Searched defs:in (Results 151 - 175 of 1566) sorted by path

1234567891011>>

/external/chromium_org/net/android/
H A Dkeystore_openssl.cc3 // found in the LICENSE file.
29 // only the signing operations used in this use case are implemented here.
48 // signing operation using the other fields in the RSA structure (which
57 // be stored in the RSA instance, or made accessible when the custom RSA
58 // methods are called. This is done by storing it in a |KeyExData| structure
72 // KeyExData contains the data that is contained in the EX_DATA of the RSA, DSA
77 // legacy_rsa, if not NULL, points to an RSA* in the system's OpenSSL (which
81 // modulus (in bytes) for RSA, or the group order size for (EC)DSA. This
152 // given in |v|, i.e. the length of |v| less any leading zero bytes.
176 const uint8_t* in,
172 RsaMethodEncrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
184 RsaMethodSignRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
265 RsaMethodDecrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
277 RsaMethodVerifyRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
[all...]
/external/chromium_org/net/base/
H A Ddns_util_unittest.cc3 // found in the LICENSE file.
14 // NUL in the result.
15 static std::string IncludeNUL(const char* in) { argument
16 return std::string(in, strlen(in) + 1);
40 // 253 characters in the name: still valid
44 // 254 characters in the name: invalid
H A Descape_unittest.cc3 // found in the LICENSE file.
81 // Test all the values in we're supposed to be escaping.
88 std::string in; local
89 in.push_back(i);
90 std::string out = EscapeQueryParamValue(in, true);
96 } else if (no_escape.find(in) == std::string::npos) {
101 // No change for things in the no_escape list.
102 EXPECT_EQ(out, in);
200 input.push_back(0); // Also have a NULL in the input.
293 input.push_back(0); // Also have a NULL in th
[all...]
/external/chromium_org/net/cert/
H A Dasn1_util.cc3 // found in the LICENSE file.
11 bool ParseElement(base::StringPiece* in, argument
15 const uint8* data = reinterpret_cast<const uint8*>(in->data());
21 if (in->empty() && (tag_value & kOptional)) {
29 if (in->size() < 2)
55 if (in->size() < 2 + num_bytes)
67 // the length should have been encoded in short form. This distinguishes
76 if (in->size() < len)
79 *out = base::StringPiece(in->data(), len);
80 in
84 GetElement(base::StringPiece* in, unsigned tag_value, base::StringPiece* out) argument
[all...]
H A Dcrl_set_storage.cc3 // found in the LICENSE file.
18 // Decompress zlib decompressed |in| into |out|. |out_len| is the number of
21 static bool DecompressZlib(uint8* out, int out_len, base::StringPiece in) { argument
25 z.next_in = reinterpret_cast<Bytef*>(const_cast<char*>(in.data()));
26 z.avail_in = in.size();
102 // A delta CRLSet applies to a specific CRL set as given in the
104 // in turn with a zlib compressed array of options: either the CRL is the same,
106 // of an update, the serials in the CRL are considered in the same fashion
208 // accept. This bounds the number of CRLs in th
[all...]
H A Dct_serialization.cc3 // found in the LICENSE file.
16 // Note: length is always specified in bytes.
45 // Reads a TLS-encoded variable length unsigned integer from |in|.
46 // The integer is expected to be in big-endian order, which is used by TLS.
47 // The bytes read from |in| are discarded (i.e. |in|'s prefix removed)
48 // |length| indicates the size (in bytes) of the integer. On success, returns
49 // true and stores the result in |*out|.
51 bool ReadUint(size_t length, base::StringPiece* in, T* out) { argument
52 if (in
69 ReadLength(size_t prefix_length, base::StringPiece* in, size_t* out) argument
79 ReadFixedBytes(size_t length, base::StringPiece* in, base::StringPiece* out) argument
93 ReadVariableBytes(size_t prefix_length, base::StringPiece* in, base::StringPiece* out) argument
107 ReadList(size_t max_list_length, size_t max_item_length, base::StringPiece* in, std::vector<base::StringPiece>* out) argument
138 ConvertHashAlgorithm(unsigned in, DigitallySigned::HashAlgorithm* out) argument
159 ConvertSignatureAlgorithm( unsigned in, DigitallySigned::SignatureAlgorithm* out) argument
[all...]
/external/chromium_org/net/http/
H A Dmd4.cc4 // WARNING: MD4 is cryptographically weak. Do not use MD4 except in NTLM
12 * 1.1 (the "License"); you may not use this file except in compliance with
33 * in which case the provisions of the GPL or the LGPL are applicable instead
77 static void w2b(Uint8 *out, const Uint32 *in, Uint32 len) argument
82 wp = in;
95 static void b2w(Uint32 *out, const Uint8 *in, Uint32 len) argument
100 bp = in;
101 bpend = in + len;
112 /* update state: data is 64 bytes in length */
159 /* compute number of complete 64-byte segments contained in inpu
[all...]
/external/chromium_org/net/quic/crypto/
H A Dcert_compressor.cc3 // found in the LICENSE file.
21 // in order to help zlib. This was generated via a fairly dumb algorithm from
150 // CertEntry represents a certificate in compressed form. Each entry is one of
151 // the three types enumerated in |Type|.
155 // Type 0 is reserved to mean "end of list" in the wire format.
157 // COMPRESSED means that the certificate is included in the trailing zlib
161 // be replaced by its 64-bit hash (in |hash|).
163 // COMMON means that the certificate is in a common certificate set known
177 // 64-bit, FNV-1a hashes in |client_cached_cert_hashes|.
233 // CertEntriesSize returns the size, in byte
341 StringPiece in = *in_out; local
559 DecompressChain(StringPiece in, const vector<string>& cached_certs, const CommonCertSets* common_sets, vector<string>* out_certs) argument
[all...]
H A Dcrypto_framer.cc3 // found in the LICENSE file.
57 CryptoHandshakeMessage* CryptoFramer::ParseMessage(StringPiece in) { argument
62 if (!framer.ProcessInput(in) || visitor.error() ||
/external/chromium_org/net/quic/
H A Dquic_crypto_client_stream.cc3 // found in the LICENSE file.
177 const CryptoHandshakeMessage* in) {
204 // Send the client hello in plaintext.
228 DLOG(DFATAL) << "Client hello won't fit in a single packet.";
251 // chance to send us another in the future.
290 if (in->tag() != kREJ) {
296 *in, session()->connection()->clock()->WallNow(), cached,
371 if (in->tag() == kREJ) {
384 if (in->tag() != kSHLO) {
399 *in, sessio
176 DoHandshakeLoop( const CryptoHandshakeMessage* in) argument
[all...]
/external/chromium_org/net/socket/
H A Dnss_ssl_util.cc3 // found in the LICENSE file.
36 // CiphersRemove takes a zero-terminated array of cipher suite ids in
37 // |to_remove| and sets every instance of them in |ciphers| to zero. It returns
39 // there are no duplicates in |ciphers| nor in |to_remove|.
59 // CiphersCompact takes an array of cipher suite ids in |ciphers|, where some
72 // CiphersCopy copies the zero-terminated array |in| to |out|. It returns the
74 size_t CiphersCopy(const uint16* in, uint16* out) { argument
76 if (in[i] == 0)
78 out[i] = in[
[all...]
H A Dssl_client_socket_openssl.cc3 // found in the LICENSE file.
222 const unsigned char* in,
225 return socket->SelectNextProtoCallback(out, outlen, in, inlen);
240 // and the other elements are in the order given by the server.
248 // Resets the PeerCertificateChain to the set of certificates in|chain|,
448 // Set SSL to client mode. Handshake happens in the loop below.
803 // This will almost certainly result in the socket failing to complete the
835 // Since Run may result in Read being called, clear |user_read_callback_|
850 // Since Run may result in Write being called, clear |user_write_callback_|
893 // so that we won't try to resume the non-client-authenticated session in
220 SelectNextProtoCallback(SSL* ssl, unsigned char** out, unsigned char* outlen, const unsigned char* in, unsigned int inlen, void* arg) argument
[all...]
/external/chromium_org/net/spdy/
H A Dhpack_decoder_test.cc3 // found in the LICENSE file.
35 bool DecodeNextName(HpackInputStream* in, StringPiece* out) { argument
36 return decoder_->DecodeNextName(in, out);
107 // Strings under threshold are concatenated in the buffer.
H A Dhpack_huffman_table.cc3 // found in the LICENSE file.
21 // How many bits to index in the root decode table.
23 // Maximum number of bits to index in successive decode tables.
