Home
last modified time | relevance | path

Searched refs:pad (Results 1 – 25 of 27) sorted by relevance

12

/hal_espressif-latest/components/wpa_supplicant/src/crypto/
Daes-omac1.c16 static void gf_mulx(u8 *pad) in gf_mulx() argument
20 carry = pad[0] & 0x80; in gf_mulx()
22 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in gf_mulx()
23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx()
25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx()
47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; in omac1_aes_vector() local
89 os_memset(pad, 0, AES_BLOCK_SIZE); in omac1_aes_vector()
90 aes_encrypt(ctx, pad, pad); in omac1_aes_vector()
91 gf_mulx(pad); in omac1_aes_vector()
109 gf_mulx(pad); in omac1_aes_vector()
[all …]
Daes-siv.c20 static void dbl(u8 *pad) in dbl() argument
24 carry = pad[0] & 0x80; in dbl()
26 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in dbl()
27 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl()
29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl()
54 static void pad_block(u8 *pad, const u8 *addr, size_t len) in pad_block() argument
56 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block()
57 os_memcpy(pad, addr, len); in pad_block()
60 pad[len] = 0x80; in pad_block()
Dcrypto_internal-modexp.c19 size_t pubkey_len, pad; in crypto_dh_init() local
33 pad = prime_len - pubkey_len; in crypto_dh_init()
34 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init()
35 os_memset(pubkey, 0, pad); in crypto_dh_init()
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/
Dburn-efuse-cmd.rst66 SPI_PAD_CONFIG_CLK Override SD_CLK pad (GPIO6/SPICLK) = 0 R/W (0x0)
67 SPI_PAD_CONFIG_Q Override SD_DATA_0 pad (GPIO7/SPIQ) = 0 R/W (0x0)
68 SPI_PAD_CONFIG_D Override SD_DATA_1 pad (GPIO8/SPID) = 0 R/W (0x0)
69 SPI_PAD_CONFIG_HD Override SD_DATA_2 pad (GPIO9/SPIHD) = 0 R/W (0x0)
70 SPI_PAD_CONFIG_CS0 Override SD_CMD pad (GPIO11/SPICS0) = 0 R/W (0x0)
77 …SPI_PAD_CONFIG_CLK (BLOCK1) SPI CLK pad = 0 R/…
78 …SPI_PAD_CONFIG_Q (BLOCK1) SPI Q (D1) pad = 0 R/…
79 …SPI_PAD_CONFIG_D (BLOCK1) SPI D (D0) pad = 0 R/…
80 …SPI_PAD_CONFIG_CS (BLOCK1) SPI CS pad = 0 R/…
81 …SPI_PAD_CONFIG_HD (BLOCK1) SPI HD (D3) pad = 0 R/…
[all …]
/hal_espressif-latest/components/wpa_supplicant/src/utils/
Dbase64.c89 int pad = 0; in base64_gen_decode() local
125 pad++; in base64_gen_decode()
133 if (pad) { in base64_gen_decode()
134 if (pad == 1) in base64_gen_decode()
136 else if (pad == 2) in base64_gen_decode()
/hal_espressif-latest/components/wpa_supplicant/src/tls/
Dtlsv1_record.c236 size_t pad; in tlsv1_record_send() local
237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send()
238 if (pad) in tlsv1_record_send()
239 pad = rl->iv_size - pad; in tlsv1_record_send()
240 if (pos + pad + 1 > buf + buf_size) { in tlsv1_record_send()
245 os_memset(pos, pad, pad + 1); in tlsv1_record_send()
246 pos += pad + 1; in tlsv1_record_send()
Dpkcs5.c571 u8 *eb, pad; in pkcs5_decrypt() local
608 pad = eb[enc_data_len - 1]; in pkcs5_decrypt()
609 if (pad > 8) { in pkcs5_decrypt()
610 wpa_printf(MSG_INFO, "PKCS #5: Invalid PS octet 0x%x", pad); in pkcs5_decrypt()
614 for (i = enc_data_len - pad; i < enc_data_len; i++) { in pkcs5_decrypt()
615 if (eb[i] != pad) { in pkcs5_decrypt()
617 eb + enc_data_len - pad, pad); in pkcs5_decrypt()
624 eb, enc_data_len - pad); in pkcs5_decrypt()
626 *data_len = enc_data_len - pad; in pkcs5_decrypt()
/hal_espressif-latest/components/esp_rom/linux/
Desp_rom_sys.c62 int left_prec, right_prec, zero_fill, pad, pad_on_right, in esp_rom_vprintf() local
211 pad = left_prec - length; in esp_rom_vprintf()
213 pad--; in esp_rom_vprintf()
226 while (pad-- > 0) { in esp_rom_vprintf()
241 while (pad-- > 0) { in esp_rom_vprintf()
/hal_espressif-latest/tools/esptool_py/docs/en/espefuse/inc/
Dsummary_ESP32.rst80 …SPI_PAD_CONFIG_CLK (BLOCK0): Override SD_CLK pad (GPIO6/SPICLK) …
81 …SPI_PAD_CONFIG_Q (BLOCK0): Override SD_DATA_0 pad (GPIO7/SPIQ) …
