/external/chromium_org/net/android/ |
H A D | keystore_openssl.cc | 3 // found in the LICENSE file. 29 // only the signing operations used in this use case are implemented here. 48 // signing operation using the other fields in the RSA structure (which 57 // be stored in the RSA instance, or made accessible when the custom RSA 58 // methods are called. This is done by storing it in a |KeyExData| structure 72 // KeyExData contains the data that is contained in the EX_DATA of the RSA, DSA 77 // legacy_rsa, if not NULL, points to an RSA* in the system's OpenSSL (which 81 // modulus (in bytes) for RSA, or the group order size for (EC)DSA. This 152 // given in |v|, i.e. the length of |v| less any leading zero bytes. 176 const uint8_t* in, 172 RsaMethodEncrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 184 RsaMethodSignRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 265 RsaMethodDecrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 277 RsaMethodVerifyRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument [all...] |
/external/chromium_org/net/base/ |
H A D | dns_util_unittest.cc | 3 // found in the LICENSE file. 14 // NUL in the result. 15 static std::string IncludeNUL(const char* in) { argument 16 return std::string(in, strlen(in) + 1); 40 // 253 characters in the name: still valid 44 // 254 characters in the name: invalid
|
H A D | escape_unittest.cc | 3 // found in the LICENSE file. 81 // Test all the values in we're supposed to be escaping. 88 std::string in; local 89 in.push_back(i); 90 std::string out = EscapeQueryParamValue(in, true); 96 } else if (no_escape.find(in) == std::string::npos) { 101 // No change for things in the no_escape list. 102 EXPECT_EQ(out, in); 200 input.push_back(0); // Also have a NULL in the input. 293 input.push_back(0); // Also have a NULL in th [all...] |
/external/chromium_org/net/cert/ |
H A D | asn1_util.cc | 3 // found in the LICENSE file. 11 bool ParseElement(base::StringPiece* in, argument 15 const uint8* data = reinterpret_cast<const uint8*>(in->data()); 21 if (in->empty() && (tag_value & kOptional)) { 29 if (in->size() < 2) 55 if (in->size() < 2 + num_bytes) 67 // the length should have been encoded in short form. This distinguishes 76 if (in->size() < len) 79 *out = base::StringPiece(in->data(), len); 80 in 84 GetElement(base::StringPiece* in, unsigned tag_value, base::StringPiece* out) argument [all...] |
H A D | crl_set_storage.cc | 3 // found in the LICENSE file. 18 // Decompress zlib decompressed |in| into |out|. |out_len| is the number of 21 static bool DecompressZlib(uint8* out, int out_len, base::StringPiece in) { argument 25 z.next_in = reinterpret_cast<Bytef*>(const_cast<char*>(in.data())); 26 z.avail_in = in.size(); 102 // A delta CRLSet applies to a specific CRL set as given in the 104 // in turn with a zlib compressed array of options: either the CRL is the same, 106 // of an update, the serials in the CRL are considered in the same fashion 208 // accept. This bounds the number of CRLs in th [all...] |
H A D | ct_serialization.cc | 3 // found in the LICENSE file. 16 // Note: length is always specified in bytes. 45 // Reads a TLS-encoded variable length unsigned integer from |in|. 46 // The integer is expected to be in big-endian order, which is used by TLS. 47 // The bytes read from |in| are discarded (i.e. |in|'s prefix removed) 48 // |length| indicates the size (in bytes) of the integer. On success, returns 49 // true and stores the result in |*out|. 51 bool ReadUint(size_t length, base::StringPiece* in, T* out) { argument 52 if (in 69 ReadLength(size_t prefix_length, base::StringPiece* in, size_t* out) argument 79 ReadFixedBytes(size_t length, base::StringPiece* in, base::StringPiece* out) argument 93 ReadVariableBytes(size_t prefix_length, base::StringPiece* in, base::StringPiece* out) argument 107 ReadList(size_t max_list_length, size_t max_item_length, base::StringPiece* in, std::vector<base::StringPiece>* out) argument 138 ConvertHashAlgorithm(unsigned in, DigitallySigned::HashAlgorithm* out) argument 159 ConvertSignatureAlgorithm( unsigned in, DigitallySigned::SignatureAlgorithm* out) argument [all...] |
