/third_party/node/deps/openssl/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 61 size_t context_len, in hash_init_with_dom() 73 if (context_len > UINT8_MAX) in hash_init_with_dom() 78 dom[1] = (uint8_t)context_len; in hash_init_with_dom() 87 || !EVP_DigestUpdate(hashctx, context, context_len)) { in hash_init_with_dom() 165 size_t context_len, const char *propq) in ossl_c448_ed448_sign() 194 context_len, propq) in ossl_c448_ed448_sign() 235 if (!hash_init_with_dom(ctx, hashctx, prehashed, 0, context, context_len, in ossl_c448_ed448_sign() 273 size_t context_len, const char *propq) in ossl_c448_ed448_sign_prehash() 276 context, context_len, propq); in ossl_c448_ed448_sign_prehash() 286 uint8_t context_len, cons in ossl_c448_ed448_verify() 57 hash_init_with_dom(OSSL_LIB_CTX *ctx, EVP_MD_CTX *hashctx, uint8_t prehashed, uint8_t for_prehash, const uint8_t *context, size_t context_len, const char *propq) hash_init_with_dom() argument 159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument 267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument 280 ossl_c448_ed448_verify( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify() argument 364 ossl_c448_ed448_verify_prehash( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify_prehash() argument 376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument 387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_verify() argument 397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument 407 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_verify() argument [all...] |
H A D | ed448.h | 58 * context_len (in): Length of the context. 71 size_t context_len, 84 * context_len (in): Length of the context. 97 size_t context_len, 112 * context_len (in): Length of the context. 126 uint8_t context_len, 140 * context_len (in): Length of the context. 153 uint8_t context_len,
|
H A D | curve448_local.h | 16 const uint8_t *context, size_t context_len, const char *propq); 21 const uint8_t *context, size_t context_len,
|
/third_party/openssl/crypto/ec/curve448/ |
H A D | eddsa.c | 61 size_t context_len, in hash_init_with_dom() 73 if (context_len > UINT8_MAX) in hash_init_with_dom() 78 dom[1] = (uint8_t)context_len; in hash_init_with_dom() 87 || !EVP_DigestUpdate(hashctx, context, context_len)) { in hash_init_with_dom() 165 size_t context_len, const char *propq) in ossl_c448_ed448_sign() 194 context_len, propq) in ossl_c448_ed448_sign() 235 if (!hash_init_with_dom(ctx, hashctx, prehashed, 0, context, context_len, in ossl_c448_ed448_sign() 273 size_t context_len, const char *propq) in ossl_c448_ed448_sign_prehash() 276 context, context_len, propq); in ossl_c448_ed448_sign_prehash() 286 uint8_t context_len, cons in ossl_c448_ed448_verify() 57 hash_init_with_dom(OSSL_LIB_CTX *ctx, EVP_MD_CTX *hashctx, uint8_t prehashed, uint8_t for_prehash, const uint8_t *context, size_t context_len, const char *propq) hash_init_with_dom() argument 159 ossl_c448_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign() argument 267 ossl_c448_ed448_sign_prehash( OSSL_LIB_CTX *ctx, uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t privkey[EDDSA_448_PRIVATE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, size_t context_len, const char *propq) ossl_c448_ed448_sign_prehash() argument 280 ossl_c448_ed448_verify( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t *message, size_t message_len, uint8_t prehashed, const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify() argument 364 ossl_c448_ed448_verify_prehash( OSSL_LIB_CTX *ctx, const uint8_t signature[EDDSA_448_SIGNATURE_BYTES], const uint8_t pubkey[EDDSA_448_PUBLIC_BYTES], const uint8_t hash[64], const uint8_t *context, uint8_t context_len, const char *propq) ossl_c448_ed448_verify_prehash() argument 376 ossl_ed448_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t *message, size_t message_len, const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_sign() argument 387 ossl_ed448_verify(OSSL_LIB_CTX *ctx, const uint8_t *message, size_t message_len, const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448_verify() argument 397 ossl_ed448ph_sign(OSSL_LIB_CTX *ctx, uint8_t *out_sig, const uint8_t hash[64], const uint8_t public_key[57], const uint8_t private_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_sign() argument 407 ossl_ed448ph_verify(OSSL_LIB_CTX *ctx, const uint8_t hash[64], const uint8_t signature[114], const uint8_t public_key[57], const uint8_t *context, size_t context_len, const char *propq) ossl_ed448ph_verify() argument [all...] |
