/external/liblzf/ |
H A D | lzf_d.c | 56 lzf_decompress (const void *const in_data, unsigned int in_len, argument 61 u8 const *const in_end = ip + in_len;
|
H A D | lzf_c.c | 99 lzf_compress (const void *const in_data, unsigned int in_len, argument 111 const u8 *in_end = ip + in_len; 130 if (!in_len || !out_len)
|
/external/liblzf/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 165 //byte *in_end = ip + in_len; 175 if (iidx < in_len - 2) 183 && iidx + 4 < in_len 192 UInt32 maxlen = (UInt32)in_len - iidx - len; 239 else if (iidx == in_len) 277 public int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument 331 while (iidx < in_len);
|
/external/liblzf/src/org/liblzf/ |
H A D | CLZF.java | 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 165 //byte *in_end = ip + in_len; 175 if (iidx < in_len - 2) 183 && iidx + 4 < in_len 192 int maxlen = in_len - iidx - len; 239 else if (iidx == in_len) 277 public static int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument 331 while (iidx < in_len);
|
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 28 const u8 *in_data, size_t *in_len); 30 const u8 *in_data, size_t *in_len); 32 const u8 *in_data, size_t *in_len); 36 const u8 *in_data, size_t *in_len) 51 left = *in_len; 199 *in_len = end - in_data; 214 const u8 *in_data, size_t *in_len) 231 left = *in_len; 255 in_len); 258 in_len); 35 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 213 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 476 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 565 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 629 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 686 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 757 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 235 * @in_len: Length of the received data 246 const u8 *in_data, size_t in_len, 255 in_data, in_len); 257 if (in_len < TLS_RECORD_HEADER_LEN) { 258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)", 259 (unsigned long) in_len); 296 in_len -= TLS_RECORD_HEADER_LEN; 298 if (rlen > in_len) { 300 "(rlen=%lu > in_len=%lu)", 301 (unsigned long) rlen, (unsigned long) in_len); 245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 107 * @in_len: Input data length 112 const u8 *in_data, size_t in_len, 119 if (in_data == NULL || in_len == 0) { 125 end = in_data + in_len; 126 in_msg = os_malloc(in_len); 132 in_msg_len = in_len; 187 * @in_len: Input buffer length 196 const u8 *in_data, size_t in_len, 202 in_data, in_len); 204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 111 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 29 const u8 *in_data, size_t *in_len); 32 size_t *in_len); 36 const u8 *in_data, size_t *in_len) 54 left = *in_len; 251 *in_len = end - in_data; 268 const u8 *in_data, size_t *in_len) 285 left = *in_len; 319 in_len); 461 *in_len = end - in_data; 675 const u8 *in_data, size_t *in_len) 35 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 267 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 674 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 752 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 918 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 968 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 47 left = *in_len; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 232 left = *in_len; 256 in_len); 259 in_len); 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 267 * @in_len: Length of the received data 279 const u8 *in_data, size_t in_len, 289 if (in_len < TLS_RECORD_HEADER_LEN) { 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " 292 (unsigned long) in_len); 294 in_data, in_len); 324 in_len -= TLS_RECORD_HEADER_LEN; 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 103 * @in_len: Input data length 108 const u8 *in_data, size_t in_len, 116 if (in_data == NULL || in_len == 0) { 122 end = in_data + in_len; 123 in_msg = os_malloc(in_len); 129 in_msg_len = in_len; 192 * @in_len: Input buffer length 201 const u8 *in_data, size_t in_len, 207 in_data, in_len); 210 out_data, out_len, in_data, in_len, 107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 27 size_t *in_len); 31 const u8 *in_data, size_t *in_len) 49 left = *in_len; 261 *in_len = end - in_data; 278 const u8 *in_data, size_t *in_len) 295 left = *in_len; 329 in_len); 471 *in_len = end - in_data; 689 const u8 *in_data, size_t *in_len) 30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 47 left = *in_len; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 232 left = *in_len; 256 in_len); 259 in_len); 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 267 * @in_len: Length of the received data 279 const u8 *in_data, size_t in_len, 289 if (in_len < TLS_RECORD_HEADER_LEN) { 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " 292 (unsigned long) in_len); 294 in_data, in_len); 324 in_len -= TLS_RECORD_HEADER_LEN; 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 103 * @in_len: Input data length 108 const u8 *in_data, size_t in_len, 116 if (in_data == NULL || in_len == 0) { 122 end = in_data + in_len; 123 in_msg = os_malloc(in_len); 129 in_msg_len = in_len; 192 * @in_len: Input buffer length 201 const u8 *in_data, size_t in_len, 207 in_data, in_len); 210 out_data, out_len, in_data, in_len, 107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 27 size_t *in_len); 31 const u8 *in_data, size_t *in_len) 49 left = *in_len; 261 *in_len = end - in_data; 278 const u8 *in_data, size_t *in_len) 295 left = *in_len; 329 in_len); 471 *in_len = end - in_data; 689 const u8 *in_data, size_t *in_len) 30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 47 left = *in_len; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 232 left = *in_len; 256 in_len); 259 in_len); 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_record.c | 267 * @in_len: Length of the received data 279 const u8 *in_data, size_t in_len, 289 if (in_len < TLS_RECORD_HEADER_LEN) { 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " 292 (unsigned long) in_len); 294 in_data, in_len); 324 in_len -= TLS_RECORD_HEADER_LEN; 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 103 * @in_len: Input data length 108 const u8 *in_data, size_t in_len, 116 if (in_data == NULL || in_len == 0) { 122 end = in_data + in_len; 123 in_msg = os_malloc(in_len); 129 in_msg_len = in_len; 192 * @in_len: Input buffer length 201 const u8 *in_data, size_t in_len, 207 in_data, in_len); 210 out_data, out_len, in_data, in_len, 107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 27 size_t *in_len); 31 const u8 *in_data, size_t *in_len) 49 left = *in_len; 261 *in_len = end - in_data; 278 const u8 *in_data, size_t *in_len) 295 left = *in_len; 329 in_len); 471 *in_len = end - in_data; 689 const u8 *in_data, size_t *in_len) 30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
H A D | srtpfilter.cc | 123 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument 128 return send_session_.ProtectRtp(p, in_len, max_len, out_len); 131 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { argument 136 return send_session_.ProtectRtcp(p, in_len, max_len, out_len); 139 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { argument 144 return recv_session_.UnprotectRtp(p, in_len, out_len); 147 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { argument 152 return recv_session_.UnprotectRtcp(p, in_len, out_len); 271 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument 277 int need_len = in_len 293 ProtectRtcp(void* p, int in_len, int max_len, int* out_len) argument 315 UnprotectRtp(void* p, int in_len, int* out_len) argument 330 UnprotectRtcp(void* p, int in_len, int* out_len) argument 474 ProtectRtp(void* data, int in_len, int max_len, int* out_len) argument 479 ProtectRtcp(void* data, int in_len, int max_len, int* out_len) argument 484 UnprotectRtp(void* data, int in_len, int* out_len) argument 488 UnprotectRtcp(void* data, int in_len, int* out_len) argument [all...] |
/external/sqlite/android/ |
H A D | PhoneNumberUtils.cpp | 441 int in_len = strlen(in); local 444 for (int i = in_len; --i >= 0;) {
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 111 const u8 *in_data, size_t in_len, 121 const u8 *in_data, size_t in_len, 129 const u8 *in_data, size_t in_len, 137 const u8 *in_data, size_t in_len, 110 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len, u8 **appl_data, size_t *appl_data_len) argument 119 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 128 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 136 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
|
H A D | tls_internal.c | 335 const u8 *in_data, size_t in_len, 346 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)", 347 __func__, in_data, (unsigned long) in_len); 348 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len, 358 const u8 *in_data, size_t in_len, 366 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)", 367 __func__, in_data, (unsigned long) in_len); 368 out = tlsv1_server_handshake(conn->server, in_data, in_len, out_len); 381 const u8 *in_data, size_t in_len, 386 return tlsv1_client_encrypt(conn->client, in_data, in_len, 334 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len, u8 **appl_data, size_t *appl_data_len) argument 356 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument 380 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 400 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
/external/qemu/hw/ |
H A D | bt-hci-csr.c | 41 int in_len; member in struct:csrhci_s 192 s->in_len - sizeof(struct hci_command_hdr) - 1); 202 s->hci->cmd_send(s->hci, pkt, s->in_len - 1); 209 s->hci->acl_send(s->hci, pkt, s->in_len - 1); 213 s->hci->sco_send(s->hci, pkt, s->in_len - 1); 302 int plen = s->in_len; 307 s->in_len += len; 311 if (s->in_len >= 2 && plen < 2) 314 if (s->in_len >= s->in_hdr && plen < s->in_hdr) 317 if (s->in_len > [all...] |