/net/mac80211/ |
H A D | aes_cmac.c | 26 static void gf_mulx(u8 *pad) argument 30 carry = pad[0] & 0x80; 32 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); 33 pad[AES_BLOCK_SIZE - 1] <<= 1; 35 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 42 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local 71 memset(pad, 0, AES_BLOCK_SIZE); 72 crypto_cipher_encrypt_one(tfm, pad, pa [all...] |
/net/ceph/ |
H A D | crypto.c | 103 char pad[16]; local 108 memset(pad, zero_padding, zero_padding); 115 sg_set_buf(&sg_in[1], pad, zero_padding); 127 print_hex_dump(KERN_ERR, "enc pad: ", DUMP_PREFIX_NONE, 16, 1, 128 pad, zero_padding, 1); 154 char pad[16]; local 159 memset(pad, zero_padding, zero_padding); 167 sg_set_buf(&sg_in[2], pad, zero_padding); 181 print_hex_dump(KERN_ERR, "enc pad: ", DUMP_PREFIX_NONE, 16, 1, 182 pad, zero_paddin 203 char pad[16]; local 264 char pad[16]; local [all...] |
/net/dsa/ |
H A D | tag_trailer.c | 29 * last 4 bytes of the packet. This means that we have to pad 51 u8 *pad = skb_put(nskb, padlen); local 52 memset(pad, 0, padlen);
|
/net/wireless/ |
H A D | radiotap.c | 207 int pad, align, size, subns; local 261 pad = ((unsigned long)iterator->_arg - 264 if (pad) 265 iterator->_arg += align - pad;
|
/net/rxrpc/ |
H A D | ar-output.c | 669 size_t pad; local 671 /* pad out if we're using security */ 673 pad = conn->security_size + skb->mark; 674 pad = conn->size_align - pad; 675 pad &= conn->size_align - 1; 676 _debug("pad %zu", pad); 677 if (pad) 678 memset(skb_put(skb, pad), local [all...] |
H A D | ar-ack.c | 839 __be32 data, pad; local 952 pad = 0; 956 iov[2].iov_base = &pad; 1076 pad = 0; 1082 iov[3].iov_base = &pad;
|
/net/sunrpc/auth_gss/ |
H A D | gss_krb5_wrap.c | 69 u8 pad; local 73 pad = *(u8 *)(buf->head[0].iov_base + len - 1); 74 if (pad > buf->head[0].iov_len) 76 buf->head[0].iov_len -= pad; 86 pad = *(ptr + offset); 92 pad = *(u8 *)(buf->tail[0].iov_base + len - 1); 107 if (pad > blocksize) 109 if (buf->len > pad) 110 buf->len -= pad;
|
H A D | svcauth_gss.c | 877 fix_priv_head(struct xdr_buf *buf, int pad) argument 883 buf->head[0].iov_len -= pad; 891 int pad, saved_len, remaining_len, offset; local 907 pad = remaining_len - priv_len; 908 buf->len -= pad; 909 fix_priv_head(buf, pad); 915 pad = priv_len - buf->len; 917 buf->len -= pad; 928 fix_priv_head(buf, pad); 1671 int pad; local [all...] |
H A D | auth_gss.c | 1443 int pad; local 1491 pad = 3 - ((snd_buf->len - offset - 1) & 3); 1492 memset(p, 0, pad); 1493 iov->iov_len += pad; 1494 snd_buf->len += pad;
|
/net/sunrpc/xprtrdma/ |
H A D | rpc_rdma.c | 121 * xdr pad bytes, saving the server an RDMA operation. */ 293 rpcrdma_inline_pullup(struct rpc_rqst *rqst, int pad) argument 309 pad -= (curlen + 36/*sizeof(struct rpcrdma_msg_padded)*/); 310 if (pad < 0 || rqst->rq_slen - curlen < RPCRDMA_INLINE_PAD_THRESH) 311 pad = 0; /* don't pad this request */ 313 dprintk("RPC: %s: pad %d destp 0x%p len %d hdrlen %d\n", 314 __func__, pad, destp, rqst->rq_slen, curlen); 350 return pad; 526 * then use a preregistered (and zeroed) pad buffe 604 rpcrdma_inline_fixup(struct rpc_rqst *rqst, char *srcp, int copy_len, int pad) argument [all...] |
