/third_party/mbedtls/library/ |
H A D | ccm.c | 195 ctx->y[0] |= (ctx->add_len > 0) << 6; in ccm_calculate_first_block_if_ready() 281 ctx->add_len = total_ad_len; in mbedtls_ccm_set_lengths() 291 size_t add_len) in mbedtls_ccm_update_ad() 303 if (add_len > 0) { in mbedtls_ccm_update_ad() 309 if (add_len > ctx->add_len) { in mbedtls_ccm_update_ad() 313 ctx->y[0] ^= (unsigned char) ((ctx->add_len >> 8) & 0xFF); in mbedtls_ccm_update_ad() 314 ctx->y[1] ^= (unsigned char) ((ctx->add_len) & 0xFF); in mbedtls_ccm_update_ad() 317 } else if (ctx->processed + add_len > ctx->add_len) { in mbedtls_ccm_update_ad() 289 mbedtls_ccm_update_ad(mbedtls_ccm_context *ctx, const unsigned char *add, size_t add_len) mbedtls_ccm_update_ad() argument 512 ccm_auth_crypt(mbedtls_ccm_context *ctx, int mode, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, unsigned char *tag, size_t tag_len) ccm_auth_crypt() argument 548 mbedtls_ccm_star_encrypt_and_tag(mbedtls_ccm_context *ctx, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, unsigned char *tag, size_t tag_len) mbedtls_ccm_star_encrypt_and_tag() argument 558 mbedtls_ccm_encrypt_and_tag(mbedtls_ccm_context *ctx, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, unsigned char *tag, size_t tag_len) mbedtls_ccm_encrypt_and_tag() argument 585 ccm_auth_decrypt(mbedtls_ccm_context *ctx, int mode, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, const unsigned char *tag, size_t tag_len) ccm_auth_decrypt() argument 608 mbedtls_ccm_star_auth_decrypt(mbedtls_ccm_context *ctx, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, const unsigned char *tag, size_t tag_len) mbedtls_ccm_star_auth_decrypt() argument 619 mbedtls_ccm_auth_decrypt(mbedtls_ccm_context *ctx, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, const unsigned char *tag, size_t tag_len) mbedtls_ccm_auth_decrypt() argument [all...] |
H A D | hmac_drbg.c | 45 size_t add_len) in mbedtls_hmac_drbg_update() 48 unsigned char rounds = (additional != NULL && add_len != 0) ? 2 : 1; in mbedtls_hmac_drbg_update() 68 additional, add_len)) != 0) { in mbedtls_hmac_drbg_update() 308 const unsigned char *additional, size_t add_len) in mbedtls_hmac_drbg_random_with_add() 322 if (add_len > MBEDTLS_HMAC_DRBG_MAX_INPUT) { in mbedtls_hmac_drbg_random_with_add() 330 if ((ret = mbedtls_hmac_drbg_reseed(ctx, additional, add_len)) != 0) { in mbedtls_hmac_drbg_random_with_add() 334 add_len = 0; /* VII.4 */ in mbedtls_hmac_drbg_random_with_add() 338 if (additional != NULL && add_len != 0) { in mbedtls_hmac_drbg_random_with_add() 340 additional, add_len)) != 0) { in mbedtls_hmac_drbg_random_with_add() 367 additional, add_len)) ! in mbedtls_hmac_drbg_random_with_add() 43 mbedtls_hmac_drbg_update(mbedtls_hmac_drbg_context *ctx, const unsigned char *additional, size_t add_len) mbedtls_hmac_drbg_update() argument 306 mbedtls_hmac_drbg_random_with_add(void *p_rng, unsigned char *output, size_t out_len, const unsigned char *additional, size_t add_len) mbedtls_hmac_drbg_random_with_add() argument [all...] |
H A D | gcm.c | 401 ctx->add_len = 0; in mbedtls_gcm_starts() 453 * mbedtls_gcm_context::add_len and mbedtls_gcm_context::len indicate 455 * * len == 0 && add_len == 0: initial state 456 * * len == 0 && add_len % 16 != 0: the first `add_len % 16` bytes have 459 * * len == 0 && add_len % 16 == 0: the authentication tag is correct if 468 const unsigned char *add, size_t add_len) in mbedtls_gcm_update_ad() 477 if (add_len > 0xFFFFFFFFFFFFFFFFULL) { in mbedtls_gcm_update_ad() 481 new_add_len = ctx->add_len + (uint64_t) add_len; in mbedtls_gcm_update_ad() 467 