/dports/multimedia/v4l_compat/linux-5.13-rc2/kernel/ |
H A D | module_signing.c | 23 size_t sig_len, modlen = info->len; in mod_verify_sig() local 26 pr_devel("==>%s(,%zu)\n", __func__, modlen); in mod_verify_sig() 28 if (modlen <= sizeof(ms)) in mod_verify_sig() 31 memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); in mod_verify_sig() 33 ret = mod_check_sig(&ms, modlen, "module"); in mod_verify_sig() 38 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 39 info->len = modlen; in mod_verify_sig() 41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/dports/multimedia/libv4l/linux-5.13-rc2/kernel/ |
H A D | module_signing.c | 23 size_t sig_len, modlen = info->len; in mod_verify_sig() local 26 pr_devel("==>%s(,%zu)\n", __func__, modlen); in mod_verify_sig() 28 if (modlen <= sizeof(ms)) in mod_verify_sig() 31 memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); in mod_verify_sig() 33 ret = mod_check_sig(&ms, modlen, "module"); in mod_verify_sig() 38 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 39 info->len = modlen; in mod_verify_sig() 41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/dports/multimedia/v4l-utils/linux-5.13-rc2/kernel/ |
H A D | module_signing.c | 23 size_t sig_len, modlen = info->len; in mod_verify_sig() local 26 pr_devel("==>%s(,%zu)\n", __func__, modlen); in mod_verify_sig() 28 if (modlen <= sizeof(ms)) in mod_verify_sig() 31 memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms)); in mod_verify_sig() 33 ret = mod_check_sig(&ms, modlen, "module"); in mod_verify_sig() 38 modlen -= sig_len + sizeof(ms); in mod_verify_sig() 39 info->len = modlen; in mod_verify_sig() 41 return verify_pkcs7_signature(mod, modlen, mod + modlen, sig_len, in mod_verify_sig()
|
/dports/audio/mp3info/mp3info-0.8.5a/ |
H A D | textfunc.c | 226 int modlen; in format_output() local 237 if(modlen > 1000) { in format_output() 242 mod[modlen]=0; in format_output() 243 mod[modlen-1]='s'; in format_output() 256 mod[modlen-1]='d'; in format_output() 266 mod[modlen-1]='d'; in format_output() 283 mod[modlen-1]='d'; in format_output() 288 mod[modlen-1]='d'; in format_output() 309 mod[modlen-1]='d'; in format_output() 314 mod[modlen-1]='d'; in format_output() [all …]
|
/dports/net/libarms/libarms-5.01/http/ |
H A D | base64.c | 119 static int modlen; variable 125 modlen = 0; in arms_base64_reset_state() 135 while (obj->modlen > 0) { in arms_base64_decode_stream() 140 memcpy(&obj->modbuf[obj->modlen], buf, buflen); in arms_base64_decode_stream() 141 obj->modlen += buflen; in arms_base64_decode_stream() 145 cplen = sizeof(obj->modbuf) - obj->modlen; in arms_base64_decode_stream() 146 memcpy(&obj->modbuf[obj->modlen], buf, cplen); in arms_base64_decode_stream() 166 obj->modlen = modlen; in arms_base64_decode_stream() 175 obj->modlen = modlen; in arms_base64_decode_stream() 289 modlen = buflen; in arms_base64_decode() [all …]
|
/dports/net/reaver/reaver-wps-fork-t6x-1.6.6/src/tls/ |
H A D | pkcs1.c | 22 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument 39 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 42 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block() 51 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block() 89 size_t modlen; in pkcs1_encrypt() local 91 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt() 93 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt() 97 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
|
/dports/math/calc/calc-2.14.0.14/custom/ |
H A D | c_pmodm127.c | 193 LEN len, modlen, j; in zmod5_or_zmod() local 204 modlen = lastmod->len; in zmod5_or_zmod() 206 z1.v = zp->v + modlen - 1; in zmod5_or_zmod() 207 z1.len = len - modlen + 1; in zmod5_or_zmod() 209 if (z1.len > modlen + 1) { in zmod5_or_zmod() 218 z2.v = lastmodinv->v + modlen + 1 - z1.len; in zmod5_or_zmod() 225 j = modlen; in zmod5_or_zmod() 229 len = modlen; in zmod5_or_zmod() 237 if (tmp2.len > modlen) in zmod5_or_zmod() 255 j = modlen; in zmod5_or_zmod() [all …]
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/testprof/ |
H A D | pkcs_1_test.c | 9 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; in pkcs_1_test() local 37 modlen = 800 + (abs(rand()) % 224); in pkcs_1_test() 41 …DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf… in pkcs_1_test() 45 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); in pkcs_1_test() 63 … DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); in pkcs_1_test() 64 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); in pkcs_1_test() 67 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); in pkcs_1_test() 71 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); in pkcs_1_test()
|
/dports/security/dropbear/dropbear-2020.81/libtomcrypt/tests/ |
H A D | pkcs_1_test.c | 23 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; in pkcs_1_test() local 51 modlen = 800 + (abs(rand()) % 224); in pkcs_1_test() 55 …DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf… in pkcs_1_test() 59 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); in pkcs_1_test() 77 … DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); in pkcs_1_test() 78 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); in pkcs_1_test() 81 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); in pkcs_1_test() 85 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); in pkcs_1_test()
|
/dports/security/libtomcrypt/libtomcrypt-1.18.2/tests/ |
