/system/core/include/cutils/ |
H A D | jstring.h | 36 extern char16_t * strdup8to16 (const char* s, size_t *out_len); 38 extern char16_t * strcpy8to16 (char16_t *dest, const char*s, size_t *out_len); 40 size_t *out_len);
|
/system/core/libcutils/include/cutils/ |
H A D | jstring.h | 36 extern char16_t * strdup8to16 (const char* s, size_t *out_len); 38 extern char16_t * strcpy8to16 (char16_t *dest, const char*s, size_t *out_len); 40 size_t *out_len);
|
/system/core/libcutils/include_vndk/cutils/ |
H A D | jstring.h | 36 extern char16_t * strdup8to16 (const char* s, size_t *out_len); 38 extern char16_t * strcpy8to16 (char16_t *dest, const char*s, size_t *out_len); 40 size_t *out_len);
|
/system/core/libcutils/ |
H A D | strdup8to16.cpp | 40 * out_len is an out parameter (which may not be null) containing the 44 extern char16_t * strdup8to16 (const char* s, size_t *out_len) argument 60 return strcpy8to16 (ret, s, out_len); 148 * out_len is an out parameter (which may not be null) containing the 153 size_t *out_len) 175 *out_len = dest - utf16Str; 182 * out_len is an out parameter (which may not be null) containing the 187 int length, size_t *out_len) 212 *out_len = dest - utf16Str; 152 strcpy8to16(char16_t *utf16Str, const char*utf8Str, size_t *out_len) argument 186 strcpylen8to16(char16_t *utf16Str, const char*utf8Str, int length, size_t *out_len) argument
|
/system/libufdt/include/ |
H A D | libufdt.h | 73 * Also writes the length of such data to *out_len if out_len is not NULL. 78 char *ufdt_node_get_fdt_prop_data(const struct ufdt_node *node, int *out_len); 93 int *out_len); 95 const char *name, int *out_len);
|
/system/keymaster/km_openssl/ |
H A D | ckdf.cpp | 105 size_t out_len; local 107 if (!CMAC_Final(ctx.get(), output_pos, &out_len)) return TranslateLastOpenSslError(); 108 output_pos += out_len; 111 if (!CMAC_Final(ctx.get(), cmac, &out_len)) return TranslateLastOpenSslError();
|
/system/libufdt/ |
H A D | ufdt_node.c | 115 char *ufdt_node_get_fdt_prop_data(const struct ufdt_node *node, int *out_len) { argument 120 if (out_len != NULL) { 121 *out_len = fdt32_to_cpu(prop->len); 128 int *out_len) { 130 ufdt_node_get_property_by_name_len(node, name, len), out_len); 134 const char *name, int *out_len) { 136 out_len); 126 ufdt_node_get_fdt_prop_data_by_name_len(const struct ufdt_node *node, const char *name, int len, int *out_len) argument 133 ufdt_node_get_fdt_prop_data_by_name(const struct ufdt_node *node, const char *name, int *out_len) argument
|
/system/security/keystore/ |
H A D | blob.cpp | 77 int out_len; local 79 EVP_EncryptUpdate(ctx.get(), out_pos, &out_len, in, len); 80 out_pos += out_len; 81 EVP_EncryptFinal_ex(ctx.get(), out_pos, &out_len); 82 out_pos += out_len; 111 int out_len; local 113 EVP_DecryptUpdate(ctx.get(), out_pos, &out_len, in, len); 114 out_pos += out_len; 115 if (!EVP_DecryptFinal_ex(ctx.get(), out_pos, &out_len)) { 119 out_pos += out_len; [all...] |
/system/keymaster/include/keymaster/legacy_support/ |
H A D | keymaster1_engine.h | 103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
|
/system/iot/attestation/atap/ops/ |
H A D | openssl_ops.cpp | 161 size_t out_len = len + ATAP_GCM_TAG_LEN; local 164 &out_len, 206 size_t out_len = len; local 209 &out_len,
|
/system/keymaster/legacy_support/ |
H A D | keymaster1_engine.cpp | 284 int Keymaster1Engine::rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, argument 303 *out_len = std::min(output.data_length, max_out); 304 memcpy(out, output.data, *out_len); 309 int Keymaster1Engine::rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, argument 328 *out_len = std::min(output.data_length, max_out); 329 memcpy(out, output.data, *out_len);
|
/system/netd/server/ |
H A D | NetdNativeService.cpp | 280 size_t out_len; local 281 if (EVP_DecodedLength(&out_len, input.size()) != 1) { 284 // out_len is now an upper bound on the output length. 285 decoded.resize(out_len); 286 if (EVP_DecodeBase64(decoded.data(), &out_len, decoded.size(), 289 decoded.resize(out_len); 293 if (out_len != SHA256_SIZE) {
|
/system/nfc/src/nfc/ndef/ |
H A D | ndef_utils.cc | 1312 uint32_t out_len, max_out_len; local 1328 NDEF_MsgInit(p_dest, max_out_len, &out_len); 1342 status = NDEF_MsgAppendPayload(p_dest, max_out_len, &out_len, 1346 p_prev_rec = p_dest + out_len; 1348 status = NDEF_MsgAddRec(p_dest, max_out_len, &out_len, tnf, p_type, 1355 *p_out_len = out_len;
|
/system/netd/tests/ |
H A D | binder_test.cpp | 822 size_t out_len; local 823 EXPECT_EQ(1, EVP_EncodedLength(&out_len, input.size())); 824 // out_len includes the trailing NULL. 825 uint8_t output_bytes[out_len]; 826 EXPECT_EQ(out_len - 1, EVP_EncodeBlock(output_bytes, input.data(), input.size()));
|
H A D | netd_test.cpp | 741 size_t out_len; local 742 EXPECT_EQ(1, EVP_EncodedLength(&out_len, input.size())); 743 // out_len includes the trailing NULL. 744 uint8_t output_bytes[out_len]; 745 EXPECT_EQ(out_len - 1, EVP_EncodeBlock(output_bytes, input.data(), input.size()));
|