Home
last modified time | relevance | path

Searched refs:PAD_SIZE (Results 1 – 25 of 332) sorted by relevance

12345678910>>...14

/dports/security/pixiewps/pixiewps-1.4.1/src/crypto/
H A Dhmac_sha256.c15 #define PAD_SIZE 64 macro
30 uint8_t opad[PAD_SIZE], ipad[PAD_SIZE], hash[HASH_SIZE]; in hmac_sha256_full()
33 memset(ipad, 0x36, PAD_SIZE); in hmac_sha256_full()
34 memset(opad, 0x5C, PAD_SIZE); in hmac_sha256_full()
36 if (keylen > PAD_SIZE) { in hmac_sha256_full()
53 SHA256_Update(&ctx, ipad, PAD_SIZE); in hmac_sha256_full()
58 SHA256_Update(&ctx, opad, PAD_SIZE); in hmac_sha256_full()
73 uint8_t opad[PAD_SIZE], ipad[PAD_SIZE], hash[HASH_SIZE]; in hmac_sha256_init()
76 memset(ipad, 0x36, PAD_SIZE); in hmac_sha256_init()
77 memset(opad, 0x5C, PAD_SIZE); in hmac_sha256_init()
[all …]
/dports/graphics/piglit/piglit-136a7f5fa0703603be1ffb338abe4865e76a8058/tests/cl/custom/
H A Duse-sub-buffer-in-kernel.c38 #define PAD_SIZE 100 macro
39 #define SUB_BUFFER_SIZE (BUFFER_SIZE - 2 * PAD_SIZE)
62 cl_buffer_region region = {PAD_SIZE, SUB_BUFFER_SIZE }; in piglit_cl_test()
65 char *padding = malloc(PAD_SIZE); in piglit_cl_test()
72 memset(padding, pad_byte, PAD_SIZE); in piglit_cl_test()
87 clEnqueueWriteBuffer(queue, buffer, CL_FALSE, 0, PAD_SIZE, padding, in piglit_cl_test()
89 clEnqueueWriteBuffer(queue, buffer, CL_FALSE, BUFFER_SIZE - PAD_SIZE, in piglit_cl_test()
90 PAD_SIZE, padding, 0, NULL, NULL); in piglit_cl_test()
110 for (i = 0; i < PAD_SIZE; i++) { in piglit_cl_test()
117 for (i = BUFFER_SIZE - PAD_SIZE; i < BUFFER_SIZE; i++) { in piglit_cl_test()
[all …]
/dports/security/john/john-1.9.0-jumbo-1/src/
H A DhmacMD5_fmt_plug.c45 #define PAD_SIZE 64 macro
46 #define PAD_SIZE_W (PAD_SIZE/4)
108 static unsigned char (*ipad)[PAD_SIZE];
109 static unsigned char (*opad)[PAD_SIZE];
293 if (len > PAD_SIZE) { in set_key()
356 memset(ipad[index], 0x36, PAD_SIZE); in set_key()
357 memset(opad[index], 0x5C, PAD_SIZE); in set_key()
359 if (len > PAD_SIZE) { in set_key()
447 SIMDmd5body(&ipad[index * PAD_SIZE], in crypt_all()
450 SIMDmd5body(&opad[index * PAD_SIZE], in crypt_all()
[all …]
H A DhmacSHA512_fmt_plug.c44 #define PAD_SIZE 128 macro
45 #define PAD_SIZE_W (PAD_SIZE/8)
55 #define SALT_LENGTH (SALT_LIMBS * PAD_SIZE - 17)
118 static unsigned char (*opad)[PAD_SIZE];
119 static unsigned char (*ipad)[PAD_SIZE];
297 if (len > PAD_SIZE) { in set_key()
408 memset(ipad[index], 0x36, PAD_SIZE); in set_key()
409 memset(opad[index], 0x5C, PAD_SIZE); in set_key()
411 if (len > PAD_SIZE) { in set_key()
519 SIMDSHA512body(&ipad[index * PAD_SIZE], in crypt_all()
[all …]
H A DhmacSHA256_fmt_plug.c43 #define PAD_SIZE 64 macro
44 #define PAD_SIZE_W (PAD_SIZE/4)
54 #define SALT_LENGTH (SALT_LIMBS * PAD_SIZE - 9)
112 static unsigned char (*opad)[PAD_SIZE];
113 static unsigned char (*ipad)[PAD_SIZE];
291 if (len > PAD_SIZE) {
353 memset(ipad[index], 0x36, PAD_SIZE);
354 memset(opad[index], 0x5C, PAD_SIZE);
