/external/zxing/core/ |
H A D | core.jar | META-INF/ META-INF/MANIFEST.MF com/ com/google/ com/google/zxing/ com/google/zxing/aztec/ ... |
/external/zopfli/src/zopfli/ |
H A D | lz77.c | 332 /* Switch to the other hash once this will be more efficient. */ 335 /* Now use the hash that encodes the length and first byte. */ 377 ZopfliHash hash; local 378 ZopfliHash* h = &hash;
|
H A D | squeeze.c | 222 ZopfliHash hash; local 223 ZopfliHash* h = &hash; 344 ZopfliHash hash; local 345 ZopfliHash* h = &hash;
|
/external/zopfli/src/zopflipng/lodepng/ |
H A D | lodepng.cpp | 1339 sequences to generate a hash value from the stream bytes. Setting it to 3 1346 The HASH_NUM_VALUES is the amount of unique possible hash values that 1353 int* head; /*hash value to head circular pos*/ 1354 int* val; /*circular pos to hash value*/ 1360 static unsigned hash_init(Hash* hash, unsigned windowsize) argument 1363 hash->head = (int*)lodepng_malloc(sizeof(int) * HASH_NUM_VALUES); 1364 hash->val = (int*)lodepng_malloc(sizeof(int) * windowsize); 1365 hash->chain = (unsigned short*)lodepng_malloc(sizeof(unsigned short) * windowsize); 1366 hash->zeros = (unsigned short*)lodepng_malloc(sizeof(unsigned short) * windowsize); 1368 if(!hash 1378 hash_cleanup(Hash* hash) argument 1415 updateHashChain(Hash* hash, size_t wpos, int hashval) argument 1431 encodeLZ77(uivector* out, Hash* hash, const unsigned char* in, size_t inpos, size_t insize, unsigned windowsize, unsigned minmatch, unsigned nicematch, unsigned lazymatching) argument 1671 deflateDynamic(ucvector* out, size_t* bp, Hash* hash, const unsigned char* data, size_t datapos, size_t dataend, const LodePNGCompressSettings* settings, int final) argument 1916 deflateFixed(ucvector* out, size_t* bp, Hash* hash, const unsigned char* data, size_t datapos, size_t dataend, const LodePNGCompressSettings* settings, int final) argument 1970 Hash hash; local [all...] |
/external/wpa_supplicant_8/hostapd/src/ap/ |
H A D | pmksa_cache_auth.c | 53 unsigned int hash; local 58 /* unlink from hash list */ 59 hash = PMKID_HASH(entry->pmkid); 60 pos = pmksa->pmkid[hash]; 67 pmksa->pmkid[hash] = entry->hnext; 193 int hash; local 212 hash = PMKID_HASH(entry->pmkid); 213 entry->hnext = pmksa->pmkid[hash]; 214 pmksa->pmkid[hash] = entry;
|
/external/wpa_supplicant_8/hostapd/src/common/ |
H A D | wpa_common.c | 44 u8 hash[SHA1_MAC_LEN]; local 52 if (hmac_sha1(key, 16, buf, len, hash)) 54 os_memcpy(mic, hash, MD5_MAC_LEN); 744 u8 *pos, r0_key_data[48], hash[32]; local 782 sha256_vector(2, addr, len, hash); 783 os_memcpy(pmk_r0_name, hash, WPA_PMK_NAME_LEN); 795 u8 hash[32]; local 812 sha256_vector(4, addr, len, hash); 813 os_memcpy(pmk_r1_name, hash, WPA_PMK_NAME_LEN); 853 u8 *pos, hash[3 local 915 unsigned char hash[SHA256_MAC_LEN]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | crypto_cryptoapi.c | 110 HCRYPTHASH hash; local 120 if (!CryptCreateHash(prov, alg, 0, 0, &hash)) { 127 if (!CryptHashData(hash, (BYTE *) addr[i], len[i], 0)) { 129 CryptDestroyHash(hash); 135 if (!CryptGetHashParam(hash, HP_HASHVAL, mac, &hlen, 0)) { 140 CryptDestroyHash(hash); 348 HCRYPTHASH hash; member in struct:crypto_hash 419 if (!CryptCreateHash(ctx->prov, calg, ctx->key, 0, &ctx->hash)) { 441 if (!CryptSetHashParam(ctx->hash, HP_HMAC_INFO, (BYTE *) &info, 444 CryptDestroyHash(ctx->hash); [all...] |
H A D | ms_funcs.c | 85 u8 hash[SHA1_MAC_LEN]; local 96 if (sha1_vector(3, addr, len, hash)) 98 os_memcpy(challenge, hash, 8); 336 u8 hash[SHA1_MAC_LEN]; local 342 if (sha1_vector(3, addr, len, hash)) 344 os_memcpy(master_key, hash, 16);
|
H A D | random.c | 102 u8 hash[SHA1_MAC_LEN]; local 106 /* First, add hash back to pool to make backtracking more difficult. */ 108 sizeof(pool), hash); 109 random_mix_pool(hash, sizeof(hash)); 114 sizeof(buf), hash); 116 * Fold the hash to further reduce any potential output pattern. 120 hash_ptr = (u32 *) hash; 122 os_memcpy(out, hash, EXTRACT_LEN);
|
H A D | sha1-prf.c | 35 u8 hash[SHA1_MAC_LEN]; local 57 hash)) 59 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha1-tprf.c | 34 u8 hash[SHA1_MAC_LEN]; local 40 addr[0] = hash; 57 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash)) 60 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); 63 os_memcpy(&buf[pos], hash, plen);
|
H A D | sha256-prf.c | 57 u8 hash[SHA256_MAC_LEN]; local 82 hmac_sha256_vector(key, key_len, 4, addr, len, hash); 83 os_memcpy(&buf[pos], hash, plen);
|
H A D | tls.h | 60 const u8 *hash; member in struct:tls_event_data::__anon33598
|
H A D | tls_openssl.c | 229 HCRYPTHASH hash; local 247 wpa_printf(MSG_INFO, "%s - only MD5-SHA1 hash supported", 254 if (!CryptCreateHash(priv->crypt_prov, CALG_SSL3_SHAMD5, 0, 0, &hash)) 261 if (!CryptGetHashParam(hash, HP_HASHSIZE, (BYTE *) &hash_size, &len, 268 wpa_printf(MSG_INFO, "CryptoAPI: Invalid hash size (%u != %d)", 274 if (!CryptSetHashParam(hash, HP_HASHVAL, (BYTE * ) from, 0)) { 286 if (!CryptSignHash(hash, priv->key_spec, NULL, 0, buf, &len)) { 297 CryptDestroyHash(hash); 352 } else if (strncmp(name, "hash://", 7) == 0) { 355 const char *hash local 1367 u8 hash[32]; local 1457 u8 hash[32]; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_common/ |
H A D | eap_eke_common.c | 239 u8 hash[SHA1_MAC_LEN]; local 246 addr[0] = hash; 257 &vlen[1], hash); 260 hash); 264 os_memcpy(res, hash, SHA1_MAC_LEN); 268 os_memcpy(res, hash, len); 280 u8 hash[SHA256_MAC_LEN]; local 287 addr[0] = hash; 298 &vlen[1], hash); 301 hash); [all...] |
H A D | eap_gpsk_common.c | 44 u8 ibuf[2], hash[16]; local 48 hashlen = sizeof(hash); 60 if (omac1_aes_128_vector(psk, 2, addr, vlen, hash)) 63 os_memcpy(opos, hash, clen); 79 u8 ibuf[2], hash[SHA256_MAC_LEN]; local 95 hmac_sha256_vector(psk, 32, 2, addr, vlen, hash); 97 os_memcpy(opos, hash, clen);
|
H A D | eap_pax_common.c | 92 u8 hash[SHA1_MAC_LEN]; local 109 hmac_sha1_vector(key, key_len, count, addr, len, hash); 110 os_memcpy(mac, hash, EAP_PAX_MAC_LEN);
|
