/net/dsa/ |
H A D | tag_trailer.c | 28 * last 4 bytes of the packet. This means that we have to pad 50 u8 *pad = skb_put(nskb, padlen); local 51 memset(pad, 0, padlen);
|
/net/wireless/ |
H A D | radiotap.c | 216 int pad, align, size, subns; local 270 pad = ((unsigned long)iterator->_arg - 273 if (pad) 274 iterator->_arg += align - pad;
|
/net/mac80211/ |
H A D | aes_cmac.c | 26 static void gf_mulx(u8 *pad) argument 30 carry = pad[0] & 0x80; 32 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); 33 pad[AES_BLOCK_SIZE - 1] <<= 1; 35 pad[AES_BLOCK_SIZE - 1] ^= 0x87; 42 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; local 71 memset(pad, 0, AES_BLOCK_SIZE); 72 crypto_cipher_encrypt_one(tfm, pad, pa [all...] |
/net/rxrpc/ |
H A D | ar-output.c | 673 size_t pad; local 675 /* pad out if we're using security */ 677 pad = conn->security_size + skb->mark; 678 pad = conn->size_align - pad; 679 pad &= conn->size_align - 1; 680 _debug("pad %zu", pad); 681 if (pad) 682 memset(skb_put(skb, pad), local [all...] |
H A D | ar-ack.c | 887 __be32 data, pad; local 1000 pad = 0; 1004 iov[2].iov_base = &pad; 1124 pad = 0; 1130 iov[3].iov_base = &pad;
|
/net/sunrpc/xprtrdma/ |
H A D | rpc_rdma.c | 119 * xdr pad bytes, saving the server an RDMA operation. */ 312 rpcrdma_inline_pullup(struct rpc_rqst *rqst, int pad) argument 328 pad -= (curlen + 36/*sizeof(struct rpcrdma_msg_padded)*/); 329 if (pad < 0 || rqst->rq_slen - curlen < RPCRDMA_INLINE_PAD_THRESH) 330 pad = 0; /* don't pad this request */ 332 dprintk("RPC: %s: pad %d destp 0x%p len %d hdrlen %d\n", 333 __func__, pad, destp, rqst->rq_slen, curlen); 369 return pad; 532 * then use a preregistered (and zeroed) pad buffe 610 rpcrdma_inline_fixup(struct rpc_rqst *rqst, char *srcp, int copy_len, int pad) argument [all...] |
/net/tipc/ |
H A D | msg.c | 282 u32 pad = start - bsz; local 294 if (unlikely(skb_tailroom(bbuf) < (pad + msz))) 299 skb_put(bbuf, pad + msz);
|
/net/ceph/ |
H A D | crypto.c | 175 char pad[16]; local 180 memset(pad, zero_padding, zero_padding); 186 sg_set_buf(&sg_in[1], pad, zero_padding); 201 print_hex_dump(KERN_ERR, "enc pad: ", DUMP_PREFIX_NONE, 16, 1, 202 pad, zero_padding, 1); 235 char pad[16]; local 240 memset(pad, zero_padding, zero_padding); 247 sg_set_buf(&sg_in[2], pad, zero_padding); 264 print_hex_dump(KERN_ERR, "enc pad: ", DUMP_PREFIX_NONE, 16, 1, 265 pad, zero_paddin 293 char pad[16]; local 358 char pad[16]; local [all...] |
/net/sunrpc/auth_gss/ |
H A D | gss_krb5_wrap.c | 69 u8 pad; local 73 pad = *(u8 *)(buf->head[0].iov_base + len - 1); 74 if (pad > buf->head[0].iov_len) 76 buf->head[0].iov_len -= pad; 86 pad = *(ptr + offset); 92 pad = *(u8 *)(buf->tail[0].iov_base + len - 1); 107 if (pad > blocksize) 109 if (buf->len > pad) 110 buf->len -= pad;
|
H A D | auth_gss.c | 1766 int pad; local 1814 pad = 3 - ((snd_buf->len - offset - 1) & 3); 1815 memset(p, 0, pad); 1816 iov->iov_len += pad; 1817 snd_buf->len += pad;
