Home
last modified time | relevance | path

Searched refs:pms (Results 1 - 17 of 17) sorted by relevance

/third_party/libsnd/src/
H A Dms_adpcm.c92 static int msadpcm_decode_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) ;
93 static sf_count_t msadpcm_read_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, short *ptr, int len) ;
95 static int msadpcm_encode_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) ;
96 static sf_count_t msadpcm_write_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, const short *ptr, int len) ;
119 { MSADPCM_PRIVATE *pms ; in wavlike_msadpcm_init() local
146 pms = (MSADPCM_PRIVATE*) psf->codec_data ; in wavlike_msadpcm_init()
148 pms->sync_error = 0 ; in wavlike_msadpcm_init()
149 pms->samples = pms->dummydata ; in wavlike_msadpcm_init()
150 pms in wavlike_msadpcm_init()
204 msadpcm_get_bpred(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, unsigned char value) msadpcm_get_bpred() argument
217 msadpcm_decode_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) msadpcm_decode_block() argument
320 msadpcm_read_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, short *ptr, int len) msadpcm_read_block() argument
347 { MSADPCM_PRIVATE *pms ; msadpcm_read_s() local
372 { MSADPCM_PRIVATE *pms ; msadpcm_read_i() local
402 { MSADPCM_PRIVATE *pms ; msadpcm_read_f() local
434 { MSADPCM_PRIVATE *pms ; msadpcm_read_d() local
467 { MSADPCM_PRIVATE *pms ; msadpcm_seek() local
526 msadpcm_encode_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) msadpcm_encode_block() argument
648 msadpcm_write_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, const short *ptr, int len) msadpcm_write_block() argument
671 { MSADPCM_PRIVATE *pms ; msadpcm_write_s() local
695 { MSADPCM_PRIVATE *pms ; msadpcm_write_i() local
722 { MSADPCM_PRIVATE *pms ; msadpcm_write_f() local
752 { MSADPCM_PRIVATE *pms ; msadpcm_write_d() local
785 { MSADPCM_PRIVATE *pms ; msadpcm_close() local
[all...]
/third_party/node/deps/openssl/openssl/ssl/statem/
H A Dstatem_clnt.c2839 unsigned char *pms = NULL; in tls_construct_cke_rsa() local
2857 pms = OPENSSL_malloc(pmslen); in tls_construct_cke_rsa()
2858 if (pms == NULL) { in tls_construct_cke_rsa()
2863 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa()
2864 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
2865 if (RAND_bytes_ex(s->ctx->libctx, pms + 2, pmslen - 2, 0) <= 0) { in tls_construct_cke_rsa()
2878 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa()
2883 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa()
2897 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { in tls_construct_cke_rsa()
2902 s->s3.tmp.pms in tls_construct_cke_rsa()
3031 unsigned char *pms = NULL; tls_construct_cke_gost() local
3174 unsigned char *pms = NULL; tls_construct_cke_gost18() local
3342 unsigned char *pms = NULL; tls_client_key_exchange_post_work() local
[all...]
H A Dextensions_srvr.c1716 * The generated pms is stored in `s->s3.tmp.pms` to be later used via in tls_construct_stoc_key_share()
1739 * This causes the crypto state to be updated based on the generated pms in tls_construct_stoc_key_share()
1741 if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) { in tls_construct_stoc_key_share()
/third_party/openssl/ssl/statem/
H A Dstatem_clnt.c2831 unsigned char *pms = NULL; in tls_construct_cke_rsa() local
2849 pms = OPENSSL_malloc(pmslen); in tls_construct_cke_rsa()
2850 if (pms == NULL) { in tls_construct_cke_rsa()
2855 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa()
2856 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa()
2857 if (RAND_bytes_ex(s->ctx->libctx, pms + 2, pmslen - 2, 0) <= 0) { in tls_construct_cke_rsa()
2870 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa()
2875 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa()
2889 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { in tls_construct_cke_rsa()
2894 s->s3.tmp.pms in tls_construct_cke_rsa()
3023 unsigned char *pms = NULL; tls_construct_cke_gost() local
3166 unsigned char *pms = NULL; tls_construct_cke_gost18() local
3334 unsigned char *pms = NULL; tls_client_key_exchange_post_work() local
[all...]
H A Dextensions_srvr.c1683 * The generated pms is stored in `s->s3.tmp.pms` to be later used via in tls_construct_stoc_key_share()
1706 * This causes the crypto state to be updated based on the generated pms in tls_construct_stoc_key_share()
1708 if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) { in tls_construct_stoc_key_share()
/third_party/node/deps/openssl/openssl/ssl/
H A Ds3_lib.c3361 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_free()
3384 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_clear()
4600 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, in ssl_generate_master_secret() argument
4627 memcpy(t, pms, pmslen); in ssl_generate_master_secret()
4649 s->session->master_key, pms, pmslen, in ssl_generate_master_secret()
4658 if (pms) { in ssl_generate_master_secret()
4660 OPENSSL_clear_free(pms, pmslen); in ssl_generate_master_secret()
4662 OPENSSL_cleanse(pms, pmslen); in ssl_generate_master_secret()
4665 s->s3.tmp.pms = NULL; in ssl_generate_master_secret()