/net/sched/ |
H A D | em_text.c | 120 conf.pad = 0;
|
H A D | cls_rsvp.h | 626 pinfo.pad = 0;
|
H A D | sch_cbq.c | 1489 opt.pad = 0;
|
/net/netfilter/ |
H A D | x_tables.c | 512 int pad, off = xt_compat_match_offset(match); local 521 pad = XT_ALIGN(match->matchsize) - match->matchsize; 522 if (pad > 0) 523 memset(m->data + match->matchsize, 0, pad); 626 int pad, off = xt_compat_target_offset(target); local 635 pad = XT_ALIGN(target->targetsize) - target->targetsize; 636 if (pad > 0) 637 memset(t->data + target->targetsize, 0, pad);
|
/net/netfilter/ipvs/ |
H A D | ip_vs_sync.c | 620 unsigned int len, pe_name_len, pad; local 669 pad = 0; 673 pad = (4 - (size_t) buff->head) & 3; 675 if (buff->head + len + pad > buff->end || m->reserved) { 679 pad = 0; 695 buff->head += pad + len; 696 m->size = htons(ntohs(m->size) + pad + len); 698 while (pad--)
|
/net/bridge/netfilter/ |
H A D | ebtables.c | 1898 int off, pad = 0; local 1949 pad = XT_ALIGN(size_kern) - size_kern; 1951 if (pad > 0 && dst) { 1952 BUG_ON(state->buf_kern_len <= pad); 1953 BUG_ON(state->buf_kern_offset - (match_size + off) + size_kern > state->buf_kern_len - pad); 1954 memset(dst + size_kern, 0, pad);
|
/net/sunrpc/ |
H A D | xdr.c | 530 unsigned int pad = 4 - (len & 3); local 534 iov->iov_len += pad; 535 len += pad;
|
/net/ipv6/ |
H A D | ndisc.c | 148 int pad = ndisc_addr_option_pad(skb->dev->type); local 156 memset(opt + 2, 0, pad); 157 opt += pad; 158 space -= pad;
|
H A D | addrconf.c | 4276 int pad = bytes - sizeof(u64) * items; local 4277 BUG_ON(pad < 0); 4284 memset(&stats[items], 0, pad); 4291 int pad = bytes - sizeof(u64) * items; local 4292 BUG_ON(pad < 0); 4299 memset(&stats[items], 0, pad);
|
/net/atm/ |
H A D | br2684.c | 56 static const unsigned char pad[] = { PAD_BRIDGED }; variable 494 if (memcmp(skb->data, pad, BR2684_PAD_LEN) != 0)
|
/net/core/ |
H A D | skbuff.c | 1225 * skb_pad - zero pad the tail of an skb 1226 * @skb: buffer to pad 1227 * @pad: space to pad 1236 int skb_pad(struct sk_buff *skb, int pad) argument 1242 if (!skb_cloned(skb) && skb_tailroom(skb) >= pad) { 1243 memset(skb->data+skb->len, 0, pad); 1247 ntail = skb->data_len + pad - (skb->end - skb->tail); 1261 memset(skb->data + skb->len, 0, pad);
|
H A D | pktgen.c | 361 __u16 pad; /* pad out the hh struct to an even 16 bytes */ member in struct:pktgen_dev
|
/net/tipc/ |
H A D | link.c | 184 /* need above in case non-Posix strncpy() doesn't pad with nulls */ 783 u32 pad = to_pos - bundle_size; local 789 if (skb_tailroom(bundler) < (pad + size)) 794 skb_put(bundler, pad + size);
|
/net/ipv4/ |
H A D | tcp_ipv4.c | 1125 bp->pad = 0;
|