/third_party/libwebsockets/lib/jose/jwe/enc/ |
D | aescbc.c | 32 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_encrypt_cbc_hs() local 42 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_encrypt_cbc_hs() 44 hlen / 2, jwe->jws.map.len[LJWE_ATAG]); in lws_jwe_encrypt_cbc_hs() 81 el.buf = cek + (hlen / 2); in lws_jwe_encrypt_cbc_hs() 82 el.len = (uint32_t)(hlen / 2); in lws_jwe_encrypt_cbc_hs() 120 cek, (unsigned int)hlen / 2)) in lws_jwe_encrypt_cbc_hs() 156 memcpy((void *)jwe->jws.map.buf[LJWE_ATAG], digest, (unsigned int)hlen / 2); in lws_jwe_encrypt_cbc_hs() 165 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type); in lws_jwe_auth_and_decrypt_cbc_hs() local 174 if (jwe->jws.map.len[LJWE_ATAG] != (unsigned int)hlen / 2) { in lws_jwe_auth_and_decrypt_cbc_hs() 176 hlen / 2, jwe->jws.map.len[LJWE_ATAG]); in lws_jwe_auth_and_decrypt_cbc_hs() [all …]
|
/third_party/lwip/src/netif/ppp/ |
D | vj.c | 166 u16_t hlen; in vj_compress_tcp() local 196 hlen = ilen + TCPH_HDRLEN(th); in vj_compress_tcp() 197 hlen <<= 2; in vj_compress_tcp() 198 if (np->len < hlen) { in vj_compress_tcp() 199 PPPDEBUG(LOG_INFO, ("vj_compress_tcp: header len %d spans buffers\n", hlen)); in vj_compress_tcp() 349 lwip_ntohs(IPH_LEN(&cs->cs_ip)) == hlen) { in vj_compress_tcp() 364 if (deltaS == deltaA && deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp() 372 if (deltaS == lwip_ntohs(IPH_LEN(&cs->cs_ip)) - hlen) { in vj_compress_tcp() 395 MEMCPY(&cs->cs_ip, ip, hlen); in vj_compress_tcp() 409 hlen -= deltaS + 4; in vj_compress_tcp() [all …]
|
/third_party/lwip/src/core/ipv4/ |
D | icmp.c | 88 u16_t hlen; in icmp_input() local 95 hlen = IPH_HL_BYTES(iphdr_in); in icmp_input() 96 if (hlen < IP_HLEN) { in icmp_input() 97 LWIP_DEBUGF(ICMP_DEBUG, ("icmp_input: short IP header (%"S16_F" bytes) received\n", hlen)); in icmp_input() 157 if (pbuf_add_header(p, hlen + PBUF_LINK_HLEN + PBUF_LINK_ENCAPSULATION_HLEN)) { in icmp_input() 162 u16_t alloc_len = (u16_t)(p->tot_len + hlen); in icmp_input() 173 if (r->len < hlen + sizeof(struct icmp_echo_hdr)) { in icmp_input() 179 MEMCPY(r->payload, iphdr_in, hlen); in icmp_input() 181 if (pbuf_remove_header(r, hlen)) { in icmp_input() 198 if (pbuf_remove_header(p, hlen + PBUF_LINK_HLEN + PBUF_LINK_ENCAPSULATION_HLEN)) { in icmp_input() [all …]
|
/third_party/mbedtls/library/ |
D | rsa.c | 1107 unsigned int hlen; in mgf_mask() local 1114 hlen = mbedtls_md_get_size( md_ctx->md_info ); in mgf_mask() 1121 use_len = hlen; in mgf_mask() 1122 if( dlen < hlen ) in mgf_mask() 1164 unsigned int hlen; in mbedtls_rsa_rsaes_oaep_encrypt() local 1181 hlen = mbedtls_md_get_size( md_info ); in mbedtls_rsa_rsaes_oaep_encrypt() 1184 if( ilen + 2 * hlen + 2 < ilen || olen < ilen + 2 * hlen + 2 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1192 if( ( ret = f_rng( p_rng, p, hlen ) ) != 0 ) in mbedtls_rsa_rsaes_oaep_encrypt() 1195 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() 1200 p += hlen; in mbedtls_rsa_rsaes_oaep_encrypt() [all …]
|
D | pkcs12.c | 228 size_t hlen, use_len, v, i; in mbedtls_pkcs12_derivation() local 254 hlen = mbedtls_md_get_size( md_info ); in mbedtls_pkcs12_derivation() 256 if( hlen <= 32 ) in mbedtls_pkcs12_derivation() 301 if( ( ret = mbedtls_md( md_info, hash_output, hlen, hash_output ) ) != 0 ) in mbedtls_pkcs12_derivation() 305 use_len = ( datalen > hlen ) ? hlen : datalen; in mbedtls_pkcs12_derivation() 314 pkcs12_fill_buffer( hash_block, v, hash_output, hlen ); in mbedtls_pkcs12_derivation()
|
D | ecdsa.c | 680 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature_restartable() argument 701 hash, hlen, md_alg, f_rng, in mbedtls_ecdsa_write_signature_restartable() 710 hash, hlen, f_rng, p_rng ) ); in mbedtls_ecdsa_write_signature_restartable() 714 hash, hlen, f_rng, p_rng, f_rng, in mbedtls_ecdsa_write_signature_restartable() 733 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_write_signature() argument 743 ctx, md_alg, hash, hlen, sig, sig_size, slen, in mbedtls_ecdsa_write_signature() 751 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature() argument 758 ctx, hash, hlen, sig, slen, NULL ) ); in mbedtls_ecdsa_read_signature() 765 const unsigned char *hash, size_t hlen, in mbedtls_ecdsa_read_signature_restartable() argument 804 if( ( ret = mbedtls_ecdsa_verify( &ctx->grp, hash, hlen, in mbedtls_ecdsa_read_signature_restartable() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/tls/ |
D | tlsv1_client_write.c | 580 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 622 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify() 624 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 647 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 648 hlen += 19; in tls_write_client_certificate_verify() 654 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify() 656 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 667 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 669 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 677 hlen += MD5_MAC_LEN; in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_common.c | 344 size_t hlen; in tlsv12_key_x_server_params_hash() local 351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash() 355 hlen = 48; in tlsv12_key_x_server_params_hash() 359 hlen = 64; in tlsv12_key_x_server_params_hash() 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash() 373 return hlen; in tlsv12_key_x_server_params_hash() 384 size_t hlen; in tls_key_x_server_params_hash() local 395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash() 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash() 398 hpos += hlen; in tls_key_x_server_params_hash() [all …]
|
D | tlsv1_server_write.c | 567 int hlen; in tls_write_server_key_exchange() local 571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange() 587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange() 609 hlen += 19; in tls_write_server_key_exchange() 620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange() 626 if (hlen < 0) { in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange() 657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange() 835 size_t rlen, hlen; in tls_write_server_finished() local [all …]
|
D | tlsv1_server_read.c | 890 size_t hlen; in tls_process_certificate_verify() local 986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify() 1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() 1031 hash, hlen, pos, end - pos, &alert) < 0) { in tls_process_certificate_verify() [all …]
|
D | tlsv1_client_read.c | 728 int hlen; in tlsv1_process_diffie_hellman() local 753 hlen = tlsv12_key_x_server_params_hash( in tlsv1_process_diffie_hellman() 763 hlen = tls_key_x_server_params_hash( in tlsv1_process_diffie_hellman() 769 if (hlen < 0) in tlsv1_process_diffie_hellman() 772 hash, hlen); in tlsv1_process_diffie_hellman() 776 hash, hlen, pos, end - pos, in tlsv1_process_diffie_hellman() 1315 size_t left, len, hlen; in tls_process_server_finished() local 1374 hlen = SHA256_MAC_LEN; in tls_process_server_finished() 1376 crypto_hash_finish(conn->verify.sha256_server, hash, &hlen) in tls_process_server_finished() 1387 hlen = MD5_MAC_LEN; in tls_process_server_finished() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/tls/ |
