/external/chromium_org/net/android/ |
H A D | keystore_openssl.cc | 177 size_t in_len, 189 size_t in_len, 215 in_len, in, out, ex_data->legacy_rsa, ANDROID_RSA_PKCS1_PADDING); 232 base::StringPiece from_piece(reinterpret_cast<const char*>(in), in_len); local 270 size_t in_len, 282 size_t in_len, 172 RsaMethodEncrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 184 RsaMethodSignRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 265 RsaMethodDecrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 277 RsaMethodVerifyRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
|
/external/chromium_org/net/http/ |
H A D | http_auth_handler_ntlm_portable.cc | 381 static int ParseType2Msg(const void* in_buf, uint32 in_len, Type2Msg* msg) { argument 391 if (in_len < NTLM_TYPE2_HEADER_LEN) 414 if (offset + target_len > offset && offset + target_len <= in_len) { 450 uint32 in_len, 458 rv = ParseType2Msg(in_buf, in_len, &msg); 444 GenerateType3Msg(const base::string16& domain, const base::string16& username, const base::string16& password, const std::string& hostname, const void* rand_8_bytes, const void* in_buf, uint32 in_len, void** out_buf, uint32* out_len) argument
|
/external/chromium_org/net/ssl/ |
H A D | openssl_platform_key_mac.cc | 164 // |in_len| bytes pointed by |in|. It writes up to |max_out| bytes 172 size_t in_len) { 212 hash_data.Length = in_len; 246 size_t in_len, 258 size_t in_len, 274 return MakeCSSMSignature(ex_data, out_len, out, max_out, in, in_len); 282 size_t in_len, 294 size_t in_len, 167 MakeCSSMSignature(const KeyExData* ex_data, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len) argument 241 RsaMethodEncrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 253 RsaMethodSignRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 277 RsaMethodDecrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 289 RsaMethodVerifyRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
|
/external/chromium_org/third_party/boringssl/src/crypto/base64/ |
H A D | base64.c | 120 const uint8_t *in, size_t in_len) { 125 if (in_len == 0) { 131 if (ctx->num + in_len < ctx->length) { 132 memcpy(&ctx->enc_data[ctx->num], in, in_len); 133 ctx->num += in_len; 140 in_len -= i; 148 while (in_len >= ctx->length) { 151 in_len -= ctx->length; 157 if (in_len != 0) { 158 memcpy(&ctx->enc_data[0], in, in_len); 119 EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, size_t in_len) argument 216 EVP_DecodeBase64(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *in, size_t in_len) argument 271 EVP_DecodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, size_t in_len) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/bio/ |
H A D | connect.c | 347 static int conn_write(BIO *bio, const char *in, int in_len) { argument 360 ret = send(bio->num, in, in_len, 0);
|
/external/chromium_org/third_party/boringssl/src/crypto/chacha/ |
H A D | chacha_generic.c | 52 void CRYPTO_chacha_20_neon(uint8_t *out, const uint8_t *in, size_t in_len, 83 void CRYPTO_chacha_20(uint8_t *out, const uint8_t *in, size_t in_len, argument 93 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter); 118 while (in_len > 0) { 120 if (in_len < todo) { 121 todo = in_len; 131 in_len -= todo;
|
/external/chromium_org/third_party/boringssl/src/crypto/cipher/ |
H A D | aead.c | 53 * and |in_len| and 1 otherwise. 55 * When processing, there's only an issue if |out| points within in[:in_len] 60 static int check_alias(const uint8_t *in, size_t in_len, const uint8_t *out) { argument 63 } else if (in + in_len <= out) { 71 size_t nonce_len, const uint8_t *in, size_t in_len, 73 size_t possible_out_len = in_len + ctx->aead->overhead; 75 if (possible_out_len < in_len /* overflow */) { 80 if (!check_alias(in, in_len, out)) { 86 in_len, ad, ad_len)) { 100 size_t nonce_len, const uint8_t *in, size_t in_len, 69 EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 98 EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
