/third_party/libsnd/tests/ |
D | long_read_write_test.c | 41 static void short_lrw_test (const char *filename, int filetype, const short * output, int out_len) ; 42 static void int_lrw_test (const char *filename, int filetype, const int * output, int out_len) ; 43 static void float_lrw_test (const char *filename, int filetype, const float * output, int out_len) ; 44 static void double_lrw_test (const char *filename, int filetype, const double * output, int out_len… 90 short_lrw_test (const char *filename, int filetype, const short * output, int out_len) in short_lrw_test() argument 98 exit_if_true (BUFFER_LENGTH > out_len, "\n\nLine %d: Bad array length.\n", __LINE__) ; in short_lrw_test() 101 sfinfo.frames = out_len ; in short_lrw_test() 107 test_write_short_or_die (file, 0, output, out_len, __LINE__) ; in short_lrw_test() 116 …exit_if_true (sfinfo.frames < out_len, "\n\nLine %d: Incorrect number of frames in file (too short… in short_lrw_test() 121 test_read_short_or_die (file, 0, input, out_len, __LINE__) ; in short_lrw_test() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/ |
D | base64.c | 27 size_t *out_len, const char *table, int add_pad) in base64_gen_encode() argument 83 if (out_len) in base64_gen_encode() 84 *out_len = pos - out; in base64_gen_encode() 90 size_t *out_len, const char *table) in base64_gen_decode() argument 153 *out_len = pos - out; in base64_gen_decode() 170 char * base64_encode(const void *src, size_t len, size_t *out_len) in base64_encode() argument 172 return base64_gen_encode(src, len, out_len, base64_table, in base64_encode() 177 char * base64_encode_no_lf(const void *src, size_t len, size_t *out_len) in base64_encode_no_lf() argument 179 return base64_gen_encode(src, len, out_len, base64_table, BASE64_PAD); in base64_encode_no_lf() 183 char * base64_url_encode(const void *src, size_t len, size_t *out_len) in base64_url_encode() argument [all …]
|
D | base64.h | 12 char * base64_encode(const void *src, size_t len, size_t *out_len); 13 char * base64_encode_no_lf(const void *src, size_t len, size_t *out_len); 14 unsigned char * base64_decode(const char *src, size_t len, size_t *out_len); 15 char * base64_url_encode(const void *src, size_t len, size_t *out_len); 16 unsigned char * base64_url_decode(const char *src, size_t len, size_t *out_len);
|
/third_party/node/deps/openssl/openssl/providers/implementations/macs/ |
D | kmac_prov.c | 121 size_t out_len; member 131 static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len, 133 static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len, 135 static int bytepad(unsigned char *out, size_t *out_len, 140 size_t *out_len, 190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new() 232 dst->out_len = src->out_len; in kmac_dup() 273 size_t out_len, block_len; in kmac_init() local 307 if (!bytepad(NULL, &out_len, kmac_string, sizeof(kmac_string), in kmac_init() 312 out = OPENSSL_malloc(out_len); in kmac_init() [all …]
|
/third_party/openssl/providers/implementations/macs/ |
D | kmac_prov.c | 121 size_t out_len; member 131 static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len, 133 static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len, 135 static int bytepad(unsigned char *out, size_t *out_len, 140 size_t *out_len, 190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new() 232 dst->out_len = src->out_len; in kmac_dup() 273 size_t out_len, block_len; in kmac_init() local 307 if (!bytepad(NULL, &out_len, kmac_string, sizeof(kmac_string), in kmac_init() 312 out = OPENSSL_malloc(out_len); in kmac_init() [all …]
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/ |