D | tlsv1_client_write.c | 568 size_t rlen, hlen, clen; in tls_write_client_certificate_verify() local 610 hlen = SHA256_MAC_LEN; in tls_write_client_certificate_verify() 612 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_write_client_certificate_verify() 635 os_memmove(hash + 19, hash, hlen); in tls_write_client_certificate_verify() 636 hlen += 19; in tls_write_client_certificate_verify() 642 hlen = MD5_MAC_LEN; in tls_write_client_certificate_verify() 644 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 655 hlen = SHA1_MAC_LEN; in tls_write_client_certificate_verify() 657 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_write_client_certificate_verify() 665 hlen += MD5_MAC_LEN; in tls_write_client_certificate_verify() [all …]
|
D | tlsv1_common.c | 344 size_t hlen; in tlsv12_key_x_server_params_hash() local 351 hlen = SHA256_MAC_LEN; in tlsv12_key_x_server_params_hash() 355 hlen = 48; in tlsv12_key_x_server_params_hash() 359 hlen = 64; in tlsv12_key_x_server_params_hash() 370 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tlsv12_key_x_server_params_hash() 373 return hlen; in tlsv12_key_x_server_params_hash() 384 size_t hlen; in tls_key_x_server_params_hash() local 395 hlen = MD5_MAC_LEN; in tls_key_x_server_params_hash() 396 if (crypto_hash_finish(ctx, hash, &hlen) < 0) in tls_key_x_server_params_hash() 398 hpos += hlen; in tls_key_x_server_params_hash() [all …]
|
D | tlsv1_server_write.c | 567 int hlen; in tls_write_server_key_exchange() local 571 hlen = tlsv12_key_x_server_params_hash( in tls_write_server_key_exchange() 587 if (hlen < 0 || end - pos < 2) { in tls_write_server_key_exchange() 609 hlen += 19; in tls_write_server_key_exchange() 620 hlen = tls_key_x_server_params_hash( in tls_write_server_key_exchange() 626 if (hlen < 0) { in tls_write_server_key_exchange() 633 hash, hlen); in tls_write_server_key_exchange() 637 hash[hlen - 1] ^= 0x80; in tls_write_server_key_exchange() 657 crypto_private_key_sign_pkcs1(conn->cred->key, hash, hlen, in tls_write_server_key_exchange() 835 size_t rlen, hlen; in tls_write_server_finished() local [all …]
|
D | tlsv1_server_read.c | 890 size_t hlen; in tls_process_certificate_verify() local 986 hlen = SHA256_MAC_LEN; in tls_process_certificate_verify() 988 crypto_hash_finish(conn->verify.sha256_cert, hpos, &hlen) < in tls_process_certificate_verify() 999 hlen = MD5_MAC_LEN; in tls_process_certificate_verify() 1001 crypto_hash_finish(conn->verify.md5_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1012 hlen = SHA1_MAC_LEN; in tls_process_certificate_verify() 1014 crypto_hash_finish(conn->verify.sha1_cert, hpos, &hlen) < 0) { in tls_process_certificate_verify() 1022 hlen += MD5_MAC_LEN; in tls_process_certificate_verify() 1028 wpa_hexdump(MSG_MSGDUMP, "TLSv1: CertificateVerify hash", hash, hlen); in tls_process_certificate_verify() 1031 hash, hlen, pos, end - pos, &alert) < 0) { in tls_process_certificate_verify() [all …]
|
/third_party/lwip/src/core/ipv6/ |
D | ip6.c | 514 u16_t hlen, hlen_tot; /* the current header length */ local 704 hlen = hlen_tot = IP6_HLEN; 727 hlen = (u16_t)(8 * (1 + hbh_hdr->_hlen)); 729 if ((p->len < 8) || (hlen > p->len)) { 732 hlen, p->len)); 740 hlen_tot = (u16_t)(hlen_tot + hlen); 744 while (opt_offset < hlen) 801 pbuf_remove_header(p, hlen); 817 hlen = 8 * (1 + dest_hdr->_hlen); 818 if ((p->len < 8) || (hlen > p->len)) { [all …]
|
/third_party/musl/porting/liteos_a/user/src/misc/ |
D | syslog.c | 95 int hlen; in _vsyslog() local 108 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog() 121 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog() 125 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
|
/third_party/musl/src/misc/ |
D | syslog.c | 91 int hlen; in _vsyslog() local 104 priority, timebuf, &hlen, log_ident, "["+!pid, pid, "]"+!pid); in _vsyslog() 117 dprintf(fd, "%.*s", l-hlen, buf+hlen); in _vsyslog() 121 if (log_opt & LOG_PERROR) dprintf(2, "%.*s", l-hlen, buf+hlen); in _vsyslog()
|
/third_party/flutter/skia/third_party/externals/wuffs/script/ |
D | wuffs-deflate-decoder-decode-huffman.c | 416 uint32_t hlen = 0; in c_wuffs_deflate__decoder__decode_huffman_fast() local 420 hlen = hdist; in c_wuffs_deflate__decoder__decode_huffman_fast() 422 hlen = length; in c_wuffs_deflate__decoder__decode_huffman_fast() 434 uint32_t n_copied = (hlen < available) ? hlen : available; in c_wuffs_deflate__decoder__decode_huffman_fast() 439 if (hlen > n_copied) { in c_wuffs_deflate__decoder__decode_huffman_fast() 440 hlen -= n_copied; in c_wuffs_deflate__decoder__decode_huffman_fast() 441 memmove(pdst, self->private_data.f_history, hlen); in c_wuffs_deflate__decoder__decode_huffman_fast() 442 pdst += hlen; in c_wuffs_deflate__decoder__decode_huffman_fast()
|
/third_party/flutter/skia/third_party/externals/wuffs/std/deflate/ |
D | decode_huffman_slow.wuffs | 33 var hlen base.u32[..0x7FFF] 207 // Set (hlen, hdist) to be the length-distance pair to copy 215 hlen = hdist 217 hlen = length 230 n:hlen, s:this.history[hdist & 0x7FFF:]) 231 if hlen <= n_copied { 232 hlen = 0 236 hlen -= n_copied 246 if hlen > 0 { 249 n:hlen, s:this.history[hdist & 0x7FFF:]) [all …]
|
/third_party/mbedtls/include/mbedtls/ |
D | ecdsa.h | 309 const unsigned char *hash, size_t hlen, 356 const unsigned char *hash, size_t hlen, 390 const unsigned char *hash, size_t hlen, 425 const unsigned char *hash, size_t hlen,
|
/third_party/libwebsockets/lib/jose/jwe/ |
D | jwe-rsa-aescbc.c | 49 int n, hlen = (int)lws_genhmac_size(jwe->jose.enc_alg->hmac_type), in lws_jwe_encrypt_rsa_aes_cbc_hs() local 73 temp_len, (unsigned int)hlen / 2, 0)) in lws_jwe_encrypt_rsa_aes_cbc_hs() 112 memcpy(ekey, jwe->jws.map.buf[LJWE_EKEY], (unsigned int)hlen); in lws_jwe_encrypt_rsa_aes_cbc_hs() 114 n = lws_genrsa_public_encrypt(&rsactx, (uint8_t *)ekey, (unsigned int)hlen, in lws_jwe_encrypt_rsa_aes_cbc_hs() 117 lws_explicit_bzero(ekey, (unsigned int)hlen); /* cleanse the temp CEK copy */ in lws_jwe_encrypt_rsa_aes_cbc_hs()
|
/third_party/skia/third_party/externals/microhttpd/src/microhttpd/ |
D | basicauth.c | 121 size_t hlen = strlen(realm) + strlen("Basic realm=\"\"") + 1; in MHD_queue_basic_auth_fail_response() local 124 header = (char*)malloc(hlen); in MHD_queue_basic_auth_fail_response() 134 hlen, in MHD_queue_basic_auth_fail_response()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/ap/ |
D | iapp.c | 306 int len, hlen; in iapp_receive_udp() local 336 hlen = be_to_host16(hdr->length); in iapp_receive_udp() 341 be_to_host16(hdr->identifier), hlen); in iapp_receive_udp() 347 if (hlen > len) { in iapp_receive_udp() 349 hlen, len); in iapp_receive_udp() 352 if (hlen < len) { in iapp_receive_udp() 354 len - hlen); in iapp_receive_udp() 355 len = hlen; in iapp_receive_udp()
|
/third_party/iptables/libxtables/ |
D | xtoptions.c | 511 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128; in xtopt_parse_host() 670 cb->val.hlen = xtables_ipmask_to_cidr(&cb->val.hmask.in); in xtopt_parse_mask() 673 cb->val.hlen = xtables_ip6mask_to_cidr(&cb->val.hmask.in6); in xtopt_parse_mask() 690 cb->val.hlen = (afinfo->family == NFPROTO_IPV4) ? 32 : 128; in xtopt_parse_plen() 691 if (!xtables_strtoui(cb->arg, NULL, &prefix_len, 0, cb->val.hlen)) { in xtopt_parse_plen() 700 cb->ext_name, entry->name, 0, cb->val.hlen); in xtopt_parse_plen() 702 cb->val.hlen = prefix_len; in xtopt_parse_plen() 719 if (cb->val.hlen == 0) { in xtopt_parse_plenmask() 721 } else if (cb->val.hlen <= 32) { in xtopt_parse_plenmask() 722 mask[0] <<= 32 - cb->val.hlen; in xtopt_parse_plenmask() [all …]
|