/external/avb/libavb/ |
D | avb_crypto.c | 330 {.padding = NULL, .padding_len = 0, .hash_len = 0}, 333 .padding_len = sizeof(padding_RSA2048_SHA256), 337 .padding_len = sizeof(padding_RSA4096_SHA256), 341 .padding_len = sizeof(padding_RSA8192_SHA256), 345 .padding_len = sizeof(padding_RSA2048_SHA512), 349 .padding_len = sizeof(padding_RSA4096_SHA512), 353 .padding_len = sizeof(padding_RSA8192_SHA512),
|
D | avb_crypto.h | 118 size_t padding_len; member
|
D | avb_vbmeta_image.c | 220 algorithm->padding_len); in avb_vbmeta_image_verify()
|
/external/vboot_reference/firmware/lib/cryptolib/ |
D | rsa.c | 137 int padding_len; in RSAVerify() local 167 padding_len = padding_size_map[sig_type]; in RSAVerify() 173 if (SafeMemcmp(buf, padding, padding_len)) { in RSAVerify() 179 if (SafeMemcmp(buf + padding_len, hash, sig_len - padding_len)) { in RSAVerify()
|
/external/tensorflow/tensorflow/compiler/xla/ |
D | metric_table_report.cc | 229 int64 padding_len = 1; in AppendTableRow() local 232 padding_len += max_metric_string_size - metric_string.size(); in AppendTableRow() 234 string padding(padding_len, ' '); in AppendTableRow()
|
/external/usrsctp/usrsctplib/netinet/ |
D | sctp_output.c | 2073 uint16_t *padding_len, uint16_t *chunk_len) in sctp_add_addresses_to_i_ia() argument 2185 (padding_len != NULL) && in sctp_add_addresses_to_i_ia() 2186 (*padding_len > 0)) { in sctp_add_addresses_to_i_ia() 2187 memset(mtod(m_at, caddr_t) + *chunk_len, 0, *padding_len); in sctp_add_addresses_to_i_ia() 2188 SCTP_BUF_LEN(m_at) += *padding_len; in sctp_add_addresses_to_i_ia() 2189 *chunk_len += *padding_len; in sctp_add_addresses_to_i_ia() 2190 *padding_len = 0; in sctp_add_addresses_to_i_ia() 2263 (padding_len != NULL) && in sctp_add_addresses_to_i_ia() 2264 (*padding_len > 0)) { in sctp_add_addresses_to_i_ia() 2265 memset(mtod(m_at, caddr_t) + *chunk_len, 0, *padding_len); in sctp_add_addresses_to_i_ia() [all …]
|
D | sctp_output.h | 54 uint16_t *padding_len, uint16_t *chunk_len);
|
D | sctputil.c | 3520 int notifhdr_len, chk_len, chkhdr_len, padding_len, payload_len; in sctp_notify_send_failed() local 3550 padding_len = 0; in sctp_notify_send_failed() 3558 padding_len = chk->send_size - chk_len; in sctp_notify_send_failed() 3559 payload_len = chk->send_size - chkhdr_len - padding_len; in sctp_notify_send_failed() 3603 if (chk->send_size == chkhdr_len + payload_len + padding_len) { in sctp_notify_send_failed() 3605 m_adj(chk->data, -padding_len); in sctp_notify_send_failed() 3607 chk->send_size -= (chkhdr_len + padding_len); in sctp_notify_send_failed()
|
/external/tensorflow/tensorflow/compiler/tf2xla/kernels/ |
D | matrix_diag_ops.cc | 414 const int64 padding_len = max_diag_len - diag_len; in Compile() local 415 if (padding_len > 0) { in Compile() 421 ->set_edge_padding_high(padding_len); in Compile() 424 ->set_edge_padding_low(padding_len); in Compile()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/cipher_extra/ |
D | e_tls.c | 223 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); in aead_tls_seal_scatter() local 224 OPENSSL_memset(padding, padding_len - 1, padding_len); in aead_tls_seal_scatter() 226 padding, (int)padding_len)) { in aead_tls_seal_scatter()
|
/external/boringssl/src/crypto/cipher_extra/ |
D | e_tls.c | 223 unsigned padding_len = block_size - ((in_len + mac_len) % block_size); in aead_tls_seal_scatter() local 224 OPENSSL_memset(padding, padding_len - 1, padding_len); in aead_tls_seal_scatter() 226 padding, (int)padding_len)) { in aead_tls_seal_scatter()
|
/external/scapy/scapy/contrib/ |
D | http2.py | 1460 padding_len = self.getfieldval('padlen') 1464 ret = self.s_len - padding_len_len - padding_len 1540 padding_len = self.getfieldval('padlen') 1544 ret = self.s_len - padding_len_len - padding_len 1610 padding_len = self.getfieldval('padlen') 1619 - padding_len 1821 fld, padding_len = self.getfield_and_val('padlen') 1822 padding_len_len = fld.i2len(self, padding_len) 1828 - padding_len
|
/external/avb/libavb_aftl/ |
D | avb_aftl_validate.c | 127 algorithm_data->padding_len); in avb_aftl_verify_entry_signature()