92 // Without this, some inputs will not be encodable in a whole number
118 // child tables. To achieve this, we iterate in order of descending code
218 void HpackHuffmanTable::EncodeString(StringPiece in, argument
221 for (size_t i = 0; i != in.size(); i++) {
222 uint16 symbol_id = static_cast<uint8>(in[i]);
251 size_t HpackHuffmanTable::EncodedSize(StringPiece in) const {
253 for (size_t i = 0; i != in
265 DecodeString(HpackInputStream* in, size_t out_capacity, string* out) const argument
[all...]
/external/chromium_org/net/ssl/
H A Dopenssl_platform_key_mac.cc3 // found in the LICENSE file.
63 // Looks up the private key for |certificate| in KeyChain and returns
92 // KeyExData contains the data that is contained in the EX_DATA of the
163 // MakeCSSMSignature uses the key information in |ex_data| to sign the
164 // |in_len| bytes pointed by |in|. It writes up to |max_out| bytes
171 const uint8_t* in,
213 hash_data.Data = const_cast<uint8*>(in);
245 const uint8_t* in,
257 const uint8_t* in,
274 return MakeCSSMSignature(ex_data, out_len, out, max_out, in, in_le
167 MakeCSSMSignature(const KeyExData* ex_data, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len) argument
241 RsaMethodEncrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
253 RsaMethodSignRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
277 RsaMethodDecrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
289 RsaMethodVerifyRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
[all...]
/external/chromium_org/net/third_party/nss/ssl/
H A Dssl3con.c102 const unsigned char *in, int inlen,
110 /* This list of SSL3 cipher suites is sorted in descending order of
113 * in this table must match the ordering in SSL_ImplementedCiphers (sslenum.c)
207 /* Verify that SSL_ImplementedCiphers and cipherSuites are in consistent order.
225 /* This list of SSL3 compression methods is sorted in descending order of
265 * our TLS 1.2 CertificateRequest message, in wire format. See
281 /* This global item is used only in servers. It is is initialized by
282 ** SSL_ConfigSecureServer(), and is used in ssl3_SendCertificateRequest().
555 * in ECCWrappedKeyInf
1515 ssl3_DeflateCompress(void *void_context, unsigned char *out, int *out_len, int maxout, const unsigned char *in, int inlen) argument
1544 ssl3_DeflateDecompress(void *void_context, unsigned char *out, int *out_len, int maxout, const unsigned char *in, int inlen) argument
1935 ssl3_AESGCM(ssl3KeyMaterial *keys, PRBool doDecrypt, unsigned char *out, int *outlen, int maxout, const unsigned char *in, int inlen, const unsigned char *additionalData, int additionalDataLen) argument
1998 ssl3_AESGCMBypass(ssl3KeyMaterial *keys, PRBool doDecrypt, unsigned char *out, int *outlen, int maxout, const unsigned char *in, int inlen, const unsigned char *additionalData, int additionalDataLen) argument
2070 ssl3_ChaCha20Poly1305( ssl3KeyMaterial *keys, PRBool doDecrypt, unsigned char *out, int *outlen, int maxout, const unsigned char *in, int inlen, const unsigned char *additionalData, int additionalDataLen) argument
3093 ssl3_SendApplicationData(sslSocket *ss, const unsigned char *in, PRInt32 len, PRInt32 flags) argument
5966 hexEncode(char *out, const unsigned char *in, unsigned int length) argument
[all...]
H A Dsslcon.c57 PRUint8 nkd; /* size of readKey and writeKey in bytes. */
61 PRUint8 keyLen; /* cipher symkey size in bytes. */
89 ** Put a string tag in the library so that we can examine an executable
118 * lsb corresponds to first cipher suite in allCipherSuites[].
169 * and then again in ssl2_BeginClientHandshake().
193 /* fill in cipher specs for SSL2 cipher suites */
241 /* ssl3_config_match_init was called in ssl2_ConstructCipherSpecs(). */
324 * Called from SSL_CipherPrefSetDefault in sslsock.c
843 ** Send some data in the clear.
849 ssl2_SendClear(sslSocket *ss, const PRUint8 *in, PRInt3 argument
920 ssl2_SendStream(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument
1021 ssl2_SendBlock(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument
[all...]
/external/chromium_org/printing/backend/
H A Dwin_helper.cc3 // found in the LICENSE file.