356 if (len > PAD_SIZE) {
465 SIMDSHA256body(&ipad[index * PAD_SIZE],
[all …]
H A Drakp_fmt_plug.c36 #define PAD_SIZE 64 macro
39 #define SALT_LENGTH (2 * PAD_SIZE)
41 #define SALT_MIN_SIZE (PAD_SIZE - 8)
42 #define SALT_MAX_SIZE (2 * PAD_SIZE - 8 - 1)
86 static unsigned char (*ipad)[PAD_SIZE];
87 static unsigned char (*opad)[PAD_SIZE];
210 if (len > PAD_SIZE) { in set_key()
259 memset(ipad[index], 0x36, PAD_SIZE); in set_key()
260 memset(opad[index], 0x5C, PAD_SIZE); in set_key()
262 if (len > PAD_SIZE) { in set_key()
[all …]
H A DhmacSHA1_fmt_plug.c43 #define PAD_SIZE 64 macro
46 #define SALT_LENGTH PAD_SIZE
92 static unsigned char (*ipad)[PAD_SIZE];
93 static unsigned char (*opad)[PAD_SIZE];
224 if (len > PAD_SIZE) {
280 memset(ipad[index], 0x36, PAD_SIZE);
281 memset(opad[index], 0x5C, PAD_SIZE);
283 if (len > PAD_SIZE) {
389 SHA1_Update(&ipad_ctx[index], ipad[index], PAD_SIZE);
391 SHA1_Update(&opad_ctx[index], opad[index], PAD_SIZE);
/dports/databases/mariadb103-client/mariadb-10.3.34/extra/yassl/taocrypt/include/
H A Dsha.hpp38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, enumerator
45 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, enumerator
77 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, enumerator
100 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, enumerator
125 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, enumerator
149 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
H A Dmd4.hpp36 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 16, PAD_SIZE = 56, enumerator
43 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
/dports/databases/mariadb103-server/mariadb-10.3.34/extra/yassl/taocrypt/include/
H A Dsha.hpp38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56,
45 word32 getPadSize() const { return PAD_SIZE; }
70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56,
77 word32 getPadSize() const { return PAD_SIZE; }
93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56,
100 word32 getPadSize() const { return PAD_SIZE; }
118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112,
125 word32 getPadSize() const { return PAD_SIZE; }
141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112,
149 word32 getPadSize() const { return PAD_SIZE; }
H A Dmd4.hpp36 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 16, PAD_SIZE = 56, enumerator
43 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
/dports/databases/mysql55-client/mysql-5.5.62/extra/yassl/taocrypt/include/
H A Dsha.hpp38 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 20, PAD_SIZE = 56, enumerator
45 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
70 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 32, PAD_SIZE = 56, enumerator
77 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
93 enum { BLOCK_SIZE = 64, DIGEST_SIZE = 28, PAD_SIZE = 56, enumerator
100 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
