Searched refs:pad (Results 1 - 25 of 431) sorted by relevance

1234567891011>>

/freebsd-current/contrib/ncurses/ncurses/widechar/
H A Dlib_pecho_wchar.c39 pecho_wchar(WINDOW *pad, const cchar_t *wch) argument
41 T((T_CALLED("pecho_wchar(%p, %s)"), (void *) pad, _tracech_t(wch)));
43 if (pad == 0)
46 if (!(pad->_flags & _ISPAD))
47 returnCode(wecho_wchar(pad, wch));
49 wadd_wch(pad, wch);
50 prefresh(pad, pad->_pad._pad_y,
51 pad->_pad._pad_x,
52 pad
[all...]
/freebsd-current/contrib/ncurses/menu/
H A Dm_pad.c53 | Function : int set_menu_pad(MENU* menu, int pad)
63 set_menu_pad(MENU *menu, int pad) argument
67 T((T_CALLED("set_menu_pad(%p,%d)"), (void *)menu, pad));
69 if (!isprint(UChar(pad)))
73 menu->pad = (unsigned char)pad;
87 | Return Values : The pad character
93 returnCode(Normalize_Menu(menu)->pad);
/freebsd-current/contrib/ncurses/form/
H A Dfld_pad.c42 | Description : Set the pad character used to fill the field. This must
46 | E_BAD_ARGUMENT - invalid field pointer or pad character
59 if (field->pad != ch)
61 field->pad = ch;
74 | Description : Retrieve the field's pad character.
76 | Return Values : The pad character.
83 returnCode(Normalize_Field(field)->pad);
/freebsd-current/contrib/wpa/src/crypto/
H A Daes-omac1.c16 static void gf_mulx(u8 *pad) argument
20 carry = pad[0] & 0x80;
22 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7);
23 pad[AES_BLOCK_SIZE - 1] <<= 1;
25 pad[AES_BLOCK_SIZE - 1] ^= 0x87;
47 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local
89 os_memset(pad, 0, AES_BLOCK_SIZE);
90 aes_encrypt(ctx, pad, pa
[all...]
/freebsd-current/contrib/elftoolchain/libpe/
H A Dlibpe_utils.c54 libpe_pad(PE *pe, size_t pad) argument
60 for (; pad > 0; pad -= s) {
61 s = pad > sizeof(tmp) ? sizeof(tmp) : pad;
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_auth/hmacsha512/
H A Dauth_hmacsha512.c40 unsigned char pad[128]; local
52 memset(pad, 0x36, 128);
54 pad[i] ^= key[i];
56 crypto_hash_sha512_update(&state->ictx, pad, 128);
59 memset(pad, 0x5c, 128);
61 pad[i] ^= key[i];
63 crypto_hash_sha512_update(&state->octx, pad, 128);
65 sodium_memzero((void *) pad, sizeof pad);
/freebsd-current/sys/contrib/libsodium/src/libsodium/crypto_auth/hmacsha256/
H A Dauth_hmacsha256.c40 unsigned char pad[64]; local
52 memset(pad, 0x36, 64);
54 pad[i] ^= key[i];
56 crypto_hash_sha256_update(&state->ictx, pad, 64);
59 memset(pad, 0x5c, 64);
61 pad[i] ^= key[i];
63 crypto_hash_sha256_update(&state->octx, pad, 64);
65 sodium_memzero((void *) pad, sizeof pad);
/freebsd-current/sys/compat/linuxkpi/common/include/net/
H A Dieee80211_radiotap.h46 u8 pad; member in struct:ieee80211_vendor_radiotap
/freebsd-current/contrib/ncurses/include/
H A DMKparametrized.sh46 * A value of -1 in the table means suppress both pad and % translations.
47 * A value of 0 in the table means do pad but not % translations.
48 * A value of 1 in the table means do both pad and % translations.
/freebsd-current/sys/contrib/xen/
H A Dargo.h58 uint32_t pad; member in struct:xen_argo_iov
65 uint16_t pad; member in struct:xen_argo_addr
92 uint16_t pad; member in struct:xen_argo_register_ring
100 uint16_t pad; member in struct:xen_argo_unregister_ring
126 uint16_t pad; member in struct:xen_argo_ring_data_ent
134 uint32_t pad; member in struct:xen_argo_ring_data
H A Dpmu.h67 uint32_t pad; member in struct:xen_pmu_params
127 uint8_t pad[6]; member in struct:xen_pmu_data
H A Dnmi.h64 unsigned long pad; member in struct:xennmi_callback
H A Dhypfs.h52 uint16_t pad; /* Returned as 0. */ member in struct:xen_hypfs_direntry
/freebsd-current/crypto/openssl/crypto/bn/asm/
H A Dvia-mont.pl98 $pad=16*1; # amount of reserved bytes on top of every vector
110 # &DWP(64+(4*$num+$pad)*0,"esp") # padded tp[num]
111 # &DWP(64+(4*$num+$pad)*1,"esp") # padded copy of ap[num]
112 # &DWP(64+(4*$num+$pad)*2,"esp") # padded copy of bp[num]
113 # &DWP(64+(4*$num+$pad)*3,"esp") # padded copy of np[num]
141 &lea ("ecx",&DWP($pad,"","ecx",4)); # ecx becomes vector size in bytes
