/external/protobuf/src/google/protobuf/testing/ |
H A D | zcgzip.cc | 60 int outlen; local 63 ok = out.Next(&outptr, &outlen); 67 } while (outlen <= 0); 68 readlen = read(STDIN_FILENO, outptr, outlen); 70 out.BackUp(outlen); 73 if (readlen < outlen) { 74 out.BackUp(outlen - readlen);
|
/external/boringssl/include/openssl/ |
H A D | ecdh.h | 84 * the parameter |out|. When |KDF| returns, the value of |*outlen| becomes the 86 * copied directly to, at most, |outlen| bytes at |out|. It returns the number 88 OPENSSL_EXPORT int ECDH_compute_key(void *out, size_t outlen, 91 void *out, size_t *outlen));
|
/external/boringssl/src/include/openssl/ |
H A D | ecdh.h | 84 * the parameter |out|. When |KDF| returns, the value of |*outlen| becomes the 86 * copied directly to, at most, |outlen| bytes at |out|. It returns the number 88 OPENSSL_EXPORT int ECDH_compute_key(void *out, size_t outlen, 91 void *out, size_t *outlen));
|
/external/squashfs-tools/squashfs-tools/ |
H A D | lzma_wrapper.c | 37 outlen = block_size - LZMA_HEADER_SIZE; local 40 res = LzmaCompress(dest + LZMA_HEADER_SIZE, &outlen, src, size, dest, 78 return outlen + LZMA_HEADER_SIZE; 86 size_t outlen, inlen = size - LZMA_HEADER_SIZE; local 89 outlen = s[LZMA_PROPS_SIZE] | 94 if(outlen > outsize) { 99 res = LzmaUncompress(dest, &outlen, src + LZMA_HEADER_SIZE, &inlen, src, 103 return outlen;
|
/external/fonttools/Lib/fontTools/misc/ |
H A D | fixedTools.py | 41 outlen = len(out) 42 if outlen < length: 43 out.append(max(lo[outlen], hi[outlen]))
|
/external/fonttools/Tools/fontTools/misc/ |
H A D | fixedTools.py | 41 outlen = len(out) 42 if outlen < length: 43 out.append(max(lo[outlen], hi[outlen]))
|
/external/sqlite/android/ |
H A D | PhoneNumberUtils.h | 25 bool phone_number_stripped_reversed_inter(const char* in, char* out, const int len, int *outlen);
|
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha256-kdf.c | 23 * @outlen: Number of bytes of key to generate 31 u8 *out, size_t outlen) 53 clen = outlen - pos; 59 if (pos == outlen) 63 os_memset(out, 0, outlen); 71 os_memset(out, 0, outlen); 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha256-kdf.c | 23 * @outlen: Number of bytes of key to generate 31 u8 *out, size_t outlen) 53 clen = outlen - pos; 59 if (pos == outlen) 63 os_memset(out, 0, outlen); 71 os_memset(out, 0, outlen); 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha256-kdf.c | 23 * @outlen: Number of bytes of key to generate 31 u8 *out, size_t outlen) 53 clen = outlen - pos; 59 if (pos == outlen) 63 os_memset(out, 0, outlen); 71 os_memset(out, 0, outlen); 29 hmac_sha256_kdf(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | sha256-tlsprf.c | 23 * @outlen: Number of bytes of key to generate 30 const u8 *seed, size_t seed_len, u8 *out, size_t outlen) 56 while (pos < outlen) { 60 clen = outlen - pos; 29 tls_prf_sha256(const u8 *secret, size_t secret_len, const char *label, const u8 *seed, size_t seed_len, u8 *out, size_t outlen) argument
|
H A D | crypto_internal-rsa.c | 74 u8 *out, size_t *outlen) 77 0, in, inlen, out, outlen); 83 u8 *out, size_t *outlen) 86 in, inlen, out, outlen); 92 u8 *out, size_t *outlen) 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
/external/boringssl/src/crypto/ecdh/ |
H A D | ecdh.c | 77 int ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, argument 79 void *out, size_t *outlen)) { 133 if (KDF(buf, buflen, out, &outlen) == NULL) { 137 ret = outlen; 140 if (outlen > buflen) { 141 outlen = buflen; 143 memcpy(out, buf, outlen); 144 ret = outlen;
|
/external/boringssl/src/crypto/x509/ |
H A D | a_strex.c | 166 int i, outlen, len; local 171 outlen = 0; 213 outlen += len; 218 outlen += len; 221 return outlen; 257 int outlen, der_len; local 262 outlen = do_hex_dump(io_ch, arg, str->data, str->length); 263 if(outlen < 0) return -1; 264 return outlen + 1; 273 outlen 304 int outlen, len; local 390 int outlen, len; local [all...] |
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.h | 17 u8 *out, size_t *outlen); 20 u8 *out, size_t *outlen);
|
H A D | pkcs1.c | 20 u8 *out, size_t *outlen) 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 39 (unsigned long) *outlen, 83 u8 *out, size_t *outlen) 90 out, outlen) < 0) 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 99 u8 *out, size_t *outlen) 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); 108 if (*outlen < 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.h | 17 u8 *out, size_t *outlen); 20 u8 *out, size_t *outlen);
|
H A D | pkcs1.c | 20 u8 *out, size_t *outlen) 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 39 (unsigned long) *outlen, 83 u8 *out, size_t *outlen) 90 out, outlen) < 0) 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 99 u8 *out, size_t *outlen) 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); 108 if (*outlen < 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
/external/wpa_supplicant_8/wpa_supplicant/src/tls/ |
H A D | pkcs1.h | 17 u8 *out, size_t *outlen); 20 u8 *out, size_t *outlen);
|
H A D | pkcs1.c | 20 u8 *out, size_t *outlen) 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 39 (unsigned long) *outlen, 83 u8 *out, size_t *outlen) 90 out, outlen) < 0) 93 return crypto_rsa_exptmod(out, modlen, out, outlen, key, use_private); 99 u8 *out, size_t *outlen) 104 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1); 108 if (*outlen < 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
/external/boringssl/src/crypto/asn1/ |
H A D | a_mbstr.c | 97 int outform, outlen = 0; local 211 outlen = nchar; 216 outlen = nchar << 1; 221 outlen = nchar << 2; 226 outlen = 0; 227 traverse_string(in, len, inform, out_utf8, &outlen); 231 if(!(p = OPENSSL_malloc(outlen + 1))) { 236 dest->length = outlen; 238 p[outlen] = 0; 296 int *outlen; local [all...] |