/third_party/libsnd/src/ |
H A D | ms_adpcm.c | 92 static int msadpcm_decode_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) ; 93 static sf_count_t msadpcm_read_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, short *ptr, int len) ; 95 static int msadpcm_encode_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) ; 96 static sf_count_t msadpcm_write_block (SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, const short *ptr, int len) ; 119 { MSADPCM_PRIVATE *pms ; in wavlike_msadpcm_init() local 146 pms = (MSADPCM_PRIVATE*) psf->codec_data ; in wavlike_msadpcm_init() 148 pms->sync_error = 0 ; in wavlike_msadpcm_init() 149 pms->samples = pms->dummydata ; in wavlike_msadpcm_init() 150 pms in wavlike_msadpcm_init() 204 msadpcm_get_bpred(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, unsigned char value) msadpcm_get_bpred() argument 217 msadpcm_decode_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) msadpcm_decode_block() argument 320 msadpcm_read_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, short *ptr, int len) msadpcm_read_block() argument 347 { MSADPCM_PRIVATE *pms ; msadpcm_read_s() local 372 { MSADPCM_PRIVATE *pms ; msadpcm_read_i() local 402 { MSADPCM_PRIVATE *pms ; msadpcm_read_f() local 434 { MSADPCM_PRIVATE *pms ; msadpcm_read_d() local 467 { MSADPCM_PRIVATE *pms ; msadpcm_seek() local 526 msadpcm_encode_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms) msadpcm_encode_block() argument 648 msadpcm_write_block(SF_PRIVATE *psf, MSADPCM_PRIVATE *pms, const short *ptr, int len) msadpcm_write_block() argument 671 { MSADPCM_PRIVATE *pms ; msadpcm_write_s() local 695 { MSADPCM_PRIVATE *pms ; msadpcm_write_i() local 722 { MSADPCM_PRIVATE *pms ; msadpcm_write_f() local 752 { MSADPCM_PRIVATE *pms ; msadpcm_write_d() local 785 { MSADPCM_PRIVATE *pms ; msadpcm_close() local [all...] |
/third_party/node/deps/openssl/openssl/ssl/statem/ |
H A D | statem_clnt.c | 2839 unsigned char *pms = NULL; in tls_construct_cke_rsa() local 2857 pms = OPENSSL_malloc(pmslen); in tls_construct_cke_rsa() 2858 if (pms == NULL) { in tls_construct_cke_rsa() 2863 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa() 2864 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa() 2865 if (RAND_bytes_ex(s->ctx->libctx, pms + 2, pmslen - 2, 0) <= 0) { in tls_construct_cke_rsa() 2878 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa() 2883 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa() 2897 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { in tls_construct_cke_rsa() 2902 s->s3.tmp.pms in tls_construct_cke_rsa() 3031 unsigned char *pms = NULL; tls_construct_cke_gost() local 3174 unsigned char *pms = NULL; tls_construct_cke_gost18() local 3342 unsigned char *pms = NULL; tls_client_key_exchange_post_work() local [all...] |
H A D | extensions_srvr.c | 1716 * The generated pms is stored in `s->s3.tmp.pms` to be later used via in tls_construct_stoc_key_share() 1739 * This causes the crypto state to be updated based on the generated pms in tls_construct_stoc_key_share() 1741 if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) { in tls_construct_stoc_key_share()
|
/third_party/openssl/ssl/statem/ |
