/dports/devel/premake5/premake-5.0.0-alpha16-src/contrib/mbedtls/tests/src/drivers/ |
H A D | signature.c | 106 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp.grp.pbits ); in test_transparent_signature_sign_hash() local 114 if( signature_size < 2 * curve_bytes ) in test_transparent_signature_sign_hash() 123 curve_bytes ) ); in test_transparent_signature_sign_hash() 125 signature + curve_bytes, in test_transparent_signature_sign_hash() 126 curve_bytes ) ); in test_transparent_signature_sign_hash() 133 *signature_length = 2 * curve_bytes; in test_transparent_signature_sign_hash() 220 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp.grp.pbits ); in test_transparent_signature_verify_hash() local 225 if( signature_length < 2 * curve_bytes ) in test_transparent_signature_verify_hash() 233 curve_bytes ) ); in test_transparent_signature_verify_hash() 235 signature + curve_bytes, in test_transparent_signature_verify_hash() [all …]
|
/dports/multimedia/librist/librist-5c1f4a06ab46e16e6bba42fe7381d8353020a1fd/contrib/mbedtls/library/ |
H A D | psa_crypto_ecp.c | 81 size_t curve_bytes = data_length; in mbedtls_psa_ecp_load_representation() local 95 curve_bytes = data_length / 2; in mbedtls_psa_ecp_load_representation() 107 if( curve_bytes != PSA_BITS_TO_BYTES( curve_bits ) ) in mbedtls_psa_ecp_load_representation() 115 curve_bits = PSA_BYTES_TO_BITS( curve_bytes ); in mbedtls_psa_ecp_load_representation() 370 size_t curve_bytes; in ecdsa_sign_hash() local 381 curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in ecdsa_sign_hash() 385 if( signature_size < 2 * curve_bytes ) in ecdsa_sign_hash() 427 *signature_length = 2 * curve_bytes; in ecdsa_sign_hash() 444 size_t curve_bytes; in ecdsa_verify_hash() local 457 curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in ecdsa_verify_hash() [all …]
|
/dports/www/hiawatha/hiawatha-10.12/mbedtls/library/ |
H A D | psa_crypto_ecp.c | 81 size_t curve_bytes = data_length; in mbedtls_psa_ecp_load_representation() local 95 curve_bytes = data_length / 2; in mbedtls_psa_ecp_load_representation() 107 if( curve_bytes != PSA_BITS_TO_BYTES( curve_bits ) ) in mbedtls_psa_ecp_load_representation() 115 curve_bits = PSA_BYTES_TO_BITS( curve_bytes ); in mbedtls_psa_ecp_load_representation() 370 size_t curve_bytes; in ecdsa_sign_hash() local 381 curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in ecdsa_sign_hash() 385 if( signature_size < 2 * curve_bytes ) in ecdsa_sign_hash() 427 *signature_length = 2 * curve_bytes; in ecdsa_sign_hash() 444 size_t curve_bytes; in ecdsa_verify_hash() local 457 curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in ecdsa_verify_hash() [all …]
|
/dports/sysutils/fluent-bit/fluent-bit-1.8.11/lib/mbedtls-2.27.0/library/ |
H A D | psa_crypto_ecp.c | 82 size_t curve_bytes = data_length; in mbedtls_psa_ecp_load_representation() local 96 curve_bytes = data_length / 2; in mbedtls_psa_ecp_load_representation() 108 if( curve_bytes != PSA_BITS_TO_BYTES( curve_bits ) ) in mbedtls_psa_ecp_load_representation() 116 curve_bits = PSA_BYTES_TO_BITS( curve_bytes ); in mbedtls_psa_ecp_load_representation() 371 size_t curve_bytes; in ecdsa_sign_hash() local 382 curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in ecdsa_sign_hash() 386 if( signature_size < 2 * curve_bytes ) in ecdsa_sign_hash() 428 *signature_length = 2 * curve_bytes; in ecdsa_sign_hash() 445 size_t curve_bytes; in ecdsa_verify_hash() local 458 curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in ecdsa_verify_hash() [all …]
|
/dports/www/firefox-esr/firefox-91.8.0/gfx/skia/skia/third_party/skcms/ |
H A D | skcms.cc | 433 static const uint32_t curve_bytes[] = { 4, 12, 16, 20, 28 }; in read_curve_para() local 434 if (size < SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]) { in read_curve_para() 439 *curve_size = SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]; in read_curve_para() 710 uint32_t curve_bytes; in read_curves() local 711 if (!read_curve(buf + curve_offset, size - curve_offset, &curves[i], &curve_bytes)) { in read_curves() 715 if (curve_bytes > UINT32_MAX - 3) { in read_curves() 718 curve_bytes = (curve_bytes + 3) & ~3U; in read_curves() 720 uint64_t new_offset_64 = (uint64_t)curve_offset + curve_bytes; in read_curves()
