Home
last modified time | relevance | path

Searched refs:modlen (Results 126 – 150 of 246) sorted by last modified time

12345678910

/dports/graphics/photoflow/PhotoFlow-8472024f/src/operations/
H A Dgradient.cc102 int modlen = 0, modh = 0; in build() local
105 modlen = out->Xsize; in build()
109 modlen = out->Ysize; in build()
115 if( modlen > 0 ) { in build()
116 modvec = (float*)realloc( modvec, sizeof(float)*modlen); in build()
118 for(int i = 0; i < modlen; i++) { in build()
119 float x = ((float)i)/(modlen-1); in build()
/dports/net/rsync/rsync-3.2.3/patches/
H A Dkerberos.diff44 int i, modlen;
/dports/devel/log4cxx/apache-log4cxx-0.11.0/src/main/cpp/
H A Dnteventlogappender.cpp240 DWORD modlen = GetModuleFileNameW(hmodule, modpath, _MAX_PATH - 1); in addRegistryInfo() local
242 if (modlen > 0) in addRegistryInfo()
244 modpath[modlen] = 0; in addRegistryInfo()
/dports/net/rsync/rsync-3.2.3/
H A Dclientserver.c222 int i, modlen; in start_inband_exchange() local
237 modlen = strlen(*argv); in start_inband_exchange()
239 modlen = p - *argv; in start_inband_exchange()
241 modname = new_array(char, modlen+1+1); /* room for '/' & '\0' */ in start_inband_exchange()
242 strlcpy(modname, *argv, modlen + 1); in start_inband_exchange()
243 modname[modlen] = '/'; in start_inband_exchange()
244 modname[modlen+1] = '\0'; in start_inband_exchange()
297 if (strncmp(*argv, modname, modlen) == 0 in start_inband_exchange()
298 && argv[0][modlen] == '\0') in start_inband_exchange()
314 io_printf(f_out, "%.*s\n", modlen, modname); in start_inband_exchange()
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/miekg/dns/
H A Ddnssec.go553 modlen := len(keybuf) - modoff
554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
/dports/dns/cli53/cli53-0.8.18/vendor/github.com/miekg/dns/
H A Ddnssec.go553 modlen := len(keybuf) - modoff
554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/vendor/github.com/miekg/dns/
H A Ddnssec.go553 modlen := len(keybuf) - modoff
554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/test/jdk/sun/security/tools/keytool/fakegen/java.base/sun/security/provider/
H A DDSAKeyPairGenerator.java44 public void initialize(int modlen, SecureRandom random) { in initialize() argument
45 this.plen = modlen; in initialize()
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/java/security/interfaces/
H A DDSAKeyPairGenerator.java119 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/cad/xcircuit/xcircuit-3.10.30/
H A Dnetlist.c4385 int modlen; in topflat() local
4396 modlen = strlen(mode); in topflat()
4397 locmode = malloc(2 + modlen); in topflat()
4399 locmode[modlen + 1] = '\0'; in topflat()
4403 locmode[modlen] = '@'; in topflat()
4419 locmode[modlen] = '-'; in topflat()
4701 modlen = strlen(mode); in writehierarchy()
4702 locmode = malloc(2 + modlen); in writehierarchy()
4704 locmode[modlen + 1] = '\0'; in writehierarchy()
4708 locmode[modlen] = '@'; in writehierarchy()
[all …]
/dports/net-mgmt/blackbox_exporter/blackbox_exporter-0.17.0/vendor/github.com/miekg/dns/
H A Ddnssec.go553 modlen := len(keybuf) - modoff
554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
/dports/ftp/uftp/uftp-5.0/
H A Duftp.h364 uint16_t modlen; member
H A Dencrypt_cng.c1021 if (sizeof(struct rsa_blob_t) + ntohs(rsablob->modlen) != bloblen) { in import_RSA_key()
1027 ntohs(rsablob->modlen); in import_RSA_key()
1034 blobheader->BitLength = ntohs(rsablob->modlen) * 8; in import_RSA_key()
1036 blobheader->cbModulus = ntohs(rsablob->modlen); in import_RSA_key()
1041 memcpy(buf_mod, modulus, ntohs(rsablob->modlen)); in import_RSA_key()
