/external/libvorbis/lib/ |
H A D | lpc.h | 26 extern void vorbis_lpc_predict(float *coeff,float *prime,int m,
|
H A D | lpc.c | 133 void vorbis_lpc_predict(float *coeff,float *prime,int m, argument 137 prime[0...m-1] initial values (allocated size of n+m-1) 144 if(!prime) 149 work[i]=prime[i];
|
/external/conscrypt/src/main/java/org/conscrypt/ |
H A D | OpenSSLDHKeyPairGenerator.java | 30 /** The safe prime to use for the generated DH key pair. */ 31 private BigInteger prime; field in class:OpenSSLDHKeyPairGenerator 33 /** If {@code prime} is unspecified, this is the size of the generated prime. */ 43 if (prime != null) { 44 key = new OpenSSLKey(NativeCrypto.EVP_PKEY_new_DH(prime.toByteArray(), 61 prime = null; 69 prime = null; 76 prime = dhParams.getP();
|
H A D | X509PublicKey.java | 61 final int prime = 31; 63 result = prime * result + ((algorithm == null) ? 0 : algorithm.hashCode()); 64 result = prime * result + Arrays.hashCode(encoded);
|
/external/mp4parser/isoparser/src/main/java/com/googlecode/mp4parser/h264/model/ |
H A D | PictureParameterSet.java | 285 final int prime = 31; 287 result = prime * result + Arrays.hashCode(bottom_right); 288 result = prime * result + chroma_qp_index_offset; 289 result = prime * result + (constrained_intra_pred_flag ? 1231 : 1237); 290 result = prime * result 292 result = prime * result + (entropy_coding_mode_flag ? 1231 : 1237); 293 result = prime * result 295 result = prime * result + num_ref_idx_l0_active_minus1; 296 result = prime * result + num_ref_idx_l1_active_minus1; 297 result = prime * resul [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_pwd.c | 165 BN_clear_free(data->grp->prime); 275 BN_num_bits(data->grp->prime)); 365 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x); 366 ptr += BN_num_bytes(data->grp->prime); 367 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y); 368 ptr += BN_num_bytes(data->grp->prime); 443 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 451 * sufficiently smaller than the prime or order might need pre-pending 455 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 460 offset = BN_num_bytes(data->grp->prime) [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_pwd.c | 165 BN_clear_free(data->grp->prime); 275 BN_num_bits(data->grp->prime)); 365 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x); 366 ptr += BN_num_bytes(data->grp->prime); 367 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y); 368 ptr += BN_num_bytes(data->grp->prime); 443 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 451 * sufficiently smaller than the prime or order might need pre-pending 455 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 460 offset = BN_num_bytes(data->grp->prime) [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | dh_groups.h | 16 const u8 *prime; member in struct:dh_group
|
/external/wpa_supplicant_8/wpa_supplicant/src/eap_peer/ |
H A D | eap_pwd.c | 165 BN_clear_free(data->grp->prime); 275 BN_num_bits(data->grp->prime)); 365 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), x); 366 ptr += BN_num_bytes(data->grp->prime); 367 BN_bin2bn(ptr, BN_num_bytes(data->grp->prime), y); 368 ptr += BN_num_bytes(data->grp->prime); 443 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 451 * sufficiently smaller than the prime or order might need pre-pending 455 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 460 offset = BN_num_bytes(data->grp->prime) [all...] |
/external/chromium_org/mojo/public/java/bindings/src/org/chromium/mojo/bindings/ |
H A D | Struct.java | 51 final int prime = 31; 53 result = prime * result + numFields; 54 result = prime * result + size;
|
H A D | MessageHeader.java | 171 final int prime = 31; 173 result = prime * result + ((mDataHeader == null) ? 0 : mDataHeader.hashCode()); 174 result = prime * result + mFlags; 175 result = prime * result + (int) (mRequestId ^ (mRequestId >>> 32)); 176 result = prime * result + mType;
|
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_pwd_common.c | 124 grp->prime = NULL; 135 ((grp->prime = BN_new()) == NULL) || 141 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL)) 143 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " 156 primebitlen = BN_num_bits(grp->prime); 157 primebytelen = BN_num_bytes(grp->prime); 175 * compute counter-mode password value and stretch to prime 210 if (BN_ucmp(x_candidate, grp->prime) >= 0) 272 BN_clear_free(grp->prime); 273 grp->prime [all...] |
/external/wpa_supplicant_8/src/eap_common/ |
H A D | eap_pwd_common.c | 124 grp->prime = NULL; 135 ((grp->prime = BN_new()) == NULL) || 141 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL)) 143 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " 156 primebitlen = BN_num_bits(grp->prime); 157 primebytelen = BN_num_bytes(grp->prime); 175 * compute counter-mode password value and stretch to prime 210 if (BN_ucmp(x_candidate, grp->prime) >= 0) 272 BN_clear_free(grp->prime); 273 grp->prime [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_common/ |
