/external/wpa_supplicant_8/src/crypto/ |
D | sha256.c | 32 size_t _len[6], i; in hmac_sha256_vector() local 68 _len[0] = 64; in hmac_sha256_vector() 71 _len[i + 1] = len[i]; in hmac_sha256_vector() 73 if (sha256_vector(1 + num_elem, _addr, _len, mac) < 0) in hmac_sha256_vector() 84 _len[0] = 64; in hmac_sha256_vector() 86 _len[1] = SHA256_MAC_LEN; in hmac_sha256_vector() 87 return sha256_vector(2, _addr, _len, mac); in hmac_sha256_vector()
|
D | md5.c | 32 size_t i, _len[6]; in hmac_md5_vector() local 69 _len[0] = 64; in hmac_md5_vector() 72 _len[i + 1] = len[i]; in hmac_md5_vector() 74 if (md5_vector(1 + num_elem, _addr, _len, mac)) in hmac_md5_vector() 85 _len[0] = 64; in hmac_md5_vector() 87 _len[1] = MD5_MAC_LEN; in hmac_md5_vector() 88 return md5_vector(2, _addr, _len, mac); in hmac_md5_vector()
|
D | sha1.c | 32 size_t _len[6], i; in hmac_sha1_vector() local 68 _len[0] = 64; in hmac_sha1_vector() 71 _len[i + 1] = len[i]; in hmac_sha1_vector() 73 if (sha1_vector(1 + num_elem, _addr, _len, mac)) in hmac_sha1_vector() 84 _len[0] = 64; in hmac_sha1_vector() 86 _len[1] = SHA1_MAC_LEN; in hmac_sha1_vector() 87 return sha1_vector(2, _addr, _len, mac); in hmac_sha1_vector()
|
/external/openssh/ |
D | packet.h | 110 int _len = packet_remaining(); \ 111 if (_len > 0) { \ 113 _len ,__FILE__, __LINE__); \
|
/external/skia/bench/ |
D | bench_util.py | 61 self._len = len(data) 63 self._rep = sum(self._data) / self._len 72 x = int(round(0.5 * self._len + 0.5)) 74 x = int(round(0.25 * self._len + 0.5))
|
/external/openssl/crypto/aes/asm/ |
D | aes-586.pl | 2023 my $_len=&DWP(40,"esp"); # copy of wparam(2) 2099 &mov ($_len,$s2); # save copy of len 2162 &mov ($s2,$_len); # load len 2167 &mov ($_len,$s2); # save len 2211 &mov ($acc,$_len); # load len 2225 &mov ($s2,$_len); # load len 2232 &mov ($_len,$s2); # save len 2289 &mov ($s2,$_len); # load len 2293 &mov ($_len,$s2); # save len 2351 &mov ($_len,$s2); # save copy of len [all …]
|
D | aes-x86_64.pl | 1646 my $_len="40(%rsp)"; # copy of 3rd parameter, length 1721 mov %rdx,$_len # save copy of len 1784 mov $_len,%r10 1794 mov %r10,$_len 1824 mov $_len,%r10 # load len 1832 mov %r10,$_len # update len 1868 mov $_len,%r10 1889 mov %r10,$_len 1931 #mov %rdx,$_len # save copy of len 1974 mov %r10,$_len # save len [all …]
|
/external/elfutils/libcpu/ |
D | i386_disasm.c | 297 size_t _len = strlen (_str); \ 298 if (unlikely (bufcnt + _len > bufsize)) \ 300 memcpy (buf + bufcnt, str, _len); \ 301 bufcnt += _len; \
|
D | ChangeLog | 208 * i386_disasm.c (ADD_STRING): Use _len instead of len.
|
/external/webkit/Source/WebCore/bridge/ |
D | npruntime.h | 174 #define STRINGN_TO_NPVARIANT(_val, _len, _v) \ argument 177 NPString str = { _val, uint32_t(_len) }; \
|
/external/wpa_supplicant_8/src/radius/ |
D | radius.c | 1025 size_t _len[3]; in encrypt_ms_key() local 1044 _len[0] = secret_len; in encrypt_ms_key() 1047 _len[1] = MD5_MAC_LEN; in encrypt_ms_key() 1049 _len[2] = sizeof(saltbuf); in encrypt_ms_key() 1052 _len[1] = MD5_MAC_LEN; in encrypt_ms_key() 1054 md5_vector(first ? 3 : 2, addr, _len, hash); in encrypt_ms_key()
|
/external/giflib/ |
D | dgif_lib.c | 46 #define READ(_gif,_buf,_len) \ argument 48 ((GifFilePrivateType*)_gif->Private)->Read(_gif,_buf,_len) : \ 49 fread(_buf,1,_len,((GifFilePrivateType*)_gif->Private)->File))
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | config.c | 1403 #define _STR_LEN(f) _STR(f), OFFSET(f ## _len) 1404 #define _STR_LENe(f) _STRe(f), OFFSET(eap.f ## _len)
|
/external/dropbear/libtomcrypt/ |
D | crypt.tex | 3413 …d 16 octets. Strictly, it must be small than $modulus\_len - hLen - 2$ where \textit{modulus\_len… 4785 …the algorithm allows binary passwords you must also specify the length in \textit{password\_len}. 4809 …the algorithm allows binary passwords you must also specify the length in \textit{password\_len}. 4810 The \textit{salt} is an array of size \textit{salt\_len}. It should be random for each user and se…
|