158 &lea ("ebp",&DWP(-$pad,"ecx"));
164 &lea ("ecx",&DWP((32+$pad)/4,"ecx"));# padded tp + scratch
168 &lea ("edi",&DWP(64+$pad,"esp","ecx",4));# pointer to ap copy
171 &mov ("ecx",$pad/
[all...]
/freebsd-current/sys/contrib/xen/hvm/
H A Ddm_op.h70 uint8_t pad[3]; member in struct:xen_dm_op_create_ioreq_server
141 uint16_t pad; member in struct:xen_dm_op_ioreq_server_range
174 uint8_t pad; member in struct:xen_dm_op_set_ioreq_server_state
188 uint16_t pad; member in struct:xen_dm_op_destroy_ioreq_server
204 uint32_t pad; member in struct:xen_dm_op_track_dirty_vram
279 uint32_t pad; member in struct:xen_dm_op_modified_memory_extent
300 uint16_t pad; member in struct:xen_dm_op_set_mem_type
348 uint32_t pad; member in struct:xen_dm_op_inject_msi
404 uint32_t pad; member in struct:xen_dm_op_relocate_memory
430 uint32_t pad; member in struct:xen_dm_op_pin_memory_cacheattr
445 uint8_t pad[3]; member in struct:xen_dm_op_set_irq_level
466 uint32_t pad; member in struct:xen_dm_op
[all...]
/freebsd-current/crypto/openssl/providers/implementations/ciphers/
H A Dciphercommon_block.c102 unsigned char pad = (unsigned char)(blocksize - *buflen); local
105 buf[i] = pad;
110 size_t pad, i; local
122 pad = buf[blocksize - 1];
123 if (pad == 0 || pad > blocksize) {
127 for (i = 0; i < pad; i++) {
128 if (buf[--len] != pad) {
H A Dcipher_aes_ccm.h26 unsigned char pad[16]; member in struct:prov_aes_ccm_ctx_st::__anon4116::__anon4117
/freebsd-current/sys/contrib/xen/arch-x86/
H A Dpmu.h83 uint8_t pad[3]; member in struct:xen_pmu_regs
111 uint8_t pad[XENPMU_REGS_PAD_SZ]; member in union:xen_pmu_arch::__anon13
125 uint64_t pad; member in union:xen_pmu_arch::__anon14
143 uint8_t pad[XENPMU_CTXT_PAD_SZ]; member in union:xen_pmu_arch::__anon15
/freebsd-current/sys/contrib/xen/io/
H A Dpvcalls.h71 uint8_t pad[4]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_socket
80 uint8_t pad[4]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_connect
85 uint8_t pad[7]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_release
95 uint8_t pad[4]; member in struct:xen_pvcalls_request::__anon73::xen_pvcalls_listen
118 uint32_t pad; member in struct:xen_pvcalls_response
/freebsd-current/crypto/openssl/crypto/sha/
H A Dsha3.c21 int ossl_sha3_init(KECCAK1600_CTX *ctx, unsigned char pad, size_t bitlen) argument
29 ctx->pad = pad;
36 int ossl_keccak_kmac_init(KECCAK1600_CTX *ctx, unsigned char pad, size_t bitlen) argument
38 int ret = ossl_sha3_init(ctx, pad, bitlen);
101 ctx->buf[num] = ctx->pad;
/freebsd-current/contrib/libpcap/pcap/
H A Dnflog.h59 uint8_t pad; /* padding to 32 bits */ member in struct:nflog_packet_hdr
64 uint16_t pad; /* padding to 32-bit boundary */ member in struct:nflog_hwaddr
/freebsd-current/usr.bin/lam/
H A Dlam.c54 short pad; /* pad flag for missing columns */ member in struct:openfile
67 static char *pad(struct openfile *);
127 ip->pad = P;
155 ip->pad = 1;
185 pad(struct openfile *ip) function
191 if (ip->pad) {
208 return (pad(ip));
218 return (pad(ip));
/freebsd-current/include/protocols/
H A Dtalkd.h69 u_char pad; member in struct:__anon54
88 u_char pad; member in struct:__anon55
/freebsd-current/crypto/openssl/crypto/asn1/
H A Da_int.c51 * encoding, except if the first byte is >= 0x80 we need to add a zero pad.
63 * Padding is a little trickier too. If the first bytes is > 0x80 then we pad
65 * is non-zero we pad with 0xff. The reason for this distinction is that 0x80
70 * If |pad| is zero, the operation is effectively reduced to memcpy,
71 * and if |pad| is 0xff, then it performs two's complement, ~dst + 1.
77 size_t len, unsigned char pad)
79 unsigned int carry = pad & 1;
92 *(--dst) = (unsigned char)(carry += *(--src) ^ pad);
100 unsigned int pad = 0; local
108 pad
76 twos_complement(unsigned char *dst, const unsigned char *src, size_t len, unsigned char pad) argument
157 int neg, pad; local
[all...]
/freebsd-current/sys/dev/liquidio/base/
H A Dlio_image.h64 __be32 pad; member in struct:lio_firmware_file_header

Completed in 194 milliseconds

1234567891011>>