/external/wpa_supplicant_8/src/utils/ |
base64.h | 13 size_t *out_len); 15 size_t *out_len); 17 size_t *out_len, int add_pad); 19 size_t *out_len);
|
base64.c | 22 size_t *out_len, 80 if (out_len) 81 *out_len = pos - out; 87 size_t *out_len, 151 *out_len = pos - out; 160 * @out_len: Pointer to output length variable, or %NULL if not used 161 * Returns: Allocated buffer of out_len bytes of encoded data, 166 * not included in out_len. 169 size_t *out_len) 171 return base64_gen_encode(src, len, out_len, base64_table, 1) [all...] |
/external/boringssl/src/crypto/bio/ |
printf.c | 69 int out_len, ret; local 72 out_len = vsnprintf(buf, sizeof(buf), format, args); 78 if (out_len < 0) { 80 out_len = _vscprintf(format, args); 82 assert(out_len >= (int)sizeof(buf)); 86 if (out_len < 0) { 90 if ((size_t) out_len >= sizeof(buf)) { 91 const int requested_len = out_len; 102 out_len = vsnprintf(out, requested_len + 1, format, args); 104 assert(out_len == requested_len) [all...] |
/external/boringssl/src/crypto/ecdh_extra/ |
ecdh_extra.c | 80 int ECDH_compute_key(void *out, size_t out_len, const EC_POINT *pub_key, 83 size_t *out_len)) { 106 if (kdf(buf, buf_len, out, &out_len) == NULL) { 112 if (buf_len < out_len) { 113 out_len = buf_len; 115 OPENSSL_memcpy(out, buf, out_len); 118 if (out_len > INT_MAX) { 123 return (int)out_len;
|
/external/boringssl/src/include/openssl/ |
base64.h | 84 // EVP_EncodedLength sets |*out_len| to the number of bytes that will be needed 88 OPENSSL_EXPORT int EVP_EncodedLength(size_t *out_len, size_t len); 93 // EVP_DecodedLength sets |*out_len| to the maximum number of bytes that will 97 OPENSSL_EXPORT int EVP_DecodedLength(size_t *out_len, size_t len); 100 // |*out_len| bytes to |out|. |max_out| is the size of the output 103 OPENSSL_EXPORT int EVP_DecodeBase64(uint8_t *out, size_t *out_len, 123 // version of them to |out| and sets |*out_len| to the number of bytes written. 127 int *out_len, const uint8_t *in, 131 // sets |*out_len| to the number of bytes written. 133 int *out_len); [all...] |
hkdf.h | 29 // |secret| with |salt| and |info| using |digest|, and outputs |out_len| bytes 35 OPENSSL_EXPORT int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 42 // |out_len| bytes to |out_key|. The maximum output size is |EVP_MAX_MD_SIZE|. 44 OPENSSL_EXPORT int HKDF_extract(uint8_t *out_key, size_t *out_len, 50 // |out_len| from the PRK |prk| and info |info| using |digest|, and outputs 52 OPENSSL_EXPORT int HKDF_expand(uint8_t *out_key, size_t out_len,
|
ecdh.h | 93 // |priv_key| and hashes it with the appropriate SHA function for |out_len|. The 94 // only value values for |out_len| are thus 24 (SHA-224), 32 (SHA-256), 48 104 OPENSSL_EXPORT int ECDH_compute_key_fips(uint8_t *out, size_t out_len,
|
/external/boringssl/src/crypto/fipsmodule/tls/ |
kdf.c | 64 // section 5. It XORs |out_len| bytes to |out|, using |md| as the hash and 67 static int tls1_P_hash(uint8_t *out, size_t out_len, 98 (out_len > chunk && !HMAC_CTX_copy_ex(&ctx_tmp, &ctx)) || 108 if (len > out_len) { 109 len = out_len; 115 out_len -= len; 117 if (out_len == 0) { 138 uint8_t *out, size_t out_len, 143 if (out_len == 0) { 147 OPENSSL_memset(out, 0, out_len); [all...] |
internal.h | 25 // tls1_prf calculates |out_len| bytes of the TLS PDF, using |digest|, and 28 uint8_t *out, size_t out_len,
|
/external/boringssl/src/crypto/hkdf/ |
hkdf.c | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, 54 *out_len = len; 55 assert(*out_len == EVP_MD_size(digest)); 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, 71 n = (out_len + digest_len - 1) / digest_len; 72 if (out_len + digest_len < out_len || n > 255) { 97 if (done + todo > out_len) { [all...] |
/external/speex/libspeexdsp/ |
testresample.c | 62 spx_uint32_t out_len; local 69 out_len = 2*NN; 72 speex_resampler_process_float(st, 0, fin, &in_len, fout, &out_len); 73 for (i=0;i<out_len;i++) 75 /*speex_warning_int("writing", out_len);*/ 76 fwrite(out, sizeof(short), out_len, stdout);
|
/external/harfbuzz_ng/src/ |
