/third_party/backends/lib/ |
H A D | snprintf.c | 804 int padlen, strlenv, i, c; /* amount to pad */ in fmtstr() local 819 padlen = len - strlenv; in fmtstr() 820 if( padlen < 0 ) padlen = 0; in fmtstr() 821 if( ljust ) padlen = -padlen; in fmtstr() 822 while( padlen > 0 ) { in fmtstr() 824 --padlen; in fmtstr() 834 while( padlen < 0 ) { in fmtstr() 836 ++padlen; in fmtstr() 853 int padlen = 0; /* amount to pad */ fmtnum() local 913 int padlen = 0; /* amount to pad */ fmtquad() local [all...] |
/third_party/node/test/common/ |
H A D | http2.js | 85 constructor(id, payload, padlen = 0, final = false) { 90 if (padlen > 0) { 91 buffers.unshift(Buffer.from([padlen])); 92 buffers.push(PADDING.slice(0, padlen)); 93 len += padlen + 1; 103 constructor(id, payload, padlen = 0, final = false) { 108 if (padlen > 0) { 109 buffers.unshift(Buffer.from([padlen])); 110 buffers.push(PADDING.slice(0, padlen)); 111 len += padlen [all...] |
/third_party/node/deps/openssl/openssl/crypto/bio/ |
H A D | bio_print.c | 385 int padlen; in fmtstr() local 394 padlen = min - strln; in fmtstr() 395 if (min < 0 || padlen < 0) in fmtstr() 396 padlen = 0; in fmtstr() 402 if (max < INT_MAX - padlen) in fmtstr() 403 max += padlen; in fmtstr() 408 padlen = -padlen; in fmtstr() 410 while ((padlen > 0) && (max < 0 || cnt < max)) { in fmtstr() 413 --padlen; in fmtstr() 576 int padlen = 0; fmtfp() local [all...] |
/third_party/openssl/crypto/bio/ |
H A D | bio_print.c | 385 int padlen; in fmtstr() local 394 padlen = min - strln; in fmtstr() 395 if (min < 0 || padlen < 0) in fmtstr() 396 padlen = 0; in fmtstr() 402 if (max < INT_MAX - padlen) in fmtstr() 403 max += padlen; in fmtstr() 408 padlen = -padlen; in fmtstr() 410 while ((padlen > 0) && (max < 0 || cnt < max)) { in fmtstr() 413 --padlen; in fmtstr() 576 int padlen = 0; fmtfp() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_record.c | 283 u8 padlen; in tlsv1_record_receive() local 398 padlen = out_data[plen - 1]; in tlsv1_record_receive() 399 if (padlen >= plen) { in tlsv1_record_receive() 403 padlen, (unsigned long) plen); in tlsv1_record_receive() 407 for (i = plen - padlen - 1; i < plen - 1; i++) { in tlsv1_record_receive() 408 if (out_data[i] != padlen) { in tlsv1_record_receive() 412 out_data + plen - padlen - in tlsv1_record_receive() 413 1, padlen + 1); in tlsv1_record_receive() 419 plen -= padlen + 1; in tlsv1_record_receive()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_record.c | 283 u8 padlen; in tlsv1_record_receive() local 398 padlen = out_data[plen - 1]; in tlsv1_record_receive() 399 if (padlen >= plen) { in tlsv1_record_receive() 403 padlen, (unsigned long) plen); in tlsv1_record_receive() 407 for (i = plen - padlen - 1; i < plen - 1; i++) { in tlsv1_record_receive() 408 if (out_data[i] != padlen) { in tlsv1_record_receive() 412 out_data + plen - padlen - in tlsv1_record_receive() 413 1, padlen + 1); in tlsv1_record_receive() 419 plen -= padlen + 1; in tlsv1_record_receive()
|
/third_party/mbedtls/library/ |
