/external/dropbear/libtomcrypt/src/headers/ |
D | tomcrypt_hash.h | 5 unsigned long curlen; member 13 ulong32 state[8], curlen; member 21 ulong32 state[5], curlen; member 29 ulong32 state[4], curlen; member 37 ulong32 state[4], curlen; member 45 unsigned long curlen; member 53 unsigned long curlen; member 61 ulong32 curlen, state[4]; member 69 ulong32 curlen, state[5]; member 77 ulong32 curlen, state[8]; member [all …]
|
/external/wpa_supplicant/ |
D | sha256.c | 161 u32 state[8], curlen; member 276 md->curlen = 0; in sha256_init() 301 if (md->curlen > sizeof(md->buf)) in sha256_process() 305 if (md->curlen == 0 && inlen >= block_size) { in sha256_process() 312 n = MIN(inlen, (block_size - md->curlen)); in sha256_process() 313 memcpy(md->buf + md->curlen, in, n); in sha256_process() 314 md->curlen += n; in sha256_process() 317 if (md->curlen == block_size) { in sha256_process() 321 md->curlen = 0; in sha256_process() 340 if (md->curlen >= sizeof(md->buf)) in sha256_done() [all …]
|
/external/dropbear/libtomcrypt/src/hashes/ |
D | md2.c | 109 md->md2.curlen = 0; in md2_init() 125 if (md-> md2 .curlen > sizeof(md-> md2 .buf)) { in md2_process() 129 n = MIN(inlen, (16 - md->md2.curlen)); in md2_process() 130 XMEMCPY(md->md2.buf + md->md2.curlen, in, (size_t)n); in md2_process() 131 md->md2.curlen += n; in md2_process() 136 if (md->md2.curlen == 16) { in md2_process() 139 md->md2.curlen = 0; in md2_process() 158 if (md->md2.curlen >= sizeof(md->md2.buf)) { in md2_done() 164 k = 16 - md->md2.curlen; in md2_done() 165 for (i = md->md2.curlen; i < 16; i++) { in md2_done()
|
D | sha1.c | 173 md->sha1.curlen = 0; in sha1_init() 200 if (md->sha1.curlen >= sizeof(md->sha1.buf)) { in sha1_done() 205 md->sha1.length += md->sha1.curlen * 8; in sha1_done() 208 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0x80; in sha1_done() 214 if (md->sha1.curlen > 56) { in sha1_done() 215 while (md->sha1.curlen < 64) { in sha1_done() 216 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done() 219 md->sha1.curlen = 0; in sha1_done() 223 while (md->sha1.curlen < 56) { in sha1_done() 224 md->sha1.buf[md->sha1.curlen++] = (unsigned char)0; in sha1_done()
|
D | md4.c | 182 md->md4.curlen = 0; in md4_init() 208 if (md->md4.curlen >= sizeof(md->md4.buf)) { in md4_done() 213 md->md4.length += md->md4.curlen * 8; in md4_done() 216 md->md4.buf[md->md4.curlen++] = (unsigned char)0x80; in md4_done() 222 if (md->md4.curlen > 56) { in md4_done() 223 while (md->md4.curlen < 64) { in md4_done() 224 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done() 227 md->md4.curlen = 0; in md4_done() 231 while (md->md4.curlen < 56) { in md4_done() 232 md->md4.buf[md->md4.curlen++] = (unsigned char)0; in md4_done()
|
D | md5.c | 240 md->md5.curlen = 0; in md5_init() 267 if (md->md5.curlen >= sizeof(md->md5.buf)) { in md5_done() 273 md->md5.length += md->md5.curlen * 8; in md5_done() 276 md->md5.buf[md->md5.curlen++] = (unsigned char)0x80; in md5_done() 282 if (md->md5.curlen > 56) { in md5_done() 283 while (md->md5.curlen < 64) { in md5_done() 284 md->md5.buf[md->md5.curlen++] = (unsigned char)0; in md5_done() 287 md->md5.curlen = 0; in md5_done() 291 while (md->md5.curlen < 56) { in md5_done() 292 md->md5.buf[md->md5.curlen++] = (unsigned char)0; in md5_done()
|
D | rmd128.c | 279 md->rmd128.curlen = 0; in rmd128_init() 306 if (md->rmd128.curlen >= sizeof(md->rmd128.buf)) { in rmd128_done() 312 md->rmd128.length += md->rmd128.curlen * 8; in rmd128_done() 315 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0x80; in rmd128_done() 321 if (md->rmd128.curlen > 56) { in rmd128_done() 322 while (md->rmd128.curlen < 64) { in rmd128_done() 323 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0; in rmd128_done() 326 md->rmd128.curlen = 0; in rmd128_done() 330 while (md->rmd128.curlen < 56) { in rmd128_done() 331 md->rmd128.buf[md->rmd128.curlen++] = (unsigned char)0; in rmd128_done()
|
