/external/ipsec-tools/src/racoon/missing/crypto/rijndael/ |
D | rijndael-api-fst.h | 54 u_int8_t direction; /* Key used for encrypting or decrypting? */ 61 u_int8_t xkS8[RIJNDAEL_MAXROUNDS+1][4][4]; /* key schedule */ 69 u_int8_t mode; /* MODE_ECB, MODE_CBC, or MODE_CFB1 */ 70 u_int8_t IV[MAX_IV_SIZE]; /* A possible Initialization Vector for ciphering */ 84 int rijndael_makeKey(keyInstance *key, u_int8_t direction, int keyLen, char *keyMaterial); 86 int rijndael_cipherInit(cipherInstance *cipher, u_int8_t mode, char *IV); 89 u_int8_t *input, int inputLen, u_int8_t *outBuffer); 92 u_int8_t *input, int inputOctets, u_int8_t *outBuffer); 95 u_int8_t *input, int inputLen, u_int8_t *outBuffer); 98 u_int8_t *input, int inputOctets, u_int8_t *outBuffer); [all …]
|
D | rijndael-alg-fst.h | 19 int rijndaelKeySched(u_int8_t k[RIJNDAEL_MAXKC][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int RO… 21 int rijndaelKeyEncToDec(u_int8_t W[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS); 23 int rijndaelEncrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int RO… 26 int rijndaelEncryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int… 29 int rijndaelDecrypt(u_int8_t a[16], u_int8_t b[16], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int RO… 32 int rijndaelDecryptRound(u_int8_t a[4][4], u_int8_t rk[RIJNDAEL_MAXROUNDS+1][4][4], int ROUNDS, int…
|
D | rijndael_local.h | 6 typedef u_int8_t BYTE; 7 typedef u_int8_t word8;
|
/external/ipsec-tools/src/racoon/ |
D | isakmp.h | 67 u_int8_t np; /* Next Payload Type */ 68 u_int8_t v; 69 u_int8_t etype; /* Exchange Type */ 70 u_int8_t flags; /* Flags */ 158 u_int8_t np; /* Next Payload */ 159 u_int8_t reserved; /* RESERVED, unused, must set to 0 */ 204 u_int8_t p_no; /* Proposal # */ 205 u_int8_t proto_id; /* Protocol */ 206 u_int8_t spi_size; /* SPI Size */ 207 u_int8_t num_t; /* Number of Transforms */ [all …]
|
D | handler.h | 129 u_int8_t version; /* ISAKMP version */ 130 u_int8_t etype; /* Exchange type actually for use */ 131 u_int8_t flags; /* Flags */ 202 u_int8_t dpd_fails; /* number of failures */ 260 u_int8_t side; /* INITIATOR or RESPONDER */ 279 u_int8_t satype; /* satype in PF_KEY */ 285 u_int8_t flags; /* Flags for phase 2 */ 415 u_int8_t version; 416 u_int8_t etype;
|
D | admin.h | 97 u_int8_t prefs; 98 u_int8_t prefd; 99 u_int8_t ul_proto; 100 u_int8_t reserved;
|
D | policy.h | 43 u_int8_t ctx_doi; /* Security Context DOI */ 44 u_int8_t ctx_alg; /* Security Context Algorithm */ 61 u_int8_t dir; /* direction of packet flow, see blow */ 64 u_int8_t prefs; /* prefix length in bits for src */ 65 u_int8_t prefd; /* prefix length in bits for dst */ 93 u_int8_t mode; /* mode of protocol, see ipsec.h */
|
/external/openssh/openbsd-compat/ |
D | sha2.h | 72 u_int8_t buffer[SHA512_BLOCK_LENGTH]; 78 void SHA224Transform(u_int32_t state[8], const u_int8_t [SHA224_BLOCK_LENGTH]); 79 void SHA224Update(SHA2_CTX *, const u_int8_t *, size_t) 82 void SHA224Final(u_int8_t [SHA224_DIGEST_LENGTH], SHA2_CTX *) 90 char *SHA224Data(const u_int8_t *, size_t, char *) 97 void SHA256Transform(u_int32_t state[8], const u_int8_t [SHA256_BLOCK_LENGTH]); 98 void SHA256Update(SHA2_CTX *, const u_int8_t *, size_t) 101 void SHA256Final(u_int8_t [SHA256_DIGEST_LENGTH], SHA2_CTX *) 109 char *SHA256Data(const u_int8_t *, size_t, char *) 116 void SHA384Transform(u_int64_t state[8], const u_int8_t [SHA384_BLOCK_LENGTH]); [all …]
|
D | blf.h | 67 void Blowfish_expand0state(blf_ctx *, const u_int8_t *, u_int16_t); 69 (blf_ctx *, const u_int8_t *, u_int16_t, const u_int8_t *, u_int16_t); 73 void blf_key(blf_ctx *, const u_int8_t *, u_int16_t); 77 void blf_ecb_encrypt(blf_ctx *, u_int8_t *, u_int32_t); 78 void blf_ecb_decrypt(blf_ctx *, u_int8_t *, u_int32_t); 80 void blf_cbc_encrypt(blf_ctx *, u_int8_t *, u_int8_t *, u_int32_t); 81 void blf_cbc_decrypt(blf_ctx *, u_int8_t *, u_int8_t *, u_int32_t); 84 u_int32_t Blowfish_stream2word(const u_int8_t *, u_int16_t , u_int16_t *);
|
D | bcrypt_pbkdf.c | 70 bcrypt_hash(u_int8_t *sha2pass, u_int8_t *sha2salt, u_int8_t *out) in bcrypt_hash() 73 u_int8_t ciphertext[BCRYPT_HASHSIZE] = in bcrypt_hash() 111 bcrypt_pbkdf(const char *pass, size_t passlen, const u_int8_t *salt, size_t saltlen, in bcrypt_pbkdf() 112 u_int8_t *key, size_t keylen, unsigned int rounds) in bcrypt_pbkdf() 114 u_int8_t sha2pass[SHA512_DIGEST_LENGTH]; in bcrypt_pbkdf() 115 u_int8_t sha2salt[SHA512_DIGEST_LENGTH]; in bcrypt_pbkdf() 116 u_int8_t out[BCRYPT_HASHSIZE]; in bcrypt_pbkdf() 117 u_int8_t tmpout[BCRYPT_HASHSIZE]; in bcrypt_pbkdf() 118 u_int8_t *countsalt; in bcrypt_pbkdf()
|
D | md5.h | 27 u_int8_t buffer[MD5_BLOCK_LENGTH]; /* input buffer */ 31 void MD5Update(MD5_CTX *, const u_int8_t *, size_t) 34 void MD5Final(u_int8_t [MD5_DIGEST_LENGTH], MD5_CTX *) 36 void MD5Transform(u_int32_t [4], const u_int8_t [MD5_BLOCK_LENGTH]) 45 char *MD5Data(const u_int8_t *, size_t, char *)
|
D | sha1.h | 21 u_int8_t buffer[SHA1_BLOCK_LENGTH]; 26 void SHA1Transform(u_int32_t [5], const u_int8_t [SHA1_BLOCK_LENGTH]) 29 void SHA1Update(SHA1_CTX *, const u_int8_t *, size_t) 31 void SHA1Final(u_int8_t [SHA1_DIGEST_LENGTH], SHA1_CTX *) 39 char *SHA1Data(const u_int8_t *, size_t, char *)
|
D | blowfish.c | 403 Blowfish_stream2word(const u_int8_t *data, u_int16_t databytes, in Blowfish_stream2word() 406 u_int8_t i; in Blowfish_stream2word() 424 Blowfish_expand0state(blf_ctx *c, const u_int8_t *key, u_int16_t keybytes) in Blowfish_expand0state() 462 Blowfish_expandstate(blf_ctx *c, const u_int8_t *data, u_int16_t databytes, in Blowfish_expandstate() 463 const u_int8_t *key, u_int16_t keybytes) in Blowfish_expandstate() 505 blf_key(blf_ctx *c, const u_int8_t *k, u_int16_t len) in blf_key() 541 blf_ecb_encrypt(blf_ctx *c, u_int8_t *data, u_int32_t len) in blf_ecb_encrypt() 563 blf_ecb_decrypt(blf_ctx *c, u_int8_t *data, u_int32_t len) in blf_ecb_decrypt() 585 blf_cbc_encrypt(blf_ctx *c, u_int8_t *iv, u_int8_t *data, u_int32_t len) in blf_cbc_encrypt() 610 blf_cbc_decrypt(blf_ctx *c, u_int8_t *iva, u_int8_t *data, u_int32_t len) in blf_cbc_decrypt() [all …]
|
D | sha1.c | 49 u_int8_t c[64]; 57 SHA1Transform(u_int32_t state[5], const u_int8_t buffer[SHA1_BLOCK_LENGTH]) in SHA1Transform() 60 u_int8_t workspace[SHA1_BLOCK_LENGTH]; in SHA1Transform() 129 SHA1Update(SHA1_CTX *context, const u_int8_t *data, size_t len) in SHA1Update() 139 SHA1Transform(context->state, (u_int8_t *)&data[i]); in SHA1Update() 155 u_int8_t finalcount[8]; in SHA1Pad() 159 finalcount[i] = (u_int8_t)((context->count >> in SHA1Pad() 162 SHA1Update(context, (u_int8_t *)"\200", 1); in SHA1Pad() 164 SHA1Update(context, (u_int8_t *)"\0", 1); in SHA1Pad() 170 SHA1Final(u_int8_t digest[SHA1_DIGEST_LENGTH], SHA1_CTX *context) in SHA1Final() [all …]
|
/external/ipsec-tools/src/racoon/missing/crypto/sha2/ |
D | sha2.h | 66 typedef unsigned char u_int8_t; /* 1-byte (8-bits) */ 106 u_int8_t buffer[SHA256_BLOCK_LENGTH]; 111 u_int8_t buffer[SHA512_BLOCK_LENGTH]; 124 void SHA256_Update __P((SHA256_CTX*, const u_int8_t*, size_t)); 125 void SHA256_Final __P((u_int8_t[SHA256_DIGEST_LENGTH], SHA256_CTX*)); 128 char* SHA256_Data __P((const u_int8_t*, size_t, char[SHA256_DIGEST_STRING_LENGTH])); 132 void SHA384_Update __P((SHA384_CTX*, const u_int8_t*, size_t)); 133 void SHA384_Final __P((u_int8_t[SHA384_DIGEST_LENGTH], SHA384_CTX*)); 136 char* SHA384_Data __P((const u_int8_t*, size_t, char[SHA384_DIGEST_STRING_LENGTH])); 140 void SHA512_Update __P((SHA512_CTX*, const u_int8_t*, size_t)); [all …]
|
/external/iproute2/include/netinet/ |
D | tcp.h | 70 u_int8_t th_x2:4; /* (unused) */ 71 u_int8_t th_off:4; /* data offset */ 74 u_int8_t th_off:4; /* data offset */ 75 u_int8_t th_x2:4; /* (unused) */ 77 u_int8_t th_flags; 189 u_int8_t tcpi_state; 190 u_int8_t tcpi_ca_state; 191 u_int8_t tcpi_retransmits; 192 u_int8_t tcpi_probes; 193 u_int8_t tcpi_backoff; [all …]
|
/external/newfs_msdos/ |
D | mkfs_msdos.c | 100 (p) = (u_int8_t)(x) 103 (p)[0] = (u_int8_t)(x), \ 104 (p)[1] = (u_int8_t)((x) >> 010) 107 (p)[0] = (u_int8_t)(x), \ 108 (p)[1] = (u_int8_t)((x) >> 010), \ 109 (p)[2] = (u_int8_t)((x) >> 020), \ 110 (p)[3] = (u_int8_t)((x) >> 030) 113 u_int8_t bsJump[3]; /* bootstrap entry point */ 114 u_int8_t bsOemName[8]; /* OEM name and version */ 118 u_int8_t bpbBytesPerSec[2]; /* bytes per sector */ [all …]
|
/external/openssh/ |
D | dns.c | 80 dns_read_key(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_key() 147 dns_read_rdata(u_int8_t *algorithm, u_int8_t *digest_type, in dns_read_rdata() 215 u_int8_t hostkey_algorithm; in verify_host_key_dns() 216 u_int8_t hostkey_digest_type = SSHFP_HASH_RESERVED; in verify_host_key_dns() 220 u_int8_t dnskey_algorithm; in verify_host_key_dns() 221 u_int8_t dnskey_digest_type; in verify_host_key_dns() 333 u_int8_t rdata_pubkey_algorithm = 0; in export_dns_rr() 334 u_int8_t rdata_digest_type = SSHFP_HASH_RESERVED; in export_dns_rr() 335 u_int8_t dtype; in export_dns_rr()
|
/external/libnfnetlink/include/libnfnetlink/ |
D | libnfnetlink.h | 75 u_int8_t, u_int8_t, 78 u_int8_t, u_int8_t, 98 unsigned int, u_int8_t, u_int16_t, u_int16_t, 113 u_int8_t type, struct nfnl_callback *cb); 114 extern int nfnl_callback_unregister(struct nfnl_subsys_handle *, u_int8_t type); 190 extern int nfnl_addattr8(struct nlmsghdr *, int, int, u_int8_t);
|
/external/wpa_supplicant_8/src/drivers/ |
D | driver_wired.c | 60 u_int8_t op; 61 u_int8_t htype; 62 u_int8_t hlen; 63 u_int8_t hops; 71 u_int8_t chaddr[16]; 72 u_int8_t sname[64]; 73 u_int8_t file[128]; 75 u_int8_t options[308]; /* 312 - cookie */
|
/external/iproute2/lib/ |
D | ipx_pton.c | 34 static int ipx_getnode(u_int8_t *node, const char *str) in ipx_getnode() 42 node[i] = (u_int8_t)tmp; in ipx_getnode() 46 node[i] |= (u_int8_t)tmp; in ipx_getnode()
|
/external/usrsctp/usrsctplib/ |
D | user_ip6_var.h | 69 u_int8_t ip6_un1_nxt; /* next header */ 70 u_int8_t ip6_un1_hlim; /* hop limit */ 72 u_int8_t ip6_un2_vfc; /* 4 bits version, top 4 bits class */
|
/external/libpcap/ |
D | pcap-netfilter-linux-android.h | 21 int android_nflog_send_config_cmd(int fd, u_int16_t group_id, u_int8_t cmd, u_int8_t family);
|
D | pcap-netfilter-linux-android.c | 20 android_nflog_send_config_cmd(int fd, u_int16_t group_id, u_int8_t cmd, u_int8_t family) in android_nflog_send_config_cmd()
|
/external/ipsec-tools/src/libipsec/ |
D | libpfkey.h | 86 u_int8_t l_natt_type; 90 u_int8_t ctxdoi, ctxalg; /* Security context DOI and algorithm */ 176 u_int8_t, u_int16_t, u_int16_t, struct sockaddr *, u_int16_t)); 185 u_int8_t, u_int16_t, u_int16_t, struct sockaddr *, u_int16_t)); 199 static __inline u_int8_t
|