/external/chromium_org/third_party/openssl/openssl/crypto/rc4/ |
D | rc4_enc.c | 126 RC4_CHUNK ichunk,otp; in RC4() local 163 otp = RC4_STEP<<BESHFT(0); in RC4() 164 otp |= RC4_STEP<<BESHFT(1); in RC4() 165 otp |= RC4_STEP<<BESHFT(2); in RC4() 166 otp |= RC4_STEP<<BESHFT(3); in RC4() 169 otp |= RC4_STEP<<BESHFT(4); in RC4() 170 otp |= RC4_STEP<<BESHFT(5); in RC4() 171 otp |= RC4_STEP<<BESHFT(6); in RC4() 172 otp |= RC4_STEP<<BESHFT(7); in RC4() 174 *(RC4_CHUNK *)outdata = otp^ichunk; in RC4() [all …]
|
/external/openssl/crypto/rc4/ |
D | rc4_enc.c | 126 RC4_CHUNK ichunk,otp; in RC4() local 163 otp = RC4_STEP<<BESHFT(0); in RC4() 164 otp |= RC4_STEP<<BESHFT(1); in RC4() 165 otp |= RC4_STEP<<BESHFT(2); in RC4() 166 otp |= RC4_STEP<<BESHFT(3); in RC4() 169 otp |= RC4_STEP<<BESHFT(4); in RC4() 170 otp |= RC4_STEP<<BESHFT(5); in RC4() 171 otp |= RC4_STEP<<BESHFT(6); in RC4() 172 otp |= RC4_STEP<<BESHFT(7); in RC4() 174 *(RC4_CHUNK *)outdata = otp^ichunk; in RC4() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_otp.c | 35 int otp; in eap_otp_process() local 47 otp = 1; in eap_otp_process() 50 otp = 0; in eap_otp_process() 74 if (otp) { in eap_otp_process()
|
D | eap_gtc.c | 52 int otp; in eap_gtc_process() local 79 otp = 1; in eap_gtc_process() 82 otp = 0; in eap_gtc_process() 118 if (otp) { in eap_gtc_process()
|
D | eap_config.h | 539 u8 *otp; member
|
D | eap.c | 2100 return config->otp; in eap_get_config_otp() 2117 os_memset(config->otp, 0, config->otp_len); in eap_clear_config_otp() 2118 os_free(config->otp); in eap_clear_config_otp() 2119 config->otp = NULL; in eap_clear_config_otp()
|
/external/tcpdump/ |
D | print-llc.c | 393 const struct oui_tok *otp; in snap_print() local 395 for (otp = &oui_to_tok[0]; otp->tok != NULL; otp++) { in snap_print() 396 if (otp->oui == orgcode) { in snap_print() 397 tok = otp->tok; in snap_print()
|
/external/chromium_org/native_client_sdk/src/libraries/third_party/pthreads-win32/ |
D | pthread_mutex_consistent.c | 142 ptw32_robust_mutex_remove(pthread_mutex_t* mutex, ptw32_thread_t* otp) in ptw32_robust_mutex_remove() argument 149 mx->ownerThread.p = otp; in ptw32_robust_mutex_remove()
|
D | implement.h | 626 void ptw32_robust_mutex_remove(pthread_mutex_t* mutex, ptw32_thread_t* otp);
|
/external/wpa_supplicant_8/wpa_supplicant/doc/docbook/ |
D | wpa_cli.sgml | 79 <emphasis>otp</emphasis> commands. <id> needs to be copied from 81 <emphasis>otp</emphasis> commands can be used regardless of whether 85 with <emphasis>otp</emphasis> are used only once and then forgotten, 101 > otp 2 9876 304 <term>otp <network id> <password></term>
|
/external/chromium_org/chrome/browser/chromeos/options/ |
D | vpn_config_view.cc | 872 std::string otp = GetOTP(); in SetConfigProperties() local 873 if (!otp.empty()) { in SetConfigProperties() 875 shill::kOpenVPNOTPProperty, otp); in SetConfigProperties()
|
/external/wpa_supplicant_8/wpa_supplicant/ |
D | todo.txt | 36 - consider redesigning pending EAP requests (identity/password/otp from
|
D | README | 711 and 'otp' commands. <id> needs to be copied from the the matching 712 request. 'password' and 'otp' commands can be used regardless of 716 with 'otp' are used only once and then forgotten, i.e., wpa_supplicant 729 > otp 2 9876 750 otp <network id> <password> = configure one-time-password for an SSID
|
D | wpa_supplicant.c | 4378 bin_clear_free(eap->otp, eap->otp_len); in wpa_supplicant_ctrl_iface_ctrl_rsp_handle() 4379 eap->otp = (u8 *) os_strdup(value); in wpa_supplicant_ctrl_iface_ctrl_rsp_handle()
|
D | ChangeLog | 1550 identity/password/otp 1551 * fixed ctrl_iface requests for identity/password/otp in Phase 2 of 1797 wpa_cli); this 'otp' command works otherwise like 'password' command, 1804 * improved user data (identity/password/otp) requests through
|
D | config.c | 1900 os_free(eap->otp); in eap_peer_config_free()
|
/external/chromium_org/third_party/WebKit/PerformanceTests/Parser/resources/ |
D | final-url-en | 43807 http://www.gaietyschool.com/04/otp.htm
|