Home
last modified time | relevance | path

Searched refs:modlen (Results 1 – 25 of 246) sorted by relevance

12345678910

/dports/multimedia/v4l_compat/linux-5.13-rc2/kernel/
H A Dmodule_signing.c23 size_t sig_len, modlen = info->len; in mod_verify_sig() local
26 pr_devel("==>%s(,%zu)\n", __func__, modlen); in mod_verify_sig()
28 if (modlen <= sizeof(ms)) in mod_verify_sig()
31 memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); in mod_verify_sig()
33 ret = mod_check_sig(&ms, modlen, "module"); in mod_verify_sig()
38 modlen -= sig_len + sizeof(ms); in mod_verify_sig()
39 info->len = modlen; in mod_verify_sig()
41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
/dports/multimedia/libv4l/linux-5.13-rc2/kernel/
H A Dmodule_signing.c23 size_t sig_len, modlen = info->len; in mod_verify_sig() local
26 pr_devel("==>%s(,%zu)\n", __func__, modlen); in mod_verify_sig()
28 if (modlen <= sizeof(ms)) in mod_verify_sig()
31 memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); in mod_verify_sig()
33 ret = mod_check_sig(&ms, modlen, "module"); in mod_verify_sig()
38 modlen -= sig_len + sizeof(ms); in mod_verify_sig()
39 info->len = modlen; in mod_verify_sig()
41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
/dports/multimedia/v4l-utils/linux-5.13-rc2/kernel/
H A Dmodule_signing.c23 size_t sig_len, modlen = info->len; in mod_verify_sig() local
26 pr_devel("==>%s(,%zu)\n", __func__, modlen); in mod_verify_sig()
28 if (modlen <= sizeof(ms)) in mod_verify_sig()
31 memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); in mod_verify_sig()
33 ret = mod_check_sig(&ms, modlen, "module"); in mod_verify_sig()
38 modlen -= sig_len + sizeof(ms); in mod_verify_sig()
39 info->len = modlen; in mod_verify_sig()
41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
/dports/audio/mp3info/mp3info-0.8.5a/
H A Dtextfunc.c226 int modlen; in format_output() local
237 if(modlen > 1000) { in format_output()
242 mod[modlen]=0; in format_output()
243 mod[modlen-1]='s'; in format_output()
256 mod[modlen-1]='d'; in format_output()
266 mod[modlen-1]='d'; in format_output()
283 mod[modlen-1]='d'; in format_output()
288 mod[modlen-1]='d'; in format_output()
309 mod[modlen-1]='d'; in format_output()
314 mod[modlen-1]='d'; in format_output()
[all …]
/dports/net/libarms/libarms-5.01/http/
H A Dbase64.c119 static int modlen; variable
125 modlen = 0; in arms_base64_reset_state()
135 while (obj->modlen > 0) { in arms_base64_decode_stream()
140 memcpy(&obj->modbuf[obj->modlen], buf, buflen); in arms_base64_decode_stream()
141 obj->modlen += buflen; in arms_base64_decode_stream()
145 cplen = sizeof(obj->modbuf) - obj->modlen; in arms_base64_decode_stream()
146 memcpy(&obj->modbuf[obj->modlen], buf, cplen); in arms_base64_decode_stream()
166 obj->modlen = modlen; in arms_base64_decode_stream()
175 obj->modlen = modlen; in arms_base64_decode_stream()
289 modlen = buflen; in arms_base64_decode()
[all …]
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/tls/
H A Dpkcs1.c22 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument
39 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block()
42 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block()
51 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block()
89 size_t modlen; in pkcs1_encrypt() local
91 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt()
93 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt()
97 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
/dports/math/calc/calc-2.14.0.14/custom/
H A Dc_pmodm127.c193 LEN len, modlen, j; in zmod5_or_zmod() local
204 modlen = lastmod->len; in zmod5_or_zmod()
206 z1.v = zp->v + modlen - 1; in zmod5_or_zmod()
207 z1.len = len - modlen + 1; in zmod5_or_zmod()
209 if (z1.len > modlen + 1) { in zmod5_or_zmod()
218 z2.v = lastmodinv->v + modlen + 1 - z1.len; in zmod5_or_zmod()
225 j = modlen; in zmod5_or_zmod()
229 len = modlen; in zmod5_or_zmod()
237 if (tmp2.len > modlen) in zmod5_or_zmod()
255 j = modlen; in zmod5_or_zmod()
[all …]
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/testprof/
H A Dpkcs_1_test.c9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; in pkcs_1_test() local
37 modlen = 800 + (abs(rand()) % 224); in pkcs_1_test()
41 …DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf… in pkcs_1_test()
45 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); in pkcs_1_test()
63 … DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); in pkcs_1_test()
64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); in pkcs_1_test()
67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); in pkcs_1_test()
71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); in pkcs_1_test()
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/tests/
H A Dpkcs_1_test.c23 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; in pkcs_1_test() local
51 modlen = 800 + (abs(rand()) % 224); in pkcs_1_test()
55 …DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf… in pkcs_1_test()
