Searched defs:out_data (Results 1 - 25 of 57) sorted by relevance

123

/external/chromium/chrome/browser/sync/util/
H A Ddata_encryption.cc37 bool DecryptData(const vector<uint8>& in_data, string* out_data) { argument
49 out_data->assign(reinterpret_cast<const char*>(decrypted_data.pbData),
/external/liblzf/
H A Dlzf_d.c57 void *out_data, unsigned int out_len)
60 u8 *op = (u8 *)out_data;
135 if (ref < (u8 *)out_data)
183 return op - (u8 *)out_data;
56 lzf_decompress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len) argument
H A Dlzf_c.c100 void *out_data, unsigned int out_len
110 u8 *op = (u8 *)out_data;
289 return op - (u8 *)out_data;
99 lzf_compress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len , LZF_STATE htab ) argument
/external/webrtc/src/modules/audio_processing/
H A Dsplitting_filter.cc27 WebRtc_Word16* out_data,
31 WebRtcSpl_SynthesisQMF(low_band, high_band, out_data, filt_state1, filt_state2);
25 SplittingFilterSynthesis(const WebRtc_Word16* low_band, const WebRtc_Word16* high_band, WebRtc_Word16* out_data, WebRtc_Word32* filt_state1, WebRtc_Word32* filt_state2) argument
/external/liblzf/cs/
H A DCLZF.cs153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument
204 out_data[oidx++] = (byte)(lit - 1);
207 out_data[oidx++] = in_data[iidx+lit];
216 out_data[oidx++] = (byte)((off >> 8) + (len << 5));
220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5));
221 out_data[oidx++] = (byte)(len - 7);
224 out_data[oidx++] = (byte)off;
251 out_data[oidx++] = (byte)(MAX_LIT - 1);
254 out_data[oidx++] = in_data[iidx+lit];
264 out_data[oid
277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument
[all...]
/external/liblzf/src/org/liblzf/
H A DCLZF.java153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument
204 out_data[oidx++] = (byte)(lit - 1);
207 out_data[oidx++] = in_data[iidx+lit];
216 out_data[oidx++] = (byte)((off >> 8) + (len << 5));
220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5));
221 out_data[oidx++] = (byte)(len - 7);
224 out_data[oidx++] = (byte)off;
251 out_data[oidx++] = (byte)(MAX_LIT - 1);
254 out_data[oidx++] = in_data[iidx+lit];
264 out_data[oid
277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument
[all...]
/external/webrtc/src/common_audio/signal_processing/
H A Dsplitting_filter.c42 // - out_data : Output data sequence (Q10), length equal to
47 WebRtc_Word32* out_data, const WebRtc_UWord16* filter_coefficients,
59 // the out_data state, out_data[-1]. This is repeated for each cascade.
61 // |out_data|. The second will the take the |out_data| as input and make an
64 // filter) and store the output in |out_data|.
68 // First all-pass cascade; filter from in_data to out_data.
77 out_data[0] = WEBRTC_SPL_SCALEDIFF32(filter_coefficients[0], diff, filter_state[0]);
82 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[k], out_data[
46 WebRtcSpl_AllPassQMF(WebRtc_Word32* in_data, const WebRtc_Word16 data_length, WebRtc_Word32* out_data, const WebRtc_UWord16* filter_coefficients, WebRtc_Word32* filter_state) argument
158 WebRtcSpl_SynthesisQMF(const WebRtc_Word16* low_band, const WebRtc_Word16* high_band, WebRtc_Word16* out_data, WebRtc_Word32* filter_state1, WebRtc_Word32* filter_state2) argument
[all...]
/external/wpa_supplicant_6/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c869 u8 **out_data, size_t *out_len)
888 *out_data = os_malloc(left);
889 if (*out_data) {
890 os_memcpy(*out_data, pos, left);
900 u8 **out_data, size_t *out_len)
960 if (out_data &&
961 tls_process_application_data(conn, ct, buf, len, out_data,
867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
898 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
H A Dtlsv1_record.c236 * @out_data: Buffer for output data (must be at least as long as in_data)
237 * @out_len: Set to maximum out_data length by caller; used to return the
247 u8 *out_data, size_t *out_len, u8 *alert)
315 os_memcpy(out_data, in_data, in_len);
319 if (crypto_cipher_decrypt(rl->read_cbc, out_data,
320 out_data, in_len) < 0) {
331 padlen = out_data[in_len - 1];
341 if (out_data[i] != padlen) {
345 out_data + in_len - padlen,
357 out_data, in_le
245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c188 * @out_data: Pointer to output buffer (encrypted TLS data)
189 * @out_len: Maximum out_data length
190 * Returns: Number of bytes written to out_data, -1 on failure
197 u8 *out_data, size_t out_len)
204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
207 out_data, out_len, in_len, &rlen) < 0) {
223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
224 * @out_len: Maximum out_data length
225 * Returns: Number of bytes written to out_data, -1 on failure
232 u8 *out_data, size_
195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
H A Dtlsv1_client.c214 * @out_data: Pointer to output buffer (encrypted TLS data)
215 * @out_len: Maximum out_data length
216 * Returns: Number of bytes written to out_data, -1 on failure
223 u8 *out_data, size_t out_len)
230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
233 out_data, out_len, in_len, &rlen) < 0) {
249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
250 * @out_len: Maximum out_data length
251 * Returns: Number of bytes written to out_data, -1 on failure
258 u8 *out_data, size_
221 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
256 tlsv1_client_decrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client_read.c892 u8 **out_data, size_t *out_len)
911 *out_data = os_malloc(left);
912 if (*out_data) {
913 os_memcpy(*out_data, pos, left);
923 u8 **out_data, size_t *out_len)
983 if (out_data &&
984 tls_process_application_data(conn, ct, buf, len, out_data,
890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
H A Dtlsv1_record.c268 * @out_data: Buffer for output data (must be at least as long as in_data)
269 * @out_len: Set to maximum out_data length by caller; used to return the
280 u8 *out_data, size_t *out_len, u8 *alert)
358 out_data, in_len) < 0) {
364 "data", out_data, plen);
386 os_memmove(out_data, out_data + rl->iv_size,
398 padlen = out_data[plen - 1];
408 if (out_data[i] != padlen) {
412 out_data
278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c193 * @out_data: Pointer to output buffer (encrypted TLS data)
194 * @out_len: Maximum out_data length
195 * Returns: Number of bytes written to out_data, -1 on failure
202 u8 *out_data, size_t out_len)
210 out_data, out_len, in_data, in_len, &rlen) < 0) {
226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
227 * @out_len: Maximum out_data length
228 * Returns: Number of bytes written to out_data, -1 on failure
235 u8 *out_data, size_t out_len)
244 out_pos = out_data;
200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client_read.c892 u8 **out_data, size_t *out_len)
911 *out_data = os_malloc(left);
912 if (*out_data) {
913 os_memcpy(*out_data, pos, left);
923 u8 **out_data, size_t *out_len)
983 if (out_data &&
984 tls_process_application_data(conn, ct, buf, len, out_data,
890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
H A Dtlsv1_record.c268 * @out_data: Buffer for output data (must be at least as long as in_data)
269 * @out_len: Set to maximum out_data length by caller; used to return the
280 u8 *out_data, size_t *out_len, u8 *alert)
358 out_data, in_len) < 0) {
364 "data", out_data, plen);
386 os_memmove(out_data, out_data + rl->iv_size,
398 padlen = out_data[plen - 1];
408 if (out_data[i] != padlen) {
412 out_data
278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c193 * @out_data: Pointer to output buffer (encrypted TLS data)
194 * @out_len: Maximum out_data length
195 * Returns: Number of bytes written to out_data, -1 on failure
202 u8 *out_data, size_t out_len)
210 out_data, out_len, in_data, in_len, &rlen) < 0) {
226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
227 * @out_len: Maximum out_data length
228 * Returns: Number of bytes written to out_data, -1 on failure
235 u8 *out_data, size_t out_len)
244 out_pos = out_data;
200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client_read.c892 u8 **out_data, size_t *out_len)
911 *out_data = os_malloc(left);
912 if (*out_data) {
913 os_memcpy(*out_data, pos, left);
923 u8 **out_data, size_t *out_len)
983 if (out_data &&
984 tls_process_application_data(conn, ct, buf, len, out_data,
890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument
921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
H A Dtlsv1_record.c268 * @out_data: Buffer for output data (must be at least as long as in_data)
269 * @out_len: Set to maximum out_data length by caller; used to return the
280 u8 *out_data, size_t *out_len, u8 *alert)
358 out_data, in_len) < 0) {
364 "data", out_data, plen);
386 os_memmove(out_data, out_data + rl->iv_size,
398 padlen = out_data[plen - 1];
408 if (out_data[i] != padlen) {
412 out_data
278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
H A Dtlsv1_server.c193 * @out_data: Pointer to output buffer (encrypted TLS data)
194 * @out_len: Maximum out_data length
195 * Returns: Number of bytes written to out_data, -1 on failure
202 u8 *out_data, size_t out_len)
210 out_data, out_len, in_data, in_len, &rlen) < 0) {
226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel)
227 * @out_len: Maximum out_data length
228 * Returns: Number of bytes written to out_data, -1 on failure
235 u8 *out_data, size_t out_len)
244 out_pos = out_data;
200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
[all...]
/external/chromium/chrome/browser/autofill/
H A Dautofill_ie_toolbar_import_win.cc74 std::string out_data; local
75 if (DecryptData(data, &out_data)) {
77 if (!(out_data.size() & 1) && (out_data.size() > 2) &&
78 !out_data[out_data.size() - 1] && !out_data[out_data.size() - 2]) {
80 reinterpret_cast<const wchar_t *>(out_data.c_str()));
/external/chromium/chrome/browser/history/
H A Dthumbnail_database_unittest.cc430 std::vector<unsigned char> out_data; local
433 icon_mappings[0].icon_id, &time, &out_data, &out_icon_url));
454 icon_mappings[0].icon_id, &time, &out_data, &out_icon_url));
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/
H A Dtls_none.c130 u8 *out_data, size_t out_len)
138 u8 *out_data, size_t out_len)
214 u8 *out_data, size_t out_len)
128 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
136 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
211 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument
H A Dtls_internal.c382 u8 *out_data, size_t out_len)
387 out_data, out_len);
393 out_data, out_len);
402 u8 *out_data, size_t out_len)
407 out_data, out_len);
413 out_data, out_len);
530 u8 *out_data, size_t out_len)
380 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
400 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
527 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
H A Deap_tls_common.c426 * @out_data: Buffer for returning a pointer to application data (if available)
432 struct wpabuf **out_data)
466 *out_data = wpabuf_alloc_ext_data(appl_data, appl_data_len);
467 if (*out_data == NULL) {
487 * @out_data: Buffer for returning the allocated output buffer
492 struct wpabuf **out_data)
530 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type,
533 if (*out_data == NULL)
536 flags = wpabuf_put(*out_data, 1);
542 wpabuf_put_be32(*out_data, dat
430 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
490 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument
584 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument
911 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument
[all...]

Completed in 488 milliseconds

123