Home
last modified time | relevance | path

Searched refs:pad (Results 1 – 24 of 24) sorted by relevance

/hostap-latest/src/crypto/
Daes-omac1.c16 static void gf_mulx(u8 *pad) in gf_mulx() argument
20 carry = pad[0] & 0x80; in gf_mulx()
22 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in gf_mulx()
23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx()
25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx()
47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; in omac1_aes_vector() local
89 os_memset(pad, 0, AES_BLOCK_SIZE); in omac1_aes_vector()
90 aes_encrypt(ctx, pad, pad); in omac1_aes_vector()
91 gf_mulx(pad); in omac1_aes_vector()
109 gf_mulx(pad); in omac1_aes_vector()
[all …]
Daes-siv.c20 static void dbl(u8 *pad) in dbl() argument
24 carry = pad[0] & 0x80; in dbl()
26 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in dbl()
27 pad[AES_BLOCK_SIZE - 1] <<= 1; in dbl()
29 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in dbl()
54 static void pad_block(u8 *pad, const u8 *addr, size_t len) in pad_block() argument
56 os_memset(pad, 0, AES_BLOCK_SIZE); in pad_block()
57 os_memcpy(pad, addr, len); in pad_block()
60 pad[len] = 0x80; in pad_block()
Dcrypto_internal-modexp.c19 size_t pubkey_len, pad; in crypto_dh_init() local
33 pad = prime_len - pubkey_len; in crypto_dh_init()
34 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init()
35 os_memset(pubkey, 0, pad); in crypto_dh_init()
Dcrypto_nettle.c310 size_t pubkey_len, pad; in crypto_dh_init() local
324 pad = prime_len - pubkey_len; in crypto_dh_init()
325 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init()
326 os_memset(pubkey, 0, pad); in crypto_dh_init()
Dcrypto_gnutls.c289 size_t pubkey_len, pad; in crypto_dh_init() local
303 pad = prime_len - pubkey_len; in crypto_dh_init()
304 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init()
305 os_memset(pubkey, 0, pad); in crypto_dh_init()
Dcrypto_libtomcrypt.c703 size_t pubkey_len, pad; in crypto_dh_init() local
717 pad = prime_len - pubkey_len; in crypto_dh_init()
718 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init()
719 os_memset(pubkey, 0, pad); in crypto_dh_init()
Dcrypto_openssl.c743 size_t pubkey_len, pad; in crypto_dh_init() local
757 pad = prime_len - pubkey_len; in crypto_dh_init()
758 os_memmove(pubkey + pad, pubkey, pubkey_len); in crypto_dh_init()
759 os_memset(pubkey, 0, pad); in crypto_dh_init()
/hostap-latest/src/tls/
Dtlsv1_record.c236 size_t pad; in tlsv1_record_send() local
237 pad = (len + 1) % rl->iv_size; in tlsv1_record_send()
238 if (pad) in tlsv1_record_send()
239 pad = rl->iv_size - pad; in tlsv1_record_send()
240 if (pos + pad + 1 > buf + buf_size) { in tlsv1_record_send()
245 os_memset(pos, pad, pad + 1); in tlsv1_record_send()
246 pos += pad + 1; in tlsv1_record_send()
Dpkcs5.c571 u8 *eb, pad; in pkcs5_decrypt() local
608 pad = eb[enc_data_len - 1]; in pkcs5_decrypt()
609 if (pad > 8) { in pkcs5_decrypt()
610 wpa_printf(MSG_INFO, "PKCS #5: Invalid PS octet 0x%x", pad); in pkcs5_decrypt()
614 for (i = enc_data_len - pad; i < enc_data_len; i++) { in pkcs5_decrypt()
615 if (eb[i] != pad) { in pkcs5_decrypt()
617 eb + enc_data_len - pad, pad); in pkcs5_decrypt()
624 eb, enc_data_len - pad); in pkcs5_decrypt()
626 *data_len = enc_data_len - pad; in pkcs5_decrypt()
/hostap-latest/src/eap_common/
Deap_eke_common.c406 size_t pad = dh->prime_len - len; in eap_eke_shared_secret() local
407 os_memmove(modexp + pad, modexp, len); in eap_eke_shared_secret()
408 os_memset(modexp, 0, pad); in eap_eke_shared_secret()
587 size_t block_size, icv_len, pad; in eap_eke_prot() local
602 pad = data_len % block_size; in eap_eke_prot()
603 if (pad) in eap_eke_prot()
604 pad = block_size - pad; in eap_eke_prot()
606 if (*prot_len < block_size + data_len + pad + icv_len) { in eap_eke_prot()
621 if (pad) { in eap_eke_prot()
622 if (random_get_bytes(pos, pad)) in eap_eke_prot()
[all …]
/hostap-latest/src/utils/
Dbase64.c94 int pad = 0; in base64_gen_decode() local
130 pad++; in base64_gen_decode()
138 if (pad) { in base64_gen_decode()
139 if (pad == 1) in base64_gen_decode()
141 else if (pad == 2) in base64_gen_decode()
Dradiotap.c239 int pad, align, size, subns; in ieee80211_radiotap_iterator_next() local
298 pad = ((unsigned long)iterator->_arg - in ieee80211_radiotap_iterator_next()
301 if (pad) in ieee80211_radiotap_iterator_next()
302 iterator->_arg += align - pad; in ieee80211_radiotap_iterator_next()
/hostap-latest/src/wps/
Dwps_common.c161 u8 pad; in wps_decrypt_encr_settings() local
187 pad = *pos; in wps_decrypt_encr_settings()
188 if (pad > wpabuf_len(decrypted)) { in wps_decrypt_encr_settings()
193 for (i = 0; i < pad; i++) { in wps_decrypt_encr_settings()
194 if (*pos-- != pad) { in wps_decrypt_encr_settings()
201 decrypted->used -= pad; in wps_decrypt_encr_settings()
/hostap-latest/src/eap_peer/
Deap_ttls.c735 size_t pad; in eap_ttls_phase2_request_pap() local
761 pad = password_len == 0 ? 16 : (16 - (password_len & 15)) & 15; in eap_ttls_phase2_request_pap()
763 password_len + pad); in eap_ttls_phase2_request_pap()
766 os_memset(pos, 0, pad); in eap_ttls_phase2_request_pap()
767 pos += pad; in eap_ttls_phase2_request_pap()
1059 size_t left, pad; in eap_ttls_parse_avps() local
1081 pad = (4 - (avp_length & 3)) & 3; in eap_ttls_parse_avps()
1082 pos += avp_length + pad; in eap_ttls_parse_avps()
1083 if (left < avp_length + pad) in eap_ttls_parse_avps()
1086 left -= avp_length + pad; in eap_ttls_parse_avps()
Dikev2.c33 u8 *buf, *pos, *pad, skeyseed[IKEV2_MAX_HASH_LEN]; in ikev2_derive_keys() local
79 pad = os_zalloc(pad_len ? pad_len : 1); in ikev2_derive_keys()
80 if (pad == NULL) { in ikev2_derive_keys()
86 addr[0] = pad; in ikev2_derive_keys()
94 os_free(pad); in ikev2_derive_keys()
97 os_free(pad); in ikev2_derive_keys()
/hostap-latest/src/eap_server/
Dikev2.c37 u8 *buf, *pos, *pad, skeyseed[IKEV2_MAX_HASH_LEN]; in ikev2_derive_keys() local
84 pad = os_zalloc(pad_len ? pad_len : 1); in ikev2_derive_keys()
85 if (pad == NULL) { in ikev2_derive_keys()
90 addr[0] = pad; in ikev2_derive_keys()
98 os_free(pad); in ikev2_derive_keys()
101 os_free(pad); in ikev2_derive_keys()
Deap_server_ttls.c191 size_t pad, dlen; in eap_ttls_avp_parse() local
317 pad = (4 - (avp_length & 3)) & 3; in eap_ttls_avp_parse()
318 pos += avp_length + pad; in eap_ttls_avp_parse()
319 left -= avp_length + pad; in eap_ttls_avp_parse()
/hostap-latest/src/common/
Dsae_pk.c255 int pad = 0; in sae_pk_base32_decode() local
291 pad++; in sae_pk_base32_decode()
303 if (pad) { in sae_pk_base32_decode()
306 pos -= pad * 5 / 8; in sae_pk_base32_decode()
/hostap-latest/tests/hwsim/
Dnetlink.py35 pad = ((length + 4 - 1) & ~3) - length
36 return hdr + self._data + b'\x00' * pad
Dtest_sae.py2006 ver, pad, length, present = struct.unpack('<BBHL', msg[0:8])
/hostap-latest/wlantest/
Dwlantest_cli.c1644 const char *pad) in print_cmd_help() argument
1651 fprintf(stream, "%s%s ", pad, cmd->cmd); in print_cmd_help()
1655 fprintf(stream, "%s", pad); in print_cmd_help()
/hostap-latest/hostapd/
Dhostapd_cli.c1893 const char *pad) in print_cmd_help() argument
1900 fprintf(stream, "%s%s ", pad, cmd->cmd); in print_cmd_help()
1904 fprintf(stream, "%s", pad); in print_cmd_help()
/hostap-latest/wpa_supplicant/
Dwpa_cli.c4108 static void print_cmd_help(const struct wpa_cli_cmd *cmd, const char *pad) in print_cmd_help() argument
4113 printf("%s%s ", pad, cmd->cmd); in print_cmd_help()
4117 printf("%s", pad); in print_cmd_help()
/hostap-latest/src/drivers/
Ddriver_ndis.c2335 u8 pad[2]; /* why is this needed? */ member