/external/chromium_org/third_party/openssl/openssl/crypto/evp/ |
evp_aead.c | 108 * and |in_len| and 1 otherwise. 110 * When processing, there's only an issue if |out| points within in[:in_len] 115 static int check_alias(const unsigned char *in, size_t in_len, 120 if (in + in_len <= out) 128 const unsigned char *in, size_t in_len, 131 size_t possible_out_len = in_len + ctx->aead->overhead; 134 if (possible_out_len < in_len /* overflow */ || 142 if (!check_alias(in, in_len, out)) 149 in, in_len, ad, ad_len); 163 const unsigned char *in, size_t in_len, [all...] |
e_chacha20poly1305.c | 132 const unsigned char *in, size_t in_len, 138 const uint64_t in_len_64 = in_len; 153 if (max_out_len < in_len + c20_ctx->tag_len) 170 CRYPTO_chacha_20(out, in, in_len, c20_ctx->key, nonce, 1); 171 poly1305_update_with_length(&poly1305, out, in_len); 177 memcpy(out + in_len, tag, c20_ctx->tag_len); 178 return in_len + c20_ctx->tag_len; 181 CRYPTO_poly1305_finish(&poly1305, out + in_len); 182 return in_len + POLY1305_TAG_LEN; 188 const unsigned char *in, size_t in_len, [all...] |
/system/extras/libublock/ |
ublock.c | 69 const void *in, size_t in_len, 79 if (in_len != sizeof(*in_h)) 105 const void *in, size_t in_len, 114 if (in_len != sizeof(struct ublock_ready_in)) 125 const void *in, size_t in_len, 136 if (in_len != sizeof(*in_h)) 155 const void *in, size_t in_len, 166 if (in_len < sizeof(*in_h)) 181 const void *in, size_t in_len, 199 if (in_len < sizeof(*in_h) 242 ssize_t in_len, out_wrote; local 276 size_t in_len, out_len; local [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client.h | 24 const u8 *in_data, size_t in_len, 28 const u8 *in_data, size_t in_len, 31 const u8 *in_data, size_t in_len,
|
tlsv1_server.h | 24 const u8 *in_data, size_t in_len, size_t *out_len); 26 const u8 *in_data, size_t in_len, 29 const u8 *in_data, size_t in_len,
|
tlsv1_client_read.c | 23 const u8 *in_data, size_t *in_len); 25 const u8 *in_data, size_t *in_len); 27 const u8 *in_data, size_t *in_len); 31 const u8 *in_data, size_t *in_len) 47 left = *in_len; 200 *in_len = end - in_data; 215 const u8 *in_data, size_t *in_len) 232 left = *in_len; 256 in_len); 259 in_len); [all...] |
tlsv1_record.c | 267 * @in_len: Length of the received data 279 const u8 *in_data, size_t in_len, 289 if (in_len < TLS_RECORD_HEADER_LEN) { 290 wpa_printf(MSG_DEBUG, "TLSv1: Too short record (in_len=%lu) - " 292 (unsigned long) in_len); 294 in_data, in_len); 324 in_len -= TLS_RECORD_HEADER_LEN; 326 if (rlen > in_len) { 328 "(rlen=%lu > in_len=%lu)", 329 (unsigned long) rlen, (unsigned long) in_len); [all...] |
tlsv1_server_read.c | 24 const u8 *in_data, size_t *in_len); 27 size_t *in_len); 31 const u8 *in_data, size_t *in_len) 49 left = *in_len; 261 *in_len = end - in_data; 278 const u8 *in_data, size_t *in_len) 295 left = *in_len; 329 in_len); 471 *in_len = end - in_data; 689 const u8 *in_data, size_t *in_len) [all...] |
tlsv1_server.c | 103 * @in_len: Input data length 108 const u8 *in_data, size_t in_len, 116 if (in_data == NULL || in_len == 0) { 122 end = in_data + in_len; 123 in_msg = os_malloc(in_len); 129 in_msg_len = in_len; 192 * @in_len: Input buffer length 201 const u8 *in_data, size_t in_len, 207 in_data, in_len); 210 out_data, out_len, in_data, in_len, &rlen) < 0) [all...] |
tlsv1_client.c | 131 * @in_len: Input data length 140 const u8 *in_data, size_t in_len, 154 if (in_len) 160 if (wpabuf_resize(&conn->partial_input, in_len) < 0) { 167 wpabuf_put_data(conn->partial_input, in_data, in_len); 169 in_len = wpabuf_len(conn->partial_input); 172 if (in_data == NULL || in_len == 0) 176 end = in_data + in_len; 177 in_msg = os_malloc(in_len); 183 in_msg_len = in_len; [all...] |
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.cc | 123 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 128 return send_session_.ProtectRtp(p, in_len, max_len, out_len); 131 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { 136 return send_session_.ProtectRtcp(p, in_len, max_len, out_len); 139 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { 144 return recv_session_.UnprotectRtp(p, in_len, out_len); 147 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { 152 return recv_session_.UnprotectRtcp(p, in_len, out_len); 271 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 277 int need_len = in_len + rtp_auth_tag_len_; // NOLIN [all...] |
srtpfilter.h | 72 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 73 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 76 bool UnprotectRtp(void* data, int in_len, int* out_len); 77 bool UnprotectRtcp(void* data, int in_len, int* out_len); 120 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 121 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 124 bool UnprotectRtp(void* data, int in_len, int* out_len); 125 bool UnprotectRtcp(void* data, int in_len, int* out_len);
|
/external/chromium_org/third_party/yasm/source/patched-yasm/libyasm/tests/ |
