/third_party/libwebsockets/lib/jose/jwe/enc/ |
H A D | aescbc.c | 32 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_encrypt_cbc_hs() local 42 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_encrypt_cbc_hs() 44 hlen / 2, jwe->jws.map.len[LJWE_ATAG]); in lws_jwe_encrypt_cbc_hs() 81 el.buf = cek + (hlen / 2); in lws_jwe_encrypt_cbc_hs() 82 el.len = (uint32_t)(hlen / 2); in lws_jwe_encrypt_cbc_hs() 120 cek, (unsigned int)hlen / 2)) in lws_jwe_encrypt_cbc_hs() 156 memcpy((void *)jwe->jws.map.buf[LJWE_ATAG], digest, (unsigned int)hlen / 2); in lws_jwe_encrypt_cbc_hs() 165 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_auth_and_decrypt_cbc_hs() local 174 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_auth_and_decrypt_cbc_hs() 176 hlen / in lws_jwe_auth_and_decrypt_cbc_hs() [all...] |
/third_party/lwip/src/netif/ppp/ |
H A D | vj.c | 166 u16_t hlen; in vj_compress_tcp() local 196 hlen = ilen + TCPH_HDRLEN(th); in vj_compress_tcp() 197 hlen <<= 2; in vj_compress_tcp() 198 if (np->len < hlen) { in vj_compress_tcp() 199 PPPDEBUG(LOG_INFO, ("vj_compress_tcp: header len %d spans buffers\n", hlen)); in vj_compress_tcp() 349 lwip_ntohs(IPH_LEN(&cs->cs_ip)) == hlen) { in vj_compress_tcp() 364 if (deltaS == deltaA && deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp() 372 if (deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp() 395 MEMCPY(&cs->cs_ip, ip, hlen); in vj_compress_tcp() 402 * So, (cp - new_seq) + 4 bytes of header are needed. hlen i in vj_compress_tcp() 461 u32_t hlen; vj_uncompress_uncomp() local 505 u32_t vjlen, hlen, changes; vj_uncompress_tcp() local [all...] |
/third_party/curl/lib/ |
H A D | headers.c | 187 static CURLcode namevalue(char *header, size_t hlen, unsigned int type, in namevalue() argument 190 char *end = header + hlen - 1; /* point to the last byte */ in namevalue() 191 DEBUGASSERT(hlen); in namevalue() 283 size_t hlen; /* length of the incoming header */ in Curl_headers_push() local 298 hlen = end - header; in Curl_headers_push() 303 return unfold_value(data, header, hlen); in Curl_headers_push() 307 while(hlen && ISBLANK(*header)) { in Curl_headers_push() 309 hlen--; in Curl_headers_push() 311 if(!hlen) in Curl_headers_push() 316 hs = calloc(1, sizeof(*hs) + hlen); in Curl_headers_push() [all...] |
H A D | hsts.c | 120 size_t hlen; in hsts_create() local 124 hlen = strlen(hostname); in hsts_create() 125 if(hlen && (hostname[hlen - 1] == '.')) in hsts_create() 127 --hlen; in hsts_create() 128 if(hlen) { in hsts_create() 134 duphost = Curl_memdup0(hostname, hlen); in hsts_create() 260 size_t hlen = strlen(hostname); in Curl_hsts() local 264 if((hlen > MAX_HSTS_HOSTLEN) || !hlen) in Curl_hsts() [all...] |
H A D | altsvc.c | 101 size_t hlen; in altsvc_createid() local 105 hlen = strlen(srchost); in altsvc_createid() 107 DEBUGASSERT(hlen); in altsvc_createid() 109 if(!hlen || !dlen) { in altsvc_createid() 114 if((hlen > 2) && srchost[0] == '[') { in altsvc_createid() 117 hlen -= 2; in altsvc_createid() 119 else if(srchost[hlen - 1] == '.') in altsvc_createid() 121 hlen--; in altsvc_createid() 128 as->src.host = Curl_memdup0(srchost, hlen); in altsvc_createid() 435 size_t hlen in hostcompare() local [all...] |
/third_party/mbedtls/library/ |
H A D | rsa.c | 1622 unsigned int hlen; in mgf_mask() local 1640 hlen = mbedtls_md_get_size(md_info); in mgf_mask() 1649 use_len = hlen; in mgf_mask() 1650 if (dlen < hlen) { in mgf_mask() 1687 * \param hlen length of the input hash 1693 static int hash_mprime(const unsigned char *hash, size_t hlen, in hash_mprime() argument 1717 if ((ret = mbedtls_md_update(&md_ctx, hash, hlen)) != 0) { in hash_mprime() 1771 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local 1777 hlen = mbedtls_md_get_size_from_type((mbedtls_md_type_t) ctx->hash_id); in mbedtls_rsa_rsaes_oaep_encrypt() 1778 if (hlen in mbedtls_rsa_rsaes_oaep_encrypt() 1930 unsigned int hlen; mbedtls_rsa_rsaes_oaep_decrypt() local 2123 size_t slen, min_slen, hlen, offset = 0; rsa_rsassa_pss_sign_no_mode_check() local 2543 unsigned int hlen; mbedtls_rsa_rsassa_pss_verify_ext() local [all...] |