H A D | eap_pwd_common.c | 124 grp->prime = NULL; 135 ((grp->prime = BN_new()) == NULL) || 141 if (!EC_GROUP_get_curve_GFp(grp->group, grp->prime, NULL, NULL, NULL)) 143 wpa_printf(MSG_INFO, "EAP-pwd: unable to get prime for GFp " 156 primebitlen = BN_num_bits(grp->prime); 157 primebytelen = BN_num_bytes(grp->prime); 175 * compute counter-mode password value and stretch to prime 210 if (BN_ucmp(x_candidate, grp->prime) >= 0) 272 BN_clear_free(grp->prime); 273 grp->prime [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_server/ |
H A D | eap_server_pwd.c | 152 BN_clear_free(data->grp->prime); 254 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 262 * sufficiently smaller than the prime or order might need pre-pending 266 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 271 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); 273 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y); 274 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset); 276 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) + 283 2 * BN_num_bytes(data->grp->prime)); 313 /* Each component of the cruft will be at most as big as the prime */ [all...] |
/external/wpa_supplicant_8/src/eap_server/ |
H A D | eap_server_pwd.c | 152 BN_clear_free(data->grp->prime); 254 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 262 * sufficiently smaller than the prime or order might need pre-pending 266 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 271 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); 273 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y); 274 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset); 276 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) + 283 2 * BN_num_bytes(data->grp->prime)); 313 /* Each component of the cruft will be at most as big as the prime */ [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/eap_server/ |
H A D | eap_server_pwd.c | 152 BN_clear_free(data->grp->prime); 254 ((element = os_malloc(BN_num_bytes(data->grp->prime) * 2)) == 262 * sufficiently smaller than the prime or order might need pre-pending 266 os_memset(element, 0, BN_num_bytes(data->grp->prime) * 2); 271 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(x); 273 offset = BN_num_bytes(data->grp->prime) - BN_num_bytes(y); 274 BN_bn2bin(y, element + BN_num_bytes(data->grp->prime) + offset); 276 data->outbuf = wpabuf_alloc(2 * BN_num_bytes(data->grp->prime) + 283 2 * BN_num_bytes(data->grp->prime)); 313 /* Each component of the cruft will be at most as big as the prime */ [all...] |
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | sae.c | 34 tmp->prime = crypto_ec_get_prime(tmp->ec); 49 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 55 tmp->prime = tmp->prime_buf; 176 u8 pwd_value[SAE_MAX_ECC_PRIME_LEN], prime[SAE_MAX_ECC_PRIME_LEN]; local 181 if (crypto_bignum_to_bin(sae->tmp->prime, prime, sizeof(prime), 190 prime, sae->tmp->prime_len, pwd_value, bits); 196 if (os_memcmp(pwd_value, prime, sae->tmp->prime_len) >= 0) 230 sae->tmp->dh->prime, sa 800 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
H A D | sae.h | 34 const struct crypto_bignum *prime; member in struct:sae_temporary_data
|
/external/wpa_supplicant_8/src/common/ |
H A D | sae.c | 34 tmp->prime = crypto_ec_get_prime(tmp->ec); 49 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 55 tmp->prime = tmp->prime_buf; 176 u8 pwd_value[SAE_MAX_ECC_PRIME_LEN], prime[SAE_MAX_ECC_PRIME_LEN]; local 181 if (crypto_bignum_to_bin(sae->tmp->prime, prime, sizeof(prime), 190 prime, sae->tmp->prime_len, pwd_value, bits); 196 if (os_memcmp(pwd_value, prime, sae->tmp->prime_len) >= 0) 230 sae->tmp->dh->prime, sa 800 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/common/ |
H A D | sae.c | 34 tmp->prime = crypto_ec_get_prime(tmp->ec); 49 tmp->prime_buf = crypto_bignum_init_set(tmp->dh->prime, 55 tmp->prime = tmp->prime_buf; 176 u8 pwd_value[SAE_MAX_ECC_PRIME_LEN], prime[SAE_MAX_ECC_PRIME_LEN]; local 181 if (crypto_bignum_to_bin(sae->tmp->prime, prime, sizeof(prime), 190 prime, sae->tmp->prime_len, pwd_value, bits); 196 if (os_memcmp(pwd_value, prime, sae->tmp->prime_len) >= 0) 230 sae->tmp->dh->prime, sa 800 u8 prime[SAE_MAX_ECC_PRIME_LEN]; local [all...] |
/external/robolectric/src/main/java/com/xtremelabs/robolectric/shadows/ |
H A D | ShadowPendingIntent.java | 110 final int prime = 31; 112 result = prime * result + (isActivityIntent ? 1231 : 1237); 113 result = prime * result + (isBroadcastIntent ? 1231 : 1237); 114 result = prime * result + (isServiceIntent ? 1231 : 1237); 115 result = prime * result + requestCode; 116 result = prime * result + ((savedIntent == null) ? 0 : savedIntent.hashCode());
|
/external/smack/src/org/jivesoftware/smack/ |
H A D | ServerTrustManager.java | 296 final int prime = 31; 298 result = prime * result + ((password == null) ? 0 : password.hashCode()); 299 result = prime * result + ((path == null) ? 0 : path.hashCode()); 300 result = prime * result + ((type == null) ? 0 : type.hashCode());
|