/system/core/libmincrypt/ |
D | rsa.c | 35 int64_t A = 0; in subM() local 38 A += (uint64_t)a[i] - key->n[i]; in subM() 39 a[i] = (uint32_t)A; in subM() 40 A >>= 32; in subM() 61 uint64_t A = (uint64_t)a * b[0] + c[0]; in montMulAdd() local 62 uint32_t d0 = (uint32_t)A * key->n0inv; in montMulAdd() 63 uint64_t B = (uint64_t)d0 * key->n[0] + (uint32_t)A; in montMulAdd() 67 A = (A >> 32) + (uint64_t)a * b[i] + c[i]; in montMulAdd() 68 B = (B >> 32) + (uint64_t)d0 * key->n[i] + (uint32_t)A; in montMulAdd() 72 A = (A >> 32) + (B >> 32); in montMulAdd() [all …]
|
D | sha256.c | 59 uint32_t A, B, C, D, E, F, G, H; in SHA256_Transform() local 77 A = ctx->state[0]; in SHA256_Transform() 87 uint32_t s0 = ror(A, 2) ^ ror(A, 13) ^ ror(A, 22); in SHA256_Transform() 88 uint32_t maj = (A & B) ^ (A & C) ^ (B & C); in SHA256_Transform() 100 B = A; in SHA256_Transform() 101 A = t1 + t2; in SHA256_Transform() 104 ctx->state[0] += A; in SHA256_Transform()
|
D | sha.c | 40 uint32_t A, B, C, D, E; in SHA1_Transform() local 56 A = ctx->state[0]; in SHA1_Transform() 63 uint32_t tmp = rol(5,A) + E + W[t]; in SHA1_Transform() 77 B = A; in SHA1_Transform() 78 A = tmp; in SHA1_Transform() 81 ctx->state[0] += A; in SHA1_Transform()
|
/system/bt/stack/smp/ |
D | p_256_multprecision.c | 376 DWORD A; in multiprecision_fast_mod_P256() local 422 A = B; in multiprecision_fast_mod_P256() 424 A += a[11]; in multiprecision_fast_mod_P256() 425 UA += (A < a[11]); in multiprecision_fast_mod_P256() 426 UA -= (A < a[15]); in multiprecision_fast_mod_P256() 427 A -= a[15]; in multiprecision_fast_mod_P256() 430 D = A; in multiprecision_fast_mod_P256() 441 U -= (c[0] < A); in multiprecision_fast_mod_P256() 443 c[0] -= A; in multiprecision_fast_mod_P256() 498 c[3] += A; in multiprecision_fast_mod_P256() [all …]
|
/system/connectivity/shill/ |
D | property_accessor.h | 300 template<class C, class T, class A> 311 void(C::*clearer)(const A& argument, Error* error), in CustomMappedAccessor() 312 T(C::*getter)(const A& argument, Error* error), in CustomMappedAccessor() 313 bool(C::*setter)(const A& argument, const T& value, in CustomMappedAccessor() 315 const A& argument) in CustomMappedAccessor() 344 void(C::*const clearer_)(const A& argument, Error* error); 345 T(C::*const getter_)(const A& argument, Error* error); 346 bool(C::*const setter_)(const A& argument, // NOLINT - "casting" 348 A argument_;
|
/system/sepolicy/tools/ |
D | README | 7 A utility for checking the validity of a file_contexts or a 28 A utility for merging together the main seapp_contexts 37 A helper script for mapping tags in the signature stanzas of 42 A tool to help modify an existing mac_permissions.xml with additional app 55 A tool for auditing a sepolicy file for any allow rule that grants 62 A tool for performing various kinds of analysis on a sepolicy
|
/system/tpm/attestation/ |
D | attestation.gyp | 33 # A library for just the protobufs. 57 # A library for common code. 79 # A library for client code. 96 # A shared library for clients. 108 # A client command line utility. 121 # A library for server code.
