/external/v8/test/mjsunit/ |
H A D | regexp-not-sticky-yet.js | 42 var plain = /foobar/; variable 43 assertEquals("/foobar/", "" + plain);
|
/external/v8/test/mjsunit/harmony/ |
H A D | regexp-sticky.js | 35 var plain = /foobar/; variable 37 assertTrue(!!"foobar".match(plain)); 38 assertTrue(!!"..foobar".match(plain));
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | aes-unwrap.c | 23 * @plain: Plaintext key, n * 64 bits 27 u8 *plain) 36 r = plain; 51 r = plain + (n - 1) * 8; 71 * These are already in @plain due to the location of temporary 26 aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, u8 *plain) argument
|
H A D | aes-wrap.c | 22 * @plain: Plaintext key to be wrapped, n * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 38 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-enc.c | 115 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 118 rijndaelEncrypt(ctx, rk[AES_PRIV_NR_POS], plain, crypt);
|
H A D | crypto_internal-rsa.c | 113 u8 *plain, size_t *plain_len) 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-ccm.c | 149 size_t M, const u8 *plain, size_t plain_len, 164 aes_ccm_auth(aes, plain, plain_len, x); 168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 202 aes_ccm_auth(aes, plain, crypt_len, x); 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-internal-dec.c | 150 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 153 rijndaelDecrypt(ctx, rk[AES_PRIV_NR_POS], crypt, plain);
|
H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_ 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
/external/wpa_supplicant_8/src/crypto/ |
H A D | aes-unwrap.c | 23 * @plain: Plaintext key, n * 64 bits 27 u8 *plain) 36 r = plain; 51 r = plain + (n - 1) * 8; 71 * These are already in @plain due to the location of temporary 26 aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, u8 *plain) argument
|
H A D | aes-wrap.c | 22 * @plain: Plaintext key to be wrapped, n * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 38 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-enc.c | 115 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 118 rijndaelEncrypt(ctx, rk[AES_PRIV_NR_POS], plain, crypt);
|
H A D | crypto_internal-rsa.c | 113 u8 *plain, size_t *plain_len) 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-ccm.c | 149 size_t M, const u8 *plain, size_t plain_len, 164 aes_ccm_auth(aes, plain, plain_len, x); 168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 202 aes_ccm_auth(aes, plain, crypt_len, x); 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-internal-dec.c | 150 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 153 rijndaelDecrypt(ctx, rk[AES_PRIV_NR_POS], crypt, plain);
|
H A D | crypto_internal-cipher.c | 103 int crypto_cipher_encrypt(struct crypto_cipher *ctx, const u8 *plain, argument 110 if (plain != crypt) 111 os_memcpy(crypt, plain, len); 122 ctx->u.aes.cbc[j] ^= plain[j]; 126 plain += AES_BLOCK_SIZE; 136 ctx->u.des3.cbc[j] ^= plain[j]; 140 plain += 8; 150 ctx->u.des3.cbc[j] ^= plain[j]; 154 plain += 8; 167 u8 *plain, size_ 166 crypto_cipher_decrypt(struct crypto_cipher *ctx, const u8 *crypt, u8 *plain, size_t len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | aes-unwrap.c | 23 * @plain: Plaintext key, n * 64 bits 27 u8 *plain) 36 r = plain; 51 r = plain + (n - 1) * 8; 71 * These are already in @plain due to the location of temporary 26 aes_unwrap(const u8 *kek, size_t kek_len, int n, const u8 *cipher, u8 *plain) argument
|
H A D | aes-wrap.c | 22 * @plain: Plaintext key to be wrapped, n * 64 bits 26 int aes_wrap(const u8 *kek, size_t kek_len, int n, const u8 *plain, u8 *cipher) argument 38 os_memcpy(r, plain, 8 * n);
|
H A D | aes-internal-enc.c | 115 void aes_encrypt(void *ctx, const u8 *plain, u8 *crypt) argument 118 rijndaelEncrypt(ctx, rk[AES_PRIV_NR_POS], plain, crypt);
|
H A D | crypto_internal-rsa.c | 113 u8 *plain, size_t *plain_len) 116 crypt, crypt_len, plain, plain_len); 111 crypto_public_key_decrypt_pkcs1(struct crypto_public_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument
|
H A D | aes-ccm.c | 149 size_t M, const u8 *plain, size_t plain_len, 164 aes_ccm_auth(aes, plain, plain_len, x); 168 aes_ccm_encr(aes, L, plain, plain_len, crypt, a); 180 const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) 199 aes_ccm_encr(aes, L, crypt, crypt_len, plain, a); 202 aes_ccm_auth(aes, plain, crypt_len, x); 148 aes_ccm_ae(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *plain, size_t plain_len, const u8 *aad, size_t aad_len, u8 *crypt, u8 *auth) argument 178 aes_ccm_ad(const u8 *key, size_t key_len, const u8 *nonce, size_t M, const u8 *crypt, size_t crypt_len, const u8 *aad, size_t aad_len, const u8 *auth, u8 *plain) argument
|
H A D | aes-internal-dec.c | 150 void aes_decrypt(void *ctx, const u8 *crypt, u8 *plain) argument 153 rijndaelDecrypt(ctx, rk[AES_PRIV_NR_POS], crypt, plain);
|
/external/openssh/ |
H A D | cipher-aes.c | 76 u_char *cprev, *cnow, *plain, *ivp; local 89 plain = (u_char *)src; 91 for (i = 0; i < blocks; i++, plain+=RIJNDAEL_BLOCKSIZE, 94 buf[j] = plain[j] ^ cprev[j]; 101 plain = dest+len-RIJNDAEL_BLOCKSIZE; 105 plain-=RIJNDAEL_BLOCKSIZE) { 106 rijndael_decrypt(&c->r_ctx, cnow, plain); 109 plain[j] ^= ivp[j];
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 136 u8 *plain, size_t *plain_len) 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 157 plain[0] != 0x00 || plain[1] != 0x01) { 163 pos = plain + 3; 165 if (plain[2] != 0xff) { 170 while (pos < plain + len && *pos == 0xff) 173 if (pos - plain - 2 < 8) { 180 if (pos + 16 /* min hash len */ >= plain + len || *pos != 0x00) { 186 len -= pos - plain; 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 136 u8 *plain, size_t *plain_len) 142 if (crypto_rsa_exptmod(crypt, crypt_len, plain, &len, key, 0) < 0) 157 plain[0] != 0x00 || plain[1] != 0x01) { 163 pos = plain + 3; 165 if (plain[2] != 0xff) { 170 while (pos < plain + len && *pos == 0xff) 173 if (pos - plain - 2 < 8) { 180 if (pos + 16 /* min hash len */ >= plain + len || *pos != 0x00) { 186 len -= pos - plain; 134 pkcs1_decrypt_public_key(struct crypto_rsa_key *key, const u8 *crypt, size_t crypt_len, u8 *plain, size_t *plain_len) argument [all...] |