/dports/graphics/photoflow/PhotoFlow-8472024f/src/operations/ |
H A D | gradient.cc | 102 int modlen = 0, modh = 0; in build() local 105 modlen = out->Xsize; in build() 109 modlen = out->Ysize; in build() 115 if( modlen > 0 ) { in build() 116 modvec = (float*)realloc( modvec, sizeof(float)*modlen); in build() 118 for(int i = 0; i < modlen; i++) { in build() 119 float x = ((float)i)/(modlen-1); in build()
|
/dports/net/rsync/rsync-3.2.3/patches/ |
H A D | kerberos.diff | 44 int i, modlen;
|
/dports/devel/log4cxx/apache-log4cxx-0.11.0/src/main/cpp/ |
H A D | nteventlogappender.cpp | 240 DWORD modlen = GetModuleFileNameW(hmodule, modpath, _MAX_PATH - 1); in addRegistryInfo() local 242 if (modlen > 0) in addRegistryInfo() 244 modpath[modlen] = 0; in addRegistryInfo()
|
/dports/net/rsync/rsync-3.2.3/ |
H A D | clientserver.c | 222 int i, modlen; in start_inband_exchange() local 237 modlen = strlen(*argv); in start_inband_exchange() 239 modlen = p - *argv; in start_inband_exchange() 241 modname = new_array(char, modlen+1+1); /* room for '/' & '\0' */ in start_inband_exchange() 242 strlcpy(modname, *argv, modlen + 1); in start_inband_exchange() 243 modname[modlen] = '/'; in start_inband_exchange() 244 modname[modlen+1] = '\0'; in start_inband_exchange() 297 if (strncmp(*argv, modname, modlen) == 0 in start_inband_exchange() 298 && argv[0][modlen] == '\0') in start_inband_exchange() 314 io_printf(f_out, "%.*s\n", modlen, modname); in start_inband_exchange()
|
/dports/net-im/dendrite/dendrite-0.5.1/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 553 modlen := len(keybuf) - modoff 554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
|
/dports/dns/cli53/cli53-0.8.18/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 553 modlen := len(keybuf) - modoff 554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
|
/dports/sysutils/gomplate/gomplate-3.9.0/vendor/github.com/hashicorp/consul/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 553 modlen := len(keybuf) - modoff 554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/test/jdk/sun/security/tools/keytool/fakegen/java.base/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 44 public void initialize(int modlen, SecureRandom random) { in initialize() argument 45 this.plen = modlen; in initialize()
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/java/security/interfaces/ |
H A D | DSAKeyPairGenerator.java | 119 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/cad/xcircuit/xcircuit-3.10.30/ |
H A D | netlist.c | 4385 int modlen; in topflat() local 4396 modlen = strlen(mode); in topflat() 4397 locmode = malloc(2 + modlen); in topflat() 4399 locmode[modlen + 1] = '\0'; in topflat() 4403 locmode[modlen] = '@'; in topflat() 4419 locmode[modlen] = '-'; in topflat() 4701 modlen = strlen(mode); in writehierarchy() 4702 locmode = malloc(2 + modlen); in writehierarchy() 4704 locmode[modlen + 1] = '\0'; in writehierarchy() 4708 locmode[modlen] = '@'; in writehierarchy() [all …]
|
/dports/net-mgmt/blackbox_exporter/blackbox_exporter-0.17.0/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 553 modlen := len(keybuf) - modoff 554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
|
/dports/ftp/uftp/uftp-5.0/ |
H A D | uftp.h | 364 uint16_t modlen; member
|
H A D | encrypt_cng.c | 1021 if (sizeof(struct rsa_blob_t) + ntohs(rsablob->modlen) != bloblen) { in import_RSA_key() 1027 ntohs(rsablob->modlen); in import_RSA_key() 1034 blobheader->BitLength = ntohs(rsablob->modlen) * 8; in import_RSA_key() 1036 blobheader->cbModulus = ntohs(rsablob->modlen); in import_RSA_key() 1041 memcpy(buf_mod, modulus, ntohs(rsablob->modlen)); in import_RSA_key() 1108 rsablob->modlen = htons((uint16_t)blobheader->cbModulus); in export_RSA_key()
