/external/tcpdump/ |
D | in_cksum.c | 61 register int mlen = 0; in in_cksum() local 77 if (mlen == -1) { in in_cksum() 89 mlen = vec->len - 1; in in_cksum() 91 mlen = vec->len; in in_cksum() 95 if ((1 & (unsigned long) w) && (mlen > 0)) { in in_cksum() 100 mlen--; in in_cksum() 107 while ((mlen -= 32) >= 0) { in in_cksum() 114 mlen += 32; in in_cksum() 115 while ((mlen -= 8) >= 0) { in in_cksum() 119 mlen += 8; in in_cksum() [all …]
|
/external/mesa3d/src/mesa/drivers/dri/i965/ |
D | brw_fs_visitor.cpp | 595 pull->mlen = 1; in visit() 753 int mlen; in emit_texture_gen4() local 759 mlen = 1; in emit_texture_gen4() 763 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen + i), coordinate); in emit_texture_gen4() 767 mlen += 3; in emit_texture_gen4() 773 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen), fs_reg(0.0f)); in emit_texture_gen4() 774 mlen++; in emit_texture_gen4() 776 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen), lod); in emit_texture_gen4() 777 mlen++; in emit_texture_gen4() 782 emit(BRW_OPCODE_MOV, fs_reg(MRF, base_mrf + mlen), shadow_c); in emit_texture_gen4() [all …]
|
D | brw_fs_emit.cpp | 109 inst->mlen, in generate_fb_write() 172 assert(inst->mlen == 0); in generate_math1_gen7() 186 assert(inst->mlen == 0); in generate_math2_gen7() 197 assert(inst->mlen == 0); in generate_math1_gen6() 225 assert(inst->mlen == 0); in generate_math2_gen6() 244 assert(inst->mlen >= 1); in generate_math_gen4() 339 assert(inst->mlen == 6); in generate_tex() 341 assert(inst->mlen <= 4); in generate_tex() 346 assert(inst->mlen == 6); in generate_tex() 349 assert(inst->mlen == 9); in generate_tex() [all …]
|
D | brw_fs_schedule_instructions.cpp | 293 for (int i = 0; i < inst->mlen; i++) { in calculate_deps() 330 if (inst->mlen > 0) { in calculate_deps() 377 for (int i = 0; i < inst->mlen; i++) { in calculate_deps() 414 if (inst->mlen > 0) { in calculate_deps()
|
D | brw_vec4_visitor.cpp | 190 inst->mlen = 1; in SCRATCH_READ() 203 inst->mlen = 2; in SCRATCH_WRITE() 253 inst->mlen = 1; in emit_math1_gen4() 325 inst->mlen = 2; in emit_math2_gen4() 1350 pull->mlen = 1; in visit() 1905 inst->mlen = inst->header_present + 1; /* always at least one */ in visit() 1958 inst->mlen++; in visit() 1971 inst->mlen++; in visit() 1989 inst->mlen++; in visit() 1996 inst->mlen++; in visit() [all …]
|
D | brw_fs.cpp | 147 mlen == inst->mlen && in equals() 389 if (inst->mlen == 0) in implied_mrf_writes() 421 return inst->mlen; in implied_mrf_writes() 824 inst->mlen = c->dispatch_width / 8; in emit_math() 887 inst->mlen = 2 * c->dispatch_width / 8; in emit_math() 1236 pull->mlen = 1; in setup_pull_constants() 1725 if (scan_inst->mlen) { in compute_to_mrf() 1746 if (scan_inst->mlen) in compute_to_mrf() 1819 if (scan_inst->mlen > 0) { in compute_to_mrf() 1826 mrf_low < scan_inst->base_mrf + scan_inst->mlen) { in compute_to_mrf() [all …]
|
D | brw_vec4_emit.cpp | 408 assert(inst->mlen == 3); in generate_tex() 411 assert(inst->mlen == 2); in generate_tex() 417 assert(inst->mlen == 4); in generate_tex() 421 assert(inst->mlen == 2); in generate_tex() 425 assert(inst->mlen == 2); in generate_tex() 479 inst->mlen, in generate_tex() 494 inst->mlen, in generate_urb_write()
