/external/openssl/crypto/bn/ |
bn_exp.c | 120 int BN_exp(BIGNUM *r, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) 132 BN_CTX_start(ctx); 134 rr = BN_CTX_get(ctx); 137 v = BN_CTX_get(ctx); 149 if (!BN_sqr(v,v,ctx)) goto err; 152 if (!BN_mul(rr,rr,v,ctx)) goto err; 158 BN_CTX_end(ctx); 165 BN_CTX *ctx) 220 ret=BN_mod_exp_mont_word(r,A,p,m,ctx,NULL); 224 ret=BN_mod_exp_mont(r,a,p,m,ctx,NULL) [all...] |
bn_sqrt.c | 62 BIGNUM *BN_mod_sqrt(BIGNUM *in, const BIGNUM *a, const BIGNUM *p, BN_CTX *ctx) 114 BN_CTX_start(ctx); 115 A = BN_CTX_get(ctx); 116 b = BN_CTX_get(ctx); 117 q = BN_CTX_get(ctx); 118 t = BN_CTX_get(ctx); 119 x = BN_CTX_get(ctx); 120 y = BN_CTX_get(ctx); 128 if (!BN_nnmod(A, a, p, ctx)) goto end; 148 if (!BN_mod_exp(ret, A, q, p, ctx)) goto end [all...] |
/external/webkit/JavaScriptCore/API/ |
JSObjectRef.h | 82 @param ctx The execution context to use. 86 void Initialize(JSContextRef ctx, JSObjectRef object); 92 (*JSObjectInitializeCallback) (JSContextRef ctx, JSObjectRef object); 115 @param ctx The execution context to use. 121 bool HasProperty(JSContextRef ctx, JSObjectRef object, JSStringRef propertyName); 130 (*JSObjectHasPropertyCallback) (JSContextRef ctx, JSObjectRef object, JSStringRef propertyName); 135 @param ctx The execution context to use. 142 JSValueRef GetProperty(JSContextRef ctx, JSObjectRef object, JSStringRef propertyName, JSValueRef* exception); 147 (*JSObjectGetPropertyCallback) (JSContextRef ctx, JSObjectRef object, JSStringRef propertyName, JSValueRef* exception); 152 @param ctx The execution context to use [all...] |
JSBase.cpp | 44 JSValueRef JSEvaluateScript(JSContextRef ctx, JSStringRef script, JSObjectRef thisObject, JSStringRef sourceURL, int startingLineNumber, JSValueRef* exception) 46 ExecState* exec = toJS(ctx); 69 bool JSCheckScriptSyntax(JSContextRef ctx, JSStringRef script, JSStringRef sourceURL, int startingLineNumber, JSValueRef* exception) 71 ExecState* exec = toJS(ctx); 85 void JSGarbageCollect(JSContextRef ctx) 92 if (!ctx) 95 ExecState* exec = toJS(ctx); 107 void JSReportExtraMemoryCost(JSContextRef ctx, size_t size) 109 ExecState* exec = toJS(ctx);
|
/external/wpa_supplicant_6/wpa_supplicant/ |
preauth_test.c | 93 static void _wpa_supplicant_set_state(void *ctx, wpa_states state) 95 struct wpa_supplicant *wpa_s = ctx; 100 static wpa_states _wpa_supplicant_get_state(void *ctx) 102 struct wpa_supplicant *wpa_s = ctx; 176 static void wpa_supplicant_set_config_blob(void *ctx, 179 struct wpa_supplicant *wpa_s = ctx; 185 wpa_supplicant_get_config_blob(void *ctx, const char *name) 187 struct wpa_supplicant *wpa_s = ctx; 233 struct wpa_sm_ctx *ctx; local 238 ctx = os_zalloc(sizeof(*ctx)) [all...] |
wpas_glue.c | 35 static void wpa_supplicant_set_config_blob(void *ctx, 38 struct wpa_supplicant *wpa_s = ctx; 51 wpa_supplicant_get_config_blob(void *ctx, const char *name) 53 struct wpa_supplicant *wpa_s = ctx; 113 * @ctx: Pointer to wpa_supplicant data (wpa_s) 122 static int wpa_supplicant_eapol_send(void *ctx, int type, const u8 *buf, 125 struct wpa_supplicant *wpa_s = ctx; 189 * @ctx: Pointer to wpa_supplicant data (wpa_s) 196 static int wpa_eapol_set_wep_key(void *ctx, int unicast, int keyidx, 199 struct wpa_supplicant *wpa_s = ctx; 539 struct eapol_ctx *ctx; local 581 struct wpa_sm_ctx *ctx; local [all...] |
