/dports/textproc/uim-gtk/uim-d1ac9d9/sigscheme/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/textproc/uim-gtk3/sigscheme-beb8fbd/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/textproc/uim-m17nlib/uim-d1ac9d9/sigscheme/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/textproc/uim-m17nlib/sigscheme-beb8fbd/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/textproc/uim-qt5/uim-d1ac9d9/sigscheme/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/textproc/uim-qt5/sigscheme-beb8fbd/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/textproc/uim-gtk3/uim-d1ac9d9/sigscheme/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/textproc/uim-gtk/sigscheme-beb8fbd/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/japanese/uim-anthy/sigscheme-beb8fbd/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/japanese/uim-anthy/uim-d1ac9d9/sigscheme/src/ |
H A D | number-io.c | 109 int digit, sign_len, pad_len, len; in scm_int2string() local 127 sign_len = (neg && vfmt.pad == '0') ? 1 : 0; in scm_int2string() 129 pad_len = (sign_len + len < vfmt.width) ? vfmt.width - sign_len - len : 0; in scm_int2string() 131 str = scm_malloc(sign_len + pad_len + len + sizeof("")); in scm_int2string() 132 strcpy(&str[sign_len + pad_len], p); in scm_int2string() 134 str[sign_len + --pad_len] = vfmt.pad; in scm_int2string() 136 if (sign_len) in scm_int2string()
|
/dports/devel/efl/efl-1.25.1/src/lib/eet/ |
H A D | eet_cipher.c | 470 size_t sign_len = 0; in eet_identity_sign() local 480 unsigned int sign_len = 0; in eet_identity_sign() local 530 sign_len = signum.size; in eet_identity_sign() 557 sign = malloc(sign_len); in eet_identity_sign() 611 if (fwrite(sign, sign_len, 1, fp) != 1) in eet_identity_sign() 660 int sign_len; in eet_identity_check() local 672 memcpy(&sign_len, header+1, sizeof(int)); in eet_identity_check() 676 sign_len = eina_ntohl(sign_len); in eet_identity_check() 688 cert_der = sign + sign_len; in eet_identity_check() 706 signature.size = sign_len; in eet_identity_check() [all …]
|
/dports/net/xrdp-devel/xrdp-0.9.16/keygen/ |
H A D | keygen.c | 215 char *sign_data, int sign_len) in sign_key() argument 221 if ((e_len != 4) || ((n_len != 64) && (n_len != 256)) || (sign_len != 64)) in sign_key() 248 ssl_mod_exp(sign_data, sign_len, md5_final, 64, (char *)g_ppk_n, 64, in sign_key() 277 ssl_mod_exp(sign_data, sign_len, md5_final, 64, (char *)g_ppk_n, 64, in sign_key() 343 const char *d_data, int d_len, const char *sign_data, int sign_len, in save_all() argument 383 write_out_line(fd, "pub_sig", sign_data, sign_len); in save_all() 407 int sign_len; in key_gen() local 417 sign_len = 64; in key_gen() 437 error = sign_key(e_data, e_len, n_data, n_len, sign_data, sign_len); in key_gen() 448 sign_data, sign_len, path_and_file_name); in key_gen()
|
/dports/x11-drivers/xorgxrdp/xrdp-0.9.17/keygen/ |
H A D | keygen.c | 215 char *sign_data, int sign_len) in sign_key() argument 221 if ((e_len != 4) || ((n_len != 64) && (n_len != 256)) || (sign_len != 64)) in sign_key() 248 ssl_mod_exp(sign_data, sign_len, md5_final, 64, (char *)g_ppk_n, 64, in sign_key() 277 ssl_mod_exp(sign_data, sign_len, md5_final, 64, (char *)g_ppk_n, 64, in sign_key() 343 const char *d_data, int d_len, const char *sign_data, int sign_len, in save_all() argument 383 write_out_line(fd, "pub_sig", sign_data, sign_len); in save_all() 407 int sign_len; in key_gen() local 417 sign_len = 64; in key_gen() 437 error = sign_key(e_data, e_len, n_data, n_len, sign_data, sign_len); in key_gen() 448 sign_data, sign_len, path_and_file_name); in key_gen()
|
/dports/sysutils/atf-sun50i_h6/arm-trusted-firmware-2.5/drivers/nxp/auth/csf_hdr_parser/ |
H A D | csf_hdr_parser.c | 298 void **img_sign, uint32_t *sign_len, in validate_esbc_header() argument 320 if (klen == (2 * hdr->sign_len)) { in validate_esbc_header() 322 if (((hdr->sign_len == RSA_1K_KEY_SZ_BYTES) || in validate_esbc_header() 323 (hdr->sign_len == RSA_2K_KEY_SZ_BYTES) || in validate_esbc_header() 324 (hdr->sign_len == RSA_4K_KEY_SZ_BYTES)) == 0) { in validate_esbc_header() 349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header() 358 *sign_len = hdr->sign_len; in validate_esbc_header()
|
H A D | plat_img_parser.c | 41 uint32_t sign_len; variable 65 ZERO_AND_CLEAN(sign_len); in clear_temp_vars() 98 &sign_len, &alg); in check_integrity() 166 *param_len = (unsigned int)sign_len; in get_auth_param()
|
/dports/sysutils/atf-rk3328/arm-trusted-firmware-2.5/drivers/nxp/auth/csf_hdr_parser/ |
H A D | csf_hdr_parser.c | 298 void **img_sign, uint32_t *sign_len, in validate_esbc_header() argument 320 if (klen == (2 * hdr->sign_len)) { in validate_esbc_header() 322 if (((hdr->sign_len == RSA_1K_KEY_SZ_BYTES) || in validate_esbc_header() 323 (hdr->sign_len == RSA_2K_KEY_SZ_BYTES) || in validate_esbc_header() 324 (hdr->sign_len == RSA_4K_KEY_SZ_BYTES)) == 0) { in validate_esbc_header() 349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header() 358 *sign_len = hdr->sign_len; in validate_esbc_header()
|
H A D | plat_img_parser.c | 41 uint32_t sign_len; variable 65 ZERO_AND_CLEAN(sign_len); in clear_temp_vars() 98 &sign_len, &alg); in check_integrity() 166 *param_len = (unsigned int)sign_len; in get_auth_param()
|
/dports/sysutils/atf-sun50i_a64/arm-trusted-firmware-2.5/drivers/nxp/auth/csf_hdr_parser/ |
H A D | csf_hdr_parser.c | 298 void **img_sign, uint32_t *sign_len, in validate_esbc_header() argument 320 if (klen == (2 * hdr->sign_len)) { in validate_esbc_header() 322 if (((hdr->sign_len == RSA_1K_KEY_SZ_BYTES) || in validate_esbc_header() 323 (hdr->sign_len == RSA_2K_KEY_SZ_BYTES) || in validate_esbc_header() 324 (hdr->sign_len == RSA_4K_KEY_SZ_BYTES)) == 0) { in validate_esbc_header() 349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header() 358 *sign_len = hdr->sign_len; in validate_esbc_header()
|
H A D | plat_img_parser.c | 41 uint32_t sign_len; variable 65 ZERO_AND_CLEAN(sign_len); in clear_temp_vars() 98 &sign_len, &alg); in check_integrity() 166 *param_len = (unsigned int)sign_len; in get_auth_param()
|
/dports/sysutils/atf-fvp/arm-trusted-firmware-2.5/drivers/nxp/auth/csf_hdr_parser/ |
H A D | csf_hdr_parser.c | 298 void **img_sign, uint32_t *sign_len, in validate_esbc_header() argument 320 if (klen == (2 * hdr->sign_len)) { in validate_esbc_header() 322 if (((hdr->sign_len == RSA_1K_KEY_SZ_BYTES) || in validate_esbc_header() 323 (hdr->sign_len == RSA_2K_KEY_SZ_BYTES) || in validate_esbc_header() 324 (hdr->sign_len == RSA_4K_KEY_SZ_BYTES)) == 0) { in validate_esbc_header() 349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header() 358 *sign_len = hdr->sign_len; in validate_esbc_header()
|
H A D | plat_img_parser.c | 41 uint32_t sign_len; variable 65 ZERO_AND_CLEAN(sign_len); in clear_temp_vars() 98 &sign_len, &alg); in check_integrity() 166 *param_len = (unsigned int)sign_len; in get_auth_param()
|
/dports/sysutils/atf-rk3399/arm-trusted-firmware-2.5/drivers/nxp/auth/csf_hdr_parser/ |
H A D | csf_hdr_parser.c | 298 void **img_sign, uint32_t *sign_len, in validate_esbc_header() argument 320 if (klen == (2 * hdr->sign_len)) { in validate_esbc_header() 322 if (((hdr->sign_len == RSA_1K_KEY_SZ_BYTES) || in validate_esbc_header() 323 (hdr->sign_len == RSA_2K_KEY_SZ_BYTES) || in validate_esbc_header() 324 (hdr->sign_len == RSA_4K_KEY_SZ_BYTES)) == 0) { in validate_esbc_header() 349 if (!(memcmp(s, key, hdr->sign_len) < 0)) { in validate_esbc_header() 358 *sign_len = hdr->sign_len; in validate_esbc_header()
|
H A D | plat_img_parser.c | 41 uint32_t sign_len; variable 65 ZERO_AND_CLEAN(sign_len); in clear_temp_vars() 98 &sign_len, &alg); in check_integrity() 166 *param_len = (unsigned int)sign_len; in get_auth_param()
|
/dports/sysutils/bareos-server/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/ |
H A D | v2.c | 158 u_int sign_len; in dpl_s3_add_authorization_v2_to_headers() local 178 sizeof(sign_str), &sign_len); in dpl_s3_add_authorization_v2_to_headers() 185 sign_str, sign_len, hmac_str); in dpl_s3_add_authorization_v2_to_headers() 216 u_int sign_len; in dpl_s3_get_authorization_v2_params() local 226 sizeof(sign_str), &sign_len); in dpl_s3_get_authorization_v2_params() 232 sign_str, sign_len, hmac_str); in dpl_s3_get_authorization_v2_params()
|
/dports/sysutils/bareos-client/bareos-Release-20.0.3/core/src/droplet/libdroplet/src/backend/s3/auth/ |
H A D | v2.c | 158 u_int sign_len; in dpl_s3_add_authorization_v2_to_headers() local 178 sizeof(sign_str), &sign_len); in dpl_s3_add_authorization_v2_to_headers() 185 sign_str, sign_len, hmac_str); in dpl_s3_add_authorization_v2_to_headers() 216 u_int sign_len; in dpl_s3_get_authorization_v2_params() local 226 sizeof(sign_str), &sign_len); in dpl_s3_get_authorization_v2_params() 232 sign_str, sign_len, hmac_str); in dpl_s3_get_authorization_v2_params()
|