Searched refs:npad (Results 1 - 8 of 8) sorted by relevance
/netbsd-current/external/mpl/bind/dist/bin/tests/system/padding/ |
H A D | tests.sh | 104 npad=$(nextpart ns2/named.stats | awk '/EDNS padding option received/ { print $1}') 105 if [ "$opad" -eq "$npad" ]; then 106 echo_i "error: opad ($opad) == npad ($npad)" 122 npad=$(nextpart ns2/named.stats | awk '/EDNS padding option received/ { print $1}') 123 if [ "$opad" -ne "$npad" ]; then 124 echo_i "error: opad ($opad) != npad ($npad)"
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/crypto/dh/ |
H A D | dh_key.c | 35 volatile size_t npad = 0, mask = 1; local 44 npad += mask; 48 ret -= npad; 49 /* key-dependent memory access, potentially leaking npad / ret */ 50 memmove(key, key + npad, ret); 51 /* key-dependent memory access, potentially leaking npad / ret */ 52 memset(key + ret, 0, npad);
|
/netbsd-current/usr.sbin/fwctl/ |
H A D | fwdv.c | 101 int len, tlen, npad, fd, k, m, vec, lsystem = -1, nb; local 219 npad = ((nb - m) % nb); 220 if (npad < 0) 221 npad += nb; 223 npad); 224 npad *= DSIZE; 226 wbuf[vec++].iov_len = npad;
|
/netbsd-current/crypto/external/bsd/openssl/dist/crypto/dh/ |
H A D | dh_key.c | 117 volatile size_t npad = 0, mask = 1; local 131 npad += mask; 135 ret -= npad; 136 /* key-dependent memory access, potentially leaking npad / ret */ 137 memmove(key, key + npad, ret); 138 /* key-dependent memory access, potentially leaking npad / ret */ 139 memset(key + ret, 0, npad);
|
/netbsd-current/crypto/external/bsd/openssl.old/dist/ssl/record/ |
H A D | ssl3_record.c | 1190 size_t npad; local 1207 npad = (48 / md_size) * md_size; 1219 * npad is, at most, 48 bytes and that's with MD5: 1223 * goes up 4, but npad goes down by 8, resulting in a smaller 1230 memcpy(header + j, ssl3_pad_1, npad); 1231 j += npad; 1258 || EVP_DigestUpdate(md_ctx, ssl3_pad_1, npad) <= 0 1266 || EVP_DigestUpdate(md_ctx, ssl3_pad_2, npad) <= 0
|
/netbsd-current/crypto/external/bsd/openssl/dist/ssl/record/ |
H A D | ssl3_record.c | 1313 size_t npad; local 1330 npad = (48 / md_size) * md_size; 1345 * npad is, at most, 48 bytes and that's with MD5: 1349 * goes up 4, but npad goes down by 8, resulting in a smaller 1356 memcpy(header + j, ssl3_pad_1, npad); 1357 j += npad; 1385 || EVP_DigestUpdate(md_ctx, ssl3_pad_1, npad) <= 0 1393 || EVP_DigestUpdate(md_ctx, ssl3_pad_2, npad) <= 0
|
/netbsd-current/external/gpl3/gcc.old/dist/gcc/fortran/ |
H A D | simplify.c | 6674 int i, rank, npad, x[GFC_MAX_DIMENSIONS]; local 6780 npad = 0; 6784 npad = mpz_get_ui (size); 6809 while (nsource > 0 || npad > 0) 6830 if (npad <= 0) 6836 j = j % npad;
|
/netbsd-current/external/gpl3/gcc/dist/gcc/fortran/ |
H A D | simplify.cc | 6805 int i, rank, npad, x[GFC_MAX_DIMENSIONS]; local 6912 npad = 0; 6916 npad = mpz_get_ui (size); 6950 while (nsource > 0 || npad > 0) 6971 if (npad <= 0) 6977 j = j % npad;
|
Completed in 294 milliseconds