/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | e_null.c | 70 const uint8_t *in, size_t in_len) { 72 memcpy(out, in, in_len); 69 null_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument
|
H A D | aead.c | 53 * and |in_len| and 1 otherwise. 55 * When processing, there's only an issue if |out| points within in[:in_len] 60 static int check_alias(const uint8_t *in, size_t in_len, const uint8_t *out) { argument 63 } else if (in + in_len <= out) { 71 size_t nonce_len, const uint8_t *in, size_t in_len, 73 size_t possible_out_len = in_len + ctx->aead->overhead; 75 if (possible_out_len < in_len /* overflow */) { 80 if (!check_alias(in, in_len, out)) { 86 in_len, ad, ad_len)) { 100 size_t nonce_len, const uint8_t *in, size_t in_len, 69 EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 98 EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
H A D | e_des.c | 83 size_t in_len) { 86 while (in_len >= EVP_MAXCHUNK) { 89 in_len -= EVP_MAXCHUNK; 94 if (in_len) { 95 DES_ncbc_encrypt(in, out, (long)in_len, &dat->ks.ks, 132 const uint8_t *in, size_t in_len) { 135 while (in_len >= EVP_MAXCHUNK) { 138 in_len -= EVP_MAXCHUNK; 143 if (in_len) { 144 DES_ede3_cbc_encrypt(in, out, in_len, 82 des_cbc_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument 131 des_ede3_cbc_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument [all...] |
H A D | e_chacha20poly1305.c | 93 const uint8_t *in, size_t in_len, 98 const uint64_t in_len_64 = in_len; 112 if (in_len + c20_ctx->tag_len < in_len) { 117 if (max_out_len < in_len + c20_ctx->tag_len) { 134 CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, nonce, 1); 135 poly1305_update_with_length(&poly1305, out, in_len); 140 memcpy(out + in_len, tag, c20_ctx->tag_len); 141 *out_len = in_len + c20_ctx->tag_len; 145 CRYPTO_poly1305_finish(&poly1305, out + in_len); 90 aead_chacha20_poly1305_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 150 aead_chacha20_poly1305_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
H A D | cipher.c | 256 const uint8_t *in, int in_len) { 260 i = ctx->cipher->cipher(ctx, out, in, in_len); 269 if (in_len <= 0) { 271 return in_len == 0; 274 if (ctx->buf_len == 0 && (in_len & ctx->block_mask) == 0) { 275 if (ctx->cipher->cipher(ctx, out, in, in_len)) { 276 *out_len = in_len; 288 if (i + in_len < bl) { 289 memcpy(&ctx->buf[i], in, in_len); 290 ctx->buf_len += in_len; 255 EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument 369 EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument 487 EVP_Cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument 492 EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument [all...] |
H A D | e_rc4.c | 80 size_t in_len) { 83 RC4(rc4key, in_len, in, out); 173 const uint8_t *in, size_t in_len, 186 if (in_len + rc4_ctx->tag_len < in_len) { 196 if (max_out_len < in_len + rc4_ctx->tag_len) { 221 if (in_len > md5_off && (blocks = (in_len - md5_off) / MD5_CBLOCK) && 244 MD5_Update(&md, in + md5_off, in_len - md5_off); 250 MD5_Final(out + in_len, 79 rc4_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument 170 aead_rc4_md5_tls_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 264 aead_rc4_md5_tls_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
/external/liblzf/ |
H A D | lzf_d.c | 56 lzf_decompress (const void *const in_data, unsigned int in_len, argument 61 u8 const *const in_end = ip + in_len;
|
H A D | lzf_c.c | 99 lzf_compress (const void *const in_data, unsigned int in_len, argument 111 const u8 *in_end = ip + in_len; 130 if (!in_len || !out_len)
|
/external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/tests/ |
H A D | uncstring_test.c | 39 size_t in_len; member in struct:Test_Entry 88 strncpy(str, test->input, test->in_len); 89 len = test->in_len; 95 test->input, (unsigned long)test->in_len, 103 test->input, (unsigned long)test->in_len, test->result, str); 111 test->input, (unsigned long)test->in_len, wstr); 117 test->input, (unsigned long)test->in_len, test->warn); 123 test->input, (unsigned long)test->in_len, test->warn, wstr);
|
/external/chromium_org/third_party/boringssl/src/crypto/chacha/ |
H A D | chacha_generic.c | 52 void CRYPTO_chacha_20_neon(uint8_t *out, const uint8_t *in, size_t in_len, 83 void CRYPTO_chacha_20(uint8_t *out, const uint8_t *in, size_t in_len, argument 93 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter); 118 while (in_len > 0) { 120 if (in_len < todo) { 121 todo = in_len; 131 in_len -= todo;
|
/external/chromium_org/third_party/webrtc/base/ |
H A D | messagedigest.cc | 69 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len, argument 71 digest->Update(input, in_len); 75 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, argument 79 ComputeDigest(digest.get(), input, in_len, output, out_len) : 109 const void* input, size_t in_len, 136 digest->Update(input, in_len); 145 const void* input, size_t in_len, 152 input, in_len, output, out_len); 107 ComputeHmac(MessageDigest* digest, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument 144 ComputeHmac(const std::string& alg, const void* key, size_t key_len, const void* input, size_t in_len, void* output, size_t out_len) argument
|
H A D | transformadapter.cc | 64 size_t in_len = len_; local 66 StreamResult result = transform_->Transform(buffer_, &in_len, 84 len_ -= in_len; 86 memmove(buffer_, buffer_ + in_len, len_); 114 size_t in_len = data_len; local 116 StreamResult result = transform_->Transform(data, &in_len, 132 bytes_written = in_len;
|
/external/liblzf/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 165 //byte *in_end = ip + in_len; 175 if (iidx < in_len - 2) 183 && iidx + 4 < in_len 192 UInt32 maxlen = (UInt32)in_len - iidx - len; 239 else if (iidx == in_len) 277 public int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument 331 while (iidx < in_len);