|
/external/avb/libavb_atx/ |
D | avb_atx_validate.c | 105 algorithm_data->padding_len)) { in verify_certificate() 403 algorithm_data->padding_len)) { in avb_atx_validate_unlock_credential()
|
/external/rust/crates/quiche/deps/boringssl/src/crypto/fipsmodule/rsa/ |
D | padding.c | 180 size_t padding_len = to_len - 3 - from_len; in RSA_padding_add_PKCS1_type_2() local 181 if (!rand_nonzero(to + 2, padding_len)) { in RSA_padding_add_PKCS1_type_2() 185 to[2 + padding_len] = 0; in RSA_padding_add_PKCS1_type_2()
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | padding.c | 180 size_t padding_len = to_len - 3 - from_len; in RSA_padding_add_PKCS1_type_2() local 181 if (!rand_nonzero(to + 2, padding_len)) { in RSA_padding_add_PKCS1_type_2() 185 to[2 + padding_len] = 0; in RSA_padding_add_PKCS1_type_2()
|
/external/rust/crates/quiche/deps/boringssl/src/ssl/ |
D | t1_lib.cc | 3053 size_t padding_len = 0; in ssl_add_clienthello_tlsext() local 3059 padding_len = 1; in ssl_add_clienthello_tlsext() 3061 header_len += 4 + padding_len; in ssl_add_clienthello_tlsext() 3071 if (padding_len != 0) { in ssl_add_clienthello_tlsext() 3072 header_len -= 4 + padding_len; in ssl_add_clienthello_tlsext() 3074 padding_len = 0x200 - header_len; in ssl_add_clienthello_tlsext() 3079 if (padding_len >= 4 + 1) { in ssl_add_clienthello_tlsext() 3080 padding_len -= 4; in ssl_add_clienthello_tlsext() 3082 padding_len = 1; in ssl_add_clienthello_tlsext() 3086 if (padding_len != 0) { in ssl_add_clienthello_tlsext() [all …]
|
D | handshake_server.cc | 1305 size_t padding_len = decrypt_len - premaster_secret.size(); in do_read_client_key_exchange() local 1308 for (size_t i = 2; i < padding_len - 1; i++) { in do_read_client_key_exchange() 1311 good &= constant_time_is_zero_8(decrypt_buf[padding_len - 1]); in do_read_client_key_exchange() 1315 good &= constant_time_eq_8(decrypt_buf[padding_len], in do_read_client_key_exchange() 1317 good &= constant_time_eq_8(decrypt_buf[padding_len + 1], in do_read_client_key_exchange() 1324 good, decrypt_buf[padding_len + i], premaster_secret[i]); in do_read_client_key_exchange()
|
D | handshake_client.cc | 1508 size_t padding_len = in do_send_client_finished() local 1518 !CBB_add_bytes(&child, kZero, padding_len) || in do_send_client_finished()
|
/external/boringssl/src/ssl/ |
D | t1_lib.cc | 3547 size_t padding_len = 0; in ssl_add_clienthello_tlsext() local 3553 padding_len = 1; in ssl_add_clienthello_tlsext() 3555 header_len += 4 + padding_len; in ssl_add_clienthello_tlsext() 3565 if (padding_len != 0) { in ssl_add_clienthello_tlsext() 3566 header_len -= 4 + padding_len; in ssl_add_clienthello_tlsext() 3568 padding_len = 0x200 - header_len; in ssl_add_clienthello_tlsext() 3573 if (padding_len >= 4 + 1) { in ssl_add_clienthello_tlsext() 3574 padding_len -= 4; in ssl_add_clienthello_tlsext() 3576 padding_len = 1; in ssl_add_clienthello_tlsext() 3580 if (padding_len != 0) { in ssl_add_clienthello_tlsext() [all …]
|
D | handshake_server.cc | 1311 size_t padding_len = decrypt_len - premaster_secret.size(); in do_read_client_key_exchange() local 1314 for (size_t i = 2; i < padding_len - 1; i++) { in do_read_client_key_exchange() 1317 good &= constant_time_is_zero_8(decrypt_buf[padding_len - 1]); in do_read_client_key_exchange() 1321 good &= constant_time_eq_8(decrypt_buf[padding_len], in do_read_client_key_exchange() 1323 good &= constant_time_eq_8(decrypt_buf[padding_len + 1], in do_read_client_key_exchange() 1330 good, decrypt_buf[padding_len + i], premaster_secret[i]); in do_read_client_key_exchange()
|
D | handshake_client.cc | 1504 size_t padding_len = in do_send_client_finished() local 1514 !CBB_add_bytes(&child, kZero, padding_len) || in do_send_client_finished()
|
/external/tensorflow/tensorflow/compiler/tests/ |
D | matrix_diag_ops_test.py | 60 padding_len = max_diag_len - diag_len 68 padding_len, max_diag_len, 1),)
|
/external/tensorflow/tensorflow/python/kernel_tests/ |
D | diag_op_test.py | 65 padding_len = max_diag_len - diag_len 73 padding_len, max_diag_len, 1),)
|