/external/iptables/extensions/ |
D | libxt_string.t | 2 # ERROR: cannot find: iptables -I INPUT -m string --algo bm --string "test" 3 # -m string --algo bm --string "test";=;OK 4 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp --string "test") 5 # -m string --algo kmp --string "test";=;OK 6 # ERROR: cannot find: iptables -I INPUT -m string --algo kmp ! --string "test" 7 # -m string --algo kmp ! --string "test";=;OK 8 # cannot find: iptables -I INPUT -m string --algo bm --string "xxxxxxxxxxx" ....] 9 # -m string --algo bm --string "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx… 10 # ERROR: cannot load: iptables -A INPUT -m string --algo bm --string "xxxx" 11 # -m string --algo bm --string "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx… [all …]
|
D | libxt_string.man | 3 \fB\-\-algo\fP {\fBbm\fP|\fBkmp\fP} 27 iptables \-A INPUT \-p tcp \-\-dport 80 \-m string \-\-algo bm \-\-string 'GET /index.html' \-j LOG 31 iptables \-p udp \-\-dport 53 \-m string \-\-algo bm \-\-from 40 \-\-to 57 \-\-hex\-string '|03|www…
|
D | libxt_string.c | 62 .flags = XTOPT_MAND | XTOPT_PUT, XTOPT_POINTER(s, algo)}, 268 printf(" ALGO name %s", info->algo); in string_print() 292 printf(" --algo %s", info->algo); in string_save()
|
/external/libnl/lib/route/cls/ematch/ |
D | text.c | 89 void rtnl_ematch_text_set_algo(struct rtnl_ematch *e, const char *algo) in rtnl_ematch_text_set_algo() argument 93 strncpy(t->cfg.algo, algo, sizeof(t->cfg.algo)); in rtnl_ematch_text_set_algo() 100 return t->cfg.algo[0] ? t->cfg.algo : NULL; in rtnl_ematch_text_get_algo() 130 t->cfg.algo[0] ? t->cfg.algo : "no-algo", in text_dump()
|
/external/kmod/libkmod/ |
D | libkmod-signature.c | 85 uint8_t algo; /* Public-key crypto algorithm [enum pkey_algo] */ member 127 if (modsig->algo >= PKEY_ALGO__LAST || in kmod_module_signature_info() 144 sig_info->algo = pkey_algo[modsig->algo]; in kmod_module_signature_info()
|
/external/kernel-headers/original/uapi/linux/ |
D | virtio_crypto.h | 61 __le32 algo; member 83 __le32 algo; member 120 __le32 algo; member 148 __le32 algo; member 166 __le32 algo; member 271 __le32 algo; member
|
/external/iproute2/ip/ |
D | ipxfrm.c | 498 static void __xfrm_algo_print(struct xfrm_algo *algo, int type, int len, in __xfrm_algo_print() argument 509 if (len < sizeof(*algo)) { in __xfrm_algo_print() 513 len -= sizeof(*algo); in __xfrm_algo_print() 515 fprintf(fp, "%s ", algo->alg_name); in __xfrm_algo_print() 517 keylen = algo->alg_key_len / 8; in __xfrm_algo_print() 526 fprintf(fp, "%.2x", (unsigned char)algo->alg_key[i]); in __xfrm_algo_print() 529 fprintf(fp, " (%d bits)", algo->alg_key_len); in __xfrm_algo_print() 537 static inline void xfrm_algo_print(struct xfrm_algo *algo, int type, int len, in xfrm_algo_print() argument 540 return __xfrm_algo_print(algo, type, len, fp, prefix, 1); in xfrm_algo_print() 543 static void xfrm_aead_print(struct xfrm_algo_aead *algo, int len, in xfrm_aead_print() argument [all …]
|
/external/curl/lib/vauth/ |
D | digest.c | 613 digest->algo = CURLDIGESTALGO_MD5SESS; in Curl_auth_decode_digest_http_message() 615 digest->algo = CURLDIGESTALGO_MD5; in Curl_auth_decode_digest_http_message() 617 digest->algo = CURLDIGESTALGO_SHA256; in Curl_auth_decode_digest_http_message() 619 digest->algo = CURLDIGESTALGO_SHA256SESS; in Curl_auth_decode_digest_http_message() 621 digest->algo = CURLDIGESTALGO_SHA512_256; in Curl_auth_decode_digest_http_message() 623 digest->algo = CURLDIGESTALGO_SHA512_256SESS; in Curl_auth_decode_digest_http_message() 756 if(digest->algo == CURLDIGESTALGO_MD5SESS || in _Curl_auth_create_digest_http_message() 757 digest->algo == CURLDIGESTALGO_SHA256SESS || in _Curl_auth_create_digest_http_message() 758 digest->algo == CURLDIGESTALGO_SHA512_256SESS) { in _Curl_auth_create_digest_http_message() 953 switch(digest->algo) { in Curl_auth_create_digest_http_message() [all …]
