/external/ppp/pppd/plugins/radius/ |
H A D | md5.c | 6 void rc_md5_calc (unsigned char *output, unsigned char *input, unsigned int inlen) argument 11 MD5_Update (&context, input, inlen);
|
/external/protobuf/src/google/protobuf/testing/ |
H A D | zcgunzip.cc | 67 int inlen; local 69 ok = in.Next(&inptr, &inlen); 73 if (inlen > 0) { 74 int err = write(STDOUT_FILENO, inptr, inlen); 75 assert(err == inlen);
|
/external/boringssl/src/crypto/ecdh/ |
H A D | ecdh.c | 82 void *(*kdf)(const void *in, size_t inlen, void *out, 80 ECDH_compute_key(void *out, size_t outlen, const EC_POINT *pub_key, const EC_KEY *priv_key, void *(*kdf)(const void *in, size_t inlen, void *out, size_t *outlen)) argument
|
/external/curl/lib/ |
H A D | dotdot.c | 55 size_t inlen = strlen(input); local 57 size_t clen = inlen; /* the length of the cloned input */ 58 char *out = malloc(inlen+1);
|
/external/curl/tests/unit/ |
H A D | unit1396.c | 39 int inlen; member in struct:test 83 list1[i].in, list1[i].inlen, 98 char *out = curl_easy_escape(hnd, list2[i].in, list2[i].inlen);
|
/external/openssh/ |
H A D | hash.c | 30 int crypto_hash_sha512(unsigned char *out,const unsigned char *in,unsigned long long inlen) argument 35 unsigned long long bytes = inlen; 39 blocks(h,in,inlen); 40 in += inlen; 41 inlen &= 127; 42 in -= inlen; 44 for (i = 0;i < inlen;++i) padded[i] = in[i]; 45 padded[inlen] = 0x80; 47 if (inlen < 112) { 48 for (i = inlen [all...] |
/external/wpa_supplicant_8/hostapd/src/crypto/ |
H A D | sha384-internal.c | 67 unsigned long inlen) 69 return sha512_process(md, in, inlen); 66 sha384_process(struct sha384_state *md, const unsigned char *in, unsigned long inlen) argument
|
H A D | crypto_internal-rsa.c | 73 const u8 *in, size_t inlen, 77 0, in, inlen, out, outlen); 82 const u8 *in, size_t inlen, 86 in, inlen, out, outlen); 91 const u8 *in, size_t inlen, 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | sha256-internal.c | 145 @param inlen The length of the data (octets) 149 unsigned long inlen) 156 while (inlen > 0) { 157 if (md->curlen == 0 && inlen >= SHA256_BLOCK_SIZE) { 162 inlen -= SHA256_BLOCK_SIZE; 164 n = MIN(inlen, (SHA256_BLOCK_SIZE - md->curlen)); 168 inlen -= n; 148 sha256_process(struct sha256_state *md, const unsigned char *in, unsigned long inlen) argument
|
H A D | sha512-internal.c | 177 @param inlen The length of the data (octets) 181 unsigned long inlen) 188 while (inlen > 0) { 189 if (md->curlen == 0 && inlen >= SHA512_BLOCK_SIZE) { 194 inlen -= SHA512_BLOCK_SIZE; 196 n = MIN(inlen, (SHA512_BLOCK_SIZE - md->curlen)); 200 inlen -= n; 180 sha512_process(struct sha512_state *md, const unsigned char *in, unsigned long inlen) argument
|
/external/wpa_supplicant_8/src/crypto/ |
H A D | sha384-internal.c | 67 unsigned long inlen) 69 return sha512_process(md, in, inlen); 66 sha384_process(struct sha384_state *md, const unsigned char *in, unsigned long inlen) argument
|
H A D | crypto_internal-rsa.c | 73 const u8 *in, size_t inlen, 77 0, in, inlen, out, outlen); 82 const u8 *in, size_t inlen, 86 in, inlen, out, outlen); 91 const u8 *in, size_t inlen, 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
H A D | sha256-internal.c | 145 @param inlen The length of the data (octets) 149 unsigned long inlen) 156 while (inlen > 0) { 157 if (md->curlen == 0 && inlen >= SHA256_BLOCK_SIZE) { 162 inlen -= SHA256_BLOCK_SIZE; 164 n = MIN(inlen, (SHA256_BLOCK_SIZE - md->curlen)); 168 inlen -= n; 148 sha256_process(struct sha256_state *md, const unsigned char *in, unsigned long inlen) argument
|
H A D | sha512-internal.c | 177 @param inlen The length of the data (octets) 181 unsigned long inlen) 188 while (inlen > 0) { 189 if (md->curlen == 0 && inlen >= SHA512_BLOCK_SIZE) { 194 inlen -= SHA512_BLOCK_SIZE; 196 n = MIN(inlen, (SHA512_BLOCK_SIZE - md->curlen)); 200 inlen -= n; 180 sha512_process(struct sha512_state *md, const unsigned char *in, unsigned long inlen) argument
|
/external/wpa_supplicant_8/wpa_supplicant/src/crypto/ |
H A D | sha384-internal.c | 67 unsigned long inlen) 69 return sha512_process(md, in, inlen); 66 sha384_process(struct sha384_state *md, const unsigned char *in, unsigned long inlen) argument