118 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 64, PAD_SIZE = 112, enumerator
125 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
141 enum { BLOCK_SIZE = 128, DIGEST_SIZE = 48, PAD_SIZE = 112, enumerator
149 word32 getPadSize() const { return PAD_SIZE; } in getPadSize()
/dports/databases/mariadb103-client/mariadb-10.3.34/extra/yassl/taocrypt/src/
H A Dmd2.cpp71 word32 L = (PAD_SIZE - count_) < len ? (PAD_SIZE - count_) : len; in Update()
77 if (count_==PAD_SIZE) { in Update()
79 memcpy(X_.get_buffer() + PAD_SIZE, buffer_.get_buffer(), PAD_SIZE); in Update()
83 for(i = 0; i < PAD_SIZE; i++) { in Update()
84 X_[32 + i] = X_[PAD_SIZE + i] ^ X_[i]; in Update()
110 word32 padLen = PAD_SIZE - count_; in Final()
/dports/databases/mariadb103-server/mariadb-10.3.34/extra/yassl/taocrypt/src/
H A Dmd2.cpp71 word32 L = (PAD_SIZE - count_) < len ? (PAD_SIZE - count_) : len; in Update()
77 if (count_==PAD_SIZE) { in Update()
79 memcpy(X_.get_buffer() + PAD_SIZE, buffer_.get_buffer(), PAD_SIZE); in Update()
83 for(i = 0; i < PAD_SIZE; i++) { in Update()
84 X_[32 + i] = X_[PAD_SIZE + i] ^ X_[i]; in Update()
110 word32 padLen = PAD_SIZE - count_; in Final()
/dports/databases/mysql55-client/mysql-5.5.62/extra/yassl/taocrypt/src/
H A Dmd2.cpp71 word32 L = (PAD_SIZE - count_) < len ? (PAD_SIZE - count_) : len; in Update()
77 if (count_==PAD_SIZE) { in Update()
79 memcpy(X_.get_buffer() + PAD_SIZE, buffer_.get_buffer(), PAD_SIZE); in Update()
83 for(i = 0; i < PAD_SIZE; i++) { in Update()
84 X_[32 + i] = X_[PAD_SIZE + i] ^ X_[i]; in Update()
110 word32 padLen = PAD_SIZE - count_; in Final()
/dports/devel/efl/efl-1.25.1/src/examples/edje/
H A Dembryo_pong.edc6 #define PAD_SIZE 60
75 new pady = my - PAD_SIZE / 2;
77 else if (pady + PAD_SIZE > fh) pady = fh - PAD_SIZE;
83 new pad2y = round(by) - PAD_SIZE / 2 - BALL_SIZE / 2;
85 else if (pad2y + PAD_SIZE > fh) pad2y = fh - PAD_SIZE;
109 (by + BALL_SIZE > pady) && (by < pady + PAD_SIZE))
111 new Float:dy = by - pady - PAD_SIZE / 2;
119 (by + BALL_SIZE > pad2y) && (by < pad2y + PAD_SIZE))
121 new Float:dy = by - pad2y - PAD_SIZE / 2;
201 max: 10 PAD_SIZE;
[all …]
/dports/security/intel-ipsec-mb/intel-ipsec-mb-55179f0/test/
H A Dnull_test.c36 #define PAD_SIZE 16 macro
53 uint8_t padding[PAD_SIZE]; in test_null_hash()
54 uint8_t target[BUF_SIZE + 2*PAD_SIZE]; in test_null_hash()
68 job->dst = target + PAD_SIZE; in test_null_hash()
94 if (memcmp(padding, target, PAD_SIZE)) { in test_null_hash()
96 hexdump(stderr, "Target", target, BUF_SIZE + PAD_SIZE*2); in test_null_hash()
99 if (memcmp(padding, target + PAD_SIZE + BUF_SIZE, in test_null_hash()
100 PAD_SIZE)) { in test_null_hash()
102 hexdump(stderr, "Target", target, BUF_SIZE + PAD_SIZE*2); in test_null_hash()
/dports/multimedia/neolink/neolink-cf54129/crates/core/src/bcmedia/
H A Dser.rs11 const PAD_SIZE: u32 = 8; const
27 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize()