255 // that call CoInitializeEx with COINIT_APARTMENTTHREADED in the context of
257 // CoUninitialize anyway. This results in the apartment being torn down too
258 // early and the msxml DLL being unloaded which in turn causes code in
474 DEVMODE* in) {
481 DWORD flags = (in ? (DM_IN_BUFFER) : 0) | DM_OUT_BUFFER;
483 NULL, printer, const_cast<wchar_t*>(L""), out.get(), in, flags) !=
494 DEVMODE* in,
508 DWORD flags = (in
473 CreateDevMode(HANDLE printer, DEVMODE* in) argument
491 PromptDevMode( HANDLE printer, const base::string16& printer_name, DEVMODE* in, HWND window, bool* canceled) argument
[all...]
/external/chromium_org/remoting/base/
H A Dcompound_buffer_unittest.cc3 // found in the LICENSE file.
83 // Iterate over chunks of data with sizes specified in |sizes| in the
114 const void* in; local
118 if (!input->Next(&in, &in_size)) {
124 memcpy(out, in, out_size);
131 memcpy(out, in, in_size);
146 // Construct and prepare data in the |buffer|.
154 // Determine how many segments to split kTestData. We split the data in
H A Dutil.cc3 // found in the LICENSE file.
23 // Do not write LOG messages in this routine since it is called from within
209 // Copy pixels in the rectangle line by line.
218 std::string ReplaceLfByCrLf(const std::string& in) { argument
220 out.resize(2 * in.size());
223 const char* in_p_begin = &in[0];
224 const char* in_p_end = &in[in.size()];
236 std::string ReplaceCrLfByLf(const std::string& in) { argument
238 out.resize(in
[all...]
/external/chromium_org/remoting/codec/
H A Dvideo_decoder_verbatim.cc3 // found in the LICENSE file.
32 const char* in = packet.data().data(); local
52 if (in + rect_row_size > packet.data().data() + packet.data().size()) {
56 memcpy(out, in, rect_row_size);
57 in += rect_row_size;
62 if (in != packet.data().data() + packet.data().size()) {
H A Dvideo_encoder_verbatim.cc3 // found in the LICENSE file.
53 const uint8_t* in = frame.data() + rect.top() * in_stride + local
56 memcpy(out, in, row_size);
58 in += in_stride;
/external/chromium_org/skia/ext/
H A Drecursive_gaussian_convolution.cc3 // found in the LICENSE file.
18 // All of the filter scaling factors are in fixed point with kShiftBits bits of
86 const unsigned char* in = source_data; local
90 ++r, in += source_row_stride, out += output_row_stride) {
94 w[0] = w[1] = w[2] = in[0];
99 in[0], in[0], in[source_pixel_stride], w, 3, b);
104 w[n] = ForwardFilter<order>(in[byte_index - source_pixel_stride],
105 in[byte_inde
[all...]
/external/chromium_org/sync/engine/
H A Dmodel_type_sync_worker_impl.cc3 // found in the LICENSE file.
327 // items have been successfully committed so it can save that information in
343 // We'll get it in the first update response.
380 // Always include enough specifics to identify the type. Do this even in
396 // Handle a change in encryption key.
440 const sync_pb::EntitySpecifics& in,
442 DCHECK(in.has_encrypted());
443 DCHECK(cryptographer->CanDecrypt(in.encrypted()));
446 plaintext = cryptographer->DecryptToString(in.encrypted());
438 DecryptSpecifics( Cryptographer* cryptographer, const sync_pb::EntitySpecifics& in, sync_pb::EntitySpecifics* out) argument
/external/chromium_org/sync/syncable/
H A Dmodel_type.cc3 // found in the LICENSE file.
205 FullModelTypeSet ToFullModelTypeSet(ModelTypeSet in) { argument
207 for (ModelTypeSet::Iterator i = in.First(); i.Good(); i.Inc()) {
213 // Note: keep this consistent with GetModelType in entry.cc!
235 NOTREACHED() << "Unknown datatype in sync proto.";
350 // these in the same order as their definition in the ModelType enum.
461 // This is used in serialization routines as well as for displaying debug
759 // TODO(zea): remove all hardcoded tags in model associators and have them use
762 // in test
[all...]

Completed in 654 milliseconds

1234567891011>>