|
/external/liblzf/src/org/liblzf/ |
H A D | CLZF.java | 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 165 //byte *in_end = ip + in_len; 175 if (iidx < in_len - 2) 183 && iidx + 4 < in_len 192 int maxlen = in_len - iidx - len; 239 else if (iidx == in_len) 277 public static int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument 331 while (iidx < in_len);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 267 * @in_len: Length of the received data 279 const u8 *in_data, size_t in_len, 289 if (in_len < TLS_RECORD_HEADER_LEN) { 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " 292 (unsigned long) in_len); 294 in_data, in_len); 324 in_len -= TLS_RECORD_HEADER_LEN; 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 47 left = *in_len; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 232 left = *in_len; 256 in_len); 259 in_len); 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 658 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 722 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 779 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 850 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 983 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
H A D | tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 27 size_t *in_len); 50 const u8 *in_data, size_t *in_len) 68 left = *in_len; 276 *in_len = end - in_data; 292 const u8 *in_data, size_t *in_len) 309 left = *in_len; 341 in_len); 476 *in_len = end - in_data; 694 const u8 *in_data, size_t *in_len) 49 tls_process_client_hello(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 291 tls_process_certificate(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 693 tls_process_client_key_exchange(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 770 tls_process_certificate_verify(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 937 tls_process_change_cipher_spec(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 987 tls_process_client_finished(struct tlsv1_server *conn, u8 ct, const u8 *in_data, size_t *in_len) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 267 * @in_len: Length of the received data 279 const u8 *in_data, size_t in_len, 289 if (in_len < TLS_RECORD_HEADER_LEN) { 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " 292 (unsigned long) in_len); 294 in_data, in_len); 324 in_len -= TLS_RECORD_HEADER_LEN; 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
H A D | tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 47 left = *in_len; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 232 left = *in_len; 256 in_len); 259 in_len); 30 tls_process_server_hello(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 214 tls_process_certificate(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 567 tls_process_server_key_exchange(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 658 tls_process_certificate_request(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 722 tls_process_server_hello_done(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 779 tls_process_server_change_cipher_spec(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 850 tls_process_server_finished(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len) argument 983 tls_process_application_data(struct tlsv1_client *conn, u8 ct, const u8 *in_data, size_t *in_len, u8 **out_data, size_t *out_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | tlsv1_record.c | 267 * @in_len: Length of the received data 279 const u8 *in_data, size_t in_len, 289 if (in_len < TLS_RECORD_HEADER_LEN) { 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " 292 (unsigned long) in_len); 294 in_data, in_len); 324 in_len -= TLS_RECORD_HEADER_LEN; 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/base64/ |
H A D | base64.c | 120 const uint8_t *in, size_t in_len) { 125 if (in_len == 0) { 131 if (ctx->num + in_len < ctx->length) { 132 memcpy(&ctx->enc_data[ctx->num], in, in_len); 133 ctx->num += in_len; 140 in_len -= i; 148 while (in_len >= ctx->length) { 151 in_len -= ctx->length; 157 if (in_len != 0) { 158 memcpy(&ctx->enc_data[0], in, in_len); 119 EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, size_t in_len) argument 216 EVP_DecodeBase64(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *in, size_t in_len) argument 271 EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, size_t in_len) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/bio/ |
H A D | connect.c | 347 static int conn_write(BIO *bio, const char *in, int in_len) { argument 360 ret = send(bio->num, in, in_len, 0);
|
/external/chromium_org/third_party/boringssl/src/crypto/poly1305/ |
H A D | poly1305.c | 55 size_t in_len); 211 size_t in_len) { 217 CRYPTO_poly1305_update_neon(statep, in, in_len); 224 if (todo > in_len) 225 todo = in_len; 229 in_len -= todo; 238 if (in_len >= 16) { 239 size_t todo = in_len & ~0xf; 242 in_len &= 0xf; 245 if (in_len) { 210 CRYPTO_poly1305_update(poly1305_state *statep, const uint8_t *in, size_t in_len) argument [all...] |
H A D | poly1305_arm.c | 199 size_t in_len) { 209 if (todo > in_len) 210 todo = in_len; 214 in_len -= todo; 217 if (st->buf_used == sizeof(st->buf) && in_len) { 226 while (in_len > 32) { 228 if (in_len < tlen) 229 tlen = in_len; 231 in_len -= tlen; 235 if (in_len) { 198 CRYPTO_poly1305_update_neon(poly1305_state *state, const uint8_t *in, size_t in_len) argument [all...] |
/external/sqlite/android/ |
H A D | PhoneNumberUtils.cpp | 441 int in_len = strlen(in); local 444 for (int i = in_len; --i >= 0;) {
|