/external/chromium/chrome/browser/sync/util/ |
H A D | data_encryption.cc | 37 bool DecryptData(const vector<uint8>& in_data, string* out_data) { argument 49 out_data->assign(reinterpret_cast<const char*>(decrypted_data.pbData),
|
/external/liblzf/ |
H A D | lzf_d.c | 57 void *out_data, unsigned int out_len) 60 u8 *op = (u8 *)out_data; 135 if (ref < (u8 *)out_data) 183 return op - (u8 *)out_data; 56 lzf_decompress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len) argument
|
H A D | lzf_c.c | 100 void *out_data, unsigned int out_len 110 u8 *op = (u8 *)out_data; 289 return op - (u8 *)out_data; 99 lzf_compress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len , LZF_STATE htab ) argument
|
/external/webrtc/src/modules/audio_processing/ |
H A D | splitting_filter.cc | 27 WebRtc_Word16* out_data, 31 WebRtcSpl_SynthesisQMF(low_band, high_band, out_data, filt_state1, filt_state2); 25 SplittingFilterSynthesis(const WebRtc_Word16* low_band, const WebRtc_Word16* high_band, WebRtc_Word16* out_data, WebRtc_Word32* filt_state1, WebRtc_Word32* filt_state2) argument
|
/external/chromium_org/ui/base/x/ |
H A D | selection_requestor.cc | 41 scoped_refptr<base::RefCountedMemory>* out_data, 72 out_data, out_data_bytes, out_data_items, 39 PerformBlockingConvertSelection( Atom target, scoped_refptr<base::RefCountedMemory>* out_data, size_t* out_data_bytes, size_t* out_data_items, Atom* out_type) argument
|
/external/liblzf/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 204 out_data[oidx++] = (byte)(lit - 1); 207 out_data[oidx++] = in_data[iidx+lit]; 216 out_data[oidx++] = (byte)((off >> 8) + (len << 5)); 220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5)); 221 out_data[oidx++] = (byte)(len - 7); 224 out_data[oidx++] = (byte)off; 251 out_data[oidx++] = (byte)(MAX_LIT - 1); 254 out_data[oidx++] = in_data[iidx+lit]; 264 out_data[oid 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/external/liblzf/src/org/liblzf/ |
H A D | CLZF.java | 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 204 out_data[oidx++] = (byte)(lit - 1); 207 out_data[oidx++] = in_data[iidx+lit]; 216 out_data[oidx++] = (byte)((off >> 8) + (len << 5)); 220 out_data[oidx++] = (byte)((off >> 8) + ( 7 << 5)); 221 out_data[oidx++] = (byte)(len - 7); 224 out_data[oidx++] = (byte)off; 251 out_data[oidx++] = (byte)(MAX_LIT - 1); 254 out_data[oidx++] = in_data[iidx+lit]; 264 out_data[oid 277 lzf_decompress( byte[] in_data, int in_len, byte[] out_data, int out_len) argument [all...] |
/external/webrtc/src/common_audio/signal_processing/ |
H A D | splitting_filter.c | 42 // - out_data : Output data sequence (Q10), length equal to 47 WebRtc_Word32* out_data, const WebRtc_UWord16* filter_coefficients, 59 // the out_data state, out_data[-1]. This is repeated for each cascade. 61 // |out_data|. The second will the take the |out_data| as input and make an 64 // filter) and store the output in |out_data|. 68 // First all-pass cascade; filter from in_data to out_data. 77 out_data[0] = WEBRTC_SPL_SCALEDIFF32(filter_coefficients[0], diff, filter_state[0]); 82 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[k], out_data[ 46 WebRtcSpl_AllPassQMF(WebRtc_Word32* in_data, const WebRtc_Word16 data_length, WebRtc_Word32* out_data, const WebRtc_UWord16* filter_coefficients, WebRtc_Word32* filter_state) argument 158 WebRtcSpl_SynthesisQMF(const WebRtc_Word16* low_band, const WebRtc_Word16* high_band, WebRtc_Word16* out_data, WebRtc_Word32* filter_state1, WebRtc_Word32* filter_state2) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_client_read.c | 892 u8 **out_data, size_t *out_len) 911 *out_data = os_malloc(left); 912 if (*out_data) { 913 os_memcpy(*out_data, pos, left); 923 u8 **out_data, size_t *out_len) 983 if (out_data && 984 tls_process_application_data(conn, ct, buf, len, out_data, 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_record.c | 268 * @out_data: Buffer for output data (must be at least as long as in_data) 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 358 out_data, in_len) < 0) { 364 "data", out_data, plen); 386 os_memmove(out_data, out_data + rl->iv_size, 398 padlen = out_data[plen - 1]; 408 if (out_data[i] != padlen) { 412 out_data 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 193 * @out_data: Pointer to output buffer (encrypted TLS data) 194 * @out_len: Maximum out_data length 195 * Returns: Number of bytes written to out_data, -1 on failure 202 u8 *out_data, size_t out_len) 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 227 * @out_len: Maximum out_data length 228 * Returns: Number of bytes written to out_data, -1 on failure 235 u8 *out_data, size_t out_len) 244 out_pos = out_data; 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