|
/external/lzma/CPP/7zip/Crypto/ |
D | MyAes.cpp | 75 bool CAesCbcCoder::SetFunctions(UInt32 algo) in SetFunctions() argument 80 if (algo == 1) in SetFunctions() 86 if (algo == 2) in SetFunctions()
|
D | MyAes.h | 28 bool SetFunctions(UInt32 algo);
|
/external/toybox/toys/lsb/ |
D | passwd.c | 39 char *algo; in GLOBALS() argument 136 if (!(toys.optflags & FLAG_a)) TT.algo = "des"; in passwd_main() 137 if (get_salt(salt, TT.algo) == -1) in passwd_main()
|
/external/tensorflow/tensorflow/stream_executor/cuda/ |
D | cuda_dnn.cc | 295 cudnnConvolutionFwdAlgo_t algo = in ToConvForwardAlgo() local 297 switch (algo) { in ToConvForwardAlgo() 310 return algo; in ToConvForwardAlgo() 319 cudnnConvolutionBwdDataAlgo_t algo = in ToConvBackwardDataAlgo() local 321 switch (algo) { in ToConvBackwardDataAlgo() 332 return algo; in ToConvBackwardDataAlgo() 342 cudnnConvolutionBwdFilterAlgo_t algo = in ToConvBackwardFilterAlgo() local 344 switch (algo) { in ToConvBackwardFilterAlgo() 354 return algo; in ToConvBackwardFilterAlgo() 2152 cudnnConvolutionFwdAlgo_t algo; in GetCudnnConvolutionForwardAlgorithm() local [all …]
|
/external/tensorflow/tensorflow/compiler/xla/service/gpu/ |
D | cudnn_convolution_algorithm_picker.cc | 141 string AlgorithmToString(const AlgorithmDesc& algo) { in AlgorithmToString() argument 142 if (algo.tensor_ops_enabled()) { in AlgorithmToString() 143 return tensorflow::strings::StrCat(algo.algo_id(), "+TC"); in AlgorithmToString() 145 return tensorflow::strings::StrCat(algo.algo_id()); in AlgorithmToString()
|
/external/vboot_reference/scripts/image_signing/ |
D | sign_official_build.sh | 463 local algo algos=( 472 algo=${algos[${key_size}]} 473 if [[ -z ${algo} ]]; then 477 pad_digest_utility ${algo} "${image}" | \
|
/external/lzma/DOC/ |
D | Methods.txt | 131 F0 - Ciphers without hashing algo 148 01 - ZipCrypto (Main Zip crypto algo)
|
/external/toybox/lib/ |
D | password.c | 12 int get_salt(char *salt, char *algo) in get_salt() argument 20 if (!strcmp(algo, al[i].type)) { in get_salt()
|
/external/kernel-headers/original/uapi/linux/tc_ematch/ |
D | tc_em_text.h | 11 char algo[TC_EM_TEXT_ALGOSIZ]; member
|
/external/iptables/include/linux/netfilter/ |
D | xt_string.h | 17 char algo[XT_STRING_MAX_ALGO_NAME_SIZE]; member
|
/external/kernel-headers/original/uapi/linux/netfilter/ |
D | xt_string.h | 18 char algo[XT_STRING_MAX_ALGO_NAME_SIZE]; member
|
/external/python/cpython2/PC/VC6/ |
D | build_ssl.py | 114 for algo in ("RC5", "MDC2", "IDEA"): 115 noalgo = " -DOPENSSL_NO_%s" % algo
|
/external/python/cpython2/PC/VS8.0/ |
D | build_ssl.py | 136 for algo in ("RC5", "MDC2", "IDEA"): 137 noalgo = " -DOPENSSL_NO_%s" % algo
|
/external/python/cpython2/PC/VS9.0/ |
D | build_ssl.py | 116 for algo in ("RC5", "MDC2", "IDEA"): 117 noalgo = " -DOPENSSL_NO_%s" % algo
|
/external/lzma/C/ |
D | LzmaEnc.h | 24 int algo; /* 0 - fast, 1 - normal, default = 1 */ member
|
/external/mdnsresponder/mDNSCore/ |
D | DNSDigest.c | 1443 domainname * algo; in DNSDigest_VerifyMessage() local 1449 algo = (domainname*) ptr; in DNSDigest_VerifyMessage() 1451 if (!SameDomainName(algo, &HMAC_MD5_AlgName)) in DNSDigest_VerifyMessage() 1453 LogMsg("ERROR: DNSDigest_VerifyMessage - TSIG algorithm not supported: %##s", algo->c); in DNSDigest_VerifyMessage() 1460 ptr += DomainNameLength(algo); in DNSDigest_VerifyMessage() 1531 MD5_Update(&c, algo->c, DomainNameLength(algo)); in DNSDigest_VerifyMessage()
|
/external/curl/lib/ |
D | x509asn1.c | 815 const char *algo, curl_asn1Element *param, in do_pubkey() argument 830 if(strcasecompare(algo, "rsaEncryption")) { in do_pubkey() 855 else if(strcasecompare(algo, "dsa")) { in do_pubkey() 864 else if(strcasecompare(algo, "dhpublicnumber")) { in do_pubkey() 872 else if(strcasecompare(algo, "ecPublicKey")) { in do_pubkey()
|