/prebuilts/go/linux-x86/src/runtime/ |
syscall_windows.go | 26 cbs callbacks 27 cbctxts **wincallbackcontext = &cbs.ctxt[0] // to simplify access to cbs.ctxt in sys_windows_*.s 63 lock(&cbs.lock) 64 defer unlock(&cbs.lock) 66 n := cbs.n 68 if cbs.ctxt[i].gobody == fn.data && cbs.ctxt[i].isCleanstack() == cleanstack { 85 cbs.ctxt[n] = c 86 cbs.n+ 25 cbs callbacks var [all...] |
/external/boringssl/src/ssl/ |
ssl_asn1.cc | 475 * explicitly tagged with |tag| from |cbs| and saves it in |*out|. On 480 static int SSL_SESSION_parse_string(CBS *cbs, char **out, unsigned tag) { 481 CBS value; 483 if (!CBS_get_optional_asn1_octet_string(cbs, &value, &present, tag)) { 504 * explicitly tagged with |tag| from |cbs| and stows it in |*out_ptr| 509 static int SSL_SESSION_parse_octet_string(CBS *cbs, uint8_t **out_ptr, 511 CBS value; 512 if (!CBS_get_optional_asn1_octet_string(cbs, &value, NULL, tag)) 810 CBS cbs; local [all...] |
d1_both.cc | 336 CBS cbs; local 337 CBS_init(&cbs, rr->data, rr->length); 339 while (CBS_len(&cbs) > 0) { 342 CBS body; 343 if (!dtls1_parse_fragment(&cbs, &msg_hdr, &body)) { 431 void dtls1_get_current_message(const SSL *ssl, CBS *out) { 476 int dtls1_parse_fragment(CBS *cbs, struct hm_header_st *out_hdr, 477 CBS *out_body) 657 CBS cbs, body; local [all...] |
tls13_both.cc | 188 CBS cbs, context, certificate_list; local 189 CBS_init(&cbs, ssl->init_msg, ssl->init_num); 190 if (!CBS_get_u8_length_prefixed(&cbs, &context) || 209 if (!CBS_get_u24_length_prefixed(&cbs, &certificate_list)) { 216 CBS certificate, extensions; 258 CBS status_request, sct; 282 CBS ocsp_response; 323 if (CBS_len(&cbs) != 0) { 381 CBS cbs, signature local 603 CBS cbs; local [all...] |
tls_record.cc | 207 enum ssl_open_record_t tls_open_record(SSL *ssl, uint8_t *out_type, CBS *out, 212 CBS cbs; local 213 CBS_init(&cbs, in, in_len); 218 if (!CBS_get_u8(&cbs, &type) || 219 !CBS_get_u16(&cbs, &version) || 220 !CBS_get_u16(&cbs, &ciphertext_len)) { 252 CBS body; 253 if (!CBS_get_bytes(&cbs, &body, ciphertext_len)) { 261 *out_consumed = in_len - CBS_len(&cbs); [all...] |
d1_pkt.cc | 162 CBS body; 225 CBS cbs, body; local 227 CBS_init(&cbs, rr->data, rr->length); 228 if (!dtls1_parse_fragment(&cbs, &msg_hdr, &body)) {
|
s3_both.cc | 588 CBS v2_client_hello; 605 CBS cipher_specs, session_id, challenge; 750 void ssl3_get_current_message(const SSL *ssl, CBS *out) { 760 CBS cbs; local 761 hs->ssl->method->get_current_message(hs->ssl, &cbs); 762 return SSL_TRANSCRIPT_update(&hs->transcript, CBS_data(&cbs), CBS_len(&cbs)); 783 int ssl_parse_extensions(const CBS *cbs, uint8_t *out_alert [all...] |
/external/boringssl/src/crypto/obj/ |
obj_test.cc | 34 CBS cbs; local 35 CBS_init(&cbs, kDER, sizeof(kDER)); 36 ASSERT_EQ(kNID, OBJ_cbs2nid(&cbs)); 50 CBS_init(&cbs, NULL, 0); 51 ASSERT_EQ(NID_undef, OBJ_cbs2nid(&cbs)); 57 CBS_init(&cbs, kUnknownDER, sizeof(kUnknownDER)); 58 ASSERT_EQ(NID_undef, OBJ_cbs2nid(&cbs));
|
obj.c | 223 int OBJ_cbs2nid(const CBS *cbs) { 224 if (CBS_len(cbs) > INT_MAX) { 230 obj.data = CBS_data(cbs); 231 obj.length = (int)CBS_len(cbs); 431 static int parse_oid_component(CBS *cbs, uint64_t *out) { 435 if (!CBS_get_u8(cbs, &b)) { 487 CBS cbs; local [all...] |
/frameworks/av/camera/ndk/impl/ |
ACameraDevice.h | 109 /*optional*/ACameraCaptureSession_captureCallbacks* cbs, 114 /*optional*/ACameraCaptureSession_captureCallbacks* cbs, 120 /*optional*/ACameraCaptureSession_captureCallbacks* cbs, 229 ACameraCaptureSession_captureCallbacks* cbs); 232 ACameraCaptureSession_captureCallbacks* cbs) { 233 if (cbs != nullptr) { 234 return *cbs;
|
/external/boringssl/src/include/openssl/ |
pool.h | 53 CBS *cbs, CRYPTO_BUFFER_POOL *pool); 72 OPENSSL_EXPORT void CRYPTO_BUFFER_init_CBS(const CRYPTO_BUFFER *buf, CBS *out);
|
