/external/dropbear/libtomcrypt/src/modes/cfb/ |
cfb_decrypt.c | 40 /* is blocklen/padlen valid? */ 42 cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) { 47 if (cfb->padlen == cfb->blocklen) { 51 cfb->padlen = 0; 53 cfb->pad[cfb->padlen] = *ct; 54 *pt = *ct ^ cfb->IV[cfb->padlen]; 57 ++(cfb->padlen);
|
cfb_encrypt.c | 40 /* is blocklen/padlen valid? */ 42 cfb->padlen < 0 || cfb->padlen > (int)sizeof(cfb->pad)) { 47 if (cfb->padlen == cfb->blocklen) { 51 cfb->padlen = 0; 53 cfb->pad[cfb->padlen] = (*ct = *pt ^ cfb->IV[cfb->padlen]); 56 ++(cfb->padlen);
|
cfb_setiv.c | 43 cfb->padlen = 0;
|
cfb_start.c | 57 cfb->padlen = 0;
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_encrypt.c | 38 /* is blocklen/padlen valid? */ 40 ofb->padlen < 0 || ofb->padlen > (int)sizeof(ofb->IV)) { 45 if (ofb->padlen == ofb->blocklen) { 49 ofb->padlen = 0; 51 *ct++ = *pt++ ^ ofb->IV[(ofb->padlen)++];
|
ofb_setiv.c | 43 ofb->padlen = 0;
|
ofb_start.c | 52 ofb->padlen = ofb->blocklen;
|
/external/dropbear/libtomcrypt/src/modes/ctr/ |
ctr_encrypt.c | 41 /* is blocklen/padlen valid? */ 43 ctr->padlen < 0 || ctr->padlen > (int)sizeof(ctr->pad)) { 54 if ((ctr->padlen == ctr->blocklen) && cipher_descriptor[ctr->cipher].accel_ctr_encrypt != NULL && (len >= (unsigned long)ctr->blocklen)) { 63 if (ctr->padlen == ctr->blocklen) { 87 ctr->padlen = 0; 90 if (ctr->padlen == 0 && len >= (unsigned long)ctr->blocklen) { 98 ctr->padlen = ctr->blocklen; 102 *ct++ = *pt++ ^ ctr->pad[ctr->padlen++];
|
ctr_setiv.c | 47 ctr->padlen = 0;
|
ctr_start.c | 57 ctr->padlen = 0;
|
/external/dropbear/libtomcrypt/src/modes/f8/ |
f8_encrypt.c | 39 /* is blocklen/padlen valid? */ 41 f8->padlen < 0 || f8->padlen > (int)sizeof(f8->IV)) { 48 if (f8->padlen == f8->blocklen) { 58 f8->padlen = 0; 62 if (f8->padlen == 0) { 81 if (f8->padlen == f8->blocklen) { 91 f8->padlen = 0; 93 *ct++ = *pt++ ^ f8->IV[f8->padlen++];
|
f8_setiv.c | 43 f8->padlen = 0;
|
f8_start.c | 60 f8->padlen = f8->blocklen;
|
/external/clearsilver/util/ |
snprintf.c | 405 int padlen, strln; /* amount to pad */ local 417 padlen = min - strln; 418 if (padlen < 0) 419 padlen = 0; 421 padlen = -padlen; /* Left Justify */ 423 while (padlen > 0) 426 --padlen; 433 while (padlen < 0) 436 ++padlen; 580 int padlen = 0; \/* amount to pad *\/ local [all...] |
/external/openssl/crypto/bio/ |
b_print.c | 443 int padlen, strln; local 450 padlen = min - strln; 451 if (padlen < 0) 452 padlen = 0; 454 padlen = -padlen; 456 while ((padlen > 0) && (cnt < max)) { 458 --padlen; 465 while ((padlen < 0) && (cnt < max)) { 467 ++padlen; 617 int padlen = 0; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
tlsv1_record.c | 250 u8 padlen; local 331 padlen = out_data[in_len - 1]; 332 if (padlen >= in_len) { 336 padlen, (unsigned long) in_len); 340 for (i = in_len - padlen; i < in_len; i++) { 341 if (out_data[i] != padlen) { 345 out_data + in_len - padlen, 346 padlen); 352 *out_len -= padlen + 1;
|
/external/dropbear/ |
packet.c | 231 unsigned int padlen; local 279 padlen = buf_getbyte(ses.decryptreadbuf); 282 /* - 4 - 1 is for LEN and PADLEN values */ 283 len = ses.decryptreadbuf->len - padlen - 4 - 1; 412 unsigned char padlen; local 454 padlen = blocksize - (clearwritebuf->len) % blocksize; 455 if (padlen < 4) { 456 padlen += blocksize; 459 if (clearwritebuf->len + padlen < MIN_PACKET_LEN) { 460 padlen += blocksize 472 genrandom(buf_getptr(clearwritebuf, padlen), padlen); local [all...] |
/external/wpa_supplicant/ |
tlsv1_common.c | 394 u8 padlen; local 474 padlen = out_data[in_len - 1]; 475 if (padlen >= in_len) { 479 padlen, (unsigned long) in_len); 483 for (i = in_len - padlen; i < in_len; i++) { 484 if (out_data[i] != padlen) { 488 out_data + in_len - padlen, 489 padlen); 495 *out_len -= padlen + 1;
|
md4.c | 156 size_t padlen; local 162 padlen = MD4_BLOCK_LENGTH - 164 if (padlen < 1 + 8) 165 padlen += MD4_BLOCK_LENGTH; 166 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */
|
radius.c | 1047 int padlen, i; local 1059 padlen = data_len % 16; 1060 if (padlen) { 1061 padlen = 16 - padlen; 1062 os_memset(buf + data_len, 0, padlen); 1063 buf_len += padlen;
|
/external/tcpdump/ |
print-ip6.c | 181 int enh, padlen; local 182 advance = esp_print(gndo, cp, len, (const u_char *)ip6, &enh, &padlen); 184 len -= padlen;
|
print-esp.c | 339 int *padlen 492 if (padlen) 493 *padlen = *(ep - 2) + 2;
|
print-decnet.c | 99 u_int padlen = mflags & RMF_PADMASK; local 101 (void) printf("[pad:%d] ", padlen); 102 if (length < padlen + 2) { 106 TCHECK2(ap[sizeof(short)], padlen); 107 ap += padlen; 108 length -= padlen; 109 caplen -= padlen;
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
md4.c | 156 size_t padlen; local 162 padlen = MD4_BLOCK_LENGTH - 164 if (padlen < 1 + 8) 165 padlen += MD4_BLOCK_LENGTH; 166 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */
|
/external/wpa_supplicant_6/wpa_supplicant/src/radius/ |
radius.c | 1051 int padlen, i; local 1063 padlen = data_len % 16; 1064 if (padlen) { 1065 padlen = 16 - padlen; 1066 os_memset(buf + data_len, 0, padlen); 1067 buf_len += padlen;
|