hb-buffer.hh | 110 unsigned int out_len; /* Length of ->out array if have_output */ member in struct:hb_buffer_t 184 hb_glyph_info_t &prev () { return out_info[out_len ? out_len - 1 : 0]; } 185 hb_glyph_info_t prev () const { return out_info[out_len ? out_len - 1 : 0]; } 193 unsigned int backtrack_len () const { return have_output? out_len : idx; } 217 if (unlikely (out_info != info || out_len != idx)) { 219 out_info[out_len] = info[idx]; 221 out_info[out_len].codepoint = glyph_index; 224 out_len++ [all...] |
/external/boringssl/src/crypto/base64/ |
base64_test.cc | 208 int out_len; local 209 EVP_EncodeUpdate(&ctx, out, &out_len, 212 size_t total = out_len; 214 EVP_EncodeFinal(&ctx, out + total, &out_len); 215 total += out_len; 224 int out_len; local 226 int ret = EVP_DecodeUpdate(&ctx, out, &out_len, 230 total = out_len; 231 ret = EVP_DecodeFinal(&ctx, out + total, &out_len); 232 total += out_len; 260 size_t out_len = 0; local [all...] |
base64.c | 104 int EVP_EncodedLength(size_t *out_len, size_t len) { 121 *out_len = len; 129 void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, 133 *out_len = 0; 172 *out_len = 0; 186 // We cannot signal an error, but we can at least avoid making *out_len 190 *out_len = (int)total; 193 void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len) { 195 *out_len = 0; 207 *out_len = (int)encoded [all...] |
/bionic/libc/kernel/uapi/linux/ |
mic_ioctl.h | 27 __u32 out_len; member in struct:mic_copy_desc
|
/external/kernel-headers/original/uapi/linux/ |
mic_ioctl.h | 34 * @out_len: The aggregate of the total length written to or read from 46 __u32 out_len; member in struct:mic_copy_desc
|
/external/ltp/testcases/kernel/device-drivers/dev_sim_framework/kernel_space/ |
tmod.h | 61 int out_len; // output data length member in struct:tmod_interface
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.h | 23 int server_random_first, u8 *out, size_t out_len); 25 const u8 *in_data, size_t in_len, size_t *out_len); 28 u8 *out_data, size_t out_len); 31 u8 *out_data, size_t out_len);
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
internal.h | 75 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 94 int RSA_padding_check_PKCS1_type_1(uint8_t *out, size_t *out_len, 99 int RSA_padding_check_PKCS1_type_2(uint8_t *out, size_t *out_len, 102 int RSA_padding_check_PKCS1_OAEP_mgf1(uint8_t *out, size_t *out_len,
|
/external/boringssl/src/crypto/cmac/ |
cmac_test.cc | 56 size_t out_len; local 57 ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len)); 58 EXPECT_EQ(Bytes(expected, sizeof(out)), Bytes(out, out_len)); 69 size_t out_len; local 70 ASSERT_TRUE(CMAC_Final(ctx2.get(), out, &out_len)); 71 EXPECT_EQ(Bytes(expected, sizeof(out)), Bytes(out, out_len)); 162 size_t out_len; 163 ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len)); 165 out_len = std::min(out_len, tag_len) [all...] |
/external/boringssl/src/crypto/fipsmodule/cipher/ |
cipher.c | 240 int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, 249 *out_len = i; 255 *out_len = 0; 261 *out_len = in_len; 264 *out_len = 0; 276 *out_len = 0; 287 *out_len = bl; 290 *out_len = 0; 299 *out_len += in_len; 309 int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len) { [all...] |
/external/grpc-grpc/src/core/lib/http/ |
format_request.cc | 76 size_t out_len; local 99 tmp = gpr_strvec_flatten(&out, &out_len); 103 tmp = static_cast<char*>(gpr_realloc(tmp, out_len + body_size)); 104 memcpy(tmp + out_len, body_bytes, body_size); 105 out_len += body_size; 108 return grpc_slice_new(tmp, out_len, gpr_free);
|
/external/u-boot/fs/btrfs/ |
compression.c | 16 size_t out_len; local 44 out_len = dlen; 45 ret = lzo1x_decompress_safe(cbuf, in_len, dbuf, &out_len); 51 dbuf += out_len; 52 dlen -= out_len; 54 res += out_len;
|
/external/webrtc/webrtc/base/ |
transformadapter.cc | 65 size_t out_len = buffer_len; local 67 buffer, &out_len, 71 // Note: Don't signal SR_EOS this iteration, unless out_len is zero 77 } else if ((out_len == 0) && (state_ == ST_FLUSHING)) { 88 if (out_len == 0) 92 *read = out_len; 115 size_t out_len = sizeof(buffer_) - len_; local 117 buffer_ + len_, &out_len, 131 len_ = out_len;
|
/external/ltp/testcases/kernel/device-drivers/base/user_base/ |
tbase_ki.c | 55 tif.out_len = 0;
|