/external/chromium/chrome/browser/sync/util/ |
H A D | data_encryption.cc | 37 bool DecryptData(const vector<uint8>& in_data, string* out_data) { argument 49 out_data->assign(reinterpret_cast<const char*>(decrypted_data.pbData),
|
/external/liblzf/ |
H A D | lzf_d.c | 57 void *out_data, unsigned int out_len) 60 u8 *op = (u8 *)out_data; 135 if (ref < (u8 *)out_data) 183 return op - (u8 *)out_data; 56 lzf_decompress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len) argument
|
H A D | lzf_c.c | 100 void *out_data, unsigned int out_len 110 u8 *op = (u8 *)out_data; 289 return op - (u8 *)out_data; 99 lzf_compress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len , LZF_STATE htab ) argument
|
/external/webrtc/src/modules/audio_processing/ |
H A D | splitting_filter.cc | 27 WebRtc_Word16* out_data, 31 WebRtcSpl_SynthesisQMF(low_band, high_band, out_data, filt_state1, filt_state2); 25 SplittingFilterSynthesis(const WebRtc_Word16* low_band, const WebRtc_Word16* high_band, WebRtc_Word16* out_data, WebRtc_Word32* filt_state1, WebRtc_Word32* filt_state2) argument
|
/external/liblzf/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 204 out_data[oidx++] = (byte)(lit - 1); 207 out_data[oidx++] = in_data[iidx+lit]; 216 out_data[oidx++] = (byte)((off >> 8) + (len << 5)); 220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5)); 221 out_data[oidx++] = (byte)(len - 7); 224 out_data[oidx++] = (byte)off; 251 out_data[oidx++] = (byte)(MAX_LIT - 1); 254 out_data[oidx++] = in_data[iidx+lit]; 264 out_data[oid 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/external/liblzf/src/org/liblzf/ |
H A D | CLZF.java | 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 204 out_data[oidx++] = (byte)(lit - 1); 207 out_data[oidx++] = in_data[iidx+lit]; 216 out_data[oidx++] = (byte)((off >> 8) + (len << 5)); 220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5)); 221 out_data[oidx++] = (byte)(len - 7); 224 out_data[oidx++] = (byte)off; 251 out_data[oidx++] = (byte)(MAX_LIT - 1); 254 out_data[oidx++] = in_data[iidx+lit]; 264 out_data[oid 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/external/webrtc/src/common_audio/signal_processing/ |
H A D | splitting_filter.c | 42 // - out_data : Output data sequence (Q10), length equal to 47 WebRtc_Word32* out_data, const WebRtc_UWord16* filter_coefficients, 59 // the out_data state, out_data[-1]. This is repeated for each cascade. 61 // |out_data|. The second will the take the |out_data| as input and make an 64 // filter) and store the output in |out_data|. 68 // First all-pass cascade; filter from in_data to out_data. 77 out_data[0] = WEBRTC_SPL_SCALEDIFF32(filter_coefficients[0], diff, filter_state[0]); 82 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[k], out_data[ 46 WebRtcSpl_AllPassQMF(WebRtc_Word32* in_data, const WebRtc_Word16 data_length, WebRtc_Word32* out_data, const WebRtc_UWord16* filter_coefficients, WebRtc_Word32* filter_state) argument 158 WebRtcSpl_SynthesisQMF(const WebRtc_Word16* low_band, const WebRtc_Word16* high_band, WebRtc_Word16* out_data, WebRtc_Word32* filter_state1, WebRtc_Word32* filter_state2) argument [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 869 u8 **out_data, size_t *out_len) 888 *out_data = os_malloc(left); 889 if (*out_data) { 890 os_memcpy(*out_data, pos, left); 900 u8 **out_data, size_t *out_len) 960 if (out_data && 961 tls_process_application_data(conn, ct, buf, len, out_data, 867 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 898 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_record.c | 236 * @out_data: Buffer for output data (must be at least as long as in_data) 237 * @out_len: Set to maximum out_data length by caller; used to return the 247 u8 *out_data, size_t *out_len, u8 *alert) 315 os_memcpy(out_data, in_data, in_len); 319 if (crypto_cipher_decrypt(rl->read_cbc, out_data, 320 out_data, in_len) < 0) { 331 padlen = out_data[in_len - 1]; 341 if (out_data[i] != padlen) { 345 out_data + in_len - padlen, 357 out_data, in_le 245 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 188 * @out_data: Pointer to output buffer (encrypted TLS data) 189 * @out_len: Maximum out_data length 190 * Returns: Number of bytes written to out_data, -1 on failure 197 u8 *out_data, size_t out_len) 204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 207 out_data, out_len, in_len, &rlen) < 0) { 223 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 224 * @out_len: Maximum out_data length 225 * Returns: Number of bytes written to out_data, -1 on failure 232 u8 *out_data, size_ 195 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 230 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_client.c | 214 * @out_data: Pointer to output buffer (encrypted TLS data) 215 * @out_len: Maximum out_data length 216 * Returns: Number of bytes written to out_data, -1 on failure 223 u8 *out_data, size_t out_len) 230 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len); 233 out_data, out_len, in_len, &rlen) < 0) { 249 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 250 * @out_len: Maximum out_data length 251 * Returns: Number of bytes written to out_data, -1 on failure 258 u8 *out_data, size_ 221 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 256 tlsv1_client_decrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 892 u8 **out_data, size_t *out_len) 911 *out_data = os_malloc(left); 912 if (*out_data) { 913 os_memcpy(*out_data, pos, left); 923 u8 **out_data, size_t *out_len) 983 if (out_data && 984 tls_process_application_data(conn, ct, buf, len, out_data, 