D | rmd256.c | 292 md->rmd256.curlen = 0; in rmd256_init() 319 if (md->rmd256.curlen >= sizeof(md->rmd256.buf)) { in rmd256_done() 325 md->rmd256.length += md->rmd256.curlen * 8; in rmd256_done() 328 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0x80; in rmd256_done() 334 if (md->rmd256.curlen > 56) { in rmd256_done() 335 while (md->rmd256.curlen < 64) { in rmd256_done() 336 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0; in rmd256_done() 339 md->rmd256.curlen = 0; in rmd256_done() 343 while (md->rmd256.curlen < 56) { in rmd256_done() 344 md->rmd256.buf[md->rmd256.curlen++] = (unsigned char)0; in rmd256_done()
|
D | tiger.c | 664 md->tiger.curlen = 0; in tiger_init() 689 if (md->tiger.curlen >= sizeof(md->tiger.buf)) { in tiger_done() 694 md->tiger.length += md->tiger.curlen * 8; in tiger_done() 697 md->tiger.buf[md->tiger.curlen++] = (unsigned char)0x01; in tiger_done() 702 if (md->tiger.curlen > 56) { in tiger_done() 703 while (md->tiger.curlen < 64) { in tiger_done() 704 md->tiger.buf[md->tiger.curlen++] = (unsigned char)0; in tiger_done() 707 md->tiger.curlen = 0; in tiger_done() 711 while (md->tiger.curlen < 56) { in tiger_done() 712 md->tiger.buf[md->tiger.curlen++] = (unsigned char)0; in tiger_done()
|
D | rmd160.c | 338 md->rmd160.curlen = 0; in rmd160_init() 365 if (md->rmd160.curlen >= sizeof(md->rmd160.buf)) { in rmd160_done() 371 md->rmd160.length += md->rmd160.curlen * 8; in rmd160_done() 374 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0x80; in rmd160_done() 380 if (md->rmd160.curlen > 56) { in rmd160_done() 381 while (md->rmd160.curlen < 64) { in rmd160_done() 382 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0; in rmd160_done() 385 md->rmd160.curlen = 0; in rmd160_done() 389 while (md->rmd160.curlen < 56) { in rmd160_done() 390 md->rmd160.buf[md->rmd160.curlen++] = (unsigned char)0; in rmd160_done()
|
/external/dropbear/libtomcrypt/src/hashes/whirl/ |
D | whirl.c | 157 if (md->whirlpool.curlen >= sizeof(md->whirlpool.buf)) { in whirlpool_done() 162 md->whirlpool.length += md->whirlpool.curlen * 8; in whirlpool_done() 165 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0x80; in whirlpool_done() 171 if (md->whirlpool.curlen > 32) { in whirlpool_done() 172 while (md->whirlpool.curlen < 64) { in whirlpool_done() 173 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0; in whirlpool_done() 176 md->whirlpool.curlen = 0; in whirlpool_done() 180 while (md->whirlpool.curlen < 56) { in whirlpool_done() 181 md->whirlpool.buf[md->whirlpool.curlen++] = (unsigned char)0; in whirlpool_done()
|
/external/dropbear/libtomcrypt/src/hashes/chc/ |
D | chc.c | 120 md->chc.curlen = 0; in chc_init() 208 if (md->chc.curlen >= sizeof(md->chc.buf)) { in chc_done() 213 md->chc.length += md->chc.curlen * 8; in chc_done() 216 md->chc.buf[md->chc.curlen++] = (unsigned char)0x80; in chc_done() 222 if (md->chc.curlen > (unsigned long)(cipher_blocksize - 8)) { in chc_done() 223 while (md->chc.curlen < (unsigned long)cipher_blocksize) { in chc_done() 224 md->chc.buf[md->chc.curlen++] = (unsigned char)0; in chc_done() 227 md->chc.curlen = 0; in chc_done() 231 while (md->chc.curlen < (unsigned long)(cipher_blocksize - 8)) { in chc_done() 232 md->chc.buf[md->chc.curlen++] = (unsigned char)0; in chc_done()
|
/external/dropbear/libtomcrypt/src/hashes/sha2/ |
D | sha512.c | 178 md->sha512.curlen = 0; in sha512_init() 213 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha512_done() 218 md->sha512.length += md->sha512.curlen * CONST64(8); in sha512_done() 221 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0x80; in sha512_done() 227 if (md->sha512.curlen > 112) { in sha512_done() 228 while (md->sha512.curlen < 128) { in sha512_done() 229 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done() 232 md->sha512.curlen = 0; in sha512_done() 239 while (md->sha512.curlen < 120) { in sha512_done() 240 md->sha512.buf[md->sha512.curlen++] = (unsigned char)0; in sha512_done()
|
D | sha256.c | 210 md->sha256.curlen = 0; in sha256_init() 245 if (md->sha256.curlen >= sizeof(md->sha256.buf)) { in sha256_done() 251 md->sha256.length += md->sha256.curlen * 8; in sha256_done() 254 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0x80; in sha256_done() 260 if (md->sha256.curlen > 56) { in sha256_done() 261 while (md->sha256.curlen < 64) { in sha256_done() 262 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0; in sha256_done() 265 md->sha256.curlen = 0; in sha256_done() 269 while (md->sha256.curlen < 56) { in sha256_done() 270 md->sha256.buf[md->sha256.curlen++] = (unsigned char)0; in sha256_done()