H A D | nist_kw.c | 133 size_t olen, padlen = 0; in mbedtls_nist_kw_wrap() local 163 padlen = (8 - (in_len % 8)); in mbedtls_nist_kw_wrap() 166 if (out_size < in_len + KW_SEMIBLOCK_LENGTH + padlen) { in mbedtls_nist_kw_wrap() 187 memset(output + KW_SEMIBLOCK_LENGTH + in_len, 0, padlen); in mbedtls_nist_kw_wrap() 189 semiblocks = ((in_len + padlen) / KW_SEMIBLOCK_LENGTH) + 1; in mbedtls_nist_kw_wrap() 362 size_t padlen = 0; in mbedtls_nist_kw_unwrap() local 408 * If Plen is larger than the plaintext and padding, padlen will be in mbedtls_nist_kw_unwrap() 411 padlen = in_len - KW_SEMIBLOCK_LENGTH - Plen; in mbedtls_nist_kw_unwrap() 412 ret = mbedtls_ct_error_if(mbedtls_ct_uint_gt(padlen, 7), in mbedtls_nist_kw_unwrap() 414 padlen in mbedtls_nist_kw_unwrap() [all...] |
H A D | ssl_msg.c | 1250 size_t padlen, i; in mbedtls_ssl_encrypt_buf() local 1260 padlen = transform->ivlen - (rec->data_len + 1) % transform->ivlen; in mbedtls_ssl_encrypt_buf() 1261 if (padlen == transform->ivlen) { in mbedtls_ssl_encrypt_buf() 1262 padlen = 0; in mbedtls_ssl_encrypt_buf() 1266 if (post_avail < padlen + 1) { in mbedtls_ssl_encrypt_buf() 1271 for (i = 0; i <= padlen; i++) { in mbedtls_ssl_encrypt_buf() 1272 data[rec->data_len + i] = (unsigned char) padlen; in mbedtls_ssl_encrypt_buf() 1275 rec->data_len += padlen + 1; in mbedtls_ssl_encrypt_buf() 1276 post_avail -= padlen + 1; in mbedtls_ssl_encrypt_buf() 1309 padlen in mbedtls_ssl_encrypt_buf() 1491 size_t padlen = 0; mbedtls_ssl_decrypt_buf() local [all...] |
H A D | pkcs12.c | 164 unsigned int padlen = 0; in mbedtls_pkcs12_pbe_ext() local 184 padlen = cipher_info->block_size - (len % cipher_info->block_size); in mbedtls_pkcs12_pbe_ext() 185 if (output_size < (len + padlen)) { in mbedtls_pkcs12_pbe_ext()
|
H A D | pkcs5.c | 144 unsigned int padlen = 0; in mbedtls_pkcs5_pbes2_ext() local 209 padlen = cipher_info->block_size - (datalen % cipher_info->block_size); in mbedtls_pkcs5_pbes2_ext() 210 if (output_size < (datalen + padlen)) { in mbedtls_pkcs5_pbes2_ext()
|
/third_party/nghttp2/lib/ |
H A D | nghttp2_frame.c | 67 frame->padlen = 0; in nghttp2_frame_headers_init() 118 frame->padlen = 0; in nghttp2_frame_push_promise_init() 170 size_t nghttp2_frame_trail_padlen(nghttp2_frame *frame, size_t padlen) { in nghttp2_frame_trail_padlen() argument 171 /* We have iframe->padlen == 0, but iframe->frame.hd.flags may have in nghttp2_frame_trail_padlen() 175 if (padlen == 0) { in nghttp2_frame_trail_padlen() 178 return padlen - ((frame->hd.flags & NGHTTP2_FLAG_PADDED) > 0); in nghttp2_frame_trail_padlen() 185 frame->padlen = 0; in nghttp2_frame_data_init() 393 frame->padlen = 0; in nghttp2_frame_pack_headers() 583 frame->padlen = 0; in nghttp2_frame_pack_push_promise() 1145 static void frame_set_pad(nghttp2_buf *buf, size_t padlen, in argument 1174 nghttp2_frame_add_pad(nghttp2_bufs *bufs, nghttp2_frame_hd *hd, size_t padlen, int framehd_only) nghttp2_frame_add_pad() argument [all...] |
H A D | nghttp2_session.c | 393 iframe->padlen = 0; in session_inbound_frame_reset() 2220 frame->headers.padlen in this function to use the fact that 2221 frame->push_promise has also padlen in the same position. */ 2227 size_t padlen; in session_headers_add_pad() local 2243 padlen = (size_t)padded_payloadlen - frame->hd.length; in session_headers_add_pad() 2245 DEBUGF("send: padding selected: payloadlen=%zd, padlen=%zu\n", in session_headers_add_pad() 2246 padded_payloadlen, padlen); in session_headers_add_pad() 2248 nghttp2_frame_add_pad(framebufs, &frame->hd, padlen, 0); in session_headers_add_pad() 2250 frame->headers.padlen = padlen; in session_headers_add_pad() 5772 size_t padlen; inbound_frame_compute_pad() local 5802 size_t padlen; inbound_frame_effective_readlen() local 5819 ssize_t padlen; nghttp2_session_mem_recv() local [all...] |