|
/system/ca-certificates/files/ |
D | e8651083.0 | 64 CB:0F:C6:DF:42:43:CC:3D:CB:B5:48:23:A1:1A:7A:A6:2A:BB:34:68 66 keyid:CB:0F:C6:DF:42:43:CC:3D:CB:B5:48:23:A1:1A:7A:A6:2A:BB:34:68 86 SHA1 Fingerprint=89:DF:74:FE:5C:F4:0F:4A:80:F9:E3:37:7D:54:DA:91:E1:01:31:8E
|
D | b3fb433b.0 | 48 B7:63:E7:1A:DD:8D:E9:08:A6:55:83:A4:E0:6A:50:41:65:11:42:49 56 SHA1 Fingerprint=20:D8:06:40:DF:9B:25:F5:12:25:3A:11:EA:F7:59:8A:EB:14:B5:47
|
D | 04f60c28.0 | 42 3A:E1:09:86:D4:CF:19:C2:96:76:74:49:76:DC:E0:35:C6:63:63:9A 54 SHA1 Fingerprint=D1:CB:CA:5D:B2:D5:2A:7F:69:3B:67:4D:E5:F0:5A:1D:0C:95:7D:F0
|
D | 119afc2e.0 | 78 04:AA:7A:47:A3:E4:89:AF:1A:CF:0A:40:A7:18:3F:6F:EF:E9:7D:BE 80 keyid:04:AA:7A:47:A3:E4:89:AF:1A:CF:0A:40:A7:18:3F:6F:EF:E9:7D:BE
|
D | bdacca6f.0 | 59 ...C.A 65 AF:44:04:C2:41:7E:48:83:DB:4E:39:02:EC:EC:84:7A:E6:CE:C9:A4 89 SHA1 Fingerprint=3A:44:73:5A:E5:81:90:1F:24:86:61:46:1E:3B:9C:C4:5F:F5:3A:1B
|
D | fde84897.0 | 60 1A:ED:FE:41:39:90:B4:24:59:BE:01:F2:52:D5:45:F6:5A:39:DC:11 62 keyid:1A:ED:FE:41:39:90:B4:24:59:BE:01:F2:52:D5:45:F6:5A:39:DC:11 86 SHA1 Fingerprint=B1:2E:13:63:45:86:A4:6F:1A:B2:60:68:37:58:2D:C4:AC:FD:94:97
|
D | 58a44af1.0 | 30 … Issuer: C=FR, ST=France, L=Paris, O=PM/SGDN, OU=DCSSI, CN=IGC/A/emailAddress=igca@sgdn.pm.gouv.fr 34 … Subject: C=FR, ST=France, L=Paris, O=PM/SGDN, OU=DCSSI, CN=IGC/A/emailAddress=igca@sgdn.pm.gouv.fr 67 A3:05:2F:18:60:50:C2:89:0A:DD:2B:21:4F:FF:8E:4E:A8:30:31:36 69 keyid:A3:05:2F:18:60:50:C2:89:0A:DD:2B:21:4F:FF:8E:4E:A8:30:31:36 87 SHA1 Fingerprint=60:D6:89:74:B5:C2:65:9E:8A:0F:C1:88:7C:88:D2:46:69:1B:18:2C
|
D | 08aef7bb.0 | 73 26:95:19:10:D9:E8:A1:97:91:FF:DC:19:D9:B5:04:3E:D2:73:0A:6A 75 keyid:26:95:19:10:D9:E8:A1:97:91:FF:DC:19:D9:B5:04:3E:D2:73:0A:6A 95 SHA1 Fingerprint=E7:B4:F6:9D:61:EC:90:69:DB:7E:90:A7:40:1A:3C:F4:7D:4F:E8:EE
|
D | ccc52f49.0 | 38 9A:AF:29:7A:C0:11:35:35:26:51:30:00:C3:6A:FE:40:D5:AE:D6:3C
|
D | 5f47b495.0 | 39 Issuer: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA 43 Subject: C=IT, L=Milan, O=Actalis S.p.A./03358520967, CN=Actalis Authentication Root CA 86 52:D8:88:3A:C8:9F:78:66:ED:89:F3:7B:38:70:94:C9:02:02:36:D0 90 keyid:52:D8:88:3A:C8:9F:78:66:ED:89:F3:7B:38:70:94:C9:02:02:36:D0 124 SHA1 Fingerprint=F3:73:B3:87:06:5A:28:84:8A:F2:F3:4A:CE:19:2B:DD:C7:8E:9C:AC
|
/system/tpm/attestation/common/ |
D | common.proto | 23 // A certificate intended for enterprise-owned devices. It has the following 30 // A certificate intended for enterprise-owned user accounts. It has the 36 // A certificate intended for platform verification by providers of protected 47 // A certificate intended for cast devices. 69 // A key that has been sealed to the TPM or wrapped by another key.
|
/system/media/audio_utils/ |
D | limiter.c | 53 static const float A = 0.3431457505; in limiter() local 60 out = ((A*in_abs + B)*in_abs + C)*in_abs + D; in limiter()
|
/system/ca-certificates/google/files/ |
D | 04f60c28.0 | 42 3A:E1:09:86:D4:CF:19:C2:96:76:74:49:76:DC:E0:35:C6:63:63:9A 54 SHA1 Fingerprint=D1:CB:CA:5D:B2:D5:2A:7F:69:3B:67:4D:E5:F0:5A:1D:0C:95:7D:F0
|
D | b3fb433b.0 | 48 B7:63:E7:1A:DD:8D:E9:08:A6:55:83:A4:E0:6A:50:41:65:11:42:49 56 SHA1 Fingerprint=20:D8:06:40:DF:9B:25:F5:12:25:3A:11:EA:F7:59:8A:EB:14:B5:47
|
D | ccc52f49.0 | 38 9A:AF:29:7A:C0:11:35:35:26:51:30:00:C3:6A:FE:40:D5:AE:D6:3C
|
/system/connectivity/shill/net/ |
D | rtnl_listener_unittest.cc | 33 using testing::A; 75 EXPECT_CALL(*this, ListenerCallback(A<const RTNLMessage&>())).Times(1); in TEST_F()
|
/system/tpm/tpm_manager/ |
D | tpm_manager.gyp | 36 # A library for just the protobufs. 56 # A shared library for clients. 68 # A client command line utility. 80 # A library for server code.
|
/system/core/adb/ |
D | SYNC.TXT | 40 1. A four-byte sync response id "DENT" 41 2. A four-byte integer representing file mode. 42 3. A four-byte integer representing file size. 43 4. A four-byte integer representing last modified time. 44 5. A four-byte integer representing file name length. 62 A sync request with id "DATA" and length equal to the chunk size. After
|