/external/e2fsprogs/e2fsck/ |
e2fsck.h | 215 int (*progress)(e2fsck_t ctx, int pass, unsigned long cur, 357 extern void e2fsck_pass1(e2fsck_t ctx); 358 extern void e2fsck_pass1_dupblocks(e2fsck_t ctx, char *block_buf); 359 extern void e2fsck_pass2(e2fsck_t ctx); 360 extern void e2fsck_pass3(e2fsck_t ctx); 361 extern void e2fsck_pass4(e2fsck_t ctx); 362 extern void e2fsck_pass5(e2fsck_t ctx); 366 extern errcode_t e2fsck_reset_context(e2fsck_t ctx); 367 extern void e2fsck_free_context(e2fsck_t ctx); 368 extern int e2fsck_run(e2fsck_t ctx); [all...] |
super.c | 25 static void check_super_value(e2fsck_t ctx, const char *descr, 36 fix_problem(ctx, PR_0_MISC_CORRUPT_SUPER, &pctx); 37 ctx->flags |= E2F_FLAG_ABORT; /* never get here! */ 45 e2fsck_t ctx; member in struct:process_block_struct 64 e2fsck_t ctx; local 70 ctx = pb->ctx; 81 fix_problem(ctx, PR_0_ORPHAN_ILLEGAL_BLOCK_NUM, pctx); 88 fix_problem(ctx, PR_0_ORPHAN_ALREADY_CLEARED_BLOCK, pctx); 153 static int release_inode_blocks(e2fsck_t ctx, ext2_ino_t ino [all...] |
/external/webkit/WebCore/inspector/front-end/ |
SourceFrame.js | 536 _drawProgramCounterInContext: function(ctx, glow) 539 ctx.save(); 541 ctx.beginPath(); 542 ctx.moveTo(17, 2); 543 ctx.lineTo(19, 2); 544 ctx.lineTo(19, 0); 545 ctx.lineTo(21, 0); 546 ctx.lineTo(26, 5.5); 547 ctx.lineTo(21, 11); 548 ctx.lineTo(19, 11) 573 var ctx = document.getCSSCanvasContext("2d", "program-counter", 26, 11); variable 618 var ctx = document.getCSSCanvasContext("2d", "breakpoint", 26, 11); variable 622 var ctx = document.getCSSCanvasContext("2d", "breakpoint-program-counter", 26, 11); variable 628 var ctx = document.getCSSCanvasContext("2d", "breakpoint-disabled", 26, 11); variable 632 var ctx = document.getCSSCanvasContext("2d", "breakpoint-disabled-program-counter", 26, 11); variable 641 var ctx = document.getCSSCanvasContext("2d", "breakpoint-conditional", 26, 11); variable 645 var ctx = document.getCSSCanvasContext("2d", "breakpoint-conditional-program-counter", 26, 11); variable 651 var ctx = document.getCSSCanvasContext("2d", "breakpoint-disabled-conditional", 26, 11); variable 655 var ctx = document.getCSSCanvasContext("2d", "breakpoint-disabled-conditional-program-counter", 26, 11); variable [all...] |
/external/openssl/crypto/evp/ |
e_aes.c | 60 static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 68 #define data(ctx) EVP_C_DATA(EVP_AES_KEY,ctx) 96 static int aes_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 101 if ((ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_CFB_MODE 102 || (ctx->cipher->flags & EVP_CIPH_MODE) == EVP_CIPH_OFB_MODE 104 ret=AES_set_encrypt_key(key, ctx->key_len * 8, ctx->cipher_data); 106 ret=AES_set_decrypt_key(key, ctx->key_len * 8, ctx->cipher_data) [all...] |
e_rc5.c | 69 static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 79 #define data(ctx) EVP_C_DATA(EVP_RC5_KEY,ctx) 118 static int r_32_12_16_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 121 RC5_32_set_key(&data(ctx)->ks,EVP_CIPHER_CTX_key_length(ctx), 122 key,data(ctx)->rounds);
