/osnet-11/usr/src/grub/grub2/grub-core/disk/ |
H A D | AFSplitter.c | 39 int padding = size % hash->mdlen; local 55 if (padding) 59 grub_memcpy (temp + sizeof (IV), src + hash->mdlen * i, padding); 60 grub_crypto_hash (hash, final, temp, sizeof (IV) + padding); 61 grub_memcpy (dst + hash->mdlen * i, final, padding);
|
/osnet-11/usr/src/grub/grub2/include/grub/ |
H A D | kernel.h | 59 grub_uint32_t padding; member in struct:grub_module_info64
|
H A D | mm_private.h | 34 char padding[4]; member in struct:grub_mm_header 36 char padding[8]; member in struct:grub_mm_header
|
/osnet-11/usr/src/lib/libcurses/screen/ |
H A D | cexpand.c | 57 * Remove the padding sequences from the input string. 58 * Return the new string without the padding sequences 59 * and the padding itself in padbuffer. 62 *rmpadding(char *str, char *padbuffer, int *padding) argument 74 if (padding) 75 *padding = 0; 109 /* Termcap does not support mandatory padding */ 115 "padding removed\n", 119 /* oops, not a padding spec after all */ 127 /* Flag padding inf [all...] |
/osnet-11/usr/src/lib/libfuse/common/ |
H A D | fuse_common.h | 69 unsigned int padding : 29; member in struct:fuse_file_info
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/crypto/ |
H A D | aead.c | 283 /* Use empty padding since tokens don't indicate the padding length. */ 303 unsigned int header, padding; local 308 * encrypted, but that's okay since it has no padding. If there is ever an 315 padding = ktp->crypto_length(ktp, KRB5_CRYPTO_TYPE_PADDING); 316 if (padding == 0 || (data_length % padding) == 0) 319 return padding - (data_length % padding);
|
/osnet-11/usr/src/lib/pkcs11/pkcs11_softtoken/common/ |
H A D | softASN1.c | 64 * Add one leading byte of zero-padding only in these cases to ensure 70 int padding; local 88 padding = (src->big_value[0] < 0x80) ? 0 : 1; 89 dst->big_value_len = src->big_value_len + padding; 97 (void) memcpy(&(dst->big_value[padding]), src->big_value, 103 * Sometimes there is one bytes of zero-padding, if a big integer may 106 * of zero-padding in those cases from the decoded octet strings.
|
/osnet-11/usr/src/lib/libparted/common/libparted/fs/reiserfs/ |
H A D | reiserfs.h | 52 char padding[438]; member in struct:reiserfs_super_block
|
/osnet-11/usr/src/lib/libparted/common/libparted/fs/linux_swap/ |
H A D | linux_swap.c | 54 uint32_t padding[117]; member in struct:__anon2247
|
/osnet-11/usr/src/lib/libntfs/common/libntfs/ |
H A D | crypto.c | 589 size_t size, padding; local 646 * Finally, remove the PKCS#1 padding and return the size of the 649 padding = strnlen((char *)fek, size) + 1; 650 if (padding > size) { 651 ntfs_log_error("Failed to remove PKCS#1 padding from " 655 size -= padding; 656 memmove(fek, fek + padding, size);
|
/osnet-11/usr/src/lib/libparted/common/libparted/labels/ |
H A D | sun.c | 91 u_int16_t padding; /* Alignment padding */ member in struct:_SunRawLabel
|
H A D | mac.c | 58 * Apple_Void padding for iso9660 133 uint16_t padding[3]; /* pad to 512 bytes */ member in struct:_MacRawDisk
|
/osnet-11/usr/src/lib/libmtmalloc/common/ |
H A D | mtmalloc.c | 915 size_t padding; local 1108 padding = ALIGN(newbrk, HUNKSIZE) - newbrk; 1110 if (padding > 0 && (uintptr_t)sbrk(padding) != newbrk) {
|
/osnet-11/usr/src/lib/sasl_plugins/digestmd5/ |
H A D | digestmd5.c | 759 int padding, p; local 769 /* now chop off the padding */ 770 padding = output[inputlen - 11]; 771 if (padding < 1 || padding > 8) { 772 /* invalid padding length */ 775 /* verify all padding is correct */ 776 for (p = 1; p <= padding; p++) { 777 if (output[inputlen - 10 - p] != padding) { 782 /* chop off the padding */ 880 int p, padding = 0; local 1567 int padding, p; local [all...] |
/osnet-11/usr/src/grub/grub2/include/grub/efi/ |
H A D | api.h | 371 /* XXX although the spec does not specify the padding, this actually 372 must have the padding! */ 376 grub_efi_uint32_t padding; member in struct:grub_efi_memory_descriptor
|