/external/dropbear/libtomcrypt/src/modes/ctr/ |
D | ctr_encrypt.c | 29 int ctr_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_CTR *ctr) in ctr_encrypt() argument 35 LTC_ARGCHK(ctr != NULL); in ctr_encrypt() 37 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { in ctr_encrypt() 42 if (ctr->blocklen < 1 || ctr->blocklen > (int)sizeof(ctr->ctr) || in ctr_encrypt() 43 ctr->padlen < 0 || ctr->padlen > (int)sizeof(ctr->pad)) { in ctr_encrypt() 48 if (ctr->blocklen % sizeof(LTC_FAST_TYPE)) { in ctr_encrypt() 54 …if ((ctr->padlen == ctr->blocklen) && cipher_descriptor[ctr->cipher].accel_ctr_encrypt != NULL && … in ctr_encrypt() 55 …if ((err = cipher_descriptor[ctr->cipher].accel_ctr_encrypt(pt, ct, len/ctr->blocklen, ctr->ctr, c… in ctr_encrypt() 58 len %= ctr->blocklen; in ctr_encrypt() 63 if (ctr->padlen == ctr->blocklen) { in ctr_encrypt() [all …]
|
D | ctr_start.c | 36 symmetric_CTR *ctr) in ctr_start() argument 42 LTC_ARGCHK(ctr != NULL); in ctr_start() 50 if ((err = cipher_descriptor[cipher].setup(key, keylen, num_rounds, &ctr->key)) != CRYPT_OK) { in ctr_start() 55 ctr->blocklen = cipher_descriptor[cipher].block_length; in ctr_start() 56 ctr->cipher = cipher; in ctr_start() 57 ctr->padlen = 0; in ctr_start() 58 ctr->mode = ctr_mode & 1; in ctr_start() 59 for (x = 0; x < ctr->blocklen; x++) { in ctr_start() 60 ctr->ctr[x] = IV[x]; in ctr_start() 65 if (ctr->mode == CTR_COUNTER_LITTLE_ENDIAN) { in ctr_start() [all …]
|
D | ctr_setiv.c | 27 int ctr_setiv(const unsigned char *IV, unsigned long len, symmetric_CTR *ctr) in ctr_setiv() argument 32 LTC_ARGCHK(ctr != NULL); in ctr_setiv() 35 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { in ctr_setiv() 39 if (len != (unsigned long)ctr->blocklen) { in ctr_setiv() 44 XMEMCPY(ctr->ctr, IV, len); in ctr_setiv() 47 ctr->padlen = 0; in ctr_setiv() 48 return cipher_descriptor[ctr->cipher].ecb_encrypt(IV, ctr->pad, &ctr->key); in ctr_setiv()
|
D | ctr_getiv.c | 27 int ctr_getiv(unsigned char *IV, unsigned long *len, symmetric_CTR *ctr) in ctr_getiv() argument 31 LTC_ARGCHK(ctr != NULL); in ctr_getiv() 32 if ((unsigned long)ctr->blocklen > *len) { in ctr_getiv() 33 *len = ctr->blocklen; in ctr_getiv() 36 XMEMCPY(IV, ctr->ctr, ctr->blocklen); in ctr_getiv() 37 *len = ctr->blocklen; in ctr_getiv()
|
D | ctr_done.c | 24 int ctr_done(symmetric_CTR *ctr) in ctr_done() argument 27 LTC_ARGCHK(ctr != NULL); in ctr_done() 29 if ((err = cipher_is_valid(ctr->cipher)) != CRYPT_OK) { in ctr_done() 32 cipher_descriptor[ctr->cipher].done(&ctr->key); in ctr_done()
|
D | ctr_test.c | 53 symmetric_CTR ctr; in ctr_test() 63 …IV, tests[x].key, tests[x].keylen, 0, CTR_COUNTER_BIG_ENDIAN|LTC_CTR_RFC3686, &ctr)) != CRYPT_OK) { in ctr_test() 66 if ((err = ctr_encrypt(tests[x].pt, buf, tests[x].msglen, &ctr)) != CRYPT_OK) { in ctr_test() 69 ctr_done(&ctr); in ctr_test()
|
