/third_party/libwebsockets/lib/jose/jwe/enc/ |
D | aescbc.c | 32 int n, hlen = lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_encrypt_cbc_hs() local 42 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_encrypt_cbc_hs() 44 hlen / 2, jwe->jws.map.len[LJWE_ATAG]); in lws_jwe_encrypt_cbc_hs() 81 el.buf = cek + (hlen / 2); in lws_jwe_encrypt_cbc_hs() 82 el.len = hlen / 2; in lws_jwe_encrypt_cbc_hs() 120 cek, hlen / 2)) in lws_jwe_encrypt_cbc_hs() 156 memcpy((void *)jwe->jws.map.buf[LJWE_ATAG], digest, hlen / 2); in lws_jwe_encrypt_cbc_hs() 165 int n, hlen = lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_auth_and_decrypt_cbc_hs() local 174 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_auth_and_decrypt_cbc_hs() 176 hlen / 2, jwe->jws.map.len[LJWE_ATAG]); in lws_jwe_auth_and_decrypt_cbc_hs() [all …]
|
/third_party/lwip/src/netif/ppp/ |
D | vj.c | 166 u16_t hlen; in vj_compress_tcp() local 196 hlen = ilen + TCPH_HDRLEN(th); in vj_compress_tcp() 197 hlen <<= 2; in vj_compress_tcp() 198 if (np->len < hlen) { in vj_compress_tcp() 199 PPPDEBUG(LOG_INFO, ("vj_compress_tcp: header len %d spans buffers\n", hlen)); in vj_compress_tcp() 349 lwip_ntohs(IPH_LEN(&cs->cs_ip)) == hlen) { in vj_compress_tcp() 364 if (deltaS == deltaA && deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp() 372 if (deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp() 395 MEMCPY(&cs->cs_ip, ip, hlen); in vj_compress_tcp() 409 hlen -= deltaS + 4; in vj_compress_tcp() [all …]
|
/third_party/uboot/u-boot-2020.01/product/cipher/v2/api/ |
D | ree_mpi_rsa.c | 57 hi_u32 hlen; member 181 pad->hlen = 0; /* 0 pad hlen */ in rsa_get_attr() 187 pad->hlen = 20; /* 20 pad hlen */ in rsa_get_attr() 193 pad->hlen = 28; /* 28 pad hlen */ in rsa_get_attr() 199 pad->hlen = 32; /* 32 pad hlen */ in rsa_get_attr() 205 pad->hlen = 48; /* 48 pad hlen */ in rsa_get_attr() 211 pad->hlen = 64; /* 64 pad hlen */ in rsa_get_attr() 421 if (pad->in_len > pad->klen - 2 * pad->hlen - 2) { /* 2 */ in rsa_padding_add_pkcs1_oaep() 428 ptr_db = pad->out_data + pad->hlen + 1; in rsa_padding_add_pkcs1_oaep() 429 db_len = pad->klen - pad->hlen - 1; in rsa_padding_add_pkcs1_oaep() [all …]
|
/third_party/lwip/src/core/ipv4/ |
D | icmp.c | 88 u16_t hlen; in icmp_input() local 95 hlen = IPH_HL_BYTES(iphdr_in); in icmp_input() 96 if (hlen < IP_HLEN) { in icmp_input() 97 LWIP_DEBUGF(ICMP_DEBUG, ("icmp_input: short IP header (%"S16_F" bytes) received\n", hlen)); in icmp_input() 157 if (pbuf_add_header(p, hlen + PBUF_LINK_HLEN + PBUF_LINK_ENCAPSULATION_HLEN)) { in icmp_input() 162 u16_t alloc_len = (u16_t)(p->tot_len + hlen); in icmp_input() 173 if (r->len < hlen + sizeof(struct icmp_echo_hdr)) { in icmp_input() 179 MEMCPY(r->payload, iphdr_in, hlen); in icmp_input() 181 if (pbuf_remove_header(r, hlen)) { in icmp_input() 198 if (pbuf_remove_header(p, hlen + PBUF_LINK_HLEN + PBUF_LINK_ENCAPSULATION_HLEN)) { in icmp_input() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_common.c | 344 size_t hlen; in tlsv12_key_x_server_params_hash() local 351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash() 355 hlen = 48; in tlsv12_key_x_server_params_hash() 359 hlen = 64; in tlsv12_key_x_server_params_hash() 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash() 373 return hlen; in tlsv12_key_x_server_params_hash() 384 size_t hlen; in tls_key_x_server_params_hash() local 395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash() 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash() 398 hpos += hlen; in tls_key_x_server_params_hash() [all …]
|
D | tlsv1_client_write.c | 580 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 622 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify() 624 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 648 hlen += 19; in tls_write_client_certificate_verify() 654 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify() 656 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 667 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 669 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 677 hlen += MD5_MAC_LEN; in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_server_write.c | 567 int hlen; in tls_write_server_key_exchange() local 571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange() 587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange() 609 hlen += 19; in tls_write_server_key_exchange() 620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange() 626 if (hlen < 0) { in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange() 657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange() 835 size_t rlen, hlen; in tls_write_server_finished() local [all …]