H A D | eap_peap_common.c | 21 u8 hash[SHA1_MAC_LEN]; local 27 addr[0] = hash; 72 if (hmac_sha1_vector(key, key_len, 5, addr, len, hash) < 0) 75 os_memcpy(&buf[pos], hash, SHA1_MAC_LEN); 78 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_psk_common.c | 37 u8 hash[aes_block_size]; local 41 if (aes_128_encrypt_block(kdk, rand_p, hash)) 44 hash[aes_block_size - 1] ^= counter; 45 if (aes_128_encrypt_block(kdk, hash, tek)) 47 hash[aes_block_size - 1] ^= counter; 51 hash[aes_block_size - 1] ^= counter; 52 if (aes_128_encrypt_block(kdk, hash, &msk[i * aes_block_size])) 54 hash[aes_block_size - 1] ^= counter; 59 hash[aes_block_size - 1] ^= counter; 60 if (aes_128_encrypt_block(kdk, hash, [all...] |
H A D | eap_pwd_common.c | 26 void eap_pwd_h_update(struct crypto_hash *hash, const u8 *data, size_t len) argument 28 crypto_hash_update(hash, data, len); 32 void eap_pwd_h_final(struct crypto_hash *hash, u8 *digest) argument 35 crypto_hash_finish(hash, digest, &len); 43 struct crypto_hash *hash; local 54 hash = crypto_hash_init(CRYPTO_HASH_ALG_HMAC_SHA256, 56 if (hash == NULL) 59 crypto_hash_update(hash, digest, SHA256_MAC_LEN); 60 crypto_hash_update(hash, (u8 *) &i, sizeof(u16)); 61 crypto_hash_update(hash, labe 94 struct crypto_hash *hash; local 291 struct crypto_hash *hash; local [all...] |
H A D | eap_sake_common.c | 215 u8 hash[SHA1_MAC_LEN]; local 238 hash); 239 os_memcpy(&buf[pos], hash, plen);
|
H A D | eap_sim_common.c | 239 u8 hash[SHA256_MAC_LEN]; local 251 addr[0] = hash; 266 hmac_sha256_vector(k, 32, 5, addr, len, hash); 269 os_memcpy(res, hash, hlen); 431 u8 hash[SHA256_MAC_LEN]; local 485 hmac_sha256_vector(key, sizeof(key), 5, addr, len, hash); 487 hash, sizeof(hash)); 489 os_memcpy(ck, hash, EAP_AKA_CK_LEN); 490 os_memcpy(ik, hash [all...] |
H A D | ikev2_common.c | 57 size_t data_len, u8 *hash) 66 os_memcpy(hash, tmphash, 12); 72 os_memcpy(hash, tmphash, 12); 97 u8 *hash) 101 hmac_sha1_vector(key, key_len, num_elem, addr, len, hash); 104 hmac_md5_vector(key, key_len, num_elem, addr, len, hash); 118 u8 hash[IKEV2_MAX_HASH_LEN]; local 131 addr[0] = hash; 145 &len[1], hash); 148 hash); 56 ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data, size_t data_len, u8 *hash) argument 95 ikev2_prf_hash(int alg, const u8 *key, size_t key_len, size_t num_elem, const u8 *addr[], const size_t *len, u8 *hash) argument 375 u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN]; local 433 u8 hash[IKEV2_MAX_HASH_LEN], *decrypted; local [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap.c | 653 * unfortunately, such implementations exist. Use MD5 hash as 1358 if (data->peer_cert.hash) { 1363 data->peer_cert.hash, 2045 * @hash: Buffer for returning whether the password is stored as a 2050 const u8 * eap_get_config_password2(struct eap_sm *sm, size_t *len, int *hash) argument 2059 if (hash) 2060 *hash = 0; 2066 if (hash) 2067 *hash = !!(config->flags & EAP_CONFIG_FLAGS_PASSWORD_NTHASH);
|
H A D | eap_aka.c | 457 u8 hash[SHA256_MAC_LEN]; local 470 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ 476 sha256_vector(1, &addr, &len, hash); 479 sha1_vector(1, &addr, &len, hash); 481 eap_sim_msg_add(msg, EAP_SIM_AT_CHECKCODE, 0, hash, 492 u8 hash[SHA256_MAC_LEN]; local 518 /* Checkcode is SHA1/SHA256 hash over all EAP-AKA/Identity packets. */ 523 sha256_vector(1, &addr, &len, hash); 526 sha1_vector(1, &addr, &len, hash); 528 if (os_memcmp_const(hash, checkcod [all...] |