D | ctr_decrypt.c | 28 int ctr_decrypt(const unsigned char *ct, unsigned char *pt, unsigned long len, symmetric_CTR *ctr) in ctr_decrypt() argument 32 LTC_ARGCHK(ctr != NULL); in ctr_decrypt() 34 return ctr_encrypt(ct, pt, len, ctr); in ctr_decrypt()
|
/external/oprofile/module/x86/ |
D | op_model_p4.c | 379 #define CTR_OVERFLOW_P(ctr) (!((ctr) & 0x80000000)) argument 482 static void pmc_setup_one_p4_counter(unsigned int ctr) in pmc_setup_one_p4_counter() argument 496 counter_bit = 1 << VIRT_CTR(stag, ctr); in pmc_setup_one_p4_counter() 499 if (sysctl.ctr[ctr].event <= 0 || sysctl.ctr[ctr].event > NUM_EVENTS) { in pmc_setup_one_p4_counter() 502 sysctl.ctr[ctr].event); in pmc_setup_one_p4_counter() 506 ev = &(p4_events[sysctl.ctr[ctr].event - 1]); in pmc_setup_one_p4_counter() 515 ESCR_SET_USR_0(escr, sysctl.ctr[ctr].user); in pmc_setup_one_p4_counter() 516 ESCR_SET_OS_0(escr, sysctl.ctr[ctr].kernel); in pmc_setup_one_p4_counter() 518 ESCR_SET_USR_1(escr, sysctl.ctr[ctr].user); in pmc_setup_one_p4_counter() 519 ESCR_SET_OS_1(escr, sysctl.ctr[ctr].kernel); in pmc_setup_one_p4_counter() [all …]
|
D | op_model_athlon.c | 68 if (sysctl.ctr[i].enabled) { in athlon_setup_ctrs() 70 CTR_WRITE(sysctl.ctr[i].count, msrs, i); in athlon_setup_ctrs() 75 CTRL_SET_USR(low, sysctl.ctr[i].user); in athlon_setup_ctrs() 76 CTRL_SET_KERN(low, sysctl.ctr[i].kernel); in athlon_setup_ctrs() 77 CTRL_SET_UM(low, sysctl.ctr[i].unit_mask); in athlon_setup_ctrs() 78 CTRL_SET_EVENT(low, sysctl.ctr[i].event); in athlon_setup_ctrs() 92 if (sysctl.ctr[i].enabled) { in athlon_check_ctrs() 108 if (sysctl.ctr[i].enabled) { in athlon_start() 122 if (sysctl.ctr[i].enabled) { in athlon_stop()
|
D | op_rtc.c | 37 if ((sysctl.ctr[0].kernel && usermode) in do_rtc_interrupt() 38 || (sysctl.ctr[0].user && !usermode)) in do_rtc_interrupt() 75 target = sysctl.ctr[0].count; in rtc_setup() 87 sysctl_parms.ctr[0].count = sysctl.ctr[0].count = 1 << exp; in rtc_setup() 139 int target = sysctl.ctr[0].count; in rtc_check_params() 174 …*next = ((ctl_table) { 1, "rtc_value", &sysctl_parms.ctr[0].count, sizeof(int), 0600, NULL, lproc_… in rtc_add_sysctls()
|
D | op_nmi.c | 123 if (sysctl.ctr[i].enabled) in pmc_start_all() 124 data->ctr_count[i] = sysctl.ctr[i].count; in pmc_start_all() 150 if (!sysctl.ctr[i].enabled) in pmc_check_params() 155 if (!sysctl.ctr[i].user && !sysctl.ctr[i].kernel) { in pmc_check_params() 161 if (check_range(sysctl.ctr[i].count, 1, OP_MAX_PERF_COUNT, in pmc_check_params() 328 …tab[0] = ((ctl_table) { 1, "enabled", &sysctl_parms.ctr[i].enabled, sizeof(int), 0644, NULL, lproc… in pmc_add_sysctls() 329 …tab[1] = ((ctl_table) { 1, "event", &sysctl_parms.ctr[i].event, sizeof(int), 0644, NULL, lproc_doi… in pmc_add_sysctls() 330 …tab[2] = ((ctl_table) { 1, "count", &sysctl_parms.ctr[i].count, sizeof(int), 0644, NULL, lproc_doi… in pmc_add_sysctls() 331 …tab[3] = ((ctl_table) { 1, "unit_mask", &sysctl_parms.ctr[i].unit_mask, sizeof(int), 0644, NULL, l… in pmc_add_sysctls() 332 …tab[4] = ((ctl_table) { 1, "kernel", &sysctl_parms.ctr[i].kernel, sizeof(int), 0644, NULL, lproc_d… in pmc_add_sysctls() [all …]
