/external/ltp/testcases/kernel/device-drivers/agp/kernel_space/ |
tagp.h | 80 int out_len; // output data length member in struct:tagp_interface
|
/external/ltp/testcases/kernel/device-drivers/base/tbase/ |
tbase.h | 66 int out_len; // output data length member in struct:tmod_interface
|
/external/syslinux/lzo/src/ |
stats1a.h | 109 long out_len; member in struct:__anon35090
|
stats1b.h | 106 long out_len; member in struct:__anon35091
|
/bionic/libc/kernel/uapi/linux/ |
scif_ioctl.h | 39 __s32 out_len; member in struct:scifioctl_msg
|
/external/boringssl/src/crypto/cipher_extra/ |
aead_test.cc | 143 size_t out_len; 144 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), out.data(), &out_len, out.size(), 147 out.resize(out_len); 507 size_t out_len; local 509 ctx.get(), out1 /* in - 1 */, &out_len, sizeof(kPlaintext) + max_overhead, 512 ctx.get(), out2 /* in + 1 */, &out_len, sizeof(kPlaintext) + max_overhead, 517 EXPECT_FALSE(EVP_AEAD_CTX_open(ctx.get(), out1 /* in - 1 */, &out_len, 520 EXPECT_FALSE(EVP_AEAD_CTX_open(ctx.get(), out2 /* in + 1 */, &out_len, 528 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), in, &out_len, 532 Bytes(in, out_len)); 576 size_t out_len; local [all...] |
/external/boringssl/src/crypto/evp/ |
p_rsa.c | 183 unsigned out_len; local 186 if (!RSA_sign(EVP_MD_type(rctx->md), tbs, tbslen, sig, &out_len, rsa)) { 189 *siglen = out_len; 238 size_t *out_len, const uint8_t *sig, 245 *out_len = key_len; 249 if (*out_len < key_len) { 255 return RSA_verify_raw(rsa, out_len, out, *out_len, sig, sig_len, 297 *out_len = hash_len;
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
rsa_impl.c | 116 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 195 *out_len = rsa_size; 321 int rsa_default_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, 359 *out_len = rsa_size; 371 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 405 RSA_padding_check_PKCS1_type_2(out, out_len, rsa_size, buf, rsa_size); 409 ret = RSA_padding_check_PKCS1_OAEP_mgf1(out, out_len, rsa_size, buf, 413 *out_len = rsa_size; 436 int RSA_verify_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 509 RSA_padding_check_PKCS1_type_1(out, out_len, rsa_size, buf, rsa_size) 868 size_t out_len = (size_t)out->top; local [all...] |
rsa.c | 198 size_t out_len; local 200 if (!RSA_encrypt(rsa, &out_len, to, RSA_size(rsa), from, flen, padding)) { 204 if (out_len > INT_MAX) { 208 return out_len; 211 int RSA_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 214 return rsa->meth->sign_raw(rsa, out_len, out, max_out, in, in_len, padding); 217 return rsa_default_sign_raw(rsa, out_len, out, max_out, in, in_len, padding); 222 size_t out_len; local 224 if (!RSA_sign_raw(rsa, &out_len, to, RSA_size(rsa), from, flen, padding)) { 228 if (out_len > INT_MAX) 246 size_t out_len; local 261 size_t out_len; local [all...] |
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 75 uint8_t **out, size_t *out_len) { 94 *out_len = ulen; 101 size_t out_len, uint8_t *out, const EVP_MD *md) { 166 while (out_len != 0) { 185 size_t todo = out_len < A_len ? out_len : A_len; 188 out_len -= todo; 189 if (out_len == 0) { 353 int pkcs8_pbe_decrypt(uint8_t **out, size_t *out_len, CBS *algorithm, 402 *out_len = n1 + n2 425 size_t out_len; local [all...] |
pkcs8_x509.c | 417 size_t out_len; local 440 if (!pkcs8_pbe_decrypt(&out, &out_len, &ai, ctx->password, 447 CBS_init(&safe_contents, out, out_len);
|
/external/boringssl/src/crypto/rsa_extra/ |
rsa_test.cc | 469 size_t out_len; local 471 rsa.get(), &out_len, out, sizeof(out), kTwoPrimeEncryptedMessage, 473 EXPECT_EQ(Bytes("hello world"), Bytes(out, out_len)); [all...] |
/external/boringssl/src/tool/ |
speed.cc | 241 size_t out_len; 242 return EVP_AEAD_CTX_seal(ctx.get(), out, &out_len, 251 size_t out_len; local 252 EVP_AEAD_CTX_seal(ctx.get(), out, &out_len, chunk_len + overhead_len, 256 &nonce, &ad, out_len]() -> bool { 259 nonce.get(), nonce_len, out, out_len,
|
/external/curl/lib/ |
curl_ntlm_core.c | 233 int out_len; /* not used, required by NSS */ local 264 if(SECSuccess == PK11_CipherOp(ctx, out, &out_len, /* outbuflen */ 8, 287 size_t out_len; local 299 8 /* outbuflen */, &out_len);