H A D | pkcs12.c | 271 int use_password, size_t hlen, size_t v) in calculate_hashes() 314 if ((ret = mbedtls_md(md_info, hash_output, hlen, hash_output)) in calculate_hashes() 342 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 360 hlen = mbedtls_md_get_size_from_type(md_type); in mbedtls_pkcs12_derivation() 362 if (hlen <= 32) { in mbedtls_pkcs12_derivation() 381 pwd_block, hash_output, use_salt, use_password, hlen, in mbedtls_pkcs12_derivation() 386 use_len = (datalen > hlen) ? hlen : datalen; in mbedtls_pkcs12_derivation() 396 pkcs12_fill_buffer(hash_block, v, hash_output, hlen); in mbedtls_pkcs12_derivation() 268 calculate_hashes(mbedtls_md_type_t md_type, int iterations, unsigned char *diversifier, unsigned char *salt_block, unsigned char *pwd_block, unsigned char *hash_output, int use_salt, int use_password, size_t hlen, size_t v) calculate_hashes() argument
|
H A D | ecdsa.c | 641 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() 658 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 667 hash, hlen, f_rng, p_rng)); in mbedtls_ecdsa_write_signature_restartable() 671 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable() 690 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() 696 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 704 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() 708 ctx, hash, hlen, sig, slen, NULL); in mbedtls_ecdsa_read_signature() 715 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() 747 if ((ret = mbedtls_ecdsa_verify(&ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable() 639 mbedtls_ecdsa_write_signature_restartable(mbedtls_ecdsa_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hlen, unsigned char *sig, size_t sig_size, size_t *slen, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng, mbedtls_ecdsa_restart_ctx *rs_ctx) mbedtls_ecdsa_write_signature_restartable() argument 688 mbedtls_ecdsa_write_signature(mbedtls_ecdsa_context *ctx, mbedtls_md_type_t md_alg, const unsigned char *hash, size_t hlen, unsigned char *sig, size_t sig_size, size_t *slen, int (*f_rng)(void *, unsigned char *, size_t), void *p_rng) mbedtls_ecdsa_write_signature() argument 703 mbedtls_ecdsa_read_signature(mbedtls_ecdsa_context *ctx, const unsigned char *hash, size_t hlen, const unsigned char *sig, size_t slen) mbedtls_ecdsa_read_signature() argument 714 mbedtls_ecdsa_read_signature_restartable(mbedtls_ecdsa_context *ctx, const unsigned char *hash, size_t hlen, const unsigned char *sig, size_t slen, mbedtls_ecdsa_restart_ctx *rs_ctx) mbedtls_ecdsa_read_signature_restartable() argument [all...] |
/third_party/lwip/src/core/ipv4/ |
H A D | icmp.c | 88 u16_t hlen; in icmp_input() local 95 hlen = IPH_HL_BYTES(iphdr_in); in icmp_input() 96 if (hlen < IP_HLEN) { in icmp_input() 97 LWIP_DEBUGF(ICMP_DEBUG, ("icmp_input: short IP header (%"S16_F" bytes) received\n", hlen)); in icmp_input() 157 if (pbuf_add_header(p, hlen + PBUF_LINK_HLEN + PBUF_LINK_ENCAPSULATION_HLEN)) { in icmp_input() 162 u16_t alloc_len = (u16_t)(p->tot_len + hlen); in icmp_input() 173 if (r->len < hlen + sizeof(struct icmp_echo_hdr)) { in icmp_input() 179 MEMCPY(r->payload, iphdr_in, hlen); in icmp_input() 181 if (pbuf_remove_header(r, hlen)) { in icmp_input() 198 if (pbuf_remove_header(p, hlen in icmp_input() [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
