/external/kernel-headers/original/uapi/linux/ |
H A D | mic_ioctl.h | 33 * @out_len: The aggregate of the total length written to or read from 45 __u32 out_len; member in struct:mic_copy_desc
|
/external/boringssl/src/crypto/bio/ |
H A D | printf.c | 73 int out_len, ret; local 76 out_len = vsnprintf(buf, sizeof(buf), format, args); 82 if (out_len < 0) { 84 out_len = _vscprintf(format, args); 86 assert(out_len >= sizeof(buf)); 90 if (out_len >= sizeof(buf)) { 91 const int requested_len = out_len; 102 out_len = vsnprintf(out, requested_len + 1, format, args); 104 assert(out_len == requested_len); 109 ret = BIO_write(bio, out, out_len); [all...] |
H A D | bio_mem.c | 301 size_t *out_len) { 309 *out_len = b->length; 300 BIO_mem_contents(const BIO *bio, const uint8_t **out_contents, size_t *out_len) argument
|
/external/boringssl/src/crypto/hkdf/ |
H A D | hkdf_test.c | 32 const size_t out_len; member in struct:__anon443 223 if (!HKDF(buf, test->out_len, test->md_func(), test->ikm, test->ikm_len, 229 if (memcmp(buf, test->out, test->out_len) != 0) {
|
H A D | hkdf.c | 24 int HKDF(uint8_t *out_key, size_t out_len, argument 41 n = (out_len + digest_len - 1) / digest_len; 42 if (out_len + digest_len < out_len || n > 255) { 74 if (done + todo > out_len) { 75 todo = out_len - done;
|
/external/liblzf/ |
H A D | lzf_d.c | 57 void *out_data, unsigned int out_len) 62 u8 *const out_end = op + out_len; 56 lzf_decompress(const void *const in_data, unsigned int in_len, void *out_data, unsigned int out_len) argument
|
/external/srtp/crypto/hash/ |
H A D | null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { argument 61 debug_print(mod_auth, " tag length %d", out_len); 72 (*a)->out_len = out_len; 73 (*a)->prefix_len = out_len;
|
H A D | hmac.c | 57 hmac_alloc(auth_t **a, int key_len, int out_len) { argument 62 debug_print(mod_hmac, " tag length %d", out_len); 72 if (out_len > 20) 84 (*a)->out_len = out_len;
|
/external/wpa_supplicant_8/hostapd/src/utils/ |
H A D | base64.c | 21 * @out_len: Pointer to output length variable, or %NULL if not used 22 * Returns: Allocated buffer of out_len bytes of encoded data, 27 * not included in out_len. 30 size_t *out_len) 83 if (out_len) 84 *out_len = pos - out; 93 * @out_len: Pointer to output length variable 94 * Returns: Allocated buffer of out_len bytes of decoded data, 100 size_t *out_len) 155 *out_len 29 base64_encode(const unsigned char *src, size_t len, size_t *out_len) argument 99 base64_decode(const unsigned char *src, size_t len, size_t *out_len) argument [all...] |
/external/wpa_supplicant_8/src/utils/ |
H A D | base64.c | 21 * @out_len: Pointer to output length variable, or %NULL if not used 22 * Returns: Allocated buffer of out_len bytes of encoded data, 27 * not included in out_len. 30 size_t *out_len) 83 if (out_len) 84 *out_len = pos - out; 93 * @out_len: Pointer to output length variable 94 * Returns: Allocated buffer of out_len bytes of decoded data, 100 size_t *out_len) 155 *out_len 29 base64_encode(const unsigned char *src, size_t len, size_t *out_len) argument 99 base64_decode(const unsigned char *src, size_t len, size_t *out_len) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/utils/ |
H A D | base64.c | 21 * @out_len: Pointer to output length variable, or %NULL if not used 22 * Returns: Allocated buffer of out_len bytes of encoded data, 27 * not included in out_len. 30 size_t *out_len) 83 if (out_len) 84 *out_len = pos - out; 93 * @out_len: Pointer to output length variable 94 * Returns: Allocated buffer of out_len bytes of decoded data, 100 size_t *out_len) 155 *out_len 29 base64_encode(const unsigned char *src, size_t len, size_t *out_len) argument 99 base64_decode(const unsigned char *src, size_t len, size_t *out_len) argument [all...] |
/external/boringssl/src/crypto/bytestring/ |
H A D | ber.c | 196 int CBS_asn1_ber_to_der(CBS *in, uint8_t **out, size_t *out_len) { argument 208 *out_len = 0; 220 return CBB_finish(&cbb, out, out_len);
|
/external/boringssl/src/crypto/cipher/ |
H A D | aead_test.cc | 74 size_t out_len; local 75 if (!EVP_AEAD_CTX_seal(&ctx, bssl::vector_data(&out), &out_len, out.size(), 82 out.resize(out_len); 85 t->PrintLine("Bad output length: %u vs %u.", (unsigned)out_len,
|
H A D | aead.c | 97 int EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, argument 113 if (ctx->aead->seal(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 122 *out_len = 0; 126 int EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, argument 135 if (ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, 145 *out_len = 0;