H A D | cipher.c | 256 const uint8_t *in, int in_len) { 260 i = ctx->cipher->cipher(ctx, out, in, in_len); 269 if (in_len <= 0) { 271 return in_len == 0; 274 if (ctx->buf_len == 0 && (in_len & ctx->block_mask) == 0) { 275 if (ctx->cipher->cipher(ctx, out, in, in_len)) { 276 *out_len = in_len; 288 if (i + in_len < bl) { 289 memcpy(&ctx->buf[i], in, in_len); 290 ctx->buf_len += in_len; 255 EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument 369 EVP_DecryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument 487 EVP_Cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument 492 EVP_CipherUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, const uint8_t *in, int in_len) argument [all...] |
H A D | e_aes.c | 897 const uint8_t *in, size_t in_len, 903 if (in_len + gcm_ctx->tag_len < in_len) { 908 if (max_out_len < in_len + gcm_ctx->tag_len) { 921 if (!CRYPTO_gcm128_encrypt_ctr32(&gcm, in + bulk, out + bulk, in_len - bulk, 926 if (!CRYPTO_gcm128_encrypt(&gcm, in + bulk, out + bulk, in_len - bulk)) { 931 CRYPTO_gcm128_tag(&gcm, out + in_len, gcm_ctx->tag_len); 932 *out_len = in_len + gcm_ctx->tag_len; 939 const uint8_t *in, size_t in_len, 947 if (in_len < gcm_ct 894 aead_aes_gcm_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 936 aead_aes_gcm_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 1065 aead_aes_key_wrap_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 1160 aead_aes_key_wrap_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
H A D | e_chacha20poly1305.c | 93 const uint8_t *in, size_t in_len, 98 const uint64_t in_len_64 = in_len; 112 if (in_len + c20_ctx->tag_len < in_len) { 117 if (max_out_len < in_len + c20_ctx->tag_len) { 134 CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, nonce, 1); 135 poly1305_update_with_length(&poly1305, out, in_len); 140 memcpy(out + in_len, tag, c20_ctx->tag_len); 141 *out_len = in_len + c20_ctx->tag_len; 145 CRYPTO_poly1305_finish(&poly1305, out + in_len); 90 aead_chacha20_poly1305_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 150 aead_chacha20_poly1305_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
H A D | e_des.c | 83 size_t in_len) { 86 while (in_len >= EVP_MAXCHUNK) { 89 in_len -= EVP_MAXCHUNK; 94 if (in_len) { 95 DES_ncbc_encrypt(in, out, (long)in_len, &dat->ks.ks, 132 const uint8_t *in, size_t in_len) { 135 while (in_len >= EVP_MAXCHUNK) { 138 in_len -= EVP_MAXCHUNK; 143 if (in_len) { 144 DES_ede3_cbc_encrypt(in, out, in_len, 82 des_cbc_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument 131 des_ede3_cbc_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument [all...] |
H A D | e_null.c | 70 const uint8_t *in, size_t in_len) { 72 memcpy(out, in, in_len); 69 null_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument
|
H A D | e_rc4.c | 80 size_t in_len) { 83 RC4(rc4key, in_len, in, out); 173 const uint8_t *in, size_t in_len, 186 if (in_len + rc4_ctx->tag_len < in_len) { 196 if (max_out_len < in_len + rc4_ctx->tag_len) { 221 if (in_len > md5_off && (blocks = (in_len - md5_off) / MD5_CBLOCK) && 244 MD5_Update(&md, in + md5_off, in_len - md5_off); 250 MD5_Final(out + in_len, 79 rc4_cipher(EVP_CIPHER_CTX *ctx, uint8_t *out, const uint8_t *in, size_t in_len) argument 170 aead_rc4_md5_tls_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 264 aead_rc4_md5_tls_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument [all...] |
H A D | internal.h | 124 size_t nonce_len, const uint8_t *in, size_t in_len, 129 size_t nonce_len, const uint8_t *in, size_t in_len,
|
/external/chromium_org/third_party/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 345 const uint8_t *in, size_t in_len, 362 if (in_len + block_size < in_len) { 367 buf = OPENSSL_malloc(in_len + block_size); 373 if (!EVP_CipherUpdate(&ctx, buf, &n, in, in_len)) { 456 int in_len; local 464 in_len = ASN1_item_i2d(obj, &in, it); 469 if (!pbe_crypt(algor, pass_raw, pass_raw_len, in, in_len, &oct->data, &crypt_len, 476 OPENSSL_cleanse(in, in_len); 343 pbe_crypt(const X509_ALGOR *algor, const uint8_t *pass_raw, size_t pass_raw_len, const uint8_t *in, size_t in_len, uint8_t **out, size_t *out_len, int is_encrypt) argument
|
/external/chromium_org/third_party/boringssl/src/crypto/poly1305/ |
H A D | poly1305.c | 55 size_t in_len); 211 size_t in_len) { 217 CRYPTO_poly1305_update_neon(statep, in, in_len); 224 if (todo > in_len) 225 todo = in_len; 229 in_len -= todo; 238 if (in_len >= 16) { 239 size_t todo = in_len & ~0xf; 242 in_len &= 0xf; 245 if (in_len) { 210 CRYPTO_poly1305_update(poly1305_state *statep, const uint8_t *in, size_t in_len) argument [all...] |
