/freebsd/lib/libc/net/ |
H A D | ip6opt.c | 110 int padlen, optlen, off; in inet6_option_append() local 132 padlen = roundup2(off % multx, multx) - (off % multx); in inet6_option_append() 133 padlen += plusy; in inet6_option_append() 134 padlen %= multx; /* keep the pad as short as possible */ in inet6_option_append() 136 inet6_insert_padopt(bp, padlen); in inet6_option_append() 137 cmsg->cmsg_len += padlen; in inet6_option_append() 138 bp += padlen; in inet6_option_append() 151 padlen = ((off + 7) & ~7) - off; in inet6_option_append() 152 inet6_insert_padopt(bp, padlen); in inet6_option_append() 153 bp += padlen; in inet6_option_append() [all …]
|
/freebsd/crypto/openssl/crypto/bio/ |
H A D | bio_print.c | 385 int padlen; in fmtstr() local 394 padlen = min - strln; in fmtstr() 395 if (min < 0 || padlen < 0) in fmtstr() 396 padlen = 0; in fmtstr() 402 if (max < INT_MAX - padlen) in fmtstr() 403 max += padlen; in fmtstr() 408 padlen = -padlen; in fmtstr() 410 while ((padlen > 0) && (max < 0 || cnt < max)) { in fmtstr() 413 --padlen; in fmtstr() 422 while ((padlen < 0) && (max < 0 || cnt < max)) { in fmtstr() [all …]
|
/freebsd/crypto/openssh/openbsd-compat/ |
H A D | bsd-snprintf.c | 508 int padlen, strln; /* amount to pad */ in fmtstr() local 519 padlen = min - strln; in fmtstr() 520 if (padlen < 0) in fmtstr() 521 padlen = 0; in fmtstr() 523 padlen = -padlen; /* Left Justify */ in fmtstr() 525 while ((padlen > 0) && (cnt < max)) { in fmtstr() 527 --padlen; in fmtstr() 535 while ((padlen < 0) && (cnt < max)) { in fmtstr() 537 ++padlen; in fmtstr() 715 int padlen = 0; /* amount to pad */ in fmtfp() local [all …]
|
H A D | md5.c | 110 size_t padlen; in MD5Pad() local 116 padlen = MD5_BLOCK_LENGTH - in MD5Pad() 118 if (padlen < 1 + 8) in MD5Pad() 119 padlen += MD5_BLOCK_LENGTH; in MD5Pad() 120 MD5Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */ in MD5Pad()
|
/freebsd/contrib/ntp/libntp/ |
H A D | snprintf.c | 960 int padlen, strln; /* Amount to pad. */ in fmtstr() local 971 if ((padlen = width - strln) < 0) in fmtstr() 972 padlen = 0; in fmtstr() 974 padlen = -padlen; in fmtstr() 976 while (padlen > 0) { /* Leading spaces. */ in fmtstr() 978 padlen--; in fmtstr() 984 while (padlen < 0) { /* Trailing spaces. */ in fmtstr() 986 padlen++; in fmtstr() 1110 int padlen in fmtflt() local [all...] |
/freebsd/contrib/wpa/src/tls/ |
H A D | tlsv1_record.c | 283 u8 padlen; in tlsv1_record_receive() local 398 padlen = out_data[plen - 1]; in tlsv1_record_receive() 399 if (padlen >= plen) { in tlsv1_record_receive() 403 padlen, (unsigned long) plen); in tlsv1_record_receive() 407 for (i = plen - padlen - 1; i < plen - 1; i++) { in tlsv1_record_receive() 408 if (out_data[i] != padlen) { in tlsv1_record_receive() 412 out_data + plen - padlen - in tlsv1_record_receive() 413 1, padlen + 1); in tlsv1_record_receive() 419 plen -= padlen + 1; in tlsv1_record_receive()
|
/freebsd/sys/kgssapi/krb5/ |
H A D | krb5_mech.c | 1254 size_t mlen, tlen, padlen, datalen; in krb5_wrap_old() local 1266 padlen = tlen - (mlen % tlen); in krb5_wrap_old() 1274 datalen = mlen + 8 + padlen; in krb5_wrap_old() 1305 if (M_TRAILINGSPACE(mlast) >= padlen) { in krb5_wrap_old() 1306 memset(mlast->m_data + mlast->m_len, padlen, padlen); in krb5_wrap_old() 1307 mlast->m_len += padlen; in krb5_wrap_old() 1310 memset(pm->m_data, padlen, padlen); in krb5_wrap_old() 1311 pm->m_len = padlen; in krb5_wrap_old() 1606 size_t tlen, elen, datalen, padlen; in krb5_unwrap_old() local 1710 padlen = mlast->m_data[mlast->m_len - 1]; in krb5_unwrap_old() [all …]
|
/freebsd/sys/crypto/ |
H A D | sha1.c | 188 size_t padlen; /*pad length in bytes*/ in sha1_pad() local 194 padlen = 64 - padstart; in sha1_pad() 195 if (padlen < 8) { in sha1_pad() 196 bzero(&ctxt->m.b8[padstart], padlen); in sha1_pad() 197 COUNT += padlen; in sha1_pad() 201 padlen = 64 - padstart; /* should be 64 */ in sha1_pad() 203 bzero(&ctxt->m.b8[padstart], padlen - 8); in sha1_pad() 204 COUNT += (padlen - 8); in sha1_pad()
|
/freebsd/crypto/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_ccm.c | 18 size_t *padlen, const unsigned char *in, 336 unsigned char *out, size_t *padlen, in ccm_tls_cipher() argument 378 *padlen = olen; in ccm_tls_cipher() 383 size_t *padlen, const unsigned char *in, in ccm_cipher_internal() argument 395 return ccm_tls_cipher(ctx, out, padlen, in, len); in ccm_cipher_internal() 441 *padlen = olen; in ccm_cipher_internal()
|
H A D | ciphercommon_gcm.c | 22 static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, 25 size_t *padlen, const unsigned char *in, 394 size_t *padlen, const unsigned char *in, in gcm_cipher_internal() argument 402 return gcm_tls_cipher(ctx, out, padlen, in, len); in gcm_cipher_internal() 447 *padlen = olen; in gcm_cipher_internal() 512 static int gcm_tls_cipher(PROV_GCM_CTX *ctx, unsigned char *out, size_t *padlen, in gcm_tls_cipher() argument 571 *padlen = plen; in gcm_tls_cipher()
|
/freebsd/contrib/wpa/src/crypto/ |
H A D | md4-internal.c | 151 size_t padlen; in MD4Pad() local 157 padlen = MD4_BLOCK_LENGTH - in MD4Pad() 159 if (padlen < 1 + 8) in MD4Pad() 160 padlen += MD4_BLOCK_LENGTH; in MD4Pad() 161 MD4Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */ in MD4Pad()
|
/freebsd/crypto/openssh/ |
H A D | packet.c | 1168 u_char tmp, padlen, pad = 0; in ssh_packet_send2_wrapped() local 1222 padlen = block_size - (len % block_size); in ssh_packet_send2_wrapped() 1223 if (padlen < 4) in ssh_packet_send2_wrapped() 1224 padlen += block_size; in ssh_packet_send2_wrapped() 1232 tmp = (len + padlen) % state->extra_pad; in ssh_packet_send2_wrapped() 1238 pad, len, padlen, state->extra_pad)); in ssh_packet_send2_wrapped() 1239 tmp = padlen; in ssh_packet_send2_wrapped() 1240 padlen += pad; in ssh_packet_send2_wrapped() 1242 if (padlen < tmp) in ssh_packet_send2_wrapped() 1246 if ((r = sshbuf_reserve(state->outgoing_packet, padlen, &cp)) != 0) in ssh_packet_send2_wrapped() [all …]
|
H A D | PROTOCOL.key | 49 byte padlen % 255
|
/freebsd/contrib/tcpdump/ |
H A D | print-decnet.c | 499 u_int padlen = mflags & RMF_PADMASK; in decnet_print() local 501 ND_PRINT("[pad:%u] ", padlen); in decnet_print() 502 if (length < padlen + 2) { in decnet_print() 503 ND_PRINT(" (length %u < %u)", length, padlen + 2); in decnet_print() 506 ND_TCHECK_LEN(ap + sizeof(short), padlen); in decnet_print() 507 ap += padlen; in decnet_print() 508 length -= padlen; in decnet_print() 509 caplen -= padlen; in decnet_print()
|
H A D | print-esp.c | 749 u_int padlen; in esp_print() local 899 padlen = GET_U_1(pt + payloadlen - 2); in esp_print() 900 if (padlen + 2 > payloadlen) { in esp_print() 914 if (!nd_push_snaplen(ndo, pt, payloadlen - (padlen + 2))) { in esp_print() 920 ip_demux_print(ndo, pt, payloadlen - (padlen + 2), ver, fragmented, in esp_print()
|
/freebsd/crypto/heimdal/lib/gssapi/krb5/ |
H A D | decapsulate.c | 193 size_t *padlen) in _gssapi_verify_pad() argument 210 *padlen = padlength; in _gssapi_verify_pad()
|
H A D | arcfour.c | 539 size_t padlen = 0, len; in _gssapi_unwrap_arcfour() local 676 ret = _gssapi_verify_pad(output_message_buffer, datalen, &padlen); in _gssapi_unwrap_arcfour() 682 output_message_buffer->length -= padlen; in _gssapi_unwrap_arcfour() 691 output_message_buffer->length + padlen); in _gssapi_unwrap_arcfour()
|
/freebsd/sys/dev/vte/ |
H A D | if_vte.c | 970 int copy, error, nsegs, padlen; in vte_encap() local 983 padlen = VTE_MIN_FRAMELEN - m->m_pkthdr.len; in vte_encap() 985 padlen = 0; in vte_encap() 1003 if (padlen > 0 && (M_WRITABLE(m) == 0 || in vte_encap() 1004 padlen > M_TRAILINGSPACE(m))) in vte_encap() 1016 if (padlen > 0) { in vte_encap() 1018 bzero(mtod(m, char *) + m->m_pkthdr.len, padlen); in vte_encap() 1019 m->m_pkthdr.len += padlen; in vte_encap() 1024 if (m->m_next != NULL || padlen > 0) { in vte_encap() 1047 if (padlen > 0) { in vte_encap() [all …]
|
/freebsd/stand/libsa/ |
H A D | bootparam.c | 326 int padlen = (len + 3) & ~3; /* padded length */ in xdr_string_encode() local 334 *pkt += padlen; in xdr_string_encode()
|
/freebsd/sys/opencrypto/ |
H A D | rmd160.c | 137 uint32_t padlen; in RMD160Final() local 145 padlen = 64 - ((ctx->count/8) % 64); in RMD160Final() 146 if (padlen < 1 + 8) in RMD160Final() 147 padlen += 64; in RMD160Final() 148 RMD160Update(ctx, PADDING, padlen - 8); /* padlen - 8 <= 64 */ in RMD160Final()
|
/freebsd/sys/dev/rl/ |
H A D | if_rl.c | 1542 int error, nsegs, padlen; in rl_encap() local 1547 padlen = 0; in rl_encap() 1553 padlen = RL_MIN_FRAMELEN - m->m_pkthdr.len; in rl_encap() 1560 (padlen > 0 && M_TRAILINGSPACE(m) < padlen)) { in rl_encap() 1570 if (padlen > 0) { in rl_encap() 1577 bzero(mtod(m, char *) + m->m_pkthdr.len, padlen); in rl_encap() 1578 m->m_pkthdr.len += padlen; in rl_encap()
|
/freebsd/usr.sbin/ppp/ |
H A D | route.c | 705 size_t padlen; in memcpy_roundup() local 707 padlen = ROUNDUP(len); in memcpy_roundup() 709 if (padlen > len) in memcpy_roundup() 710 memset(cp + len, '\0', padlen - len); in memcpy_roundup() 712 return padlen; in memcpy_roundup()
|
/freebsd/crypto/openssl/providers/implementations/include/prov/ |
H A D | ciphercommon_ccm.h | 48 size_t *padlen, const unsigned char *in, \
|
/freebsd/contrib/wpa/src/radius/ |
H A D | radius.c | 1472 size_t padlen, i, pos; in radius_user_password_hide() local 1482 padlen = data_len % 16; in radius_user_password_hide() 1483 if (padlen && data_len < buf_len) { in radius_user_password_hide() 1484 padlen = 16 - padlen; in radius_user_password_hide() 1485 os_memset(buf + data_len, 0, padlen); in radius_user_password_hide() 1486 buf_len = data_len + padlen; in radius_user_password_hide()
|
/freebsd/contrib/bsnmp/lib/ |
H A D | snmp.c | 844 asn_len_t padlen; in snmp_pdu_fix_padd() local 847 padlen = 8 - (pdu->scoped_len % 8); in snmp_pdu_fix_padd() 848 if (asn_pad(b, padlen) != ASN_ERR_OK) in snmp_pdu_fix_padd() 850 pdu->scoped_len += padlen; in snmp_pdu_fix_padd()
|