/external/chromium/chrome/browser/sync/util/ |
H A D | data_encryption.cc | 37 bool DecryptData(const vector<uint8>& in_data, string* out_data) { argument 40 (in_data.empty() ? NULL : const_cast<BYTE*>(&in_data[0])); 41 encrypted_data.cbData = in_data.size();
|
/external/liblzf/ |
H A D | lzf_d.c | 56 lzf_decompress (const void *const in_data, unsigned int in_len, argument 59 u8 const *ip = (const u8 *)in_data;
|
H A D | lzf_c.c | 99 lzf_compress (const void *const in_data, unsigned int in_len, argument 109 const u8 *ip = (const u8 *)in_data; 153 && ref > (u8 *)in_data
|
/external/webrtc/src/modules/audio_processing/ |
H A D | splitting_filter.cc | 16 void SplittingFilterAnalysis(const WebRtc_Word16* in_data, argument 22 WebRtcSpl_AnalysisQMF(in_data, low_band, high_band, filter_state1, filter_state2);
|
/external/liblzf/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 169 UInt32 hval = FRST (in_data,iidx); 177 hval = NEXT (hval, in_data,iidx); 185 && in_data[reference+0] == in_data[iidx+0] 186 && in_data[reference+1] == in_data[iidx+1] 187 && in_data[reference+2] == in_data[iidx+2] 200 while (len < maxlen && in_data[referenc 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/external/liblzf/src/org/liblzf/ |
H A D | CLZF.java | 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 169 int hval = FRST (in_data,iidx); 177 hval = NEXT (hval, in_data,iidx); 185 && in_data[reference+0] == in_data[iidx+0] 186 && in_data[reference+1] == in_data[iidx+1] 187 && in_data[reference+2] == in_data[iidx+2] 200 while (len < maxlen && in_data[referenc 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/external/webrtc/src/common_audio/signal_processing/ |
H A D | splitting_filter.c | 34 // - in_data : Input data sequence (Q10) 46 void WebRtcSpl_AllPassQMF(WebRtc_Word32* in_data, const WebRtc_Word16 data_length, argument 58 // The filter state contains the in_data state, in_data[-1], followed by 60 // The first cascade filter will filter the |in_data| and store the output in 62 // intermediate storage in |in_data|, to save memory. The third, and final, cascade 63 // filter operation takes the |in_data| (which is the output from the previous cascade 68 // First all-pass cascade; filter from in_data to out_data. 75 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[0], filter_state[1]); // = (x[0] - y_1[-1]) 82 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[ 119 WebRtcSpl_AnalysisQMF(const WebRtc_Word16* in_data, WebRtc_Word16* low_band, WebRtc_Word16* high_band, WebRtc_Word32* filter_state1, WebRtc_Word32* filter_state2) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 28 const u8 *in_data, size_t *in_len); 30 const u8 *in_data, size_t *in_len); 32 const u8 *in_data, size_t *in_len); 36 const u8 *in_data, size_t *in_len) 50 pos = in_data; 199 *in_len = end - in_data; 214 const u8 *in_data, size_t *in_len) 230 pos = in_data; 254 return tls_process_server_key_exchange(conn, ct, in_data, 257 return tls_process_certificate_request(conn, ct, in_data, 35 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 213 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 476 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 565 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 629 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 686 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 757 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 234 * @in_data: Received data 236 * @out_data: Buffer for output data (must be at least as long as in_data) 246 const u8 *in_data, size_t in_len, 255 in_data, in_len); 265 "length %d", in_data[0], in_data[1], in_data[2], 266 WPA_GET_BE16(in_data + 3)); 268 if (in_data[0] != TLS_CONTENT_TYPE_HANDSHAKE && 269 in_data[ 245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 106 * @in_data: Input data from TLS peer 112 const u8 *in_data, size_t in_len, 119 if (in_data == NULL || in_len == 0) { 124 pos = in_data; 125 end = in_data + in_len; 186 * @in_data: Pointer to plaintext data to be encrypted 196 const u8 *in_data, size_t in_len, 202 in_data, in_len); 204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 221 * @in_data 111 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 29 const u8 *in_data, size_t *in_len); 31 u8 ct, const u8 *in_data, 36 const u8 *in_data, size_t *in_len) 53 pos = in_data; 251 *in_len = end - in_data; 268 const u8 *in_data, size_t *in_len) 284 pos = in_data; 318 return tls_process_client_key_exchange(conn, ct, in_data, 461 *in_len = end - in_data; 675 const u8 *in_data, size_ 35 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 267 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 674 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 752 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 918 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 968 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 46 pos = in_data; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 231 pos = in_data; 255 return tls_process_server_key_exchange(conn, ct, in_data, 258 