/external/wpa_supplicant_8/src/crypto/ |
D | aes-omac1.c | 16 static void gf_mulx(u8 *pad) in gf_mulx() argument 20 carry = pad[0] & 0x80; in gf_mulx() 22 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in gf_mulx() 23 pad[AES_BLOCK_SIZE - 1] <<= 1; in gf_mulx() 25 pad[AES_BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 46 u8 cbc[AES_BLOCK_SIZE], pad[AES_BLOCK_SIZE]; in omac1_aes_128_vector() local 78 os_memset(pad, 0, AES_BLOCK_SIZE); in omac1_aes_128_vector() 79 aes_encrypt(ctx, pad, pad); in omac1_aes_128_vector() 80 gf_mulx(pad); in omac1_aes_128_vector() 92 gf_mulx(pad); in omac1_aes_128_vector() [all …]
|
/external/valgrind/main/none/tests/s390x/ |
D | clcle.c | 16 register unsigned long pad asm ("6") = _pad; in clcle() 24 : "d" (pad) in clcle() 35 void testrun(void *_a1, unsigned long _l1, void *_a3, unsigned long _l3, char pad) in testrun() argument 41 cc = clcle(&a1, &l1, &a3, &l3, pad); in testrun() 47 void multiplex(unsigned long l1, unsigned long l3, char pad) in multiplex() argument 49 testrun(b1, l1, b1, l3, pad); in multiplex() 50 testrun(b1, l1, b2, l3, pad); in multiplex() 51 testrun(b1, l1, b3, l3, pad); in multiplex() 52 testrun(b1, l1, b4, l3, pad); in multiplex() 53 testrun(b2, l1, b2, l3, pad); in multiplex() [all …]
|
D | clcl.c | 14 uint8_t pad; member 64 result.pad = (regs.r2p1 & 0xFF000000u) >> 24; in result_from_regs() 74 void *addr2, uint32_t len2, uint32_t pad) in clcl() argument 81 assert((pad & 0xFF) == pad); /* an 8-byte value */ in clcl() 89 r2p1 = len2 | (pad << 24); in clcl() 102 if (result1.pad != pad) in clcl() 120 if (result2.pad != pad) in clcl() 132 if (result1.pad != result2.pad) in clcl() 141 run_test(void *addr1, uint32_t len1, void *addr2, uint32_t len2, uint32_t pad) in run_test() argument 145 result = clcl(addr1, len1, addr2, len2, pad); in run_test()
|
D | mvcl.c | 14 uint8_t pad; member 65 result.pad = (regs.r2p1 & 0xFF000000u) >> 24; in result_from_regs() 75 void *addr2, uint32_t len2, uint32_t pad) in mvcl() argument 82 assert((pad & 0xFF) == pad); /* an 8-byte value */ in mvcl() 93 r2p1 = len2 | (pad << 24); in mvcl() 106 if (result1.pad != pad) in mvcl() 125 if (result2.pad != pad) in mvcl() 137 if (result1.pad != result2.pad) in mvcl() 159 run_test(void *dst, uint32_t dst_len, void *src, uint32_t src_len, uint32_t pad) in run_test() argument 163 result = mvcl(dst, dst_len, src, src_len, pad); in run_test()
|
/external/openssl/crypto/bn/asm/ |
D | via-mont.pl | 89 $pad=16*1; # amount of reserved bytes on top of every vector 132 &lea ("ecx",&DWP($pad,"","ecx",4)); # ecx becomes vector size in bytes 149 &lea ("ebp",&DWP(-$pad,"ecx")); 155 &lea ("ecx",&DWP((32+$pad)/4,"ecx"));# padded tp + scratch 159 &lea ("edi",&DWP(64+$pad,"esp","ecx",4));# pointer to ap copy 162 &mov ("ecx",$pad/4); 170 &mov ("ecx",$pad/4); 178 &mov ("ecx",$pad/4); 193 &lea ("ebp",&DWP(-$pad,"edi","ebp",4)); # so just "rewind" 230 &lea ("edi",&DWP(64+$pad,"esp","edx",4));# pointer to ap [all …]
