HomeSort by relevance Sort by last modified time
    Searched refs:in_data (Results 1 - 25 of 62) sorted by null

1 2 3

  /external/liblzf/
lzf.h 53 * in_data and write the result to out_data, up to a maximum length
77 lzf_compress (const void *const in_data, unsigned int in_len,
82 * function and stored at location in_data and length in_len. The result
96 lzf_decompress (const void *const in_data, unsigned int in_len,
  /external/liblzf/src/org/liblzf/
CLZF.java 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len)
169 int hval = FRST (in_data,iidx);
177 hval = NEXT (hval, in_data,iidx);
185 && in_data[reference+0] == in_data[iidx+0]
186 && in_data[reference+1] == in_data[iidx+1]
187 && in_data[reference+2] == in_data[iidx+2]
200 while (len < maxlen && in_data[reference+len] == in_data[iidx+len])
    [all...]
  /external/chromium/chrome/browser/sync/util/
data_encryption.h 18 bool DecryptData(const vector<uint8>& in_data, string* out_data);
data_encryption.cc 37 bool DecryptData(const vector<uint8>& in_data, string* out_data) {
40 (in_data.empty() ? NULL : const_cast<BYTE*>(&in_data[0]));
41 encrypted_data.cbData = in_data.size();
  /external/webrtc/src/common_audio/signal_processing/
splitting_filter.c 34 // - in_data : Input data sequence (Q10)
46 void WebRtcSpl_AllPassQMF(WebRtc_Word32* in_data, const WebRtc_Word16 data_length,
58 // The filter state contains the in_data state, in_data[-1], followed by
60 // The first cascade filter will filter the |in_data| and store the output in
62 // intermediate storage in |in_data|, to save memory. The third, and final, cascade
63 // filter operation takes the |in_data| (which is the output from the previous cascade
68 // First all-pass cascade; filter from in_data to out_data.
75 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[0], filter_state[1]); // = (x[0] - y_1[-1])
82 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[k], out_data[k - 1]); // = (x[n] - y_1[n-1]
    [all...]
  /external/webrtc/src/modules/audio_processing/
splitting_filter.cc 16 void SplittingFilterAnalysis(const WebRtc_Word16* in_data,
22 WebRtcSpl_AnalysisQMF(in_data, low_band, high_band, filter_state1, filter_state2);
splitting_filter.h 24 * - in_data : super-wb audio signal
34 void SplittingFilterAnalysis(const WebRtc_Word16* in_data,
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_record.c 234 * @in_data: Received data
236 * @out_data: Buffer for output data (must be at least as long as in_data)
246 const u8 *in_data, size_t in_len,
255 in_data, in_len);
265 "length %d", in_data[0], in_data[1], in_data[2],
266 WPA_GET_BE16(in_data + 3));
268 if (in_data[0] != TLS_CONTENT_TYPE_HANDSHAKE &&
269 in_data[0] != TLS_CONTENT_TYPE_CHANGE_CIPHER_SPEC &
    [all...]
tlsv1_client.h 30 const u8 *in_data, size_t in_len,
34 const u8 *in_data, size_t in_len,
37 const u8 *in_data, size_t in_len,
tlsv1_server.h 30 const u8 *in_data, size_t in_len, size_t *out_len);
32 const u8 *in_data, size_t in_len,
35 const u8 *in_data, size_t in_len,
tlsv1_client_read.c 28 const u8 *in_data, size_t *in_len);
30 const u8 *in_data, size_t *in_len);
32 const u8 *in_data, size_t *in_len);
36 const u8 *in_data, size_t *in_len)
50 pos = in_data;
199 *in_len = end - in_data;
214 const u8 *in_data, size_t *in_len)
230 pos = in_data;
254 return tls_process_server_key_exchange(conn, ct, in_data,
257 return tls_process_certificate_request(conn, ct, in_data,
    [all...]
  /external/liblzf/cs/
CLZF.cs 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len)
169 UInt32 hval = FRST (in_data,iidx);
177 hval = NEXT (hval, in_data,iidx);
185 && in_data[reference+0] == in_data[iidx+0]
186 && in_data[reference+1] == in_data[iidx+1]
187 && in_data[reference+2] == in_data[iidx+2]
200 while (len < maxlen && in_data[reference+len] == in_data[iidx+len])
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_internal.c 326 const struct wpabuf *in_data,
329 return tls_connection_handshake2(tls_ctx, conn, in_data, appl_data,
