Home
last modified time | relevance | path

Searched refs:context_len (Results 1 - 25 of 57) sorted by relevance

123

/third_party/node/deps/openssl/openssl/crypto/ec/curve448/
H A Deddsa.c61 size_t context_len, in hash_init_with_dom()
73 if (context_len > UINT8_MAX) in hash_init_with_dom()
78 dom[1] = (uint8_t)context_len; in hash_init_with_dom()
87 || !EVP_DigestUpdate(hashctx, context, context_len)) { in hash_init_with_dom()
165 size_t context_len, const char *propq) in ossl_c448_ed448_sign()
194 context_len, propq) in ossl_c448_ed448_sign()
235 if (!hash_init_with_dom(ctx, hashctx, prehashed, 0, context, context_len, in ossl_c448_ed448_sign()
273 size_t context_len, const char *propq) in ossl_c448_ed448_sign_prehash()
276 context, context_len, propq); in ossl_c448_ed448_sign_prehash()
286 uint8_t context_len, cons in ossl_c448_ed448_verify()
57 hash_init_with_dom(OSSL_LIB_CTX *ctx, EVP_MD_CTX *hashctx, uint8_t prehashed, uint8_t for_prehash, const uint8_t *context, size_t context_len, const char *propq) hash_init_with_dom() argument
159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument
267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument
280 ossl_c448_ed448_verify( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify() argument
364 ossl_c448_ed448_verify_prehash( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify_prehash() argument
376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument
387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_verify() argument
397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument
407 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_verify() argument
[all...]
H A Ded448.h58 * context_len (in): Length of the context.
71 size_t context_len,
84 * context_len (in): Length of the context.
97 size_t context_len,
112 * context_len (in): Length of the context.
126 uint8_t context_len,
140 * context_len (in): Length of the context.
153 uint8_t context_len,
H A Dcurve448_local.h16 const uint8_t *context, size_t context_len, const char *propq);
21 const uint8_t *context, size_t context_len,
/third_party/openssl/crypto/ec/curve448/
H A Deddsa.c61 size_t context_len, in hash_init_with_dom()
73 if (context_len > UINT8_MAX) in hash_init_with_dom()
78 dom[1] = (uint8_t)context_len; in hash_init_with_dom()
87 || !EVP_DigestUpdate(hashctx, context, context_len)) { in hash_init_with_dom()
165 size_t context_len, const char *propq) in ossl_c448_ed448_sign()
194 context_len, propq) in ossl_c448_ed448_sign()
235 if (!hash_init_with_dom(ctx, hashctx, prehashed, 0, context, context_len, in ossl_c448_ed448_sign()
273 size_t context_len, const char *propq) in ossl_c448_ed448_sign_prehash()
276 context, context_len, propq); in ossl_c448_ed448_sign_prehash()
286 uint8_t context_len, cons in ossl_c448_ed448_verify()
57 hash_init_with_dom(OSSL_LIB_CTX *ctx, EVP_MD_CTX *hashctx, uint8_t prehashed, uint8_t for_prehash, const uint8_t *context, size_t context_len, const char *propq) hash_init_with_dom() argument
159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument
267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument
280 ossl_c448_ed448_verify( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify() argument
364 ossl_c448_ed448_verify_prehash( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify_prehash() argument
376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument
387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_verify() argument
397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument
407 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_verify() argument
[all...]
H A Ded448.h58 * context_len (in): Length of the context.
71 size_t context_len,
84 * context_len (in): Length of the context.
97 size_t context_len,
112 * context_len (in): Length of the context.
126 uint8_t context_len,
140 * context_len (in): Length of the context.
153 uint8_t context_len,
H A Dcurve448_local.h16 const uint8_t *context, size_t context_len, const char *propq);
21 const uint8_t *context, size_t context_len,
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
H A Dkbkdf.c68 size_t context_len; member
141 OPENSSL_clear_free(ctx->context, ctx->context_len); in kbkdf_reset()
153 unsigned char *context, size_t context_len, in derive()
192 || !EVP_MAC_update(ctx, context, context_len) in derive()
259 ctx->label_len, ctx->context, ctx->context_len, k_i, h, l, in kbkdf_derive()
321 if (p != NULL && !kbkdf_set_buffer(&ctx->context, &ctx->context_len, p)) in kbkdf_set_ctx_params()
151 derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, size_t iv_len, unsigned char *label, size_t label_len, unsigned char *context, size_t context_len, unsigned char *k_i, size_t h, uint32_t l, int has_separator, unsigned char *ko, size_t ko_len) derive() argument
/third_party/openssl/providers/implementations/kdfs/
H A Dkbkdf.c68 size_t context_len; member
141 OPENSSL_clear_free(ctx->context, ctx->context_len); in kbkdf_reset()
153 unsigned char *context, size_t context_len, in derive()
192 || !EVP_MAC_update(ctx, context, context_len) in derive()
259 ctx->label_len, ctx->context, ctx->context_len, k_i, h, l, in kbkdf_derive()
321 if (p != NULL && !kbkdf_set_buffer(&ctx->context, &ctx->context_len, p)) in kbkdf_set_ctx_params()
151 derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, size_t iv_len, unsigned char *label, size_t label_len, unsigned char *context, size_t context_len, unsigned char *k_i, size_t h, uint32_t l, int has_separator, unsigned char *ko, size_t ko_len) derive() argument
/third_party/skia/third_party/externals/harfbuzz/src/
H A Dhb-buffer.cc252 memset (context_len, 0, sizeof context_len); in clear()
1579 while (start < prev && buffer->context_len[0] < buffer->CONTEXT_LENGTH) in hb_buffer_add_utf()
1583 buffer->context[0][buffer->context_len[0]++] = u; in hb_buffer_add_utf()
1600 while (next < end && buffer->context_len[1] < buffer->CONTEXT_LENGTH) in hb_buffer_add_utf()
1604 buffer->context[1][buffer->context_len[1]++] = u; in hb_buffer_add_utf()
1806 if (!orig_len && start + source->context_len[0] > 0) in hb_buffer_append()
1809 while (start > 0 && buffer->context_len[0] < buffer->CONTEXT_LENGTH) in hb_buffer_append()
1810 buffer->context[0][buffer->context_len[0]++] = source->info[--start].codepoint; in hb_buffer_append()
1811 for (auto i = 0u; i < source->context_len[ in hb_buffer_append()
[all...]
/third_party/selinux/libsepol/utils/
H A Dsepol_compute_relabel.c16 size_t context_len; in main() local
55 if (sepol_sid_to_context(out_sid, &context, &context_len) < 0) { in main()
H A Dsepol_compute_member.c16 size_t context_len; in main() local
55 if (sepol_sid_to_context(out_sid, &context, &context_len) < 0) { in main()
/third_party/node/deps/v8/src/wasm/
H A Dwasm-result.cc65 size_t context_len = 0; in Format()
68 context_len = error_msg_.size(); in Format()
70 VPrintFToString(&error_msg_, context_len, format, args); in Format()
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/
H A DCertificate.pm44 my $context_len = unpack('C', $self->data);
45 my $context = substr($self->data, 1, $context_len);
47 my $remdata = substr($self->data, 1 + $context_len);
/third_party/openssl/util/perl/TLSProxy/
H A DCertificate.pm44 my $context_len = unpack('C', $self->data);
45 my $context = substr($self->data, 1, $context_len);
47 my $remdata = substr($self->data, 1 + $context_len);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/
H A Deap_server_tls.c362 size_t context_len = 0; in eap_tls_getKey() local
370 context_len = 1; in eap_tls_getKey()
375 context, context_len, in eap_tls_getKey()
397 size_t context_len = 0; in eap_tls_get_emsk() local
405 context_len = 1; in eap_tls_get_emsk()
410 context, context_len, in eap_tls_get_emsk()
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/
H A Deap_server_tls.c330 size_t context_len = 0; in eap_tls_getKey() local
338 context_len = 1; in eap_tls_getKey()
343 context, context_len, in eap_tls_getKey()
365 size_t context_len = 0; in eap_tls_get_emsk() local
373 context_len = 1; in eap_tls_get_emsk()
378 context, context_len, in eap_tls_get_emsk()
H A Deap_server_peap.c331 size_t context_len = 0; in eap_peap_derive_cmk() local
336 context_len = sizeof(eap_tls13_context); in eap_peap_derive_cmk()