H A D | poly1305_arm.c | 199 size_t in_len) { 209 if (todo > in_len) 210 todo = in_len; 214 in_len -= todo; 217 if (st->buf_used == sizeof(st->buf) && in_len) { 226 while (in_len > 32) { 228 if (in_len < tlen) 229 tlen = in_len; 231 in_len -= tlen; 235 if (in_len) { 198 CRYPTO_poly1305_update_neon(poly1305_state *state, const uint8_t *in, size_t in_len) argument [all...] |
/external/chromium_org/third_party/boringssl/src/crypto/rsa/ |
H A D | rsa.c | 168 const uint8_t *in, size_t in_len, int padding) { 170 return rsa->meth->encrypt(rsa, out_len, out, max_out, in, in_len, padding); 173 return RSA_default_method.encrypt(rsa, out_len, out, max_out, in, in_len, 189 const uint8_t *in, size_t in_len, int padding) { 191 return rsa->meth->sign_raw(rsa, out_len, out, max_out, in, in_len, padding); 194 return RSA_default_method.sign_raw(rsa, out_len, out, max_out, in, in_len, 210 const uint8_t *in, size_t in_len, int padding) { 212 return rsa->meth->decrypt(rsa, out_len, out, max_out, in, in_len, padding); 215 return RSA_default_method.decrypt(rsa, out_len, out, max_out, in, in_len, 231 const uint8_t *in, size_t in_len, in 167 RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument 188 RSA_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument 209 RSA_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument 230 RSA_verify_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument 405 RSA_sign(int hash_nid, const uint8_t *in, unsigned in_len, uint8_t *out, unsigned *out_len, RSA *rsa) argument [all...] |
H A D | rsa_impl.c | 91 const uint8_t *in, size_t in_len, int padding) { 136 i = RSA_padding_add_PKCS1_type_2(buf, rsa_size, in, in_len); 140 i = RSA_padding_add_PKCS1_OAEP_mgf1(buf, rsa_size, in, in_len, 144 i = RSA_padding_add_none(buf, rsa_size, in, in_len); 328 const uint8_t *in, size_t in_len, int padding) { 346 i = RSA_padding_add_PKCS1_type_1(buf, rsa_size, in, in_len); 349 i = RSA_padding_add_none(buf, rsa_size, in, in_len); 378 const uint8_t *in, size_t in_len, int padding) { 395 if (in_len != rsa_size) { 439 const uint8_t *in, size_t in_len, in 90 encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument 327 sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument 377 decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument 438 verify_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument [all...] |
/external/chromium_org/third_party/boringssl/src/include/openssl/ |
H A D | aead.h | 188 /* EVP_AEAD_CTX_seal encrypts and authenticates |in_len| bytes from |in| and 196 * success, |max_out_len| should be |in_len| plus the result of 211 const uint8_t *in, size_t in_len, 214 /* EVP_AEAD_CTX_open authenticates |in_len| bytes from |in| and |ad_len| bytes 215 * from |ad| and decrypts at most |in_len| bytes into |out|. It returns one on 221 * At most |in_len| bytes are written to |out|. In order to ensure success, 222 * |max_out_len| should be at least |in_len|. On successful return, |*out_len| 236 const uint8_t *in, size_t in_len,
|
H A D | base64.h | 86 /* EVP_EncodeUpdate encodes |in_len| bytes from |in| and writes an encoded 92 size_t in_len); 119 /* EVP_DecodeBase64 decodes |in_len| bytes from base64 and writes 125 size_t in_len); 134 /* EVP_DecodeUpdate decodes |in_len| bytes from |in| and writes the decoded 143 size_t in_len);
|
H A D | chacha.h | 25 /* CRYPTO_chacha_20 encrypts |in_len| bytes from |in| with the given key and 29 size_t in_len, const uint8_t key[32],
|
H A D | cipher.h | 158 /* EVP_EncryptUpdate encrypts |in_len| bytes from |in| to |out|. The number 159 * of output bytes may be up to |in_len| plus the block length minus one and 164 int in_len); 175 /* EVP_DecryptUpdate decrypts |in_len| bytes from |in| to |out|. The number of 176 * output bytes may be up to |in_len| plus the block length minus one and |out| 181 int in_len); 198 const uint8_t *in, size_t in_len); 204 int in_len);
|
H A D | evp.h | 473 /* EVP_PKEY_encrypt encrypts |in_len| bytes from |in|. If |out| is NULL, the 485 size_t in_len); 493 /* EVP_PKEY_decrypt decrypts |in_len| bytes from |in|. If |out| is NULL, the 505 size_t in_len);
|
H A D | poly1305.h | 33 /* poly1305_update processes |in_len| bytes from |in|. It can be called zero or 36 size_t in_len);
|