/external/chromium/net/tools/dnssec_chain_verify/ |
dnssec_chain_verify.cc | 51 unsigned long inlen = ftell(infile); local 54 char* const input = (char *) malloc(inlen); 55 if (fread(input, inlen, 1, infile) != 1) { 67 base::StringPiece(input, inlen));
|
/external/chromium_org/third_party/openssl/openssl/crypto/aes/ |
aes_wrap.c | 64 const unsigned char *in, unsigned int inlen) 68 if ((inlen & 0x7) || (inlen < 8)) 72 memcpy(out + 8, in, inlen); 81 for (i = 0; i < inlen; i += 8, t++, R += 8) 96 return inlen + 8; 101 const unsigned char *in, unsigned int inlen) 105 inlen -= 8; 106 if (inlen & 0x7) 108 if (inlen < 8 [all...] |
/external/dropbear/libtomcrypt/src/hashes/helper/ |
hash_memory_multi.c | 24 @param inlen The length of the data to hash (octets) 29 const unsigned char *in, unsigned long inlen, ...) 59 va_start(args, inlen); 61 curlen = inlen;
|
/external/dropbear/libtomcrypt/src/headers/ |
tomcrypt_mac.h | 10 int hmac_process(hmac_state *hmac, const unsigned char *in, unsigned long inlen); 15 const unsigned char *in, unsigned long inlen, 20 const unsigned char *in, unsigned long inlen, ...); 39 int omac_process(omac_state *omac, const unsigned char *in, unsigned long inlen); 43 const unsigned char *in, unsigned long inlen, 48 const unsigned char *in, unsigned long inlen, ...); 73 int pmac_process(pmac_state *pmac, const unsigned char *in, unsigned long inlen); 84 const unsigned char *in, unsigned long inlen, ...); 302 int pelican_process(pelican_state *pelmac, const unsigned char *in, unsigned long inlen); 307 const unsigned char *in, unsigned long inlen, [all...] |
/external/dropbear/libtomcrypt/src/mac/f9/ |
f9_memory_multi.c | 29 @param inlen The length of the data to send through f9 (octets) 36 const unsigned char *in, unsigned long inlen, ...) 59 va_start(args, inlen); 61 curlen = inlen;
|
/external/dropbear/libtomcrypt/src/mac/hmac/ |
hmac_memory.c | 26 @param inlen The length of the data to HMAC (octets) 33 const unsigned char *in, unsigned long inlen, 51 return hash_descriptor[hash].hmac_block(key, keylen, in, inlen, out, outlen); 65 if ((err = hmac_process(hmac, in, inlen)) != CRYPT_OK) {
|
hmac_memory_multi.c | 29 @param inlen The length of the data to HMAC (octets) 36 const unsigned char *in, unsigned long inlen, ...) 60 va_start(args, inlen); 62 curlen = inlen;
|
/external/dropbear/libtomcrypt/src/mac/omac/ |
omac_memory.c | 26 @param inlen The length of the data to send through OMAC (octets) 33 const unsigned char *in, unsigned long inlen, 51 return cipher_descriptor[cipher].omac_memory(key, keylen, in, inlen, out, outlen); 64 if ((err = omac_process(omac, in, inlen)) != CRYPT_OK) {
|
omac_memory_multi.c | 29 @param inlen The length of the data to send through OMAC (octets) 36 const unsigned char *in, unsigned long inlen, ...) 59 va_start(args, inlen); 61 curlen = inlen;
|
/external/dropbear/libtomcrypt/src/mac/pmac/ |
pmac_memory_multi.c | 29 @param inlen The length of data you wish to send through PMAC (octets) 36 const unsigned char *in, unsigned long inlen, ...) 58 va_start(args, inlen); 60 curlen = inlen;
|
/external/dropbear/libtomcrypt/src/mac/xcbc/ |
xcbc_memory_multi.c | 29 @param inlen The length of the data to send through XCBC (octets) 36 const unsigned char *in, unsigned long inlen, ...) 59 va_start(args, inlen); 61 curlen = inlen;
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/bit/ |
der_decode_bit_string.c | 24 @param inlen The size of the DER BIT STRING 29 int der_decode_bit_string(const unsigned char *in, unsigned long inlen, 39 if (inlen < 4) { 72 if ((dlen == 0) || (dlen + x > inlen)) {
|
/external/dropbear/libtomcrypt/src/pk/asn1/der/object_identifier/ |
der_decode_object_identifier.c | 22 @param inlen The length of the OID data 27 int der_decode_object_identifier(const unsigned char *in, unsigned long inlen, 37 if (inlen < 3) { 66 if (len < 1 || (len + x) > inlen) {
|
/external/dropbear/libtomcrypt/src/pk/katja/ |
katja_import.c | 23 @param inlen It's length (octets) 27 int katja_import(const unsigned char *in, unsigned long inlen, katja_key *key) 42 if ((err = der_decode_sequence_multi(in, inlen, 50 if ((err = der_decode_sequence_multi(in, inlen,
