/external/libpcap/ |
pcap-pf.c | 98 register int pad; local 132 pad = pc->fddipad; 178 /* Calculate inc before possible pad update */ 206 h.len = sp->ens_count - pad; 211 p += pad; 212 buflen -= pad;
|
/external/openssl/crypto/asn1/ |
a_int.c | 96 * encoding, except if the first byte is >= 0x80 we need to add a zero pad. 108 * Padding is a little trickier too. If the first bytes is > 0x80 then we pad 110 * is non-zero we pad with 0xff. The reason for this distinction is that 0x80 116 int pad=0,ret,i,neg; local 128 pad=1; 132 pad=1; 136 * Special case: if any other bytes non zero we pad: 140 pad=1; 146 ret+=pad; 151 if (pad) *(p++)=pb [all...] |
/external/ppp/pppd/include/ |
pcap-int.h | 62 int pad; member in struct:pcap_md
|
/external/quake/quake/src/QW/client/ |
net.h | 28 unsigned short pad; member in struct:__anon6767
|
/external/speex/libspeex/ |
kiss_fftr.c | 28 long pad; member in struct:kiss_fftr_state
|
/external/webkit/SunSpider/resources/ |
sunspider-compare-results.js | 286 function pad(str, n) function 296 result = pad("", indent); 298 result = pad(result, labelWidth + 2); 326 return result + pad(diffSummary, 18) + formatMean(meanWidth1, mean1, stdErr1, count1) + " " + formatMean(meanWidth2, mean2, stdErr2, count2) + diffDetail;
|
/external/wpa_supplicant/ |
aes_wrap.c | 158 static void gf_mulx(u8 *pad) 162 carry = pad[0] & 0x80; 164 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); 165 pad[BLOCK_SIZE - 1] <<= 1; 167 pad[BLOCK_SIZE - 1] ^= 0x87; 184 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 216 os_memset(pad, 0, BLOCK_SIZE); 217 aes_encrypt(ctx, pad, pad) [all...] |
tlsv1_common.c | 348 size_t pad; local 349 pad = (len + 1) % rl->iv_size; 350 if (pad) 351 pad = rl->iv_size - pad; 352 if (pos + pad + 1 > buf + buf_size) { 357 os_memset(pos, pad, pad + 1); 358 pos += pad + 1; 470 " (no pad)"); [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
aes_wrap.c | 157 static void gf_mulx(u8 *pad) 161 carry = pad[0] & 0x80; 163 pad[i] = (pad[i] << 1) | (pad[i + 1] >> 7); 164 pad[BLOCK_SIZE - 1] <<= 1; 166 pad[BLOCK_SIZE - 1] ^= 0x87; 187 u8 cbc[BLOCK_SIZE], pad[BLOCK_SIZE]; local 219 os_memset(pad, 0, BLOCK_SIZE); 220 aes_encrypt(ctx, pad, pad) [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/wps/ |
wps_common.c | 157 u8 pad; local 183 pad = *pos; 184 if (pad > wpabuf_len(decrypted)) { 185 wpa_printf(MSG_DEBUG, "WPS: Invalid PKCS#5 v2.0 pad value"); 189 for (i = 0; i < pad; i++) { 190 if (*pos-- != pad) { 191 wpa_printf(MSG_DEBUG, "WPS: Invalid PKCS#5 v2.0 pad " 197 decrypted->used -= pad;
|
/prebuilt/ndk/android-ndk-r4/platforms/android-5/arch-x86/usr/include/asm/ |
desc_32.h | 29 unsigned short pad; member in struct:Xgt_desc_struct
|
/prebuilt/ndk/android-ndk-r4/platforms/android-8/arch-x86/usr/include/asm/ |
desc_32.h | 29 unsigned short pad; member in struct:Xgt_desc_struct
|
/bionic/libc/kernel/arch-sh/asm/ |