29 n => PAD_SIZE - n, in serialize()
41 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize()
43 n => PAD_SIZE - n, in serialize()
55 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize()
57 n => PAD_SIZE - n, in serialize()
69 let pad_size = match payload.data.len() as u32 % PAD_SIZE { in serialize()
71 n => PAD_SIZE - n, in serialize()
H A Dde.rs9 const PAD_SIZE: u32 = 8; const
211 let pad_size = match payload_size % PAD_SIZE { in bcmedia_iframe()
213 n => PAD_SIZE - n, in bcmedia_iframe()
243 let pad_size = match payload_size % PAD_SIZE { in bcmedia_pframe()
245 n => PAD_SIZE - n, in bcmedia_pframe()
270 let pad_size = match payload_size as u32 % PAD_SIZE { in bcmedia_aac()
272 n => PAD_SIZE - n, in bcmedia_aac()
296 let pad_size = match payload_size as u32 % PAD_SIZE { in bcmedia_adpcm()
298 n => PAD_SIZE - n, in bcmedia_adpcm()
/dports/mail/libesmtp/libesmtp-1.0.6/crammd5/
H A Dhmacmd5.c30 #define PAD_SIZE 64 macro
49 unsigned char ipad[PAD_SIZE]; in hmac_md5_pre()
50 unsigned char opad[PAD_SIZE]; in hmac_md5_pre()
56 if (secret_len > PAD_SIZE) in hmac_md5_pre()
76 for (i = 0; i < PAD_SIZE; i++) in hmac_md5_pre()
/dports/cad/pcb/pcb-4.2.0/lib/
H A Damphenol.inc31 `define(`PAD_SIZE', `100')
46 Pin(0 0 PAD_SIZE HOLE_SIZE "2" 0x01)
47 Pin(0 PAD_SPACE PAD_SIZE HOLE_SIZE "3" 0x01)
48 Pin(PAD_SPACE 0 PAD_SIZE HOLE_SIZE "4" 0x01)
49 Pin(PAD_SPACE PAD_SPACE PAD_SIZE HOLE_SIZE "5" 0x01)
/dports/games/xfrisk/XFrisk/
H A Ddebug.c46 #define PAD_SIZE 8 /* In bytes, on each side of block. */ macro
179 pvTemp = (void *)malloc(size + PAD_SIZE*2); in D_MemAlloc()
188 memset(pvTemp, MEM_FILL, size+PAD_SIZE*2); in D_MemAlloc()
192 pbTemp[s] = pbTemp[size+PAD_SIZE*2-s-1] = MagicCookie[s]; in D_MemAlloc()
234 HashTable.uiRealMem -= size - PAD_SIZE*2; in D_MemFree()
337 HashTable.uiRealMem += size + PAD_SIZE*2; in D_MemHashNewEntry()
518 if(bPtr[size+PAD_SIZE*2-s-1] != MagicCookie[s]) in D_MemCheckPointer()
523 D_PrintStrLong("0x%02x|", (Pointer)bPtr[size+PAD_SIZE*2-s-1]); in D_MemCheckPointer()
/dports/net/proby/proby-1.0.2/cargo-crates/libnghttp2-sys-0.1.4+1.41.0/nghttp2/third-party/mruby/src/
H A Dfmt_fp.c64 #define PAD_SIZE 256 macro
68 char pad[PAD_SIZE]; in pad()
71 memset(pad, c, l>PAD_SIZE ? PAD_SIZE : l); in pad()
72 for (; l >= PAD_SIZE; l -= PAD_SIZE) in pad()
73 out(f, pad, PAD_SIZE); in pad()
/dports/lang/rust/rustc-1.58.1-src/vendor/libnghttp2-sys/nghttp2/third-party/mruby/src/
H A Dfmt_fp.c64 #define PAD_SIZE 256 macro
68 char pad[PAD_SIZE]; in pad()
71 memset(pad, c, l>PAD_SIZE ? PAD_SIZE : l); in pad()
72 for (; l >= PAD_SIZE; l -= PAD_SIZE) in pad()
73 out(f, pad, PAD_SIZE); in pad()
/dports/www/h2o-devel/h2o-dcc7134/deps/mruby/src/
H A Dfmt_fp.c64 #define PAD_SIZE 256 macro
68 char pad[PAD_SIZE]; in pad()
71 memset(pad, c, l>PAD_SIZE ? PAD_SIZE : l); in pad()
72 for (; l >= PAD_SIZE; l -= PAD_SIZE) in pad()
73 out(f, pad, PAD_SIZE); in pad()

12345678910>>...14