|
/external/qemu/distrib/sdl-1.2.15/src/video/wincommon/ |
D | SDL_sysmouse.c | 121 int run, pad, i; in WIN_CreateWMCursor() 145 pad = PAD_BITS(allowed_x)-run; in WIN_CreateWMCursor() 146 aptr = cursor->ands = (Uint8 *)SDL_malloc((run+pad)*allowed_y); in WIN_CreateWMCursor() 147 xptr = cursor->xors = (Uint8 *)SDL_malloc((run+pad)*allowed_y); in WIN_CreateWMCursor() 160 SDL_memset(xptr, 0, pad); in WIN_CreateWMCursor() 161 xptr += pad; in WIN_CreateWMCursor() 162 SDL_memset(aptr, ~0, pad); in WIN_CreateWMCursor() 163 aptr += pad; in WIN_CreateWMCursor() 165 pad += run; in WIN_CreateWMCursor() 167 SDL_memset(xptr, 0, pad); in WIN_CreateWMCursor() [all …]
|
/external/qemu/distrib/sdl-1.2.15/src/video/bwindow/ |
D | SDL_sysmouse.cc | 48 int run, pad, i; in BE_CreateWMCursor() local 79 pad = PADDED_BITS(allowed_x)-run; in BE_CreateWMCursor() 82 SDL_memset(cptr+run, 0, pad); in BE_CreateWMCursor() 84 cptr += (run+pad); in BE_CreateWMCursor() 87 SDL_memset(cptr, 0, run+pad); in BE_CreateWMCursor() 88 cptr += (run+pad); in BE_CreateWMCursor() 96 SDL_memset(cptr+run, 0, pad); in BE_CreateWMCursor() 98 cptr += (run+pad); in BE_CreateWMCursor() 101 SDL_memset(cptr, 0, run+pad); in BE_CreateWMCursor() 102 cptr += (run+pad); in BE_CreateWMCursor()
|
/external/wpa_supplicant_8/src/tls/ |
D | pkcs5.c | 175 u8 *eb, pad; in pkcs5_decrypt() local 212 pad = eb[enc_data_len - 1]; in pkcs5_decrypt() 213 if (pad > 8) { in pkcs5_decrypt() 214 wpa_printf(MSG_INFO, "PKCS #5: Invalid PS octet 0x%x", pad); in pkcs5_decrypt() 218 for (i = enc_data_len - pad; i < enc_data_len; i++) { in pkcs5_decrypt() 219 if (eb[i] != pad) { in pkcs5_decrypt() 221 eb + enc_data_len - pad, pad); in pkcs5_decrypt() 228 eb, enc_data_len - pad); in pkcs5_decrypt() 230 *data_len = enc_data_len - pad; in pkcs5_decrypt()
|
/external/openssl/apps/ |
D | rsautl.c | 101 unsigned char *rsa_in = NULL, *rsa_out = NULL, pad; in MAIN() local 117 pad = RSA_PKCS1_PADDING; in MAIN() 160 else if(!strcmp(*argv, "-raw")) pad = RSA_NO_PADDING; in MAIN() 161 else if(!strcmp(*argv, "-oaep")) pad = RSA_PKCS1_OAEP_PADDING; in MAIN() 162 else if(!strcmp(*argv, "-ssl")) pad = RSA_SSLV23_PADDING; in MAIN() 163 else if(!strcmp(*argv, "-pkcs")) pad = RSA_PKCS1_PADDING; in MAIN() 164 else if(!strcmp(*argv, "-x931")) pad = RSA_X931_PADDING; in MAIN() 281 rsa_outlen = RSA_public_decrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); in MAIN() 285 rsa_outlen = RSA_private_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); in MAIN() 289 rsa_outlen = RSA_public_encrypt(rsa_inlen, rsa_in, rsa_out, rsa, pad); in MAIN() [all …]
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
