { in ModbusParseResponse() 1350 uint32_t adu_len = input_len; in ModbusParseResponse() 1359 if (adu_len > input_len) in ModbusParseResponse() 1389 input_len -= adu_len; in ModbusParseResponse() 1439 if (input_len < sizeof(ModbusHeader)) in ModbusProbingParser() 2332 input_len = sizeof(readCoilsRsp); in ModbusParserTest09() [all …]
|
/dports/sysutils/czkawka/czkawka-3.3.1/cargo-crates/rustdct-0.4.0/src/mdct/ |
H A D | mdct_naive.rs | 100 let input_len = input.len(); in process_imdct_split() localVariable 101 let half_input = input_len / 2; in process_imdct_split() 103 for k in 0..input_len { in process_imdct_split() 107 let twiddle_stride = input_len + k * 2 + 1; in process_imdct_split() 122 for k in 0..input_len { in process_imdct_split() 125 let twiddle_k = if k < input_len / 2 { in process_imdct_split() 128 input_len - k - 1 in process_imdct_split() 255 let input_len = i * 4; in test_matches_mdct() localVariable 258 let mut input = random_signal(input_len); in test_matches_mdct() 425 let input_len = i * 2; in test_matches_imdct() localVariable [all …]
|
/dports/www/grafana8/grafana-8.3.6/vendor/github.com/apache/arrow/cpp/src/arrow/util/ |
H A D | compression_zstd.cc | 62 Result<DecompressResult> Decompress(int64_t input_len, const uint8_t* input, in Decompress() argument 68 in_buf.size = static_cast<size_t>(input_len); in Decompress() 113 Result<CompressResult> Compress(int64_t input_len, const uint8_t* input, in Compress() argument 119 in_buf.size = static_cast<size_t>(input_len); in Compress() 181 Result<int64_t> Decompress(int64_t input_len, const uint8_t* input, in Decompress() argument 192 input, static_cast<size_t>(input_len)); in Decompress() 202 int64_t MaxCompressedLen(int64_t input_len, in MaxCompressedLen() argument 204 DCHECK_GE(input_len, 0); in MaxCompressedLen() 205 return ZSTD_compressBound(static_cast<size_t>(input_len)); in MaxCompressedLen() 208 Result<int64_t> Compress(int64_t input_len, const uint8_t* input, in Compress() argument [all …]
|