/hostap-latest/src/crypto/ |
D | aes-omac1.c | 16 static void gf_mulx(u8 *pad) in gf_mulx() argument 20 carry = pad[0] & 0x80; in gf_mulx() 22 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in gf_mulx() 23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx() 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; in omac1_aes_vector() local 89 os_memset(pad, 0, AES_BLOCK_SIZE); in omac1_aes_vector() 90 aes_encrypt(ctx, pad, pad); in omac1_aes_vector() 91 gf_mulx(pad); in omac1_aes_vector() 109 gf_mulx(pad); in omac1_aes_vector() [all …]
|
D | aes-siv.c | 20 static void dbl(u8 *pad) in dbl() argument 24 carry = pad[0] & 0x80; in dbl() 26 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in dbl() 27 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl() 29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl() 54 static void pad_block(u8 *pad, const u8 *addr, size_t len) in pad_block() argument 56 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block() 57 os_memcpy(pad, addr, len); in pad_block() 60 pad[len] = 0x80; in pad_block()
|
D | crypto_internal-modexp.c | 19 size_t pubkey_len, pad; in crypto_dh_init() local 33 pad = prime_len - pubkey_len; in crypto_dh_init() 34 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 35 os_memset(pubkey, 0, pad); in crypto_dh_init()
|
D | crypto_nettle.c | 310 size_t pubkey_len, pad; in crypto_dh_init() local 324 pad = prime_len - pubkey_len; in crypto_dh_init() 325 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 326 os_memset(pubkey, 0, pad); in crypto_dh_init()
|
D | crypto_gnutls.c | 289 size_t pubkey_len, pad; in crypto_dh_init() local 303 pad = prime_len - pubkey_len; in crypto_dh_init() 304 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 305 os_memset(pubkey, 0, pad); in crypto_dh_init()
|
D | crypto_libtomcrypt.c | 703 size_t pubkey_len, pad; in crypto_dh_init() local 717 pad = prime_len - pubkey_len; in crypto_dh_init() 718 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 719 os_memset(pubkey, 0, pad); in crypto_dh_init()
|
D | crypto_openssl.c | 743 size_t pubkey_len, pad; in crypto_dh_init() local 757 pad = prime_len - pubkey_len; in crypto_dh_init() 758 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init() 759 os_memset(pubkey, 0, pad); in crypto_dh_init()
|
/hostap-latest/src/tls/ |
D | tlsv1_record.c | 236 size_t pad; in tlsv1_record_send() local 237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 238 if (pad) in tlsv1_record_send() 239 pad = rl->iv_size - pad; in tlsv1_record_send() 240 if (pos + pad + 1 > buf + buf_size) { in tlsv1_record_send() 245 os_memset(pos, pad, pad + 1); in tlsv1_record_send() 246 pos += pad + 1; in tlsv1_record_send()
|
D | pkcs5.c | 571 u8 *eb, pad; in pkcs5_decrypt() local 608 pad = eb[enc_data_len - 1]; in pkcs5_decrypt() 609 if (pad > 8) { in pkcs5_decrypt() 610 wpa_printf(MSG_INFO, "PKCS #5: Invalid PS octet 0x%x", pad); in pkcs5_decrypt() 614 for (i = enc_data_len - pad; i < enc_data_len; i++) { in pkcs5_decrypt() 615 if (eb[i] != pad) { in pkcs5_decrypt() 617 eb + enc_data_len - pad, pad); in pkcs5_decrypt() 624 eb, enc_data_len - pad); in pkcs5_decrypt() 626 *data_len = enc_data_len - pad; in pkcs5_decrypt()
|
/hostap-latest/src/eap_common/ |
D | eap_eke_common.c | 406 size_t pad = dh->prime_len - len; in eap_eke_shared_secret() local 407 os_memmove(modexp + pad, modexp, len); in eap_eke_shared_secret() 408 os_memset(modexp, 0, pad); in eap_eke_shared_secret() 587 size_t block_size, icv_len, pad; in eap_eke_prot() local 602 pad = data_len % block_size; in eap_eke_prot() 603 if (pad) in eap_eke_prot() 604 pad = block_size - pad; in eap_eke_prot() 606 if (*prot_len < block_size + data_len + pad + icv_len) { in eap_eke_prot() 621 if (pad) { in eap_eke_prot() 622 if (random_get_bytes(pos, pad)) in eap_eke_prot() [all …]
