Home
last modified time | relevance | path

Searched refs:hlen (Results 1 – 25 of 117) sorted by relevance

12345

/third_party/libwebsockets/lib/jose/jwe/enc/
Daescbc.c32 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_encrypt_cbc_hs() local
42 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_encrypt_cbc_hs()
44 hlen / 2, jwe->jws.map.len[LJWE_ATAG]); in lws_jwe_encrypt_cbc_hs()
81 el.buf = cek + (hlen / 2); in lws_jwe_encrypt_cbc_hs()
82 el.len = (uint32_t)(hlen / 2); in lws_jwe_encrypt_cbc_hs()
120 cek, (unsigned int)hlen / 2)) in lws_jwe_encrypt_cbc_hs()
156 memcpy((void *)jwe->jws.map.buf[LJWE_ATAG], digest, (unsigned int)hlen / 2); in lws_jwe_encrypt_cbc_hs()
165 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_auth_and_decrypt_cbc_hs() local
174 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_auth_and_decrypt_cbc_hs()
176 hlen / 2, jwe->jws.map.len[LJWE_ATAG]); in lws_jwe_auth_and_decrypt_cbc_hs()
[all …]
/third_party/lwip/src/netif/ppp/
Dvj.c166 u16_t hlen; in vj_compress_tcp() local
196 hlen = ilen + TCPH_HDRLEN(th); in vj_compress_tcp()
197 hlen <<= 2; in vj_compress_tcp()
198 if (np->len < hlen) { in vj_compress_tcp()
199 PPPDEBUG(LOG_INFO, ("vj_compress_tcp: header len %d spans buffers\n", hlen)); in vj_compress_tcp()
349 lwip_ntohs(IPH_LEN(&cs->cs_ip)) == hlen) { in vj_compress_tcp()
364 if (deltaS == deltaA && deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp()
372 if (deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp()
395 MEMCPY(&cs->cs_ip, ip, hlen); in vj_compress_tcp()
409 hlen -= deltaS + 4; in vj_compress_tcp()
[all …]
/third_party/lwip/src/core/ipv4/
Dicmp.c88 u16_t hlen; in icmp_input() local
95 hlen = IPH_HL_BYTES(iphdr_in); in icmp_input()
96 if (hlen < IP_HLEN) { in icmp_input()
97 LWIP_DEBUGF(ICMP_DEBUG, ("icmp_input: short IP header (%"S16_F" bytes) received\n", hlen)); in icmp_input()
157 if (pbuf_add_header(p, hlen + PBUF_LINK_HLEN + PBUF_LINK_ENCAPSULATION_HLEN)) { in icmp_input()
162 u16_t alloc_len = (u16_t)(p->tot_len + hlen); in icmp_input()
173 if (r->len < hlen + sizeof(struct icmp_echo_hdr)) { in icmp_input()
179 MEMCPY(r->payload, iphdr_in, hlen); in icmp_input()
181 if (pbuf_remove_header(r, hlen)) { in icmp_input()
198 if (pbuf_remove_header(p, hlen + PBUF_LINK_HLEN + PBUF_LINK_ENCAPSULATION_HLEN)) { in icmp_input()
[all …]
/third_party/mbedtls/library/
Drsa.c1107 unsigned int hlen; in mgf_mask() local
1114 hlen = mbedtls_md_get_size( md_ctx->md_info ); in mgf_mask()
1121 use_len = hlen; in mgf_mask()
1122 if( dlen < hlen ) in mgf_mask()
1164 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local
1181 hlen = mbedtls_md_get_size( md_info ); in mbedtls_rsa_rsaes_oaep_encrypt()
1184 if( ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2 ) in mbedtls_rsa_rsaes_oaep_encrypt()
1192 if( ( ret = f_rng( p_rng, p, hlen ) ) != 0 ) in mbedtls_rsa_rsaes_oaep_encrypt()
1195 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt()
1200 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt()
[all …]
Dpkcs12.c228 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local
254 hlen = mbedtls_md_get_size( md_info ); in mbedtls_pkcs12_derivation()
256 if( hlen <= 32 ) in mbedtls_pkcs12_derivation()
301 if( ( ret = mbedtls_md( md_info, hash_output, hlen, hash_output ) ) != 0 ) in mbedtls_pkcs12_derivation()
305 use_len = ( datalen > hlen ) ? hlen : datalen; in mbedtls_pkcs12_derivation()
314 pkcs12_fill_buffer( hash_block, v, hash_output, hlen ); in mbedtls_pkcs12_derivation()
Decdsa.c680 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument
701 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable()
710 hash, hlen, f_rng, p_rng ) ); in mbedtls_ecdsa_write_signature_restartable()
714 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable()
733 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument
743 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature()
751 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument
758 ctx, hash, hlen, sig, slen, NULL ) ); in mbedtls_ecdsa_read_signature()
765 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument
804 if( ( ret = mbedtls_ecdsa_verify( &ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/
Dtlsv1_client_write.c580 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local
622 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify()
624 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify()
647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify()
648 hlen += 19; in tls_write_client_certificate_verify()
654 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify()
656 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
667 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify()