|
H A D | encrypt_openssl.c | 822 if (sizeof(struct rsa_blob_t) + ntohs(rsablob->modlen) != bloblen) { in import_RSA_key() 838 n = BN_bin2bn(modulus, ntohs(rsablob->modlen), NULL); in import_RSA_key() 868 int explen, modlen, i; in export_RSA_key() local 897 if ((modlen = BN_bn2bin(n, modulus)) <= 0) { in export_RSA_key() 903 rsablob->modlen = htons(modlen); in export_RSA_key() 905 *bloblen = sizeof(struct rsa_blob_t) + modlen; in export_RSA_key()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/java/security/interfaces/ |
H A D | DSAKeyPairGenerator.java | 119 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument
|
/dports/mail/py-dkimpy/dkimpy-1.0.5/dkim/ |
H A D | crypto.py | 266 modlen = len(int2str(private_key['modulus'])) 267 encoded_digest = EMSA_PKCS1_v1_5_encode(hash, modlen) 268 return rsa_decrypt(encoded_digest, private_key, modlen) 279 modlen = len(int2str(public_key['modulus'])) 280 encoded_digest = EMSA_PKCS1_v1_5_encode(hash, modlen) 281 signed_digest = rsa_encrypt(signature, public_key, modlen)
|
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/crypto/ |
H A D | crypto_libtomcrypt.c | 492 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument 509 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 512 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block() 521 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block() 559 unsigned long len, modlen; in crypto_rsa_encrypt_pkcs1() local 562 modlen = mp_unsigned_bin_size(key->N); in crypto_rsa_encrypt_pkcs1() 564 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in crypto_rsa_encrypt_pkcs1() 569 res = rsa_exptmod(out, modlen, out, &len, key_type, key); in crypto_rsa_encrypt_pkcs1()
|
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/tls/ |
H A D | rsa.c | 253 size_t modlen; in crypto_rsa_exptmod() local 312 modlen = crypto_rsa_get_modulus_len(key); in crypto_rsa_exptmod() 313 if (modlen > *outlen) { in crypto_rsa_exptmod() 314 *outlen = modlen; in crypto_rsa_exptmod() 318 if (bignum_get_unsigned_bin_len(tmp) > modlen) in crypto_rsa_exptmod() 321 *outlen = modlen; in crypto_rsa_exptmod() 322 os_memset(out, 0, modlen); in crypto_rsa_exptmod() 325 (modlen - bignum_get_unsigned_bin_len(tmp)), NULL) < 0) in crypto_rsa_exptmod()
|
H A D | pkcs1.c | 22 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument 39 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 42 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block() 51 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block() 89 size_t modlen; in pkcs1_encrypt() local 91 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt() 93 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt() 97 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
|
/dports/security/vault/vault-1.8.2/vendor/github.com/hashicorp/consul/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 553 modlen := len(keybuf) - modoff 554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
|
/dports/net-mgmt/thanos/thanos-0.11.0/vendor/github.com/prometheus/prometheus/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 553 modlen := len(keybuf) - modoff 554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
|
/dports/www/pomerium/pomerium-0.8.3/vendor/github.com/miekg/dns/ |
H A D | dnssec.go | 553 modlen := len(keybuf) - modoff 554 if modlen < 64 || modlen > 512 || keybuf[modoff] == 0 {
|
/dports/devel/tinygo/tinygo-0.14.1/lib/wasi-libc/libc-top-half/musl/src/locale/ |
H A D | dcngettext.c | 152 size_t dirlen, loclen, catlen, modlen, alt_modlen; in dcngettext() local 167 alt_modlen = modlen = loclen - (modname-locname); in dcngettext() 174 char name[dirlen+1 + loclen+modlen+1 + catlen+1 + domlen+3 + 1]; in dcngettext() 188 alt_modlen = modlen; in dcngettext()
|