/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_decrypt_key.c | 23 @param inlen The length of the ciphertext (octets) 33 int katja_decrypt_key(const unsigned char *in, unsigned long inlen, 67 if (modulus_bytelen != inlen) { 72 tmp = XMALLOC(inlen); 78 x = inlen; 79 if ((err = katja_exptmod(in, inlen, tmp, &x, PK_PRIVATE, key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_decrypt_key.c | 23 @param inlen The length of the ciphertext (octets) 34 int rsa_decrypt_key_ex(const unsigned char *in, unsigned long inlen, 71 if (modulus_bytelen != inlen) { 76 tmp = XMALLOC(inlen); 82 x = inlen; 83 if ((err = ltc_mp.rsa_me(in, inlen, tmp, &x, PK_PRIVATE, key)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_process.c | 25 @param inlen The length of the data to send through PMAC 28 int pmac_process(pmac_state *pmac, const unsigned char *in, unsigned long inlen) 46 if (pmac->buflen == 0 && inlen > 16) { 48 for (x = 0; x < (inlen - 16); x += 16) { 61 inlen -= x; 65 while (inlen != 0) { 82 n = MIN(inlen, (unsigned long)(pmac->block_len - pmac->buflen)); 85 inlen -= n;
|
pmac_memory.c | 26 @param inlen The length of data you wish to send through PMAC (octets) 33 const unsigned char *in, unsigned long inlen, 53 if ((err = pmac_process(pmac, in, inlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_memory.c | 25 @param inlen Length of input in octets 32 const unsigned char *in, unsigned long inlen, 45 return cipher_descriptor[cipher].f9_memory(key, keylen, in, inlen, out, outlen); 57 if ((err = f9_process(f9, in, inlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory.c | 25 @param inlen Length of input in octets 32 const unsigned char *in, unsigned long inlen, 45 return cipher_descriptor[cipher].xcbc_memory(key, keylen, in, inlen, out, outlen); 57 if ((err = xcbc_process(xcbc, in, inlen)) != CRYPT_OK) {
|
/external/wpa_supplicant_8/src/crypto/ |
sha256_i.h | 22 unsigned long inlen);
|
/external/wpa_supplicant_8/src/tls/ |
rsa.h | 19 int crypto_rsa_exptmod(const u8 *in, size_t inlen, u8 *out, size_t *outlen,
|
pkcs1.c | 17 const u8 *in, size_t inlen, 33 if (modlen < 12 || modlen > *outlen || inlen > modlen - 11) { 35 "lengths (modlen=%lu outlen=%lu inlen=%lu)", 38 (unsigned long) inlen); 45 ps_len = modlen - inlen - 3; 73 os_memcpy(pos, in, inlen); /* D */ 80 int use_private, const u8 *in, size_t inlen, 87 if (pkcs1_generate_encryption_block(block_type, modlen, in, inlen, 96 const u8 *in, size_t inlen, 102 res = crypto_rsa_exptmod(in, inlen, out, outlen, key, 1) [all...] |
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/encodings/ |
PKCS1Encoding.java | 127 int inLen) 132 return encodeBlock(in, inOff, inLen); 136 return decodeBlock(in, inOff, inLen); 143 int inLen) 146 if (inLen > getInputBlockSize()) 157 for (int i = 1; i != block.length - inLen - 1; i++) 172 for (int i = 1; i != block.length - inLen - 1; i++) 181 block[block.length - inLen - 1] = 0x00; // mark the end of the padding 182 System.arraycopy(in, inOff, block, block.length - inLen, inLen); [all...] |
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_process.c | 24 @param inlen The length of the data to HMAC (octets) 27 int hmac_process(hmac_state *hmac, const unsigned char *in, unsigned long inlen) 35 return hash_descriptor[hmac->hash].process(&hmac->md, in, inlen);
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican_memory.c | 25 @param inlen The length of the input (octets) 30 const unsigned char *in, unsigned long inlen, 45 if ((err = pelican_process(pel, in ,inlen)) != CRYPT_OK) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/boolean/ |
der_decode_boolean.c | 24 @param inlen The size of the DER BOOLEAN 28 int der_decode_boolean(const unsigned char *in, unsigned long inlen, 34 if (inlen != 3 || in[0] != 0x01 || in[1] != 0x01 || (in[2] != 0x00 && in[2] != 0xFF)) {
|
/external/chromium_org/third_party/protobuf/src/google/protobuf/testing/ |
zcgunzip.cc | 60 int inlen; local 62 ok = in.Next(&inptr, &inlen); 66 if (inlen > 0) { 67 int err = write(STDOUT_FILENO, inptr, inlen); 68 assert(err == inlen);