H A D | tlsv1_client_write.c | 580 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 622 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify() 624 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 648 hlen += 19; in tls_write_client_certificate_verify() 654 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify() 656 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 667 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 669 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 677 hlen in tls_write_client_certificate_verify() 785 size_t rlen, hlen; tls_write_client_finished() local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; in tlsv12_key_x_server_params_hash() local 351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash() 355 hlen = 48; in tlsv12_key_x_server_params_hash() 359 hlen = 64; in tlsv12_key_x_server_params_hash() 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash() 373 return hlen; in tlsv12_key_x_server_params_hash() 384 size_t hlen; in tls_key_x_server_params_hash() local 395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash() 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash() 398 hpos += hlen; in tls_key_x_server_params_hash() [all...] |
H A D | tlsv1_server_read.c | 890 size_t hlen; in tls_process_certificate_verify() local 986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify() 1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() 1031 hash, hlen, po in tls_process_certificate_verify() 1099 size_t left, len, hlen; tls_process_client_finished() local [all...] |
H A D | tlsv1_server_write.c | 567 int hlen; in tls_write_server_key_exchange() local 571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange() 587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange() 609 hlen += 19; in tls_write_server_key_exchange() 620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange() 626 if (hlen < 0) { in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange() 657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange() 835 size_t rlen, hlen; in tls_write_server_finished() local [all...] |
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
H A D | tlsv1_client_write.c | 568 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 610 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify() 612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 635 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 636 hlen += 19; in tls_write_client_certificate_verify() 642 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify() 644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 655 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 657 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 665 hlen in tls_write_client_certificate_verify() 773 size_t rlen, hlen; tls_write_client_finished() local [all...] |
H A D | tlsv1_common.c | 344 size_t hlen; in tlsv12_key_x_server_params_hash() local 351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash() 355 hlen = 48; in tlsv12_key_x_server_params_hash() 359 hlen = 64; in tlsv12_key_x_server_params_hash() 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash() 373 return hlen; in tlsv12_key_x_server_params_hash() 384 size_t hlen; in tls_key_x_server_params_hash() local 395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash() 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash() 398 hpos += hlen; in tls_key_x_server_params_hash() [all...] |
H A D | tlsv1_server_read.c | 890 size_t hlen; in tls_process_certificate_verify() local 986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify() 1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() 1031 hash, hlen, po in tls_process_certificate_verify() 1099 size_t left, len, hlen; tls_process_client_finished() local [all...] |