|
/dports/graphics/libjxl/libjxl-0.6.1/third_party/skcms/ |
H A D | skcms.cc | 430 static const uint32_t curve_bytes[] = { 4, 12, 16, 20, 28 }; in read_curve_para() local 431 if (size < SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]) { in read_curve_para() 436 *curve_size = SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]; in read_curve_para() 707 uint32_t curve_bytes; in read_curves() local 708 if (!read_curve(buf + curve_offset, size - curve_offset, &curves[i], &curve_bytes)) { in read_curves() 712 if (curve_bytes > UINT32_MAX - 3) { in read_curves() 715 curve_bytes = (curve_bytes + 3) & ~3U; in read_curves() 717 uint64_t new_offset_64 = (uint64_t)curve_offset + curve_bytes; in read_curves()
|
/dports/lang/spidermonkey78/firefox-78.9.0/gfx/skia/skia/third_party/skcms/ |
H A D | skcms.cc | 423 static const uint32_t curve_bytes[] = { 4, 12, 16, 20, 28 }; in read_curve_para() local 424 if (size < SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]) { in read_curve_para() 429 *curve_size = SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]; in read_curve_para() 700 uint32_t curve_bytes; in read_curves() local 701 if (!read_curve(buf + curve_offset, size - curve_offset, &curves[i], &curve_bytes)) { in read_curves() 705 if (curve_bytes > UINT32_MAX - 3) { in read_curves() 708 curve_bytes = (curve_bytes + 3) & ~3U; in read_curves() 710 uint64_t new_offset_64 = (uint64_t)curve_offset + curve_bytes; in read_curves()
|
/dports/www/chromium-legacy/chromium-88.0.4324.182/third_party/skia/third_party/skcms/ |
H A D | skcms.cc | 446 static const uint32_t curve_bytes[] = { 4, 12, 16, 20, 28 }; in read_curve_para() local 447 if (size < SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]) { in read_curve_para() 452 *curve_size = SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]; in read_curve_para() 723 uint32_t curve_bytes; in read_curves() local 724 if (!read_curve(buf + curve_offset, size - curve_offset, &curves[i], &curve_bytes)) { in read_curves() 728 if (curve_bytes > UINT32_MAX - 3) { in read_curves() 731 curve_bytes = (curve_bytes + 3) & ~3U; in read_curves() 733 uint64_t new_offset_64 = (uint64_t)curve_offset + curve_bytes; in read_curves()
|
/dports/www/qt5-webengine/qtwebengine-everywhere-src-5.15.2/src/3rdparty/chromium/third_party/skia/third_party/skcms/ |
H A D | skcms.cc | 443 static const uint32_t curve_bytes[] = { 4, 12, 16, 20, 28 }; in read_curve_para() local 444 if (size < SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]) { in read_curve_para() 449 *curve_size = SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]; in read_curve_para() 720 uint32_t curve_bytes; in read_curves() local 721 if (!read_curve(buf + curve_offset, size - curve_offset, &curves[i], &curve_bytes)) { in read_curves() 725 if (curve_bytes > UINT32_MAX - 3) { in read_curves() 728 curve_bytes = (curve_bytes + 3) & ~3U; in read_curves() 730 uint64_t new_offset_64 = (uint64_t)curve_offset + curve_bytes; in read_curves()
|
/dports/www/firefox/firefox-99.0/gfx/skia/skia/third_party/skcms/ |
H A D | skcms.cc | 433 static const uint32_t curve_bytes[] = { 4, 12, 16, 20, 28 }; in read_curve_para() local 434 if (size < SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]) { in read_curve_para() 439 *curve_size = SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]; in read_curve_para() 710 uint32_t curve_bytes; in read_curves() local 711 if (!read_curve(buf + curve_offset, size - curve_offset, &curves[i], &curve_bytes)) { in read_curves() 715 if (curve_bytes > UINT32_MAX - 3) { in read_curves() 718 curve_bytes = (curve_bytes + 3) & ~3U; in read_curves() 720 uint64_t new_offset_64 = (uint64_t)curve_offset + curve_bytes; in read_curves()