82 …SPI_PAD_CONFIG_D (BLOCK0): Override SD_DATA_1 pad (GPIO8/SPID) …
83 …SPI_PAD_CONFIG_CS0 (BLOCK0): Override SD_CMD pad (GPIO11/SPICS0) …
Dsummary_ESP32-C2.rst35 …DIS_PAD_JTAG (BLOCK0) Set this bit to disable pad jtag …
Dsummary_ESP32-C6.rst14 …SWAP_UART_SDIO_EN (BLOCK0) Represents whether pad of uart and sdio is swap…
/hal_espressif-latest/components/bt/esp_ble_mesh/mesh_core/
Dcrypto.c69 uint8_t pad = 0U; in bt_mesh_k2() local
85 pad = 0x01; in bt_mesh_k2()
91 sg[2].data = &pad; in bt_mesh_k2()
92 sg[2].len = sizeof(pad); in bt_mesh_k2()
103 pad = 0x02; in bt_mesh_k2()
112 pad = 0x03; in bt_mesh_k2()
/hal_espressif-latest/components/wpa_supplicant/src/wps/
Dwps_common.c167 u8 pad; in wps_decrypt_encr_settings() local
193 pad = *pos; in wps_decrypt_encr_settings()
194 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
199 for (i = 0; i < pad; i++) { in wps_decrypt_encr_settings()
200 if (*pos-- != pad) { in wps_decrypt_encr_settings()
207 decrypted->used -= pad; in wps_decrypt_encr_settings()
/hal_espressif-latest/components/wpa_supplicant/src/ap/
Dwpa_auth.h58 u8 pad[4]; /* 8-octet boundary for AES key wrap */ member
74 u8 pad[2]; /* 8-octet boundary for AES key wrap */ member
93 u8 pad[6]; /* 8-octet boundary for AES key wrap */ member
/hal_espressif-latest/components/efuse/esp32/
Desp_efuse_table.csv96 SPI_PAD_CONFIG_CLK, EFUSE_BLK0, 160, 5, [] Override SD_CLK pad (GPIO…
97 SPI_PAD_CONFIG_Q, EFUSE_BLK0, 165, 5, [] Override SD_DATA_0 pad (G…
98 SPI_PAD_CONFIG_D, EFUSE_BLK0, 170, 5, [] Override SD_DATA_1 pad (G…
99 SPI_PAD_CONFIG_CS0, EFUSE_BLK0, 175, 5, [] Override SD_CMD pad (GPIO…
/hal_espressif-latest/components/wpa_supplicant/src/common/
Dsae_pk.c270 int pad = 0; in sae_pk_base32_decode() local
312 pad++; in sae_pk_base32_decode()
325 if (pad) { in sae_pk_base32_decode()
328 pos -= pad * 5 / 8; in sae_pk_base32_decode()
/hal_espressif-latest/components/wpa_supplicant/src/eap_peer/
Deap_ttls.c610 size_t pad; in eap_ttls_phase2_request_pap() local
636 pad = password_len == 0 ? 16 : (16 - (password_len & 15)) & 15; in eap_ttls_phase2_request_pap()
638 password_len + pad); in eap_ttls_phase2_request_pap()
641 os_memset(pos, 0, pad); in eap_ttls_phase2_request_pap()
642 pos += pad; in eap_ttls_phase2_request_pap()
932 size_t left, pad; in eap_ttls_parse_avps() local
954 pad = (4 - (avp_length & 3)) & 3; in eap_ttls_parse_avps()
955 pos += avp_length + pad; in eap_ttls_parse_avps()
956 if (left < avp_length + pad) in eap_ttls_parse_avps()
959 left -= avp_length + pad; in eap_ttls_parse_avps()
/hal_espressif-latest/components/newlib/
Dheap.c112 int malloc_trim(size_t pad) in malloc_trim() argument
/hal_espressif-latest/components/wpa_supplicant/esp_supplicant/src/crypto/
Dcrypto_mbedtls.c940 size_t pubkey_len, pad; in crypto_dh_init() local
956 pad = prime_len - pubkey_len; in crypto_dh_init()
957 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init()
958 os_memset(pubkey, 0, pad); in crypto_dh_init()
/hal_espressif-latest/components/xtensa/include/xtensa/
Dxtruntime-frames.h136 STRUCT_AFIELD(long,4,UEXC_,pad, ALIGNPAD) /* 16-byte alignment padding */
/hal_espressif-latest/tools/esptool_py/esptool/
Dbin_image.py175 pad = addr - (self.addr + len(self.data))
176 if pad > 0:
177 self.data += b"\x00" * pad
/hal_espressif-latest/components/efuse/esp32c2/
Desp_efuse_table.csv63 …_JTAG, EFUSE_BLK0, 36, 1, [] Set this bit to disable pad jtag
/hal_espressif-latest/tools/esptool_py/espsecure/
D__init__.py1260 pad = 16 - len(block)
1261 block = block + os.urandom(pad)
1264 "(encrypted data must be multiple of 16 bytes long)" % pad
/hal_espressif-latest/tools/esptool_py/docs/en/esptool/
Dadvanced-options.rst128 …Some GPIO pins might be shared with other peripherals. Therefore, some SPI pad pin configurations …
/hal_espressif-latest/tools/esptool_py/
DCHANGELOG.md75 - ram_only_header: pad flash segment to next boundary

12