HomeSort by relevance Sort by last modified time
    Searched refs:in_data (Results 1 - 25 of 44) sorted by null

1 2

  /external/liblzf/
lzf.h 53 * in_data and write the result to out_data, up to a maximum length
77 lzf_compress (const void *const in_data, unsigned int in_len,
82 * function and stored at location in_data and length in_len. The result
96 lzf_decompress (const void *const in_data, unsigned int in_len,
lzfP.h 159 # define LZF_HSLOT_BIAS ((const u8 *)in_data)
lzf_d.c 56 lzf_decompress (const void *const in_data, unsigned int in_len,
59 u8 const *ip = (const u8 *)in_data;
  /external/liblzf/src/org/liblzf/
CLZF.java 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len)
169 int hval = FRST (in_data,iidx);
177 hval = NEXT (hval, in_data,iidx);
185 && in_data[reference+0] == in_data[iidx+0]
186 && in_data[reference+1] == in_data[iidx+1]
187 && in_data[reference+2] == in_data[iidx+2]
200 while (len < maxlen && in_data[reference+len] == in_data[iidx+len])
    [all...]
  /external/chromium/chrome/browser/sync/util/
data_encryption.h 18 bool DecryptData(const vector<uint8>& in_data, string* out_data);
data_encryption.cc 37 bool DecryptData(const vector<uint8>& in_data, string* out_data) {
40 (in_data.empty() ? NULL : const_cast<BYTE*>(&in_data[0]));
41 encrypted_data.cbData = in_data.size();
  /external/webrtc/src/common_audio/signal_processing/
splitting_filter.c 34 // - in_data : Input data sequence (Q10)
46 void WebRtcSpl_AllPassQMF(WebRtc_Word32* in_data, const WebRtc_Word16 data_length,
58 // The filter state contains the in_data state, in_data[-1], followed by
60 // The first cascade filter will filter the |in_data| and store the output in
62 // intermediate storage in |in_data|, to save memory. The third, and final, cascade
63 // filter operation takes the |in_data| (which is the output from the previous cascade
68 // First all-pass cascade; filter from in_data to out_data.
75 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[0], filter_state[1]); // = (x[0] - y_1[-1])
82 diff = WEBRTC_SPL_SUB_SAT_W32(in_data[k], out_data[k - 1]); // = (x[n] - y_1[n-1]
    [all...]
  /external/webrtc/src/modules/audio_processing/
splitting_filter.cc 16 void SplittingFilterAnalysis(const WebRtc_Word16* in_data,
22 WebRtcSpl_AnalysisQMF(in_data, low_band, high_band, filter_state1, filter_state2);
splitting_filter.h 24 * - in_data : super-wb audio signal
34 void SplittingFilterAnalysis(const WebRtc_Word16* in_data,
  /external/liblzf/cs/
CLZF.cs 153 public int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len)
169 UInt32 hval = FRST (in_data,iidx);
177 hval = NEXT (hval, in_data,iidx);
185 && in_data[reference+0] == in_data[iidx+0]
186 && in_data[reference+1] == in_data[iidx+1]
187 && in_data[reference+2] == in_data[iidx+2]
200 while (len < maxlen && in_data[reference+len] == in_data[iidx+len])
    [all...]
  /external/wpa_supplicant_8/src/crypto/
tls_internal.c 326 const struct wpabuf *in_data,
329 return tls_connection_handshake2(tls_ctx, conn, in_data, appl_data,
336 const struct wpabuf *in_data,
350 in_data ? wpabuf_head(in_data) : NULL,
351 in_data ? wpabuf_len(in_data) : 0,
380 const struct wpabuf *in_data,
394 res = tlsv1_server_handshake(conn->server, wpabuf_head(in_data),
395 wpabuf_len(in_data), &res_len)
    [all...]
tls_none.c 98 const struct wpabuf *in_data,
107 const struct wpabuf *in_data,
116 const struct wpabuf *in_data)
124 const struct wpabuf *in_data)
tls.h 325 * @in_data: Input data from TLS server
335 * in_data == %NULL and the library is expected to return ClientHello packet.
337 * to TLS library by calling this function again with in_data pointing to the
350 const struct wpabuf *in_data,
355 const struct wpabuf *in_data,
363 * @in_data: Input data from TLS peer
371 const struct wpabuf *in_data,
378 * @in_data: Plaintext data to be encrypted
387 const struct wpabuf *in_data);
393 * @in_data: Encrypted TLS dat
    [all...]
tls_nss.c 448 const struct wpabuf *in_data,
454 in_data ? (unsigned int) wpabuf_len(in_data) : 0);
459 if (in_data && wpabuf_len(in_data) > 0) {
466 conn->pull_buf = os_malloc(wpabuf_len(in_data));
469 os_memcpy(conn->pull_buf, wpabuf_head(in_data),
470 wpabuf_len(in_data));
472 conn->pull_buf_len = wpabuf_len(in_data);
495 const struct wpabuf *in_data,
