/external/chromium_org/native_client_sdk/src/libraries/nacl_io/ |
event_emitter_pipe.cc | 19 size_t out_len = fifo_.Read(data, len); local 22 return out_len; 26 size_t out_len = fifo_.Write(data, len); local 29 return out_len;
|
event_emitter_tty.cc | 19 size_t out_len = fifo_.Read(data, len); local 22 return out_len; 26 size_t out_len = fifo_.Write(data, len); local 29 return out_len;
|
mount_node_socket.h | 78 int* out_len); 85 int* out_len); 90 int* out_len); 97 int* out_len); 120 int* out_len); 128 int* out_len); 135 int* out_len) = 0; 140 int* out_len) = 0;
|
mount_node_udp.h | 43 int* out_len); 48 int* out_len);
|
kernel_handle.h | 56 Error Recv(void* buf, size_t len, int flags, int* out_len); 62 int* out_len); 65 Error Send(const void* buf, size_t len, int flags, int* out_len); 71 int* out_len);
|
kernel_handle.cc | 176 Error KernelHandle::Recv(void* buf, size_t len, int flags, int* out_len) { 184 return sock->Recv(handle_attr_, buf, len, flags, out_len); 192 int* out_len) { 201 out_len); 207 int* out_len) { 215 return sock->Send(handle_attr_, buf, len, flags, out_len); 223 int* out_len) { 232 out_len);
|
mount_node_tcp.h | 65 int* out_len); 70 int* out_len);
|
mount_node_socket.cc | 323 int* out_len) { 324 return RecvFrom(attr, buf, len, flags, NULL, 0, out_len); 333 int* out_len) { 335 Error err = RecvHelper(attr, buf, len, flags, &addr, out_len); 351 int* out_len) { 371 err = Recv_Locked(buf, len, addr, out_len); 374 if ((err == 0) && *out_len) 383 int* out_len) { 384 return SendHelper(attr, buf, len, flags, remote_addr_, out_len); 393 int* out_len) { [all...] |
/external/wpa_supplicant_8/src/utils/ |
base64.h | 13 size_t *out_len); 15 size_t *out_len);
|
base64.c | 21 * @out_len: Pointer to output length variable, or %NULL if not used 22 * Returns: Allocated buffer of out_len bytes of encoded data, 27 * not included in out_len. 30 size_t *out_len) 81 if (out_len) 82 *out_len = pos - out; 91 * @out_len: Pointer to output length variable 92 * Returns: Allocated buffer of out_len bytes of decoded data, 98 size_t *out_len) 153 *out_len = pos - out [all...] |
/external/wpa_supplicant_8/src/tls/ |
tlsv1_client_i.h | 75 u8 * tls_send_client_hello(struct tlsv1_client *conn, size_t *out_len); 77 u8 description, size_t *out_len); 78 u8 * tlsv1_client_handshake_write(struct tlsv1_client *conn, size_t *out_len, 82 u8 **out_data, size_t *out_len);
|
tlsv1_server.h | 22 int server_random_first, u8 *out, size_t out_len); 24 const u8 *in_data, size_t in_len, size_t *out_len); 27 u8 *out_data, size_t out_len); 30 u8 *out_data, size_t out_len);
|
tlsv1_client.h | 22 int server_random_first, u8 *out, size_t out_len); 25 size_t *out_len, u8 **appl_data, 29 u8 *out_data, size_t out_len);
|
tlsv1_record.h | 66 size_t *out_len); 69 u8 *out_data, size_t *out_len, u8 *alert);
|
tlsv1_server_i.h | 65 u8 * tlsv1_server_handshake_write(struct tlsv1_server *conn, size_t *out_len); 67 u8 description, size_t *out_len);
|
/system/extras/libublock/ |
ublock.c | 70 void *out, size_t *out_len) 96 *out_len = sizeof(*out_h); 106 void *out, size_t *out_len) 117 *out_len = sizeof(struct ublock_ready_out); 126 void *out, size_t *out_len) 147 *out_len = sizeof(*out_h) + in_h->length; 149 *out_len = sizeof(*out_h); 156 void *out, size_t *out_len) 173 *out_len = sizeof(*out_h); 182 void *out, size_t *out_len) 241 size_t out_len; local 276 size_t in_len, out_len; local [all...] |
/system/core/include/cutils/ |
jstring.h | 33 extern char16_t * strdup8to16 (const char* s, size_t *out_len); 35 extern char16_t * strcpy8to16 (char16_t *dest, const char*s, size_t *out_len); 37 size_t *out_len);
|
/external/chromium_org/third_party/libjingle/source/talk/session/media/ |