|
D | op_model_ppro.c | 64 if (sysctl.ctr[i].enabled) { in ppro_setup_ctrs() 66 CTR_WRITE(sysctl.ctr[i].count, msrs, i); in ppro_setup_ctrs() 71 CTRL_SET_USR(low, sysctl.ctr[i].user); in ppro_setup_ctrs() 72 CTRL_SET_KERN(low, sysctl.ctr[i].kernel); in ppro_setup_ctrs() 73 CTRL_SET_UM(low, sysctl.ctr[i].unit_mask); in ppro_setup_ctrs() 74 CTRL_SET_EVENT(low, sysctl.ctr[i].event); in ppro_setup_ctrs()
|
/external/oprofile/module/ia64/ |
D | op_pmu.c | 57 int ctr; in op_do_pmu_interrupt() local 59 for (ctr = 0 ; ctr < op_nr_counters ; ++ctr) { in op_do_pmu_interrupt() 60 if (pmd_overflowed(pmc0, ctr)) { in op_do_pmu_interrupt() 61 op_do_profile(cpu, regs->cr_iip, 1, ctr); in op_do_pmu_interrupt() 62 set_pmd_neg(oprof_data[cpu].ctr_count[ctr], ctr); in op_do_pmu_interrupt() 191 if (sysctl.ctr[ii].enabled) { in pmu_setup() 194 set_pmd_neg(sysctl.ctr[ii].count, ii); in pmu_setup() 195 pmc_fill_in(&pmc_val, sysctl.ctr[ii].kernel, in pmu_setup() 196 sysctl.ctr[ii].user, sysctl.ctr[ii].event, in pmu_setup() 197 sysctl.ctr[ii].unit_mask); in pmu_setup() [all …]
|
/external/v8/test/mjsunit/ |
D | string-replace.js | 123 var ctr = 0; variable 129 return String(ctr++); 131 assertEquals(1, ctr, "replace('x',func) num-match"); 133 ctr = 0; 139 return String(ctr++); 141 assertEquals(1, ctr, "replace(/x/,func) num-match"); 143 ctr = 0; 147 assertEquals(ctr * 2, i, "replace(/x/g,func(..,i,.))"); 149 return String(ctr++); 151 assertEquals(4, ctr, "replace(/x/g,func) num-match"); [all …]
|
D | object-create.js | 52 var ctr = 0; variable 59 var protoFoo = { foo: function() { ctr++; }}; 71 assertEquals(1, ctr); 75 assertEquals(2, ctr); 80 assertEquals(2, ctr); 86 assertEquals(2, ctr); 97 assertEquals(2, ctr); 103 assertEquals(2, ctr); 116 assertEquals(2, ctr);
|
/external/dropbear/libtomcrypt/src/encauth/ccm/ |
D | ccm_memory.c | 48 unsigned char PAD[16], ctr[16], CTRPAD[16], b; in ccm_memory() local 215 ctr[x++] = (unsigned char)L-1; in ccm_memory() 219 ctr[x++] = nonce[y]; in ccm_memory() 223 ctr[x++] = 0; in ccm_memory() 238 ctr[z] = (ctr[z] + 1) & 255; in ccm_memory() 239 if (ctr[z]) break; in ccm_memory() 241 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) { in ccm_memory() 258 ctr[z] = (ctr[z] + 1) & 255; in ccm_memory() 259 if (ctr[z]) break; in ccm_memory() 261 if ((err = cipher_descriptor[cipher].ecb_encrypt(ctr, CTRPAD, skey)) != CRYPT_OK) { in ccm_memory() [all …]
|
/external/jpeg/ |