H A D | tlsv1_client.c | 266 * @out_data: Pointer to output buffer (encrypted TLS data) 267 * @out_len: Maximum out_data length 268 * Returns: Number of bytes written to out_data, -1 on failure 275 u8 *out_data, size_t out_len) 283 out_data, out_len, in_data, in_len, &rlen) < 0) { 273 tlsv1_client_encrypt(struct tlsv1_client *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument
|
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_client_read.c | 892 u8 **out_data, size_t *out_len) 911 *out_data = os_malloc(left); 912 if (*out_data) { 913 os_memcpy(*out_data, pos, left); 923 u8 **out_data, size_t *out_len) 983 if (out_data && 984 tls_process_application_data(conn, ct, buf, len, out_data, 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_record.c | 268 * @out_data: Buffer for output data (must be at least as long as in_data) 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 358 out_data, in_len) < 0) { 364 "data", out_data, plen); 386 os_memmove(out_data, out_data + rl->iv_size, 398 padlen = out_data[plen - 1]; 408 if (out_data[i] != padlen) { 412 out_data 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 193 * @out_data: Pointer to output buffer (encrypted TLS data) 194 * @out_len: Maximum out_data length 195 * Returns: Number of bytes written to out_data, -1 on failure 202 u8 *out_data, size_t out_len) 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 227 * @out_len: Maximum out_data length 228 * Returns: Number of bytes written to out_data, -1 on failure 235 u8 *out_data, size_t out_len) 244 out_pos = out_data; 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_client_read.c | 892 u8 **out_data, size_t *out_len) 911 *out_data = os_malloc(left); 912 if (*out_data) { 913 os_memcpy(*out_data, pos, left); 923 u8 **out_data, size_t *out_len) 983 if (out_data && 984 tls_process_application_data(conn, ct, buf, len, out_data, 890 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument 921 tlsv1_client_process_handshake(struct tlsv1_client *conn, u8 ct, const u8 *buf, size_t *len, u8 **out_data, size_t *out_len) argument
|
H A D | tlsv1_record.c | 268 * @out_data: Buffer for output data (must be at least as long as in_data) 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 358 out_data, in_len) < 0) { 364 "data", out_data, plen); 386 os_memmove(out_data, out_data + rl->iv_size, 398 padlen = out_data[plen - 1]; 408 if (out_data[i] != padlen) { 412 out_data 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_server.c | 193 * @out_data: Pointer to output buffer (encrypted TLS data) 194 * @out_len: Maximum out_data length 195 * Returns: Number of bytes written to out_data, -1 on failure 202 u8 *out_data, size_t out_len) 210 out_data, out_len, in_data, in_len, &rlen) < 0) { 226 * @out_data: Pointer to output buffer (decrypted data from TLS tunnel) 227 * @out_len: Maximum out_data length 228 * Returns: Number of bytes written to out_data, -1 on failure 235 u8 *out_data, size_t out_len) 244 out_pos = out_data; 200 tlsv1_server_encrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument 233 tlsv1_server_decrypt(struct tlsv1_server *conn, const u8 *in_data, size_t in_len, u8 *out_data, size_t out_len) argument [all...] |
/external/chromium/chrome/browser/autofill/ |
H A D | autofill_ie_toolbar_import_win.cc | 74 std::string out_data; local 75 if (DecryptData(data, &out_data)) { 77 if (!(out_data.size() & 1) && (out_data.size() > 2) && 78 !out_data[out_data.size() - 1] && !out_data[out_data.size() - 2]) { 80 reinterpret_cast<const wchar_t *>(out_data.c_str()));
|
/external/chromium/chrome/browser/history/ |
H A D | thumbnail_database_unittest.cc | 430 std::vector<unsigned char> out_data; local 433 icon_mappings[0].icon_id, &time, &out_data, &out_icon_url)); 454 icon_mappings[0].icon_id, &time, &out_data, &out_icon_url));