|
D | sha384.c | 43 md->sha512.curlen = 0; in sha384_init() 69 if (md->sha512.curlen >= sizeof(md->sha512.buf)) { in sha384_done()
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
D | xcbc_memory_multi.c | 42 unsigned long curlen; in xcbc_memory_multi() local 61 curlen = inlen; in xcbc_memory_multi() 64 if ((err = xcbc_process(xcbc, curptr, curlen)) != CRYPT_OK) { in xcbc_memory_multi() 72 curlen = va_arg(args, unsigned long); in xcbc_memory_multi()
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
D | hmac_memory_multi.c | 43 unsigned long curlen; in hmac_memory_multi() local 62 curlen = inlen; in hmac_memory_multi() 65 if ((err = hmac_process(hmac, curptr, curlen)) != CRYPT_OK) { in hmac_memory_multi() 73 curlen = va_arg(args, unsigned long); in hmac_memory_multi()
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
D | f9_memory_multi.c | 42 unsigned long curlen; in f9_memory_multi() local 61 curlen = inlen; in f9_memory_multi() 64 if ((err = f9_process(f9, curptr, curlen)) != CRYPT_OK) { in f9_memory_multi() 72 curlen = va_arg(args, unsigned long); in f9_memory_multi()
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
D | omac_memory_multi.c | 42 unsigned long curlen; in omac_memory_multi() local 61 curlen = inlen; in omac_memory_multi() 64 if ((err = omac_process(omac, curptr, curlen)) != CRYPT_OK) { in omac_memory_multi() 72 curlen = va_arg(args, unsigned long); in omac_memory_multi()
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
D | pmac_memory_multi.c | 42 unsigned long curlen; in pmac_memory_multi() local 60 curlen = inlen; in pmac_memory_multi() 63 if ((err = pmac_process(pmac, curptr, curlen)) != CRYPT_OK) { in pmac_memory_multi() 71 curlen = va_arg(args, unsigned long); in pmac_memory_multi()
|
/external/dropbear/libtomcrypt/src/hashes/helper/ |
D | hash_memory_multi.c | 35 unsigned long curlen; in hash_memory_multi() local 61 curlen = inlen; in hash_memory_multi() 64 if ((err = hash_descriptor[hash].process(md, curptr, curlen)) != CRYPT_OK) { in hash_memory_multi() 72 curlen = va_arg(args, unsigned long); in hash_memory_multi()
|
/external/zlib/ |
D | trees.c | 714 int curlen; /* length of current code */ local 724 curlen = nextlen; nextlen = tree[n+1].Len; 725 if (++count < max_count && curlen == nextlen) { 728 s->bl_tree[curlen].Freq += count; 729 } else if (curlen != 0) { 730 if (curlen != prevlen) s->bl_tree[curlen].Freq++; 737 count = 0; prevlen = curlen; 740 } else if (curlen == nextlen) { 759 int curlen; /* length of current code */ local 769 curlen = nextlen; nextlen = tree[n+1].Len; [all …]
|
/external/qemu/distrib/zlib-1.2.3/ |
D | trees.c | 714 int curlen; /* length of current code */ local 724 curlen = nextlen; nextlen = tree[n+1].Len; 725 if (++count < max_count && curlen == nextlen) { 728 s->bl_tree[curlen].Freq += count; 729 } else if (curlen != 0) { 730 if (curlen != prevlen) s->bl_tree[curlen].Freq++; 737 count = 0; prevlen = curlen; 740 } else if (curlen == nextlen) { 759 int curlen; /* length of current code */ local 769 curlen = nextlen; nextlen = tree[n+1].Len; [all …]
|
/external/webkit/WebCore/platform/image-decoders/zlib/ |
D | trees.c | 714 int curlen; /* length of current code */ local 724 curlen = nextlen; nextlen = tree[n+1].Len; 725 if (++count < max_count && curlen == nextlen) { 728 s->bl_tree[curlen].Freq += count; 729 } else if (curlen != 0) { 730 if (curlen != prevlen) s->bl_tree[curlen].Freq++; 737 count = 0; prevlen = curlen; 740 } else if (curlen == nextlen) { 759 int curlen; /* length of current code */ local 769 curlen = nextlen; nextlen = tree[n+1].Len; [all …]
|
/external/bluez/utils/common/ |
D | sdp-glib.c | 96 int curlen = strlen(ctx_data->stack_head->text); in element_start() local 100 while ((curlen + 1 + attrlen) > ctx_data->stack_head->size) { in element_start() 104 memcpy(ctx_data->stack_head->text + curlen, in element_start() 106 ctx_data->stack_head->text[curlen + attrlen] = '\0'; in element_start()
|