Searched defs:in_len (Results 1 - 25 of 52) sorted by relevance

123

/external/liblzf/
H A Dlzf_d.c56 lzf_decompress (const void *const in_data, unsigned int in_len, argument
61 u8 const *const in_end = ip + in_len;
H A Dlzf_c.c99 lzf_compress (const void *const in_data, unsigned int in_len, argument
111 const u8 *in_end = ip + in_len;
130 if (!in_len || !out_len)
/external/liblzf/cs/
H A DCLZF.cs153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument
165 //byte *in_end = ip + in_len;
175 if (iidx < in_len - 2)
183 && iidx + 4 < in_len
192 UInt32 maxlen = (UInt32)in_len - iidx - len;
239 else if (iidx == in_len)
277 public int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument
331 while (iidx < in_len);
/external/liblzf/src/org/liblzf/
H A DCLZF.java153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument
165 //byte *in_end = ip + in_len;
175 if (iidx < in_len - 2)
183 && iidx + 4 < in_len
192 int maxlen = in_len - iidx - len;
239 else if (iidx == in_len)
277 public static int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument
331 while (iidx < in_len);
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c28 const u8 *in_data, size_t *in_len);
30 const u8 *in_data, size_t *in_len);
32 const u8 *in_data, size_t *in_len);
36 const u8 *in_data, size_t *in_len)
51 left = *in_len;
199 *in_len = end - in_data;
214 const u8 *in_data, size_t *in_len)
231 left = *in_len;
255 in_len);
258 in_len);
35 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
213 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
476 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
565 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
629 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
686 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
757 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
[all...]
H A Dtlsv1_record.c235 * @in_len: Length of the received data
246 const u8 *in_data, size_t in_len,
255 in_data, in_len);
257 if (in_len < TLS_RECORD_HEADER_LEN) {
258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)",
259 (unsigned long) in_len);
296 in_len -= TLS_RECORD_HEADER_LEN;
298 if (rlen > in_len) {
300 "(rlen=%lu > in_len=%lu)",
301 (unsigned long) rlen, (unsigned long) in_len);
245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c107 * @in_len: Input data length
112 const u8 *in_data, size_t in_len,
119 if (in_data == NULL || in_len == 0) {
125 end = in_data + in_len;
126 in_msg = os_malloc(in_len);
132 in_msg_len = in_len;
187 * @in_len: Input buffer length
196 const u8 *in_data, size_t in_len,
202 in_data, in_len);
204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
111 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
H A Dtlsv1_server_read.c29 const u8 *in_data, size_t *in_len);
32 size_t *in_len);
36 const u8 *in_data, size_t *in_len)
54 left = *in_len;
251 *in_len = end - in_data;
268 const u8 *in_data, size_t *in_len)
285 left = *in_len;
319 in_len);
461 *in_len = end - in_data;
675 const u8 *in_data, size_t *in_len)
35 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
267 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
674 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
752 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
918 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
968 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c23 const u8 *in_data, size_t *in_len);
25 const u8 *in_data, size_t *in_len);
27 const u8 *in_data, size_t *in_len);
31 const u8 *in_data, size_t *in_len)
47 left = *in_len;
200 *in_len = end - in_data;
215 const u8 *in_data, size_t *in_len)
232 left = *in_len;
256 in_len);
259 in_len);
30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
[all...]
H A Dtlsv1_record.c267 * @in_len: Length of the received data
279 const u8 *in_data, size_t in_len,
289 if (in_len < TLS_RECORD_HEADER_LEN) {
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - "
292 (unsigned long) in_len);
294 in_data, in_len);
324 in_len -= TLS_RECORD_HEADER_LEN;
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c103 * @in_len: Input data length
108 const u8 *in_data, size_t in_len,
116 if (in_data == NULL || in_len == 0) {
122 end = in_data + in_len;
123 in_msg = os_malloc(in_len);
129 in_msg_len = in_len;
192 * @in_len: Input buffer length
201 const u8 *in_data, size_t in_len,
207 in_data, in_len);
210 out_data, out_len, in_data, in_len,
107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
H A Dtlsv1_server_read.c24 const u8 *in_data, size_t *in_len);
27 size_t *in_len);
31 const u8 *in_data, size_t *in_len)
49 left = *in_len;
261 *in_len = end - in_data;
278 const u8 *in_data, size_t *in_len)
295 left = *in_len;
329 in_len);
471 *in_len = end - in_data;
689 const u8 *in_data, size_t *in_len)
30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_read.c23 const u8 *in_data, size_t *in_len);
25 const u8 *in_data, size_t *in_len);
27 const u8 *in_data, size_t *in_len);
31 const u8 *in_data, size_t *in_len)
47 left = *in_len;
200 *in_len = end - in_data;
215 const u8 *in_data, size_t *in_len)
232 left = *in_len;
256 in_len);
259 in_len);
30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
[all...]
H A Dtlsv1_record.c267 * @in_len: Length of the received data
279 const u8 *in_data, size_t in_len,
289 if (in_len < TLS_RECORD_HEADER_LEN) {
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - "
292 (unsigned long) in_len);
294 in_data, in_len);
324 in_len -= TLS_RECORD_HEADER_LEN;
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c103 * @in_len: Input data length
108 const u8 *in_data, size_t in_len,
116 if (in_data == NULL || in_len == 0) {
122 end = in_data + in_len;
123 in_msg = os_malloc(in_len);
129 in_msg_len = in_len;
192 * @in_len: Input buffer length