|
/external/chromium_org/cc/output/ |
H A D | delegating_renderer.cc | 141 DelegatedFrameData& out_data = *frame_for_swap_buffers_.delegated_frame_data; local 143 out_data.render_pass_list.swap(*render_passes_in_draw_order); 149 for (size_t i = 0; i < out_data.render_pass_list.size(); ++i) { 150 RenderPass* render_pass = out_data.render_pass_list.at(i); 154 resource_provider_->PrepareSendToParent(resources, &out_data.resource_list);
|
/external/chromium_org/components/autofill/core/browser/ |
H A D | autofill_ie_toolbar_import_win.cc | 88 std::string out_data; local 89 if (Encryptor::DecryptString(data, &out_data)) { 91 if (!(out_data.size() & 1) && (out_data.size() > 2) && 92 !out_data[out_data.size() - 1] && !out_data[out_data.size() - 2]) { 94 reinterpret_cast<const wchar_t *>(out_data.c_str()));
|
/external/webrtc/src/modules/audio_coding/codecs/isac/main/source/ |
H A D | pitch_filter.c | 130 * out_data : pointer to a buffer where the filtered signal is written to. 136 double* out_data, 203 out_data[parameters->index] = in_data[parameters->index] - sum; 205 out_data[parameters->index]; 255 * out_data : pointer to a buffer where the filtered signal is written to. 262 double* out_data, 333 FilterSegment(in_data, &filter_parameters, out_data, out_dg); 354 FilterSegment(in_data, &filter_parameters, out_data, out_dg); 358 void WebRtcIsac_PitchfilterPre(double* in_data, double* out_data, argument 361 FilterFrame(in_data, pf_state, lags, gains, kPitchFilterPre, out_data, NUL 135 FilterSegment(const double* in_data, PitchFilterParam* parameters, double* out_data, double out_dg[][PITCH_FRAME_LEN + QLOOKAHEAD]) argument 260 FilterFrame(const double* in_data, PitchFiltstr* filter_state, double* lags, double* gains, PitchFilterOperation mode, double* out_data, double out_dg[][PITCH_FRAME_LEN + QLOOKAHEAD]) argument 364 WebRtcIsac_PitchfilterPre_la(double* in_data, double* out_data, PitchFiltstr* pf_state, double* lags, double* gains) argument 371 WebRtcIsac_PitchfilterPre_gains( double* in_data, double* out_data, double out_dg[][PITCH_FRAME_LEN + QLOOKAHEAD], PitchFiltstr *pf_state, double* lags, double* gains) argument 379 WebRtcIsac_PitchfilterPost(double* in_data, double* out_data, PitchFiltstr* pf_state, double* lags, double* gains) argument [all...] |
/external/wpa_supplicant_8/hostapd/src/eap_peer/ |
H A D | eap_tls_common.c | 503 * @out_data: Buffer for returning a pointer to application data (if available) 509 struct wpabuf **out_data) 540 *out_data = appl_data; 557 * @out_data: Buffer for returning the allocated output buffer 562 struct wpabuf **out_data) 603 *out_data = eap_tls_msg_alloc(eap_type, 1 + length_included * 4 + len, 605 if (*out_data == NULL) 608 flags = wpabuf_put(*out_data, 1); 614 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); 617 wpabuf_put_data(*out_data, 507 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 560 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 658 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 972 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |
/external/wpa_supplicant_8/src/eap_peer/ |
H A D | eap_tls_common.c | 503 * @out_data: Buffer for returning a pointer to application data (if available) 509 struct wpabuf **out_data) 540 *out_data = appl_data; 557 * @out_data: Buffer for returning the allocated output buffer 562 struct wpabuf **out_data) 603 *out_data = eap_tls_msg_alloc(eap_type, 1 + length_included * 4 + len, 605 if (*out_data == NULL) 608 flags = wpabuf_put(*out_data, 1); 614 wpabuf_put_be32(*out_data, wpabuf_len(data->tls_out)); 617 wpabuf_put_data(*out_data, 507 eap_tls_process_input(struct eap_sm *sm, struct eap_ssl_data *data, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 560 eap_tls_process_output(struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, int ret, struct wpabuf **out_data) argument 658 eap_peer_tls_process_helper(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const u8 *in_data, size_t in_len, struct wpabuf **out_data) argument 972 eap_peer_tls_encrypt(struct eap_sm *sm, struct eap_ssl_data *data, EapType eap_type, int peap_version, u8 id, const struct wpabuf *in_data, struct wpabuf **out_data) argument [all...] |