ptrace.h | 22 unsigned long long pad[2]; member in struct:pt_regs
|
/bootable/diskinstaller/libdiskconfig/ |
diskconfig.h | 70 uint16_t pad; /* bytes 444-445 */ member in struct:pc_boot_record
|
/device/samsung/crespo/libs3cjpeg/ |
JpegEncoder.cpp | 651 bool ret = pad(srcBuf, width, height, dstBuf, expectedWidth, expectedHeight); 658 bool JpegEncoder::pad(char *srcBuf, uint32_t srcWidth, uint32_t srcHight, function in class:android::JpegEncoder
|
/external/bouncycastle/src/main/java/org/bouncycastle/jce/provider/ |
JCERSACipher.java | 190 String pad = Strings.toUpperCase(padding); local 192 if (pad.equals("NOPADDING")) 196 else if (pad.equals("PKCS1PADDING")) 200 else if (pad.equals("ISO9796-1PADDING")) 204 else if (pad.equals("OAEPWITHMD5ANDMGF1PADDING")) 208 else if (pad.equals("OAEPPADDING")) 212 else if (pad.equals("OAEPWITHSHA1ANDMGF1PADDING") || pad.equals("OAEPWITHSHA-1ANDMGF1PADDING")) 216 else if (pad.equals("OAEPWITHSHA224ANDMGF1PADDING") || pad.equals("OAEPWITHSHA-224ANDMGF1PADDING") [all...] |
/external/bouncycastle/src/main/java/org/bouncycastle/x509/ |
X509V3CertificateGenerator.java | 209 int pad = id.length % 8; local 211 if (pad == 0) 217 return new DERBitString(bytes, 8 - pad);
|
/external/chromium/third_party/icu/source/i18n/ |
nfsubs.cpp | 1046 UBool pad = FALSE; local [all...] |
/external/chromium/third_party/icu/source/tools/genrb/ |
reslist.c | 55 /* returns space we need to pad */ 129 /* usedOffset += res->fSize + pad; */ 155 uint32_t pad = 0; local 160 pad = (BIN_ALIGNMENT - dataStart % BIN_ALIGNMENT); 161 udata_writePadding(mem, pad); 162 usedOffset += pad; 169 udata_writePadding(mem, (BIN_ALIGNMENT - pad + extrapad)); 181 uint8_t pad = 0; local 193 pad = calcPadding(res->fSize); 254 udata_writePadding(mem, pad); 314 uint8_t pad = 0; local [all...] |
/external/freetype/src/base/ |
ftbitmap.c | 398 FT_Int pad; local 410 pad = 0; 413 pad = source->width % alignment; 414 if ( pad != 0 ) 415 pad = alignment - pad; 418 target->pitch = source->width + pad;
|
/external/grub/netboot/ |
3c509.c | 162 int pad; local 173 pad = padmap[len & 3]; 180 if (len + pad > ETH_FRAME_LEN) { 193 while (inw(BASE + EP_W1_FREE_TX) < (unsigned short)len + pad + 4) 207 while (pad--)
|
/external/grub/stage2/ |
vstafs.h | 78 char pad[16]; member in struct:fs_file
|
/external/icu4c/i18n/ |
nfsubs.cpp | 1048 UBool pad = FALSE; local [all...] |
/external/icu4c/samples/cal/ |
cal.c | 424 int32_t width, pad, i, day; local 458 pad = width - u_strlen(s); 459 indent(pad / 2, stdout); 502 pad = lens[current] - u_strlen(s); 503 indent(pad, stdout); 542 int32_t width, pad, i, j; local 584 pad = 2 * width + MARGIN_WIDTH - u_strlen(s); 585 indent(pad / 2, stdout); 601 pad = width - u_strlen(months[i]); 602 indent(pad / 2, stdout) [all...] |
/external/kernel-headers/original/asm-x86/ |
desc_32.h | 18 unsigned short pad; member in struct:Xgt_desc_struct
|