/external/dropbear/libtomcrypt/src/encauth/ocb/ |
ocb_encrypt_authenticate_memory.c | 28 @param ct [out] The ciphertext 37 unsigned char *ct, 46 LTC_ARGCHK(ct != NULL); 61 if ((err = ocb_encrypt(ocb, pt, ct)) != CRYPT_OK) { 66 ct += ocb->block_len; 69 err = ocb_done_encrypt(ocb, pt, ptlen, ct, tag, taglen);
|
ocb_done_decrypt.c | 23 @param ct The ciphertext (if any) 32 const unsigned char *ct, unsigned long ctlen, 42 LTC_ARGCHK(ct != NULL); 56 if ((err = s_ocb_done(ocb, ct, ctlen, pt, tagbuf, &tagbuflen, 1)) != CRYPT_OK) {
|
ocb_encrypt.c | 24 @param ct [out] The ciphertext (same size as the pt) 27 int ocb_encrypt(ocb_state *ocb, const unsigned char *pt, unsigned char *ct) 34 LTC_ARGCHK(ct != NULL); 54 if ((err = cipher_descriptor[ocb->cipher].ecb_encrypt(tmp, ct, &ocb->key)) != CRYPT_OK) { 58 ct[x] ^= Z[x];
|
/frameworks/rs/ |
rsg_generator.c | 25 int ct; local 53 for (ct=0; ct < vt->ptrLevel; ct++) { 68 int ct; local 69 for (ct=0; ct < api->paramCount; ct++) { 70 if (ct || assumePrevious) { 73 printVarTypeAndName(f, &api->params[ct]); 78 int ct; local 127 int ct; local 141 int ct; local 151 int ct; local 163 int ct; local 188 int ct; local 449 int ct; local [all...] |
rsProgramStore.cpp | 45 for (uint32_t ct = 0; ct < mRSC->mStateFragmentStore.mStorePrograms.size(); ct++) { 46 if (mRSC->mStateFragmentStore.mStorePrograms[ct] == this) { 47 mRSC->mStateFragmentStore.mStorePrograms.removeAt(ct); 94 for (uint32_t ct = 0; ct < rsc->mStateFragmentStore.mStorePrograms.size(); ct++) { 95 ProgramStore *existing = rsc->mStateFragmentStore.mStorePrograms[ct];
|
rsSampler.cpp | 52 for (uint32_t ct = 0; ct < mRSC->mStateSampler.mAllSamplers.size(); ct++) { 53 if (mRSC->mStateSampler.mAllSamplers[ct] == this) { 54 mRSC->mStateSampler.mAllSamplers.removeAt(ct); 87 for (uint32_t ct = 0; ct < rsc->mStateSampler.mAllSamplers.size(); ct++) { 88 Sampler *existing = rsc->mStateSampler.mAllSamplers[ct];
|
/external/dropbear/libtomcrypt/src/encauth/eax/ |
eax_encrypt_authenticate_memory.c | 31 @param ct [out] The ciphertext 41 unsigned char *ct, 49 LTC_ARGCHK(ct != NULL); 59 if ((err = eax_encrypt(eax, pt, ct, ptlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/modes/ofb/ |
ofb_encrypt.c | 23 @param ct [out] Ciphertext 28 int ofb_encrypt(const unsigned char *pt, unsigned char *ct, unsigned long len, symmetric_OFB *ofb) 32 LTC_ARGCHK(ct != NULL); 51 *ct++ = *pt++ ^ ofb->IV[(ofb->padlen)++];
|
/external/clang/test/CodeGenCXX/ |
inline-functions.cpp | 46 ClassTemplate<C> ct; local 47 ct.g();
|
/frameworks/base/media/tests/omxjpegdecoder/ |
SkOmxPixelRef.cpp | 39 void* SkOmxPixelRef::onLockPixels(SkColorTable** ct) { 40 *ct = mCTable;
|
/external/dropbear/libtomcrypt/src/ciphers/ |
noekeon.c | 108 @param ct The output ciphertext (16 bytes) 113 static int _noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 115 int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 123 LTC_ARGCHK(ct != NULL); 144 STORE32H(a,&ct[0]); STORE32H(b,&ct[4]); 145 STORE32H(c,&ct[8]); STORE32H(d,&ct[12]); 151 int noekeon_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 153 int err = _noekeon_ecb_encrypt(pt, ct, skey) [all...] |