H A D | statem_clnt.c | 2831 unsigned char *pms = NULL; in tls_construct_cke_rsa() local 2849 pms = OPENSSL_malloc(pmslen); in tls_construct_cke_rsa() 2850 if (pms == NULL) { in tls_construct_cke_rsa() 2855 pms[0] = s->client_version >> 8; in tls_construct_cke_rsa() 2856 pms[1] = s->client_version & 0xff; in tls_construct_cke_rsa() 2857 if (RAND_bytes_ex(s->ctx->libctx, pms + 2, pmslen - 2, 0) <= 0) { in tls_construct_cke_rsa() 2870 || EVP_PKEY_encrypt(pctx, NULL, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa() 2875 || EVP_PKEY_encrypt(pctx, encdata, &enclen, pms, pmslen) <= 0) { in tls_construct_cke_rsa() 2889 if (!ssl_log_rsa_client_key_exchange(s, encdata, enclen, pms, pmslen)) { in tls_construct_cke_rsa() 2894 s->s3.tmp.pms in tls_construct_cke_rsa() 3023 unsigned char *pms = NULL; tls_construct_cke_gost() local 3166 unsigned char *pms = NULL; tls_construct_cke_gost18() local 3334 unsigned char *pms = NULL; tls_client_key_exchange_post_work() local [all...] |
H A D | extensions_srvr.c | 1683 * The generated pms is stored in `s->s3.tmp.pms` to be later used via in tls_construct_stoc_key_share() 1706 * This causes the crypto state to be updated based on the generated pms in tls_construct_stoc_key_share() 1708 if (ssl_gensecret(s, s->s3.tmp.pms, s->s3.tmp.pmslen) == 0) { in tls_construct_stoc_key_share()
|
/third_party/node/deps/openssl/openssl/ssl/ |
H A D | s3_lib.c | 3361 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_free() 3384 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_clear() 4600 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, in ssl_generate_master_secret() argument 4627 memcpy(t, pms, pmslen); in ssl_generate_master_secret() 4649 s->session->master_key, pms, pmslen, in ssl_generate_master_secret() 4658 if (pms) { in ssl_generate_master_secret() 4660 OPENSSL_clear_free(pms, pmslen); in ssl_generate_master_secret() 4662 OPENSSL_cleanse(pms, pmslen); in ssl_generate_master_secret() 4665 s->s3.tmp.pms = NULL; in ssl_generate_master_secret() 4765 /* Generate secrets from pms */ 4766 ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen) ssl_gensecret() argument 4795 unsigned char *pms = NULL; ssl_derive() local 4850 unsigned char *pms = NULL; ssl_decapsulate() local 4900 unsigned char *pms = NULL, *ct = NULL; ssl_encapsulate() local [all...] |
H A D | ssl_local.h | 1364 unsigned char *pms; member 2516 __owur int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, 2519 __owur int ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen);
|
/third_party/openssl/ssl/ |
H A D | s3_lib.c | 3361 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_free() 3384 OPENSSL_clear_free(s->s3.tmp.pms, s->s3.tmp.pmslen); in ssl3_clear() 4600 int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, in ssl_generate_master_secret() argument 4627 memcpy(t, pms, pmslen); in ssl_generate_master_secret() 4649 s->session->master_key, pms, pmslen, in ssl_generate_master_secret() 4658 if (pms) { in ssl_generate_master_secret() 4660 OPENSSL_clear_free(pms, pmslen); in ssl_generate_master_secret() 4662 OPENSSL_cleanse(pms, pmslen); in ssl_generate_master_secret() 4665 s->s3.tmp.pms = NULL; in ssl_generate_master_secret() 4765 /* Generate secrets from pms */ 4766 ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen) ssl_gensecret() argument 4795 unsigned char *pms = NULL; ssl_derive() local 4850 unsigned char *pms = NULL; ssl_decapsulate() local 4900 unsigned char *pms = NULL, *ct = NULL; ssl_encapsulate() local [all...] |
H A D | ssl_local.h | 1340 unsigned char *pms; member 2460 __owur int ssl_generate_master_secret(SSL *s, unsigned char *pms, size_t pmslen, 2463 __owur int ssl_gensecret(SSL *s, unsigned char *pms, size_t pmslen);
|
/third_party/astc-encoder/Source/ |
