/dports/security/pixiewps/pixiewps-1.4.1/src/crypto/ |
H A D | hmac_sha256.c | 15 #define PAD_SIZE 64 macro 30 uint8_t opad[PAD_SIZE], ipad[PAD_SIZE], hash[HASH_SIZE]; in hmac_sha256_full() 33 memset(ipad, 0x36, PAD_SIZE); in hmac_sha256_full() 34 memset(opad, 0x5C, PAD_SIZE); in hmac_sha256_full() 36 if (keylen > PAD_SIZE) { in hmac_sha256_full() 53 SHA256_Update(&ctx, ipad, PAD_SIZE); in hmac_sha256_full() 58 SHA256_Update(&ctx, opad, PAD_SIZE); in hmac_sha256_full() 73 uint8_t opad[PAD_SIZE], ipad[PAD_SIZE], hash[HASH_SIZE]; in hmac_sha256_init() 76 memset(ipad, 0x36, PAD_SIZE); in hmac_sha256_init() 77 memset(opad, 0x5C, PAD_SIZE); in hmac_sha256_init() [all …]
|
/dports/graphics/piglit/piglit-136a7f5fa0703603be1ffb338abe4865e76a8058/tests/cl/custom/ |
H A D | use-sub-buffer-in-kernel.c | 38 #define PAD_SIZE 100 macro 39 #define SUB_BUFFER_SIZE (BUFFER_SIZE - 2 * PAD_SIZE) 62 cl_buffer_region region = {PAD_SIZE, SUB_BUFFER_SIZE }; in piglit_cl_test() 65 char *padding = malloc(PAD_SIZE); in piglit_cl_test() 72 memset(padding, pad_byte, PAD_SIZE); in piglit_cl_test() 87 clEnqueueWriteBuffer(queue, buffer, CL_FALSE, 0, PAD_SIZE, padding, in piglit_cl_test() 89 clEnqueueWriteBuffer(queue, buffer, CL_FALSE, BUFFER_SIZE - PAD_SIZE, in piglit_cl_test() 90 PAD_SIZE, padding, 0, NULL, NULL); in piglit_cl_test() 110 for (i = 0; i < PAD_SIZE; i++) { in piglit_cl_test() 117 for (i = BUFFER_SIZE - PAD_SIZE; i < BUFFER_SIZE; i++) { in piglit_cl_test() [all …]
|
/dports/security/john/john-1.9.0-jumbo-1/src/ |
H A D | hmacMD5_fmt_plug.c | 45 #define PAD_SIZE 64 macro 46 #define PAD_SIZE_W (PAD_SIZE/4) 108 static unsigned char (*ipad)[PAD_SIZE]; 109 static unsigned char (*opad)[PAD_SIZE]; 293 if (len > PAD_SIZE) { in set_key() 356 memset(ipad[index], 0x36, PAD_SIZE); in set_key() 357 memset(opad[index], 0x5C, PAD_SIZE); in set_key() 359 if (len > PAD_SIZE) { in set_key() 447 SIMDmd5body(&ipad[index * PAD_SIZE], in crypt_all() 450 SIMDmd5body(&opad[index * PAD_SIZE], in crypt_all() [all …]
|
H A D | hmacSHA512_fmt_plug.c | 44 #define PAD_SIZE 128 macro 45 #define PAD_SIZE_W (PAD_SIZE/8) 55 #define SALT_LENGTH (SALT_LIMBS * PAD_SIZE - 17) 118 static unsigned char (*opad)[PAD_SIZE]; 119 static unsigned char (*ipad)[PAD_SIZE]; 297 if (len > PAD_SIZE) { in set_key() 408 memset(ipad[index], 0x36, PAD_SIZE); in set_key() 409 memset(opad[index], 0x5C, PAD_SIZE); in set_key() 411 if (len > PAD_SIZE) { in set_key() 519 SIMDSHA512body(&ipad[index * PAD_SIZE], in crypt_all() [all …]
|
H A D | hmacSHA256_fmt_plug.c | 43 #define PAD_SIZE 64 macro 44 #define PAD_SIZE_W (PAD_SIZE/4) 54 #define SALT_LENGTH (SALT_LIMBS * PAD_SIZE - 9) 112 static unsigned char (*opad)[PAD_SIZE]; 113 static unsigned char (*ipad)[PAD_SIZE]; 291 if (len > PAD_SIZE) { 353 memset(ipad[index], 0x36, PAD_SIZE); 354 memset(opad[index], 0x5C, PAD_SIZE); 356 if (len > PAD_SIZE) { 465 SIMDSHA256body(&ipad[index * PAD_SIZE], [all …]
|
H A D | rakp_fmt_plug.c | 36 #define PAD_SIZE 64 macro 39 #define SALT_LENGTH (2 * PAD_SIZE) 41 #define SALT_MIN_SIZE (PAD_SIZE - 8) 42 #define SALT_MAX_SIZE (2 * PAD_SIZE - 8 - 1) 86 static unsigned char (*ipad)[PAD_SIZE]; 87 static unsigned char (*opad)[PAD_SIZE]; 210 if (len > PAD_SIZE) { in set_key() 259 memset(ipad[index], 0x36, PAD_SIZE); in set_key() 260 memset(opad[index], 0x5C, PAD_SIZE); in set_key() 262 if (len > PAD_SIZE) { in set_key() [all …]
|
H A D | hmacSHA1_fmt_plug.c | 43 #define PAD_SIZE 64 macro 46 #define SALT_LENGTH PAD_SIZE 92 static unsigned char (*ipad)[PAD_SIZE]; 93 static unsigned char (*opad)[PAD_SIZE]; 224 if (len > PAD_SIZE) { 280 memset(ipad[index], 0x36, PAD_SIZE); 281 memset(opad[index], 0x5C, PAD_SIZE); 283 if (len > PAD_SIZE) { 389 SHA1_Update(&ipad_ctx[index], ipad[index], PAD_SIZE); 391 SHA1_Update(&opad_ctx[index], opad[index], PAD_SIZE);
|
/dports/databases/mariadb103-client/mariadb-10.3.34/extra/yassl/taocrypt/include/ |
H A D | sha.hpp | 38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, enumerator 45 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, enumerator 77 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, enumerator 100 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, enumerator 125 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, enumerator 149 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
|
H A D | md4.hpp | 36 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 16, PAD_SIZE = 56, enumerator 43 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
|
/dports/databases/mariadb103-server/mariadb-10.3.34/extra/yassl/taocrypt/include/ |
H A D | sha.hpp | 38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, 45 word32 getPadSize() const { return PAD_SIZE; } 70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, 77 word32 getPadSize() const { return PAD_SIZE; } 93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, 100 word32 getPadSize() const { return PAD_SIZE; } 118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, 125 word32 getPadSize() const { return PAD_SIZE; } 141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, 149 word32 getPadSize() const { return PAD_SIZE; }
|
H A D | md4.hpp | 36 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 16, PAD_SIZE = 56, enumerator 43 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
|
/dports/databases/mysql55-client/mysql-5.5.62/extra/yassl/taocrypt/include/ |
H A D | sha.hpp | 38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, enumerator 45 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, enumerator 77 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, enumerator 100 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, enumerator 125 word32 getPadSize() const { return PAD_SIZE; } in getPadSize() 141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, enumerator 149 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
