/dragonfly/lib/libc/net/ |
H A D | ip6opt.c | 99 int padlen, optlen, off; in inet6_option_append() local 122 padlen += plusy; in inet6_option_append() 127 bp += padlen; in inet6_option_append() 142 bp += padlen; in inet6_option_append() 167 int padlen, off; in inet6_option_alloc() local 191 padlen += plusy; in inet6_option_alloc() 196 bp += padlen; in inet6_option_alloc() 207 bp += padlen; in inet6_option_alloc() 425 currentlen += padlen; in inet6_opt_append() 433 if (padlen == 1) { in inet6_opt_append() [all …]
|
/dragonfly/contrib/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 283 u8 padlen; in tlsv1_record_receive() local 398 padlen = out_data[plen - 1]; in tlsv1_record_receive() 399 if (padlen >= plen) { in tlsv1_record_receive() 403 padlen, (unsigned long) plen); in tlsv1_record_receive() 407 for (i = plen - padlen - 1; i < plen - 1; i++) { in tlsv1_record_receive() 408 if (out_data[i] != padlen) { in tlsv1_record_receive() 412 out_data + plen - padlen - in tlsv1_record_receive() 413 1, padlen + 1); in tlsv1_record_receive() 419 plen -= padlen + 1; in tlsv1_record_receive()
|
/dragonfly/sys/crypto/ |
H A D | sha1.c | 186 size_t padlen; /*pad length in bytes*/ in sha1_pad() local 192 padlen = 64 - padstart; in sha1_pad() 193 if (padlen < 8) { in sha1_pad() 194 bzero(&ctxt->m.b8[padstart], padlen); in sha1_pad() 195 COUNT += padlen; in sha1_pad() 199 padlen = 64 - padstart; /* should be 64 */ in sha1_pad() 201 bzero(&ctxt->m.b8[padstart], padlen - 8); in sha1_pad() 202 COUNT += (padlen - 8); in sha1_pad()
|
/dragonfly/contrib/wpa_supplicant/src/crypto/ |
H A D | md4-internal.c | 151 size_t padlen; in MD4Pad() local 157 padlen = MD4_BLOCK_LENGTH - in MD4Pad() 159 if (padlen < 1 + 8) in MD4Pad() 160 padlen += MD4_BLOCK_LENGTH; in MD4Pad() 161 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */ in MD4Pad()
|
H A D | crypto_openssl.c | 1296 u8 *buf, size_t buflen, size_t padlen) in crypto_bignum_to_bin() argument 1303 if (padlen > buflen) in crypto_bignum_to_bin() 1306 if (padlen) { in crypto_bignum_to_bin() 1308 if (BN_bn2bin_padded(buf, padlen, (const BIGNUM *) a) == 0) in crypto_bignum_to_bin() 1310 return padlen; in crypto_bignum_to_bin() 1313 return BN_bn2binpad((const BIGNUM *) a, buf, padlen); in crypto_bignum_to_bin() 1321 if (padlen > (size_t) num_bytes) in crypto_bignum_to_bin() 1322 offset = padlen - num_bytes; in crypto_bignum_to_bin()
|
H A D | crypto_wolfssl.c | 1058 u8 *buf, size_t buflen, size_t padlen) in crypto_bignum_to_bin() argument 1065 if (padlen > buflen) in crypto_bignum_to_bin() 1071 if (padlen > (size_t) num_bytes) in crypto_bignum_to_bin() 1072 offset = padlen - num_bytes; in crypto_bignum_to_bin()
|
H A D | crypto.h | 537 u8 *buf, size_t buflen, size_t padlen);
|
/dragonfly/sys/dev/crypto/ubsec/ |
H A D | ubsec.c | 2538 u_int padlen, msglen; in ubsec_kprocess_rsapriv() local 2542 if (msglen > padlen) in ubsec_kprocess_rsapriv() 2543 padlen = msglen; in ubsec_kprocess_rsapriv() 2545 if (padlen <= 256) in ubsec_kprocess_rsapriv() 2546 padlen = 256; in ubsec_kprocess_rsapriv() 2547 else if (padlen <= 384) in ubsec_kprocess_rsapriv() 2548 padlen = 384; in ubsec_kprocess_rsapriv() 2550 padlen = 512; in ubsec_kprocess_rsapriv() 2552 padlen = 768; in ubsec_kprocess_rsapriv() 2554 padlen = 1024; in ubsec_kprocess_rsapriv() [all …]
|
/dragonfly/crypto/openssh/ |
H A D | packet.c | 1074 u_char tmp, padlen, pad = 0; in ssh_packet_send2_wrapped() local 1129 if (padlen < 4) in ssh_packet_send2_wrapped() 1130 padlen += block_size; in ssh_packet_send2_wrapped() 1145 tmp = padlen; in ssh_packet_send2_wrapped() 1146 padlen += pad; in ssh_packet_send2_wrapped() 1148 if (padlen < tmp) in ssh_packet_send2_wrapped() 1156 arc4random_buf(cp, padlen); in ssh_packet_send2_wrapped() 1170 cp[4] = padlen; in ssh_packet_send2_wrapped() 1172 len, padlen, aadlen)); in ssh_packet_send2_wrapped() 1482 u_int padlen, need; in ssh_packet_read_poll2() local [all …]
|
H A D | PROTOCOL.key | 49 byte padlen % 255
|
/dragonfly/contrib/tcpdump/ |
H A D | print-decnet.c | 501 u_int padlen = mflags & RMF_PADMASK; in decnet_print() local 503 ND_PRINT("[pad:%u] ", padlen); in decnet_print() 504 if (length < padlen + 2) { in decnet_print() 505 ND_PRINT(" (length %u < %u)", length, padlen + 2); in decnet_print() 508 ND_TCHECK_LEN(ap + sizeof(short), padlen); in decnet_print() 509 ap += padlen; in decnet_print() 510 length -= padlen; in decnet_print() 511 caplen -= padlen; in decnet_print()
|
H A D | print-esp.c | 744 u_int padlen; in esp_print() local 895 padlen = GET_U_1(ep - 2); in esp_print() 896 if (padlen + 2 > payloadlen) { in esp_print() 910 nd_push_snapend(ndo, ep - (padlen + 2)); in esp_print() 913 ip_demux_print(ndo, pt, payloadlen - (padlen + 2), ver, fragmented, in esp_print()
|
/dragonfly/stand/lib/ |
H A D | bootparam.c | 330 int padlen = (len + 3) & ~3; /* padded length */ in xdr_string_encode() local 338 *pkt += padlen; in xdr_string_encode()
|
/dragonfly/sys/opencrypto/ |
H A D | rmd160.c | 138 u_int32_t padlen; in RMD160Final() local 146 padlen = 64 - ((ctx->count/8) % 64); in RMD160Final() 147 if (padlen < 1 + 8) in RMD160Final() 148 padlen += 64; in RMD160Final() 149 RMD160Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */ in RMD160Final()
|
/dragonfly/usr.sbin/ppp/ |
H A D | route.c | 702 size_t padlen; in memcpy_roundup() local 704 padlen = RT_ROUNDUP(len); in memcpy_roundup() 706 if (padlen > len) in memcpy_roundup() 707 memset(cp + len, '\0', padlen - len); in memcpy_roundup() 709 return padlen; in memcpy_roundup()
|
/dragonfly/contrib/wpa_supplicant/src/radius/ |
H A D | radius.c | 1293 size_t padlen, i, pos; in radius_user_password_hide() local 1303 padlen = data_len % 16; in radius_user_password_hide() 1304 if (padlen && data_len < buf_len) { in radius_user_password_hide() 1305 padlen = 16 - padlen; in radius_user_password_hide() 1306 os_memset(buf + data_len, 0, padlen); in radius_user_password_hide() 1307 buf_len = data_len + padlen; in radius_user_password_hide()
|
/dragonfly/sys/kern/ |
H A D | uipc_mbuf.c | 2279 int padlen; in m_devpad() local 2284 padlen = padto - m->m_pkthdr.len; in m_devpad() 2287 if (m->m_pkthdr.len == m->m_len && M_TRAILINGSPACE(m) >= padlen) { in m_devpad() 2298 if (M_TRAILINGSPACE(last) < padlen) { in m_devpad() 2310 KKASSERT(M_TRAILINGSPACE(last) >= padlen); in m_devpad() 2314 bzero(mtod(last, caddr_t) + last->m_len, padlen); in m_devpad() 2315 last->m_len += padlen; in m_devpad() 2316 m->m_pkthdr.len += padlen; in m_devpad()
|
/dragonfly/test/stress/fsstress/ |
H A D | fsstress.c | 1015 int padlen; in namerandpad() local 1024 padlen = (id ^ namerand) % padmod; in namerandpad() 1025 if (padlen) { in namerandpad() 1026 memset(&buf[i], 'X', padlen); in namerandpad() 1027 buf[i + padlen] = '\0'; in namerandpad()
|
/dragonfly/sys/net/wg/ |
H A D | if_wg.c | 1838 unsigned int padlen, state = WG_PACKET_DEAD; in wg_encrypt() local 1845 padlen = calculate_padding(pkt); in wg_encrypt() 1846 if (padlen != 0 && !m_append(m, padlen, padding)) in wg_encrypt()
|