|
D | brw_vec4.cpp | 224 if (inst->mlen == 0) in implied_mrf_writes() 248 return inst->mlen; in implied_mrf_writes() 768 if (scan_inst->mlen) in opt_compute_to_mrf() 826 if (scan_inst->mlen > 0) { in opt_compute_to_mrf() 833 mrf < scan_inst->base_mrf + scan_inst->mlen) { in opt_compute_to_mrf()
|
/external/openssh/ |
D | ed25519.c | 53 const unsigned char *m,unsigned long long mlen, in crypto_sign_ed25519() argument 71 *smlen = mlen+64; in crypto_sign_ed25519() 72 for(i=0;i<mlen;i++) in crypto_sign_ed25519() 77 crypto_hash_sha512(hmg, sm+32, mlen+32); /* Generate k as h(extsk[32],...,extsk[63],m) */ in crypto_sign_ed25519() 88 get_hram(hram, sm, sk+32, sm, mlen+64); in crypto_sign_ed25519() 104 unsigned char *m,unsigned long long *mlen, in crypto_sign_ed25519_open() argument 116 *mlen = (unsigned long long) -1; in crypto_sign_ed25519_open() 136 *mlen = smlen-64; in crypto_sign_ed25519_open()
|
D | msg.c | 48 u_int mlen = sshbuf_len(m); in ssh_msg_send() local 52 put_u32(buf, mlen + 1); in ssh_msg_send() 58 if (atomicio(vwrite, fd, (u_char *)sshbuf_ptr(m), mlen) != mlen) { in ssh_msg_send()
|
D | ssh-ed25519.c | 104 unsigned long long smlen = 0, mlen = 0; in ssh_ed25519_verify() local 135 mlen = smlen; in ssh_ed25519_verify() 136 if ((sm = malloc(smlen)) == NULL || (m = malloc(mlen)) == NULL) { in ssh_ed25519_verify() 142 if ((ret = crypto_sign_ed25519_open(m, &mlen, sm, smlen, in ssh_ed25519_verify() 147 if (ret != 0 || mlen != datalen) { in ssh_ed25519_verify()
|
D | digest-libc.c | 40 typedef void md_update_fn(void *mdctx, const u_int8_t *m, size_t mlen); 198 ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen) in ssh_digest_update() argument 204 digest->md_update(ctx->mdctx, m, mlen); in ssh_digest_update() 246 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) in ssh_digest_memory() argument 252 if (ssh_digest_update(ctx, m, mlen) != 0 || in ssh_digest_memory()
|
D | digest-openssl.c | 142 ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen) in ssh_digest_update() argument 144 if (EVP_DigestUpdate(&ctx->mdctx, m, mlen) != 1) in ssh_digest_update() 183 ssh_digest_memory(int alg, const void *m, size_t mlen, u_char *d, size_t dlen) in ssh_digest_memory() argument 195 if (!EVP_Digest(m, mlen, d, &mdlen, digest->mdfunc(), NULL)) in ssh_digest_memory()
|
D | hmac.c | 93 ssh_hmac_update(struct ssh_hmac_ctx *ctx, const void *m, size_t mlen) in ssh_hmac_update() argument 95 return ssh_digest_update(ctx->digest, m, mlen); in ssh_hmac_update() 141 hmac_test(void *key, size_t klen, void *m, size_t mlen, u_char *e, size_t elen) in hmac_test() argument 150 ssh_hmac_update(ctx, m, mlen) < 0 || in hmac_test()
|
D | digest.h | 53 int ssh_digest_memory(int alg, const void *m, size_t mlen, 62 int ssh_digest_update(struct ssh_digest_ctx *ctx, const void *m, size_t mlen)
|
D | ssh-pkcs11-client.c | 54 int mlen = buffer_len(m); in send_msg() local 56 put_u32(buf, mlen); in send_msg() 61 buffer_consume(m, mlen); in send_msg()
|
D | ssh-pkcs11-helper.c | 106 int mlen = buffer_len(m); in send_msg() local 108 buffer_put_int(&oqueue, mlen); in send_msg() 109 buffer_append(&oqueue, buffer_ptr(m), mlen); in send_msg() 110 buffer_consume(m, mlen); in send_msg()
|
/external/ipsec-tools/src/racoon/ |
D | str2val.c | 51 val2str(buf, mlen) in val2str() argument 53 size_t mlen; 56 size_t len = (mlen * 2) + mlen / 8 + 10; 61 for (i = 0, j = 0; i < mlen; i++) {
|
/external/boringssl/src/crypto/modes/ |
D | gcm.c | 640 uint64_t mlen = ctx->len.u[1]; in CRYPTO_gcm128_encrypt() local 651 mlen += len; in CRYPTO_gcm128_encrypt() 652 if (mlen > ((OPENSSL_U64(1) << 36) - 32) || in CRYPTO_gcm128_encrypt() 653 (sizeof(len) == 8 && mlen < len)) { in CRYPTO_gcm128_encrypt() 656 ctx->len.u[1] = mlen; in CRYPTO_gcm128_encrypt() 800 uint64_t mlen = ctx->len.u[1]; in CRYPTO_gcm128_decrypt() local 811 mlen += len; in CRYPTO_gcm128_decrypt() 812 if (mlen > ((OPENSSL_U64(1) << 36) - 32) || in CRYPTO_gcm128_decrypt() 813 (sizeof(len) == 8 && mlen < len)) { in CRYPTO_gcm128_decrypt() 816 ctx->len.u[1] = mlen; in CRYPTO_gcm128_decrypt() [all …]
|
/external/kernel-headers/original/uapi/scsi/ |
D | scsi_netlink.h | 113 #define INIT_SCSI_NL_HDR(hdr, t, mtype, mlen) \ argument 119 (hdr)->msglen = mlen; \
|
/external/ppp/pppd/ |
D | upap.c | 619 int mlen, ulen, wlen; local 664 mlen = p[0]; 665 if (len < mlen + 1) 668 p += mlen + 1; 669 len -= mlen + 1; 671 print_string(msg, mlen, printer, arg);
|
D | chap-new.c | 312 int response_len, ok, mlen; in chap_handle_response() local 361 mlen = strlen(ss->message); in chap_handle_response() 362 len = CHAP_HDRLEN + mlen; in chap_handle_response() 367 if (mlen > 0) in chap_handle_response() 368 memcpy(p + CHAP_HDRLEN, ss->message, mlen); in chap_handle_response()
|
/external/toybox/toys/posix/ |
D | sed.c | 490 int mflags = 0, count = 0, zmatch = 1, rlen = len, mlen, off, newlen; in walk_pattern() local 497 mlen = match[0].rm_eo-match[0].rm_so; in walk_pattern() 498 if (!mlen && !zmatch) { in walk_pattern() 532 len += newlen-mlen; in walk_pattern() 539 for (off = mlen = 0; new[off]; off++) { in walk_pattern() 545 if (!(rswap[mlen++] = unescape(new[off]))) in walk_pattern() 546 rswap[mlen-1] = new[off]; in walk_pattern() 551 rswap[mlen++] = new[off]; in walk_pattern() 557 memcpy(rswap+mlen, rline+match[cc].rm_so, ll); in walk_pattern() 558 mlen += ll; in walk_pattern()
|
/external/wpa_supplicant_8/src/l2_packet/ |
D | l2_packet_pcap.c | 94 size_t mlen = sizeof(*eth) + len; in l2_packet_send() local 95 eth = os_malloc(mlen); in l2_packet_send() 105 ret = pcap_sendpacket(l2->pcap, (u8 *) eth, mlen); in l2_packet_send() 107 ret = eth_send(l2->eth, (u8 *) eth, mlen); in l2_packet_send()
|
/external/boringssl/src/crypto/rsa/ |
D | padding.c | 454 unsigned i, dblen, mlen = -1, mdlen; in RSA_padding_check_PKCS1_OAEP_mgf1() local 527 mlen = dblen - one_index; in RSA_padding_check_PKCS1_OAEP_mgf1() 528 if (tlen < mlen) { in RSA_padding_check_PKCS1_OAEP_mgf1() 531 mlen = -1; in RSA_padding_check_PKCS1_OAEP_mgf1() 533 memcpy(to, db + one_index, mlen); in RSA_padding_check_PKCS1_OAEP_mgf1() 537 return mlen; in RSA_padding_check_PKCS1_OAEP_mgf1()
|