/hal_espressif-latest/components/wpa_supplicant/src/crypto/ |
D | aes-omac1.c | 16 static void gf_mulx(u8 *pad) in gf_mulx() argument 20 carry = pad[0] & 0x80; in gf_mulx() 22 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in gf_mulx() 23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx() 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; in omac1_aes_vector() local 89 os_memset(pad, 0, AES_BLOCK_SIZE); in omac1_aes_vector() 90 aes_encrypt(ctx, pad, pad); in omac1_aes_vector() 91 gf_mulx(pad); in omac1_aes_vector() 109 gf_mulx(pad); in omac1_aes_vector() [all …]
|
D | aes-siv.c | 20 static void dbl(u8 *pad) in dbl() argument 24 carry = pad[0] & 0x80; in dbl() 26 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in dbl() 27 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 54 static void pad_block(u8 *pad, const u8 *addr, size_t len) in pad_block() argument 56 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 57 os_memcpy(pad, addr, len); in pad_block() 60 pad[len] = 0x80; in pad_block()
|
D | crypto_internal-modexp.c | 19 size_t pubkey_len, pad; in crypto_dh_init() local 33 pad = prime_len - pubkey_len; in crypto_dh_init() 34 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 35 os_memset(pubkey, 0, pad); in crypto_dh_init()
|
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/ |
D | burn-efuse-cmd.rst | 66 SPI_PAD_CONFIG_CLK Override SD_CLK pad (GPIO6/SPICLK) = 0 R/W (0x0) 67 SPI_PAD_CONFIG_Q Override SD_DATA_0 pad (GPIO7/SPIQ) = 0 R/W (0x0) 68 SPI_PAD_CONFIG_D Override SD_DATA_1 pad (GPIO8/SPID) = 0 R/W (0x0) 69 SPI_PAD_CONFIG_HD Override SD_DATA_2 pad (GPIO9/SPIHD) = 0 R/W (0x0) 70 SPI_PAD_CONFIG_CS0 Override SD_CMD pad (GPIO11/SPICS0) = 0 R/W (0x0) 77 …SPI_PAD_CONFIG_CLK (BLOCK1) SPI CLK pad = 0 R/… 78 …SPI_PAD_CONFIG_Q (BLOCK1) SPI Q (D1) pad = 0 R/… 79 …SPI_PAD_CONFIG_D (BLOCK1) SPI D (D0) pad = 0 R/… 80 …SPI_PAD_CONFIG_CS (BLOCK1) SPI CS pad = 0 R/… 81 …SPI_PAD_CONFIG_HD (BLOCK1) SPI HD (D3) pad = 0 R/… [all …]
|
/hal_espressif-latest/components/wpa_supplicant/src/utils/ |
D | base64.c | 89 int pad = 0; in base64_gen_decode() local 125 pad++; in base64_gen_decode() 133 if (pad) { in base64_gen_decode() 134 if (pad == 1) in base64_gen_decode() 136 else if (pad == 2) in base64_gen_decode()
|
/hal_espressif-latest/components/wpa_supplicant/src/tls/ |
D | tlsv1_record.c | 236 size_t pad; in tlsv1_record_send() local 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 238 if (pad) in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 240 if (pos + pad + 1 > buf + buf_size) { in tlsv1_record_send() 245 os_memset(pos, pad, pad + 1); in tlsv1_record_send() 246 pos += pad + 1; in tlsv1_record_send()
|
D | pkcs5.c | 571 u8 *eb, pad; in pkcs5_decrypt() local 608 pad = eb[enc_data_len - 1]; in pkcs5_decrypt() 609 if (pad > 8) { in pkcs5_decrypt() 610 wpa_printf(MSG_INFO, "PKCS #5: Invalid PS octet 0x%x", pad); in pkcs5_decrypt() 614 for (i = enc_data_len - pad; i < enc_data_len; i++) { in pkcs5_decrypt() 615 if (eb[i] != pad) { in pkcs5_decrypt() 617 eb + enc_data_len - pad, pad); in pkcs5_decrypt() 624 eb, enc_data_len - pad); in pkcs5_decrypt() 626 *data_len = enc_data_len - pad; in pkcs5_decrypt()
|
/hal_espressif-latest/components/esp_rom/linux/ |
D | esp_rom_sys.c | 62 int left_prec, right_prec, zero_fill, pad, pad_on_right, in esp_rom_vprintf() local 211 pad = left_prec - length; in esp_rom_vprintf() 213 pad--; in esp_rom_vprintf() 226 while (pad-- > 0) { in esp_rom_vprintf() 241 while (pad-- > 0) { in esp_rom_vprintf()
|
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/inc/ |
D | summary_ESP32.rst | 80 …SPI_PAD_CONFIG_CLK (BLOCK0): Override SD_CLK pad (GPIO6/SPICLK) … 81 …SPI_PAD_CONFIG_Q (BLOCK0): Override SD_DATA_0 pad (GPIO7/SPIQ) … 82 …SPI_PAD_CONFIG_D (BLOCK0): Override SD_DATA_1 pad (GPIO8/SPID) … 83 …SPI_PAD_CONFIG_CS0 (BLOCK0): Override SD_CMD pad (GPIO11/SPICS0) …
