HomeSort by relevance Sort by last modified time
    Searched refs:padlen (Results 1 - 25 of 32) sorted by null

1 2

  /external/dropbear/libtomcrypt/src/modes/cfb/
cfb_decrypt.c 40 /* is blocklen/padlen valid? */
42 cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) {
47 if (cfb->padlen == cfb->blocklen) {
51 cfb->padlen = 0;
53 cfb->pad[cfb->padlen] = *ct;
54 *pt = *ct ^ cfb->IV[cfb->padlen];
57 ++(cfb->padlen);
cfb_encrypt.c 40 /* is blocklen/padlen valid? */
42 cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) {
47 if (cfb->padlen == cfb->blocklen) {
51 cfb->padlen = 0;
53 cfb->pad[cfb->padlen] = (*ct = *pt ^ cfb->IV[cfb->padlen]);
56 ++(cfb->padlen);
cfb_setiv.c 43 cfb->padlen = 0;
cfb_start.c 57 cfb->padlen = 0;
  /external/dropbear/libtomcrypt/src/modes/ofb/
ofb_encrypt.c 38 /* is blocklen/padlen valid? */
40 ofb->padlen < 0 || ofb->padlen > (int)sizeof(ofb->IV)) {
45 if (ofb->padlen == ofb->blocklen) {
49 ofb->padlen = 0;
51 *ct++ = *pt++ ^ ofb->IV[(ofb->padlen)++];
ofb_setiv.c 43 ofb->padlen = 0;
ofb_start.c 52 ofb->padlen = ofb->blocklen;
  /external/dropbear/libtomcrypt/src/modes/ctr/
ctr_encrypt.c 41 /* is blocklen/padlen valid? */
43 ctr->padlen < 0 || ctr->padlen > (int)sizeof(ctr->pad)) {
54 if ((ctr->padlen == ctr->blocklen) && cipher_descriptor[ctr->cipher].accel_ctr_encrypt != NULL && (len >= (unsigned long)ctr->blocklen)) {
63 if (ctr->padlen == ctr->blocklen) {
87 ctr->padlen = 0;
90 if (ctr->padlen == 0 && len >= (unsigned long)ctr->blocklen) {
98 ctr->padlen = ctr->blocklen;
102 *ct++ = *pt++ ^ ctr->pad[ctr->padlen++];
ctr_setiv.c 47 ctr->padlen = 0;
ctr_start.c 57 ctr->padlen = 0;
  /external/dropbear/libtomcrypt/src/modes/f8/
f8_encrypt.c 39 /* is blocklen/padlen valid? */
41 f8->padlen < 0 || f8->padlen > (int)sizeof(f8->IV)) {
48 if (f8->padlen == f8->blocklen) {
58 f8->padlen = 0;
62 if (f8->padlen == 0) {
81 if (f8->padlen == f8->blocklen) {
91 f8->padlen = 0;
93 *ct++ = *pt++ ^ f8->IV[f8->padlen++];
f8_setiv.c 43 f8->padlen = 0;
f8_start.c 60 f8->padlen = f8->blocklen;
  /external/clearsilver/util/
snprintf.c 405 int padlen, strln; /* amount to pad */ local
417 padlen = min - strln;
418 if (padlen < 0)
419 padlen = 0;
421 padlen = -padlen; /* Left Justify */
423 while (padlen > 0)
426 --padlen;
433 while (padlen < 0)
436 ++padlen;
580 int padlen = 0; \/* amount to pad *\/ local
    [all...]
  /external/openssl/crypto/bio/
b_print.c 443 int padlen, strln; local
450 padlen = min - strln;
451 if (padlen < 0)
452 padlen = 0;
454 padlen = -padlen;
456 while ((padlen > 0) && (cnt < max)) {
458 --padlen;
465 while ((padlen < 0) && (cnt < max)) {
467 ++padlen;
617 int padlen = 0; local
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_record.c 250 u8 padlen; local
331 padlen = out_data[in_len - 1];
332 if (padlen >= in_len) {
336 padlen, (unsigned long) in_len);
340 for (i = in_len - padlen; i < in_len; i++) {
341 if (out_data[i] != padlen) {
345 out_data + in_len - padlen,
346 padlen);
352 *out_len -= padlen + 1;
  /external/dropbear/
packet.c 231 unsigned int padlen; local
279 padlen = buf_getbyte(ses.decryptreadbuf);
282 /* - 4 - 1 is for LEN and PADLEN values */
283 len = ses.decryptreadbuf->len - padlen - 4 - 1;
412 unsigned char padlen; local
454 padlen = blocksize - (clearwritebuf->len) % blocksize;
455 if (padlen < 4) {
456 padlen += blocksize;
459 if (clearwritebuf->len + padlen < MIN_PACKET_LEN) {
460 padlen += blocksize
472 genrandom(buf_getptr(clearwritebuf, padlen), padlen); local
    [all...]
  /external/wpa_supplicant/
tlsv1_common.c 394 u8 padlen; local
474 padlen = out_data[in_len - 1];
475 if (padlen >= in_len) {
479 padlen, (unsigned long) in_len);
483 for (i = in_len - padlen; i < in_len; i++) {
484 if (out_data[i] != padlen) {
488 out_data + in_len - padlen,
489 padlen);
495 *out_len -= padlen + 1;
md4.c 156 size_t padlen; local
162 padlen = MD4_BLOCK_LENGTH -
164 if (padlen < 1 + 8)
165 padlen += MD4_BLOCK_LENGTH;
166 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */
radius.c 1047 int padlen, i; local
1059 padlen = data_len % 16;
1060 if (padlen) {
1061 padlen = 16 - padlen;
1062 os_memset(buf + data_len, 0, padlen);
1063 buf_len += padlen;
  /external/tcpdump/
print-ip6.c 181 int enh, padlen; local
182 advance = esp_print(gndo, cp, len, (const u_char *)ip6, &enh, &padlen);
184 len -= padlen;
print-esp.c 339 int *padlen
492 if (padlen)
493 *padlen = *(ep - 2) + 2;
print-decnet.c 99 u_int padlen = mflags & RMF_PADMASK; local
101 (void) printf("[pad:%d] ", padlen);
102 if (length < padlen + 2) {
106 TCHECK2(ap[sizeof(short)], padlen);
107 ap += padlen;
108 length -= padlen;
109 caplen -= padlen;
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
md4.c 156 size_t padlen; local
162 padlen = MD4_BLOCK_LENGTH -
164 if (padlen < 1 + 8)
165 padlen += MD4_BLOCK_LENGTH;
166 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */
  /prebuilt/linux-x86/toolchain/i686-linux-glibc2.7-4.4.3/sysroot/usr/include/linux/
ip.h 132 __u8 padlen; member in struct:ip_beet_phdr

Completed in 646 milliseconds

1 2