336 const struct wpabuf *in_data,
350 in_data ? wpabuf_head(in_data) : NULL,
351 in_data ? wpabuf_len(in_data) : 0,
380 const struct wpabuf *in_data,
394 res = tlsv1_server_handshake(conn->server, wpabuf_head(in_data),
395 wpabuf_len(in_data), &res_len)
    [all...]
tls_none.c 98 const struct wpabuf *in_data,
107 const struct wpabuf *in_data,
116 const struct wpabuf *in_data)
124 const struct wpabuf *in_data)
tls.h 316 * @in_data: Input data from TLS server
326 * in_data == %NULL and the library is expected to return ClientHello packet.
328 * to TLS library by calling this function again with in_data pointing to the
341 const struct wpabuf *in_data,
346 const struct wpabuf *in_data,
354 * @in_data: Input data from TLS peer
362 const struct wpabuf *in_data,
369 * @in_data: Plaintext data to be encrypted
378 const struct wpabuf *in_data);
384 * @in_data: Encrypted TLS dat
    [all...]
tls_nss.c 448 const struct wpabuf *in_data,
454 in_data ? (unsigned int) wpabuf_len(in_data) : 0);
459 if (in_data && wpabuf_len(in_data) > 0) {
466 conn->pull_buf = os_malloc(wpabuf_len(in_data));
469 os_memcpy(conn->pull_buf, wpabuf_head(in_data),
470 wpabuf_len(in_data));
472 conn->pull_buf_len = wpabuf_len(in_data);
495 const struct wpabuf *in_data,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_tls_common.h 106 struct eap_ssl_data *data, const u8 *in_data, size_t in_len,
110 u8 id, const u8 *in_data, size_t in_len,
126 const struct wpabuf *in_data,
130 const struct wpabuf *in_data,
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.h 24 const u8 *in_data, size_t in_len,
28 const u8 *in_data, size_t in_len,
31 const u8 *in_data, size_t in_len,
tlsv1_server.h 24 const u8 *in_data, size_t in_len, size_t *out_len);
26 const u8 *in_data, size_t in_len,
29 const u8 *in_data, size_t in_len,
tlsv1_record.c 266 * @in_data: Received data
268 * @out_data: Buffer for output data (must be at least as long as in_data)
272 * Returns: Number of bytes used from in_data on success, 0 if record was not
279 const u8 *in_data, size_t in_len,
294 in_data, in_len);
298 ct = in_data[0];
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
308 if (in_data[1] != 0x03)
    [all...]
tlsv1_client_read.c 23 const u8 *in_data, size_t *in_len);
25 const u8 *in_data, size_t *in_len);
27 const u8 *in_data, size_t *in_len);
31 const u8 *in_data, size_t *in_len)
46 pos = in_data;
200 *in_len = end - in_data;
215 const u8 *in_data, size_t *in_len)
231 pos = in_data;
255 return tls_process_server_key_exchange(conn, ct, in_data,
258 return tls_process_certificate_request(conn, ct, in_data,
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_internal.c 335 const u8 *in_data, size_t in_len,
346 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
347 __func__, in_data, (unsigned long) in_len);
348 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len,
358 const u8 *in_data, size_t in_len,
366 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
367 __func__, in_data, (unsigned long) in_len);
368 out = tlsv1_server_handshake(conn->server, in_data, in_len, out_len);
381 const u8 *in_data, size_t in_len,
386 return tlsv1_client_encrypt(conn->client, in_data, in_len
    [all...]
tls_none.c 111 const u8 *in_data, size_t in_len,
121 const u8 *in_data, size_t in_len,
129 const u8 *in_data, size_t in_len,
137 const u8 *in_data, size_t in_len,
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.h 86 u8 id, const u8 *in_data, size_t in_len,
102 const struct wpabuf *in_data,
106 const struct wpabuf *in_data,
eap_tls_common.c 309 * @in_data: Next incoming TLS segment
314 const struct wpabuf *in_data)
319 in_len = in_data ? wpabuf_len(in_data) : 0;
357 if (in_data)
358 wpabuf_put_buf(data->tls_in, in_data);
374 * @in_data: Next incoming TLS segment
384 struct eap_ssl_data *data, const struct wpabuf *in_data,
389 if (data->tls_in_left > wpabuf_len(in_data) || data->tls_in) {
391 int res = eap_peer_tls_reassemble_fragment(data, in_data);
    [all...]

Completed in 271 milliseconds

1 2 3