|
/external/kernel-headers/original/uapi/linux/ |
scif_ioctl.h | 100 * @out_len: number of bytes sent/received 106 __s32 out_len; member in struct:scifioctl_msg
|
/external/sqlite/android/ |
PhoneNumberUtils.cpp | 442 int out_len = 0; local 447 if (out_len < len) { 448 out[out_len++] = c; 454 if (out_len < len) { 455 out[out_len++] = c; 462 out_len = 0; 468 *outlen = out_len;
|
/external/syslinux/lzo/ |
prepcore.c | 60 lzo_bytep out, lzo_uintp out_len, 72 lzo_bytep out, lzo_uintp out_len, 180 lzo_uint out_len = 0; local 260 out_len = out_bufsize; 261 r = lzo1x_999_compress_internal(in, in_len, out, &out_len, wrkmem, 268 if (out_len < best_len) { 269 best_len = out_len; 286 out_len = out_bufsize; 287 r = lzo1x_999_compress_internal(in, in_len, out, &out_len, wrkmem, 291 assert(out_len == best_len) [all...] |
/external/webrtc/talk/session/media/ |
srtpfilter_unittest.cc | 98 int rtp_len = sizeof(kPcmuFrame), rtcp_len = sizeof(kRtcpReport), out_len; local 108 sizeof(rtp_packet), &out_len)); 109 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs1)); 111 EXPECT_TRUE(f2_.UnprotectRtp(rtp_packet, out_len, &out_len)); 112 EXPECT_EQ(rtp_len, out_len); 116 sizeof(rtp_packet), &out_len)); 117 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs2)); 119 EXPECT_TRUE(f1_.UnprotectRtp(rtp_packet, out_len, &out_len)); 583 int out_len = 0; local 591 int out_len = 0; local 599 int out_len = 0, expected_len = sizeof(kPcmuFrame); local 605 int out_len = 0, expected_len = sizeof(kRtcpReport); local 663 int out_len = 0; local 673 int out_len; local 686 int out_len; local 695 int out_len; local 708 int out_len; local [all...] |
/system/netd/server/ |
NetdNativeService.cpp | 244 size_t out_len; local 245 if (EVP_DecodedLength(&out_len, input.size()) != 1) { 249 // out_len is now an upper bound on the output length. 250 std::vector<uint8_t> decoded(out_len); 251 if (EVP_DecodeBase64(decoded.data(), &out_len, decoded.size(), 254 decoded.resize(out_len);
|
/system/security/keystore/ |
blob.cpp | 77 int out_len; local 79 EVP_EncryptUpdate(ctx.get(), out_pos, &out_len, in, len); 80 out_pos += out_len; 81 EVP_EncryptFinal_ex(ctx.get(), out_pos, &out_len); 82 out_pos += out_len; 111 int out_len; local 113 EVP_DecryptUpdate(ctx.get(), out_pos, &out_len, in, len); 114 out_pos += out_len; 115 if (!EVP_DecryptFinal_ex(ctx.get(), out_pos, &out_len)) { 119 out_pos += out_len; [all...] |
/external/boringssl/src/crypto/bytestring/ |
bytestring_test.cc | 472 size_t out_len; local 475 ASSERT_TRUE(CBS_asn1_ber_to_der(&in, &out, &out_len)); 482 EXPECT_EQ(Bytes(der_expected, der_len), Bytes(out, out_len)); 551 size_t out_len; member in struct:ImplicitStringTest 582 EXPECT_EQ(Bytes(test.out, test.out_len),
|
/external/boringssl/src/crypto/fipsmodule/ |
bcm.c | 505 size_t out_len; local 515 if (!EVP_AEAD_CTX_seal(&aead_ctx, output, &out_len, sizeof(output), nonce, 524 if (!EVP_AEAD_CTX_open(&aead_ctx, output, &out_len, sizeof(output), nonce,
|
/external/harfbuzz_ng/src/ |
hb-buffer-private.hh | 95 unsigned int out_len; /* Length of ->out array if have_output */ member in struct:hb_buffer_t 108 inline hb_glyph_info_t &prev (void) { return out_info[out_len ? out_len - 1 : 0]; } 109 inline hb_glyph_info_t prev (void) const { return out_info[out_len ? out_len - 1 : 0]; } 175 { return have_output? out_len : idx; } 212 if (unlikely (out_info != info || out_len != idx)) { 214 out_info[out_len] = info[idx]; 216 out_len++;
|
/system/nfc/src/nfc/ndef/ |
ndef_utils.c | 1449 uint32_t out_len, max_out_len; local [all...] |
/device/linaro/bootloader/edk2/AppPkg/Applications/Python/Python-2.7.10/Modules/ |
binascii.c | 738 Py_ssize_t in_len, out_len, out_len_left;
local 758 out_len = in_len*2;
759 if ( (rv=PyString_FromStringAndSize(NULL, out_len)) == NULL ) {
763 out_len_left = out_len;
784 if ( out_len > PY_SSIZE_T_MAX / 2) return PyErr_NoMemory(); \
785 if (_PyString_Resize(&rv, 2*out_len) < 0) \
788 + out_len; \
789 out_len_left = out_len-1; \
790 out_len = out_len * 2; \ [all...] |