mirror of
https://github.com/Mange/rtl8192eu-linux-driver
synced 2025-12-10 00:04:17 +00:00
Remove wrapper for memset()
Link: 545d963a9e (diff-16d649c4743131c1aae5f812af5596dae6423bb63eaaf2990b8c89c9a681a913)
This commit is contained in:
@@ -1369,13 +1369,13 @@ static sint aes_cipher(u8 *key, uint hdrlen,
|
||||
frsubtype = frsubtype >> 4;
|
||||
|
||||
|
||||
_rtw_memset((void *)mic_iv, 0, 16);
|
||||
_rtw_memset((void *)mic_header1, 0, 16);
|
||||
_rtw_memset((void *)mic_header2, 0, 16);
|
||||
_rtw_memset((void *)ctr_preload, 0, 16);
|
||||
_rtw_memset((void *)chain_buffer, 0, 16);
|
||||
_rtw_memset((void *)aes_out, 0, 16);
|
||||
_rtw_memset((void *)padded_buffer, 0, 16);
|
||||
memset((void *)mic_iv, 0, 16);
|
||||
memset((void *)mic_header1, 0, 16);
|
||||
memset((void *)mic_header2, 0, 16);
|
||||
memset((void *)ctr_preload, 0, 16);
|
||||
memset((void *)chain_buffer, 0, 16);
|
||||
memset((void *)aes_out, 0, 16);
|
||||
memset((void *)padded_buffer, 0, 16);
|
||||
|
||||
if ((hdrlen == WLAN_HDR_A3_LEN) || (hdrlen == WLAN_HDR_A3_QOS_LEN))
|
||||
a4_exists = 0;
|
||||
@@ -1675,13 +1675,13 @@ static sint aes_decipher(u8 *key, uint hdrlen,
|
||||
frsubtype = frsubtype >> 4;
|
||||
|
||||
|
||||
_rtw_memset((void *)mic_iv, 0, 16);
|
||||
_rtw_memset((void *)mic_header1, 0, 16);
|
||||
_rtw_memset((void *)mic_header2, 0, 16);
|
||||
_rtw_memset((void *)ctr_preload, 0, 16);
|
||||
_rtw_memset((void *)chain_buffer, 0, 16);
|
||||
_rtw_memset((void *)aes_out, 0, 16);
|
||||
_rtw_memset((void *)padded_buffer, 0, 16);
|
||||
memset((void *)mic_iv, 0, 16);
|
||||
memset((void *)mic_header1, 0, 16);
|
||||
memset((void *)mic_header2, 0, 16);
|
||||
memset((void *)ctr_preload, 0, 16);
|
||||
memset((void *)chain_buffer, 0, 16);
|
||||
memset((void *)aes_out, 0, 16);
|
||||
memset((void *)padded_buffer, 0, 16);
|
||||
|
||||
/* start to decrypt the payload */
|
||||
|
||||
@@ -2082,7 +2082,7 @@ u32 rtw_BIP_verify(_adapter *padapter, u8 *whdr_pos, sint flen
|
||||
mme = BIP_AAD + ori_len - 18;
|
||||
|
||||
/* clear the MIC field of MME to zero */
|
||||
_rtw_memset(mme + 10, 0, 8);
|
||||
memset(mme + 10, 0, 8);
|
||||
|
||||
/* conscruct AAD, copy frame control field */
|
||||
_rtw_memcpy(BIP_AAD, &pwlanhdr->frame_ctl, 2);
|
||||
@@ -2377,7 +2377,7 @@ static void hmac_sha256_vector(u8 *key, size_t key_len, size_t num_elem,
|
||||
* and text is the data being protected */
|
||||
|
||||
/* start out by storing key in ipad */
|
||||
_rtw_memset(k_pad, 0, sizeof(k_pad));
|
||||
memset(k_pad, 0, sizeof(k_pad));
|
||||
_rtw_memcpy(k_pad, key, key_len);
|
||||
/* XOR key with ipad values */
|
||||
for (i = 0; i < 64; i++)
|
||||
@@ -2392,7 +2392,7 @@ static void hmac_sha256_vector(u8 *key, size_t key_len, size_t num_elem,