|
e_seed.c | 65 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, const unsigned char *iv, int enc); 76 static int seed_init_key(EVP_CIPHER_CTX *ctx, const unsigned char *key, 79 SEED_set_key(key, ctx->cipher_data);
|
/external/openssl/crypto/jpake/ |
jpake.h | 61 void JPAKE_CTX_free(JPAKE_CTX *ctx); 68 int JPAKE_STEP1_generate(JPAKE_STEP1 *send, JPAKE_CTX *ctx); 69 int JPAKE_STEP1_process(JPAKE_CTX *ctx, const JPAKE_STEP1 *received); 77 int JPAKE_STEP2_generate(JPAKE_STEP2 *send, JPAKE_CTX *ctx); 78 int JPAKE_STEP2_process(JPAKE_CTX *ctx, const JPAKE_STEP2 *received); 87 int JPAKE_STEP3A_generate(JPAKE_STEP3A *send, JPAKE_CTX *ctx); 88 int JPAKE_STEP3A_process(JPAKE_CTX *ctx, const JPAKE_STEP3A *received); 92 int JPAKE_STEP3B_generate(JPAKE_STEP3B *send, JPAKE_CTX *ctx); 93 int JPAKE_STEP3B_process(JPAKE_CTX *ctx, const JPAKE_STEP3B *received); 98 * ctx is released, and will change when a new handshake is performed [all...] |
/external/libxml2/ |
c14n.c | 86 xmlC14NCtxPtr ctx); 94 static int xmlC14NProcessNode(xmlC14NCtxPtr ctx, xmlNodePtr cur); 95 static int xmlC14NProcessNodeList(xmlC14NCtxPtr ctx, xmlNodePtr cur); 115 #define xmlC14NIsVisible( ctx, node, parent ) \ 116 (((ctx)->is_visible_callback != NULL) ? \ 117 (ctx)->is_visible_callback((ctx)->user_data, \ 398 * @ctx: the C14N context 440 xmlExcC14NVisibleNsStackFind(xmlC14NVisibleNsStackPtr cur, xmlNsPtr ns, xmlC14NCtxPtr ctx) { 466 return(xmlC14NIsVisible(ctx, ns1, cur->nodeTab[i])) 1479 xmlC14NCtxPtr ctx = NULL; local 1573 xmlC14NCtxPtr ctx; local [all...] |
/external/wpa_supplicant/ |
crypto_libtomcrypt.c | 104 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) 106 symmetric_key *skey = ctx; 111 void aes_encrypt_deinit(void *ctx) 113 symmetric_key *skey = ctx; 133 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) 135 symmetric_key *skey = ctx; 140 void aes_decrypt_deinit(void *ctx) 142 symmetric_key *skey = ctx; 163 struct crypto_hash *ctx; local 165 ctx = os_zalloc(sizeof(*ctx)) 308 struct crypto_cipher *ctx; local [all...] |
preauth.c | 62 static void rsn_preauth_receive(void *ctx, const u8 *src_addr, 65 struct wpa_sm *sm = ctx; 85 void *ctx) 87 struct wpa_sm *sm = ctx; 110 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: failed to get " 117 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACSTR 130 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACST 180 struct eapol_ctx *ctx; local [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
crypto_libtomcrypt.c | 104 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) 106 symmetric_key *skey = ctx; 111 void aes_encrypt_deinit(void *ctx) 113 symmetric_key *skey = ctx; 133 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) 135 symmetric_key *skey = ctx; 140 void aes_decrypt_deinit(void *ctx) 142 symmetric_key *skey = ctx; 163 struct crypto_hash *ctx; local 165 ctx = os_zalloc(sizeof(*ctx)) 308 struct crypto_cipher *ctx; local [all...] |
/external/openssl/crypto/ecdsa/ |