skipjack.c | 139 @param ct The output ciphertext (8 bytes) 144 static int _skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 146 int skipjack_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 153 LTC_ARGCHK(ct != NULL); 183 ct[0] = (w1>>8)&255; ct[1] = w1&255; 184 ct[2] = (w2>>8)&255; ct[3] = w2&255; 185 ct[4] = (w3>>8)&255; ct[5] = w3&255 [all...] |
/external/stlport/src/ |
time_facets.cpp | 148 void __subformat(_STLP_BASIC_IOSTRING(_Ch) &buf, const ctype<_Ch>& ct, variable 159 __write_formatted_timeT(buf, ct, *cp++, mod, table, t); 171 static void __append(__iostring &buf, char *first, char *last, const ctype<char>& /* ct */) 174 static void __append(__iowstring &buf, char *first, char *last, const ctype<wchar_t>& ct) { 176 ct.widen(first, last, _wbuf); 214 const ctype<_Ch>& ct, variable 238 __subformat(buf, ct, (modifier != '#') ? table._M_date_time_format 244 __append(buf, _buf, ((long)t->tm_mday < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct); 249 __append(buf, _buf, _buf + 2, ct); 254 __append(buf, _buf, ((long)t->tm_hour < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct); [all...] |
/ndk/sources/cxx-stl/stlport/src/ |
time_facets.cpp | 148 void __subformat(_STLP_BASIC_IOSTRING(_Ch) &buf, const ctype<_Ch>& ct, variable 159 __write_formatted_timeT(buf, ct, *cp++, mod, table, t); 171 static void __append(__iostring &buf, char *first, char *last, const ctype<char>& /* ct */) 174 static void __append(__iowstring &buf, char *first, char *last, const ctype<wchar_t>& ct) { 176 ct.widen(first, last, _wbuf); 214 const ctype<_Ch>& ct, variable 238 __subformat(buf, ct, (modifier != '#') ? table._M_date_time_format 244 __append(buf, _buf, ((long)t->tm_mday < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct); 249 __append(buf, _buf, _buf + 2, ct); 254 __append(buf, _buf, ((long)t->tm_hour < 10L && modifier == '#') ? _buf + 1 : _buf + 2, ct); [all...] |
/external/chromium_org/content/public/common/ |
signed_certificate_timestamp_id_and_status.cc | 10 int id, net::ct::SCTVerifyStatus status)
|
/external/chromium_org/third_party/openssl/openssl/ssl/ |
d1_srtp.c | 266 int ct=0; local 272 ct=sk_SRTP_PROTECTION_PROFILE_num(clnt); /* -1 if clnt == 0 */ 276 if(ct==0) 282 if((2 + ct*2 + 1) > maxlen) 289 s2n(ct * 2, p); 290 for(i=0;i<ct;i++) 300 *len=2 + ct*2 + 1; 310 int ct; local 325 n2s(d, ct); 329 if(ct%2 435 int ct; local [all...] |
/external/openssl/ssl/ |
d1_srtp.c | 266 int ct=0; local 272 ct=sk_SRTP_PROTECTION_PROFILE_num(clnt); /* -1 if clnt == 0 */ 276 if(ct==0) 282 if((2 + ct*2 + 1) > maxlen) 289 s2n(ct * 2, p); 290 for(i=0;i<ct;i++) 300 *len=2 + ct*2 + 1; 310 int ct; local 325 n2s(d, ct); 329 if(ct%2 435 int ct; local [all...] |
/external/dropbear/libtomcrypt/testprof/ |
modes_test.c | 6 unsigned char pt[64], ct[64], tmp[64], key[16], iv[16], iv2[16]; local 49 DO(cbc_encrypt(pt, ct, 64, &cbc)); 54 DO(cbc_decrypt(ct, tmp, 64, &cbc)); 72 DO(cfb_encrypt(pt, ct, 64, &cfb)); 77 DO(cfb_decrypt(ct, tmp, 64, &cfb)); 94 DO(ofb_encrypt(pt, ct, 64, &ofb)); 99 DO(ofb_decrypt(ct, tmp, 64, &ofb));
|
/external/libvpx/libvpx/vp9/common/ |
vp9_treecoder.h | 83 const unsigned int ct[2], 86 const vp9_prob prob = get_binary_prob(ct[0], ct[1]); 87 const unsigned int count = MIN(ct[0] + ct[1], count_sat); 109 const unsigned int ct[2] = { left_count, right_count }; local 110 probs[i >> 1] = merge_probs(pre_probs[i >> 1], ct,
|
/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_encrypter_test.cc | 28 // CT = 36 // CT = 62 const char* ct; member in struct:__anon9271::TestVector 231 string ct; local 244 ASSERT_TRUE(DecodeHexString(test_vector[j].ct, &ct)); 253 EXPECT_EQ(test_info.pt_len, ct.size() * 8); 272 ASSERT_EQ(ct.size() + tag_len, encrypted->length()); 274 ct.size(), ct.data(), ct.size()) [all...] |
/external/dropbear/libtomcrypt/src/ciphers/safer/ |
saferp.c | 330 @param ct The output ciphertext (16 bytes) 334 int saferp_ecb_encrypt(const unsigned char *pt, unsigned char *ct, symmetric_key *skey) 340 LTC_ARGCHK(ct != NULL); 347 ROUND(b, 0); LT(b, ct); 348 ROUND(ct, 2); LT(ct, b); 349 ROUND(b, 4); LT(b, ct); 350 ROUND(ct, 6); LT(ct, b); 351 ROUND(b, 8); LT(b, ct); [all...] |
/external/chromium/testing/gmock/include/gmock/ |
gmock-generated-function-mockers.h | 347 #define GMOCK_METHOD0_(tn, constness, ct, Method, F) \ 348 GMOCK_RESULT_(tn, F) ct Method() constness { \ 363 #define GMOCK_METHOD1_(tn, constness, ct, Method, F) \ 364 GMOCK_RESULT_(tn, F) ct Method(GMOCK_ARG_(tn, F, 1) gmock_a1) constness { \ 379 #define GMOCK_METHOD2_(tn, constness, ct, Method, F) \ 380 GMOCK_RESULT_(tn, F) ct Method(GMOCK_ARG_(tn, F, 1) gmock_a1, \ 397 #define GMOCK_METHOD3_(tn, constness, ct, Method, F) \ 398 GMOCK_RESULT_(tn, F) ct Method(GMOCK_ARG_(tn, F, 1) gmock_a1, \ 419 #define GMOCK_METHOD4_(tn, constness, ct, Method, F) \ 420 GMOCK_RESULT_(tn, F) ct Method(GMOCK_ARG_(tn, F, 1) gmock_a1, [all...] |
/external/libvpx/libvpx/vp9/encoder/ |
vp9_treewriter.h | 36 static INLINE unsigned int cost_branch256(const unsigned int ct[2], 38 return ct[0] * vp9_cost_zero(p) + ct[1] * vp9_cost_one(p); 41 static INLINE unsigned int cost_branch(const unsigned int ct[2], 43 return cost_branch256(ct, p) >> 8;
|
/external/chromium_org/net/test/ |
ct_test_util.cc | 19 namespace ct { namespace in namespace:net 160 entry->type = ct::LogEntry::LOG_ENTRY_TYPE_X509; 167 entry->type = ct::LogEntry::LOG_ENTRY_TYPE_PRECERT; 193 sct->version = ct::SignedCertificateTimestamp::SCT_VERSION_1; 201 sct->signature.hash_algorithm = ct::DigitallySigned::HASH_ALGO_SHA256; 202 sct->signature.signature_algorithm = ct::DigitallySigned::SIG_ALGO_ECDSA; 210 sct->version = ct::SignedCertificateTimestamp::SCT_VERSION_1; 218 sct->signature.hash_algorithm = ct::DigitallySigned::HASH_ALGO_SHA256; 219 sct->signature.signature_algorithm = ct::DigitallySigned::SIG_ALGO_ECDSA; 243 } // namespace ct [all...] |
/external/dropbear/libtomcrypt/src/encauth/gcm/ |
gcm_process.c | 25 @param ct The ciphertext 31 unsigned char *ct, 41 LTC_ARGCHK(ct != NULL); 84 *((LTC_FAST_TYPE*)(&ct[x + y])) = *((LTC_FAST_TYPE*)(&pt[x+y])) ^ *((LTC_FAST_TYPE*)(&gcm->buf[y])); 85 *((LTC_FAST_TYPE*)(&gcm->X[y])) ^= *((LTC_FAST_TYPE*)(&ct[x+y])); 102 *((LTC_FAST_TYPE*)(&gcm->X[y])) ^= *((LTC_FAST_TYPE*)(&ct[x+y])); 103 *((LTC_FAST_TYPE*)(&pt[x + y])) = *((LTC_FAST_TYPE*)(&ct[x+y])) ^ *((LTC_FAST_TYPE*)(&gcm->buf[y])); 137 b = ct[x] = pt[x] ^ gcm->buf[gcm->buflen]; 139 b = ct[x]; 140 pt[x] = ct[x] ^ gcm->buf[gcm->buflen] [all...] |