Searched refs:ct (Results 1 - 25 of 341) sorted by last modified time

1234567891011>>

/external/zopfli/src/zopflipng/lodepng/
H A Dlodepng.cpp905 unsigned treepos = 0, ct; local
913 ct = codetree->tree2d[(treepos << 1) + READBIT(*bp, in)];
915 if(ct < codetree->numcodes) return ct; /*the symbol is decoded, return it*/
916 else treepos = ct - codetree->numcodes; /*symbol not yet decoded, instead move tree position*/
H A Dlodepng_util.cpp397 bool decoded; unsigned long ct; local
401 error = codetree.decode(decoded, ct, treepos, readBitFromStream(bp, in));
403 if(decoded) return ct;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Daes-internal-dec.c75 static void rijndaelDecrypt(const u32 rk[/*44*/], int Nr, const u8 ct[16], argument
87 s0 = GETU32(ct ) ^ rk[0];
88 s1 = GETU32(ct + 4) ^ rk[1];
89 s2 = GETU32(ct + 8) ^ rk[2];
90 s3 = GETU32(ct + 12) ^ rk[3];
H A Daes-internal-enc.c23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument
88 PUTU32(ct , s0);
90 PUTU32(ct + 4, s1);
92 PUTU32(ct + 8, s2);
94 PUTU32(ct + 12, s3);
H A Daes_i.h111 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); }
115 #define PUTU32(ct, st) { \
116 (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \
117 (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.c145 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local
211 ct = pos[0];
220 if (tlsv1_client_process_handshake(conn, ct, in_pos,
312 u8 alert, *out_pos, ct; local
335 ct = pos[0];
367 if (ct == TLS_CONTENT_TYPE_ALERT) {
386 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
H A Dtlsv1_client_i.h80 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
H A Dtlsv1_client_read.c22 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
24 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
26 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
30 static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct, argument
38 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
40 "received content type 0x%x", ct);
214 static int tls_process_certificate(struct tlsv1_client *conn, u8 ct, argument
223 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
225 "received content type 0x%x", ct);
255 return tls_process_server_key_exchange(conn, ct, in_dat
567 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
658 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
722 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
779 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
850 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
983 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
1014 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
[all...]
H A Dtlsv1_record.c287 u8 ct; local
298 ct = in_data[0];
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
336 if (ct != TLS_CONTENT_TYPE_HANDSHAKE &&
337 ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC &&
338 ct != TLS_CONTENT_TYPE_ALERT &&
339 ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
341 "content type 0x%x", ct);
H A Dtlsv1_server.c137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local
170 ct = pos[0];
179 if (tlsv1_server_process_handshake(conn, ct, in_pos,
264 u8 alert, *out_end, *out_pos, ct; local
273 ct = pos[0];
290 if (ct == TLS_CONTENT_TYPE_ALERT) {
310 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
H A Dtlsv1_server_i.h79 int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct,
H A Dtlsv1_server_read.c23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
26 u8 ct, const u8 *in_data,
49 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
59 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
61 ct);
291 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument
300 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
302 ct);
340 return tls_process_client_key_exchange(conn, ct, in_data,
693 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument
770 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
937 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
987 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1160 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/utils/
H A Dhttp_curl.c1584 char ct[200]; local
1585 snprintf(ct, sizeof(ct), "Content-Type: %s", content_type);
1586 curl_hdr = curl_slist_append(curl_hdr, ct);
/external/wpa_supplicant_8/src/crypto/
H A Daes-internal-dec.c75 static void rijndaelDecrypt(const u32 rk[/*44*/], int Nr, const u8 ct[16], argument
87 s0 = GETU32(ct ) ^ rk[0];
88 s1 = GETU32(ct + 4) ^ rk[1];
89 s2 = GETU32(ct + 8) ^ rk[2];
90 s3 = GETU32(ct + 12) ^ rk[3];
H A Daes-internal-enc.c23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument
88 PUTU32(ct , s0);
90 PUTU32(ct + 4, s1);
92 PUTU32(ct + 8, s2);
94 PUTU32(ct + 12, s3);
H A Daes_i.h111 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); }
115 #define PUTU32(ct, st) { \
116 (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \
117 (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.c145 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local
211 ct = pos[0];
220 if (tlsv1_client_process_handshake(conn, ct, in_pos,
312 u8 alert, *out_pos, ct; local
335 ct = pos[0];
367 if (ct == TLS_CONTENT_TYPE_ALERT) {
386 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
H A Dtlsv1_client_i.h80 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
H A Dtlsv1_client_read.c22 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct,
24 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct,
26 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct,
30 static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct, argument
38 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
40 "received content type 0x%x", ct);
214 static int tls_process_certificate(struct tlsv1_client *conn, u8 ct, argument
223 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
225 "received content type 0x%x", ct);
255 return tls_process_server_key_exchange(conn, ct, in_dat
567 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
658 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
722 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
779 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
850 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
983 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
1014 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
[all...]
H A Dtlsv1_record.c287 u8 ct; local
298 ct = in_data[0];
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
336 if (ct != TLS_CONTENT_TYPE_HANDSHAKE &&
337 ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC &&
338 ct != TLS_CONTENT_TYPE_ALERT &&
339 ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
341 "content type 0x%x", ct);
H A Dtlsv1_server.c137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local
170 ct = pos[0];
179 if (tlsv1_server_process_handshake(conn, ct, in_pos,
264 u8 alert, *out_end, *out_pos, ct; local
273 ct = pos[0];
290 if (ct == TLS_CONTENT_TYPE_ALERT) {
310 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
H A Dtlsv1_server_i.h79 int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct,
H A Dtlsv1_server_read.c23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct,
26 u8 ct, const u8 *in_data,
49 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument
59 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
61 ct);
291 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument
300 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) {
302 ct);
340 return tls_process_client_key_exchange(conn, ct, in_data,
693 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument
770 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
937 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
987 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1160 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument
[all...]
/external/wpa_supplicant_8/src/utils/
H A Dhttp_curl.c1584 char ct[200]; local
1585 snprintf(ct, sizeof(ct), "Content-Type: %s", content_type);
1586 curl_hdr = curl_slist_append(curl_hdr, ct);
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Daes-internal-dec.c75 static void rijndaelDecrypt(const u32 rk[/*44*/], int Nr, const u8 ct[16], argument
87 s0 = GETU32(ct ) ^ rk[0];
88 s1 = GETU32(ct + 4) ^ rk[1];
89 s2 = GETU32(ct + 8) ^ rk[2];
90 s3 = GETU32(ct + 12) ^ rk[3];

Completed in 291 milliseconds

1234567891011>>