H A D | nghttp2_frame.h | 564 * padding length is given in the |padlen|. The returned value does 565 * not include the Pad Length field. If |padlen| is 0, this function 568 size_t nghttp2_frame_trail_padlen(nghttp2_frame *frame, size_t padlen); 630 * |padlen| including Pad Length field. The |hd| is the frame header 635 size_t padlen, int framehd_only);
|
/third_party/node/deps/nghttp2/lib/ |
H A D | nghttp2_frame.c | 67 frame->padlen = 0; in nghttp2_frame_headers_init() 118 frame->padlen = 0; in nghttp2_frame_push_promise_init() 170 size_t nghttp2_frame_trail_padlen(nghttp2_frame *frame, size_t padlen) { in nghttp2_frame_trail_padlen() argument 171 /* We have iframe->padlen == 0, but iframe->frame.hd.flags may have in nghttp2_frame_trail_padlen() 175 if (padlen == 0) { in nghttp2_frame_trail_padlen() 178 return padlen - ((frame->hd.flags & NGHTTP2_FLAG_PADDED) > 0); in nghttp2_frame_trail_padlen() 185 frame->padlen = 0; in nghttp2_frame_data_init() 393 frame->padlen = 0; in nghttp2_frame_pack_headers() 583 frame->padlen = 0; in nghttp2_frame_pack_push_promise() 1145 static void frame_set_pad(nghttp2_buf *buf, size_t padlen, in argument 1174 nghttp2_frame_add_pad(nghttp2_bufs *bufs, nghttp2_frame_hd *hd, size_t padlen, int framehd_only) nghttp2_frame_add_pad() argument [all...] |
H A D | nghttp2_session.c | 393 iframe->padlen = 0; in session_inbound_frame_reset() 2215 frame->headers.padlen in this function to use the fact that 2216 frame->push_promise has also padlen in the same position. */ 2222 size_t padlen; in session_headers_add_pad() local 2238 padlen = (size_t)padded_payloadlen - frame->hd.length; in session_headers_add_pad() 2240 DEBUGF("send: padding selected: payloadlen=%zd, padlen=%zu\n", in session_headers_add_pad() 2241 padded_payloadlen, padlen); in session_headers_add_pad() 2243 nghttp2_frame_add_pad(framebufs, &frame->hd, padlen, 0); in session_headers_add_pad() 2245 frame->headers.padlen = padlen; in session_headers_add_pad() 5767 size_t padlen; inbound_frame_compute_pad() local 5797 size_t padlen; inbound_frame_effective_readlen() local 5814 ssize_t padlen; nghttp2_session_mem_recv() local [all...] |
/third_party/libwebsockets/lib/misc/ |
H A D | sha-1.c | 205 size_t padlen; /*pad length in bytes*/ in sha1_pad() local 211 padlen = 64 - padstart; in sha1_pad() 212 if (padlen < 8) { in sha1_pad() 213 memset(&ctxt->m.b8[padstart], 0, padlen); in sha1_pad() 214 COUNT = (unsigned char)(COUNT + padlen); in sha1_pad() 218 padlen = 64 - padstart; /* should be 64 */ in sha1_pad() 220 memset(&ctxt->m.b8[padstart], 0, padlen - 8); in sha1_pad() 221 COUNT = (unsigned char)(COUNT + (padlen - 8)); in sha1_pad()
|
/third_party/mbedtls/tests/scripts/ |
H A D | run-test-suites.pl | 86 my $padlen = ( $width - length( $string ) - 2 ) / 2; 87 print $padchar x( $padlen ), " $string ", $padchar x( $padlen ), "\n";
|
/third_party/node/deps/openssl/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_gcm.c | 22 static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, 25 size_t *padlen, const unsigned char *in, 394 size_t *padlen, const unsigned char *in, in gcm_cipher_internal() 402 return gcm_tls_cipher(ctx, out, padlen, in, len); in gcm_cipher_internal() 447 *padlen = olen; in gcm_cipher_internal() 512 static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, in gcm_tls_cipher() argument 571 *padlen = plen; in gcm_tls_cipher() 393 gcm_cipher_internal(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) gcm_cipher_internal() argument
|
H A D | ciphercommon_ccm.c | 18 size_t *padlen, const unsigned char *in, 336 unsigned char *out, size_t *padlen, in ccm_tls_cipher() 378 *padlen = olen; in ccm_tls_cipher() 383 size_t *padlen, const unsigned char *in, in ccm_cipher_internal() 395 return ccm_tls_cipher(ctx, out, padlen, in, len); in ccm_cipher_internal() 441 *padlen = olen; in ccm_cipher_internal() 335 ccm_tls_cipher(PROV_CCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) ccm_tls_cipher() argument 382 ccm_cipher_internal(PROV_CCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) ccm_cipher_internal() argument
|
/third_party/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_gcm.c | 22 static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, 25 size_t *padlen, const unsigned char *in, 389 size_t *padlen, const unsigned char *in, in gcm_cipher_internal() 397 return gcm_tls_cipher(ctx, out, padlen, in, len); in gcm_cipher_internal() 442 *padlen = olen; in gcm_cipher_internal() 507 static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, in gcm_tls_cipher() argument 566 *padlen = plen; in gcm_tls_cipher() 388 gcm_cipher_internal(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) gcm_cipher_internal() argument
|
H A D | ciphercommon_ccm.c | 18 size_t *padlen, const unsigned char *in, 333 unsigned char *out, size_t *padlen, in ccm_tls_cipher() 375 *padlen = olen; in ccm_tls_cipher() 380 size_t *padlen, const unsigned char *in, in ccm_cipher_internal() 392 return ccm_tls_cipher(ctx, out, padlen, in, len); in ccm_cipher_internal() 438 *padlen = olen; in ccm_cipher_internal() 332 ccm_tls_cipher(PROV_CCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) ccm_tls_cipher() argument 379 ccm_cipher_internal(PROV_CCM_CTX *ctx, unsigned char *out, size_t *padlen, const unsigned char *in, size_t len) ccm_cipher_internal() argument
|
/third_party/libwebsockets/lib/tls/mbedtls/ |
H A D | lws-genaes.c | 37 unsigned int n = 0, padlen = LWS_AES_CBC_BLOCKLEN * ((unsigned int)len / in _write_pkcs7_pad() local 42 while (n++ < padlen) in _write_pkcs7_pad() 43 *p++ = (uint8_t)padlen; in _write_pkcs7_pad() 45 return padlen; in _write_pkcs7_pad()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | md4-internal.c | 151 size_t padlen; in MD4Pad() local 157 padlen = MD4_BLOCK_LENGTH - in MD4Pad() 159 if (padlen < 1 + 8) in MD4Pad() 160 padlen += MD4_BLOCK_LENGTH; in MD4Pad() 161 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */ in MD4Pad()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | md4-internal.c | 151 size_t padlen; in MD4Pad() local 157 padlen = MD4_BLOCK_LENGTH - in MD4Pad() 159 if (padlen < 1 + 8) in MD4Pad() 160 padlen += MD4_BLOCK_LENGTH; in MD4Pad() 161 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */ in MD4Pad()
|
/third_party/nghttp2/src/ |
H A D | app_helper.cc | 268 if (frame->data.padlen > 0) { in print_frame() 270 fprintf(outfile, "(padlen=%zu)\n", frame->data.padlen); in print_frame() 275 fprintf(outfile, "(padlen=%zu", frame->headers.padlen); in print_frame() 327 fprintf(outfile, "(padlen=%zu, promised_stream_id=%d)\n", in print_frame() 328 frame->push_promise.padlen, frame->push_promise.promised_stream_id); in print_frame()
|