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_record.c | 268 * @out_data: Buffer for output data (must be at least as long as in_data) 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 358 out_data, in_len) < 0) { 364 "data", out_data, plen); 386 os_memmove(out_data, out_data + rl->iv_size, 398 padlen = out_data[plen - 1]; 408 if (out_data[i] != padlen) { 412 out_data 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 193 * @out_data: Pointer to output buffer (encrypted TLS data) 194 * @out_len: Maximum out_data length 195 * Returns: Number of bytes written to out_data, -1 on failure 202 u8 *out_data, size_t out_len) 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 227 * @out_len: Maximum out_data length 228 * Returns: Number of bytes written to out_data, -1 on failure 235 u8 *out_data, size_t out_len) 244 out_pos = out_data; 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 892 u8 **out_data, size_t *out_len) 911 *out_data = os_malloc(left); 912 if (*out_data) { 913 os_memcpy(*out_data, pos, left); 923 u8 **out_data, size_t *out_len) 983 if (out_data && 984 tls_process_application_data(conn, ct, buf, len, out_data, 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_record.c | 268 * @out_data: Buffer for output data (must be at least as long as in_data) 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 358 out_data, in_len) < 0) { 364 "data", out_data, plen); 386 os_memmove(out_data, out_data + rl->iv_size, 398 padlen = out_data[plen - 1]; 408 if (out_data[i] != padlen) { 412 out_data 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 193 * @out_data: Pointer to output buffer (encrypted TLS data) 194 * @out_len: Maximum out_data length 195 * Returns: Number of bytes written to out_data, -1 on failure 202 u8 *out_data, size_t out_len) 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 227 * @out_len: Maximum out_data length 228 * Returns: Number of bytes written to out_data, -1 on failure 235 u8 *out_data, size_t out_len) 244 out_pos = out_data; 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 892 u8 **out_data, size_t *out_len) 911 *out_data = os_malloc(left); 912 if (*out_data) { 913 os_memcpy(*out_data, pos, left); 923 u8 **out_data, size_t *out_len) 983 if (out_data && 984 tls_process_application_data(conn, ct, buf, len, out_data, 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_record.c | 268 * @out_data: Buffer for output data (must be at least as long as in_data) 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 358 out_data, in_len) < 0) { 364 "data", out_data, plen); 386 os_memmove(out_data, out_data + rl->iv_size, 398 padlen = out_data[plen - 1]; 408 if (out_data[i] != padlen) { 412 out_data 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 193 * @out_data: Pointer to output buffer (encrypted TLS data) 194 * @out_len: Maximum out_data length 195 * Returns: Number of bytes written to out_data, -1 on failure 202 u8 *out_data, size_t out_len) 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 227 * @out_len: Maximum out_data length 228 * Returns: Number of bytes written to out_data, -1 on failure 235 u8 *out_data, size_t out_len) 244 out_pos = out_data; 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
/external/chromium/chrome/browser/autofill/ |
H A D | autofill_ie_toolbar_import_win.cc | 74 std::string out_data; local 75 if (DecryptData(data, &out_data)) { 77 if (!(out_data.size() & 1) && (out_data.size() > 2) && 78 !out_data[out_data.size() - 1] && !out_data[out_data.size() - 2]) { 80 reinterpret_cast<const wchar_t *>(out_data.c_str()));
|
/external/chromium/chrome/browser/history/ |
H A D | thumbnail_database_unittest.cc | 430 std::vector<unsigned char> out_data; local 433 icon_mappings[0].icon_id, &time, &out_data, &out_icon_url)); 454 icon_mappings[0].icon_id, &time, &out_data, &out_icon_url));
|
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
H A D | tls_none.c | 130 u8 *out_data, size_t out_len) 138 u8 *out_data, size_t out_len) 214 u8 *out_data, size_t out_len) 128 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 136 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 211 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument
|
H A D | tls_internal.c | 382 u8 *out_data, size_t out_len) 387 out_data, out_len); 393 out_data, out_len); 402 u8 *out_data, size_t out_len) 407 out_data, out_len); 413 out_data, out_len); 530 u8 *out_data, size_t out_len) 380 tls_connection_encrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 400 tls_connection_decrypt(void *tls_ctx, struct tls_connection *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 527 tls_connection_ia_send_phase_finished(void *tls_ctx, struct tls_connection *conn, int final, u8 *out_data, size_t out_len) argument
|
/external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/ |
H A D | eap_tls_common.c | 426 * @out_data: Buffer for returning a pointer to application data (if available) 432 struct wpabuf **out_data) 466 *out_data = wpabuf_alloc_ext_data(appl_data, appl_data_len); 467 if (*out_data == NULL) { 487 * @out_data: Buffer for returning the allocated output buffer 492 struct wpabuf **out_data) 530 *out_data = eap_msg_alloc(EAP_VENDOR_IETF, eap_type, 533 if (*out_data == NULL) 536 flags = wpabuf_put(*out_data, 1); 542 wpabuf_put_be32(*out_data, dat 430 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 490 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 584 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 911 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |