/third_party/vixl/examples/aarch32/ |
D | disasm-a32.cc | 279 for (SymbolTable::iterator sres = symbol_names.begin(); in main() local 280 sres != symbol_names.end(); in main() 281 sres++) { in main() 282 const Symbol& symbol = sres->second; in main() 286 SymbolTable::iterator next_func = sres; in main() 289 const Elf32_Shdr& shndx = shdr[sres->second.GetSection()]; in main() 290 func_size = (shndx.sh_offset + shndx.sh_size) - sres->first; in main() 292 func_size = next_func->first - sres->first; in main()
|
/third_party/lzma/CPP/7zip/Archive/ |
D | XzHandler.cpp | 372 SRes sres = _stat2_decode_SRes; in GetArchiveProperty() local 374 if (sres == SZ_ERROR_INPUT_EOF) v |= kpv_ErrorFlags_UnexpectedEnd; in GetArchiveProperty() 376 if (sres == SZ_ERROR_ARCHIVE) v |= kpv_ErrorFlags_HeadersError; in GetArchiveProperty() 377 if (sres == SZ_ERROR_UNSUPPORTED) v |= kpv_ErrorFlags_UnsupportedMethod; in GetArchiveProperty() 378 if (sres == SZ_ERROR_DATA) v |= kpv_ErrorFlags_DataError; in GetArchiveProperty() 379 if (sres == SZ_ERROR_CRC) v |= kpv_ErrorFlags_CrcError; in GetArchiveProperty() 1002 SRes sres = decoder.MainDecodeSRes; in Get_Extract_OperationResult() local 1003 if (sres == SZ_ERROR_NO_ARCHIVE) // (!IsArc) in Get_Extract_OperationResult() 1005 else if (sres == SZ_ERROR_INPUT_EOF) // (UnexpectedEnd) in Get_Extract_OperationResult() 1009 else if (sres == SZ_ERROR_CRC) // (CrcError) in Get_Extract_OperationResult() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_peer/ |
D | eap_sim.c | 27 u8 sres[3][EAP_SIM_SRES_LEN]; member 148 os_memset(data->sres, 0, 3 * EAP_SIM_SRES_LEN); in eap_sim_clear_keys() 220 if (hexstr2bin(pos, data->sres[i], EAP_SIM_SRES_LEN) < 0) in eap_sim_ext_sim_result() 223 data->sres[i], EAP_SIM_SRES_LEN); in eap_sim_ext_sim_result() 262 data->sres[0], data->kc[0]) || in eap_sim_gsm_auth() 264 data->sres[1], data->kc[1]) || in eap_sim_gsm_auth() 267 data->sres[2], data->kc[2]))) { in eap_sim_gsm_auth() 301 data->sres[i], data->kc[i])) { in eap_sim_gsm_auth() 310 data->sres[i], EAP_SIM_SRES_LEN); in eap_sim_gsm_auth() 334 os_memcpy(data->sres[i], "\xd1\xd2\xd3\xd4", in eap_sim_gsm_auth() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_peer/ |
D | eap_sim.c | 27 u8 sres[3][EAP_SIM_SRES_LEN]; member 150 os_memset(data->sres, 0, 3 * EAP_SIM_SRES_LEN); in eap_sim_clear_keys() 222 if (hexstr2bin(pos, data->sres[i], EAP_SIM_SRES_LEN) < 0) in eap_sim_ext_sim_result() 225 data->sres[i], EAP_SIM_SRES_LEN); in eap_sim_ext_sim_result() 264 data->sres[0], data->kc[0]) || in eap_sim_gsm_auth() 266 data->sres[1], data->kc[1]) || in eap_sim_gsm_auth() 269 data->sres[2], data->kc[2]))) { in eap_sim_gsm_auth() 303 data->sres[i], data->kc[i])) { in eap_sim_gsm_auth() 312 data->sres[i], EAP_SIM_SRES_LEN); in eap_sim_gsm_auth() 336 os_memcpy(data->sres[i], "\xd1\xd2\xd3\xd4", in eap_sim_gsm_auth() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/hostapd/ |
D | hlr_auc_gw.c | 75 u8 sres[4]; member 335 hexstr2bin(pos, g->sres, 4)) { in read_gsm_triplets() 617 u8 _rand[16], sres[4], kc[8]; in sim_req_auth() local 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in sim_req_auth() 625 rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4); in sim_req_auth() 643 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->sres, 4); in sim_req_auth() 684 u8 _rand[16], sres[4], kc[8]; in gsm_auth_req() local 688 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in gsm_auth_req() 692 rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4); in gsm_auth_req()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/hostapd/ |
D | hlr_auc_gw.c | 75 u8 sres[4]; member 335 hexstr2bin(pos, g->sres, 4)) { in read_gsm_triplets() 617 u8 _rand[16], sres[4], kc[8]; in sim_req_auth() local 621 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in sim_req_auth() 625 rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4); in sim_req_auth() 643 rpos += wpa_snprintf_hex(rpos, rend - rpos, g->sres, 4); in sim_req_auth() 684 u8 _rand[16], sres[4], kc[8]; in gsm_auth_req() local 688 gsm_milenage(m->opc, m->ki, _rand, sres, kc); in gsm_auth_req() 692 rpos += wpa_snprintf_hex(rpos, rend - rpos, sres, 4); in gsm_auth_req()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/crypto/ |
D | milenage.c | 235 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) in gsm_milenage() argument 247 os_memcpy(sres, res, 4); in gsm_milenage() 250 sres[i] = res[i] ^ res[i + 4]; in gsm_milenage()
|
D | milenage.h | 17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres,
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/crypto/ |
D | milenage.c | 235 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres, u8 *kc) in gsm_milenage() argument 247 os_memcpy(sres, res, 4); in gsm_milenage() 250 sres[i] = res[i] ^ res[i + 4]; in gsm_milenage()
|
D | milenage.h | 17 int gsm_milenage(const u8 *opc, const u8 *k, const u8 *_rand, u8 *sres,
|
/third_party/mesa3d/src/gallium/drivers/virgl/tests/ |
D | virgl_staging_mgr_test.cpp | 68 struct virgl_hw_res *sres) in fake_resource_reference() argument 72 if (pipe_reference(&(*dres)->reference, &sres->reference)) { in fake_resource_reference() 77 *dres = sres; in fake_resource_reference()
|
/third_party/python/Lib/logging/ |
D | handlers.py | 483 sres = os.fstat(self.stream.fileno()) 484 self.dev, self.ino = sres[ST_DEV], sres[ST_INO] 500 sres = os.stat(self.baseFilename) 502 sres = None 504 if not sres or sres[ST_DEV] != self.dev or sres[ST_INO] != self.ino:
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | pcsc_funcs.h | 20 unsigned char *sres, unsigned char *kc);
|
D | pcsc_funcs.c | 1242 unsigned char *sres, unsigned char *kc) in scard_gsm_auth() argument 1295 os_memcpy(sres, buf, 4); in scard_gsm_auth() 1309 os_memcpy(sres, buf + 1, 4); in scard_gsm_auth() 1313 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - SRES", sres, 4); in scard_gsm_auth()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | pcsc_funcs.h | 20 unsigned char *sres, unsigned char *kc);
|
D | pcsc_funcs.c | 1242 unsigned char *sres, unsigned char *kc) in scard_gsm_auth() argument 1295 os_memcpy(sres, buf, 4); in scard_gsm_auth() 1309 os_memcpy(sres, buf + 1, 4); in scard_gsm_auth() 1313 wpa_hexdump(MSG_DEBUG, "SCARD: GSM auth - SRES", sres, 4); in scard_gsm_auth()
|
/third_party/lzma/C/ |
D | MtDec.c | 1095 SRes sres; in MtDec_Code() local 1112 sres = MY_SRes_HRESULT_FROM_WRes(wres); in MtDec_Code() 1114 if (sres != 0) in MtDec_Code() 1115 p->threadingErrorSRes = sres; in MtDec_Code() 1134 return sres; in MtDec_Code()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/wpa_supplicant/ |
D | notify.c | 317 char* sim_params[] = {":", vecParams.kc, ":", vecParams.sres}; in send_network_eapsim_gsmauth_response_internal() 348 os_memcpy(params.sres, eapsim_params.sres, os_strlen(eapsim_params.sres)); in wpas_send_network_eapsim_gsmauth_response_internal() 350 "kc=%s sres=%s, ssid->id=%d", params.kc, params.sres, ssid->id); in wpas_send_network_eapsim_gsmauth_response_internal()
|
D | eapol_test.c | 1068 unsigned char sres[4]; in scard_test() local 1111 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1115 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1176 unsigned char sres[4]; in scard_get_triplets() local 1211 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_get_triplets() 1222 printf("%02X", sres[j]); in scard_get_triplets()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres,
|
D | eap_sim_db.c | 45 u8 sres[EAP_SIM_MAX_CHAL][EAP_SIM_SRES_LEN]; member 505 if (hexstr2bin(start, entry->u.sim.sres[num_chal], in eap_sim_db_sim_resp_auth() 927 u8 *_rand, u8 *kc, u8 *sres, in eap_sim_db_get_gsm_triplets() argument 969 os_memcpy(sres, entry->u.sim.sres, in eap_sim_db_get_gsm_triplets()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_sim_db.h | 42 u8 *_rand, u8 *kc, u8 *sres,
|
D | eap_sim_db.c | 45 u8 sres[EAP_SIM_MAX_CHAL][EAP_SIM_SRES_LEN]; member 505 if (hexstr2bin(start, entry->u.sim.sres[num_chal], in eap_sim_db_sim_resp_auth() 927 u8 *_rand, u8 *kc, u8 *sres, in eap_sim_db_get_gsm_triplets() argument 969 os_memcpy(sres, entry->u.sim.sres, in eap_sim_db_get_gsm_triplets()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/wpa_supplicant/ |
D | eapol_test.c | 1069 unsigned char sres[4]; in scard_test() local 1112 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1116 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_test() 1177 unsigned char sres[4]; in scard_get_triplets() local 1212 if (scard_gsm_auth(scard, _rand, sres, kc)) in scard_get_triplets() 1223 printf("%02X", sres[j]); in scard_get_triplets()
|
/third_party/skia/third_party/externals/icu/source/data/brkitr/ |
D | es.txt | 128 "sres.",
|