H A D | pkcs_1_test.c | 23 unsigned long x, y, l1, l2, l3, i1, i2, lparamlen, saltlen, modlen; in pkcs_1_test() local 51 modlen = 800 + (abs(rand()) % 224); in pkcs_1_test() 55 …DO(pkcs_1_oaep_encode(buf[0], l3, lparam, lparamlen, modlen, &yarrow_prng, prng_idx, hash_idx, buf… in pkcs_1_test() 59 DO(pkcs_1_oaep_decode(buf[1], l1, lparam, lparamlen, modlen, hash_idx, buf[2], &l2, &res1)); in pkcs_1_test() 77 … DO(pkcs_1_pss_encode(buf[0], l3, saltlen, &yarrow_prng, prng_idx, hash_idx, modlen, buf[1], &l1)); in pkcs_1_test() 78 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res1)); in pkcs_1_test() 81 DO(pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res2)); in pkcs_1_test() 85 pkcs_1_pss_decode(buf[0], l3, buf[1], l1, saltlen, hash_idx, modlen, &res3); in pkcs_1_test()
|
/dports/java/openjdk11/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 231 public void initialize(int modlen, boolean genParams, in initialize() argument 234 super.init(modlen, random, true); in initialize() 237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 238 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk13/jdk13u-jdk-13.0.10-1-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk11-jre/jdk11u-jdk-11.0.13-8-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 231 public void initialize(int modlen, boolean genParams, in initialize() argument 234 super.init(modlen, random, true); in initialize() 237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 238 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk8/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 231 public void initialize(int modlen, boolean genParams, in initialize() argument 234 super.init(modlen, random, true); in initialize() 237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 238 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk12/openjdk-jdk12u-jdk-12.0.2-10-4/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk16/jdk16u-jdk-16.0.2-7-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk17/jdk17u-jdk-17.0.1-12-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk15/jdk15u-jdk-15.0.6-1-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk14/jdk14u-jdk-14.0.2-12-1/src/java.base/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 227 public void initialize(int modlen, boolean genParams, in initialize() argument 230 super.init(modlen, random, true); in initialize() 233 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 234 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/java/openjdk8-jre/jdk8u-jdk8u312-b07.1/jdk/src/share/classes/sun/security/provider/ |
H A D | DSAKeyPairGenerator.java | 87 public void initialize(int modlen, SecureRandom random) { in initialize() argument 88 init(modlen, random, false); in initialize() 110 void init(int modlen, SecureRandom random, boolean forceNew) { in init() argument 111 int subPrimeLen = getDefDSASubprimeSize(modlen); in init() 112 checkStrength(modlen, subPrimeLen); in init() 113 this.plen = modlen; in init() 231 public void initialize(int modlen, boolean genParams, in initialize() argument 234 super.init(modlen, random, true); in initialize() 237 ParameterCache.getCachedDSAParameterSpec(modlen, in initialize() 238 getDefDSASubprimeSize(modlen)); in initialize()
|
/dports/devel/zpu-gcc/zpu-toolchain-1.0/toolchain/gcc/libjava/gnu/java/security/provider/ |
H A D | DSAKeyPairGenerator.java | 114 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument 117 if( ((modlen % 64) != 0) || (modlen < 512) || (modlen > 1024) ) in initialize() 120 if( (genParams == false) && (modlen != 512) && (modlen != 768) && (modlen != 1024) ) in initialize() 122 this.keysize = modlen; in initialize()
|
/dports/devel/zpu-binutils/zpu-toolchain-1.0/toolchain/gcc/libjava/gnu/java/security/provider/ |
H A D | DSAKeyPairGenerator.java | 114 public void initialize(int modlen, boolean genParams, SecureRandom random) in initialize() argument 117 if( ((modlen % 64) != 0) || (modlen < 512) || (modlen > 1024) ) in initialize() 120 if( (genParams == false) && (modlen != 512) && (modlen != 768) && (modlen != 1024) ) in initialize() 122 this.keysize = modlen; in initialize()
|
/dports/math/calc/calc-2.14.0.14/ |
H A D | zmod.c | 375 j = modlen; in zmod5() 379 len = modlen; in zmod5() 405 j = modlen; in zmod5() 1035 LEN modlen; in zredcdecode() local 1095 j = modlen; in zredcdecode() 1205 LEN modlen; in zredcmul() local 1312 len = modlen; in zredcmul() 1454 len = modlen; in zredcmul() 1465 len = modlen; in zredcmul() 1503 LEN modlen; in zredcsquare() local [all …]
|
/dports/net/hostapd/hostapd-2.9/src/tls/ |
H A D | pkcs1.c | 18 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 38 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block() 47 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block() 85 size_t modlen; in pkcs1_encrypt() local 87 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt() 89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt() 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
|
/dports/net/wpa_supplicant_gui/wpa_supplicant-2.9/src/tls/ |
H A D | pkcs1.c | 18 static int pkcs1_generate_encryption_block(u8 block_type, size_t modlen, in pkcs1_generate_encryption_block() argument 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { in pkcs1_generate_encryption_block() 38 __func__, (unsigned long) modlen, in pkcs1_generate_encryption_block() 47 ps_len = modlen - inlen - 3; in pkcs1_generate_encryption_block() 85 size_t modlen; in pkcs1_encrypt() local 87 modlen = crypto_rsa_get_modulus_len(key); in pkcs1_encrypt() 89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, in pkcs1_encrypt() 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); in pkcs1_encrypt()
|