669 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
677 hlen += MD5_MAC_LEN; in tls_write_client_certificate_verify()
[all …]
Dtlsv1_common.c344 size_t hlen; in tlsv12_key_x_server_params_hash() local
351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash()
355 hlen = 48; in tlsv12_key_x_server_params_hash()
359 hlen = 64; in tlsv12_key_x_server_params_hash()
370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash()
373 return hlen; in tlsv12_key_x_server_params_hash()
384 size_t hlen; in tls_key_x_server_params_hash() local
395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash()
396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash()
398 hpos += hlen; in tls_key_x_server_params_hash()
[all …]
Dtlsv1_server_write.c567 int hlen; in tls_write_server_key_exchange() local
571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange()
587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange()
609 hlen += 19; in tls_write_server_key_exchange()
620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange()
626 if (hlen < 0) { in tls_write_server_key_exchange()
633 hash, hlen); in tls_write_server_key_exchange()
637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange()
657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange()
835 size_t rlen, hlen; in tls_write_server_finished() local
[all …]
Dtlsv1_server_read.c890 size_t hlen; in tls_process_certificate_verify() local
986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify()
988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify()
999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify()
1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify()
1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify()
1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify()
1031 hash, hlen, pos, end - pos, &alert) < 0) { in tls_process_certificate_verify()
[all …]
Dtlsv1_client_read.c728 int hlen; in tlsv1_process_diffie_hellman() local
753 hlen = tlsv12_key_x_server_params_hash( in tlsv1_process_diffie_hellman()
763 hlen = tls_key_x_server_params_hash( in tlsv1_process_diffie_hellman()
769 if (hlen < 0) in tlsv1_process_diffie_hellman()
772 hash, hlen); in tlsv1_process_diffie_hellman()
776 hash, hlen, pos, end - pos, in tlsv1_process_diffie_hellman()
1315 size_t left, len, hlen; in tls_process_server_finished() local
1374 hlen = SHA256_MAC_LEN; in tls_process_server_finished()
1376 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_process_server_finished()
1387 hlen = MD5_MAC_LEN; in tls_process_server_finished()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/
Dtlsv1_client_write.c568 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local
610 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify()
612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify()
635 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify()
636 hlen += 19; in tls_write_client_certificate_verify()
642 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify()
644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
655 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify()
657 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify()
665 hlen += MD5_MAC_LEN; in tls_write_client_certificate_verify()
[all …]
Dtlsv1_common.c344 size_t hlen; in tlsv12_key_x_server_params_hash() local
351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash()
355 hlen = 48; in tlsv12_key_x_server_params_hash()
359 hlen = 64; in tlsv12_key_x_server_params_hash()
370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash()
373 return hlen; in tlsv12_key_x_server_params_hash()
384 size_t hlen; in tls_key_x_server_params_hash() local
395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash()
396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash()
398 hpos += hlen; in tls_key_x_server_params_hash()
[all …]
Dtlsv1_server_write.c567 int hlen; in tls_write_server_key_exchange() local
571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange()
587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange()
609 hlen += 19; in tls_write_server_key_exchange()
620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange()
626 if (hlen < 0) { in tls_write_server_key_exchange()
633 hash, hlen); in tls_write_server_key_exchange()
637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange()
657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange()
835 size_t rlen, hlen; in tls_write_server_finished() local
[all …]
Dtlsv1_server_read.c890 size_t hlen; in tls_process_certificate_verify() local
986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify()
988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify()
999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify()
1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify()