H A D | ed448.h | 58 * context_len (in): Length of the context. 71 size_t context_len, 84 * context_len (in): Length of the context. 97 size_t context_len, 112 * context_len (in): Length of the context. 126 uint8_t context_len, 140 * context_len (in): Length of the context. 153 uint8_t context_len,
|
H A D | curve448_local.h | 16 const uint8_t *context, size_t context_len, const char *propq); 21 const uint8_t *context, size_t context_len,
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
H A D | kbkdf.c | 68 size_t context_len; member 141 OPENSSL_clear_free(ctx->context, ctx->context_len); in kbkdf_reset() 153 unsigned char *context, size_t context_len, in derive() 192 || !EVP_MAC_update(ctx, context, context_len) in derive() 259 ctx->label_len, ctx->context, ctx->context_len, k_i, h, l, in kbkdf_derive() 321 if (p != NULL && !kbkdf_set_buffer(&ctx->context, &ctx->context_len, p)) in kbkdf_set_ctx_params() 151 derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, size_t iv_len, unsigned char *label, size_t label_len, unsigned char *context, size_t context_len, unsigned char *k_i, size_t h, uint32_t l, int has_separator, unsigned char *ko, size_t ko_len) derive() argument
|
/third_party/openssl/providers/implementations/kdfs/ |
H A D | kbkdf.c | 68 size_t context_len; member 141 OPENSSL_clear_free(ctx->context, ctx->context_len); in kbkdf_reset() 153 unsigned char *context, size_t context_len, in derive() 192 || !EVP_MAC_update(ctx, context, context_len) in derive() 259 ctx->label_len, ctx->context, ctx->context_len, k_i, h, l, in kbkdf_derive() 321 if (p != NULL && !kbkdf_set_buffer(&ctx->context, &ctx->context_len, p)) in kbkdf_set_ctx_params() 151 derive(EVP_MAC_CTX *ctx_init, kbkdf_mode mode, unsigned char *iv, size_t iv_len, unsigned char *label, size_t label_len, unsigned char *context, size_t context_len, unsigned char *k_i, size_t h, uint32_t l, int has_separator, unsigned char *ko, size_t ko_len) derive() argument
|
/third_party/skia/third_party/externals/harfbuzz/src/ |
H A D | hb-buffer.cc | 252 memset (context_len, 0, sizeof context_len); in clear() 1579 while (start < prev && buffer->context_len[0] < buffer->CONTEXT_LENGTH) in hb_buffer_add_utf() 1583 buffer->context[0][buffer->context_len[0]++] = u; in hb_buffer_add_utf() 1600 while (next < end && buffer->context_len[1] < buffer->CONTEXT_LENGTH) in hb_buffer_add_utf() 1604 buffer->context[1][buffer->context_len[1]++] = u; in hb_buffer_add_utf() 1806 if (!orig_len && start + source->context_len[0] > 0) in hb_buffer_append() 1809 while (start > 0 && buffer->context_len[0] < buffer->CONTEXT_LENGTH) in hb_buffer_append() 1810 buffer->context[0][buffer->context_len[0]++] = source->info[--start].codepoint; in hb_buffer_append() 1811 for (auto i = 0u; i < source->context_len[ in hb_buffer_append() [all...] |
/third_party/selinux/libsepol/utils/ |
H A D | sepol_compute_relabel.c | 16 size_t context_len; in main() local 55 if (sepol_sid_to_context(out_sid, &context, &context_len) < 0) { in main()
|
H A D | sepol_compute_member.c | 16 size_t context_len; in main() local 55 if (sepol_sid_to_context(out_sid, &context, &context_len) < 0) { in main()
|
/third_party/node/deps/v8/src/wasm/ |
H A D | wasm-result.cc | 65 size_t context_len = 0; in Format() 68 context_len = error_msg_.size(); in Format() 70 VPrintFToString(&error_msg_, context_len, format, args); in Format()
|
/third_party/node/deps/openssl/openssl/util/perl/TLSProxy/ |
H A D | Certificate.pm | 44 my $context_len = unpack('C', $self->data); 45 my $context = substr($self->data, 1, $context_len); 47 my $remdata = substr($self->data, 1 + $context_len);
|
/third_party/openssl/util/perl/TLSProxy/ |
H A D | Certificate.pm | 44 my $context_len = unpack('C', $self->data); 45 my $context = substr($self->data, 1, $context_len); 47 my $remdata = substr($self->data, 1 + $context_len);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
H A D | eap_server_tls.c | 362 size_t context_len = 0; in eap_tls_getKey() local 370 context_len = 1; in eap_tls_getKey() 375 context, context_len, in eap_tls_getKey() 397 size_t context_len = 0; in eap_tls_get_emsk() local 405 context_len = 1; in eap_tls_get_emsk() 410 context, context_len, in eap_tls_get_emsk()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
H A D | eap_server_tls.c | 330 size_t context_len = 0; in eap_tls_getKey() local 338 context_len = 1; in eap_tls_getKey() 343 context, context_len, in eap_tls_getKey() 365 size_t context_len = 0; in eap_tls_get_emsk() local 373 context_len = 1; in eap_tls_get_emsk() 378 context, context_len, in eap_tls_get_emsk()
