/external/boringssl/src/ssl/ |
H A D | d1_pkt.cc | 379 size_t max_out = len + SSL_max_seal_overhead(ssl); local 382 if (!ssl_write_buffer_init(ssl, &out, max_out) || 383 !dtls_seal_record(ssl, out, &ciphertext_len, max_out, type, buf, len,
|
H A D | dtls_record.cc | 275 int dtls_seal_record(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, argument 279 if (buffers_alias(in, in_len, out, max_out) && 280 (max_out < prefix || out + prefix != in)) { 298 if (max_out < DTLS1_RT_HEADER_LENGTH) { 315 max_out - DTLS1_RT_HEADER_LENGTH, type, wire_version,
|
H A D | s3_pkt.cc | 301 size_t max_out = len + SSL_max_seal_overhead(ssl); local 302 if (max_out < len || max_out + flight_len < max_out) { 306 max_out += flight_len; 310 if (!ssl_write_buffer_init(ssl, &out, max_out)) { 328 max_out - flight_len, type, buf, len)) {
|
H A D | d1_both.cc | 622 size_t *out_len, size_t max_out, 641 if (max_out < sizeof(kChangeCipherSpec) + overhead) { 645 if (!dtls_seal_record(ssl, out, out_len, max_out, 671 if (max_out < DTLS1_HM_HEADER_LENGTH + 1 + overhead || max_out < prefix) { 675 if (todo > max_out - DTLS1_HM_HEADER_LENGTH - overhead) { 676 todo = max_out - DTLS1_HM_HEADER_LENGTH - overhead; 682 size_t max_frag = max_out - prefix, frag_len; 698 if (!dtls_seal_record(ssl, out, out_len, max_out, SSL3_RT_HANDSHAKE, 717 size_t max_out) { 621 seal_next_message(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, const DTLS_OUTGOING_MESSAGE *msg) argument 716 seal_next_packet(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out) argument [all...] |
H A D | s3_both.cc | 216 size_t max_out = in_len + SSL_max_seal_overhead(ssl); local 217 size_t new_cap = ssl->s3->pending_flight->length + max_out; 218 if (max_out < in_len || new_cap < max_out) { 227 &len, max_out, type, in, in_len)) {
|
H A D | ssl_asn1.cc | 524 * explicitly tagged with |tag| of size at most |max_out|. */ 526 CBS *cbs, uint8_t *out, uint8_t *out_len, uint8_t max_out, unsigned tag) { 529 CBS_len(&value) > max_out) { 525 SSL_SESSION_parse_bounded_octet_string( CBS *cbs, uint8_t *out, uint8_t *out_len, uint8_t max_out, unsigned tag) argument
|
H A D | ssl_privkey.cc | 421 SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, uint16_t sigalg, 438 return ssl->cert->key_method->sign_digest(ssl, out, out_len, max_out, md, 443 SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out, 449 ret = ssl->cert->key_method->complete(ssl, out, out_len, max_out); 453 : legacy_sign)(ssl, out, out_len, max_out, sigalg, in, in_len); 459 *out_len = max_out; 480 SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out, 486 ret = ssl->cert->key_method->complete(ssl, out, out_len, max_out); 488 ret = ssl->cert->key_method->decrypt(ssl, out, out_len, max_out, in, 504 if (!RSA_decrypt(rsa, out_len, out, max_out, i 420 legacy_sign( SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, uint16_t sigalg, const uint8_t *in, size_t in_len) argument 442 ssl_private_key_sign( SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out, uint16_t sigalg, const uint8_t *in, size_t in_len) argument 479 ssl_private_key_decrypt( SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *in, size_t in_len) argument [all...] |
H A D | ssl_session.cc | 414 size_t max_out) { 416 if (max_out == 0) { 419 if (max_out > (size_t)session->master_key_length) { 420 max_out = (size_t)session->master_key_length; 422 OPENSSL_memcpy(out, session->master_key, max_out); 423 return max_out; 674 const size_t max_out = session_len + max_overhead; local 675 if (max_out < max_overhead) { 681 if (!CBB_reserve(out, &ptr, max_out)) { 686 if (!method->seal(ssl, ptr, &out_len, max_out, session_bu 413 SSL_SESSION_get_master_key(const SSL_SESSION *session, uint8_t *out, size_t max_out) argument [all...] |
H A D | ssl_lib.cc | 1045 size_t max_out) { 1047 OPENSSL_memset(out, 0, max_out); 1071 if (finished_len > max_out) { 1072 *out_len = max_out; 1791 size_t SSL_get_tls_channel_id(SSL *ssl, uint8_t *out, size_t max_out) { argument 1796 (max_out < 64) ? max_out : 64); 2316 size_t SSL_get_client_random(const SSL *ssl, uint8_t *out, size_t max_out) { argument 2317 if (max_out == 0) { 2320 if (max_out > sizeo 1044 SSL_get_tls_unique(const SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out) argument 2327 SSL_get_server_random(const SSL *ssl, uint8_t *out, size_t max_out) argument [all...] |
/external/mesa3d/src/mesa/drivers/dri/nouveau/ |
H A D | nouveau_render_t.c | 158 unsigned max_out; local 163 max_out = MAX_OUT_I32; 167 max_out = MAX_OUT_I16; 171 max_out = MAX_OUT_I16; 176 max_out = 0; 180 max_out = MAX_OUT_L; 183 return MAX2(0, n - 7) * max_out * MAX_PACKET / (1 + MAX_PACKET);
|
/external/boringssl/src/crypto/base64/ |
H A D | base64.c | 393 int EVP_DecodeBase64(uint8_t *out, size_t *out_len, size_t max_out, argument 403 max_out < max_len) {
|
