Home
last modified time | relevance | path

Searched refs:out_len (Results 1 – 25 of 170) sorted by relevance

1234567

/third_party/libsnd/tests/
Dlong_read_write_test.c41 static void short_lrw_test (const char *filename, int filetype, const short * output, int out_len) ;
42 static void int_lrw_test (const char *filename, int filetype, const int * output, int out_len) ;
43 static void float_lrw_test (const char *filename, int filetype, const float * output, int out_len) ;
44 static void double_lrw_test (const char *filename, int filetype, const double * output, int out_len
90 short_lrw_test (const char *filename, int filetype, const short * output, int out_len) in short_lrw_test() argument
98 exit_if_true (BUFFER_LENGTH > out_len, "\n\nLine %d: Bad array length.\n", __LINE__) ; in short_lrw_test()
101 sfinfo.frames = out_len ; in short_lrw_test()
107 test_write_short_or_die (file, 0, output, out_len, __LINE__) ; in short_lrw_test()
116 …exit_if_true (sfinfo.frames < out_len, "\n\nLine %d: Incorrect number of frames in file (too short… in short_lrw_test()
121 test_read_short_or_die (file, 0, input, out_len, __LINE__) ; in short_lrw_test()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/utils/
Dbase64.c27 size_t *out_len, const char *table, int add_pad) in base64_gen_encode() argument
83 if (out_len) in base64_gen_encode()
84 *out_len = pos - out; in base64_gen_encode()
90 size_t *out_len, const char *table) in base64_gen_decode() argument
153 *out_len = pos - out; in base64_gen_decode()
170 char * base64_encode(const void *src, size_t len, size_t *out_len) in base64_encode() argument
172 return base64_gen_encode(src, len, out_len, base64_table, in base64_encode()
177 char * base64_encode_no_lf(const void *src, size_t len, size_t *out_len) in base64_encode_no_lf() argument
179 return base64_gen_encode(src, len, out_len, base64_table, BASE64_PAD); in base64_encode_no_lf()
183 char * base64_url_encode(const void *src, size_t len, size_t *out_len) in base64_url_encode() argument
[all …]
Dbase64.h12 char * base64_encode(const void *src, size_t len, size_t *out_len);
13 char * base64_encode_no_lf(const void *src, size_t len, size_t *out_len);
14 unsigned char * base64_decode(const char *src, size_t len, size_t *out_len);
15 char * base64_url_encode(const void *src, size_t len, size_t *out_len);
16 unsigned char * base64_url_decode(const char *src, size_t len, size_t *out_len);
/third_party/node/deps/openssl/openssl/providers/implementations/macs/
Dkmac_prov.c121 size_t out_len; member
131 static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len,
133 static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len,
135 static int bytepad(unsigned char *out, size_t *out_len,
140 size_t *out_len,
190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new()
232 dst->out_len = src->out_len; in kmac_dup()
273 size_t out_len, block_len; in kmac_init() local
307 if (!bytepad(NULL, &out_len, kmac_string, sizeof(kmac_string), in kmac_init()
312 out = OPENSSL_malloc(out_len); in kmac_init()
[all …]
/third_party/openssl/providers/implementations/macs/
Dkmac_prov.c121 size_t out_len; member
131 static int encode_string(unsigned char *out, size_t out_max_len, size_t *out_len,
133 static int right_encode(unsigned char *out, size_t out_max_len, size_t *out_len,
135 static int bytepad(unsigned char *out, size_t *out_len,
140 size_t *out_len,
190 kctx->out_len = EVP_MD_get_size(ossl_prov_digest_md(&kctx->digest)); in kmac_fetch_new()
232 dst->out_len = src->out_len; in kmac_dup()