59 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); in pkcs_1_test()
77 … DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); in pkcs_1_test()
78 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); in pkcs_1_test()
81 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); in pkcs_1_test()
85 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); in pkcs_1_test()
/dports/security/libtomcrypt/libtomcrypt-1.18.2/tests/
H A Dpkcs_1_test.c23 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; in pkcs_1_test() local
51 modlen = 800 + (abs(rand()) % 224); in pkcs_1_test()
55 …DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf… in pkcs_1_test()
59 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); in pkcs_1_test()
77 … DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); in pkcs_1_test()
78 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); in pkcs_1_test()
81 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); in pkcs_1_test()
85 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); in pkcs_1_test()
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
231 public void initialize(int modlen, boolean genParams, in initialize() argument
234 super.init(modlen, random, true); in initialize()
237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
238 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
231 public void initialize(int modlen, boolean genParams, in initialize() argument
234 super.init(modlen, random, true); in initialize()
237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
238 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
231 public void initialize(int modlen, boolean genParams, in initialize() argument
234 super.init(modlen, random, true); in initialize()
237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
238 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
227 public void initialize(int modlen, boolean genParams, in initialize() argument
230 super.init(modlen, random, true); in initialize()
233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
234 getDefDSASubprimeSize(modlen)); in initialize()
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/provider/
H A DDSAKeyPairGenerator.java87 public void initialize(int modlen, SecureRandom random) { in initialize() argument
88 init(modlen, random, false); in initialize()
110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument
111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init()
112 checkStrength(modlen, subPrimeLen); in init()
113 this.plen = modlen; in init()
231 public void initialize(int modlen, boolean genParams, in initialize() argument
234 super.init(modlen, random, true); in initialize()
237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize()
238 getDefDSASubprimeSize(modlen)); in initialize()
/dports/devel/zpu-gcc/zpu-toolchain-1.0/toolchain/gcc/libjava/gnu/java/security/provider/
H A DDSAKeyPairGenerator.java114 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument
117 if( ((modlen % 64) != 0) || (modlen < 512) || (modlen > 1024) ) in initialize()
120 if( (genParams == false) && (modlen != 512) && (modlen != 768) && (modlen != 1024) ) in initialize()
122 this.keysize = modlen; in initialize()
/dports/devel/zpu-binutils/zpu-toolchain-1.0/toolchain/gcc/libjava/gnu/java/security/provider/
H A DDSAKeyPairGenerator.java114 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument
117 if( ((modlen % 64) != 0) || (modlen < 512) || (modlen > 1024) ) in initialize()
120 if( (genParams == false) && (modlen != 512) && (modlen != 768) && (modlen != 1024) ) in initialize()
122 this.keysize = modlen; in initialize()
/dports/math/calc/calc-2.14.0.14/
H A Dzmod.c375 j = modlen; in zmod5()
379 len = modlen; in zmod5()
405 j = modlen; in zmod5()
1035 LEN modlen; in zredcdecode() local
1095 j = modlen; in zredcdecode()
1205 LEN modlen; in zredcmul() local
1312 len = modlen; in zredcmul()
1454 len = modlen; in zredcmul()
1465 len = modlen; in zredcmul()
1503 LEN modlen; in zredcsquare() local
[all …]
/dports/net/hostapd/hostapd-2.9/src/tls/
H A Dpkcs1.c18 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument
35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block()
38 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block()
47 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block()
85 size_t modlen; in pkcs1_encrypt() local
87 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt()
89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt()
93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/tls/
H A Dpkcs1.c18 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument
35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block()
38 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block()
47 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block()
85 size_t modlen; in pkcs1_encrypt() local
87 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt()
89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt()
93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()

12345678910