/external/liblzf/ |
lzf.h | 54 * of out_len bytes. 59 * makes sense to always use out_len == in_len - 1), to ensure _some_ 78 void *out_data, unsigned int out_len); 83 * will be stored at out_data up to a maximum of out_len characters. 97 void *out_data, unsigned int out_len);
|
/external/wpa_supplicant_8/src/utils/ |
base64.h | 13 size_t *out_len); 15 size_t *out_len);
|
base64.c | 21 * @out_len: Pointer to output length variable, or %NULL if not used 22 * Returns: Allocated buffer of out_len bytes of encoded data, 27 * not included in out_len. 30 size_t *out_len) 81 if (out_len) 82 *out_len = pos - out; 91 * @out_len: Pointer to output length variable 92 * Returns: Allocated buffer of out_len bytes of decoded data, 98 size_t *out_len) 153 *out_len = pos - out [all...] |
/system/core/include/cutils/ |
jstring.h | 33 extern char16_t * strdup8to16 (const char* s, size_t *out_len); 35 extern char16_t * strcpy8to16 (char16_t *dest, const char*s, size_t *out_len); 37 size_t *out_len);
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.h | 72 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 73 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 76 bool UnprotectRtp(void* data, int in_len, int* out_len); 77 bool UnprotectRtcp(void* data, int in_len, int* out_len); 120 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 121 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 124 bool UnprotectRtp(void* data, int in_len, int* out_len); 125 bool UnprotectRtcp(void* data, int in_len, int* out_len);
|
srtpfilter.cc | 123 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 128 return send_session_.ProtectRtp(p, in_len, max_len, out_len); 131 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { 136 return send_session_.ProtectRtcp(p, in_len, max_len, out_len); 139 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { 144 return recv_session_.UnprotectRtp(p, in_len, out_len); 147 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { 152 return recv_session_.UnprotectRtcp(p, in_len, out_len); 271 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 284 *out_len = in_len [all...] |
/external/srtp/crypto/hash/ |
null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { 61 debug_print(mod_auth, " tag length %d", out_len); 72 (*a)->out_len = out_len; 73 (*a)->prefix_len = out_len;
|
/external/srtp/crypto/include/ |
null_auth.h | 55 null_auth_alloc(auth_t **a, int key_len, int out_len);
|
auth.h | 56 (auth_pointer_t *ap, int key_len, int out_len); 81 (((a)->type)->compute((a)->state, (buf), (len), (a)->out_len, (res))) 137 int out_len; /* length of output tag in octets */ member in struct:auth_t
|
/external/wpa_supplicant_8/src/tls/ |
tlsv1_server.h | 22 int server_random_first, u8 *out, size_t out_len); 24 const u8 *in_data, size_t in_len, size_t *out_len); 27 u8 *out_data, size_t out_len); 30 u8 *out_data, size_t out_len);
|
tlsv1_client_i.h | 75 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len); 77 u8 description, size_t *out_len); 78 u8 * tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, 82 u8 **out_data, size_t *out_len);
|
tlsv1_client.h | 22 int server_random_first, u8 *out, size_t out_len); 25 size_t *out_len, u8 **appl_data, 29 u8 *out_data, size_t out_len);
|
/external/chromium/crypto/ |
encryptor_openssl.cc | 107 int out_len; local 108 if (!EVP_CipherUpdate(ctx.get(), out_ptr, &out_len, 116 if (!EVP_CipherFinal_ex(ctx.get(), out_ptr + out_len, &tail_len)) 119 out_len += tail_len; 120 DCHECK_LE(out_len, static_cast<int>(output_size)); 121 result.resize(out_len);
|
/system/core/libcutils/ |
strdup8to16.c | 39 * out_len is an out parameter (which may not be null) containing the 43 extern char16_t * strdup8to16 (const char* s, size_t *out_len) 59 return strcpy8to16 (ret, s, out_len); 147 * out_len is an out parameter (which may not be null) containing the 152 size_t *out_len) 174 *out_len = dest - utf16Str; 181 * out_len is an out parameter (which may not be null) containing the 186 int length, size_t *out_len) 211 *out_len = dest - utf16Str;
|
/system/extras/libublock/ |
ublock.c | 70 void *out, size_t *out_len) 96 *out_len = sizeof(*out_h); 106 void *out, size_t *out_len) 117 *out_len = sizeof(struct ublock_ready_out); 126 void *out, size_t *out_len) 147 *out_len = sizeof(*out_h) + in_h->length; 149 *out_len = sizeof(*out_h); 156 void *out, size_t *out_len) 173 *out_len = sizeof(*out_h); 182 void *out, size_t *out_len) 241 size_t out_len; local 276 size_t in_len, out_len; local [all...] |
/external/chromium_org/third_party/libjingle/source/talk/base/ |