ec_key.h | 188 * 5915) from |cbs| and advances |cbs|. It returns a newly-allocated |EC_KEY| or 192 OPENSSL_EXPORT EC_KEY *EC_KEY_parse_private_key(CBS *cbs, 203 * name from |cbs| and advances |cbs|. It returns a newly-allocated |EC_GROUP| 205 OPENSSL_EXPORT EC_GROUP *EC_KEY_parse_curve_name(CBS *cbs); 213 * 5480) from |cbs| and advances |cbs|. It returns a newly-allocated |EC_GROUP [all...] |
dsa.h | 235 /* DSA_SIG_parse parses a DER-encoded DSA-Sig-Value structure from |cbs| and 236 * advances |cbs|. It returns a newly-allocated |DSA_SIG| or NULL on error. */ 237 OPENSSL_EXPORT DSA_SIG *DSA_SIG_parse(CBS *cbs); 243 /* DSA_parse_public_key parses a DER-encoded DSA public key from |cbs| and 244 * advances |cbs|. It returns a newly-allocated |DSA| or NULL on error. */ 245 OPENSSL_EXPORT DSA *DSA_parse_public_key(CBS *cbs); 252 /* DSA_parse_private_key parses a DER-encoded DSA private key from |cbs| and 253 * advances |cbs|. It returns a newly-allocated |DSA| or NULL on error. * [all...] |
obj.h | 101 /* OBJ_cbs2nid returns the nid corresponding to the DER data in |cbs|, or 103 OPENSSL_EXPORT int OBJ_cbs2nid(const CBS *cbs);
|
ecdsa.h | 151 /* ECDSA_SIG_parse parses a DER-encoded ECDSA-Sig-Value structure from |cbs| and 152 * advances |cbs|. It returns a newly-allocated |ECDSA_SIG| or NULL on error. */ 153 OPENSSL_EXPORT ECDSA_SIG *ECDSA_SIG_parse(CBS *cbs);
|
pkcs8.h | 115 * the EncryptedPrivateKeyInfo structure from |cbs| and advances |cbs|. It 117 OPENSSL_EXPORT EVP_PKEY *PKCS8_parse_encrypted_private_key(CBS *cbs, 127 CBS *in, const char *password);
|
/external/boringssl/src/crypto/pool/ |
pool.c | 138 CRYPTO_BUFFER* CRYPTO_BUFFER_new_from_CBS(CBS *cbs, CRYPTO_BUFFER_POOL *pool) { 139 return CRYPTO_BUFFER_new(CBS_data(cbs), CBS_len(cbs), pool); 198 void CRYPTO_BUFFER_init_CBS(const CRYPTO_BUFFER *buf, CBS *out) {
|
/external/strace/tests/ |
aio.c | 188 const long *cbs = tail_memdup(proto_cbs, sizeof(proto_cbs)); local 230 rc = syscall(__NR_io_submit, *ctx, nr, cbs + nr); 232 *ctx, (long) nr, cbs + nr, sprintrc(rc)); 234 rc = syscall(__NR_io_submit, *ctx, -1L, cbs); 236 *ctx, cbs, sprintrc(rc)); 238 rc = syscall(__NR_io_submit, *ctx, nr, cbs);
|
/external/strace/tests-m32/ |
aio.c | 188 const long *cbs = tail_memdup(proto_cbs, sizeof(proto_cbs)); local 230 rc = syscall(__NR_io_submit, *ctx, nr, cbs + nr); 232 *ctx, (long) nr, cbs + nr, sprintrc(rc)); 234 rc = syscall(__NR_io_submit, *ctx, -1L, cbs); 236 *ctx, cbs, sprintrc(rc)); 238 rc = syscall(__NR_io_submit, *ctx, nr, cbs);
|
/external/strace/tests-mx32/ |
aio.c | 188 const long *cbs = tail_memdup(proto_cbs, sizeof(proto_cbs)); local 230 rc = syscall(__NR_io_submit, *ctx, nr, cbs + nr); 232 *ctx, (long) nr, cbs + nr, sprintrc(rc)); 234 rc = syscall(__NR_io_submit, *ctx, -1L, cbs); 236 *ctx, cbs, sprintrc(rc)); 238 rc = syscall(__NR_io_submit, *ctx, nr, cbs);
|
/external/libevent/ |
evthread_pthread.c | 164 struct evthread_lock_callbacks cbs = { local 185 evthread_set_lock_callbacks(&cbs);
|
/external/boringssl/src/crypto/x509/ |
x_pubkey.c | 154 CBS cbs; local 155 CBS_init(&cbs, spki, (size_t)spki_len); 156 ret = EVP_parse_public_key(&cbs); 157 if (ret == NULL || CBS_len(&cbs) != 0) {
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8_x509.c | 109 CBS cbs; 110 CBS_init(&cbs, der, (size_t)der_len); 111 EVP_PKEY *ret = EVP_parse_private_key(&cbs); 112 if (ret == NULL || CBS_len(&cbs) != 0) { 171 CBS cbs; 172 CBS_init(&cbs, in, in_len); 173 pkey = PKCS8_parse_encrypted_private_key(&cbs, pass, pass_len); 174 if (pkey == NULL || CBS_len(&cbs) != 0) [all...] |
/external/boringssl/src/crypto/bytestring/ |
bytestring_test.cc | 37 CBS data; 53 CBS data; 77 CBS data, prefixed; 98 CBS data, prefixed; 121 CBS data, contents; 225 CBS data; 470 CBS in; 573 CBS in, out; 628 CBS cbs; local 648 CBS cbs; local 731 CBS cbs; local 749 CBS cbs; local 784 CBS cbs; local [all...] |
/external/boringssl/src/crypto/evp/ |
evp_test.cc | 143 EVP_PKEY *(*parse_func)(CBS *cbs), 150 CBS cbs; local 151 CBS_init(&cbs, input.data(), input.size()); 152 bssl::UniquePtr<EVP_PKEY> pkey(parse_func(&cbs));
|