|
H A D | eap_server_peap.c | 331 size_t context_len = 0; in eap_peap_derive_cmk() local 336 context_len = sizeof(eap_tls13_context); in eap_peap_derive_cmk() 347 context, context_len, in eap_peap_derive_cmk() 1336 size_t context_len = 0; in eap_peap_getKey() local 1372 context_len = sizeof(eap_tls13_context); in eap_peap_getKey() 1379 label, context, context_len, in eap_peap_getKey() 1401 size_t context_len = 0; in eap_peap_get_emsk() local 1414 context_len = sizeof(eap_tls13_context); in eap_peap_get_emsk() 1421 label, context, context_len, in eap_peap_get_emsk()
|
/third_party/node/deps/openssl/openssl/include/crypto/ |
H A D | ecx.h | 112 size_t context_len, const char *propq); 117 const uint8_t *context, size_t context_len, const char *propq);
|
/third_party/openssl/include/crypto/ |
H A D | ecx.h | 112 size_t context_len, const char *propq); 117 const uint8_t *context, size_t context_len, const char *propq);
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
H A D | tls_internal.c | 416 size_t context_len, int server_random_first, in tls_connection_prf() 436 context_len, server_random_first, in tls_connection_prf() 443 context_len, server_random_first, in tls_connection_prf() 457 size_t context_len, u8 *out, size_t out_len) in tls_connection_export_key() 459 return tls_connection_prf(tls_ctx, conn, label, context, context_len, in tls_connection_export_key() 414 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, int skip_keyblock, u8 *out, size_t out_len) tls_connection_prf() argument 455 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) tls_connection_export_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client.c | 518 * @context_len: The length of the context value 526 const u8 *context, size_t context_len, in tlsv1_client_prf() 536 if (context_len > 65535) in tlsv1_client_prf() 540 seed_len += 2 + context_len; in tlsv1_client_prf() 558 WPA_PUT_BE16(pos, context_len); in tlsv1_client_prf() 560 os_memcpy(pos, context, context_len); in tlsv1_client_prf() 525 tlsv1_client_prf(struct tlsv1_client *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_client_prf() argument
|
H A D | tlsv1_server.c | 466 * @context_len: The length of the context value 474 const u8 *context, size_t context_len, in tlsv1_server_prf() 484 if (context_len > 65535) in tlsv1_server_prf() 488 seed_len += 2 + context_len; in tlsv1_server_prf() 506 WPA_PUT_BE16(pos, context_len); in tlsv1_server_prf() 508 os_memcpy(pos, context, context_len); in tlsv1_server_prf() 473 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_server_prf() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
H A D | tls_internal.c | 416 size_t context_len, int server_random_first, in tls_connection_prf() 436 context_len, server_random_first, in tls_connection_prf() 443 context_len, server_random_first, in tls_connection_prf() 457 size_t context_len, u8 *out, size_t out_len) in tls_connection_export_key() 459 return tls_connection_prf(tls_ctx, conn, label, context, context_len, in tls_connection_export_key() 414 tls_connection_prf(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, int skip_keyblock, u8 *out, size_t out_len) tls_connection_prf() argument 455 tls_connection_export_key(void *tls_ctx, struct tls_connection *conn, const char *label, const u8 *context, size_t context_len, u8 *out, size_t out_len) tls_connection_export_key() argument
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client.c | 542 * @context_len: The length of the context value 550 const u8 *context, size_t context_len, in tlsv1_client_prf() 560 if (context_len > 65535) in tlsv1_client_prf() 564 seed_len += 2 + context_len; in tlsv1_client_prf() 582 WPA_PUT_BE16(pos, context_len); in tlsv1_client_prf() 584 os_memcpy(pos, context, context_len); in tlsv1_client_prf() 549 tlsv1_client_prf(struct tlsv1_client *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_client_prf() argument
|
H A D | tlsv1_server.c | 466 * @context_len: The length of the context value 474 const u8 *context, size_t context_len, in tlsv1_server_prf() 484 if (context_len > 65535) in tlsv1_server_prf() 488 seed_len += 2 + context_len; in tlsv1_server_prf() 506 WPA_PUT_BE16(pos, context_len); in tlsv1_server_prf() 508 os_memcpy(pos, context, context_len); in tlsv1_server_prf() 473 tlsv1_server_prf(struct tlsv1_server *conn, const char *label, const u8 *context, size_t context_len, int server_random_first, u8 *out, size_t out_len) tlsv1_server_prf() argument
|