4765 /* Generate secrets from pms */
4766 ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen) ssl_gensecret() argument
4795 unsigned char *pms = NULL; ssl_derive() local
4850 unsigned char *pms = NULL; ssl_decapsulate() local
4900 unsigned char *pms = NULL, *ct = NULL; ssl_encapsulate() local
[all...]
H A Dssl_local.h1364 unsigned char *pms; member
2516 __owur int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen,
2519 __owur int ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen);
/third_party/openssl/ssl/
H A Ds3_lib.c3361 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_free()
3384 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_clear()
4600 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, in ssl_generate_master_secret() argument
4627 memcpy(t, pms, pmslen); in ssl_generate_master_secret()
4649 s->session->master_key, pms, pmslen, in ssl_generate_master_secret()
4658 if (pms) { in ssl_generate_master_secret()
4660 OPENSSL_clear_free(pms, pmslen); in ssl_generate_master_secret()
4662 OPENSSL_cleanse(pms, pmslen); in ssl_generate_master_secret()
4665 s->s3.tmp.pms = NULL; in ssl_generate_master_secret()
4765 /* Generate secrets from pms */
4766 ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen) ssl_gensecret() argument
4795 unsigned char *pms = NULL; ssl_derive() local
4850 unsigned char *pms = NULL; ssl_decapsulate() local
4900 unsigned char *pms = NULL, *ct = NULL; ssl_encapsulate() local
[all...]
H A Dssl_local.h1340 unsigned char *pms; member
2460 __owur int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen,
2463 __owur int ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen);
/third_party/astc-encoder/Source/
H A Dastcenc_find_best_partitioning.cpp624 partition_metrics pms[BLOCK_MAX_PARTITIONS];
626 compute_avgs_and_dirs_4_comp(pi, blk, pms);
638 partition_metrics& pm = pms[j];
698 partition_metrics pms[BLOCK_MAX_PARTITIONS];
699 compute_avgs_and_dirs_3_comp_rgb(pi, blk, pms);
705 partition_metrics& pm = pms[j];
H A Dastcenc_ideal_endpoints_and_weights.cpp231 partition_metrics pms[BLOCK_MAX_PARTITIONS];
261 compute_avgs_and_dirs_2_comp(pi, blk, component1, component2, pms);
271 vfloat4 dir = pms[i].dir;
277 line2 line { pms[i].avg, normalize_safe(dir, unit2()) };
367 partition_metrics *pms = reinterpret_cast<partition_metrics *>(&blk.pms[0]);
408 compute_avgs_and_dirs_3_comp_rgb(pi, blk, pms);
412 compute_avgs_and_dirs_3_comp(pi, blk, omitted_component, pms);
420 vfloat4 dir = pms[i].dir;
426 line3 line { pms[
[all...]
H A Dastcenc_pick_best_endpoint_format.cpp318 partition_metrics *pms = reinterpret_cast<partition_metrics *>(&blk.pms[0]); local
322 compute_avgs_and_dirs_3_comp_rgb(pi, blk, pms);
327 partition_metrics& pm = pms[i];
H A Dastcenc_internal.h766 mutable partition_metrics pms[BLOCK_MAX_PARTITIONS]; member
/third_party/mbedtls/library/
H A Dssl_tls12_client.c1920 MBEDTLS_SSL_DEBUG_MSG(1, ("buffer too small for encrypted pms")); in ssl_write_encrypted_pms()
2989 unsigned char *pms = ssl->handshake->premaster; in ssl_write_client_key_exchange() local
2990 const unsigned char * const pms_end = pms + in ssl_write_client_key_exchange()
3001 pms + zlen_size, in ssl_write_client_key_exchange()
3002 pms_end - (pms + zlen_size), in ssl_write_client_key_exchange()
3015 MBEDTLS_PUT_UINT16_BE(zlen, pms, 0); in ssl_write_client_key_exchange()
3016 pms += zlen_size + zlen; in ssl_write_client_key_exchange()
3089 unsigned char *pms = ssl->handshake->premaster; in ssl_write_client_key_exchange() local
3090 unsigned char *pms_end = pms + sizeof(ssl->handshake->premaster); in ssl_write_client_key_exchange()
3095 pms in ssl_write_client_key_exchange()
[all...]
H A Dssl_tls12_server.c3525 unsigned char *pms = ssl->handshake->premaster + pms_offset; in ssl_parse_encrypted_pms() local
3592 /* Set pms to either the true or the fake PMS, without in ssl_parse_encrypted_pms()
3594 mbedtls_ct_memcpy_if(diff, pms, fake_pms, peer_pms, ssl->handshake->pmslen); in ssl_parse_encrypted_pms()
3889 unsigned char *pms = ssl->handshake->premaster; in ssl_parse_client_key_exchange() local
3890 unsigned char *pms_end = pms + sizeof(ssl->handshake->premaster); in ssl_parse_client_key_exchange()
3895 pms + 2, pms_end - (pms + 2), &pms_len, in ssl_parse_client_key_exchange()
3900 MBEDTLS_PUT_UINT16_BE(pms_len, pms, 0); in ssl_parse_client_key_exchange()
3901 pms += 2 + pms_len; in ssl_parse_client_key_exchange()
H A Decjpake.c1058 unsigned char buf[512], pms[32]; in mbedtls_ecjpake_self_test() local
1102 pms, sizeof(pms), &pmslen, ecjpake_lgc, NULL) == 0); in mbedtls_ecjpake_self_test()
1113 TEST_ASSERT(memcmp(buf, pms, len) == 0); in mbedtls_ecjpake_self_test()
H A Dpsa_crypto.c6956 uint8_t *pms = mbedtls_calloc(1, pms_len); in psa_tls12_prf_psk_to_ms_set_key() local
6957 if (pms == NULL) { in psa_tls12_prf_psk_to_ms_set_key()
6960 uint8_t *cur = pms; in psa_tls12_prf_psk_to_ms_set_key()
7000 status = psa_tls12_prf_set_key(prf, pms, (size_t) (cur - pms)); in psa_tls12_prf_psk_to_ms_set_key()
7002 mbedtls_zeroize_and_free(pms, pms_len); in psa_tls12_prf_psk_to_ms_set_key()

Completed in 60 milliseconds