H A D | astcenc_find_best_partitioning.cpp | 624 partition_metrics pms[BLOCK_MAX_PARTITIONS]; 626 compute_avgs_and_dirs_4_comp(pi, blk, pms); 638 partition_metrics& pm = pms[j]; 698 partition_metrics pms[BLOCK_MAX_PARTITIONS]; 699 compute_avgs_and_dirs_3_comp_rgb(pi, blk, pms); 705 partition_metrics& pm = pms[j];
|
H A D | astcenc_ideal_endpoints_and_weights.cpp | 231 partition_metrics pms[BLOCK_MAX_PARTITIONS]; 261 compute_avgs_and_dirs_2_comp(pi, blk, component1, component2, pms); 271 vfloat4 dir = pms[i].dir; 277 line2 line { pms[i].avg, normalize_safe(dir, unit2()) }; 367 partition_metrics *pms = reinterpret_cast<partition_metrics *>(&blk.pms[0]); 408 compute_avgs_and_dirs_3_comp_rgb(pi, blk, pms); 412 compute_avgs_and_dirs_3_comp(pi, blk, omitted_component, pms); 420 vfloat4 dir = pms[i].dir; 426 line3 line { pms[ [all...] |
H A D | astcenc_pick_best_endpoint_format.cpp | 318 partition_metrics *pms = reinterpret_cast<partition_metrics *>(&blk.pms[0]); local 322 compute_avgs_and_dirs_3_comp_rgb(pi, blk, pms); 327 partition_metrics& pm = pms[i];
|
H A D | astcenc_internal.h | 766 mutable partition_metrics pms[BLOCK_MAX_PARTITIONS]; member
|
/third_party/mbedtls/library/ |
H A D | ssl_tls12_client.c | 1920 MBEDTLS_SSL_DEBUG_MSG(1, ("buffer too small for encrypted pms")); in ssl_write_encrypted_pms() 2989 unsigned char *pms = ssl->handshake->premaster; in ssl_write_client_key_exchange() local 2990 const unsigned char * const pms_end = pms + in ssl_write_client_key_exchange() 3001 pms + zlen_size, in ssl_write_client_key_exchange() 3002 pms_end - (pms + zlen_size), in ssl_write_client_key_exchange() 3015 MBEDTLS_PUT_UINT16_BE(zlen, pms, 0); in ssl_write_client_key_exchange() 3016 pms += zlen_size + zlen; in ssl_write_client_key_exchange() 3089 unsigned char *pms = ssl->handshake->premaster; in ssl_write_client_key_exchange() local 3090 unsigned char *pms_end = pms + sizeof(ssl->handshake->premaster); in ssl_write_client_key_exchange() 3095 pms in ssl_write_client_key_exchange() [all...] |
H A D | ssl_tls12_server.c | 3525 unsigned char *pms = ssl->handshake->premaster + pms_offset; in ssl_parse_encrypted_pms() local 3592 /* Set pms to either the true or the fake PMS, without in ssl_parse_encrypted_pms() 3594 mbedtls_ct_memcpy_if(diff, pms, fake_pms, peer_pms, ssl->handshake->pmslen); in ssl_parse_encrypted_pms() 3889 unsigned char *pms = ssl->handshake->premaster; in ssl_parse_client_key_exchange() local 3890 unsigned char *pms_end = pms + sizeof(ssl->handshake->premaster); in ssl_parse_client_key_exchange() 3895 pms + 2, pms_end - (pms + 2), &pms_len, in ssl_parse_client_key_exchange() 3900 MBEDTLS_PUT_UINT16_BE(pms_len, pms, 0); in ssl_parse_client_key_exchange() 3901 pms += 2 + pms_len; in ssl_parse_client_key_exchange()
|
H A D | ecjpake.c | 1058 unsigned char buf[512], pms[32]; in mbedtls_ecjpake_self_test() local 1102 pms, sizeof(pms), &pmslen, ecjpake_lgc, NULL) == 0); in mbedtls_ecjpake_self_test() 1113 TEST_ASSERT(memcmp(buf, pms, len) == 0); in mbedtls_ecjpake_self_test()
|
H A D | psa_crypto.c | 6956 uint8_t *pms = mbedtls_calloc(1, pms_len); in psa_tls12_prf_psk_to_ms_set_key() local 6957 if (pms == NULL) { in psa_tls12_prf_psk_to_ms_set_key() 6960 uint8_t *cur = pms; in psa_tls12_prf_psk_to_ms_set_key() 7000 status = psa_tls12_prf_set_key(prf, pms, (size_t) (cur - pms)); in psa_tls12_prf_psk_to_ms_set_key() 7002 mbedtls_zeroize_and_free(pms, pms_len); in psa_tls12_prf_psk_to_ms_set_key()
|