/external/protobuf/src/google/protobuf/testing/ |
H A D | zcgzip.cc | 60 int outlen; local 63 ok = out.Next(&outptr, &outlen); 67 } while (outlen <= 0); 68 readlen = read(STDIN_FILENO, outptr, outlen); 70 out.BackUp(outlen); 73 if (readlen < outlen) { 74 out.BackUp(outlen - readlen);
|
/external/boringssl/src/crypto/ecdh/ |
H A D | ecdh.c | 77 int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, argument 79 void *out, size_t *outlen)) { 133 if (KDF(buf, buflen, out, &outlen) == NULL) { 137 ret = outlen; 140 if (outlen > buflen) { 141 outlen = buflen; 143 memcpy(out, buf, outlen); 144 ret = outlen;
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-kdf.c | 23 * @outlen: Number of bytes of key to generate 31 u8 *out, size_t outlen) 53 clen = outlen - pos; 59 if (pos == outlen) 63 os_memset(out, 0, outlen); 71 os_memset(out, 0, outlen); 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | sha1-tlsprf.c | 24 * @outlen: Number of bytes of key to generate 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 79 for (i = 0; i < outlen; i++) { 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-kdf.c | 23 * @outlen: Number of bytes of key to generate 31 u8 *out, size_t outlen) 53 clen = outlen - pos; 59 if (pos == outlen) 63 os_memset(out, 0, outlen); 71 os_memset(out, 0, outlen); 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | sha1-tlsprf.c | 24 * @outlen: Number of bytes of key to generate 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 79 for (i = 0; i < outlen; i++) { 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-kdf.c | 23 * @outlen: Number of bytes of key to generate 31 u8 *out, size_t outlen) 53 clen = outlen - pos; 59 if (pos == outlen) 63 os_memset(out, 0, outlen); 71 os_memset(out, 0, outlen); 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | sha1-tlsprf.c | 24 * @outlen: Number of bytes of key to generate 31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 79 for (i = 0; i < outlen; i++) { 30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
/external/squashfs-tools/squashfs-tools/ |
H A D | lzma_wrapper.c | 37 outlen = block_size - LZMA_HEADER_SIZE; local 40 res = LzmaCompress(dest + LZMA_HEADER_SIZE, &outlen, src, size, dest, 78 return outlen + LZMA_HEADER_SIZE; 86 size_t outlen, inlen = size - LZMA_HEADER_SIZE; local 89 outlen = s[LZMA_PROPS_SIZE] | 94 if(outlen > outsize) { 99 res = LzmaUncompress(dest, &outlen, src + LZMA_HEADER_SIZE, &inlen, src, 103 return outlen;
|
H A D | lzo_wrapper.c | 382 lzo_uint outlen = outsize; local 384 res = lzo1x_decompress_safe(src, size, dest, &outlen, NULL); 390 return outlen;
|
/external/boringssl/src/crypto/asn1/ |
H A D | a_mbstr.c | 97 int outform, outlen = 0; local 211 outlen = nchar; 216 outlen = nchar << 1; 221 outlen = nchar << 2; 226 outlen = 0; 227 traverse_string(in, len, inform, out_utf8, &outlen); 231 if(!(p = OPENSSL_malloc(outlen + 1))) { 236 dest->length = outlen; 238 p[outlen] = 0; 296 int *outlen; local [all...] |
/external/boringssl/src/crypto/evp/ |
H A D | p_ec.c | 170 size_t outlen; local 189 /* NB: unlike PKCS#3 DH, if *outlen is less than maximum size this is 192 outlen = *keylen; 194 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
|
/external/boringssl/src/tool/ |
H A D | client.cc | 105 static int NextProtoSelectCallback(SSL* ssl, uint8_t** out, uint8_t* outlen, argument 108 *outlen = strlen(reinterpret_cast<const char *>(arg));
|
/external/ppp/pppd/ |
H A D | fsm.c | 803 int outlen; local 811 outlen = datalen + HEADERLEN; 815 PUTSHORT(outlen, outp); 816 output(f->unit, outpacket_buf, outlen + PPP_HDRLEN);
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 20 u8 *out, size_t *outlen) 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 39 (unsigned long) *outlen, 83 u8 *out, size_t *outlen) 90 out, outlen) < 0) 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 99 u8 *out, size_t *outlen) 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); 108 if (*outlen < 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | rsa.c | 260 * @outlen: Maximum size of the output buffer and used size on success 265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument 330 if (modlen > *outlen) { 331 *outlen = modlen; 338 *outlen = modlen;
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 20 u8 *out, size_t *outlen) 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 39 (unsigned long) *outlen, 83 u8 *out, size_t *outlen) 90 out, outlen) < 0) 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 99 u8 *out, size_t *outlen) 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); 108 if (*outlen < 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | rsa.c | 260 * @outlen: Maximum size of the output buffer and used size on success 265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument 330 if (modlen > *outlen) { 331 *outlen = modlen; 338 *outlen = modlen;
|
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.c | 20 u8 *out, size_t *outlen) 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 39 (unsigned long) *outlen, 83 u8 *out, size_t *outlen) 90 out, outlen) < 0) 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 99 u8 *out, size_t *outlen) 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); 108 if (*outlen < 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |