/external/chromium_org/third_party/mesa/src/src/gallium/auxiliary/util/ |
H A D | u_format.csv | 36 # - channel encoding (only meaningful for plain layout), containing for each 62 PIPE_FORMAT_NONE , plain, 1, 1, u8 , , , , x001, rgb 65 PIPE_FORMAT_B8G8R8A8_UNORM , plain, 1, 1, un8 , un8 , un8 , un8 , zyxw, rgb 66 PIPE_FORMAT_B8G8R8X8_UNORM , plain, 1, 1, un8 , un8 , un8 , x8 , zyx1, rgb 67 PIPE_FORMAT_A8R8G8B8_UNORM , plain, 1, 1, un8 , un8 , un8 , un8 , yzwx, rgb 68 PIPE_FORMAT_X8R8G8B8_UNORM , plain, 1, 1, x8 , un8 , un8 , un8 , yzw1, rgb 69 PIPE_FORMAT_A8B8G8R8_UNORM , plain, 1, 1, un8 , un8 , un8 , un8 , wzyx, rgb 70 PIPE_FORMAT_X8B8G8R8_UNORM , plain, 1, 1, x8 , un8 , un8 , un8 , wzy1, rgb 72 PIPE_FORMAT_R8G8B8X8_UNORM , plain, 1, 1, un8 , un8 , un8 , x8 , xyz1, rgb 73 PIPE_FORMAT_B5G5R5X1_UNORM , plain, [all...] |
/external/mesa3d/src/gallium/auxiliary/util/ |
H A D | u_format.csv | 36 # - channel encoding (only meaningful for plain layout), containing for each 62 PIPE_FORMAT_NONE , plain, 1, 1, u8 , , , , x001, rgb 65 PIPE_FORMAT_B8G8R8A8_UNORM , plain, 1, 1, un8 , un8 , un8 , un8 , zyxw, rgb 66 PIPE_FORMAT_B8G8R8X8_UNORM , plain, 1, 1, un8 , un8 , un8 , x8 , zyx1, rgb 67 PIPE_FORMAT_A8R8G8B8_UNORM , plain, 1, 1, un8 , un8 , un8 , un8 , yzwx, rgb 68 PIPE_FORMAT_X8R8G8B8_UNORM , plain, 1, 1, x8 , un8 , un8 , un8 , yzw1, rgb 69 PIPE_FORMAT_A8B8G8R8_UNORM , plain, 1, 1, un8 , un8 , un8 , un8 , wzyx, rgb 70 PIPE_FORMAT_X8B8G8R8_UNORM , plain, 1, 1, x8 , un8 , un8 , un8 , wzy1, rgb 72 PIPE_FORMAT_R8G8B8X8_UNORM , plain, 1, 1, un8 , un8 , un8 , x8 , xyz1, rgb 73 PIPE_FORMAT_B5G5R5X1_UNORM , plain, [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | des_i.h | 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt); 19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain); 22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain);
|
H A D | aes.h | 15 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 18 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_ 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
H A D | aes-unwrap.c | 22 * @plain: Plaintext key, n * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 33 r = plain; 48 r = plain + (n - 1) * 8; 64 * These are already in @plain due to the location of temporary
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 22 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain); 45 const u8 *plain, size_t plain_len, 52 u8 *plain); 57 size_t M, const u8 *plain, size_t plain_len, 62 u8 *plain);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | des_i.h | 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt); 19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain); 22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain);
|
H A D | aes.h | 15 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 18 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_ 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
H A D | aes-unwrap.c | 22 * @plain: Plaintext key, n * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 33 r = plain; 48 r = plain + (n - 1) * 8; 64 * These are already in @plain due to the location of temporary
|
H A D | aes_wrap.h | 21 int __must_check aes_wrap(const u8 *kek, int n, const u8 *plain, u8 *cipher); 22 int __must_check aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain); 45 const u8 *plain, size_t plain_len, 52 u8 *plain); 57 size_t M, const u8 *plain, size_t plain_len, 62 u8 *plain);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | des_i.h | 18 void des_block_encrypt(const u8 *plain, const u32 *ek, u8 *crypt); 19 void des_block_decrypt(const u8 *crypt, const u32 *dk, u8 *plain); 22 void des3_encrypt(const u8 *plain, const struct des3_key_s *key, u8 *crypt); 23 void des3_decrypt(const u8 *crypt, const struct des3_key_s *key, u8 *plain);
|
H A D | aes.h | 15 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt); 18 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain);
|
H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_ 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
H A D | aes-unwrap.c | 22 * @plain: Plaintext key, n * 64 bits 25 int aes_unwrap(const u8 *kek, int n, const u8 *cipher, u8 *plain) argument 33 r = plain; 48 r = plain + (n - 1) * 8; 64 * These are already in @plain due to the location of temporary
|
/external/chromium/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 56 SaslMechanism::Base64Encode(const std::string & plain) { argument 57 return Base64::Encode(plain); 66 SaslMechanism::Base64EncodeFromArray(const char * plain, size_t length) { argument 68 Base64::EncodeFromArray(plain, length, &result);
|
H A D | saslmechanism.h | 67 static std::string Base64Encode(const std::string & plain); 69 static std::string Base64EncodeFromArray(const char * plain, size_t length);
|
/external/chromium_org/third_party/libjingle/source/talk/xmpp/ |
H A D | saslmechanism.cc | 56 SaslMechanism::Base64Encode(const std::string & plain) { argument 57 return Base64::Encode(plain); 66 SaslMechanism::Base64EncodeFromArray(const char * plain, size_t length) { argument 68 Base64::EncodeFromArray(plain, length, &result);
|
H A D | saslmechanism.h | 67 static std::string Base64Encode(const std::string & plain); 69 static std::string Base64EncodeFromArray(const char * plain, size_t length);
|
/external/apache-xml/src/main/java/org/apache/xml/serializer/ |
H A D | output_text.properties | 26 media-type=text/plain
|
/external/chromium_org/chrome/browser/extensions/api/networking_private/ |
H A D | networking_private_crypto_unittest.cc | 15 // |plain| data. 17 const std::string& plain, 22 return decrypted == plain; 149 std::string plain; local 153 plain = kTestData; 154 EXPECT_TRUE(crypto.EncryptByteString(public_key, plain, &encrypted_output)); 155 EXPECT_TRUE(VerifyByteString(kPrivateKey, plain, encrypted_output)); 158 plain = kEmptyData; 159 EXPECT_TRUE(crypto.EncryptByteString(public_key, plain, &encrypted_output)); 16 VerifyByteString(const std::string& private_key_pem, const std::string& plain, const std::string& encrypted) argument
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 129 u8 *plain, size_t *plain_len) 135 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 148 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 154 pos = plain + 3; 155 if (plain[1] == 0x00) { 157 if (plain[2] != 0x00) { 162 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 166 if (plain[ 127 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 129 u8 *plain, size_t *plain_len) 135 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 148 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 154 pos = plain + 3; 155 if (plain[1] == 0x00) { 157 if (plain[2] != 0x00) { 162 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 166 if (plain[ 127 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 129 u8 *plain, size_t *plain_len) 135 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 148 plain[0] != 0x00 || (plain[1] != 0x00 && plain[1] != 0x01)) { 154 pos = plain + 3; 155 if (plain[1] == 0x00) { 157 if (plain[2] != 0x00) { 162 while (pos + 1 < plain + len && *pos == 0x00 && pos[1] == 0x00) 166 if (plain[ 127 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |