/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/h264/model/ |
D | PictureParameterSet.java | 285 final int prime = 31; in hashCode() local 287 result = prime * result + Arrays.hashCode(bottom_right); in hashCode() 288 result = prime * result + chroma_qp_index_offset; in hashCode() 289 result = prime * result + (constrained_intra_pred_flag ? 1231 : 1237); in hashCode() 290 result = prime * result in hashCode() 292 result = prime * result + (entropy_coding_mode_flag ? 1231 : 1237); in hashCode() 293 result = prime * result in hashCode() 295 result = prime * result + num_ref_idx_l0_active_minus1; in hashCode() 296 result = prime * result + num_ref_idx_l1_active_minus1; in hashCode() 297 result = prime * result + num_slice_groups_minus1; in hashCode() [all …]
|
/external/wpa_supplicant_8/src/eap_server/ |
D | eap_server_pwd.c | 155 BN_clear_free(data->grp->prime); in eap_pwd_reset() 258 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == in eap_pwd_build_commit_req() 270 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); in eap_pwd_build_commit_req() 275 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); in eap_pwd_build_commit_req() 277 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y); in eap_pwd_build_commit_req() 278 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset); in eap_pwd_build_commit_req() 280 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) + in eap_pwd_build_commit_req() 287 2 * BN_num_bytes(data->grp->prime)); in eap_pwd_build_commit_req() 318 if (((cruft = os_malloc(BN_num_bytes(data->grp->prime))) == NULL) || in eap_pwd_build_confirm_req() 339 os_memset(cruft, 0, BN_num_bytes(data->grp->prime)); in eap_pwd_build_confirm_req() [all …]
|
/external/wpa_supplicant_8/src/eap_peer/ |
D | eap_pwd.c | 169 BN_clear_free(data->grp->prime); in eap_pwd_deinit() 329 BN_num_bits(data->grp->prime)); in eap_pwd_perform_id_exchange() 365 prime_len = BN_num_bytes(data->grp->prime); in eap_pwd_perform_commit_exchange() 436 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x); in eap_pwd_perform_commit_exchange() 437 ptr += BN_num_bytes(data->grp->prime); in eap_pwd_perform_commit_exchange() 438 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y); in eap_pwd_perform_commit_exchange() 439 ptr += BN_num_bytes(data->grp->prime); in eap_pwd_perform_commit_exchange() 514 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == in eap_pwd_perform_commit_exchange() 526 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); in eap_pwd_perform_commit_exchange() 531 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); in eap_pwd_perform_commit_exchange() [all …]
|
/external/wpa_supplicant_8/src/common/ |
D | sae.c | 34 tmp->prime = crypto_ec_get_prime(tmp->ec); in sae_set_group() 49 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, in sae_set_group() 55 tmp->prime = tmp->prime_buf; in sae_set_group() 173 get_rand_1_to_p_1(const u8 *prime, size_t prime_len, size_t prime_bits, in get_rand_1_to_p_1() argument 184 if (os_memcmp(tmp, prime, prime_len) >= 0) in get_rand_1_to_p_1() 203 const u8 *prime, size_t bits, in is_quadratic_residue_blind() argument 220 r = get_rand_1_to_p_1(prime, sae->tmp->prime_len, bits, &r_odd); in is_quadratic_residue_blind() 226 crypto_bignum_mulmod(y_sqr, r, sae->tmp->prime, num) < 0 || in is_quadratic_residue_blind() 227 crypto_bignum_mulmod(num, r, sae->tmp->prime, num) < 0) in is_quadratic_residue_blind() 235 if (crypto_bignum_mulmod(num, qr, sae->tmp->prime, num) < 0) in is_quadratic_residue_blind() [all …]
|