H A D | tlsv1_server_write.c | 567 int hlen; in tls_write_server_key_exchange() local 571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange() 587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange() 609 hlen += 19; in tls_write_server_key_exchange() 620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange() 626 if (hlen < 0) { in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange() 657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange() 835 size_t rlen, hlen; in tls_write_server_finished() local [all...] |
/third_party/musl/porting/liteos_a/user/src/misc/ |
H A D | syslog.c | 97 int hlen; in _vsyslog() local 110 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog() 123 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog() 127 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
|
/third_party/musl/src/misc/ |
H A D | syslog.c | 98 int hlen; in _vsyslog() local 111 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog() 124 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog() 128 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
|
/third_party/lwip/src/core/ipv6/ |
H A D | ip6.c | 566 u16_t hlen, hlen_tot; /* the current header length */ local 764 hlen = hlen_tot = IP6_HLEN; 787 hlen = (u16_t)(8 * (1 + hbh_hdr->_hlen)); 789 if ((p->len < 8) || (hlen > p->len)) { 791 ("IPv6 options header (hlen %"U16_F") does not fit in first pbuf (len %"U16_F"), IPv6 packet dropped.\n", 792 hlen, p->len)); 800 hlen_tot = (u16_t)(hlen_tot + hlen); 804 while (opt_offset < hlen) 861 pbuf_remove_header(p, hlen); 877 hlen 1485 const u8_t hlen = (sizeof(struct ip6_opt_hdr) * 2) + IP6_ROUTER_ALERT_DLEN; global() local [all...] |
/third_party/libwebsockets/lib/jose/jwe/ |
H A D | jwe-rsa-aescbc.c | 49 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type), in lws_jwe_encrypt_rsa_aes_cbc_hs() local 73 temp_len, (unsigned int)hlen / 2, 0)) in lws_jwe_encrypt_rsa_aes_cbc_hs() 112 memcpy(ekey, jwe->jws.map.buf[LJWE_EKEY], (unsigned int)hlen); in lws_jwe_encrypt_rsa_aes_cbc_hs() 114 n = lws_genrsa_public_encrypt(&rsactx, (uint8_t *)ekey, (unsigned int)hlen, in lws_jwe_encrypt_rsa_aes_cbc_hs() 117 lws_explicit_bzero(ekey, (unsigned int)hlen); /* cleanse the temp CEK copy */ in lws_jwe_encrypt_rsa_aes_cbc_hs()
|
/third_party/libbpf/src/ |
H A D | nlattr.c | 167 int hlen, alen; in libbpf_nla_dump_errormsg() local 174 hlen = sizeof(*err); in libbpf_nla_dump_errormsg() 178 hlen += nlmsg_len(&err->msg); in libbpf_nla_dump_errormsg() 180 attr = (struct nlattr *) ((void *) err + hlen); in libbpf_nla_dump_errormsg()
|
/third_party/mbedtls/include/mbedtls/ |
H A D | ecdsa.h | 451 * buffer of length \p hlen Bytes. 452 * \param hlen The length of the hash \p hash in Bytes. 474 const unsigned char *hash, size_t hlen, 494 * buffer of length \p hlen Bytes. 495 * \param hlen The length of the hash \p hash in Bytes. 521 const unsigned char *hash, size_t hlen, 541 * buffer of length \p hlen Bytes. 542 * \param hlen The size of the hash \p hash. 555 const unsigned char *hash, size_t hlen, 571 * buffer of length \p hlen Byte [all...] |
/third_party/node/deps/openssl/openssl/providers/implementations/macs/ |
H A D | gmac_prov.c | 150 int hlen = 0; in gmac_final() local 155 if (!EVP_EncryptFinal_ex(macctx->ctx, out, &hlen)) in gmac_final() 158 hlen = gmac_size(); in gmac_final() 160 out, (size_t)hlen); in gmac_final() 164 *outl = hlen; in gmac_final()
|
/third_party/openssl/providers/implementations/macs/ |
H A D | gmac_prov.c | 150 int hlen = 0; in gmac_final() local 155 if (!EVP_EncryptFinal_ex(macctx->ctx, out, &hlen)) in gmac_final() 158 hlen = gmac_size(); in gmac_final() 160 out, (size_t)hlen); in gmac_final() 164 *outl = hlen; in gmac_final()
|