ecs_ossl.c | 92 BN_CTX *ctx = NULL; local 106 if ((ctx = BN_CTX_new()) == NULL) 113 ctx = ctx_in; 129 if (!EC_GROUP_get_order(group, order, ctx)) 148 if (!EC_POINT_mul(group, tmp_point, k, NULL, NULL, ctx)) 156 tmp_point, X, NULL, ctx)) 165 tmp_point, X, NULL, ctx)) 171 if (!BN_nnmod(r, X, order, ctx)) 180 if (!BN_mod_inverse(k, k, order, ctx)) 201 BN_CTX_free(ctx); 218 BN_CTX *ctx = NULL; local 347 BN_CTX *ctx; local [all...] |
/external/openssl/crypto/comp/ |
comp.h | 17 int (*init)(COMP_CTX *ctx); 18 void (*finish)(COMP_CTX *ctx); 19 int (*compress)(COMP_CTX *ctx, 22 int (*expand)(COMP_CTX *ctx, 43 void COMP_CTX_free(COMP_CTX *ctx); 44 int COMP_compress_block(COMP_CTX *ctx, unsigned char *out, int olen, 46 int COMP_expand_block(COMP_CTX *ctx, unsigned char *out, int olen,
|
/external/openssl/include/openssl/ |
comp.h | 17 int (*init)(COMP_CTX *ctx); 18 void (*finish)(COMP_CTX *ctx); 19 int (*compress)(COMP_CTX *ctx, 22 int (*expand)(COMP_CTX *ctx, 43 void COMP_CTX_free(COMP_CTX *ctx); 44 int COMP_compress_block(COMP_CTX *ctx, unsigned char *out, int olen, 46 int COMP_expand_block(COMP_CTX *ctx, unsigned char *out, int olen,
|
/external/wpa_supplicant_6/wpa_supplicant/src/rsn_supp/ |
preauth.c | 62 static void rsn_preauth_receive(void *ctx, const u8 *src_addr, 65 struct wpa_sm *sm = ctx; 84 void *ctx) 86 struct wpa_sm *sm = ctx; 110 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: failed to get " 117 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACSTR 130 wpa_msg(sm->ctx->ctx, MSG_INFO, "RSN: pre-authentication with " MACST 181 struct eapol_ctx *ctx; local [all...] |
/external/openssl/crypto/dh/ |
dh_gen.c | 109 BN_CTX *ctx=NULL; local 111 ctx=BN_CTX_new(); 112 if (ctx == NULL) goto err; 113 BN_CTX_start(ctx); 114 t1 = BN_CTX_get(ctx); 115 t2 = BN_CTX_get(ctx); 171 if (ctx != NULL) 173 BN_CTX_end(ctx); 174 BN_CTX_free(ctx);
|
/external/wpa_supplicant_6/wpa_supplicant/tests/ |
test_wpa.c | 54 static struct wpa_ssid * supp_get_ssid(void *ctx) 56 struct wpa *wpa = ctx; 62 static int supp_get_bssid(void *ctx, u8 *bssid) 64 struct wpa *wpa = ctx; 71 static void supp_set_state(void *ctx, wpa_states state) 87 static int supp_ether_send(void *ctx, const u8 *dest, u16 proto, const u8 *buf, 90 struct wpa *wpa = ctx; 108 static u8 * supp_alloc_eapol(void *ctx, u8 type, const void *data, 137 static int supp_get_beacon_ie(void *ctx) 139 struct wpa *wpa = ctx; 192 struct wpa_sm_ctx *ctx = os_zalloc(sizeof(*ctx)); local [all...] |
/external/openssl/crypto/asn1/ |
a_verify.c | 79 EVP_MD_CTX ctx; local 84 EVP_MD_CTX_init(&ctx); 103 if (!EVP_VerifyInit_ex(&ctx,type, NULL)) 109 EVP_VerifyUpdate(&ctx,(unsigned char *)buf_in,inl); 114 if (EVP_VerifyFinal(&ctx,(unsigned char *)signature->data, 121 /* we don't need to zero the 'ctx' because we just checked 123 /* memset(&ctx,0,sizeof(ctx)); */ 126 EVP_MD_CTX_cleanup(&ctx); 136 EVP_MD_CTX ctx; local [all...] |
/external/openssl/crypto/ecdh/ |
ech_ossl.c | 112 BN_CTX *ctx; local 127 if ((ctx = BN_CTX_new()) == NULL) goto err; 128 BN_CTX_start(ctx); 129 x = BN_CTX_get(ctx); 130 y = BN_CTX_get(ctx); 146 if (!EC_POINT_mul(group, tmp, NULL, pub_key, priv_key, ctx)) 154 if (!EC_POINT_get_affine_coordinates_GFp(group, tmp, x, y, ctx)) 162 if (!EC_POINT_get_affine_coordinates_GF2m(group, tmp, x, y, ctx)) 209 if (ctx) BN_CTX_end(ctx); [all...] |