mbedtls_gcm_update_ad(mbedtls_gcm_context *ctx, const unsigned char *add, size_t add_len) mbedtls_gcm_update_ad() argument 703 mbedtls_gcm_crypt_and_tag(mbedtls_gcm_context *ctx, int mode, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *input, unsigned char *output, size_t tag_len, unsigned char *tag) mbedtls_gcm_crypt_and_tag() argument 738 mbedtls_gcm_auth_decrypt(mbedtls_gcm_context *ctx, size_t length, const unsigned char *iv, size_t iv_len, const unsigned char *add, size_t add_len, const unsigned char *tag, size_t tag_len, const unsigned char *input, unsigned char *output) mbedtls_gcm_auth_decrypt() argument [all...] |
H A D | ctr_drbg.c | 400 * mbedtls_ctr_drbg_update(ctx, additional, add_len) 407 * additional[:add_len] = entropy_input || nonce || personalization_string 413 size_t add_len) in mbedtls_ctr_drbg_update() 418 if (add_len == 0) { in mbedtls_ctr_drbg_update() 422 if ((ret = block_cipher_df(add_input, additional, add_len)) != 0) { in mbedtls_ctr_drbg_update() 591 * mbedtls_ctr_drbg_random_with_add(ctx, output, output_len, additional, add_len) 593 * CTR_DRBG_Reseed(working_state, entropy_input, additional[:add_len]) 602 * additional[:add_len] = additional_input 611 const unsigned char *additional, size_t add_len) in mbedtls_ctr_drbg_random_with_add() 626 if (add_len > MBEDTLS_CTR_DRBG_MAX_INPU in mbedtls_ctr_drbg_random_with_add() 411 mbedtls_ctr_drbg_update(mbedtls_ctr_drbg_context *ctx, const unsigned char *additional, size_t add_len) mbedtls_ctr_drbg_update() argument 609 mbedtls_ctr_drbg_random_with_add(void *p_rng, unsigned char *output, size_t output_len, const unsigned char *additional, size_t add_len) mbedtls_ctr_drbg_random_with_add() argument [all...] |
H A D | pem.c | 500 size_t len = 0, use_len, add_len = 0; in mbedtls_pem_write_buffer() local 503 add_len = strlen(header) + strlen(footer) + (((use_len > 2) ? (use_len - 2) : 0) / 64) + 1; in mbedtls_pem_write_buffer() 505 if (use_len + add_len > buf_len) { in mbedtls_pem_write_buffer() 506 *olen = use_len + add_len; in mbedtls_pem_write_buffer()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
H A D | wpabuf.c | 47 int wpabuf_resize(struct wpabuf **_buf, size_t add_len) in wpabuf_resize() argument 55 *_buf = wpabuf_alloc(add_len); in wpabuf_resize() 69 if (buf->used + add_len > buf->size) { in wpabuf_resize() 72 nbuf = os_realloc(buf->buf, buf->used + add_len); in wpabuf_resize() 75 os_memset(nbuf + buf->used, 0, add_len); in wpabuf_resize() 81 buf->used + add_len); in wpabuf_resize() 88 add_len); in wpabuf_resize() 91 buf->used + add_len); in wpabuf_resize() 96 add_len); in wpabuf_resize() 101 buf->size = buf->used + add_len; in wpabuf_resize() [all...] |
H A D | wpabuf.h | 29 int wpabuf_resize(struct wpabuf **buf, size_t add_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
H A D | wpabuf.c | 47 int wpabuf_resize(struct wpabuf **_buf, size_t add_len) in wpabuf_resize() argument 55 *_buf = wpabuf_alloc(add_len); in wpabuf_resize() 69 if (buf->used + add_len > buf->size) { in wpabuf_resize() 72 nbuf = os_realloc(buf->buf, buf->used + add_len); in wpabuf_resize() 75 os_memset(nbuf + buf->used, 0, add_len); in wpabuf_resize() 81 buf->used + add_len); in wpabuf_resize() 88 add_len); in wpabuf_resize() 91 buf->used + add_len); in wpabuf_resize() 96 add_len); in wpabuf_resize() 101 buf->size = buf->used + add_len; in wpabuf_resize() [all...] |
H A D | wpabuf.h | 29 int wpabuf_resize(struct wpabuf **buf, size_t add_len);
|
/third_party/mbedtls/include/mbedtls/ |
