/dports/net/fort/FORT-validator-1.5.3/src/asn1/asn1c/ |
H A D | constr_SET_OF.c | 1224 size_t rnd_len; in SET_OF_random_fill() local 1270 rnd_len = 0; in SET_OF_random_fill() 1274 rnd_len = slb - 1; in SET_OF_random_fill() 1276 rnd_len = 0; in SET_OF_random_fill() 1284 rnd_len = sub + 1; in SET_OF_random_fill() 1286 rnd_len = max_length; in SET_OF_random_fill() 1293 rnd_len = max_length; in SET_OF_random_fill() 1297 rnd_len = max_length; in SET_OF_random_fill() 1304 rnd_len = asn_random_between(slb, sub); in SET_OF_random_fill() 1326 for(; rnd_len > 0; rnd_len--) { in SET_OF_random_fill() [all …]
|
H A D | OCTET_STRING.c | 1883 size_t rnd_len; in OCTET_STRING_random_length_constrained() local 1886 rnd_len = lengths[asn_random_between( in OCTET_STRING_random_length_constrained() 1913 if(rnd_len <= max_length) { in OCTET_STRING_random_length_constrained() 1922 rnd_len = in OCTET_STRING_random_length_constrained() 1928 } else if(rnd_len > max_length) { in OCTET_STRING_random_length_constrained() 1932 return rnd_len; in OCTET_STRING_random_length_constrained() 1951 size_t rnd_len; in OCTET_STRING_random_fill() local 1992 rnd_len = in OCTET_STRING_random_fill() 1995 buf = CALLOC(unit_bytes, rnd_len + 1); in OCTET_STRING_random_fill() 1998 bend = &buf[unit_bytes * rnd_len]; in OCTET_STRING_random_fill() [all …]
|
H A D | BIT_STRING.c | 560 size_t rnd_bits, rnd_len; in BIT_STRING_random_fill() local 620 rnd_len = (rnd_bits + 7) / 8; in BIT_STRING_random_fill() 621 buf = CALLOC(1, rnd_len + 1); in BIT_STRING_random_fill() 624 bend = &buf[rnd_len]; in BIT_STRING_random_fill() 643 st->size = rnd_len; in BIT_STRING_random_fill()
|
/dports/www/firefox-legacy/firefox-52.8.0esr/security/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 31 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 49 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 55 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 56 PORT_Memcpy(&ss->ssl3.hs.client_random.rand[offset], rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 19 size_t rnd_len, uint8_t *msg,
|
/dports/security/gnutls/gnutls-3.6.16/lib/ |
H A D | hash_int.c | 451 uint8_t * rnd, int rnd_len, void *digest) in ssl3_sha() argument 470 _gnutls_hash(&td, rnd, rnd_len); in ssl3_sha() 481 uint8_t * rnd, int rnd_len, void *digest) in ssl3_md5() argument 495 ret = ssl3_sha(i, secret, secret_len, rnd, rnd_len, tmp); in ssl3_md5() 510 void *rnd, int rnd_len, in _gnutls_ssl3_generate_random() argument 529 ssl3_md5(i, secret, secret_len, rnd, rnd_len, digest); in _gnutls_ssl3_generate_random()
|
/dports/lang/spidermonkey60/firefox-60.9.0/security/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 30 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 40 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 46 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 47 PORT_Memcpy(ss->ssl3.hs.client_random + offset, rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 21 size_t rnd_len, uint8_t *msg,
|
/dports/lang/spidermonkey78/firefox-78.9.0/security/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 102 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 112 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 118 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 119 PORT_Memcpy(ss->ssl3.hs.client_random + offset, rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 21 size_t rnd_len, uint8_t *msg,
|
/dports/www/firefox-esr/firefox-91.8.0/security/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 122 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 132 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 138 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 139 PORT_Memcpy(ss->ssl3.hs.client_random + offset, rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 21 size_t rnd_len, uint8_t *msg,
|
/dports/www/firefox/firefox-99.0/security/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 122 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 132 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 138 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 139 PORT_Memcpy(ss->ssl3.hs.client_random + offset, rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 21 size_t rnd_len, uint8_t *msg,
|
/dports/security/ca_root_nss/nss-3.71/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 122 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 132 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 138 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 139 PORT_Memcpy(ss->ssl3.hs.client_random + offset, rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 21 size_t rnd_len, uint8_t *msg,
|
/dports/security/nss/nss-3.76.1/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 122 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 132 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 138 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 139 PORT_Memcpy(ss->ssl3.hs.client_random + offset, rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 21 size_t rnd_len, uint8_t *msg,
|
/dports/mail/thunderbird/thunderbird-91.8.0/security/nss/gtests/ssl_gtest/ |
H A D | libssl_internals.c | 122 size_t rnd_len, uint8_t *msg, in SSLInt_UpdateSSLv2ClientRandom() argument 132 rnd_len = PR_MIN(SSL3_RANDOM_LENGTH, rnd_len); in SSLInt_UpdateSSLv2ClientRandom() 138 size_t offset = SSL3_RANDOM_LENGTH - rnd_len; in SSLInt_UpdateSSLv2ClientRandom() 139 PORT_Memcpy(ss->ssl3.hs.client_random + offset, rnd, rnd_len); in SSLInt_UpdateSSLv2ClientRandom()
|
H A D | libssl_internals.h | 21 size_t rnd_len, uint8_t *msg,
|
/dports/mail/hashcash/hashcash-1.22/ |
H A D | libhc.c | 319 int ver_len = 0 , utct_len = 0 , res_len = 0 , bit_len = 0 , rnd_len = 0 , cnt_len = 0 ; in hashcash_parse() local 340 !sstrtok( NULL, ":", &rnd, 0, &rnd_len, &state ) ) { in hashcash_parse() 348 !sstrtok( NULL, ":", &rnd, 0, &rnd_len, &state ) || in hashcash_parse() 355 if ( rnd == NULL || strspn( rnd, VALID_STR_CHARS ) != rnd_len ) { return 0; } in hashcash_parse()
|
/dports/games/tycho/species/ |
H A D | chromosome.hpp | 45 void rnd_len();
|
H A D | chromosome.cpp | 64 void CChromosome::rnd_len() { in rnd_len() function in CChromosome
|
/dports/games/species/species/ |
H A D | chromosome.hpp | 45 void rnd_len();
|
H A D | chromosome.cpp | 64 void CChromosome::rnd_len() { in rnd_len() function in CChromosome
|