/external/wpa_supplicant_8/src/eap_common/ |
D | eap_pwd_common.c | 125 grp->prime = NULL; in compute_password_element() 136 ((grp->prime = BN_new()) == NULL) || in compute_password_element() 142 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL)) in compute_password_element() 157 primebitlen = BN_num_bits(grp->prime); in compute_password_element() 158 primebytelen = BN_num_bytes(grp->prime); in compute_password_element() 211 if (BN_ucmp(x_candidate, grp->prime) >= 0) in compute_password_element() 273 BN_clear_free(grp->prime); in compute_password_element() 274 grp->prime = NULL; in compute_password_element() 297 if ((cruft = os_malloc(BN_num_bytes(grp->prime))) == NULL) in compute_keys() 312 os_memset(cruft, 0, BN_num_bytes(grp->prime)); in compute_keys() [all …]
|
/external/jmonkeyengine/engine/src/blender/com/jme3/asset/ |
D | BlenderKey.java | 388 final int prime = 31; in hashCode() local 390 result = prime * result + (assetRootPath == null ? 0 : assetRootPath.hashCode()); in hashCode() 391 result = prime * result + (defaultMaterial == null ? 0 : defaultMaterial.hashCode()); in hashCode() 392 result = prime * result + (faceCullMode == null ? 0 : faceCullMode.hashCode()); in hashCode() 393 result = prime * result + featuresToLoad; in hashCode() 394 result = prime * result + (fixUpAxis ? 1231 : 1237); in hashCode() 395 result = prime * result + fps; in hashCode() 396 result = prime * result + generatedTextureDepth; in hashCode() 397 result = prime * result + generatedTextureHeight; in hashCode() 398 result = prime * result + generatedTextureWidth; in hashCode() [all …]
|
/external/openssh/ |
D | moduli.0 | 7 The /etc/moduli file contains prime numbers and generators for use by 14 are prime and are safe for use in Diffie-Hellman operations by sshd(8). 24 the prime modulus. Supported types are: 27 2 "Safe" prime; (p-1)/2 is also prime. 28 4 Sophie Germain; 2p+1 is also prime. 32 testing with ssh-keygen(1) produces safe prime moduli 41 0x01 Composite number M-bM-^@M-^S not prime. 53 size Decimal number indicating the size of the prime in
|
D | dh.c | 49 char *strsize, *gen, *prime; in parse_prime() local 105 prime = strsep(&cp, " "); /* prime */ in parse_prime() 106 if (cp != NULL || *prime == '\0') { in parse_prime() 121 if (BN_hex2bn(&dhg->p, prime) == 0) { in parse_prime()
|
D | kexgex.c | 53 const BIGNUM *prime, in kexgex_hash() argument 80 (r = sshbuf_put_bignum2(b, prime)) != 0 || in kexgex_hash()
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/stat/descriptive/moment/ |
D | VectorialCovariance.java | 124 final int prime = 31; in hashCode() local 126 result = prime * result + (isBiasCorrected ? 1231 : 1237); in hashCode() 127 result = prime * result + (int) (n ^ (n >>> 32)); in hashCode() 128 result = prime * result + Arrays.hashCode(productsSums); in hashCode() 129 result = prime * result + Arrays.hashCode(sums); in hashCode()
|
D | VectorialMean.java | 84 final int prime = 31; in hashCode() local 86 result = prime * result + Arrays.hashCode(means); in hashCode()
|
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/ |
D | ShadowPendingIntent.java | 110 final int prime = 31; in hashCode() local 112 result = prime * result + (isActivityIntent ? 1231 : 1237); in hashCode() 113 result = prime * result + (isBroadcastIntent ? 1231 : 1237); in hashCode() 114 result = prime * result + (isServiceIntent ? 1231 : 1237); in hashCode() 115 result = prime * result + requestCode; in hashCode() 116 result = prime * result + ((savedIntent == null) ? 0 : savedIntent.hashCode()); in hashCode()