|
D | tlsv1_server_read.c | 890 size_t hlen; in tls_process_certificate_verify() local 986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify() 1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() 1031 hash, hlen, pos, end - pos, &alert) < 0) { in tls_process_certificate_verify() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_common.c | 344 size_t hlen; in tlsv12_key_x_server_params_hash() local 351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash() 355 hlen = 48; in tlsv12_key_x_server_params_hash() 359 hlen = 64; in tlsv12_key_x_server_params_hash() 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash() 373 return hlen; in tlsv12_key_x_server_params_hash() 384 size_t hlen; in tls_key_x_server_params_hash() local 395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash() 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash() 398 hpos += hlen; in tls_key_x_server_params_hash() [all …]
|
D | tlsv1_client_write.c | 580 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 622 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify() 624 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 648 hlen += 19; in tls_write_client_certificate_verify() 654 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify() 656 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 667 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 669 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 677 hlen += MD5_MAC_LEN; in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_server_write.c | 567 int hlen; in tls_write_server_key_exchange() local 571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange() 587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange() 609 hlen += 19; in tls_write_server_key_exchange() 620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange() 626 if (hlen < 0) { in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange() 657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange() 835 size_t rlen, hlen; in tls_write_server_finished() local [all …]
|
D | tlsv1_server_read.c | 890 size_t hlen; in tls_process_certificate_verify() local 986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify() 1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() 1031 hash, hlen, pos, end - pos, &alert) < 0) { in tls_process_certificate_verify() [all …]
|
/third_party/musl/porting/liteos_a/user/src/misc/ |
D | syslog.c | 95 int hlen; in _vsyslog() local 108 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog() 121 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog() 125 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
|
/third_party/musl/src/misc/ |
D | syslog.c | 91 int hlen; in _vsyslog() local 104 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog() 117 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog() 121 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
|
/third_party/lwip/src/core/ipv6/ |
D | ip6.c | 514 u16_t hlen, hlen_tot; /* the current header length */ local 704 hlen = hlen_tot = IP6_HLEN; 727 hlen = (u16_t)(8 * (1 + hbh_hdr->_hlen)); 729 if ((p->len < 8) || (hlen > p->len)) { 732 hlen, p->len)); 740 hlen_tot = (u16_t)(hlen_tot + hlen); 744 while (opt_offset < hlen) 801 pbuf_remove_header(p, hlen); 817 hlen = 8 * (1 + dest_hdr->_hlen); 818 if ((p->len < 8) || (hlen > p->len)) { [all …]
|
/third_party/mbedtls/include/mbedtls/ |
D | ecdsa.h | 375 const unsigned char *hash, size_t hlen, 421 const unsigned char *hash, size_t hlen, 478 const unsigned char *hash, size_t hlen, 513 const unsigned char *hash, size_t hlen, 548 const unsigned char *hash, size_t hlen,
|
/third_party/mbedtls/library/ |
D | rsa.c | 1139 unsigned int hlen; in mgf_mask() local 1146 hlen = mbedtls_md_get_size( md_ctx->md_info ); in mgf_mask() 1153 use_len = hlen; in mgf_mask() 1154 if( dlen < hlen ) in mgf_mask() 1197 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local 1219 hlen = mbedtls_md_get_size( md_info ); in mbedtls_rsa_rsaes_oaep_encrypt() 1222 if( ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1230 if( ( ret = f_rng( p_rng, p, hlen ) ) != 0 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1233 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() 1238 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() [all …]