|
/hostap-latest/src/utils/ |
D | base64.c | 94 int pad = 0; in base64_gen_decode() local 130 pad++; in base64_gen_decode() 138 if (pad) { in base64_gen_decode() 139 if (pad == 1) in base64_gen_decode() 141 else if (pad == 2) in base64_gen_decode()
|
D | radiotap.c | 239 int pad, align, size, subns; in ieee80211_radiotap_iterator_next() local 298 pad = ((unsigned long)iterator->_arg - in ieee80211_radiotap_iterator_next() 301 if (pad) in ieee80211_radiotap_iterator_next() 302 iterator->_arg += align - pad; in ieee80211_radiotap_iterator_next()
|
/hostap-latest/src/wps/ |
D | wps_common.c | 161 u8 pad; in wps_decrypt_encr_settings() local 187 pad = *pos; in wps_decrypt_encr_settings() 188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings() 193 for (i = 0; i < pad; i++) { in wps_decrypt_encr_settings() 194 if (*pos-- != pad) { in wps_decrypt_encr_settings() 201 decrypted->used -= pad; in wps_decrypt_encr_settings()
|
/hostap-latest/src/eap_peer/ |
D | eap_ttls.c | 735 size_t pad; in eap_ttls_phase2_request_pap() local 761 pad = password_len == 0 ? 16 : (16 - (password_len & 15)) & 15; in eap_ttls_phase2_request_pap() 763 password_len + pad); in eap_ttls_phase2_request_pap() 766 os_memset(pos, 0, pad); in eap_ttls_phase2_request_pap() 767 pos += pad; in eap_ttls_phase2_request_pap() 1059 size_t left, pad; in eap_ttls_parse_avps() local 1081 pad = (4 - (avp_length & 3)) & 3; in eap_ttls_parse_avps() 1082 pos += avp_length + pad; in eap_ttls_parse_avps() 1083 if (left < avp_length + pad) in eap_ttls_parse_avps() 1086 left -= avp_length + pad; in eap_ttls_parse_avps()
|
D | ikev2.c | 33 u8 *buf, *pos, *pad, skeyseed[IKEV2_MAX_HASH_LEN]; in ikev2_derive_keys() local 79 pad = os_zalloc(pad_len ? pad_len : 1); in ikev2_derive_keys() 80 if (pad == NULL) { in ikev2_derive_keys() 86 addr[0] = pad; in ikev2_derive_keys() 94 os_free(pad); in ikev2_derive_keys() 97 os_free(pad); in ikev2_derive_keys()
|
/hostap-latest/src/eap_server/ |
D | ikev2.c | 37 u8 *buf, *pos, *pad, skeyseed[IKEV2_MAX_HASH_LEN]; in ikev2_derive_keys() local 84 pad = os_zalloc(pad_len ? pad_len : 1); in ikev2_derive_keys() 85 if (pad == NULL) { in ikev2_derive_keys() 90 addr[0] = pad; in ikev2_derive_keys() 98 os_free(pad); in ikev2_derive_keys() 101 os_free(pad); in ikev2_derive_keys()
|
D | eap_server_ttls.c | 191 size_t pad, dlen; in eap_ttls_avp_parse() local 317 pad = (4 - (avp_length & 3)) & 3; in eap_ttls_avp_parse() 318 pos += avp_length + pad; in eap_ttls_avp_parse() 319 left -= avp_length + pad; in eap_ttls_avp_parse()
|
/hostap-latest/src/common/ |
D | sae_pk.c | 255 int pad = 0; in sae_pk_base32_decode() local 291 pad++; in sae_pk_base32_decode() 303 if (pad) { in sae_pk_base32_decode() 306 pos -= pad * 5 / 8; in sae_pk_base32_decode()
|
/hostap-latest/tests/hwsim/ |
D | netlink.py | 35 pad = ((length + 4 - 1) & ~3) - length 36 return hdr + self._data + b'\x00' * pad
|
D | test_sae.py | 2006 ver, pad, length, present = struct.unpack('<BBHL', msg[0:8])
|
/hostap-latest/wlantest/ |
D | wlantest_cli.c | 1644 const char *pad) in print_cmd_help() argument 1651 fprintf(stream, "%s%s ", pad, cmd->cmd); in print_cmd_help() 1655 fprintf(stream, "%s", pad); in print_cmd_help()
|
/hostap-latest/hostapd/ |
D | hostapd_cli.c | 1893 const char *pad) in print_cmd_help() argument 1900 fprintf(stream, "%s%s ", pad, cmd->cmd); in print_cmd_help() 1904 fprintf(stream, "%s", pad); in print_cmd_help()
|
/hostap-latest/wpa_supplicant/ |
D | wpa_cli.c | 4108 static void print_cmd_help(const struct wpa_cli_cmd *cmd, const char *pad) in print_cmd_help() argument 4113 printf("%s%s ", pad, cmd->cmd); in print_cmd_help() 4117 printf("%s", pad); in print_cmd_help()
|
/hostap-latest/src/drivers/ |
D | driver_ndis.c | 2335 u8 pad[2]; /* why is this needed? */ member
|