273 size_t out_len, block_len; in kmac_init() local
307 if (!bytepad(NULL, &out_len, kmac_string, sizeof(kmac_string), in kmac_init()
312 out = OPENSSL_malloc(out_len); in kmac_init()
[all …]
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/utils/
Dbase64.c22 size_t *out_len, in base64_gen_encode() argument
80 if (out_len) in base64_gen_encode()
81 *out_len = pos - out; in base64_gen_encode()
87 size_t *out_len, in base64_gen_decode() argument
151 *out_len = pos - out; in base64_gen_decode()
169 size_t *out_len) in base64_encode() argument
171 return base64_gen_encode(src, len, out_len, base64_table, 1); in base64_encode()
176 size_t *out_len, int add_pad) in base64_url_encode() argument
178 return base64_gen_encode(src, len, out_len, base64_url_table, add_pad); in base64_url_encode()
193 size_t *out_len) in base64_decode() argument
[all …]
Dbase64.h13 size_t *out_len);
15 size_t *out_len);
17 size_t *out_len, int add_pad);
19 size_t *out_len);
/third_party/gstreamer/gstplugins_bad/tests/check/elements/
Dccconverter.c264 guint n_out, const guint8 ** out, guint * out_len, const gchar * in_caps, in check_conversion_multiple() argument
296 gst_check_buffer_data (buffer, out[i], out_len[i]); in check_conversion_multiple()
311 guint out_len, const gchar * in_caps, const gchar * out_caps, in check_conversion() argument
314 check_conversion_multiple (1, &in, &in_len, 1, &out, &out_len, in_caps, in check_conversion()
320 const guint8 * out, guint out_len, const gchar * in_caps, in check_conversion_tc_passthrough() argument
326 check_conversion (in, in_len, out, out_len, in_caps, out_caps, &tc, &tc); in check_conversion_tc_passthrough()
552 guint out_len[] = { sizeof (out1), sizeof (out2) }; in GST_START_TEST() local
568 G_N_ELEMENTS (out_len), out, out_len, in GST_START_TEST()
609 guint out_len[] = { sizeof (out1) }; in GST_START_TEST() local
625 G_N_ELEMENTS (out_len), out, out_len, in GST_START_TEST()
[all …]
/third_party/mbedtls/tests/suites/
Dtest_suite_constant_time_hmac.function28 size_t out_len, block_size;
42 out_len = PSA_HASH_LENGTH(alg);
56 out_len = mbedtls_md_get_size(md_info);
57 TEST_ASSERT(out_len != 0);
62 ASSERT_ALLOC(out, out_len);
68 ref_out, out_len,
75 TEST_EQUAL(0, mbedtls_md_hmac_starts(&ctx, ref_out, out_len));
76 TEST_EQUAL(0, mbedtls_md_hmac_starts(&ref_ctx, ref_out, out_len));
117 TEST_CF_PUBLIC(out, out_len);
127 out, out_len));
[all …]
/third_party/openssl/demos/mac/
Dcmac-aes256.c73 size_t out_len = 0; in main() local
115 if (!EVP_MAC_final(mctx, NULL, &out_len, 0)) { in main()
119 out = OPENSSL_malloc(out_len); in main()
125 if (!EVP_MAC_final(mctx, out, &out_len, out_len)) { in main()
131 BIO_dump_indent_fp(stdout, out, out_len, 2); in main()
134 if (out_len != sizeof(expected_output)) { in main()
Dhmac-sha512.c84 size_t out_len = 0; in main() local
126 if (!EVP_MAC_final(mctx, NULL, &out_len, 0)) { in main()
130 out = OPENSSL_malloc(out_len); in main()
136 if (!EVP_MAC_final(mctx, out, &out_len, out_len)) { in main()
142 BIO_dump_indent_fp(stdout, out, out_len, 2); in main()
145 if (out_len != sizeof(expected_output)) { in main()
/third_party/skia/third_party/externals/harfbuzz/src/
Dhb-buffer.hh111 unsigned int out_len; /* Length of ->out_info array if have_output */ member
190 hb_glyph_info_t &prev () { return out_info[out_len ? out_len - 1 : 0]; } in prev()
191 hb_glyph_info_t prev () const { return out_info[out_len ? out_len - 1 : 0]; } in prev()