D | base64.c | 22 size_t *out_len, in base64_gen_encode() argument 80 if (out_len) in base64_gen_encode() 81 *out_len = pos - out; in base64_gen_encode() 87 size_t *out_len, in base64_gen_decode() argument 151 *out_len = pos - out; in base64_gen_decode() 169 size_t *out_len) in base64_encode() argument 171 return base64_gen_encode(src, len, out_len, base64_table, 1); in base64_encode() 176 size_t *out_len, int add_pad) in base64_url_encode() argument 178 return base64_gen_encode(src, len, out_len, base64_url_table, add_pad); in base64_url_encode() 193 size_t *out_len) in base64_decode() argument [all …]
|
D | base64.h | 13 size_t *out_len); 15 size_t *out_len); 17 size_t *out_len, int add_pad); 19 size_t *out_len);
|
/third_party/gstreamer/gstplugins_bad/tests/check/elements/ |
D | ccconverter.c | 264 guint n_out, const guint8 ** out, guint * out_len, const gchar * in_caps, in check_conversion_multiple() argument 296 gst_check_buffer_data (buffer, out[i], out_len[i]); in check_conversion_multiple() 311 guint out_len, const gchar * in_caps, const gchar * out_caps, in check_conversion() argument 314 check_conversion_multiple (1, &in, &in_len, 1, &out, &out_len, in_caps, in check_conversion() 320 const guint8 * out, guint out_len, const gchar * in_caps, in check_conversion_tc_passthrough() argument 326 check_conversion (in, in_len, out, out_len, in_caps, out_caps, &tc, &tc); in check_conversion_tc_passthrough() 552 guint out_len[] = { sizeof (out1), sizeof (out2) }; in GST_START_TEST() local 568 G_N_ELEMENTS (out_len), out, out_len, in GST_START_TEST() 609 guint out_len[] = { sizeof (out1) }; in GST_START_TEST() local 625 G_N_ELEMENTS (out_len), out, out_len, in GST_START_TEST() [all …]
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_constant_time_hmac.function | 28 size_t out_len, block_size; 42 out_len = PSA_HASH_LENGTH(alg); 56 out_len = mbedtls_md_get_size(md_info); 57 TEST_ASSERT(out_len != 0); 62 ASSERT_ALLOC(out, out_len); 68 ref_out, out_len, 75 TEST_EQUAL(0, mbedtls_md_hmac_starts(&ctx, ref_out, out_len)); 76 TEST_EQUAL(0, mbedtls_md_hmac_starts(&ref_ctx, ref_out, out_len)); 117 TEST_CF_PUBLIC(out, out_len); 127 out, out_len)); [all …]
|
/third_party/openssl/demos/mac/ |
D | cmac-aes256.c | 73 size_t out_len = 0; in main() local 115 if (!EVP_MAC_final(mctx, NULL, &out_len, 0)) { in main() 119 out = OPENSSL_malloc(out_len); in main() 125 if (!EVP_MAC_final(mctx, out, &out_len, out_len)) { in main() 131 BIO_dump_indent_fp(stdout, out, out_len, 2); in main() 134 if (out_len != sizeof(expected_output)) { in main()
|
D | hmac-sha512.c | 84 size_t out_len = 0; in main() local 126 if (!EVP_MAC_final(mctx, NULL, &out_len, 0)) { in main() 130 out = OPENSSL_malloc(out_len); in main() 136 if (!EVP_MAC_final(mctx, out, &out_len, out_len)) { in main() 142 BIO_dump_indent_fp(stdout, out, out_len, 2); in main() 145 if (out_len != sizeof(expected_output)) { in main()
|
/third_party/skia/third_party/externals/harfbuzz/src/ |
D | hb-buffer.hh | 111 unsigned int out_len; /* Length of ->out_info array if have_output */ member 190 hb_glyph_info_t &prev () { return out_info[out_len ? out_len - 1 : 0]; } in prev() 191 hb_glyph_info_t prev () const { return out_info[out_len ? out_len - 1 : 0]; } in prev() 196 unsigned int backtrack_len () const { return have_output ? out_len : idx; } in backtrack_len() 226 hb_glyph_info_t *pinfo = &out_info[out_len]; in replace_glyphs() 235 out_len += num_out; in replace_glyphs() 250 out_info[out_len] = glyph_info; in output_info() 252 out_len++; in output_info() 269 if (out_info != info || out_len != idx) in next_glyph() 272 out_info[out_len] = info[idx]; in next_glyph() [all …]
|
D | hb-buffer.cc | 164 if (unlikely (!ensure (out_len + num_out))) return false; in make_room_for() 167 out_len + num_out > idx + num_in) in make_room_for() 172 memcpy (out_info, info, out_len * sizeof (out_info[0])); in make_room_for() 207 out_len = 0; in get_scratch_buffer() 246 out_len = 0; in clear() 293 out_len = 0; in clear_output() 303 out_len = 0; in clear_positions() 324 len = out_len; in swap_buffers() 328 out_len = 0; in swap_buffers() 344 assert (i <= out_len + (len - idx)); in move_to() [all …]
|
