Searched refs:in_len (Results 1 - 25 of 85) sorted by relevance

1234

/external/liblzf/
H A Dlzf.h52 * Compress in_len bytes stored at the memory block starting at
58 * more than in_len (but less than 104% of the original size), so it
59 * makes sense to always use out_len == in_len - 1), to ensure _some_
77 lzf_compress (const void *const in_data, unsigned int in_len,
82 * function and stored at location in_data and length in_len. The result
96 lzf_decompress (const void *const in_data, unsigned int in_len,
/external/chromium_org/third_party/boringssl/src/include/openssl/
H A Dchacha.h25 /* CRYPTO_chacha_20 encrypts |in_len| bytes from |in| with the given key and
29 size_t in_len, const uint8_t key[32],
H A Dpoly1305.h33 /* poly1305_update processes |in_len| bytes from |in|. It can be called zero or
36 size_t in_len);
H A Dbase64.h86 /* EVP_EncodeUpdate encodes |in_len| bytes from |in| and writes an encoded
92 size_t in_len);
119 /* EVP_DecodeBase64 decodes |in_len| bytes from base64 and writes
125 size_t in_len);
134 /* EVP_DecodeUpdate decodes |in_len| bytes from |in| and writes the decoded
143 size_t in_len);
/external/chromium_org/third_party/boringssl/src/crypto/cipher/
H A De_null.c70 const uint8_t *in, size_t in_len) {
72 memcpy(out, in, in_len);
69 null_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument
H A Daead.c53 * and |in_len| and 1 otherwise.
55 * When processing, there's only an issue if |out| points within in[:in_len]
60 static int check_alias(const uint8_t *in, size_t in_len, const uint8_t *out) { argument
63 } else if (in + in_len <= out) {
71 size_t nonce_len, const uint8_t *in, size_t in_len,
73 size_t possible_out_len = in_len + ctx->aead->overhead;
75 if (possible_out_len < in_len /* overflow */) {
80 if (!check_alias(in, in_len, out)) {
86 in_len, ad, ad_len)) {
100 size_t nonce_len, const uint8_t *in, size_t in_len,
69 EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
98 EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
[all...]
H A De_des.c83 size_t in_len) {
86 while (in_len >= EVP_MAXCHUNK) {
89 in_len -= EVP_MAXCHUNK;
94 if (in_len) {
95 DES_ncbc_encrypt(in, out, (long)in_len, &dat->ks.ks,
132 const uint8_t *in, size_t in_len) {
135 while (in_len >= EVP_MAXCHUNK) {
138 in_len -= EVP_MAXCHUNK;
143 if (in_len) {
144 DES_ede3_cbc_encrypt(in, out, in_len,
82 des_cbc_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument
131 des_ede3_cbc_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument
[all...]
H A De_rc4.c80 size_t in_len) {
83 RC4(rc4key, in_len, in, out);
173 const uint8_t *in, size_t in_len,
186 if (in_len + rc4_ctx->tag_len < in_len) {
196 if (max_out_len < in_len + rc4_ctx->tag_len) {
221 if (in_len > md5_off && (blocks = (in_len - md5_off) / MD5_CBLOCK) &&
244 MD5_Update(&md, in + md5_off, in_len - md5_off);
250 MD5_Final(out + in_len,
79 rc4_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument
170 aead_rc4_md5_tls_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
264 aead_rc4_md5_tls_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
[all...]
H A De_chacha20poly1305.c93 const uint8_t *in, size_t in_len,
98 const uint64_t in_len_64 = in_len;
112 if (in_len + c20_ctx->tag_len < in_len) {
117 if (max_out_len < in_len + c20_ctx->tag_len) {
134 CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, nonce, 1);
135 poly1305_update_with_length(&poly1305, out, in_len);
140 memcpy(out + in_len, tag, c20_ctx->tag_len);
141 *out_len = in_len + c20_ctx->tag_len;
145 CRYPTO_poly1305_finish(&poly1305, out + in_len);
90 aead_chacha20_poly1305_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
150 aead_chacha20_poly1305_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
[all...]
H A Dcipher.c256 const uint8_t *in, int in_len) {
260 i = ctx->cipher->cipher(ctx, out, in, in_len);
269 if (in_len <= 0) {
271 return in_len == 0;
274 if (ctx->buf_len == 0 && (in_len & ctx->block_mask) == 0) {
275 if (ctx->cipher->cipher(ctx, out, in, in_len)) {
276 *out_len = in_len;
288 if (i + in_len < bl) {
289 memcpy(&ctx->buf[i], in, in_len);
290 ctx->buf_len += in_len;
255 EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument
369 EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument
487 EVP_Cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument
492 EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument
[all...]
/external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/tests/
H A Duncstring_test.c39 size_t in_len; member in struct:Test_Entry
88 strncpy(str, test->input, test->in_len);
89 len = test->in_len;
95 test->input, (unsigned long)test->in_len,
103 test->input, (unsigned long)test->in_len, test->result, str);
111 test->input, (unsigned long)test->in_len, wstr);
117 test->input, (unsigned long)test->in_len, test->warn);
123 test->input, (unsigned long)test->in_len, test->warn, wstr);
/external/chromium_org/third_party/libjingle/source/talk/session/media/
H A Dsrtpfilter.cc210 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { argument
215 return send_session_->ProtectRtp(p, in_len, max_len, out_len);
218 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len, argument
225 return send_session_->ProtectRtp(p, in_len, max_len, out_len, index);
228 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { argument