/external/icu/icu4c/source/test/intltest/ |
H A D | punyref.c | 135 punycode_uint n, delta, h, b, out, max_out, bias, j, m, q, k, t; local 141 max_out = *output_length; 148 if (max_out - out < 2) return punycode_big_output; 193 if (out >= max_out) return punycode_big_output; 224 punycode_uint n, out, i, max_out, bias, local 231 max_out = *output_length; 239 if (b > max_out) return punycode_big_output; 286 if (out >= max_out) return punycode_big_output;
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
H A D | padding.c | 97 size_t max_out, const uint8_t *from, 138 if (from_len - pad > max_out) { 191 size_t max_out, const uint8_t *from, 242 if (msg_len > max_out) { 244 * |max_out| as the key size and |from_len| is bounded by the key size. */ 385 size_t max_out, const uint8_t *from, 462 if (max_out < mlen) { 96 RSA_padding_check_PKCS1_type_1(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *from, size_t from_len) argument 190 RSA_padding_check_PKCS1_type_2(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *from, size_t from_len) argument 384 RSA_padding_check_PKCS1_OAEP_mgf1(uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *from, size_t from_len, const uint8_t *param, size_t param_len, const EVP_MD *md, const EVP_MD *mgf1md) argument
|
H A D | rsa_impl.c | 116 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, argument 129 if (max_out < rsa_size) { 322 size_t max_out, const uint8_t *in, size_t in_len, 328 if (max_out < rsa_size) { 371 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, argument 377 if (max_out < rsa_size) { 436 int RSA_verify_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, argument 446 if (max_out < rsa_size) { 321 rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, const uint8_t *in, size_t in_len, int padding) argument
|
H A D | rsa.c | 211 int RSA_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, argument 214 return rsa->meth->sign_raw(rsa, out_len, out, max_out, in, in_len, padding); 217 return rsa_default_sign_raw(rsa, out_len, out, max_out, in, in_len, padding); 235 int RSA_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, argument 238 return rsa->meth->decrypt(rsa, out_len, out, max_out, in, in_len, padding); 241 return rsa_default_decrypt(rsa, out_len, out, max_out, in, in_len, padding); 461 int RSA_sign_pss_mgf1(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, argument 478 RSA_sign_raw(rsa, out_len, out, max_out, padded, padded_len,
|
/external/boringssl/src/crypto/pkcs8/ |
H A D | pkcs8.c | 495 size_t max_out = plaintext_len + EVP_CIPHER_CTX_block_size(&ctx); local 496 if (max_out < plaintext_len) { 505 !CBB_reserve(&ciphertext, &ptr, max_out) ||
|
/external/libopus/tests/ |
H A D | test_opus_api.c | 1436 #define max_out (1276*48+48*2+2) macro 1447 packet=malloc(max_out); 1449 memset(packet,0,max_out); 1450 po=malloc(max_out+256); 1541 ret=opus_repacketizer_out_range(rp,0,rcnt*i,po,max_out); 1593 i=opus_repacketizer_out(rp,po,max_out); 1596 i=opus_repacketizer_out_range(rp,0,1,po,max_out); 1599 i=opus_repacketizer_out_range(rp,1,2,po,max_out); 1611 i=opus_repacketizer_out(rp,po,max_out); 1623 i=opus_repacketizer_out(rp,po,max_out); [all...] |
/external/mesa3d/src/gallium/drivers/nouveau/nv50/ |
H A D | nv50_program.h | 66 ubyte max_out; /* REG_ALLOC_RESULT or FP_RESULT_COUNT */ member in struct:nv50_program
|
/external/boringssl/src/ssl/test/ |
H A D | bssl_shim.cc | 298 SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, 376 SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, 404 SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out) { 418 if (max_out < test_state->private_key_result.size()) { 1293 static int DoRead(SSL *ssl, uint8_t *out, size_t max_out) { argument 1304 ret = config->peek_then_read ? SSL_peek(ssl, out, max_out) 1305 : SSL_read(ssl, out, max_out); 297 AsyncPrivateKeySign( SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, uint16_t signature_algorithm, const uint8_t *in, size_t in_len) argument 375 AsyncPrivateKeyDecrypt( SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, const uint8_t *in, size_t in_len) argument 403 AsyncPrivateKeyComplete( SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out) argument
|
/external/v8/src/regexp/ |
H A D | regexp-parser.cc | 917 // Returns true if parsing succeeds, and set the min_out and max_out 919 bool RegExpParser::ParseIntervalQuantifier(int* min_out, int* max_out) { argument 974 *max_out = max;
|
/external/conscrypt/common/src/jni/main/cpp/ |
H A D | NativeCrypto.cpp | 603 size_t max_out, 652 if (max_out < expected_size) { 670 size_t max_out, 699 if (max_out < cleartextBytes.size()) { 600 RsaMethodSignRaw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument 667 RsaMethodDecrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, const uint8_t* in, size_t in_len, int padding) argument
|