HomeSort by relevance Sort by last modified time
    Searched refs:in_len (Results 1 - 25 of 54) sorted by null

1 2 3

  /external/liblzf/
lzf.h 52 * Compress in_len bytes stored at the memory block starting at
58 * more than in_len (but less than 104% of the original size), so it
59 * makes sense to always use out_len == in_len - 1), to ensure _some_
77 lzf_compress (const void *const in_data, unsigned int in_len,
82 * function and stored at location in_data and length in_len. The result
96 lzf_decompress (const void *const in_data, unsigned int in_len,
  /external/chromium/third_party/libjingle/source/talk/session/phone/
srtpfilter.h 72 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len);
73 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len);
76 bool UnprotectRtp(void* data, int in_len, int* out_len);
77 bool UnprotectRtcp(void* data, int in_len, int* out_len);
120 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len);
121 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len);
124 bool UnprotectRtp(void* data, int in_len, int* out_len);
125 bool UnprotectRtcp(void* data, int in_len, int* out_len);
srtpfilter.cc 123 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) {
128 return send_session_.ProtectRtp(p, in_len, max_len, out_len);
131 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) {
136 return send_session_.ProtectRtcp(p, in_len, max_len, out_len);
139 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) {
144 return recv_session_.UnprotectRtp(p, in_len, out_len);
147 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) {
152 return recv_session_.UnprotectRtcp(p, in_len, out_len);
271 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) {
277 int need_len = in_len + rtp_auth_tag_len_; // NOLIN
    [all...]
  /external/wpa_supplicant_6/wpa_supplicant/src/tls/
tlsv1_record.c 235 * @in_len: Length of the received data
246 const u8 *in_data, size_t in_len,
255 in_data, in_len);
257 if (in_len < TLS_RECORD_HEADER_LEN) {
258 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu)",
259 (unsigned long) in_len);
296 in_len -= TLS_RECORD_HEADER_LEN;
298 if (rlen > in_len) {
300 "(rlen=%lu > in_len=%lu)",
301 (unsigned long) rlen, (unsigned long) in_len);
    [all...]
tlsv1_client.h 30 const u8 *in_data, size_t in_len,
34 const u8 *in_data, size_t in_len,
37 const u8 *in_data, size_t in_len,
tlsv1_server.h 30 const u8 *in_data, size_t in_len, size_t *out_len);
32 const u8 *in_data, size_t in_len,
35 const u8 *in_data, size_t in_len,
tlsv1_client_read.c 28 const u8 *in_data, size_t *in_len);
30 const u8 *in_data, size_t *in_len);
32 const u8 *in_data, size_t *in_len);
36 const u8 *in_data, size_t *in_len)
51 left = *in_len;
199 *in_len = end - in_data;
214 const u8 *in_data, size_t *in_len)
231 left = *in_len;
255 in_len);
258 in_len);
    [all...]
tlsv1_client.c 125 * @in_len: Input data length
132 const u8 *in_data, size_t in_len,
142 if (in_len)
147 if (in_data == NULL || in_len == 0)
151 end = in_data + in_len;
152 in_msg = os_malloc(in_len);
158 in_msg_len = in_len;
213 * @in_len: Input buffer length
222 const u8 *in_data, size_t in_len,
228 in_data, in_len);
    [all...]
tlsv1_server.c 107 * @in_len: Input data length
112 const u8 *in_data, size_t in_len,
119 if (in_data == NULL || in_len == 0) {
125 end = in_data + in_len;
126 in_msg = os_malloc(in_len);
132 in_msg_len = in_len;
187 * @in_len: Input buffer length
196 const u8 *in_data, size_t in_len,
202 in_data, in_len);
204 os_memcpy(out_data + TLS_RECORD_HEADER_LEN, in_data, in_len);
    [all...]
tlsv1_server_read.c 29 const u8 *in_data, size_t *in_len);
32 size_t *in_len);
36 const u8 *in_data, size_t *in_len)
54 left = *in_len;
251 *in_len = end - in_data;
268 const u8 *in_data, size_t *in_len)
285 left = *in_len;
319 in_len);
461 *in_len = end - in_data;
675 const u8 *in_data, size_t *in_len)
    [all...]
  /system/extras/libublock/
ublock.c 69 const void *in, size_t in_len,
79 if (in_len != sizeof(*in_h))
105 const void *in, size_t in_len,
114 if (in_len != sizeof(struct ublock_ready_in))
125 const void *in, size_t in_len,
136 if (in_len != sizeof(*in_h))
155 const void *in, size_t in_len,
166 if (in_len < sizeof(*in_h))
181 const void *in, size_t in_len,
199 if (in_len < sizeof(*in_h)
242 ssize_t in_len, out_wrote; local
276 size_t in_len, out_len; local
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.h 24 const u8 *in_data, size_t in_len,
28 const u8 *in_data, size_t in_len,
31 const u8 *in_data, size_t in_len,
tlsv1_server.h 24 const u8 *in_data, size_t in_len, size_t *out_len);
26 const u8 *in_data, size_t in_len,