/external/chromium_org/net/http/ |
H A D | md4.cc | 4 // WARNING: MD4 is cryptographically weak. Do not use MD4 except in NTLM 12 * 1.1 (the "License"); you may not use this file except in compliance with 33 * in which case the provisions of the GPL or the LGPL are applicable instead 77 static void w2b(Uint8 *out, const Uint32 *in, Uint32 len) argument 82 wp = in; 95 static void b2w(Uint32 *out, const Uint8 *in, Uint32 len) argument 100 bp = in; 101 bpend = in + len; 112 /* update state: data is 64 bytes in length */ 159 /* compute number of complete 64-byte segments contained in inpu [all...] |
/external/chromium_org/net/quic/crypto/ |
H A D | cert_compressor.cc | 3 // found in the LICENSE file. 21 // in order to help zlib. This was generated via a fairly dumb algorithm from 150 // CertEntry represents a certificate in compressed form. Each entry is one of 151 // the three types enumerated in |Type|. 155 // Type 0 is reserved to mean "end of list" in the wire format. 157 // COMPRESSED means that the certificate is included in the trailing zlib 161 // be replaced by its 64-bit hash (in |hash|). 163 // COMMON means that the certificate is in a common certificate set known 177 // 64-bit, FNV-1a hashes in |client_cached_cert_hashes|. 233 // CertEntriesSize returns the size, in byte 341 StringPiece in = *in_out; local 559 DecompressChain(StringPiece in, const vector<string>& cached_certs, const CommonCertSets* common_sets, vector<string>* out_certs) argument [all...] |
H A D | crypto_framer.cc | 3 // found in the LICENSE file. 57 CryptoHandshakeMessage* CryptoFramer::ParseMessage(StringPiece in) { argument 62 if (!framer.ProcessInput(in) || visitor.error() ||
|
/external/chromium_org/net/quic/ |
H A D | quic_crypto_client_stream.cc | 3 // found in the LICENSE file. 177 const CryptoHandshakeMessage* in) { 204 // Send the client hello in plaintext. 228 DLOG(DFATAL) << "Client hello won't fit in a single packet."; 251 // chance to send us another in the future. 290 if (in->tag() != kREJ) { 296 *in, session()->connection()->clock()->WallNow(), cached, 371 if (in->tag() == kREJ) { 384 if (in->tag() != kSHLO) { 399 *in, sessio 176 DoHandshakeLoop( const CryptoHandshakeMessage* in) argument [all...] |
/external/chromium_org/net/socket/ |
H A D | nss_ssl_util.cc | 3 // found in the LICENSE file. 36 // CiphersRemove takes a zero-terminated array of cipher suite ids in 37 // |to_remove| and sets every instance of them in |ciphers| to zero. It returns 39 // there are no duplicates in |ciphers| nor in |to_remove|. 59 // CiphersCompact takes an array of cipher suite ids in |ciphers|, where some 72 // CiphersCopy copies the zero-terminated array |in| to |out|. It returns the 74 size_t CiphersCopy(const uint16* in, uint16* out) { argument 76 if (in[i] == 0) 78 out[i] = in[ [all...] |
H A D | ssl_client_socket_openssl.cc | 3 // found in the LICENSE file. 222 const unsigned char* in, 225 return socket->SelectNextProtoCallback(out, outlen, in, inlen); 240 // and the other elements are in the order given by the server. 248 // Resets the PeerCertificateChain to the set of certificates in|chain|, 448 // Set SSL to client mode. Handshake happens in the loop below. 803 // This will almost certainly result in the socket failing to complete the 835 // Since Run may result in Read being called, clear |user_read_callback_| 850 // Since Run may result in Write being called, clear |user_write_callback_| 893 // so that we won't try to resume the non-client-authenticated session in 220 SelectNextProtoCallback(SSL* ssl, unsigned char** out, unsigned char* outlen, const unsigned char* in, unsigned int inlen, void* arg) argument [all...] |
/external/chromium_org/net/spdy/ |
H A D | hpack_decoder_test.cc | 3 // found in the LICENSE file. 35 bool DecodeNextName(HpackInputStream* in, StringPiece* out) { argument 36 return decoder_->DecodeNextName(in, out); 107 // Strings under threshold are concatenated in the buffer.
|
H A D | hpack_huffman_table.cc | 3 // found in the LICENSE file. 21 // How many bits to index in the root decode table. 23 // Maximum number of bits to index in successive decode tables. 92 // Without this, some inputs will not be encodable in a whole number 118 // child tables. To achieve this, we iterate in order of descending code 218 void HpackHuffmanTable::EncodeString(StringPiece in, argument 221 for (size_t i = 0; i != in.size(); i++) { 222 uint16 symbol_id = static_cast<uint8>(in[i]); 251 size_t HpackHuffmanTable::EncodedSize(StringPiece in) const { 253 for (size_t i = 0; i != in 265 DecodeString(HpackInputStream* in, size_t out_capacity, string* out) const argument [all...] |
/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_mac.cc | 3 // found in the LICENSE file. 63 // Looks up the private key for |certificate| in KeyChain and returns 92 // KeyExData contains the data that is contained in the EX_DATA of the 163 // MakeCSSMSignature uses the key information in |ex_data| to sign the 164 // |in_len| bytes pointed by |in|. It writes up to |max_out| bytes 171 const uint8_t* in, 213 hash_data.Data = const_cast<uint8*>(in); 245 const uint8_t* in, 257 const uint8_t* in, 274 return MakeCSSMSignature(ex_data, out_len, out, max_out, in, in_le 167 MakeCSSMSignature(const KeyExData* ex_data, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len) argument 241 RsaMethodEncrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 253 RsaMethodSignRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 277 RsaMethodDecrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 289 RsaMethodVerifyRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument [all...] |
/external/chromium_org/net/third_party/nss/ssl/ |
H A D | ssl3con.c | 102 const unsigned char *in, int inlen, 110 /* This list of SSL3 cipher suites is sorted in descending order of 113 * in this table must match the ordering in SSL_ImplementedCiphers (sslenum.c) 207 /* Verify that SSL_ImplementedCiphers and cipherSuites are in consistent order. 225 /* This list of SSL3 compression methods is sorted in descending order of 265 * our TLS 1.2 CertificateRequest message, in wire format. See 281 /* This global item is used only in servers. It is is initialized by 282 ** SSL_ConfigSecureServer(), and is used in ssl3_SendCertificateRequest(). 555 * in ECCWrappedKeyInf 1515 ssl3_DeflateCompress(void *void_context, unsigned char *out, int *out_len, int maxout, const unsigned char *in, int inlen) argument 1544 ssl3_DeflateDecompress(void *void_context, unsigned char *out, int *out_len, int maxout, const unsigned char *in, int inlen) argument 1935 ssl3_AESGCM(ssl3KeyMaterial *keys, PRBool doDecrypt, unsigned char *out, int *outlen, int maxout, const unsigned char *in, int inlen, const unsigned char *additionalData, int additionalDataLen) argument 1998 ssl3_AESGCMBypass(ssl3KeyMaterial *keys, PRBool doDecrypt, unsigned char *out, int *outlen, int maxout, const unsigned char *in, int inlen, const unsigned char *additionalData, int additionalDataLen) argument 2070 ssl3_ChaCha20Poly1305( ssl3KeyMaterial *keys, PRBool doDecrypt, unsigned char *out, int *outlen, int maxout, const unsigned char *in, int inlen, const unsigned char *additionalData, int additionalDataLen) argument 3093 ssl3_SendApplicationData(sslSocket *ss, const unsigned char *in, PRInt32 len, PRInt32 flags) argument 5966 hexEncode(char *out, const unsigned char *in, unsigned int length) argument [all...] |
H A D | sslcon.c | 57 PRUint8 nkd; /* size of readKey and writeKey in bytes. */ 61 PRUint8 keyLen; /* cipher symkey size in bytes. */ 89 ** Put a string tag in the library so that we can examine an executable 118 * lsb corresponds to first cipher suite in allCipherSuites[]. 169 * and then again in ssl2_BeginClientHandshake(). 193 /* fill in cipher specs for SSL2 cipher suites */ 241 /* ssl3_config_match_init was called in ssl2_ConstructCipherSpecs(). */ 324 * Called from SSL_CipherPrefSetDefault in sslsock.c 843 ** Send some data in the clear. 849 ssl2_SendClear(sslSocket *ss, const PRUint8 *in, PRInt3 argument 920 ssl2_SendStream(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument 1021 ssl2_SendBlock(sslSocket *ss, const PRUint8 *in, PRInt32 len, PRInt32 flags) argument [all...] |