uncstring_test.c | 39 size_t in_len; member in struct:Test_Entry 88 strncpy(str, test->input, test->in_len); 89 len = test->in_len; 95 test->input, (unsigned long)test->in_len, 103 test->input, (unsigned long)test->in_len, test->result, str); 111 test->input, (unsigned long)test->in_len, wstr); 117 test->input, (unsigned long)test->in_len, test->warn); 123 test->input, (unsigned long)test->in_len, test->warn, wstr);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
transformadapter.cc | 81 size_t in_len = len_; local 83 StreamResult result = transform_->Transform(buffer_, &in_len, 101 len_ -= in_len; 103 memmove(buffer_, buffer_ + in_len, len_); 131 size_t in_len = data_len; local 133 StreamResult result = transform_->Transform(data, &in_len, 149 bytes_written = in_len;
|
messagedigest.cc | 73 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len, 75 digest->Update(input, in_len); 79 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, 83 ComputeDigest(digest.get(), input, in_len, output, out_len) : 113 const void* input, size_t in_len, 140 digest->Update(input, in_len); 149 const void* input, size_t in_len, 156 input, in_len, output, out_len);
|
messagedigest.h | 65 // Computes the hash of |in_len| bytes of |input|, using the |digest| hash 69 size_t ComputeDigest(MessageDigest* digest, const void* input, size_t in_len, 74 size_t ComputeDigest(const std::string& alg, const void* input, size_t in_len, 94 // Computes the HMAC of |in_len| bytes of |input|, using the |digest| hash 100 const void* input, size_t in_len, 106 const void* input, size_t in_len,
|
transformadapter.h | 40 // Transform should convert the in_len bytes of input into the out_len-sized 43 // After the transformation, in_len contains the number of bytes consumed, and 47 virtual StreamResult Transform(const void * input, size_t * in_len,
|
/external/chromium_org/third_party/openssl/openssl/patches/ |
aead_support.patch | 179 + const unsigned char *in, size_t in_len, 186 + if (max_out_len < in_len + gcm_ctx->tag_len) 201 + in_len - bulk, gcm_ctx->ctr)) 207 + in_len - bulk)) 211 + CRYPTO_gcm128_tag(&gcm, out + in_len, gcm_ctx->tag_len); 212 + return in_len + gcm_ctx->tag_len; 218 + const unsigned char *in, size_t in_len, 227 + if (in_len < gcm_ctx->tag_len) 233 + out_len = in_len - gcm_ctx->tag_len; 250 + in_len-bulk-gcm_ctx->tag_len [all...] |
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
srtpfilter.cc | 203 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 208 return send_session_->ProtectRtp(p, in_len, max_len, out_len); 211 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { 217 return send_rtcp_session_->ProtectRtcp(p, in_len, max_len, out_len); 219 return send_session_->ProtectRtcp(p, in_len, max_len, out_len); 223 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { 228 return recv_session_->UnprotectRtp(p, in_len, out_len); 231 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { 237 return recv_rtcp_session_->UnprotectRtcp(p, in_len, out_len); 239 return recv_session_->UnprotectRtcp(p, in_len, out_len) [all...] |
srtpfilter.h | 124 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 125 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 128 bool UnprotectRtp(void* data, int in_len, int* out_len); 129 bool UnprotectRtcp(void* data, int in_len, int* out_len); 202 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 203 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 206 bool UnprotectRtp(void* data, int in_len, int* out_len); 207 bool UnprotectRtcp(void* data, int in_len, int* out_len);
|
/external/liblzf/ |
lzf.h | 52 * Compress in_len bytes stored at the memory block starting at 58 * more than in_len (but less than 104% of the original size), so it 59 * makes sense to always use out_len == in_len - 1), to ensure _some_ 77 lzf_compress (const void *const in_data, unsigned int in_len, 82 * function and stored at location in_data and length in_len. The result 96 lzf_decompress (const void *const in_data, unsigned int in_len,
|
/external/qemu/hw/ |
bt-hci-csr.c | 41 int in_len; member in struct:csrhci_s 192 s->in_len - sizeof(struct hci_command_hdr) - 1); 202 s->hci->cmd_send(s->hci, pkt, s->in_len - 1); 209 s->hci->acl_send(s->hci, pkt, s->in_len - 1); 213 s->hci->sco_send(s->hci, pkt, s->in_len - 1); 302 int plen = s->in_len; 307 s->in_len += len; 311 if (s->in_len >= 2 && plen < 2) 314 if (s->in_len >= s->in_hdr && plen < s->in_hdr) 317 if (s->in_len >= s->in_data) [all...] |
/external/chromium_org/third_party/openssl/openssl/crypto/chacha/ |
chacha_enc.c | 94 const unsigned char *in, size_t in_len, 128 const unsigned char *in, size_t in_len, 142 CRYPTO_chacha_20_neon(out, in, in_len, key, nonce, counter); 167 while (in_len > 0) 170 if (in_len < todo) 171 todo = in_len; 179 in_len -= todo;
|
/external/chromium_org/third_party/openssl/openssl/crypto/poly1305/ |
poly1305.c | 100 size_t in_len); 259 size_t in_len) 267 CRYPTO_poly1305_update_neon(statep, in, in_len); 275 if (todo > in_len) 276 todo = in_len; 280 in_len -= todo; 290 if (in_len >= 16) 292 size_t todo = in_len & ~0xf; 295 in_len &= 0xf; 298 if (in_len) [all...] |
poly1305_arm.c | 233 size_t in_len) 245 if (todo > in_len) 246 todo = in_len; 250 in_len -= todo; 253 if (st->buf_used == sizeof(st->buf) && in_len) 263 while (in_len > 32) 266 if (in_len < tlen) 267 tlen = in_len; 269 in_len -= tlen; 273 if (in_len) [all...] |