return tls_process_certificate_request(conn, ct, in_data, 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 266 * @in_data: Received data 268 * @out_data: Buffer for output data (must be at least as long as in_data) 272 * Returns: Number of bytes used from in_data on success, 0 if record was not 279 const u8 *in_data, size_t in_len, 294 in_data, in_len); 298 ct = in_data[0]; 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 308 if (in_data[ 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 102 * @in_data: Input data from TLS peer 108 const u8 *in_data, size_t in_len, 116 if (in_data == NULL || in_len == 0) { 121 pos = in_data; 122 end = in_data + in_len; 191 * @in_data: Pointer to plaintext data to be encrypted 201 const u8 *in_data, size_t in_len, 207 in_data, in_len); 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 224 * @in_data 107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 26 u8 ct, const u8 *in_data, 31 const u8 *in_data, size_t *in_len) 48 pos = in_data; 261 *in_len = end - in_data; 278 const u8 *in_data, size_t *in_len) 294 pos = in_data; 328 return tls_process_client_key_exchange(conn, ct, in_data, 471 *in_len = end - in_data; 689 const u8 *in_data, size_ 30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 46 pos = in_data; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 231 pos = in_data; 255 return tls_process_server_key_exchange(conn, ct, in_data, 258 return tls_process_certificate_request(conn, ct, in_data, 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 266 * @in_data: Received data 268 * @out_data: Buffer for output data (must be at least as long as in_data) 272 * Returns: Number of bytes used from in_data on success, 0 if record was not 279 const u8 *in_data, size_t in_len, 294 in_data, in_len); 298 ct = in_data[0]; 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 308 if (in_data[ 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 102 * @in_data: Input data from TLS peer 108 const u8 *in_data, size_t in_len, 116 if (in_data == NULL || in_len == 0) { 121 pos = in_data; 122 end = in_data + in_len; 191 * @in_data: Pointer to plaintext data to be encrypted 201 const u8 *in_data, size_t in_len, 207 in_data, in_len); 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 224 * @in_data 107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 26 u8 ct, const u8 *in_data, 31 const u8 *in_data, size_t *in_len) 48 pos = in_data; 261 *in_len = end - in_data; 278 const u8 *in_data, size_t *in_len) 294 pos = in_data; 328 return tls_process_client_key_exchange(conn, ct, in_data, 471 *in_len = end - in_data; 689 const u8 *in_data, size_ 30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 46 pos = in_data; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 231 pos = in_data; 255 return tls_process_server_key_exchange(conn, ct, in_data, 258 return tls_process_certificate_request(conn, ct, in_data, 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 266 * @in_data: Received data 268 * @out_data: Buffer for output data (must be at least as long as in_data) 272 * Returns: Number of bytes used from in_data on success, 0 if record was not 279 const u8 *in_data, size_t in_len, 294 in_data, in_len); 298 ct = in_data[0]; 299 rlen = WPA_GET_BE16(in_data + 3); 301 "length %d", ct, in_data[1], in_data[2], (int) rlen); 308 if (in_data[ 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 111 const u8 *in_data, size_t in_len, 121 const u8 *in_data, size_t in_len, 129 const u8 *in_data, size_t in_len, 137 const u8 *in_data, size_t in_len, 110 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len, u8 **appl_data, size_t *appl_data_len) argument 119 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 128 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 136 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | tls_none.c | 98 const struct wpabuf *in_data, 107 const struct wpabuf *in_data, 116 const struct wpabuf *in_data) 124 const struct wpabuf *in_data) 96 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 105 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 114 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 122 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | tls_none.c | 98 const struct wpabuf *in_data, 107 const struct wpabuf *in_data, 116 const struct wpabuf *in_data) 124 const struct wpabuf *in_data) 96 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 105 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 114 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 122 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 98 const struct wpabuf *in_data, 107 const struct wpabuf *in_data, 116 const struct wpabuf *in_data) 124 const struct wpabuf *in_data) 96 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 105 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data, struct wpabuf **appl_data) argument 114 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument 122 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const struct wpabuf *in_data) argument
|