/third_party/libwebsockets/plugins/ssh-base/crypto/ |
H A D | ed25519.c | 82 const unsigned char *m, size_t mlen, in crypto_sign_ed25519() 100 *smlen = mlen+64; in crypto_sign_ed25519() 101 for(i=0;i<mlen;i++) in crypto_sign_ed25519() 106 crypto_hash_sha512(hmg, sm+32, mlen+32); in crypto_sign_ed25519() 118 get_hram(hram, sm, sk + 32, sm, (size_t)mlen + 64); in crypto_sign_ed25519() 173 unsigned char *m,unsigned long long *mlen, in crypto_sign_ed25519_open() 185 *mlen = (unsigned long long) -1; in crypto_sign_ed25519_open() 213 *mlen = smlen-64; in crypto_sign_ed25519_open() 79 crypto_sign_ed25519( unsigned char *sm, unsigned long long *smlen, const unsigned char *m, size_t mlen, const unsigned char *sk ) crypto_sign_ed25519() argument 172 crypto_sign_ed25519_open( unsigned char *m,unsigned long long *mlen, const unsigned char *sm,unsigned long long smlen, const unsigned char *pk ) crypto_sign_ed25519_open() argument
|
/third_party/node/deps/openssl/openssl/crypto/modes/ |
H A D | ccm128.c | 41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv() 48 if (sizeof(mlen) == 8 && L >= 3) { in CRYPTO_ccm128_setiv() 49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 51 ctx->nonce.c[10] = (u8)(mlen >> (40 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 52 ctx->nonce.c[11] = (u8)(mlen >> (32 % (sizeof(mlen) * in CRYPTO_ccm128_setiv() 40 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) CRYPTO_ccm128_setiv() argument [all...] |
H A D | gcm128.c | 973 u64 mlen = ctx->len.u[1]; local 984 mlen += len; 985 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 987 ctx->len.u[1] = mlen; 1205 u64 mlen = ctx->len.u[1]; local 1216 mlen += len; 1217 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 1219 ctx->len.u[1] = mlen; [all...] |
/third_party/openssl/crypto/modes/ |
H A D | ccm128.c | 41 const unsigned char *nonce, size_t nlen, size_t mlen) in CRYPTO_ccm128_setiv() 48 if (sizeof(mlen) == 8 && L >= 3) { in CRYPTO_ccm128_setiv() 49 ctx->nonce.c[8] = (u8)(mlen >> (56 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 50 ctx->nonce.c[9] = (u8)(mlen >> (48 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 51 ctx->nonce.c[10] = (u8)(mlen >> (40 % (sizeof(mlen) * 8))); in CRYPTO_ccm128_setiv() 52 ctx->nonce.c[11] = (u8)(mlen >> (32 % (sizeof(mlen) * in CRYPTO_ccm128_setiv() 40 CRYPTO_ccm128_setiv(CCM128_CONTEXT *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) CRYPTO_ccm128_setiv() argument [all...] |
H A D | gcm128.c | 973 u64 mlen = ctx->len.u[1]; local 984 mlen += len; 985 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 987 ctx->len.u[1] = mlen; 1205 u64 mlen = ctx->len.u[1]; local 1216 mlen += len; 1217 if (mlen > ((U64(1) << 36) - 32) || (sizeof(len) == 8 && mlen < len)) 1219 ctx->len.u[1] = mlen; [all...] |
/third_party/node/deps/openssl/openssl/crypto/rsa/ |
H A D | rsa_pk1.c | 175 int zero_index = 0, msg_index, mlen = -1; in RSA_padding_check_PKCS1_type_2() local 233 mlen = num - msg_index; in RSA_padding_check_PKCS1_type_2() 238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 241 * Move the result in-place by |num|-RSA_PKCS1_PADDING_SIZE-|mlen| bytes to the left. in RSA_padding_check_PKCS1_type_2() 242 * Then if |good| move |mlen| bytes from |em|+RSA_PKCS1_PADDING_SIZE to |to|. in RSA_padding_check_PKCS1_type_2() 253 mask = ~constant_time_eq(msg_index & (num - RSA_PKCS1_PADDING_SIZE - mlen), 0); in RSA_padding_check_PKCS1_type_2() 258 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2() 273 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2()
|
H A D | rsa_oaep.c | 164 int i, dblen = 0, mlen = -1, one_index = 0, msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() local 276 mlen = dblen - msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() 281 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 284 * Move the result in-place by |dblen|-|mdlen|-1-|mlen| bytes to the left. in RSA_padding_check_PKCS1_OAEP_mgf1() 285 * Then if |good| move |mlen| bytes from |db|+|mdlen|+1 to |to|. in RSA_padding_check_PKCS1_OAEP_mgf1() 296 mask = ~constant_time_eq(msg_index & (dblen - mdlen - 1 - mlen), 0); in RSA_padding_check_PKCS1_OAEP_mgf1() 301 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 322 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