|
H A D | e_chacha20poly1305.c | 93 size_t *out_len, size_t max_out_len, 142 *out_len = in_len + c20_ctx->tag_len; 147 size_t *out_len, size_t max_out_len, 203 *out_len = plaintext_len; 92 aead_chacha20_poly1305_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument 146 aead_chacha20_poly1305_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, size_t max_out_len, const uint8_t *nonce, size_t nonce_len, const uint8_t *in, size_t in_len, const uint8_t *ad, size_t ad_len) argument
|
/external/boringssl/src/crypto/cmac/ |
H A D | cmac_test.cc | 72 size_t out_len; local 73 if (!CMAC_Final(ctx.get(), out, &out_len)) { 78 if (out_len != sizeof(out)) { 79 fprintf(stderr, "%s/%u: incorrect out_len: %u.\n", name, chunk_size, 80 static_cast<unsigned>(out_len));
|
H A D | cmac.c | 215 int CMAC_Final(CMAC_CTX *ctx, uint8_t *out, size_t *out_len) { argument 216 *out_len = AES_BLOCK_SIZE;
|
/external/liblzf/cs/ |
H A D | CLZF.cs | 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 166 //byte *out_end = op + out_len; 195 if (oidx + lit + 1 + 3 >= out_len) 248 if (oidx + 1 + MAX_LIT >= out_len) 261 if (oidx + lit + 1 >= out_len) 277 public int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument 290 if (oidx + ctrl > out_len) 311 if (oidx + len + 2 > out_len)
|
/external/liblzf/src/org/liblzf/ |
H A D | CLZF.java | 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) argument 166 //byte *out_end = op + out_len; 195 if (oidx + lit + 1 + 3 >= out_len) 248 if (oidx + 1 + MAX_LIT >= out_len) 261 if (oidx + lit + 1 >= out_len) 277 public static int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) argument 290 if (oidx + ctrl > out_len) 311 if (oidx + len + 2 > out_len)
|
/external/boringssl/src/crypto/hmac/ |
H A D | hmac.c | 67 unsigned int *out_len) { 81 !HMAC_Final(&ctx, out, out_len)) { 171 int HMAC_Final(HMAC_CTX *ctx, uint8_t *out, unsigned int *out_len) { argument 180 !EVP_DigestFinal_ex(&ctx->md_ctx, out, out_len)) { 181 *out_len = 0; 65 HMAC(const EVP_MD *evp_md, const void *key, size_t key_len, const uint8_t *data, size_t data_len, uint8_t *out, unsigned int *out_len) argument
|
/external/boringssl/src/crypto/modes/ |
H A D | gcm_test.c | 258 static int decode_hex(uint8_t **out, size_t *out_len, const char *in, argument 265 *out_len = 0; 293 *out_len = len/2;
|
/external/boringssl/src/ssl/ |
H A D | ssl_aead_ctx.c | 142 int SSL_AEAD_CTX_open(SSL_AEAD_CTX *aead, uint8_t *out, size_t *out_len, argument 153 *out_len = in_len; 193 return EVP_AEAD_CTX_open(&aead->ctx, out, out_len, max_out, nonce, nonce_len, 197 int SSL_AEAD_CTX_seal(SSL_AEAD_CTX *aead, uint8_t *out, size_t *out_len, argument 208 *out_len = in_len; 251 if (!EVP_AEAD_CTX_seal(&aead->ctx, out, out_len, max_out, nonce, nonce_len, 255 *out_len += extra_len;
|
/external/srtp/crypto/include/ |
H A D | auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 81 (((a)->type)->compute((a)->state, (buf), (len), (a)->out_len, (res))) 137 int out_len; /* length of output tag in octets */ member in struct:auth_t
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | tlsv1_record.c | 144 * @out_len: Buffer for returning the used buf length 152 size_t *out_len) 257 *out_len = pos - buf; 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 348 if (*out_len < in_len) { 468 *out_len = plen; 471 *out_len = in_len; 475 if (TLS_RECORD_HEADER_LEN + *out_len > 17408) { 477 (unsigned long) (TLS_RECORD_HEADER_LEN + *out_len)); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | tlsv1_record.c | 144 * @out_len: Buffer for returning the used buf length 152 size_t *out_len) 257 *out_len = pos - buf; 269 * @out_len: Set to maximum out_data length by caller; used to return the 280 u8 *out_data, size_t *out_len, u8 *alert) 348 if (*out_len < in_len) { 468 *out_len = plen; 471 *out_len = in_len; 475 if (TLS_RECORD_HEADER_LEN + *out_len > 17408) { 477 (unsigned long) (TLS_RECORD_HEADER_LEN + *out_len)); 150 tlsv1_record_send(struct tlsv1_record_layer *rl, u8 content_type, u8 *buf, size_t buf_size, const u8 *payload, size_t payload_len, size_t *out_len) argument 278 tlsv1_record_receive(struct tlsv1_record_layer *rl, const u8 *in_data, size_t in_len, u8 *out_data, size_t *out_len, u8 *alert) argument [all...] |