201 const u8 *in_data, size_t in_len,
207 in_data, in_len);
210 out_data, out_len, in_data, in_len,
107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
H A Dtlsv1_server_read.c24 const u8 *in_data, size_t *in_len);
27 size_t *in_len);
31 const u8 *in_data, size_t *in_len)
49 left = *in_len;
261 *in_len = end - in_data;
278 const u8 *in_data, size_t *in_len)
295 left = *in_len;
329 in_len);
471 *in_len = end - in_data;
689 const u8 *in_data, size_t *in_len)
30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c23 const u8 *in_data, size_t *in_len);
25 const u8 *in_data, size_t *in_len);
27 const u8 *in_data, size_t *in_len);
31 const u8 *in_data, size_t *in_len)
47 left = *in_len;
200 *in_len = end - in_data;
215 const u8 *in_data, size_t *in_len)
232 left = *in_len;
256 in_len);
259 in_len);
30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
478 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
567 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
631 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
688 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
759 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
[all...]
H A Dtlsv1_record.c267 * @in_len: Length of the received data
279 const u8 *in_data, size_t in_len,
289 if (in_len < TLS_RECORD_HEADER_LEN) {
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - "
292 (unsigned long) in_len);
294 in_data, in_len);
324 in_len -= TLS_RECORD_HEADER_LEN;
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c103 * @in_len: Input data length
108 const u8 *in_data, size_t in_len,
116 if (in_data == NULL || in_len == 0) {
122 end = in_data + in_len;
123 in_msg = os_malloc(in_len);
129 in_msg_len = in_len;
192 * @in_len: Input buffer length
201 const u8 *in_data, size_t in_len,
207 in_data, in_len);
210 out_data, out_len, in_data, in_len,
107 tlsv1_server_handshake(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
H A Dtlsv1_server_read.c24 const u8 *in_data, size_t *in_len);
27 size_t *in_len);
31 const u8 *in_data, size_t *in_len)
49 left = *in_len;
261 *in_len = end - in_data;
278 const u8 *in_data, size_t *in_len)
295 left = *in_len;
329 in_len);
471 *in_len = end - in_data;
689 const u8 *in_data, size_t *in_len)
30 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
277 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
688 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
766 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1012 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
1062 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument
[all...]
/external/chromium/third_party/libjingle/source/talk/session/phone/
H A Dsrtpfilter.cc123 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument
128 return send_session_.ProtectRtp(p, in_len, max_len, out_len);
131 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { argument
136 return send_session_.ProtectRtcp(p, in_len, max_len, out_len);
139 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { argument
144 return recv_session_.UnprotectRtp(p, in_len, out_len);
147 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { argument
152 return recv_session_.UnprotectRtcp(p, in_len, out_len);
271 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument
277 int need_len = in_len
293 ProtectRtcp(void* p, int in_len, int max_len, int* out_len) argument
315 UnprotectRtp(void* p, int in_len, int* out_len) argument
330 UnprotectRtcp(void* p, int in_len, int* out_len) argument
474 ProtectRtp(void* data, int in_len, int max_len, int* out_len) argument
479 ProtectRtcp(void* data, int in_len, int max_len, int* out_len) argument
484 UnprotectRtp(void* data, int in_len, int* out_len) argument
488 UnprotectRtcp(void* data, int in_len, int* out_len) argument
[all...]
/external/sqlite/android/
H A DPhoneNumberUtils.cpp441 int in_len = strlen(in); local
444 for (int i = in_len; --i >= 0;) {
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dtls_none.c111 const u8 *in_data, size_t in_len,
121 const u8 *in_data, size_t in_len,
129 const u8 *in_data, size_t in_len,
137 const u8 *in_data, size_t in_len,
110 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len, u8 **appl_data, size_t *appl_data_len) argument
119 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
128 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
136 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
H A Dtls_internal.c335 const u8 *in_data, size_t in_len,
346 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
347 __func__, in_data, (unsigned long) in_len);
348 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len,
358 const u8 *in_data, size_t in_len,
366 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
367 __func__, in_data, (unsigned long) in_len);
368 out = tlsv1_server_handshake(conn->server, in_data, in_len, out_len);
381 const u8 *in_data, size_t in_len,
386 return tlsv1_client_encrypt(conn->client, in_data, in_len,
334 tls_connection_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len, u8 **appl_data, size_t *appl_data_len) argument
356 tls_connection_server_handshake(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, size_t *out_len) argument
380 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
400 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
/external/qemu/hw/
H A Dbt-hci-csr.c41 int in_len; member in struct:csrhci_s
192 s->in_len - sizeof(struct hci_command_hdr) - 1);
202 s->hci->cmd_send(s->hci, pkt, s->in_len - 1);
209 s->hci->acl_send(s->hci, pkt, s->in_len - 1);
213 s->hci->sco_send(s->hci, pkt, s->in_len - 1);
302 int plen = s->in_len;
307 s->in_len += len;
311 if (s->in_len >= 2 && plen < 2)
314 if (s->in_len >= s->in_hdr && plen < s->in_hdr)
317 if (s->in_len >
[all...]

Completed in 3330 milliseconds

123