|
/external/conscrypt/src/main/java/org/conscrypt/ |
D | X509PublicKey.java | 61 final int prime = 31; in hashCode() local 63 result = prime * result + ((algorithm == null) ? 0 : algorithm.hashCode()); in hashCode() 64 result = prime * result + Arrays.hashCode(encoded); in hashCode()
|
/external/apache-commons-math/src/main/java/org/apache/commons/math/random/ |
D | JDKRandomGenerator.java | 41 final long prime = 4294967291l; in setSeed() local 45 combined = combined * prime + s; in setSeed()
|
D | AbstractRandomGenerator.java | 73 final long prime = 4294967291l; in setSeed() local 77 combined = combined * prime + s; in setSeed()
|
/external/libvorbis/lib/ |
D | lpc.c | 133 void vorbis_lpc_predict(float *coeff,float *prime,int m, in vorbis_lpc_predict() argument 144 if(!prime) in vorbis_lpc_predict() 149 work[i]=prime[i]; in vorbis_lpc_predict()
|
/external/wpa_supplicant_8/src/crypto/ |
D | crypto_openssl.c | 1151 BIGNUM *prime; member 1209 e->prime = BN_new(); in crypto_ec_init() 1213 if (e->group == NULL || e->bnctx == NULL || e->prime == NULL || in crypto_ec_init() 1215 !EC_GROUP_get_curve_GFp(e->group, e->prime, e->a, e->b, e->bnctx) || in crypto_ec_init() 1232 BN_clear_free(e->prime); in crypto_ec_deinit() 1249 return BN_num_bytes(e->prime); in crypto_ec_prime_len() 1255 return BN_num_bits(e->prime); in crypto_ec_prime_len_bits() 1261 return (const struct crypto_bignum *) e->prime; in crypto_ec_get_prime() 1285 int len = BN_num_bytes(e->prime); in crypto_ec_point_to_bin() 1315 int len = BN_num_bytes(e->prime); in crypto_ec_point_from_bin() [all …]
|
D | dh_groups.c | 1213 if (os_memcmp(wpabuf_head(*priv), dh->prime, dh->prime_len) > 0) { in dh_init() 1225 dh->prime, dh->prime_len, wpabuf_mhead(pv), in dh_init() 1261 dh->prime, dh->prime_len, in dh_derive_shared()
|
/external/icu/icu4c/source/data/translit/ |
D | Uzbek_Latin_BGN.txt | 12 $prime = ʹ ; 98 Ъ → $prime ; # CYRILLIC CAPITAL LETTER HARD SIGN 99 ъ → $prime ; # CYRILLIC SMALL LETTER HARD SIGN 100 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN 101 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
|
D | Mongolian_Latin_BGN.txt | 12 $prime = ʹ ; 89 Ъ → $prime ; # CYRILLIC CAPITAL LETTER HARD SIGN 90 ъ → $prime ; # CYRILLIC SMALL LETTER HARD SIGN
|
D | Kirghiz_Latin_BGN.txt | 12 $prime = ʹ ; 99 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN 100 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
|
D | Belarusian_Latin_BGN.txt | 12 $prime = ʹ ; 97 Ь → $prime ; # CYRILLIC CAPITAL LETTER SOFT SIGN 98 ь → $prime ; # CYRILLIC SMALL LETTER SOFT SIGN
|
/external/jmonkeyengine/engine/src/blender/com/jme3/scene/plugins/blender/objects/ |
D | Properties.java | 416 final int prime = 31; in hashCode() local 418 result = prime * result + (description == null ? 0 : description.hashCode()); in hashCode() 419 result = prime * result + (name == null ? 0 : name.hashCode()); in hashCode() 420 result = prime * result + subType; in hashCode() 421 result = prime * result + type; in hashCode() 422 result = prime * result + (value == null ? 0 : value.hashCode()); in hashCode()
|
/external/oauth/core/src/main/java/net/oauth/ |
D | OAuth.java | 242 final int prime = 31; in hashCode() local 244 result = prime * result + ((key == null) ? 0 : key.hashCode()); in hashCode() 245 result = prime * result + ((value == null) ? 0 : value.hashCode()); in hashCode()
|
/external/icu/icu4c/source/test/perf/unisetperf/draft/ |
D | bitset.cpp | 36 const int32_t prime=1301; // Less than 2k. member 65 hash=(hash+prime)&0x7ff; in map()
|