1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify()
1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify()
1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify()
1031 hash, hlen, pos, end - pos, &alert) < 0) { in tls_process_certificate_verify()
[all …]
/third_party/lwip/src/core/ipv6/
Dip6.c514 u16_t hlen, hlen_tot; /* the current header length */ local
704 hlen = hlen_tot = IP6_HLEN;
727 hlen = (u16_t)(8 * (1 + hbh_hdr->_hlen));
729 if ((p->len < 8) || (hlen > p->len)) {
732 hlen, p->len));
740 hlen_tot = (u16_t)(hlen_tot + hlen);
744 while (opt_offset < hlen)
801 pbuf_remove_header(p, hlen);
817 hlen = 8 * (1 + dest_hdr->_hlen);
818 if ((p->len < 8) || (hlen > p->len)) {
[all …]
/third_party/musl/porting/liteos_a/user/src/misc/
Dsyslog.c95 int hlen; in _vsyslog() local
108 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog()
121 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog()
125 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
/third_party/musl/src/misc/
Dsyslog.c91 int hlen; in _vsyslog() local
104 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog()
117 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog()
121 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
/third_party/flutter/skia/third_party/externals/wuffs/script/
Dwuffs-deflate-decoder-decode-huffman.c416 uint32_t hlen = 0; in c_wuffs_deflate__decoder__decode_huffman_fast() local
420 hlen = hdist; in c_wuffs_deflate__decoder__decode_huffman_fast()
422 hlen = length; in c_wuffs_deflate__decoder__decode_huffman_fast()
434 uint32_t n_copied = (hlen < available) ? hlen : available; in c_wuffs_deflate__decoder__decode_huffman_fast()
439 if (hlen > n_copied) { in c_wuffs_deflate__decoder__decode_huffman_fast()
440 hlen -= n_copied; in c_wuffs_deflate__decoder__decode_huffman_fast()
441 memmove(pdst, self->private_data.f_history, hlen); in c_wuffs_deflate__decoder__decode_huffman_fast()
442 pdst += hlen; in c_wuffs_deflate__decoder__decode_huffman_fast()
/third_party/flutter/skia/third_party/externals/wuffs/std/deflate/
Ddecode_huffman_slow.wuffs33 var hlen base.u32[..0x7FFF]
207 // Set (hlen, hdist) to be the length-distance pair to copy
215 hlen = hdist
217 hlen = length
230 n:hlen, s:this.history[hdist & 0x7FFF:])
231 if hlen <= n_copied {
232 hlen = 0
236 hlen -= n_copied
246 if hlen > 0 {
249 n:hlen, s:this.history[hdist & 0x7FFF:])
[all …]
/third_party/mbedtls/include/mbedtls/
Decdsa.h309 const unsigned char *hash, size_t hlen,
356 const unsigned char *hash, size_t hlen,
390 const unsigned char *hash, size_t hlen,
425 const unsigned char *hash, size_t hlen,
/third_party/libwebsockets/lib/jose/jwe/
Djwe-rsa-aescbc.c49 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type), in lws_jwe_encrypt_rsa_aes_cbc_hs() local
73 temp_len, (unsigned int)hlen / 2, 0)) in lws_jwe_encrypt_rsa_aes_cbc_hs()
112 memcpy(ekey, jwe->jws.map.buf[LJWE_EKEY], (unsigned int)hlen); in lws_jwe_encrypt_rsa_aes_cbc_hs()
114 n = lws_genrsa_public_encrypt(&rsactx, (uint8_t *)ekey, (unsigned int)hlen, in lws_jwe_encrypt_rsa_aes_cbc_hs()
117 lws_explicit_bzero(ekey, (unsigned int)hlen); /* cleanse the temp CEK copy */ in lws_jwe_encrypt_rsa_aes_cbc_hs()
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/
Dbasicauth.c121 size_t hlen = strlen(realm) + strlen("Basic realm=\"\"") + 1; in MHD_queue_basic_auth_fail_response() local
124 header = (char*)malloc(hlen); in MHD_queue_basic_auth_fail_response()
134 hlen, in MHD_queue_basic_auth_fail_response()
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/
Diapp.c306 int len, hlen; in iapp_receive_udp() local
336 hlen = be_to_host16(hdr->length); in iapp_receive_udp()
341 be_to_host16(hdr->identifier), hlen); in iapp_receive_udp()
347 if (hlen > len) { in iapp_receive_udp()
349 hlen, len); in iapp_receive_udp()
352 if (hlen < len) { in iapp_receive_udp()
354 len - hlen); in iapp_receive_udp()
355 len = hlen; in iapp_receive_udp()
/third_party/iptables/libxtables/
Dxtoptions.c511 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128; in xtopt_parse_host()
670 cb->val.hlen = xtables_ipmask_to_cidr(&cb->val.hmask.in); in xtopt_parse_mask()
673 cb->val.hlen = xtables_ip6mask_to_cidr(&cb->val.hmask.in6); in xtopt_parse_mask()
690 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128; in xtopt_parse_plen()
691 if (!xtables_strtoui(cb->arg, NULL, &prefix_len, 0, cb->val.hlen)) { in xtopt_parse_plen()
700 cb->ext_name, entry->name, 0, cb->val.hlen); in xtopt_parse_plen()
702 cb->val.hlen = prefix_len; in xtopt_parse_plen()
719 if (cb->val.hlen == 0) { in xtopt_parse_plenmask()
721 } else if (cb->val.hlen <= 32) { in xtopt_parse_plenmask()
722 mask[0] <<= 32 - cb->val.hlen; in xtopt_parse_plenmask()
[all …]

12345