|
/dports/databases/mariadb103-client/mariadb-10.3.34/extra/yassl/taocrypt/src/ |
H A D | md2.cpp | 71 word32 L = (PAD_SIZE - count_) < len ? (PAD_SIZE - count_) : len; in Update() 77 if (count_==PAD_SIZE) { in Update() 79 memcpy(X_.get_buffer() + PAD_SIZE, buffer_.get_buffer(), PAD_SIZE); in Update() 83 for(i = 0; i < PAD_SIZE; i++) { in Update() 84 X_[32 + i] = X_[PAD_SIZE + i] ^ X_[i]; in Update() 110 word32 padLen = PAD_SIZE - count_; in Final()
|
/dports/databases/mariadb103-server/mariadb-10.3.34/extra/yassl/taocrypt/src/ |
H A D | md2.cpp | 71 word32 L = (PAD_SIZE - count_) < len ? (PAD_SIZE - count_) : len; in Update() 77 if (count_==PAD_SIZE) { in Update() 79 memcpy(X_.get_buffer() + PAD_SIZE, buffer_.get_buffer(), PAD_SIZE); in Update() 83 for(i = 0; i < PAD_SIZE; i++) { in Update() 84 X_[32 + i] = X_[PAD_SIZE + i] ^ X_[i]; in Update() 110 word32 padLen = PAD_SIZE - count_; in Final()
|
/dports/databases/mysql55-client/mysql-5.5.62/extra/yassl/taocrypt/src/ |
H A D | md2.cpp | 71 word32 L = (PAD_SIZE - count_) < len ? (PAD_SIZE - count_) : len; in Update() 77 if (count_==PAD_SIZE) { in Update() 79 memcpy(X_.get_buffer() + PAD_SIZE, buffer_.get_buffer(), PAD_SIZE); in Update() 83 for(i = 0; i < PAD_SIZE; i++) { in Update() 84 X_[32 + i] = X_[PAD_SIZE + i] ^ X_[i]; in Update() 110 word32 padLen = PAD_SIZE - count_; in Final()
|
/dports/devel/efl/efl-1.25.1/src/examples/edje/ |
H A D | embryo_pong.edc | 6 #define PAD_SIZE 60 75 new pady = my - PAD_SIZE / 2; 77 else if (pady + PAD_SIZE > fh) pady = fh - PAD_SIZE; 83 new pad2y = round(by) - PAD_SIZE / 2 - BALL_SIZE / 2; 85 else if (pad2y + PAD_SIZE > fh) pad2y = fh - PAD_SIZE; 109 (by + BALL_SIZE > pady) && (by < pady + PAD_SIZE)) 111 new Float:dy = by - pady - PAD_SIZE / 2; 119 (by + BALL_SIZE > pad2y) && (by < pad2y + PAD_SIZE)) 121 new Float:dy = by - pad2y - PAD_SIZE / 2; 201 max: 10 PAD_SIZE; [all …]
|
/dports/security/intel-ipsec-mb/intel-ipsec-mb-55179f0/test/ |
H A D | null_test.c | 36 #define PAD_SIZE 16 macro 53 uint8_t padding[PAD_SIZE]; in test_null_hash() 54 uint8_t target[BUF_SIZE + 2*PAD_SIZE]; in test_null_hash() 68 job->dst = target + PAD_SIZE; in test_null_hash() 94 if (memcmp(padding, target, PAD_SIZE)) { in test_null_hash() 96 hexdump(stderr, "Target", target, BUF_SIZE + PAD_SIZE*2); in test_null_hash() 99 if (memcmp(padding, target + PAD_SIZE + BUF_SIZE, in test_null_hash() 100 PAD_SIZE)) { in test_null_hash() 102 hexdump(stderr, "Target", target, BUF_SIZE + PAD_SIZE*2); in test_null_hash()
|
/dports/multimedia/neolink/neolink-cf54129/crates/core/src/bcmedia/ |