234 return send_rtcp_session_->ProtectRtcp(p, in_len, max_len, out_len);
236 return send_session_->ProtectRtcp(p, in_len, max_len, out_len);
240 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { argument
245 return recv_session_->UnprotectRtp(p, in_len, out_len);
248 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, in argument
494 ProtectRtp(void* p, int in_len, int max_len, int* out_len) argument
525 ProtectRtp(void* p, int in_len, int max_len, int* out_len, int64* index) argument
533 ProtectRtcp(void* p, int in_len, int max_len, int* out_len) argument
556 UnprotectRtp(void* p, int in_len, int* out_len) argument
575 UnprotectRtcp(void* p, int in_len, int* out_len) argument
617 GetSendStreamPacketIndex(void* p, int in_len, int64* index) argument
786 ProtectRtp(void* data, int in_len, int max_len, int* out_len) argument
791 ProtectRtcp(void* data, int in_len, int max_len, int* out_len) argument
796 UnprotectRtp(void* data, int in_len, int* out_len) argument
800 UnprotectRtcp(void* data, int in_len, int* out_len) argument
[all...]
H A Dsrtpfilter.h124 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len);
126 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len,
128 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len);
131 bool UnprotectRtp(void* data, int in_len, int* out_len);
132 bool UnprotectRtcp(void* data, int in_len, int* out_len);
208 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len);
210 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len,
212 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len);
215 bool UnprotectRtp(void* data, int in_len, int* out_len);
216 bool UnprotectRtcp(void* data, int in_len, in
[all...]
/external/chromium_org/third_party/webrtc/base/
H A Dmessagedigest.h51 // Computes the hash of |in_len| bytes of |input|, using the |digest| hash
55 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len,
60 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len,
80 // Computes the HMAC of |in_len| bytes of |input|, using the |digest| hash
86 const void* input, size_t in_len,
92 const void* input, size_t in_len,
H A Dtransformadapter.cc64 size_t in_len = len_; local
66 StreamResult result = transform_->Transform(buffer_, &in_len,
84 len_ -= in_len;
86 memmove(buffer_, buffer_ + in_len, len_);
114 size_t in_len = data_len; local
116 StreamResult result = transform_->Transform(data, &in_len,
132 bytes_written = in_len;
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dtlsv1_client.h24 const u8 *in_data, size_t in_len,
28 const u8 *in_data, size_t in_len,
31 const u8 *in_data, size_t in_len,
H A Dtlsv1_server.h24 const u8 *in_data, size_t in_len, size_t *out_len);
26 const u8 *in_data, size_t in_len,
29 const u8 *in_data, size_t in_len,
H A Dtlsv1_record.c267 * @in_len: Length of the received data
279 const u8 *in_data, size_t in_len,
289 if (in_len < TLS_RECORD_HEADER_LEN) {
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - "
292 (unsigned long) in_len);
294 in_data, in_len);
324 in_len -= TLS_RECORD_HEADER_LEN;
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument
[all...]
/external/wpa_supplicant_8/src/tls/
H A Dtlsv1_client.h24 const u8 *in_data, size_t in_len,
28 const u8 *in_data, size_t in_len,
31 const u8 *in_data, size_t in_len,
H A Dtlsv1_server.h24 const u8 *in_data, size_t in_len, size_t *out_len);
26 const u8 *in_data, size_t in_len,
29 const u8 *in_data, size_t in_len,
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dtlsv1_client.h24 const u8 *in_data, size_t in_len,
28 const u8 *in_data, size_t in_len,
31 const u8 *in_data, size_t in_len,
H A Dtlsv1_server.h24 const u8 *in_data, size_t in_len, size_t *out_len);
26 const u8 *in_data, size_t in_len,
29 const u8 *in_data, size_t in_len,
/external/chromium_org/third_party/boringssl/src/crypto/chacha/
H A Dchacha_generic.c52 void CRYPTO_chacha_20_neon(uint8_t *out, const uint8_t *in, size_t in_len,
83 void CRYPTO_chacha_20(uint8_t *out, const uint8_t *in, size_t in_len, argument
93 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter);
118 while (in_len > 0) {
120 if (in_len < todo) {
121 todo = in_len;
131 in_len -= todo;
/external/liblzf/src/org/liblzf/
H A DCLZF.java153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument
165 //byte *in_end = ip + in_len;
175 if (iidx < in_len - 2)
183 && iidx + 4 < in_len
192 int maxlen = in_len - iidx - len;
239 else if (iidx == in_len)
277 public static int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument
331 while (iidx < in_len);
/external/chromium_org/third_party/boringssl/src/crypto/base64/
H A Dbase64.c120 const uint8_t *in, size_t in_len) {
125 if (in_len == 0) {
131 if (ctx->num + in_len < ctx->length) {
132 memcpy(&ctx->enc_data[ctx->num], in, in_len);
133 ctx->num += in_len;
140 in_len -= i;
148 while (in_len >= ctx->length) {
151 in_len -= ctx->length;
157 if (in_len != 0) {
158 memcpy(&ctx->enc_data[0], in, in_len);
119 EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, size_t in_len) argument
216 EVP_DecodeBase64(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *in, size_t in_len) argument
271 EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, size_t in_len) argument
[all...]

Completed in 534 milliseconds

1234