29 const u8 *in_data, size_t in_len,
tlsv1_record.c 267 * @in_len: Length of the received data
279 const u8 *in_data, size_t in_len,
289 if (in_len < TLS_RECORD_HEADER_LEN) {
290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - "
292 (unsigned long) in_len);
294 in_data, in_len);
324 in_len -= TLS_RECORD_HEADER_LEN;
326 if (rlen > in_len) {
328 "(rlen=%lu > in_len=%lu)",
329 (unsigned long) rlen, (unsigned long) in_len);
    [all...]
tlsv1_client_read.c 23 const u8 *in_data, size_t *in_len);
25 const u8 *in_data, size_t *in_len);
27 const u8 *in_data, size_t *in_len);
31 const u8 *in_data, size_t *in_len)
47 left = *in_len;
200 *in_len = end - in_data;
215 const u8 *in_data, size_t *in_len)
232 left = *in_len;
256 in_len);
259 in_len);
    [all...]
tlsv1_client.c 131 * @in_len: Input data length
140 const u8 *in_data, size_t in_len,
154 if (in_len)
160 if (wpabuf_resize(&conn->partial_input, in_len) < 0) {
167 wpabuf_put_data(conn->partial_input, in_data, in_len);
169 in_len = wpabuf_len(conn->partial_input);
172 if (in_data == NULL || in_len == 0)
176 end = in_data + in_len;
177 in_msg = os_malloc(in_len);
183 in_msg_len = in_len;
    [all...]
tlsv1_server.c 103 * @in_len: Input data length
108 const u8 *in_data, size_t in_len,
116 if (in_data == NULL || in_len == 0) {
122 end = in_data + in_len;
123 in_msg = os_malloc(in_len);
129 in_msg_len = in_len;
192 * @in_len: Input buffer length
201 const u8 *in_data, size_t in_len,
207 in_data, in_len);
210 out_data, out_len, in_data, in_len, &rlen) < 0)
    [all...]
  /external/liblzf/src/org/liblzf/
CLZF.java 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len)
165 //byte *in_end = ip + in_len;
175 if (iidx < in_len - 2)
183 && iidx + 4 < in_len
192 int maxlen = in_len - iidx - len;
239 else if (iidx == in_len)
277 public static int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len)
331 while (iidx < in_len);
  /external/wpa_supplicant_6/wpa_supplicant/src/crypto/
tls_internal.c 335 const u8 *in_data, size_t in_len,
346 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
347 __func__, in_data, (unsigned long) in_len);
348 return tlsv1_client_handshake(conn->client, in_data, in_len, out_len,
358 const u8 *in_data, size_t in_len,
366 wpa_printf(MSG_DEBUG, "TLS: %s(in_data=%p in_len=%lu)",
367 __func__, in_data, (unsigned long) in_len);
368 out = tlsv1_server_handshake(conn->server, in_data, in_len, out_len);
381 const u8 *in_data, size_t in_len,
386 return tlsv1_client_encrypt(conn->client, in_data, in_len,
    [all...]
tls_none.c 111 const u8 *in_data, size_t in_len,
121 const u8 *in_data, size_t in_len,
129 const u8 *in_data, size_t in_len,
137 const u8 *in_data, size_t in_len,
tls.h 296 * @in_len: Input data length
322 const u8 *in_data, size_t in_len,
331 * @in_len: Input data length
339 const u8 *in_data, size_t in_len,
347 * @in_len: Input buffer length
357 const u8 *in_data, size_t in_len,
365 * @in_len: Input buffer length
375 const u8 *in_data, size_t in_len,
tls_schannel.c 320 const u8 *in_data, size_t in_len,
340 in_len);
350 inbufs[0].cbBuffer = in_len;
475 const u8 *in_data, size_t in_len,
483 const u8 *in_data, size_t in_len,
507 total_len = sizes.cbHeader + in_len + sizes.cbTrailer;
511 "in_len=%lu total_len=%lu)", __func__,
512 (unsigned long) out_len, (unsigned long) in_len,
522 os_memcpy(out_data + sizes.cbHeader, in_data, in_len);
524 bufs[1].cbBuffer = in_len;
    [all...]
  /external/qemu/hw/
bt-hci-csr.c 41 int in_len; member in struct:csrhci_s
192 s->in_len - sizeof(struct hci_command_hdr) - 1);
202 s->hci->cmd_send(s->hci, pkt, s->in_len - 1);
209 s->hci->acl_send(s->hci, pkt, s->in_len - 1);
213 s->hci->sco_send(s->hci, pkt, s->in_len - 1);
302 int plen = s->in_len;
307 s->in_len += len;
311 if (s->in_len >= 2 && plen < 2)
314 if (s->in_len >= s->in_hdr && plen < s->in_hdr)
317 if (s->in_len >= s->in_data)
    [all...]
  /external/speex/include/speex/
speex_resampler.h 160 * @param in_len Number of input samples in the input buffer. Returns the
168 spx_uint32_t *in_len,
177 * @param in_len Number of input samples in the input buffer. Returns the number
185 spx_uint32_t *in_len,
192 * @param in_len Number of input samples in the input buffer. Returns the number
200 spx_uint32_t *in_len,
207 * @param in_len Number of input samples in the input buffer. Returns the number
215 spx_uint32_t *in_len,
  /external/wpa_supplicant_6/wpa_supplicant/src/eap_peer/
eap_tls_common.h 106 struct eap_ssl_data *data, const u8 *in_data, size_t in_len,
110 u8 id, const u8 *in_data, size_t in_len,

Completed in 412 milliseconds

1 2 3