H A D | gcm.h | 66 uint64_t MBEDTLS_PRIVATE(add_len); /*!< The total length of the additional data. */ 148 * \param add_len The length of the additional data. 172 size_t add_len, 194 * \param add_len The length of the additional data. 216 size_t add_len, 254 * if \p add_len is \c 0. 255 * \param add_len The length of the additional data. If \c 0, 262 size_t add_len);
|
H A D | hmac_drbg.h | 291 * \param add_len Length of \p additional in bytes. 298 const unsigned char *additional, size_t add_len); 346 * and \p add_len should be \c 0. 347 * \param add_len The length of the additional data. 356 * \p add_len > #MBEDTLS_HMAC_DRBG_MAX_INPUT. 361 size_t add_len);
|
H A D | ctr_drbg.h | 459 * \c NULL unless \p add_len is \c 0. 460 * \param add_len Length of \p additional in bytes. This must be at 465 * \p add_len is more than 471 size_t add_len); 491 * the value of \p add_len. 492 * \param add_len The length of the additional data 506 const unsigned char *additional, size_t add_len);
|
H A D | ccm.h | 73 size_t MBEDTLS_PRIVATE(add_len); /*!< Total authentication data length */
|
/third_party/mbedtls/tests/scripts/ |
H A D | gen_gcm_encrypt.pl | 66 my $add_len = get_suite_val("AADlen"); 79 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
H A D | gen_gcm_decrypt.pl | 83 my $add_len = get_suite_val("AADlen"); 96 print("GCM NIST Validation (AES-$key_len,$iv_len,$pt_len,$add_len,$tag_len) #$Count\n");
|
/third_party/backends/backend/ |
H A D | umax.c | 2721 int add_len = get_inquiry_additional_length(dev->buffer[0]); in umax_correct_inquiry() local 2725 if (add_len == 0x8f) in umax_correct_inquiry() 2745 int add_len = get_inquiry_additional_length(dev->buffer[0]); in umax_correct_inquiry() local 2749 if (add_len == 0x8f) in umax_correct_inquiry() 3078 int add_len = get_inquiry_additional_length(dev->buffer[0]); in umax_correct_inquiry() local 3082 if (add_len == 0x8f) in umax_correct_inquiry()
|
/third_party/mesa3d/src/egl/main/ |
H A D | eglapi.c | 561 const size_t add_len = sizeof(str); \ in _eglCreateAPIsString() 563 if (old_len + add_len <= max_len) \ in _eglCreateAPIsString()
|
/third_party/libabigail/ |
H A D | ltmain.sh | 4864 int add_len = strlen (add); 4865 new_value = XMALLOC (char, add_len + orig_value_len + 1); 4874 strcpy (new_value + add_len, orig_value);
|
/third_party/skia/third_party/externals/microhttpd/ |
H A D | ltmain.sh | 4884 int add_len = strlen (add); 4885 new_value = XMALLOC (char, add_len + orig_value_len + 1); 4894 strcpy (new_value + add_len, orig_value);
|
/third_party/eudev/ |
H A D | ltmain.sh | 6310 size_t add_len = strlen (add); 6311 new_value = XMALLOC (char, add_len + orig_value_len + 1); 6320 strcpy (new_value + add_len, orig_value);
|
/third_party/curl/ |
H A D | ltmain.sh | 6511 size_t add_len = strlen (add); 6512 new_value = XMALLOC (char, add_len + orig_value_len + 1); 6521 strcpy (new_value + add_len, orig_value);
|
/third_party/lame/ |
H A D | ltmain.sh | 6262 size_t add_len = strlen (add); 6263 new_value = XMALLOC (char, add_len + orig_value_len + 1); 6272 strcpy (new_value + add_len, orig_value);
|
/third_party/node/deps/cares/ |
H A D | ltmain.sh | 6511 size_t add_len = strlen (add); 6512 new_value = XMALLOC (char, add_len + orig_value_len + 1); 6521 strcpy (new_value + add_len, orig_value);
|
/third_party/node/deps/cares/config/ |
H A D | ltmain.sh | 6511 size_t add_len = strlen (add); 6512 new_value = XMALLOC (char, add_len + orig_value_len + 1); 6521 strcpy (new_value + add_len, orig_value);
|
/third_party/libevdev/build-aux/ |
H A D | ltmain.sh | 6512 size_t add_len = strlen (add); 6513 new_value = XMALLOC (char, add_len + orig_value_len + 1); 6522 strcpy (new_value + add_len, orig_value);
|