Searched defs:outlen (Results 1 - 25 of 74) sorted by relevance

123

/external/protobuf/src/google/protobuf/testing/
H A Dzcgzip.cc60 int outlen; local
63 ok = out.Next(&outptr, &outlen);
67 } while (outlen <= 0);
68 readlen = read(STDIN_FILENO, outptr, outlen);
70 out.BackUp(outlen);
73 if (readlen < outlen) {
74 out.BackUp(outlen - readlen);
/external/boringssl/src/crypto/ecdh/
H A Decdh.c77 int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, argument
79 void *out, size_t *outlen)) {
133 if (KDF(buf, buflen, out, &outlen) == NULL) {
137 ret = outlen;
140 if (outlen > buflen) {
141 outlen = buflen;
143 memcpy(out, buf, outlen);
144 ret = outlen;
/external/wpa_supplicant_8/hostapd/src/crypto/
H A Dsha256-kdf.c23 * @outlen: Number of bytes of key to generate
31 u8 *out, size_t outlen)
53 clen = outlen - pos;
59 if (pos == outlen)
63 os_memset(out, 0, outlen);
71 os_memset(out, 0, outlen);
29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
H A Dsha256-tlsprf.c23 * @outlen: Number of bytes of key to generate
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
56 while (pos < outlen) {
60 clen = outlen - pos;
29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
H A Dcrypto_internal-rsa.c74 u8 *out, size_t *outlen)
77 0, in, inlen, out, outlen);
83 u8 *out, size_t *outlen)
86 in, inlen, out, outlen);
92 u8 *out, size_t *outlen)
95 1, in, inlen, out, outlen);
72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
H A Dsha1-tlsprf.c24 * @outlen: Number of bytes of key to generate
31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
79 for (i = 0; i < outlen; i++) {
30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
/external/wpa_supplicant_8/src/crypto/
H A Dsha256-kdf.c23 * @outlen: Number of bytes of key to generate
31 u8 *out, size_t outlen)
53 clen = outlen - pos;
59 if (pos == outlen)
63 os_memset(out, 0, outlen);
71 os_memset(out, 0, outlen);
29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
H A Dsha256-tlsprf.c23 * @outlen: Number of bytes of key to generate
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
56 while (pos < outlen) {
60 clen = outlen - pos;
29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
H A Dcrypto_internal-rsa.c74 u8 *out, size_t *outlen)
77 0, in, inlen, out, outlen);
83 u8 *out, size_t *outlen)
86 in, inlen, out, outlen);
92 u8 *out, size_t *outlen)
95 1, in, inlen, out, outlen);
72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
H A Dsha1-tlsprf.c24 * @outlen: Number of bytes of key to generate
31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
79 for (i = 0; i < outlen; i++) {
30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/
H A Dsha256-kdf.c23 * @outlen: Number of bytes of key to generate
31 u8 *out, size_t outlen)
53 clen = outlen - pos;
59 if (pos == outlen)
63 os_memset(out, 0, outlen);
71 os_memset(out, 0, outlen);
29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
H A Dsha256-tlsprf.c23 * @outlen: Number of bytes of key to generate
30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
56 while (pos < outlen) {
60 clen = outlen - pos;
29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
H A Dcrypto_internal-rsa.c74 u8 *out, size_t *outlen)
77 0, in, inlen, out, outlen);
83 u8 *out, size_t *outlen)
86 in, inlen, out, outlen);
92 u8 *out, size_t *outlen)
95 1, in, inlen, out, outlen);
72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
H A Dsha1-tlsprf.c24 * @outlen: Number of bytes of key to generate
31 const u8 *seed, size_t seed_len, u8 *out, size_t outlen)
79 for (i = 0; i < outlen; i++) {
30 tls_prf_sha1_md5(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
/external/squashfs-tools/squashfs-tools/
H A Dlzma_wrapper.c37 outlen = block_size - LZMA_HEADER_SIZE; local
40 res = LzmaCompress(dest + LZMA_HEADER_SIZE, &outlen, src, size, dest,
78 return outlen + LZMA_HEADER_SIZE;
86 size_t outlen, inlen = size - LZMA_HEADER_SIZE; local
89 outlen = s[LZMA_PROPS_SIZE] |
94 if(outlen > outsize) {
99 res = LzmaUncompress(dest, &outlen, src + LZMA_HEADER_SIZE, &inlen, src,
103 return outlen;
H A Dlzo_wrapper.c382 lzo_uint outlen = outsize; local
384 res = lzo1x_decompress_safe(src, size, dest, &outlen, NULL);
390 return outlen;
/external/boringssl/src/crypto/asn1/
H A Da_mbstr.c97 int outform, outlen = 0; local
211 outlen = nchar;
216 outlen = nchar << 1;
221 outlen = nchar << 2;
226 outlen = 0;
227 traverse_string(in, len, inform, out_utf8, &outlen);
231 if(!(p = OPENSSL_malloc(outlen + 1))) {
236 dest->length = outlen;
238 p[outlen] = 0;
296 int *outlen; local
[all...]
/external/boringssl/src/crypto/evp/
H A Dp_ec.c170 size_t outlen; local
189 /* NB: unlike PKCS#3 DH, if *outlen is less than maximum size this is
192 outlen = *keylen;
194 ret = ECDH_compute_key(key, outlen, pubkey, eckey, 0);
/external/boringssl/src/tool/
H A Dclient.cc105 static int NextProtoSelectCallback(SSL* ssl, uint8_t** out, uint8_t* outlen, argument
108 *outlen = strlen(reinterpret_cast<const char *>(arg));
/external/ppp/pppd/
H A Dfsm.c803 int outlen; local
811 outlen = datalen + HEADERLEN;
815 PUTSHORT(outlen, outp);
816 output(f->unit, outpacket_buf, outlen + PPP_HDRLEN);
/external/wpa_supplicant_8/hostapd/src/tls/
H A Dpkcs1.c20 u8 *out, size_t *outlen)
35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) {
37 "lengths (modlen=%lu outlen=%lu inlen=%lu)",
39 (unsigned long) *outlen,
83 u8 *out, size_t *outlen)
90 out, outlen) < 0)
93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private);
99 u8 *out, size_t *outlen)
104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1);
108 if (*outlen <
18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
[all...]
H A Drsa.c260 * @outlen: Maximum size of the output buffer and used size on success
265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument
330 if (modlen > *outlen) {
331 *outlen = modlen;
338 *outlen = modlen;
/external/wpa_supplicant_8/src/tls/
H A Dpkcs1.c20 u8 *out, size_t *outlen)
35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) {
37 "lengths (modlen=%lu outlen=%lu inlen=%lu)",
39 (unsigned long) *outlen,
83 u8 *out, size_t *outlen)
90 out, outlen) < 0)
93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private);
99 u8 *out, size_t *outlen)
104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1);
108 if (*outlen <
18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
[all...]
H A Drsa.c260 * @outlen: Maximum size of the output buffer and used size on success
265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument
330 if (modlen > *outlen) {
331 *outlen = modlen;
338 *outlen = modlen;
/external/wpa_supplicant_8/wpa_supplicant/src/tls/
H A Dpkcs1.c20 u8 *out, size_t *outlen)
35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) {
37 "lengths (modlen=%lu outlen=%lu inlen=%lu)",
39 (unsigned long) *outlen,
83 u8 *out, size_t *outlen)
90 out, outlen) < 0)
93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private);
99 u8 *out, size_t *outlen)
104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1);
108 if (*outlen <
18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
[all...]

Completed in 429 milliseconds

123