/external/boringssl/src/crypto/fipsmodule/rsa/ |
internal.h | 76 size_t max_out, const uint8_t *in, size_t in_len, 78 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 95 size_t max_out, const uint8_t *from, 100 size_t max_out, const uint8_t *from, 103 size_t max_out, const uint8_t *from,
|
padding.c | 97 size_t max_out, const uint8_t *from, 138 if (from_len - pad > max_out) { 191 size_t max_out, const uint8_t *from, 242 if (msg_len > max_out) { 244 // |max_out| as the key size and |from_len| is bounded by the key size. 385 size_t max_out, const uint8_t *from, 462 if (max_out < mlen) {
|
rsa.c | 276 int RSA_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 279 return rsa->meth->sign_raw(rsa, out_len, out, max_out, in, in_len, padding); 282 return rsa_default_sign_raw(rsa, out_len, out, max_out, in, in_len, padding); 300 int RSA_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 303 return rsa->meth->decrypt(rsa, out_len, out, max_out, in, in_len, padding); 306 return rsa_default_decrypt(rsa, out_len, out, max_out, in, in_len, padding); 526 int RSA_sign_pss_mgf1(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 543 RSA_sign_raw(rsa, out_len, out, max_out, padded, padded_len,
|
rsa_impl.c | 116 int RSA_encrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 129 if (max_out < rsa_size) { 319 size_t max_out, const uint8_t *in, size_t in_len, 325 if (max_out < rsa_size) { 365 int rsa_default_decrypt(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 371 if (max_out < rsa_size) { 429 int RSA_verify_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, 439 if (max_out < rsa_size) { [all...] |
/external/mesa3d/src/mesa/drivers/dri/nouveau/ |
nouveau_render_t.c | 158 unsigned max_out; local 163 max_out = MAX_OUT_I32; 167 max_out = MAX_OUT_I16; 171 max_out = MAX_OUT_I16; 176 max_out = 0; 180 max_out = MAX_OUT_L; 183 return MAX2(0, n - 7) * max_out * MAX_PACKET / (1 + MAX_PACKET);
|
/external/icu/icu4c/source/test/intltest/ |
punyref.cpp | 135 punycode_uint n, delta, h, b, out, max_out, bias, j, m, q, k, t; local 141 max_out = *output_length; 148 if (max_out - out < 2) return punycode_big_output; 193 if (out >= max_out) return punycode_big_output; 224 punycode_uint n, out, i, max_out, bias, local 231 max_out = *output_length; 239 if (b > max_out) return punycode_big_output; 286 if (out >= max_out) return punycode_big_output;
|
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/stringprep/ |
PunycodeReference.java | 145 int delta, h, b, out, max_out, bias, j, q, k, t; local 151 max_out = output_length[0]; 158 if (max_out - out < 2) return punycode_big_output; 203 if (out >= max_out) return punycode_big_output; 305 int n, out, i, max_out, bias, local 312 max_out = output_length[0]; 324 if (b > max_out) return punycode_big_output; 371 if (out >= max_out) return punycode_big_output;
|
/external/icu/icu4j/main/tests/core/src/com/ibm/icu/dev/test/stringprep/ |
PunycodeReference.java | 142 int delta, h, b, out, max_out, bias, j, q, k, t; local 148 max_out = output_length[0]; 155 if (max_out - out < 2) return punycode_big_output; 200 if (out >= max_out) return punycode_big_output; 302 int n, out, i, max_out, bias, local 309 max_out = output_length[0]; 321 if (b > max_out) return punycode_big_output; 368 if (out >= max_out) return punycode_big_output;
|
/external/boringssl/src/ssl/ |
dtls_record.cc | 294 int dtls_seal_record(SSL *ssl, uint8_t *out, size_t *out_len, size_t max_out, 298 if (buffers_alias(in, in_len, out, max_out) && 299 (max_out < prefix || out + prefix != in)) { 315 if (max_out < DTLS1_RT_HEADER_LENGTH) { 332 max_out - DTLS1_RT_HEADER_LENGTH, type, record_version,
|
s3_pkt.cc | 243 size_t max_out = len + SSL_max_seal_overhead(ssl); local 244 if (max_out < len || max_out + flight_len < max_out) { 248 max_out += flight_len; 250 if (!buf->EnsureCap(flight_len + ssl_seal_align_prefix_len(ssl), max_out)) {
|
ssl_privkey.cc | 197 SSL_HANDSHAKE *hs, uint8_t *out, size_t *out_len, size_t max_out, 203 ret = ssl->cert->key_method->complete(ssl, out, out_len, max_out); 205 ret = ssl->cert->key_method->sign(ssl, out, out_len, max_out, sigalg, 215 *out_len = max_out; 236 size_t max_out, 242 ret = ssl->cert->key_method->complete(ssl, out, out_len, max_out); 244 ret = ssl->cert->key_method->decrypt(ssl, out, out_len, max_out, 263 if (!RSA_decrypt(rsa, out_len, out, max_out, in.data(), in.size(),
|
d1_both.cc | 631 size_t *out_len, size_t max_out, 650 if (max_out < sizeof(kChangeCipherSpec) + overhead) { 654 if (!dtls_seal_record(ssl, out, out_len, max_out, 680 if (max_out < DTLS1_HM_HEADER_LENGTH + 1 + overhead || max_out < prefix) { 684 if (todo > max_out - DTLS1_HM_HEADER_LENGTH - overhead) { 685 todo = max_out - DTLS1_HM_HEADER_LENGTH - overhead; 691 size_t max_frag = max_out - prefix, frag_len; 707 if (!dtls_seal_record(ssl, out, out_len, max_out, SSL3_RT_HANDSHAKE, 726 size_t max_out) { [all...] |
s3_both.cc | 147 size_t max_out = in.size() + SSL_max_seal_overhead(ssl); local 148 size_t new_cap = ssl->s3->pending_flight->length + max_out; 149 if (max_out < in.size() || new_cap < max_out) { 159 &len, max_out, type, in.data(), in.size())) {
|
ssl_session.cc | 562 const size_t max_out = session_len + max_overhead; local 563 if (max_out < max_overhead) { 569 if (!CBB_reserve(out, &ptr, max_out)) { 574 if (!method->seal(ssl, ptr, &out_len, max_out, session_buf, session_len)) { [all...] |
ssl_lib.cc | [all...] |
/external/tensorflow/tensorflow/contrib/seq2seq/python/kernel_tests/ |
decoder_test.py | 45 max_out = max(sequence_length) 94 time_steps = max_out 96 time_steps = min(max_out, maximum_iterations) 123 max_out = max(sequence_length) 161 # Decoder only runs out to max_out; ensure values are identical 164 sess_results["final_rnn_outputs"][:, 0:max_out, :])
|
/system/keymaster/include/keymaster/legacy_support/ |
keymaster1_engine.h | 103 static int rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 105 static int rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out,
|
/external/boringssl/src/include/openssl/ |
base64.h | 97 // |*out_len| bytes to |out|. |max_out| is the size of the output 101 size_t max_out, const uint8_t *in,
|
rsa.h | 167 // and writes, at most, |max_out| bytes of encrypted data to |out|. The 168 // |max_out| argument must be, at least, |RSA_size| in order to ensure success. 176 size_t max_out, const uint8_t *in, size_t in_len, 180 // |rsa| and writes, at most, |max_out| bytes of plaintext to |out|. The 181 // |max_out| argument must be, at least, |RSA_size| in order to ensure success. 195 size_t max_out, const uint8_t *in, size_t in_len, 242 // at most, |max_out| bytes of signature data to |out|. The |max_out| argument 254 size_t max_out, const uint8_t *in, 259 // and writes, at most, |max_out| bytes of signature data to |out|. Th [all...] |
/external/mesa3d/src/gallium/drivers/nouveau/nv50/ |
nv50_program.h | 66 ubyte max_out; /* REG_ALLOC_RESULT or FP_RESULT_COUNT */ member in struct:nv50_program
|
nv50_program.c | 128 prog->max_out = n; 129 if (!prog->max_out) 130 prog->max_out = 1; 230 prog->max_out = MAX2(prog->max_out, prog->out[i].hw + 4); 234 info->out[info->io.sampleMask].slot[0] = prog->max_out++; 239 info->out[info->io.fragDepth].slot[2] = prog->max_out++; 241 if (!prog->max_out) 242 prog->max_out = 4;
|
/system/keymaster/legacy_support/ |
keymaster1_engine.cpp | 284 int Keymaster1Engine::rsa_sign_raw(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 303 *out_len = std::min(output.data_length, max_out); 309 int Keymaster1Engine::rsa_decrypt(RSA* rsa, size_t* out_len, uint8_t* out, size_t max_out, 328 *out_len = std::min(output.data_length, max_out);
|
/external/tensorflow/tensorflow/tools/graph_transforms/ |
freeze_requantization_ranges_test.cc | 88 quantized_bias_add_op.max_out); 92 quantized_bias_add_op.min_out, quantized_bias_add_op.max_out,
|
/external/boringssl/src/crypto/pkcs8/ |
pkcs8.c | 488 size_t max_out = plaintext_len + EVP_CIPHER_CTX_block_size(&ctx); local 489 if (max_out < plaintext_len) { 498 !CBB_reserve(&ciphertext, &ptr, max_out) ||
|
/external/boringssl/src/crypto/base64/ |
base64.c | 393 int EVP_DecodeBase64(uint8_t *out, size_t *out_len, size_t max_out, 403 max_out < max_len) {
|