/third_party/openssl/providers/implementations/kdfs/ |
D | sskdf.c | 64 size_t out_len; /* optional KMAC parameter */ member 101 size_t counter, out_len, len = derived_key_len; in SSKDF_hash_kdm() local 115 out_len = (size_t)hlen; in SSKDF_hash_kdm() 137 if (len >= out_len) { in SSKDF_hash_kdm() 140 out += out_len; in SSKDF_hash_kdm() 141 len -= out_len; in SSKDF_hash_kdm() 221 size_t counter, out_len, len; in SSKDF_mac_kdm() local 242 out_len = EVP_MAC_CTX_get_mac_size(ctx_init); /* output size */ in SSKDF_mac_kdm() 243 if (out_len <= 0 || (mac == mac_buf && out_len > sizeof(mac_buf))) in SSKDF_mac_kdm() 259 if (len >= out_len) { in SSKDF_mac_kdm() [all …]
|
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/ |
D | sskdf.c | 64 size_t out_len; /* optional KMAC parameter */ member 101 size_t counter, out_len, len = derived_key_len; in SSKDF_hash_kdm() local 115 out_len = (size_t)hlen; in SSKDF_hash_kdm() 137 if (len >= out_len) { in SSKDF_hash_kdm() 140 out += out_len; in SSKDF_hash_kdm() 141 len -= out_len; in SSKDF_hash_kdm() 221 size_t counter, out_len, len; in SSKDF_mac_kdm() local 242 out_len = EVP_MAC_CTX_get_mac_size(ctx_init); /* output size */ in SSKDF_mac_kdm() 243 if (out_len <= 0 || (mac == mac_buf && out_len > sizeof(mac_buf))) in SSKDF_mac_kdm() 259 if (len >= out_len) { in SSKDF_mac_kdm() [all …]
|
/third_party/mbedtls/library/ |
D | nist_kw.c | 139 unsigned char *output, size_t *out_len, size_t out_size) in mbedtls_nist_kw_wrap() argument 149 *out_len = 0; in mbedtls_nist_kw_wrap() 246 *out_len = semiblocks * KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_wrap() 270 unsigned char *output, size_t *out_len) in unwrap() argument 279 *out_len = 0; in unwrap() 314 *out_len = (semiblocks - 1) * KW_SEMIBLOCK_LENGTH; in unwrap() 333 unsigned char *output, size_t *out_len, size_t out_size) in mbedtls_nist_kw_unwrap() argument 340 *out_len = 0; in mbedtls_nist_kw_unwrap() 359 A, output, out_len); in mbedtls_nist_kw_unwrap() 398 *out_len = KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_unwrap() [all …]
|
D | ssl_client.c | 131 size_t *out_len) in ssl_write_alpn_ext() argument 135 *out_len = 0; in ssl_write_alpn_ext() 172 *out_len = p - buf; in ssl_write_alpn_ext() 175 MBEDTLS_PUT_UINT16_BE(*out_len - 6, buf, 4); in ssl_write_alpn_ext() 178 MBEDTLS_PUT_UINT16_BE(*out_len - 4, buf, 2); in ssl_write_alpn_ext() 232 size_t *out_len) in ssl_write_supported_groups_ext() argument 239 *out_len = 0; in ssl_write_supported_groups_ext() 298 *out_len = p - buf; in ssl_write_supported_groups_ext() 317 size_t *out_len) in ssl_write_client_hello_cipher_suites() argument 325 *out_len = 0; in ssl_write_client_hello_cipher_suites() [all …]
|
/third_party/libwebsockets/lib/jose/jwe/ |
D | jwe.c | 478 lws_jwe_render_compact(struct lws_jwe *jwe, char *out, size_t out_len) in lws_jwe_render_compact() argument 480 size_t orig = out_len; in lws_jwe_render_compact() 492 jwe->jws.map.len[LJWS_JOSE], out, out_len); in lws_jwe_render_compact() 493 if (n < 0 || (int)out_len == n) { in lws_jwe_render_compact() 500 out_len -= (unsigned int)n + 1; in lws_jwe_render_compact() 503 jwe->jws.map.len[LJWE_EKEY], out, out_len); in lws_jwe_render_compact() 504 if (n < 0 || (int)out_len == n) { in lws_jwe_render_compact() 511 out_len -= (unsigned int)n + 1; in lws_jwe_render_compact() 513 jwe->jws.map.len[LJWE_IV], out, out_len); in lws_jwe_render_compact() 514 if (n < 0 || (int)out_len == n) { in lws_jwe_render_compact() [all …]
|
/third_party/gstreamer/gstplugins_base/gst/audioresample/ |
D | gstaudioresample.c | 562 gsize out_len, outsize; in gst_audio_resample_dump_drain() local 566 out_len = in gst_audio_resample_dump_drain() 568 if (out_len == 0) in gst_audio_resample_dump_drain() 571 outsize = out_len * resample->out.bpf; in gst_audio_resample_dump_drain() 576 gst_buffer_add_audio_meta (outbuf, &resample->out, out_len, NULL); in gst_audio_resample_dump_drain() 581 abuf.planes, out_len); in gst_audio_resample_dump_drain() 593 gsize out_len; in gst_audio_resample_push_drain() local 602 out_len = in gst_audio_resample_push_drain() 604 if (out_len == 0) in gst_audio_resample_push_drain() 607 outsize = out_len * resample->in.bpf; in gst_audio_resample_push_drain() [all …]
|
/third_party/lwip/src/apps/snmp/ |
D | snmpv3_mbedtls.c | 125 size_t out_len; in snmpv3_crypt() local 154 out_len = LWIP_ARRAYSIZE(out_bytes) ; in snmpv3_crypt() 162 … if (mbedtls_cipher_update(&ctx, in_bytes, LWIP_ARRAYSIZE(in_bytes), out_bytes, &out_len) != 0) { in snmpv3_crypt() 166 if (snmp_pbuf_stream_writebuf(&write_stream, out_bytes, (u16_t)out_len) != ERR_OK) { in snmpv3_crypt() 171 out_len = LWIP_ARRAYSIZE(out_bytes); in snmpv3_crypt() 172 if (mbedtls_cipher_finish(&ctx, out_bytes, &out_len) != 0) { in snmpv3_crypt() 176 if (snmp_pbuf_stream_writebuf(&write_stream, out_bytes, (u16_t)out_len) != ERR_OK) { in snmpv3_crypt() 210 size_t out_len = sizeof(out_byte); in snmpv3_crypt() local 215 if (mbedtls_cipher_update(&ctx, &in_byte, sizeof(in_byte), &out_byte, &out_len) != 0) { in snmpv3_crypt()
|
/third_party/mbedtls/programs/psa/ |
D | hmac_demo.c | 130 size_t out_len = 0; in hmac_demo() local 136 PSA_CHECK(psa_mac_sign_finish(&op, out, sizeof(out), &out_len)); in hmac_demo() 137 print_buf("msg1", out, out_len); in hmac_demo() 143 PSA_CHECK(psa_mac_sign_finish(&op, out, sizeof(out), &out_len)); in hmac_demo() 144 print_buf("msg2", out, out_len); in hmac_demo()
|
/third_party/openssl/crypto/modes/ |
D | siv128.c | 93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p() local 117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p() 118 || out_len != SIV_LEN) in siv128_do_s2v_p() 133 int out_len = (int)len; in siv128_do_encrypt() local 137 return EVP_EncryptUpdate(ctx, out, &out_len, in, out_len); in siv128_do_encrypt() 168 size_t out_len = SIV_LEN; in ossl_siv128_init() local 202 || !EVP_MAC_final(mac_ctx, ctx->d.byte, &out_len, in ossl_siv128_init() 250 size_t out_len = SIV_LEN; in ossl_siv128_aad() local 257 || !EVP_MAC_final(mac_ctx, mac_out.byte, &out_len, in ossl_siv128_aad() 259 || out_len != SIV_LEN) { in ossl_siv128_aad()
|
/third_party/node/deps/openssl/openssl/crypto/modes/ |
D | siv128.c | 93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p() local 117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p() 118 || out_len != SIV_LEN) in siv128_do_s2v_p() 133 int out_len = (int)len; in siv128_do_encrypt() local 137 return EVP_EncryptUpdate(ctx, out, &out_len, in, out_len); in siv128_do_encrypt() 168 size_t out_len = SIV_LEN; in ossl_siv128_init() local 202 || !EVP_MAC_final(mac_ctx, ctx->d.byte, &out_len, in ossl_siv128_init() 250 size_t out_len = SIV_LEN; in ossl_siv128_aad() local 257 || !EVP_MAC_final(mac_ctx, mac_out.byte, &out_len, in ossl_siv128_aad() 259 || out_len != SIV_LEN) { in ossl_siv128_aad()
|
/third_party/node/src/crypto/ |
D | crypto_aes.cc | 114 int out_len; in AES_Cipher() local 121 &out_len, in AES_Cipher() 138 out_len = 0; in AES_Cipher() 141 &out_len, in AES_Cipher() 147 total += out_len; in AES_Cipher() 148 CHECK_LE(out_len, buf_len); in AES_Cipher() 149 out_len = EVP_CIPHER_CTX_block_size(ctx.get()); in AES_Cipher() 151 ctx.get(), buf.data<unsigned char>() + total, &out_len)) { in AES_Cipher() 154 total += out_len; in AES_Cipher() 244 int out_len = 0; in AES_CTR_Cipher2() local [all …]
|
/third_party/openssl/doc/man3/ |
D | EVP_PKEY_gettable_params.pod | 25 size_t *out_len); 28 size_t *out_len); 65 If I<out_len> is not NULL, I<*out_len> is set to the length of the string 67 the terminating NUL byte can be obtained from I<*out_len> by calling the 72 If I<out_len> is not NULL, I<*out_len> is set to the length of the contents. 73 The required buffer size can be obtained from I<*out_len> by calling the 88 value. If I<out_len> is not NULL, I<*out_len> will be assigned the required
|