|
D | summary_ESP32-C2.rst | 35 …DIS_PAD_JTAG (BLOCK0) Set this bit to disable pad jtag …
|
D | summary_ESP32-C6.rst | 14 …SWAP_UART_SDIO_EN (BLOCK0) Represents whether pad of uart and sdio is swap…
|
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/ |
D | crypto.c | 69 uint8_t pad = 0U; in bt_mesh_k2() local 85 pad = 0x01; in bt_mesh_k2() 91 sg[2].data = &pad; in bt_mesh_k2() 92 sg[2].len = sizeof(pad); in bt_mesh_k2() 103 pad = 0x02; in bt_mesh_k2() 112 pad = 0x03; in bt_mesh_k2()
|
/hal_espressif-latest/components/wpa_supplicant/src/wps/ |
D | wps_common.c | 167 u8 pad; in wps_decrypt_encr_settings() local 193 pad = *pos; in wps_decrypt_encr_settings() 194 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings() 199 for (i = 0; i < pad; i++) { in wps_decrypt_encr_settings() 200 if (*pos-- != pad) { in wps_decrypt_encr_settings() 207 decrypted->used -= pad; in wps_decrypt_encr_settings()
|
/hal_espressif-latest/components/wpa_supplicant/src/ap/ |
D | wpa_auth.h | 58 u8 pad[4]; /* 8-octet boundary for AES key wrap */ member 74 u8 pad[2]; /* 8-octet boundary for AES key wrap */ member 93 u8 pad[6]; /* 8-octet boundary for AES key wrap */ member
|
/hal_espressif-latest/components/efuse/esp32/ |
D | esp_efuse_table.csv | 96 SPI_PAD_CONFIG_CLK, EFUSE_BLK0, 160, 5, [] Override SD_CLK pad (GPIO… 97 SPI_PAD_CONFIG_Q, EFUSE_BLK0, 165, 5, [] Override SD_DATA_0 pad (G… 98 SPI_PAD_CONFIG_D, EFUSE_BLK0, 170, 5, [] Override SD_DATA_1 pad (G… 99 SPI_PAD_CONFIG_CS0, EFUSE_BLK0, 175, 5, [] Override SD_CMD pad (GPIO…
|
/hal_espressif-latest/components/wpa_supplicant/src/common/ |
D | sae_pk.c | 270 int pad = 0; in sae_pk_base32_decode() local 312 pad++; in sae_pk_base32_decode() 325 if (pad) { in sae_pk_base32_decode() 328 pos -= pad * 5 / 8; in sae_pk_base32_decode()
|
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/ |
D | eap_ttls.c | 610 size_t pad; in eap_ttls_phase2_request_pap() local 636 pad = password_len == 0 ? 16 : (16 - (password_len & 15)) & 15; in eap_ttls_phase2_request_pap() 638 password_len + pad); in eap_ttls_phase2_request_pap() 641 os_memset(pos, 0, pad); in eap_ttls_phase2_request_pap() 642 pos += pad; in eap_ttls_phase2_request_pap() 932 size_t left, pad; in eap_ttls_parse_avps() local 954 pad = (4 - (avp_length & 3)) & 3; in eap_ttls_parse_avps() 955 pos += avp_length + pad; in eap_ttls_parse_avps() 956 if (left < avp_length + pad) in eap_ttls_parse_avps() 959 left -= avp_length + pad; in eap_ttls_parse_avps()
|
/hal_espressif-latest/components/newlib/ |
D | heap.c | 112 int malloc_trim(size_t pad) in malloc_trim() argument
|
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/ |
D | crypto_mbedtls.c | 940 size_t pubkey_len, pad; in crypto_dh_init() local 956 pad = prime_len - pubkey_len; in crypto_dh_init() 957 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 958 os_memset(pubkey, 0, pad); in crypto_dh_init()
|
/hal_espressif-latest/components/xtensa/include/xtensa/ |
D | xtruntime-frames.h | 136 STRUCT_AFIELD(long,4,UEXC_,pad, ALIGNPAD) /* 16-byte alignment padding */
|
/hal_espressif-latest/tools/esptool_py/esptool/ |
D | bin_image.py | 175 pad = addr - (self.addr + len(self.data)) 176 if pad > 0: 177 self.data += b"\x00" * pad
|
/hal_espressif-latest/components/efuse/esp32c2/ |
D | esp_efuse_table.csv | 63 …_JTAG, EFUSE_BLK0, 36, 1, [] Set this bit to disable pad jtag
|
/hal_espressif-latest/tools/esptool_py/espsecure/ |
D | __init__.py | 1260 pad = 16 - len(block) 1261 block = block + os.urandom(pad) 1264 "(encrypted data must be multiple of 16 bytes long)" % pad
|
/hal_espressif-latest/tools/esptool_py/docs/en/esptool/ |
D | advanced-options.rst | 128 …Some GPIO pins might be shared with other peripherals. Therefore, some SPI pad pin configurations …
|
/hal_espressif-latest/tools/esptool_py/ |
D | CHANGELOG.md | 75 - ram_only_header: pad flash segment to next boundary
|