|
||||
}
|
||||
sha256_vector(1 + num_elem, _addr, _len, mac);
|
||||
|
||||
_rtw_memset(k_pad, 0, sizeof(k_pad));
|
||||
memset(k_pad, 0, sizeof(k_pad));
|
||||
_rtw_memcpy(k_pad, key, key_len);
|
||||
/* XOR key with opad values */
|
||||
for (i = 0; i < 64; i++)
|
||||
@@ -2760,7 +2760,7 @@ static void gf_mulx(u8 *pad)
|
||||
|
||||
static void aes_encrypt_deinit(void *ctx)
|
||||
{
|
||||
_rtw_memset(ctx, 0, AES_PRIV_SIZE);
|
||||
memset(ctx, 0, AES_PRIV_SIZE);
|
||||
rtw_mfree(ctx, AES_PRIV_SIZE);
|
||||
}
|
||||
|
||||
@@ -2789,7 +2789,7 @@ static int omac1_aes_128_vector(const u8 *key, size_t num_elem,
|
||||
ctx = aes_encrypt_init(key, 16);
|
||||
if (ctx == NULL)
|
||||
return -1;
|
||||
_rtw_memset(cbc, 0, AES_BLOCK_SIZE);
|
||||
memset(cbc, 0, AES_BLOCK_SIZE);
|
||||
|
||||
total_len = 0;
|
||||
for (e = 0; e < num_elem; e++)
|
||||
@@ -2814,7 +2814,7 @@ static int omac1_aes_128_vector(const u8 *key, size_t num_elem,
|
||||
left -= AES_BLOCK_SIZE;
|
||||
}
|
||||
|
||||
_rtw_memset(pad, 0, AES_BLOCK_SIZE);
|
||||
memset(pad, 0, AES_BLOCK_SIZE);
|
||||
aes_128_encrypt(ctx, pad, pad);
|
||||
gf_mulx(pad);
|
||||
|
||||
@@ -2859,7 +2859,7 @@ int omac1_aes_128(const u8 *key, const u8 *data, size_t data_len, u8 *mac)
|
||||
|
||||
#ifdef CONFIG_RTW_MESH_AEK
|
||||
/* for AES-SIV */
|
||||
#define os_memset _rtw_memset
|
||||
#define os_memset memset
|
||||
#define os_memcpy _rtw_memcpy
|
||||
#define os_malloc rtw_malloc
|
||||
#define bin_clear_free(bin, len) \
|
||||
@@ -3181,7 +3181,7 @@ int wpa_tdls_ftie_mic(u8 *kck, u8 trans_seq,
|
||||
/* 7) FTIE, with the MIC field of the FTIE set to 0 */
|
||||
_rtw_memcpy(pos, ftie, 2 + ftie[1]);
|
||||
_ftie = (struct wpa_tdls_ftie *) pos;
|
||||
_rtw_memset(_ftie->mic, 0, TDLS_MIC_LEN);
|
||||
memset(_ftie->mic, 0, TDLS_MIC_LEN);
|
||||
pos += 2 + ftie[1];
|
||||
|
||||
ret = omac1_aes_128(kck, buf, pos - buf, mic);
|
||||
@@ -3230,7 +3230,7 @@ int wpa_tdls_teardown_ftie_mic(u8 *kck, u8 *lnkid, u16 reason,
|
||||
/* 5) FTIE, with the MIC field of the FTIE set to 0 */
|
||||
_rtw_memcpy(pos, ftie, 2 + ftie[1]);
|
||||
_ftie = (struct wpa_tdls_ftie *) pos;
|
||||
_rtw_memset(_ftie->mic, 0, TDLS_MIC_LEN);
|
||||
memset(_ftie->mic, 0, TDLS_MIC_LEN);
|
||||
pos += 2 + ftie[1];
|
||||
|
||||
ret = omac1_aes_128(kck, buf, pos - buf, mic);
|
||||
@@ -3280,7 +3280,7 @@ int tdls_verify_mic(u8 *kck, u8 trans_seq,
|
||||
_rtw_memcpy(pos, ftie, 2 + *(ftie + 1));
|
||||
pos += 2;
|
||||
tmp_ftie = (u8 *)(pos + 2);
|
||||
_rtw_memset(tmp_ftie, 0, 16);
|
||||
memset(tmp_ftie, 0, 16);
|
||||
pos += *(ftie + 1);
|
||||
|
||||
ret = omac1_aes_128(kck, buf, pos - buf, mic);
|
||||
|
||||
Reference in New Issue
Block a user