D | jidctred.c | 129 int ctr; variable 138 for (ctr = DCTSIZE; ctr > 0; inptr++, quantptr++, wsptr++, ctr--) { 140 if (ctr == DCTSIZE-4) 197 for (ctr = 0; ctr < 4; ctr++) { 198 outptr = output_buf[ctr] + output_col; 281 int ctr; in jpeg_idct_2x2() local 290 for (ctr = DCTSIZE; ctr > 0; inptr++, quantptr++, wsptr++, ctr--) { in jpeg_idct_2x2() 292 if (ctr == DCTSIZE-2 || ctr == DCTSIZE-4 || ctr == DCTSIZE-6) in jpeg_idct_2x2() 330 for (ctr = 0; ctr < 2; ctr++) { in jpeg_idct_2x2() 331 outptr = output_buf[ctr] + output_col; in jpeg_idct_2x2()
|
D | jfdctflt.c | 65 int ctr; variable 70 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) { 120 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
|
D | jfdctfst.c | 120 int ctr; variable 126 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) { 176 for (ctr = DCTSIZE-1; ctr >= 0; ctr--) {
|
D | jidctflt.c | 80 int ctr; variable 89 for (ctr = DCTSIZE; ctr > 0; ctr--) { 180 for (ctr = 0; ctr < DCTSIZE; ctr++) { 181 outptr = output_buf[ctr] + output_col;
|
/external/openssl/crypto/ |
D | mem_clr.c | 67 size_t loop = len, ctr = cleanse_ctr; in OPENSSL_cleanse() local 70 *(p++) = (unsigned char)ctr; in OPENSSL_cleanse() 71 ctr += (17 + ((size_t)p & 0xF)); in OPENSSL_cleanse() 73 p=memchr(ptr, (unsigned char)ctr, len); in OPENSSL_cleanse() 75 ctr += (63 + (size_t)p); in OPENSSL_cleanse() 76 cleanse_ctr = (unsigned char)ctr; in OPENSSL_cleanse()
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_pwd_common.c | 51 u16 i, ctr, L; in eap_pwd_kdf() local 57 ctr = 0; in eap_pwd_kdf() 60 ctr++; i = htons(ctr); in eap_pwd_kdf() 62 if (ctr > 1) in eap_pwd_kdf() 95 unsigned char pwe_digest[SHA256_DIGEST_LENGTH], *prfbuf = NULL, ctr; in compute_password_element() local 161 ctr = 0; in compute_password_element() 163 if (ctr > 10) { in compute_password_element() 169 ctr++; in compute_password_element() 181 H_Update(&ctx, &ctr, sizeof(ctr)); in compute_password_element() 244 wpa_printf(MSG_DEBUG, "EAP-pwd: found a PWE in %d tries", ctr); in compute_password_element()
|
/external/valgrind/main/none/tests/ |
D | threaded-fork.c | 17 int ctr; in main() local 40 ctr = 0; in main() 43 ctr++; in main() 44 if (ctr >= 10) { in main()
|
/external/bluetooth/hcidump/parser/ |
D | capi.c | 275 uint8_t ctr, plci; in cmd_common() local 278 ctr = val & 0xff; in cmd_common() 283 printf("Controller: %d %s\n", ctr & 0x7f, ctr & 0x80 ? "Ext." : "Int."); in cmd_common() 488 uint32_t ctr, value, major, minor; in cmd_interoperability() local 525 ctr = CAPI_U32(frm); in cmd_interoperability() 527 printf("Controller: %d\n", ctr); in cmd_interoperability() 554 ctr = CAPI_U32(frm); in cmd_interoperability() 556 printf("Controller: %d\n", ctr); in cmd_interoperability() 565 ctr = CAPI_U32(frm); in cmd_interoperability() 567 printf("Controller: %d\n", ctr); in cmd_interoperability() [all …]
|
/external/valgrind/main/memcheck/tests/ |
D | wrap5.c | 18 static int ctr = 0; variable 23 ctr++; in addMoreLard() 24 if ((ctr % 3) == 1) { in addMoreLard() 88 printf("allocated %d Lards\n", ctr); in main()
|