|
/dports/mail/thunderbird/thunderbird-91.8.0/gfx/skia/skia/third_party/skcms/ |
H A D | skcms.cc | 433 static const uint32_t curve_bytes[] = { 4, 12, 16, 20, 28 }; in read_curve_para() local 434 if (size < SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]) { in read_curve_para() 439 *curve_size = SAFE_FIXED_SIZE(para_Layout) + curve_bytes[function_type]; in read_curve_para() 710 uint32_t curve_bytes; in read_curves() local 711 if (!read_curve(buf + curve_offset, size - curve_offset, &curves[i], &curve_bytes)) { in read_curves() 715 if (curve_bytes > UINT32_MAX - 3) { in read_curves() 718 curve_bytes = (curve_bytes + 3) & ~3U; in read_curves() 720 uint64_t new_offset_64 = (uint64_t)curve_offset + curve_bytes; in read_curves()
|
/dports/security/p5-CryptX/CryptX-0.075/t/ |
H A D | jwk.t | 146 curve_bytes => 32, 166 curve_bytes => 32,
|
/dports/security/p5-Crypt-PKCS10/Crypt-PKCS10-2.002/t/ |
H A D | 03_ecc.t | 100 'curve_bytes' => 32,
|
/dports/devel/premake5/premake-5.0.0-alpha16-src/contrib/mbedtls/library/ |
H A D | psa_crypto.c | 3796 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in psa_ecdsa_sign() local 3800 if( signature_size < 2 * curve_bytes ) in psa_ecdsa_sign() 3830 curve_bytes ) ); in psa_ecdsa_sign() 3832 signature + curve_bytes, in psa_ecdsa_sign() 3833 curve_bytes ) ); in psa_ecdsa_sign() 3839 *signature_length = 2 * curve_bytes; in psa_ecdsa_sign() 3851 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in psa_ecdsa_verify() local 3855 if( signature_length != 2 * curve_bytes ) in psa_ecdsa_verify() 3860 curve_bytes ) ); in psa_ecdsa_verify() 3862 signature + curve_bytes, in psa_ecdsa_verify() [all …]
|
/dports/biology/sra-tools/sra-tools-2.11.0/ncbi-vdb/libs/ext/mbedtls/ |
H A D | psa_crypto.c | 3796 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in psa_ecdsa_sign() local 3800 if( signature_size < 2 * curve_bytes ) in psa_ecdsa_sign() 3830 curve_bytes ) ); in psa_ecdsa_sign() 3832 signature + curve_bytes, in psa_ecdsa_sign() 3833 curve_bytes ) ); in psa_ecdsa_sign() 3839 *signature_length = 2 * curve_bytes; in psa_ecdsa_sign() 3851 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in psa_ecdsa_verify() local 3855 if( signature_length != 2 * curve_bytes ) in psa_ecdsa_verify() 3860 curve_bytes ) ); in psa_ecdsa_verify() 3862 signature + curve_bytes, in psa_ecdsa_verify() [all …]
|
/dports/biology/ncbi-vdb/ncbi-vdb-2.11.0/libs/ext/mbedtls/ |
H A D | psa_crypto.c | 3796 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in psa_ecdsa_sign() local 3800 if( signature_size < 2 * curve_bytes ) in psa_ecdsa_sign() 3830 curve_bytes ) ); in psa_ecdsa_sign() 3832 signature + curve_bytes, in psa_ecdsa_sign() 3833 curve_bytes ) ); in psa_ecdsa_sign() 3839 *signature_length = 2 * curve_bytes; in psa_ecdsa_sign() 3851 size_t curve_bytes = PSA_BITS_TO_BYTES( ecp->grp.pbits ); in psa_ecdsa_verify() local 3855 if( signature_length != 2 * curve_bytes ) in psa_ecdsa_verify() 3860 curve_bytes ) ); in psa_ecdsa_verify() 3862 signature + curve_bytes, in psa_ecdsa_verify() [all …]
|
/dports/security/py-sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/cng/ |
H A D | asymmetric.rs | 82 let curve_bytes = (curve_bits + 7) / 8; in sign() localVariable 83 let mut secret = Protected::from(vec![0u8; curve_bytes]); in sign() 84 let missing = curve_bytes.saturating_sub(scalar.value().len()); in sign()
|
/dports/security/sequoia/sequoia-383133f6be990237044900a4df676488bf8dd71e/openpgp/src/crypto/backend/cng/ |
H A D | asymmetric.rs | 82 let curve_bytes = (curve_bits + 7) / 8; in sign() localVariable 83 let mut secret = Protected::from(vec![0u8; curve_bytes]); in sign() 84 let missing = curve_bytes.saturating_sub(scalar.value().len()); in sign()
|
/dports/security/p5-CryptX/CryptX-0.075/inc/ |
H A D | CryptX_PK_ECC.xs.inc | 202 …not_used = hv_store(rv_hash, "curve_bytes", 11, newSViv(mp_unsigned_bin_size(sel…
|