/external/openssl/crypto/asn1/ |
tasn_utl.c | 165 int asn1_enc_save(ASN1_VALUE **pval, const unsigned char *in, int inlen, 175 enc->enc = OPENSSL_malloc(inlen); 178 memcpy(enc->enc, in, inlen); 179 enc->len = inlen;
|
/external/openssl/crypto/ecdh/ |
ecdh.h | 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
ech_ossl.c | 84 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen)); 110 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen))
|
/external/openssl/include/openssl/ |
ecdh.h | 95 void *(*KDF)(const void *in, size_t inlen, void *out, size_t *outlen));
|
aes.h | 132 const unsigned char *in, unsigned int inlen); 135 const unsigned char *in, unsigned int inlen);
|
/frameworks/base/media/libstagefright/codecs/aacenc/inc/ |
aacenc_core.h | 70 int inlen;
member in struct:__anon9278
|
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_sign_hash.c | 29 @param inlen The length of the digest 37 int ecc_sign_hash(const unsigned char *in, unsigned long inlen, 70 if ((err = mp_read_unsigned_bin(e, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto errnokey; }
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_exptmod.c | 23 @param inlen The length of the input (octets) 30 int rsa_exptmod(const unsigned char *in, unsigned long inlen, 55 if ((err = mp_read_unsigned_bin(tmp, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto error; }
|
/external/openssl/crypto/aes/ |
aes.h | 132 const unsigned char *in, unsigned int inlen); 135 const unsigned char *in, unsigned int inlen);
|
/external/dropbear/libtomcrypt/src/prngs/ |
fortuna.c | 167 @param inlen Length of the data to add 171 int fortuna_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) 181 /* ensure inlen <= 32 */ 182 if (inlen > 32) { 189 tmp[1] = (unsigned char)inlen; 194 if ((err = sha256_process(&prng->fortuna.pool[prng->fortuna.pool_idx], in, inlen)) != CRYPT_OK) { 199 prng->fortuna.pool0_len += inlen; 378 @param inlen Size of the state 382 int fortuna_import(const unsigned char *in, unsigned long inlen, prng_state *prng) 389 if (inlen != 32*FORTUNA_POOLS) [all...] |
/external/wpa_supplicant/ |
sha256.c | 167 unsigned long inlen); 292 @param inlen The length of the data (octets) 296 unsigned long inlen) 304 while (inlen > 0) { 305 if (md->curlen == 0 && inlen >= block_size) { 310 inlen -= block_size; 312 n = MIN(inlen, (block_size - md->curlen)); 316 inlen -= n;
|
crypto.h | 307 * @inlen: Length of plaintext buffer in bytes 317 const u8 *in, size_t inlen, 324 * @inlen: Length of plaintext buffer in bytes 334 const u8 *in, size_t inlen,
|
crypto_internal.c | 454 const u8 *in, size_t inlen, 470 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 472 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 475 (unsigned long) inlen); 482 ps_len = modlen - inlen - 3; 510 os_memcpy(pos, in, inlen); /* D */ 518 const u8 *in, size_t inlen, 525 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 534 const u8 *in, size_t inlen, 538 0, in, inlen, out, outlen) [all...] |
crypto_libtomcrypt.c | 493 const u8 *in, size_t inlen, 509 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 511 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 514 (unsigned long) inlen); 521 ps_len = modlen - inlen - 3; 549 os_memcpy(pos, in, inlen); /* D */ 556 const u8 *in, size_t inlen, 564 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 582 const u8 *in, size_t inlen, 585 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen, [all...] |
/external/wpa_supplicant_6/wpa_supplicant/src/crypto/ |
sha256.c | 170 unsigned long inlen); 295 @param inlen The length of the data (octets) 299 unsigned long inlen) 307 while (inlen > 0) { 308 if (md->curlen == 0 && inlen >= block_size) { 313 inlen -= block_size; 315 n = MIN(inlen, (block_size - md->curlen)); 319 inlen -= n;
|
crypto.h | 308 * @inlen: Length of plaintext buffer in bytes 318 struct crypto_public_key *key, const u8 *in, size_t inlen, 325 * @inlen: Length of encrypted buffer in bytes 335 struct crypto_private_key *key, const u8 *in, size_t inlen, 342 * @inlen: Length of plaintext buffer in bytes 352 const u8 *in, size_t inlen,
|
crypto_libtomcrypt.c | 493 const u8 *in, size_t inlen, 509 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 511 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 514 (unsigned long) inlen); 521 ps_len = modlen - inlen - 3; 549 os_memcpy(pos, in, inlen); /* D */ 556 const u8 *in, size_t inlen, 564 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 582 const u8 *in, size_t inlen, 585 return crypto_rsa_encrypt_pkcs1(2, &key->rsa, PK_PUBLIC, in, inlen, [all...] |
/external/dropbear/libtomcrypt/src/pk/asn1/der/sequence/ |
der_length_sequence.c | 23 @param inlen The number of items 27 int der_length_sequence(ltc_asn1_list *list, unsigned long inlen, 39 for (i = 0; i < inlen; i++) {
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_exptmod.c | 23 @param inlen The length of the input (octets) 30 int katja_exptmod(const unsigned char *in, unsigned long inlen, 55 if ((err = mp_read_unsigned_bin(tmp, (unsigned char *)in, (int)inlen)) != CRYPT_OK) { goto error; }
|
/external/dropbear/libtomcrypt/src/hashes/ |
md2.c | 117 @param inlen The length of the data (octets) 120 int md2_process(hash_state *md, const unsigned char *in, unsigned long inlen) 128 while (inlen > 0) { 129 n = MIN(inlen, (16 - md->md2.curlen)); 133 inlen -= n;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_pkcs.h | 24 int pkcs_1_os2ip(void *n, unsigned char *in, unsigned long inlen);
|
/external/libxml2/include/libxml/ |
DOCBparser.h | 48 int *inlen, int quoteChar);
|
/external/openssl/crypto/evp/ |
pmeth_fn.c | 212 const unsigned char *in, size_t inlen) 226 return ctx->pmeth->encrypt(ctx, out, outlen, in, inlen); 249 const unsigned char *in, size_t inlen) 263 return ctx->pmeth->decrypt(ctx, out, outlen, in, inlen);
|
/external/openssl/apps/ |
pkeyutl.c | 84 unsigned char *in, size_t inlen); 543 unsigned char *in, size_t inlen) 549 rv = EVP_PKEY_verify_recover(ctx, out, poutlen, in, inlen); 553 rv = EVP_PKEY_sign(ctx, out, poutlen, in, inlen); 557 rv = EVP_PKEY_encrypt(ctx, out, poutlen, in, inlen); 561 rv = EVP_PKEY_decrypt(ctx, out, poutlen, in, inlen);
|
/external/zlib/contrib/puff/ |
puff.c | 99 unsigned long inlen; /* available input at in */ member in struct:state 126 if (s->incnt == s->inlen) longjmp(s->env, 1); /* out of input */ 165 if (s->incnt + 4 > s->inlen) return 2; /* not enough input */ 173 if (s->incnt + len > s->inlen) return 2; /* not enough input */ 287 if (s->incnt == s->inlen) longjmp(s->env, 1); /* out of input */ [all...] |