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/ia5/ |
der_decode_ia5_string.c | 24 @param inlen The size of the DER IA5 STRING 29 int der_decode_ia5_string(const unsigned char *in, unsigned long inlen, 40 if (inlen < 2) { 54 if ((y == 0) || (y > 3) || ((x + y) > inlen)) { 74 if (len + x > inlen) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/printable_string/ |
der_decode_printable_string.c | 24 @param inlen The size of the DER printable STRING 29 int der_decode_printable_string(const unsigned char *in, unsigned long inlen, 40 if (inlen < 2) { 54 if ((y == 0) || (y > 3) || ((x + y) > inlen)) { 74 if (len + x > inlen) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/sequence/ |
der_decode_sequence_multi.c | 25 @param inlen Length of input in octets 29 int der_decode_sequence_multi(const unsigned char *in, unsigned long inlen, ...) 40 va_start(args, inlen); 88 va_start(args, inlen); 128 err = der_decode_sequence(in, inlen, list, x);
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_import.c | 23 @param inlen The length of the binary packet 27 int dsa_import(const unsigned char *in, unsigned long inlen, dsa_key *key) 42 if ((err = der_decode_sequence_multi(in, inlen, 49 if ((err = der_decode_sequence_multi(in, inlen, 61 if ((err = der_decode_sequence_multi(in, inlen,
|
/external/protobuf/src/google/protobuf/testing/ |
zcgunzip.cc | 60 int inlen; local 62 ok = in.Next(&inptr, &inlen); 66 if (inlen > 0) { 67 int err = write(STDOUT_FILENO, inptr, inlen); 68 assert(err == inlen);
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/set/ |
der_encode_setof.c | 56 @param inlen The number of items in the list 61 int der_encode_setof(ltc_asn1_list *list, unsigned long inlen, 70 for (x = 1; x < inlen; x++) { 83 if ((err = der_encode_sequence_ex(list, inlen, buf, outlen, LTC_ASN1_SETOF)) != CRYPT_OK) { 89 edges = XCALLOC(inlen, sizeof(*edges)); 136 XQSORT(edges, inlen, sizeof(*edges), &qsort_helper); 142 for (y = hdrlen, x = 0; x < inlen; x++) {
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/engines/ |
RFC3394WrapEngine.java | 70 int inLen) 77 int n = inLen / 8; 79 if ((n * 8) != inLen) 84 byte[] block = new byte[inLen + iv.length]; 88 System.arraycopy(in, 0, block, iv.length, inLen); 121 int inLen) 129 int n = inLen / 8; 131 if ((n * 8) != inLen) 136 byte[] block = new byte[inLen - iv.length]; 141 System.arraycopy(in, iv.length, block, 0, inLen - iv.length) [all...] |
/external/chromium_org/third_party/opus/src/silk/ |
resampler_down2_3.c | 40 opus_int16 *out, /* O Output signal [ floor(2*inLen/3) ] */ 41 const opus_int16 *in, /* I Input signal [ inLen ] */ 42 opus_int32 inLen /* I Number of input samples */ 54 nSamplesIn = silk_min( inLen, RESAMPLER_MAX_BATCH_SIZE_IN ); 86 inLen -= nSamplesIn; 88 if( inLen > 0 ) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/utctime/ |
der_decode_utctime.c | 45 @param inlen Length of input buffer in octets 49 int der_decode_utctime(const unsigned char *in, unsigned long *inlen, 57 LTC_ARGCHK(inlen != NULL); 61 if (*inlen < 2UL || (in[1] >= sizeof(buf)) || ((in[1] + 2UL) > *inlen)) { 73 *inlen = 2 + x;
|
/external/bouncycastle/bcprov/src/main/java/org/bouncycastle/crypto/modes/ |
CCMBlockCipher.java | 121 public int processBytes(byte[] in, int inOff, int inLen, byte[] out, int outOff) 124 data.write(in, inOff, inLen); 181 public byte[] processPacket(byte[] in, int inOff, int inLen) 196 if (inLen >= limitLen) 215 output = new byte[inLen + macSize]; 217 calculateMac(in, inOff, inLen, macBlock); 221 while (index < inLen - blockSize) // S1... 230 System.arraycopy(in, index, block, 0, inLen - index); 234 System.arraycopy(block, 0, output, outOff, inLen - index); 236 outOff += inLen - index [all...] |
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory.c | 22 @param inlen The length of the data to hash (octets) 27 int hash_memory(int hash, const unsigned char *in, unsigned long inlen, unsigned char *out, unsigned long *outlen) 53 if ((err = hash_descriptor[hash].process(md, in, inlen)) != CRYPT_OK) {
|