1108 rsablob->modlen = htons((uint16_t)blobheader->cbModulus); in export_RSA_key()
H A Dencrypt_openssl.c822 if (sizeof(struct rsa_blob_t) + ntohs(rsablob->modlen) != bloblen) { in import_RSA_key()
838 n = BN_bin2bn(modulus, ntohs(rsablob->modlen), NULL); in import_RSA_key()
868 int explen, modlen, i; in export_RSA_key() local
897 if ((modlen = BN_bn2bin(n, modulus)) <= 0) { in export_RSA_key()
903 rsablob->modlen = htons(modlen); in export_RSA_key()
905 *bloblen = sizeof(struct rsa_blob_t) + modlen; in export_RSA_key()
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/java/security/interfaces/
H A DDSAKeyPairGenerator.java119 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument
/dports/mail/py-dkimpy/dkimpy-1.0.5/dkim/
H A Dcrypto.py266 modlen = len(int2str(private_key['modulus']))
267 encoded_digest = EMSA_PKCS1_v1_5_encode(hash, modlen)
268 return rsa_decrypt(encoded_digest, private_key, modlen)
279 modlen = len(int2str(public_key['modulus']))
280 encoded_digest = EMSA_PKCS1_v1_5_encode(hash, modlen)
281 signed_digest = rsa_encrypt(signature, public_key, modlen)
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/crypto/
H A Dcrypto_libtomcrypt.c492 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument
509 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block()
512 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block()
521 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block()
559 unsigned long len, modlen; in crypto_rsa_encrypt_pkcs1() local
562 modlen = mp_unsigned_bin_size(key->N); in crypto_rsa_encrypt_pkcs1()
564 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in crypto_rsa_encrypt_pkcs1()
569 res = rsa_exptmod(out, modlen, out, &len, key_type, key); in crypto_rsa_encrypt_pkcs1()
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/tls/
H A Drsa.c253 size_t modlen; in crypto_rsa_exptmod() local
312 modlen = crypto_rsa_get_modulus_len(key); in crypto_rsa_exptmod()
313 if (modlen > *outlen) { in crypto_rsa_exptmod()
314 *outlen = modlen; in crypto_rsa_exptmod()
318 if (bignum_get_unsigned_bin_len(tmp) > modlen) in crypto_rsa_exptmod()
321 *outlen = modlen; in crypto_rsa_exptmod()
322 os_memset(out, 0, modlen); in crypto_rsa_exptmod()
325 (modlen - bignum_get_unsigned_bin_len(tmp)), NULL) < 0) in crypto_rsa_exptmod()
H A Dpkcs1.c22 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument
39 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block()
42 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block()
51 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block()
89 size_t modlen; in pkcs1_encrypt() local
91 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt()
93 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt()
97 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/vendor/github.com/miekg/dns/
H A Ddnssec.go553 modlen := len(keybuf) - modoff
554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/prometheus/prometheus/vendor/github.com/miekg/dns/
H A Ddnssec.go553 modlen := len(keybuf) - modoff
554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/miekg/dns/
H A Ddnssec.go553 modlen := len(keybuf) - modoff
554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
/dports/devel/tinygo/tinygo-0.14.1/lib/wasi-libc/libc-top-half/musl/src/locale/
H A Ddcngettext.c152 size_t dirlen, loclen, catlen, modlen, alt_modlen; in dcngettext() local
167 alt_modlen = modlen = loclen - (modname-locname); in dcngettext()
174 char name[dirlen+1 + loclen+modlen+1 + catlen+1 + domlen+3 + 1]; in dcngettext()
188 alt_modlen = modlen; in dcngettext()

12345678910