347 context, context_len, in eap_peap_derive_cmk()
1336 size_t context_len = 0; in eap_peap_getKey() local
1372 context_len = sizeof(eap_tls13_context); in eap_peap_getKey()
1379 label, context, context_len, in eap_peap_getKey()
1401 size_t context_len = 0; in eap_peap_get_emsk() local
1414 context_len = sizeof(eap_tls13_context); in eap_peap_get_emsk()
1421 label, context, context_len, in eap_peap_get_emsk()
/third_party/node/deps/openssl/openssl/include/crypto/
H A Decx.h112 size_t context_len, const char *propq);
117 const uint8_t *context, size_t context_len, const char *propq);
/third_party/openssl/include/crypto/
H A Decx.h112 size_t context_len, const char *propq);
117 const uint8_t *context, size_t context_len, const char *propq);
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/
H A Dtls_internal.c416 size_t context_len, int server_random_first, in tls_connection_prf()
436 context_len, server_random_first, in tls_connection_prf()
443 context_len, server_random_first, in tls_connection_prf()
457 size_t context_len, u8 *out, size_t out_len) in tls_connection_export_key()
459 return tls_connection_prf(tls_ctx, conn, label, context, context_len, in tls_connection_export_key()
414 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, int skip_keyblock, u8 *out, size_t out_len) tls_connection_prf() argument
455 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) tls_connection_export_key() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
H A Dtlsv1_client.c518 * @context_len: The length of the context value
526 const u8 *context, size_t context_len, in tlsv1_client_prf()
536 if (context_len > 65535) in tlsv1_client_prf()
540 seed_len += 2 + context_len; in tlsv1_client_prf()
558 WPA_PUT_BE16(pos, context_len); in tlsv1_client_prf()
560 os_memcpy(pos, context, context_len); in tlsv1_client_prf()
525 tlsv1_client_prf(struct tlsv1_client *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_client_prf() argument
H A Dtlsv1_server.c466 * @context_len: The length of the context value
474 const u8 *context, size_t context_len, in tlsv1_server_prf()
484 if (context_len > 65535) in tlsv1_server_prf()
488 seed_len += 2 + context_len; in tlsv1_server_prf()
506 WPA_PUT_BE16(pos, context_len); in tlsv1_server_prf()
508 os_memcpy(pos, context, context_len); in tlsv1_server_prf()
473 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_server_prf() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/
H A Dtls_internal.c416 size_t context_len, int server_random_first, in tls_connection_prf()
436 context_len, server_random_first, in tls_connection_prf()
443 context_len, server_random_first, in tls_connection_prf()
457 size_t context_len, u8 *out, size_t out_len) in tls_connection_export_key()
459 return tls_connection_prf(tls_ctx, conn, label, context, context_len, in tls_connection_export_key()
414 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, int skip_keyblock, u8 *out, size_t out_len) tls_connection_prf() argument
455 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) tls_connection_export_key() argument
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
H A Dtlsv1_client.c542 * @context_len: The length of the context value
550 const u8 *context, size_t context_len, in tlsv1_client_prf()
560 if (context_len > 65535) in tlsv1_client_prf()
564 seed_len += 2 + context_len; in tlsv1_client_prf()
582 WPA_PUT_BE16(pos, context_len); in tlsv1_client_prf()
584 os_memcpy(pos, context, context_len); in tlsv1_client_prf()
549 tlsv1_client_prf(struct tlsv1_client *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_client_prf() argument
H A Dtlsv1_server.c466 * @context_len: The length of the context value
474 const u8 *context, size_t context_len, in tlsv1_server_prf()
484 if (context_len > 65535) in tlsv1_server_prf()
488 seed_len += 2 + context_len; in tlsv1_server_prf()
506 WPA_PUT_BE16(pos, context_len); in tlsv1_server_prf()
508 os_memcpy(pos, context, context_len); in tlsv1_server_prf()
473 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_server_prf() argument

Completed in 19 milliseconds

123