srtpfilter_unittest.cc | 93 int rtp_len = sizeof(kPcmuFrame), rtcp_len = sizeof(kRtcpReport), out_len; local 103 sizeof(rtp_packet), &out_len)); 104 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs1)); 106 EXPECT_TRUE(f2_.UnprotectRtp(rtp_packet, out_len, &out_len)); 107 EXPECT_EQ(rtp_len, out_len); 111 sizeof(rtp_packet), &out_len)); 112 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs2)); 114 EXPECT_TRUE(f1_.UnprotectRtp(rtp_packet, out_len, &out_len)); 534 int out_len = 0; local 542 int out_len = 0; local 550 int out_len = 0, expected_len = sizeof(kPcmuFrame); local 556 int out_len = 0, expected_len = sizeof(kRtcpReport); local 611 int out_len; local 624 int out_len; local 633 int out_len; local 646 int out_len; local [all...] |
/external/chromium/crypto/ |
encryptor_openssl.cc | 107 int out_len; local 108 if (!EVP_CipherUpdate(ctx.get(), out_ptr, &out_len, 116 if (!EVP_CipherFinal_ex(ctx.get(), out_ptr + out_len, &tail_len)) 119 out_len += tail_len; 120 DCHECK_LE(out_len, static_cast<int>(output_size)); 121 result.resize(out_len);
|
/external/chromium/third_party/libjingle/source/talk/session/phone/ |
srtpfilter.cc | 123 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 128 return send_session_.ProtectRtp(p, in_len, max_len, out_len); 131 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { 136 return send_session_.ProtectRtcp(p, in_len, max_len, out_len); 139 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { 144 return recv_session_.UnprotectRtp(p, in_len, out_len); 147 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { 152 return recv_session_.UnprotectRtcp(p, in_len, out_len); 271 bool SrtpSession::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { 284 *out_len = in_len [all...] |
srtpfilter.h | 72 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 73 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 76 bool UnprotectRtp(void* data, int in_len, int* out_len); 77 bool UnprotectRtcp(void* data, int in_len, int* out_len); 120 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 121 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 124 bool UnprotectRtp(void* data, int in_len, int* out_len); 125 bool UnprotectRtcp(void* data, int in_len, int* out_len);
|
/external/chromium_org/third_party/libjingle/source/talk/base/ |
transformadapter.cc | 82 size_t out_len = buffer_len; local 84 buffer, &out_len, 88 // Note: Don't signal SR_EOS this iteration, unless out_len is zero 94 } else if ((out_len == 0) && (state_ == ST_FLUSHING)) { 105 if (out_len == 0) 109 *read = out_len; 132 size_t out_len = sizeof(buffer_) - len_; local 134 buffer_ + len_, &out_len, 148 len_ = out_len;
|
messagedigest.h | 67 // |out_len| bytes long. Returns the number of bytes written to |output| if 68 // successful, or 0 if |out_len| was too small. 70 void* output, size_t out_len); 75 void* output, size_t out_len); 96 // the HMAC to the buffer |output|, which is |out_len| bytes long. Returns the 97 // number of bytes written to |output| if successful, or 0 if |out_len| was too 101 void* output, size_t out_len); 107 void* output, size_t out_len);
|
/system/core/libcutils/ |
strdup8to16.c | 39 * out_len is an out parameter (which may not be null) containing the 43 extern char16_t * strdup8to16 (const char* s, size_t *out_len) 59 return strcpy8to16 (ret, s, out_len); 147 * out_len is an out parameter (which may not be null) containing the 152 size_t *out_len) 174 *out_len = dest - utf16Str; 181 * out_len is an out parameter (which may not be null) containing the 186 int length, size_t *out_len) 211 *out_len = dest - utf16Str;
|
/external/srtp/crypto/hash/ |
null_auth.c | 56 null_auth_alloc(auth_t **a, int key_len, int out_len) { 61 debug_print(mod_auth, " tag length %d", out_len); 72 (*a)->out_len = out_len; 73 (*a)->prefix_len = out_len;
|