|
/external/dropbear/libtomcrypt/src/pk/rsa/ |
rsa_encrypt_key.c | 23 @param inlen The length of the plaintext (octets) 35 int rsa_encrypt_key_ex(const unsigned char *in, unsigned long inlen, 79 if ((err = pkcs_1_oaep_encode(in, inlen, lparam, 87 if ((err = pkcs_1_v1_5_encode(in, inlen, LTC_PKCS_1_EME,
|
/external/dropbear/libtomcrypt/src/prngs/ |
sprng.c | 51 @param inlen Length of the data to add 55 int sprng_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) 111 @param inlen Size of the state 115 int sprng_import(const unsigned char *in, unsigned long inlen, prng_state *prng)
|
rc4.c | 51 @param inlen Length of the data to add 55 int rc4_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) 61 if (prng->rc4.x + inlen > 256) { 67 inlen = 256 - prng->rc4.x; 71 while (inlen--) { 193 @param inlen Size of the state 197 int rc4_import(const unsigned char *in, unsigned long inlen, prng_state *prng) 203 if (inlen != 32) {
|
sober128.c | 203 @param inlen Length of the data to add 207 int sober128_add_entropy(const unsigned char *in, unsigned long inlen, prng_state *prng) 218 /* inlen must be multiple of 4 bytes */ 219 if ((inlen & 3) != 0) { 223 for (i = 0; i < inlen; i += 4) { 231 ADDKEY(inlen); 245 /* inlen must be multiple of 4 bytes */ 246 if ((inlen & 3) != 0) { 250 for (i = 0; i < inlen; i += 4) { 258 ADDKEY(inlen); [all...] |
/external/openssl/crypto/aes/ |
aes_wrap.c | 64 const unsigned char *in, unsigned int inlen) 68 if ((inlen & 0x7) || (inlen < 8)) 72 memcpy(out + 8, in, inlen); 81 for (i = 0; i < inlen; i += 8, t++, R += 8) 96 return inlen + 8; 101 const unsigned char *in, unsigned int inlen) 105 inlen -= 8; 106 if (inlen & 0x7) 108 if (inlen < 8 [all...] |
/external/svox/pico/lib/ |
picowa.c | 60 picoos_uint16 inLen; /* length of item in inBuf, 0 for empty buf */ 97 wa->inLen = 0; 292 if (PICO_OK == picodata_copy_item(wa->inBuf, wa->inLen, 295 wa->inLen = 0; 333 wa->inLen = 0; 340 if (PICO_OK == picodata_copy_item(wa->inBuf, wa->inLen, 343 wa->inLen = 0; 390 PICODBG_DEBUG(("doing state %i, inLen: %d, outLen: %d", 391 wa->procState, wa->inLen, wa->outLen)); 398 if (wa->inLen == 0) { /* is input buffer empty? * [all...] |
/external/dropbear/libtomcrypt/src/pk/ecc/ |
ecc_import.c | 77 @param inlen The length of the packet 81 int ecc_import(const unsigned char *in, unsigned long inlen, ecc_key *key) 83 return ecc_import_ex(in, inlen, key, NULL); 89 @param inlen The length of the packet 94 int ecc_import_ex(const unsigned char *in, unsigned long inlen, ecc_key *key, const ltc_ecc_set_type *dp) 110 if ((err = der_decode_sequence_multi(in, inlen, 120 if ((err = der_decode_sequence_multi(in, inlen, 132 if ((err = der_decode_sequence_multi(in, inlen,
|
ecc_encrypt_key.c | 29 @param inlen The length of the key to encrypt (octets) 38 int ecc_encrypt_key(const unsigned char *in, unsigned long inlen, 62 if (inlen > hash_descriptor[hash].hashsize) { 107 for (x = 0; x < inlen; x++) { 114 LTC_ASN1_OCTET_STRING, inlen, skey,
|
/external/dropbear/libtomcrypt/src/mac/pelican/ |
pelican.c | 97 @param inlen The length input (octets) 100 int pelican_process(pelican_state *pelmac, const unsigned char *in, unsigned long inlen) 113 while (inlen & ~15) { 120 inlen -= 16; 125 while (inlen--) {
|
/external/dropbear/libtomcrypt/src/pk/dsa/ |
dsa_encrypt_key.c | 23 @param inlen The length of the key to encrypt (octets) 32 int dsa_encrypt_key(const unsigned char *in, unsigned long inlen, 56 if (inlen > hash_descriptor[hash].hashsize) { 107 for (x = 0; x < inlen; x++) { 114 LTC_ASN1_OCTET_STRING, inlen, skey,
|
/external/chromium_org/third_party/openssl/openssl/crypto/pkcs12/ |
p12_decr.c | 72 int passlen, unsigned char *in, int inlen, unsigned char **data, 87 if(!(out = OPENSSL_malloc(inlen + EVP_CIPHER_CTX_block_size(&ctx)))) { 92 if (!EVP_CipherUpdate(&ctx, out, &i, in, inlen)) 163 int inlen; local 168 inlen = ASN1_item_i2d(obj, &in, it); 173 if (!PKCS12_pbe_crypt(algor, pass, passlen, in, inlen, &oct->data, 179 if (zbuf) OPENSSL_cleanse(in, inlen);
|