|
/third_party/openssl/crypto/rsa/ |
H A D | rsa_pk1.c | 175 int zero_index = 0, msg_index, mlen = -1; in RSA_padding_check_PKCS1_type_2() local 233 mlen = num - msg_index; in RSA_padding_check_PKCS1_type_2() 238 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_type_2() 241 * Move the result in-place by |num|-RSA_PKCS1_PADDING_SIZE-|mlen| bytes to the left. in RSA_padding_check_PKCS1_type_2() 242 * Then if |good| move |mlen| bytes from |em|+RSA_PKCS1_PADDING_SIZE to |to|. in RSA_padding_check_PKCS1_type_2() 253 mask = ~constant_time_eq(msg_index & (num - RSA_PKCS1_PADDING_SIZE - mlen), 0); in RSA_padding_check_PKCS1_type_2() 258 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_type_2() 273 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_type_2()
|
H A D | rsa_oaep.c | 164 int i, dblen = 0, mlen = -1, one_index = 0, msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() local 276 mlen = dblen - msg_index; in RSA_padding_check_PKCS1_OAEP_mgf1() 281 good &= constant_time_ge(tlen, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 284 * Move the result in-place by |dblen|-|mdlen|-1-|mlen| bytes to the left. in RSA_padding_check_PKCS1_OAEP_mgf1() 285 * Then if |good| move |mlen| bytes from |db|+|mdlen|+1 to |to|. in RSA_padding_check_PKCS1_OAEP_mgf1() 296 mask = ~constant_time_eq(msg_index & (dblen - mdlen - 1 - mlen), 0); in RSA_padding_check_PKCS1_OAEP_mgf1() 301 mask = good & constant_time_lt(i, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 322 return constant_time_select_int(good, mlen, -1); in RSA_padding_check_PKCS1_OAEP_mgf1()
|
/third_party/mesa3d/src/intel/compiler/ |
H A D | brw_lower_logical_sends.cpp | 43 fs_reg *payload_sources = new fs_reg[inst->mlen]; in lower_urb_read_logical_send() 44 fs_reg payload = fs_reg(VGRF, bld.shader->alloc.allocate(inst->mlen), in lower_urb_read_logical_send() 52 bld.LOAD_PAYLOAD(payload, payload_sources, inst->mlen, header_size); in lower_urb_read_logical_send() 89 fs_reg *payload_sources = new fs_reg[inst->mlen]; in lower_urb_write_logical_send() 90 fs_reg payload = fs_reg(VGRF, bld.shader->alloc.allocate(inst->mlen), in lower_urb_write_logical_send() 101 for (unsigned i = header_size, j = 0; i < inst->mlen; i++, j++) in lower_urb_write_logical_send() 104 bld.LOAD_PAYLOAD(payload, payload_sources, inst->mlen, header_size); in lower_urb_write_logical_send() 382 inst->mlen = regs_written(load); in lower_fb_write_logical_send() 407 inst->mlen = regs_written(load); in lower_fb_write_logical_send() 462 inst->mlen in lower_fb_read_logical_send() 1084 unsigned mlen = load_payload_inst->size_written / REG_SIZE; lower_sampler_logical_send_gfx7() local 1426 unsigned mlen, ex_mlen = 0; lower_surface_logical_send() local 2071 unsigned mlen, ex_mlen = 0, header_size = 0; lower_a64_logical_send() local 2422 const unsigned mlen = 2; lower_btd_logical_send() local 2511 const unsigned mlen = 1; lower_trace_ray_logical_send() local [all...] |
H A D | brw_fs_generator.cpp | 333 brw_message_desc(devinfo, inst->mlen, rlen, inst->header_size); in generate_send() 413 fire_fb_write(inst, payload, implied_header, inst->mlen); in generate_fb_write() 434 fire_fb_write(inst, offset(payload, 1), implied_header, inst->mlen-1); in generate_fb_write() 437 fire_fb_write(inst, payload, implied_header, inst->mlen); in generate_fb_write() 583 ((fs_inst *)inst->get_next())->mlen > 0) { in generate_mov_indirect() 984 inst->mlen, in generate_get_buffer_size() 1099 assert(inst->mlen == 6); in generate_tex() 1101 assert(inst->mlen <= 4); in generate_tex() 1106 assert(inst->mlen == 9); in generate_tex() 1109 assert(inst->mlen < in generate_tex() [all...] |
H A D | brw_vec4_generator.cpp | 181 assert(inst->mlen == 3); in generate_tex() 184 assert(inst->mlen == 2); in generate_tex() 190 assert(inst->mlen == 4); in generate_tex() 194 assert(inst->mlen == 2); in generate_tex() 198 assert(inst->mlen == 2); in generate_tex() 287 inst->mlen, in generate_tex() 322 brw_message_desc(devinfo, inst->mlen, 1, inst->header_size) | in generate_tex() 345 inst->mlen, in generate_vs_urb_write() 360 inst->mlen, in generate_gs_urb_write() 377 inst->mlen, in generate_gs_urb_write_allocate() [all...] |