transformadapter.cc | 82 size_t out_len = buffer_len; local 84 buffer, &out_len, 88 // Note: Don't signal SR_EOS this iteration, unless out_len is zero 94 } else if ((out_len == 0) && (state_ == ST_FLUSHING)) { 105 if (out_len == 0) 109 *read = out_len; 132 size_t out_len = sizeof(buffer_) - len_; local 134 buffer_ + len_, &out_len, 148 len_ = out_len;
|
messagedigest.h | 67 // |out_len| bytes long. Returns the number of bytes written to |output| if 68 // successful, or 0 if |out_len| was too small. 70 void* output, size_t out_len); 75 void* output, size_t out_len); 96 // the HMAC to the buffer |output|, which is |out_len| bytes long. Returns the 97 // number of bytes written to |output| if successful, or 0 if |out_len| was too 101 void* output, size_t out_len); 107 void* output, size_t out_len);
|
/external/chromium_org/third_party/harfbuzz-ng/src/ |
hb-buffer-private.hh | 67 unsigned int out_len; /* Length of ->out array if have_output */ member in struct:hb_buffer_t 80 inline hb_glyph_info_t &prev (void) { return out_info[out_len - 1]; } 81 inline hb_glyph_info_t prev (void) const { return info[out_len - 1]; } 105 { return have_output? out_len : idx; } 144 if (unlikely (out_info != info || out_len != idx)) { 146 out_info[out_len] = info[idx]; 148 out_len++;
|
/external/harfbuzz_ng/src/ |
hb-buffer-private.hh | 67 unsigned int out_len; /* Length of ->out array if have_output */ member in struct:hb_buffer_t 80 inline hb_glyph_info_t &prev (void) { return out_info[out_len - 1]; } 81 inline hb_glyph_info_t prev (void) const { return info[out_len - 1]; } 103 { return have_output? out_len : idx; } 142 if (unlikely (out_info != info || out_len != idx)) { 144 out_info[out_len] = info[idx]; 146 out_len++;
|
/external/liblzf/src/org/liblzf/ |
CLZF.java | 153 public static int lzf_compress (byte[] in_data, int in_len,byte[] out_data, int out_len) 166 //byte *out_end = op + out_len; 195 if (oidx + lit + 1 + 3 >= out_len) 248 if (oidx + 1 + MAX_LIT >= out_len) 261 if (oidx + lit + 1 >= out_len) 277 public static int lzf_decompress ( byte[] in_data, int in_len, byte[] out_data, int out_len) 290 if (oidx + ctrl > out_len) 311 if (oidx + len + 2 > out_len)
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
srtpfilter_unittest.cc | 93 int rtp_len = sizeof(kPcmuFrame), rtcp_len = sizeof(kRtcpReport), out_len; local 103 sizeof(rtp_packet), &out_len)); 104 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs1)); 106 EXPECT_TRUE(f2_.UnprotectRtp(rtp_packet, out_len, &out_len)); 107 EXPECT_EQ(rtp_len, out_len); 111 sizeof(rtp_packet), &out_len)); 112 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs2)); 114 EXPECT_TRUE(f1_.UnprotectRtp(rtp_packet, out_len, &out_len)); 534 int out_len = 0; local 542 int out_len = 0; local 550 int out_len = 0, expected_len = sizeof(kPcmuFrame); local 556 int out_len = 0, expected_len = sizeof(kRtcpReport); local 611 int out_len; local 624 int out_len; local 633 int out_len; local 646 int out_len; local [all...] |
srtpfilter.cc | 203 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 208 return send_session_->ProtectRtp(p, in_len, max_len, out_len); 211 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { 217 return send_rtcp_session_->ProtectRtcp(p, in_len, max_len, out_len); 219 return send_session_->ProtectRtcp(p, in_len, max_len, out_len); 223 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { 228 return recv_session_->UnprotectRtp(p, in_len, out_len); 231 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { 237 return recv_rtcp_session_->UnprotectRtcp(p, in_len, out_len); 239 return recv_session_->UnprotectRtcp(p, in_len, out_len); [all...] |
/external/chromium_org/crypto/ |
encryptor_openssl.cc | 119 int out_len; local 120 if (!EVP_CipherUpdate(ctx.get(), out_ptr, &out_len, 128 if (!EVP_CipherFinal_ex(ctx.get(), out_ptr + out_len, &tail_len)) 131 out_len += tail_len; 132 DCHECK_LE(out_len, static_cast<int>(output_size)); 133 result.resize(out_len);
|
/external/chromium_org/net/quic/crypto/ |
aes_128_gcm_12_decrypter_test.cc | 264 // number of bytes converted is returned in |*out_len|. Returns true on 268 size_t* out_len, 271 *out_len = (size_t)-1; 274 *out_len = 0; 279 if (*out_len >= max_len) { 282 out[*out_len] = HexDigitToInt(*in) * 16 + HexDigitToInt(*(in + 1)); 283 (*out_len)++;
|
channel_id_test.cc | 204 // number of bytes converted is returned in |*out_len|. Returns true on 208 size_t* out_len, 211 *out_len = (size_t)-1; 214 *out_len = 0; 219 if (*out_len >= max_len) { 222 out[*out_len] = HexDigitToInt(*in) * 16 + HexDigitToInt(*(in + 1)); 223 (*out_len)++;
|