H A D | ser.rs | 11 const PAD_SIZE: u32 = 8; const 27 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize() 29 n => PAD_SIZE - n, in serialize() 41 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize() 43 n => PAD_SIZE - n, in serialize() 55 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize() 57 n => PAD_SIZE - n, in serialize() 69 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize() 71 n => PAD_SIZE - n, in serialize()
|
H A D | de.rs | 9 const PAD_SIZE: u32 = 8; const 211 let pad_size = match payload_size % PAD_SIZE { in bcmedia_iframe() 213 n => PAD_SIZE - n, in bcmedia_iframe() 243 let pad_size = match payload_size % PAD_SIZE { in bcmedia_pframe() 245 n => PAD_SIZE - n, in bcmedia_pframe() 270 let pad_size = match payload_size as u32 % PAD_SIZE { in bcmedia_aac() 272 n => PAD_SIZE - n, in bcmedia_aac() 296 let pad_size = match payload_size as u32 % PAD_SIZE { in bcmedia_adpcm() 298 n => PAD_SIZE - n, in bcmedia_adpcm()
|
/dports/mail/libesmtp/libesmtp-1.0.6/crammd5/ |
H A D | hmacmd5.c | 30 #define PAD_SIZE 64 macro 49 unsigned char ipad[PAD_SIZE]; in hmac_md5_pre() 50 unsigned char opad[PAD_SIZE]; in hmac_md5_pre() 56 if (secret_len > PAD_SIZE) in hmac_md5_pre() 76 for (i = 0; i < PAD_SIZE; i++) in hmac_md5_pre()
|
/dports/cad/pcb/pcb-4.2.0/lib/ |
H A D | amphenol.inc | 31 `define(`PAD_SIZE', `100') 46 Pin(0 0 PAD_SIZE HOLE_SIZE "2" 0x01) 47 Pin(0 PAD_SPACE PAD_SIZE HOLE_SIZE "3" 0x01) 48 Pin(PAD_SPACE 0 PAD_SIZE HOLE_SIZE "4" 0x01) 49 Pin(PAD_SPACE PAD_SPACE PAD_SIZE HOLE_SIZE "5" 0x01)
|
/dports/games/xfrisk/XFrisk/ |
H A D | debug.c | 46 #define PAD_SIZE 8 /* In bytes, on each side of block. */ macro 179 pvTemp = (void *)malloc(size + PAD_SIZE*2); in D_MemAlloc() 188 memset(pvTemp, MEM_FILL, size+PAD_SIZE*2); in D_MemAlloc() 192 pbTemp[s] = pbTemp[size+PAD_SIZE*2-s-1] = MagicCookie[s]; in D_MemAlloc() 234 HashTable.uiRealMem -= size - PAD_SIZE*2; in D_MemFree() 337 HashTable.uiRealMem += size + PAD_SIZE*2; in D_MemHashNewEntry() 518 if(bPtr[size+PAD_SIZE*2-s-1] != MagicCookie[s]) in D_MemCheckPointer() 523 D_PrintStrLong("0x%02x|", (Pointer)bPtr[size+PAD_SIZE*2-s-1]); in D_MemCheckPointer()
|
/dports/net/proby/proby-1.0.2/cargo-crates/libnghttp2-sys-0.1.4+1.41.0/nghttp2/third-party/mruby/src/ |
H A D | fmt_fp.c | 64 #define PAD_SIZE 256 macro 68 char pad[PAD_SIZE]; in pad() 71 memset(pad, c, l>PAD_SIZE ? PAD_SIZE : l); in pad() 72 for (; l >= PAD_SIZE; l -= PAD_SIZE) in pad() 73 out(f, pad, PAD_SIZE); in pad()
|
/dports/lang/rust/rustc-1.58.1-src/vendor/libnghttp2-sys/nghttp2/third-party/mruby/src/ |
H A D | fmt_fp.c | 64 #define PAD_SIZE 256 macro 68 char pad[PAD_SIZE]; in pad() 71 memset(pad, c, l>PAD_SIZE ? PAD_SIZE : l); in pad() 72 for (; l >= PAD_SIZE; l -= PAD_SIZE) in pad() 73 out(f, pad, PAD_SIZE); in pad()
|
/dports/www/h2o-devel/h2o-dcc7134/deps/mruby/src/ |
H A D | fmt_fp.c | 64 #define PAD_SIZE 256 macro 68 char pad[PAD_SIZE]; in pad() 71 memset(pad, c, l>PAD_SIZE ? PAD_SIZE : l); in pad() 72 for (; l >= PAD_SIZE; l -= PAD_SIZE) in pad() 73 out(f, pad, PAD_SIZE); in pad()
|