/external/zopfli/src/zopflipng/lodepng/ |
H A D | lodepng.cpp | 905 unsigned treepos = 0, ct; local 913 ct = codetree->tree2d[(treepos << 1) + READBIT(*bp, in)]; 915 if(ct < codetree->numcodes) return ct; /*the symbol is decoded, return it*/ 916 else treepos = ct - codetree->numcodes; /*symbol not yet decoded, instead move tree position*/
|
H A D | lodepng_util.cpp | 397 bool decoded; unsigned long ct; local 401 error = codetree.decode(decoded, ct, treepos, readBitFromStream(bp, in)); 403 if(decoded) return ct;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-internal-dec.c | 75 static void rijndaelDecrypt(const u32 rk[/*44*/], int Nr, const u8 ct[16], argument 87 s0 = GETU32(ct ) ^ rk[0]; 88 s1 = GETU32(ct + 4) ^ rk[1]; 89 s2 = GETU32(ct + 8) ^ rk[2]; 90 s3 = GETU32(ct + 12) ^ rk[3];
|
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 88 PUTU32(ct , s0); 90 PUTU32(ct + 4, s1); 92 PUTU32(ct + 8, s2); 94 PUTU32(ct + 12, s3);
|
H A D | aes_i.h | 111 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); } 115 #define PUTU32(ct, st) { \ 116 (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \ 117 (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client.c | 145 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local 211 ct = pos[0]; 220 if (tlsv1_client_process_handshake(conn, ct, in_pos, 312 u8 alert, *out_pos, ct; local 335 ct = pos[0]; 367 if (ct == TLS_CONTENT_TYPE_ALERT) { 386 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
H A D | tlsv1_client_i.h | 80 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
|
H A D | tlsv1_client_read.c | 22 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, 24 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, 26 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, 30 static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct, argument 38 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 40 "received content type 0x%x", ct); 214 static int tls_process_certificate(struct tlsv1_client *conn, u8 ct, argument 223 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 225 "received content type 0x%x", ct); 255 return tls_process_server_key_exchange(conn, ct, in_dat 567 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 658 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 722 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 779 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 850 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 983 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 1014 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 287 u8 ct; local 298 ct = in_data[0]; 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 336 if (ct != TLS_CONTENT_TYPE_HANDSHAKE && 337 ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC && 338 ct != TLS_CONTENT_TYPE_ALERT && 339 ct != TLS_CONTENT_TYPE_APPLICATION_DATA) { 341 "content type 0x%x", ct);
|
H A D | tlsv1_server.c | 137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 170 ct = pos[0]; 179 if (tlsv1_server_process_handshake(conn, ct, in_pos, 264 u8 alert, *out_end, *out_pos, ct; local 273 ct = pos[0]; 290 if (ct == TLS_CONTENT_TYPE_ALERT) { 310 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
H A D | tlsv1_server_i.h | 79 int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct,
|
H A D | tlsv1_server_read.c | 23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 26 u8 ct, const u8 *in_data, 49 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 59 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 61 ct); 291 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument 300 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 302 ct); 340 return tls_process_client_key_exchange(conn, ct, in_data, 693 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument 770 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 937 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 987 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1160 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | http_curl.c | 1584 char ct[200]; local 1585 snprintf(ct, sizeof(ct), "Content-Type: %s", content_type); 1586 curl_hdr = curl_slist_append(curl_hdr, ct);
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-internal-dec.c | 75 static void rijndaelDecrypt(const u32 rk[/*44*/], int Nr, const u8 ct[16], argument 87 s0 = GETU32(ct ) ^ rk[0]; 88 s1 = GETU32(ct + 4) ^ rk[1]; 89 s2 = GETU32(ct + 8) ^ rk[2]; 90 s3 = GETU32(ct + 12) ^ rk[3];
|
H A D | aes-internal-enc.c | 23 static void rijndaelEncrypt(const u32 rk[], int Nr, const u8 pt[16], u8 ct[16]) argument 88 PUTU32(ct , s0); 90 PUTU32(ct + 4, s1); 92 PUTU32(ct + 8, s2); 94 PUTU32(ct + 12, s3);
|
H A D | aes_i.h | 111 #define PUTU32(ct, st) { *((u32 *)(ct)) = SWAP((st)); } 115 #define PUTU32(ct, st) { \ 116 (ct)[0] = (u8)((st) >> 24); (ct)[1] = (u8)((st) >> 16); \ 117 (ct)[2] = (u8)((st) >> 8); (ct)[3] = (u8)(st); }
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client.c | 145 u8 *msg = NULL, *in_msg = NULL, *in_pos, *in_end, alert, ct; local 211 ct = pos[0]; 220 if (tlsv1_client_process_handshake(conn, ct, in_pos, 312 u8 alert, *out_pos, ct; local 335 ct = pos[0]; 367 if (ct == TLS_CONTENT_TYPE_ALERT) { 386 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
H A D | tlsv1_client_i.h | 80 int tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct,
|
H A D | tlsv1_client_read.c | 22 static int tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, 24 static int tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, 26 static int tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, 30 static int tls_process_server_hello(struct tlsv1_client *conn, u8 ct, argument 38 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 40 "received content type 0x%x", ct); 214 static int tls_process_certificate(struct tlsv1_client *conn, u8 ct, argument 223 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 225 "received content type 0x%x", ct); 255 return tls_process_server_key_exchange(conn, ct, in_dat 567 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 658 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 722 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 779 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 850 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 983 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 1014 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 287 u8 ct; local 298 ct = in_data[0]; 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 336 if (ct != TLS_CONTENT_TYPE_HANDSHAKE && 337 ct != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC && 338 ct != TLS_CONTENT_TYPE_ALERT && 339 ct != TLS_CONTENT_TYPE_APPLICATION_DATA) { 341 "content type 0x%x", ct);
|
H A D | tlsv1_server.c | 137 u8 *msg = NULL, *in_msg, *in_pos, *in_end, alert, ct; local 170 ct = pos[0]; 179 if (tlsv1_server_process_handshake(conn, ct, in_pos, 264 u8 alert, *out_end, *out_pos, ct; local 273 ct = pos[0]; 290 if (ct == TLS_CONTENT_TYPE_ALERT) { 310 if (ct != TLS_CONTENT_TYPE_APPLICATION_DATA) {
|
H A D | tlsv1_server_i.h | 79 int tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct,
|
H A D | tlsv1_server_read.c | 23 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, 26 u8 ct, const u8 *in_data, 49 static int tls_process_client_hello(struct tlsv1_server *conn, u8 ct, argument 59 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 61 ct); 291 static int tls_process_certificate(struct tlsv1_server *conn, u8 ct, argument 300 if (ct != TLS_CONTENT_TYPE_HANDSHAKE) { 302 ct); 340 return tls_process_client_key_exchange(conn, ct, in_data, 693 static int tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, argument 770 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 937 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 987 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1160 tlsv1_server_process_handshake(struct tlsv1_server *conn, u8 ct, const u8 *buf, size_t *len) argument [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | http_curl.c | 1584 char ct[200]; local 1585 snprintf(ct, sizeof(ct), "Content-Type: %s", content_type); 1586 curl_hdr = curl_slist_append(curl_hdr, ct);
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-internal-dec.c | 75 static void rijndaelDecrypt(const u32 rk[/*44*/], int Nr, const u8 ct[16], argument 87 s0 = GETU32(ct ) ^ rk[0]; 88 s1 = GETU32(ct + 4) ^ rk[1]; 89 s2 = GETU32(ct + 8) ^ rk[2]; 90 s3 = GETU32(ct + 12) ^ rk[3];
|