/freebsd-current/contrib/ncurses/ncurses/widechar/ |
H A D | lib_pecho_wchar.c | 39 pecho_wchar(WINDOW *pad, const cchar_t *wch) argument 41 T((T_CALLED("pecho_wchar(%p, %s)"), (void *) pad, _tracech_t(wch))); 43 if (pad == 0) 46 if (!(pad->_flags & _ISPAD)) 47 returnCode(wecho_wchar(pad, wch)); 49 wadd_wch(pad, wch); 50 prefresh(pad, pad->_pad._pad_y, 51 pad->_pad._pad_x, 52 pad [all...] |
/freebsd-current/contrib/ncurses/menu/ |
H A D | m_pad.c | 53 | Function : int set_menu_pad(MENU* menu, int pad) 63 set_menu_pad(MENU *menu, int pad) argument 67 T((T_CALLED("set_menu_pad(%p,%d)"), (void *)menu, pad)); 69 if (!isprint(UChar(pad))) 73 menu->pad = (unsigned char)pad; 87 | Return Values : The pad character 93 returnCode(Normalize_Menu(menu)->pad);
|
/freebsd-current/contrib/ncurses/form/ |
H A D | fld_pad.c | 42 | Description : Set the pad character used to fill the field. This must 46 | E_BAD_ARGUMENT - invalid field pointer or pad character 59 if (field->pad != ch) 61 field->pad = ch; 74 | Description : Retrieve the field's pad character. 76 | Return Values : The pad character. 83 returnCode(Normalize_Field(field)->pad);
|
/freebsd-current/contrib/wpa/src/crypto/ |
H A D | aes-omac1.c | 16 static void gf_mulx(u8 *pad) argument 20 carry = pad[0] & 0x80; 22 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); 23 pad[AES_BLOCK_SIZE - 1] <<= 1; 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local 89 os_memset(pad, 0, AES_BLOCK_SIZE); 90 aes_encrypt(ctx, pad, pa [all...] |
/freebsd-current/contrib/elftoolchain/libpe/ |
H A D | libpe_utils.c | 54 libpe_pad(PE *pe, size_t pad) argument 60 for (; pad > 0; pad -= s) { 61 s = pad > sizeof(tmp) ? sizeof(tmp) : pad;
|
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_auth/hmacsha512/ |
H A D | auth_hmacsha512.c | 40 unsigned char pad[128]; local 52 memset(pad, 0x36, 128); 54 pad[i] ^= key[i]; 56 crypto_hash_sha512_update(&state->ictx, pad, 128); 59 memset(pad, 0x5c, 128); 61 pad[i] ^= key[i]; 63 crypto_hash_sha512_update(&state->octx, pad, 128); 65 sodium_memzero((void *) pad, sizeof pad);
|
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_auth/hmacsha256/ |
H A D | auth_hmacsha256.c | 40 unsigned char pad[64]; local 52 memset(pad, 0x36, 64); 54 pad[i] ^= key[i]; 56 crypto_hash_sha256_update(&state->ictx, pad, 64); 59 memset(pad, 0x5c, 64); 61 pad[i] ^= key[i]; 63 crypto_hash_sha256_update(&state->octx, pad, 64); 65 sodium_memzero((void *) pad, sizeof pad);
|
/freebsd-current/sys/compat/linuxkpi/common/include/net/ |
H A D | ieee80211_radiotap.h | 46 u8 pad; member in struct:ieee80211_vendor_radiotap
|
/freebsd-current/contrib/ncurses/include/ |
H A D | MKparametrized.sh | 46 * A value of -1 in the table means suppress both pad and % translations. 47 * A value of 0 in the table means do pad but not % translations. 48 * A value of 1 in the table means do both pad and % translations.
|
/freebsd-current/sys/contrib/xen/ |
H A D | argo.h | 58 uint32_t pad; member in struct:xen_argo_iov 65 uint16_t pad; member in struct:xen_argo_addr 92 uint16_t pad; member in struct:xen_argo_register_ring 100 uint16_t pad; member in struct:xen_argo_unregister_ring 126 uint16_t pad; member in struct:xen_argo_ring_data_ent 134 uint32_t pad; member in struct:xen_argo_ring_data
|
H A D | pmu.h | 67 uint32_t pad; member in struct:xen_pmu_params 127 uint8_t pad[6]; member in struct:xen_pmu_data
|
H A D | nmi.h | 64 unsigned long pad; member in struct:xennmi_callback
|
H A D | hypfs.h | 52 uint16_t pad; /* Returned as 0. */ member in struct:xen_hypfs_direntry
|
/freebsd-current/crypto/openssl/crypto/bn/asm/ |
H A D | via-mont.pl | 98 $pad=16*1; # amount of reserved bytes on top of every vector 110 # &DWP(64+(4*$num+$pad)*0,"esp") # padded tp[num] 111 # &DWP(64+(4*$num+$pad)*1,"esp") # padded copy of ap[num] 112 # &DWP(64+(4*$num+$pad)*2,"esp") # padded copy of bp[num] 113 # &DWP(64+(4*$num+$pad)*3,"esp") # padded copy of np[num] 141 &lea ("ecx",&DWP($pad,"","ecx",4)); # ecx becomes vector size in bytes 158 &lea ("ebp",&DWP(-$pad,"ecx")); 164 &lea ("ecx",&DWP((32+$pad)/4,"ecx"));# padded tp + scratch 168 &lea ("edi",&DWP(64+$pad,"esp","ecx",4));# pointer to ap copy 171 &mov ("ecx",$pad/ [all...] |
/freebsd-current/sys/contrib/xen/hvm/ |
H A D | dm_op.h | 70 uint8_t pad[3]; member in struct:xen_dm_op_create_ioreq_server 141 uint16_t pad; member in struct:xen_dm_op_ioreq_server_range 174 uint8_t pad; member in struct:xen_dm_op_set_ioreq_server_state 188 uint16_t pad; member in struct:xen_dm_op_destroy_ioreq_server 204 uint32_t pad; member in struct:xen_dm_op_track_dirty_vram 279 uint32_t pad; member in struct:xen_dm_op_modified_memory_extent 300 uint16_t pad; member in struct:xen_dm_op_set_mem_type 348 uint32_t pad; member in struct:xen_dm_op_inject_msi 404 uint32_t pad; member in struct:xen_dm_op_relocate_memory 430 uint32_t pad; member in struct:xen_dm_op_pin_memory_cacheattr 445 uint8_t pad[3]; member in struct:xen_dm_op_set_irq_level 466 uint32_t pad; member in struct:xen_dm_op [all...] |
/freebsd-current/crypto/openssl/providers/implementations/ciphers/ |
H A D | ciphercommon_block.c | 102 unsigned char pad = (unsigned char)(blocksize - *buflen); local 105 buf[i] = pad; 110 size_t pad, i; local 122 pad = buf[blocksize - 1]; 123 if (pad == 0 || pad > blocksize) { 127 for (i = 0; i < pad; i++) { 128 if (buf[--len] != pad) {
|
H A D | cipher_aes_ccm.h | 26 unsigned char pad[16]; member in struct:prov_aes_ccm_ctx_st::__anon4116::__anon4117
|
/freebsd-current/sys/contrib/xen/arch-x86/ |
H A D | pmu.h | 83 uint8_t pad[3]; member in struct:xen_pmu_regs 111 uint8_t pad[XENPMU_REGS_PAD_SZ]; member in union:xen_pmu_arch::__anon13 125 uint64_t pad; member in union:xen_pmu_arch::__anon14 143 uint8_t pad[XENPMU_CTXT_PAD_SZ]; member in union:xen_pmu_arch::__anon15
|
/freebsd-current/sys/contrib/xen/io/ |
H A D | pvcalls.h | 71 uint8_t pad[4]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_socket 80 uint8_t pad[4]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_connect 85 uint8_t pad[7]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_release 95 uint8_t pad[4]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_listen 118 uint32_t pad; member in struct:xen_pvcalls_response
|
/freebsd-current/crypto/openssl/crypto/sha/ |
H A D | sha3.c | 21 int ossl_sha3_init(KECCAK1600_CTX *ctx, unsigned char pad, size_t bitlen) argument 29 ctx->pad = pad; 36 int ossl_keccak_kmac_init(KECCAK1600_CTX *ctx, unsigned char pad, size_t bitlen) argument 38 int ret = ossl_sha3_init(ctx, pad, bitlen); 101 ctx->buf[num] = ctx->pad;
|
/freebsd-current/contrib/libpcap/pcap/ |
H A D | nflog.h | 59 uint8_t pad; /* padding to 32 bits */ member in struct:nflog_packet_hdr 64 uint16_t pad; /* padding to 32-bit boundary */ member in struct:nflog_hwaddr
|
/freebsd-current/usr.bin/lam/ |
H A D | lam.c | 54 short pad; /* pad flag for missing columns */ member in struct:openfile 67 static char *pad(struct openfile *); 127 ip->pad = P; 155 ip->pad = 1; 185 pad(struct openfile *ip) function 191 if (ip->pad) { 208 return (pad(ip)); 218 return (pad(ip));
|
/freebsd-current/include/protocols/ |
H A D | talkd.h | 69 u_char pad; member in struct:__anon54 88 u_char pad; member in struct:__anon55
|
/freebsd-current/crypto/openssl/crypto/asn1/ |
H A D | a_int.c | 51 * encoding, except if the first byte is >= 0x80 we need to add a zero pad. 63 * Padding is a little trickier too. If the first bytes is > 0x80 then we pad 65 * is non-zero we pad with 0xff. The reason for this distinction is that 0x80 70 * If |pad| is zero, the operation is effectively reduced to memcpy, 71 * and if |pad| is 0xff, then it performs two's complement, ~dst + 1. 77 size_t len, unsigned char pad) 79 unsigned int carry = pad & 1; 92 *(--dst) = (unsigned char)(carry += *(--src) ^ pad); 100 unsigned int pad = 0; local 108 pad 76 twos_complement(unsigned char *dst, const unsigned char *src, size_t len, unsigned char pad) argument 157 int neg, pad; local [all...] |
/freebsd-current/sys/dev/liquidio/base/ |
H A D | lio_image.h | 64 __be32 pad; member in struct:lio_firmware_file_header
|