H A D | brw_fs_validate.cpp | 52 for (unsigned i = header_size, j = 0; i < inst->mlen; i++, j++) { in validate() 57 fsv_assert(header_size + data_size == inst->mlen); in validate()
|
H A D | gfx6_gs_visitor.cpp | 277 align_interleaved_urb_mlen(unsigned mlen) in align_interleaved_urb_mlen() argument 283 if ((mlen % 2) != 1) in align_interleaved_urb_mlen() 284 mlen++; in align_interleaved_urb_mlen() 285 return mlen; in align_interleaved_urb_mlen() 314 inst->mlen = align_interleaved_urb_mlen(last_mrf - base_mrf); in emit_snb_gs_urb_write_opcode() 481 inst->mlen = 1; in emit_thread_end()
|
H A D | brw_vec4_cse.cpp | 91 return inst->mlen == 0; in is_expression() 153 a->mlen == b->mlen && in instructions_match() 176 if (is_expression(inst) && !inst->predicate && inst->mlen == 0 && in opt_cse_local()
|
H A D | brw_vec4_visitor.cpp | 55 this->mlen = 0; in vec4_instruction() 263 inst->mlen = 2; in SCRATCH_READ() 277 inst->mlen = 3; in SCRATCH_WRITE() 349 math->mlen = src1.file == BAD_FILE ? 1 : 2; in emit_math() 760 pull->mlen = 1; in emit_pull_constant_load_reg() 767 pull->mlen = 1; in emit_pull_constant_load_reg() 978 unsigned mlen) 989 if ((mlen % 2) != 1) 990 mlen++; 993 return mlen; [all...] |
/third_party/lz4/lib/ |
H A D | lz4hc.c | 1271 int mlen; member 1286 /* requires mlen >= MINMATCH */ 1287 LZ4_FORCE_INLINE int LZ4HC_sequencePrice(int litlen, int mlen) in LZ4HC_sequencePrice() argument 1291 assert(mlen >= MINMATCH); in LZ4HC_sequencePrice() 1295 if (mlen >= (int)(ML_MASK+MINMATCH)) in LZ4HC_sequencePrice() 1296 price += 1 + ((mlen-(int)(ML_MASK+MINMATCH)) / 255); in LZ4HC_sequencePrice() 1396 opt[rPos].mlen = 1; in LZ4HC_compress_optimal() 1404 { int mlen = MINMATCH; in LZ4HC_compress_optimal() local 1408 for ( ; mlen <= matchML ; mlen in LZ4HC_compress_optimal() [all...] |
/third_party/toybox/toys/posix/ |
H A D | sed.c | 481 mlen, off, newlen; in sed_line() local 488 mlen = match[0].rm_eo-match[0].rm_so; in sed_line() 489 if (!mlen && !zmatch) { in sed_line() 525 l2l += newlen-mlen; in sed_line() 533 for (off = mlen = 0; new[off]; off++) { in sed_line() 539 if (!(l2[l2used+mlen++] = unescape(new[off]))) in sed_line() 540 l2[l2used+mlen-1] = new[off]; in sed_line() 545 l2[l2used+mlen++] = new[off]; in sed_line() 552 memcpy(l2+l2used+mlen, rline+match[cc].rm_so, ll); in sed_line() 553 mlen in sed_line() [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | upap.c | 604 int mlen, ulen, wlen; in upap_printpkt() local 654 mlen = p[0]; in upap_printpkt() 655 if (len < mlen + 1) in upap_printpkt() 658 p += mlen + 1; in upap_printpkt() 659 len -= mlen + 1; in upap_printpkt() 661 ppp_print_string(msg, mlen, printer, arg); in upap_printpkt()
|
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_ccm_hw.c | 14 size_t nlen, size_t mlen) in ossl_ccm_generic_setiv() 16 return CRYPTO_ccm128_setiv(&ctx->ccm_ctx, nonce, nlen, mlen) == 0; in ossl_ccm_generic_setiv() 13 ossl_ccm_generic_setiv(PROV_CCM_CTX *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) ossl_ccm_generic_setiv() argument
|
/third_party/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_ccm_hw.c | 14 size_t nlen, size_t mlen) in ossl_ccm_generic_setiv() 16 return CRYPTO_ccm128_setiv(&ctx->ccm_ctx, nonce, nlen, mlen) == 0; in ossl_ccm_generic_setiv() 13 ossl_ccm_generic_setiv(PROV_CCM_CTX *ctx, const unsigned char *nonce, size_t nlen, size_t mlen) ossl_ccm_generic_setiv() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/l2_packet/ |
H A D | l2_packet_pcap.c | 94 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 95 eth = os_malloc(mlen); in l2_packet_send() 105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send() 107 ret = eth_send(l2->eth, (u8 *) eth, mlen); in l2_packet_send()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/l2_packet/ |
H A D | l2_packet_pcap.c | 94 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 95 eth = os_malloc(mlen); in l2_packet_send() 105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send() 107 ret = eth_send(l2->eth, (u8 *) eth, mlen); in l2_packet_send()
|
/third_party/node/deps/openssl/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_ccm.h | 54 size_t mlen)); 91 size_t nlen, size_t mlen);
|
/third_party/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_ccm.h | 54 size_t mlen)); 91 size_t nlen, size_t mlen);
|