|
D | pkcs12.c | 287 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 304 hlen = mbedtls_md_get_size( md_info ); in mbedtls_pkcs12_derivation() 306 if( hlen <= 32 ) in mbedtls_pkcs12_derivation() 338 if( ( ret = mbedtls_md( md_info, hash_output, hlen, hash_output ) ) != 0 ) in mbedtls_pkcs12_derivation() 342 use_len = ( datalen > hlen ) ? hlen : datalen; in mbedtls_pkcs12_derivation() 351 pkcs12_fill_buffer( hash_block, v, hash_output, hlen ); in mbedtls_pkcs12_derivation()
|
D | ecdsa.c | 763 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument 781 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 790 hash, hlen, f_rng, p_rng ) ); in mbedtls_ecdsa_write_signature_restartable() 794 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable() 813 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument 823 ctx, md_alg, hash, hlen, sig, slen, f_rng, p_rng, NULL ) ); in mbedtls_ecdsa_write_signature() 829 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_det() argument 837 return( mbedtls_ecdsa_write_signature( ctx, md_alg, hash, hlen, sig, slen, in mbedtls_ecdsa_write_signature_det() 846 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument 853 ctx, hash, hlen, sig, slen, NULL ) ); in mbedtls_ecdsa_read_signature() [all …]
|
/third_party/flutter/skia/third_party/externals/wuffs/script/ |
D | wuffs-deflate-decoder-decode-huffman.c | 416 uint32_t hlen = 0; in c_wuffs_deflate__decoder__decode_huffman_fast() local 420 hlen = hdist; in c_wuffs_deflate__decoder__decode_huffman_fast() 422 hlen = length; in c_wuffs_deflate__decoder__decode_huffman_fast() 434 uint32_t n_copied = (hlen < available) ? hlen : available; in c_wuffs_deflate__decoder__decode_huffman_fast() 439 if (hlen > n_copied) { in c_wuffs_deflate__decoder__decode_huffman_fast() 440 hlen -= n_copied; in c_wuffs_deflate__decoder__decode_huffman_fast() 441 memmove(pdst, self->private_data.f_history, hlen); in c_wuffs_deflate__decoder__decode_huffman_fast() 442 pdst += hlen; in c_wuffs_deflate__decoder__decode_huffman_fast()
|
/third_party/flutter/skia/third_party/externals/wuffs/std/deflate/ |
D | decode_huffman_slow.wuffs | 33 var hlen base.u32[..0x7FFF] 207 // Set (hlen, hdist) to be the length-distance pair to copy 215 hlen = hdist 217 hlen = length 230 n:hlen, s:this.history[hdist & 0x7FFF:]) 231 if hlen <= n_copied { 232 hlen = 0 236 hlen -= n_copied 246 if hlen > 0 { 249 n:hlen, s:this.history[hdist & 0x7FFF:]) [all …]
|
/third_party/libwebsockets/lib/jose/jwe/ |
D | jwe-rsa-aescbc.c | 49 int n, hlen = lws_genhmac_size(jwe->jose.enc_alg->hmac_type), ot = *temp_len; in lws_jwe_encrypt_rsa_aes_cbc_hs() local 72 temp_len, hlen / 2, 0)) in lws_jwe_encrypt_rsa_aes_cbc_hs() 111 memcpy(ekey, jwe->jws.map.buf[LJWE_EKEY], hlen); in lws_jwe_encrypt_rsa_aes_cbc_hs() 113 n = lws_genrsa_public_encrypt(&rsactx, (uint8_t *)ekey, hlen, in lws_jwe_encrypt_rsa_aes_cbc_hs() 116 lws_explicit_bzero(ekey, hlen); /* cleanse the temp CEK copy */ in lws_jwe_encrypt_rsa_aes_cbc_hs()
|
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/ |
D | basicauth.c | 121 size_t hlen = strlen(realm) + strlen("Basic realm=\"\"") + 1; in MHD_queue_basic_auth_fail_response() local 124 header = (char*)malloc(hlen); in MHD_queue_basic_auth_fail_response() 134 hlen, in MHD_queue_basic_auth_fail_response()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | iapp.c | 306 int len, hlen; in iapp_receive_udp() local 336 hlen = be_to_host16(hdr->length); in iapp_receive_udp() 341 be_to_host16(hdr->identifier), hlen); in iapp_receive_udp() 347 if (hlen > len) { in iapp_receive_udp() 349 hlen, len); in iapp_receive_udp() 352 if (hlen < len) { in iapp_receive_udp() 354 len - hlen); in iapp_receive_udp() 355 len = hlen; in iapp_receive_udp()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/ap/ |
D | iapp.c | 306 int len, hlen; in iapp_receive_udp() local 336 hlen = be_to_host16(hdr->length); in iapp_receive_udp() 341 be_to_host16(hdr->identifier), hlen); in iapp_receive_udp() 347 if (hlen > len) { in iapp_receive_udp() 349 hlen, len); in iapp_receive_udp() 352 if (hlen < len) { in iapp_receive_udp() 354 len - hlen); in iapp_receive_udp() 355 len = hlen; in iapp_receive_udp()
|