D | aes_wrap.c | 157 static void gf_mulx(u8 *pad) in gf_mulx() argument 161 carry = pad[0] & 0x80; in gf_mulx() 163 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); in gf_mulx() 164 pad[BLOCK_SIZE - 1] <<= 1; in gf_mulx() 166 pad[BLOCK_SIZE - 1] ^= 0x87; in gf_mulx() 187 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; in omac1_aes_128_vector() local 219 os_memset(pad, 0, BLOCK_SIZE); in omac1_aes_128_vector() 220 aes_encrypt(ctx, pad, pad); in omac1_aes_128_vector() 221 gf_mulx(pad); in omac1_aes_128_vector() 233 gf_mulx(pad); in omac1_aes_128_vector() [all …]
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/jcajce/provider/asymmetric/rsa/ |
D | CipherSpi.java | 192 String pad = Strings.toUpperCase(padding); in engineSetPadding() local 194 if (pad.equals("NOPADDING")) in engineSetPadding() 198 else if (pad.equals("PKCS1PADDING")) in engineSetPadding() 208 else if (pad.equals("OAEPWITHMD5ANDMGF1PADDING")) in engineSetPadding() 212 else if (pad.equals("OAEPPADDING")) in engineSetPadding() 216 … else if (pad.equals("OAEPWITHSHA1ANDMGF1PADDING") || pad.equals("OAEPWITHSHA-1ANDMGF1PADDING")) in engineSetPadding() 226 …else if (pad.equals("OAEPWITHSHA256ANDMGF1PADDING") || pad.equals("OAEPWITHSHA-256ANDMGF1PADDING")) in engineSetPadding() 230 …else if (pad.equals("OAEPWITHSHA384ANDMGF1PADDING") || pad.equals("OAEPWITHSHA-384ANDMGF1PADDING")) in engineSetPadding() 234 …else if (pad.equals("OAEPWITHSHA512ANDMGF1PADDING") || pad.equals("OAEPWITHSHA-512ANDMGF1PADDING")) in engineSetPadding()
|
/external/openssl/crypto/asn1/ |
D | x_bignum.c | 113 int pad; in bn_i2c() local 117 if(BN_num_bits(bn) & 0x7) pad = 0; in bn_i2c() 118 else pad = 1; in bn_i2c() 120 if(pad) *cont++ = 0; in bn_i2c() 123 return pad + BN_num_bytes(bn); in bn_i2c()
|
D | x_long.c | 109 int clen, pad, i; in long_i2c() local 125 if(!(clen & 0x7)) pad = 1; in long_i2c() 126 else pad = 0; in long_i2c() 132 if(pad) *cont++ = (ltmp < 0) ? 0xff : 0; in long_i2c() 139 return clen + pad; in long_i2c()
|
/external/qemu/distrib/sdl-1.2.15/src/video/Xext/extensions/ |
D | xf86dga1str.h | 39 CARD16 pad B16; 83 CARD16 pad B16; 106 CARD16 pad B16; 117 CARD16 pad B16; 127 CARD32 pad B32; 151 CARD16 pad B16; 161 CARD32 pad B32; 185 CARD32 pad B32;
|
/external/qemu/target-i386/ |
D | hax-interface.h | 50 uint8 pad[96]; member 67 uint16_t pad[2]; member 80 uint64_t pad; member 227 uint32 pad; member 276 uint16_t pad[3]; member 352 uint32_t pad; member 363 uint8_t pad[3]; member 398 uint32_t pad; member
|
/external/icu4c/samples/cal/ |
D | cal.c | 424 int32_t width, pad, i, day; in print_month() local 458 pad = width - u_strlen(s); in print_month() 459 indent(pad / 2, stdout); in print_month() 502 pad = lens[current] - u_strlen(s); in print_month() 503 indent(pad, stdout); in print_month() 542 int32_t width, pad, i, j; in print_year() local 584 pad = 2 * width + MARGIN_WIDTH - u_strlen(s); in print_year() 585 indent(pad / 2, stdout); in print_year() 601 pad = width - u_strlen(months[i]); in print_year() 602 indent(pad / 2, stdout); in print_year() [all …]