    [all...]
tls_schannel.c 313 const struct wpabuf *in_data,
331 (int) wpabuf_len(in_data));
340 inbufs[0].pvBuffer = (u8 *) wpabuf_head(in_data);
341 inbufs[0].cbBuffer = wpabuf_len(in_data);
460 const struct wpabuf *in_data,
469 const struct wpabuf *in_data)
492 out = wpabuf_alloc(sizes.cbHeader + wpabuf_len(in_data) +
501 wpabuf_put_buf(out, in_data);
502 bufs[1].cbBuffer = wpabuf_len(in_data);
551 const struct wpabuf *in_data)
    [all...]
  /external/webrtc/src/modules/audio_coding/codecs/isac/main/source/
pitch_filter.c 126 * in_data : pointer to the input signal of 30 ms at 8 kHz sample-rate.
135 static void FilterSegment(const double* in_data, PitchFilterParam* parameters,
203 out_data[parameters->index] = in_data[parameters->index] - sum;
204 parameters->buffer[pos] = in_data[parameters->index] +
243 * in_data : pointer to the input signal of 30 ms at 8 kHz sample-rate.
260 static void FilterFrame(const double* in_data, PitchFiltstr* filter_state,
333 FilterSegment(in_data, &filter_parameters, out_data, out_dg);
354 FilterSegment(in_data, &filter_parameters, out_data, out_dg);
358 void WebRtcIsac_PitchfilterPre(double* in_data, double* out_data,
361 FilterFrame(in_data, pf_state, lags, gains, kPitchFilterPre, out_data, NULL)
    [all...]
  /external/wpa_supplicant_8/src/tls/
tlsv1_client.h 24 const u8 *in_data, size_t in_len,
28 const u8 *in_data, size_t in_len,
31 const u8 *in_data, size_t in_len,
tlsv1_server.h 24 const u8 *in_data, size_t in_len, size_t *out_len);
26 const u8 *in_data, size_t in_len,
29 const u8 *in_data, size_t in_len,
tlsv1_record.c 266 * @in_data: Received data
268 * @out_data: Buffer for output data (must be at least as long as in_data)
272 * Returns: Number of bytes used from in_data on success, 0 if record was not
279 const u8 *in_data, size_t in_len,
294 in_data, in_len);
298 ct = in_data[0];
299 rlen = WPA_GET_BE16(in_data + 3);
301 "length %d", ct, in_data[1], in_data[2], (int) rlen);
308 if (in_data[1] != 0x03)
    [all...]
tlsv1_client_read.c 23 const u8 *in_data, size_t *in_len);
25 const u8 *in_data, size_t *in_len);
27 const u8 *in_data, size_t *in_len);
31 const u8 *in_data, size_t *in_len)
46 pos = in_data;
200 *in_len = end - in_data;
215 const u8 *in_data, size_t *in_len)
231 pos = in_data;
255 return tls_process_server_key_exchange(conn, ct, in_data,
258 return tls_process_certificate_request(conn, ct, in_data,
    [all...]
tlsv1_server.c 102 * @in_data: Input data from TLS peer
108 const u8 *in_data, size_t in_len,
116 if (in_data == NULL || in_len == 0) {
121 pos = in_data;
122 end = in_data + in_len;
191 * @in_data: Pointer to plaintext data to be encrypted
201 const u8 *in_data, size_t in_len,
207 in_data, in_len);
210 out_data, out_len, in_data, in_len, &rlen) < 0) {
224 * @in_data: Pointer to input buffer (encrypted TLS data
    [all...]
tlsv1_server_read.c 24 const u8 *in_data, size_t *in_len);
26 u8 ct, const u8 *in_data,
31 const u8 *in_data, size_t *in_len)
48 pos = in_data;
261 *in_len = end - in_data;
278 const u8 *in_data, size_t *in_len)
294 pos = in_data;
328 return tls_process_client_key_exchange(conn, ct, in_data,
471 *in_len = end - in_data;
689 const u8 *in_data, size_t *in_len
    [all...]
tlsv1_client.c 130 * @in_data: Input data from TLS peer
140 const u8 *in_data, size_t in_len,
167 wpabuf_put_data(conn->partial_input, in_data, in_len);
168 in_data = wpabuf_head(conn->partial_input);
172 if (in_data == NULL || in_len == 0)
175 pos = in_data;
176 end = in_data + in_len;
264 * @in_data: Pointer to plaintext data to be encrypted
274 const u8 *in_data, size_t in_len,
280 in_data, in_len)
    [all...]
  /external/wpa_supplicant_8/src/eap_peer/
eap_tls_common.h 102 u8 id, const u8 *in_data, size_t in_len,
118 const struct wpabuf *in_data,
122 const struct wpabuf *in_data,
eap_tls_common.c 391 * @in_data: Next incoming TLS segment
396 const struct wpabuf *in_data)
401 in_len = in_data ? wpabuf_len(in_data) : 0;
439 if (in_data)
440 wpabuf_put_buf(data->tls_in, in_data);
456 * @in_data: Next incoming TLS segment
466 struct eap_ssl_data *data, const struct wpabuf *in_data,
471 if (data->tls_in_left > wpabuf_len(in_data) || data->tls_in) {
473 int res = eap_peer_tls_reassemble_fragment(data, in_data);
    [all...]

Completed in 195 milliseconds

1 2