/external/chromium_org/printing/backend/ |
H A D | win_helper.cc | 3 // found in the LICENSE file. 255 // that call CoInitializeEx with COINIT_APARTMENTTHREADED in the context of 257 // CoUninitialize anyway. This results in the apartment being torn down too 258 // early and the msxml DLL being unloaded which in turn causes code in 474 DEVMODE* in) { 481 DWORD flags = (in ? (DM_IN_BUFFER) : 0) | DM_OUT_BUFFER; 483 NULL, printer, const_cast<wchar_t*>(L""), out.get(), in, flags) != 494 DEVMODE* in, 508 DWORD flags = (in 473 CreateDevMode(HANDLE printer, DEVMODE* in) argument 491 PromptDevMode( HANDLE printer, const base::string16& printer_name, DEVMODE* in, HWND window, bool* canceled) argument [all...] |
/external/chromium_org/remoting/base/ |
H A D | compound_buffer_unittest.cc | 3 // found in the LICENSE file. 83 // Iterate over chunks of data with sizes specified in |sizes| in the 114 const void* in; local 118 if (!input->Next(&in, &in_size)) { 124 memcpy(out, in, out_size); 131 memcpy(out, in, in_size); 146 // Construct and prepare data in the |buffer|. 154 // Determine how many segments to split kTestData. We split the data in
|
H A D | util.cc | 3 // found in the LICENSE file. 23 // Do not write LOG messages in this routine since it is called from within 209 // Copy pixels in the rectangle line by line. 218 std::string ReplaceLfByCrLf(const std::string& in) { argument 220 out.resize(2 * in.size()); 223 const char* in_p_begin = &in[0]; 224 const char* in_p_end = &in[in.size()]; 236 std::string ReplaceCrLfByLf(const std::string& in) { argument 238 out.resize(in [all...] |
/external/chromium_org/remoting/codec/ |
H A D | video_decoder_verbatim.cc | 3 // found in the LICENSE file. 32 const char* in = packet.data().data(); local 52 if (in + rect_row_size > packet.data().data() + packet.data().size()) { 56 memcpy(out, in, rect_row_size); 57 in += rect_row_size; 62 if (in != packet.data().data() + packet.data().size()) {
|
H A D | video_encoder_verbatim.cc | 3 // found in the LICENSE file. 53 const uint8_t* in = frame.data() + rect.top() * in_stride + local 56 memcpy(out, in, row_size); 58 in += in_stride;
|
/external/chromium_org/skia/ext/ |
H A D | recursive_gaussian_convolution.cc | 3 // found in the LICENSE file. 18 // All of the filter scaling factors are in fixed point with kShiftBits bits of 86 const unsigned char* in = source_data; local 90 ++r, in += source_row_stride, out += output_row_stride) { 94 w[0] = w[1] = w[2] = in[0]; 99 in[0], in[0], in[source_pixel_stride], w, 3, b); 104 w[n] = ForwardFilter<order>(in[byte_index - source_pixel_stride], 105 in[byte_inde [all...] |
/external/chromium_org/sync/engine/ |
H A D | model_type_sync_worker_impl.cc | 3 // found in the LICENSE file. 327 // items have been successfully committed so it can save that information in 343 // We'll get it in the first update response. 380 // Always include enough specifics to identify the type. Do this even in 396 // Handle a change in encryption key. 440 const sync_pb::EntitySpecifics& in, 442 DCHECK(in.has_encrypted()); 443 DCHECK(cryptographer->CanDecrypt(in.encrypted())); 446 plaintext = cryptographer->DecryptToString(in.encrypted()); 438 DecryptSpecifics( Cryptographer* cryptographer, const sync_pb::EntitySpecifics& in, sync_pb::EntitySpecifics* out) argument
|
/external/chromium_org/sync/syncable/ |
H A D | model_type.cc | 3 // found in the LICENSE file. 205 FullModelTypeSet ToFullModelTypeSet(ModelTypeSet in) { argument 207 for (ModelTypeSet::Iterator i = in.First(); i.Good(); i.Inc()) { 213 // Note: keep this consistent with GetModelType in entry.cc! 235 NOTREACHED() << "Unknown datatype in sync proto."; 350 // these in the same order as their definition in the ModelType enum. 461 // This is used in serialization routines as well as for displaying debug 759 // TODO(zea): remove all hardcoded tags in model associators and have them use 762 // in test [all...] |