|
/external/tcpdump/ |
D | print-slow.c | 88 u_int8_t pad[3]; member 105 u_int8_t pad[12]; member 112 u_int8_t pad[2]; member 116 u_int8_t pad[50]; member 235 tlv_len = sizeof(tlv_ptr.lacp_marker_tlv_terminator->pad) + in slow_print() 242 TCHECK2(tlv_ptr.lacp_marker_tlv_terminator->pad[0], in slow_print() 243 sizeof(tlv_ptr.lacp_marker_tlv_terminator->pad)); in slow_print()
|
/external/qemu/android/config/linux-x86_64/linux/ |
D | kvm.h | 61 __u32 pad; member 76 __u32 pad[15]; member 164 __u32 pad; member 170 __u32 pad; member 204 __u32 pad; member 210 __u32 pad; member 233 __u8 pad[5]; member 309 __u32 pad; member 332 __u8 pad[36]; member 455 __u32 pad; member [all …]
|
/external/qemu/android/config/linux-x86/linux/ |
D | kvm.h | 61 __u32 pad; member 76 __u32 pad[15]; member 164 __u32 pad; member 170 __u32 pad; member 204 __u32 pad; member 210 __u32 pad; member 233 __u8 pad[5]; member 309 __u32 pad; member 332 __u8 pad[36]; member 455 __u32 pad; member [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | base64.c | 102 int pad = 0; in base64_decode() local 130 pad++; in base64_decode() 138 if (pad) { in base64_decode() 139 if (pad == 1) in base64_decode() 141 else if (pad == 2) in base64_decode()
|
/external/freetype/src/psaux/ |
D | psconv.c | 342 FT_UInt pad = 0x01; in PS_Conv_ASCIIHexDecode() local 373 pad = ( pad << 4 ) | c; in PS_Conv_ASCIIHexDecode() 374 if ( pad & 0x100 ) in PS_Conv_ASCIIHexDecode() 376 buffer[w++] = (FT_Byte)pad; in PS_Conv_ASCIIHexDecode() 377 pad = 0x01; in PS_Conv_ASCIIHexDecode() 381 if ( pad != 0x01 ) in PS_Conv_ASCIIHexDecode() 382 buffer[w++] = (FT_Byte)( pad << 4 ); in PS_Conv_ASCIIHexDecode()
|
/external/icu4c/tools/genrb/ |
D | rbutil.c | 66 itostr(char * buffer, int32_t i, uint32_t radix, int32_t pad) in itostr() argument 87 while (length < pad){ in itostr() 101 num= (pad>=length) ? pad :length; in itostr()
|
/external/okhttp/src/main/java/libcore/io/ |
D | Base64.java | 49 int pad = 0; in decode() local 61 pad++; in decode() 113 if (pad > 0) { in decode() 115 quantum = quantum << (6 * pad); in decode() 118 if (pad == 1) { in decode()
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
D | tlsv1_record.c | 204 size_t pad; in tlsv1_record_send() local 205 pad = (len + 1) % rl->iv_size; in tlsv1_record_send() 206 if (pad) in tlsv1_record_send() 207 pad = rl->iv_size - pad; in tlsv1_record_send() 208 if (pos + pad + 1 > buf + buf_size) { in tlsv1_record_send() 213 os_memset(pos, pad, pad + 1); in tlsv1_record_send() 214 pos += pad + 1; in tlsv1_record_send()
|
/external/blktrace/btt/ |
D | misc.c | 141 char *make_dev_hdr(char *pad, size_t len, struct d_info *dip, int add_parens) in make_dev_hdr() argument 144 snprintf(pad, len, "%s", dip->devmap); in make_dev_hdr() 146 snprintf(pad, len, "(%3d,%3d)", in make_dev_hdr() 149 snprintf(pad, len, "%d,%d", in make_dev_hdr() 152 return pad; in make_dev_hdr()
|