|
H A D | crypto_internal-rsa.c | 73 const u8 *in, size_t inlen, 77 0, in, inlen, out, outlen); 82 const u8 *in, size_t inlen, 86 in, inlen, out, outlen); 91 const u8 *in, size_t inlen, 95 1, in, inlen, out, outlen); 72 crypto_public_key_encrypt_pkcs1_v15(struct crypto_public_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 crypto_private_key_decrypt_pkcs1_v15(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 90 crypto_private_key_sign_pkcs1(struct crypto_private_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument
|
/external/squashfs-tools/squashfs-tools/ |
H A D | lzma_wrapper.c | 86 size_t outlen, inlen = size - LZMA_HEADER_SIZE; local 99 res = LzmaUncompress(dest, &outlen, src + LZMA_HEADER_SIZE, &inlen, src,
|
/external/fio/crc/ |
H A D | sha3.c | 158 unsigned int i, inlen = sctx->partial; local 160 sctx->buf[inlen++] = 0x06; 161 memset(sctx->buf + inlen, 0, sctx->rsiz - inlen);
|
/external/kernel-headers/original/scsi/ |
H A D | scsi_ioctl.h | 27 unsigned int inlen; member in struct:scsi_ioctl_command
|
/external/ltp/testcases/kernel/fs/dmapi/ |
H A D | hole.c | 1539 dm_size_t inlen = 0, outlen; local 1561 DM_NO_TOKEN, inoff, inlen, &outoff, 1586 dm_size_t inlen = 0, outlen; local 1608 DM_NO_TOKEN, inoff, inlen, &outoff, 1632 dm_size_t inlen = 0, outlen; local 1651 inlen, &outoff, &outlen); 1674 dm_size_t inlen = 0, outlen; local 1696 inoff, inlen, &outoff, &outlen); 1720 dm_size_t inlen = 0, outlen; local 1742 inlen, 1766 dm_size_t inlen = 0, outlen; local 1815 dm_size_t inlen = TMP_FILELEN + 1, outlen; local 1861 dm_size_t inlen = 0, outlen; local 1908 dm_size_t inlen = 0; local 1955 dm_size_t inlen = 0, outlen; local 2033 dm_size_t inlen = 0, outlen; local 2112 dm_size_t inlen = TMP_FILELEN - UNALIGNED_BLK_OFF, outlen; local 2192 dm_size_t inlen = local 2279 dm_size_t inlen = local 2366 dm_size_t inlen = 5 * BLK_SIZE, outlen; local 2453 dm_size_t inlen = BLK_SIZE, outlen; local 2505 dm_size_t inlen = 0, outlen; local 2551 dm_size_t inlen = 0, outlen; local 2591 dm_size_t inlen = 0, outlen; local 2613 dm_size_t inlen = 0, outlen; local [all...] |
/external/boringssl/src/crypto/asn1/ |
H A D | tasn_utl.c | 159 int asn1_enc_save(ASN1_VALUE **pval, const unsigned char *in, int inlen, argument 177 enc->enc = OPENSSL_malloc(inlen); 181 OPENSSL_memcpy(enc->enc, in, inlen); 184 enc->len = inlen;
|
/external/wpa_supplicant_8/hostapd/src/tls/ |
H A D | pkcs1.c | 19 const u8 *in, size_t inlen, 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 40 (unsigned long) inlen); 47 ps_len = modlen - inlen - 3; 75 os_memcpy(pos, in, inlen); /* D */ 82 int use_private, const u8 *in, size_t inlen, 89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 98 const u8 *in, size_t inlen, 104 res = crypto_rsa_exptmod(in, inlen, ou 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | rsa.c | 258 * @inlen: Input data length 265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument 279 if (bignum_set_unsigned_bin(tmp, in, inlen) < 0)
|
/external/wpa_supplicant_8/src/tls/ |
H A D | pkcs1.c | 19 const u8 *in, size_t inlen, 35 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 37 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 40 (unsigned long) inlen); 47 ps_len = modlen - inlen - 3; 75 os_memcpy(pos, in, inlen); /* D */ 82 int use_private, const u8 *in, size_t inlen, 89 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 98 const u8 *in, size_t inlen, 104 res = crypto_rsa_exptmod(in, inlen, ou 18 pkcs1_generate_encryption_block(u8 block_type, size_t modlen, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 81 pkcs1_encrypt(int block_type, struct crypto_rsa_key *key, int use_private, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument 97 pkcs1_v15_private_key_decrypt(struct crypto_rsa_key *key, const u8 *in, size_t inlen, u8 *out, size_t *outlen) argument [all...] |
H A D | rsa.c | 258 * @inlen: Input data length 265 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen, argument 279 if (bignum_set_unsigned_bin(tmp, in, inlen) < 0)
|