|
H A D | svcauth_gss.c | 873 fix_priv_head(struct xdr_buf *buf, int pad) argument 879 buf->head[0].iov_len -= pad; 887 int pad, saved_len, remaining_len, offset; local 903 pad = remaining_len - priv_len; 904 buf->len -= pad; 905 fix_priv_head(buf, pad); 911 pad = priv_len - buf->len; 913 buf->len -= pad; 924 fix_priv_head(buf, pad); 1631 int pad; local [all...] |
/net/atm/ |
H A D | br2684.c | 56 static const unsigned char pad[] = { PAD_BRIDGED }; variable 494 if (memcmp(skb->data, pad, BR2684_PAD_LEN) != 0)
|
/net/netfilter/ |
H A D | nft_compat.c | 121 int pad; local 124 pad = XT_ALIGN(t->targetsize) - t->targetsize; 125 if (pad > 0) 126 memset(out + t->targetsize, 0, pad); 328 int pad; local 331 pad = XT_ALIGN(m->matchsize) - m->matchsize; 332 if (pad > 0) 333 memset(out + m->matchsize, 0, pad);
|
H A D | x_tables.c | 495 int pad, off = xt_compat_match_offset(match); local 504 pad = XT_ALIGN(match->matchsize) - match->matchsize; 505 if (pad > 0) 506 memset(m->data + match->matchsize, 0, pad); 609 int pad, off = xt_compat_target_offset(target); local 618 pad = XT_ALIGN(target->targetsize) - target->targetsize; 619 if (pad > 0) 620 memset(t->data + target->targetsize, 0, pad);
|
/net/ipv6/ |
H A D | ndisc.c | 150 int pad = ndisc_addr_option_pad(skb->dev->type); local 158 memset(opt + 2, 0, pad); 159 opt += pad; 160 space -= pad;
|
H A D | addrconf.c | 4474 int pad = bytes - sizeof(u64) * items; local 4475 BUG_ON(pad < 0); 4482 memset(&stats[items], 0, pad); 4489 int pad = bytes - sizeof(u64) * items; local 4490 BUG_ON(pad < 0); 4497 memset(&stats[items], 0, pad);
|
/net/sunrpc/ |
H A D | xdr.c | 704 unsigned int pad = 4 - (len & 3); local 708 iov->iov_len += pad; 709 len += pad;
|
/net/bridge/netfilter/ |
H A D | ebtables.c | 1906 int off, pad = 0; local 1957 pad = XT_ALIGN(size_kern) - size_kern; 1959 if (pad > 0 && dst) { 1960 BUG_ON(state->buf_kern_len <= pad); 1961 BUG_ON(state->buf_kern_offset - (match_size + off) + size_kern > state->buf_kern_len - pad); 1962 memset(dst + size_kern, 0, pad);
|
/net/netfilter/ipvs/ |
H A D | ip_vs_sync.c | 633 unsigned int len, pe_name_len, pad; local 682 pad = 0; 686 pad = (4 - (size_t) buff->head) & 3; 688 if (buff->head + len + pad > buff->end || m->reserved) { 692 pad = 0; 708 buff->head += pad + len; 709 m->size = htons(ntohs(m->size) + pad + len); 711 while (pad--)
|
/net/core/ |
H A D | pktgen.c | 367 __u16 pad; /* pad out the hh struct to an even 16 bytes */ member in struct:pktgen_dev
|
H A D | skbuff.c | 1209 * skb_pad - zero pad the tail of an skb 1210 * @skb: buffer to pad 1211 * @pad: space to pad 1220 int skb_pad(struct sk_buff *skb, int pad) argument 1226 if (!skb_cloned(skb) && skb_tailroom(skb) >= pad) { 1227 memset(skb->data+skb->len, 0, pad); 1231 ntail = skb->data_len + pad - (skb->end - skb->tail); 1245 memset(skb->data + skb->len, 0, pad);
|