196 unsigned int backtrack_len () const { return have_output ? out_len : idx; } in backtrack_len()
226 hb_glyph_info_t *pinfo = &out_info[out_len]; in replace_glyphs()
235 out_len += num_out; in replace_glyphs()
250 out_info[out_len] = glyph_info; in output_info()
252 out_len++; in output_info()
269 if (out_info != info || out_len != idx) in next_glyph()
272 out_info[out_len] = info[idx]; in next_glyph()
[all …]
Dhb-buffer.cc164 if (unlikely (!ensure (out_len + num_out))) return false; in make_room_for()
167 out_len + num_out > idx + num_in) in make_room_for()
172 memcpy (out_info, info, out_len * sizeof (out_info[0])); in make_room_for()
207 out_len = 0; in get_scratch_buffer()
246 out_len = 0; in clear()
293 out_len = 0; in clear_output()
303 out_len = 0; in clear_positions()
324 len = out_len; in swap_buffers()
328 out_len = 0; in swap_buffers()
344 assert (i <= out_len + (len - idx)); in move_to()
[all …]
/third_party/openssl/providers/implementations/kdfs/
Dsskdf.c64 size_t out_len; /* optional KMAC parameter */ member
101 size_t counter, out_len, len = derived_key_len; in SSKDF_hash_kdm() local
115 out_len = (size_t)hlen; in SSKDF_hash_kdm()
137 if (len >= out_len) { in SSKDF_hash_kdm()
140 out += out_len; in SSKDF_hash_kdm()
141 len -= out_len; in SSKDF_hash_kdm()
221 size_t counter, out_len, len; in SSKDF_mac_kdm() local
242 out_len = EVP_MAC_CTX_get_mac_size(ctx_init); /* output size */ in SSKDF_mac_kdm()
243 if (out_len <= 0 || (mac == mac_buf && out_len > sizeof(mac_buf))) in SSKDF_mac_kdm()
259 if (len >= out_len) { in SSKDF_mac_kdm()
[all …]
/third_party/node/deps/openssl/openssl/providers/implementations/kdfs/
Dsskdf.c64 size_t out_len; /* optional KMAC parameter */ member
101 size_t counter, out_len, len = derived_key_len; in SSKDF_hash_kdm() local
115 out_len = (size_t)hlen; in SSKDF_hash_kdm()
137 if (len >= out_len) { in SSKDF_hash_kdm()
140 out += out_len; in SSKDF_hash_kdm()
141 len -= out_len; in SSKDF_hash_kdm()
221 size_t counter, out_len, len; in SSKDF_mac_kdm() local
242 out_len = EVP_MAC_CTX_get_mac_size(ctx_init); /* output size */ in SSKDF_mac_kdm()
243 if (out_len <= 0 || (mac == mac_buf && out_len > sizeof(mac_buf))) in SSKDF_mac_kdm()
259 if (len >= out_len) { in SSKDF_mac_kdm()
[all …]
/third_party/mbedtls/library/
Dnist_kw.c139 unsigned char *output, size_t *out_len, size_t out_size) in mbedtls_nist_kw_wrap() argument
149 *out_len = 0; in mbedtls_nist_kw_wrap()
246 *out_len = semiblocks * KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_wrap()
270 unsigned char *output, size_t *out_len) in unwrap() argument
279 *out_len = 0; in unwrap()
314 *out_len = (semiblocks - 1) * KW_SEMIBLOCK_LENGTH; in unwrap()
333 unsigned char *output, size_t *out_len, size_t out_size) in mbedtls_nist_kw_unwrap() argument
340 *out_len = 0; in mbedtls_nist_kw_unwrap()
359 A, output, out_len); in mbedtls_nist_kw_unwrap()
398 *out_len = KW_SEMIBLOCK_LENGTH; in mbedtls_nist_kw_unwrap()
[all …]
Dssl_client.c131 size_t *out_len) in ssl_write_alpn_ext() argument
135 *out_len = 0; in ssl_write_alpn_ext()
172 *out_len = p - buf; in ssl_write_alpn_ext()
175 MBEDTLS_PUT_UINT16_BE(*out_len - 6, buf, 4); in ssl_write_alpn_ext()
178 MBEDTLS_PUT_UINT16_BE(*out_len - 4, buf, 2); in ssl_write_alpn_ext()
232 size_t *out_len) in ssl_write_supported_groups_ext() argument
239 *out_len = 0; in ssl_write_supported_groups_ext()
298 *out_len = p - buf; in ssl_write_supported_groups_ext()
317 size_t *out_len) in ssl_write_client_hello_cipher_suites() argument
325 *out_len = 0; in ssl_write_client_hello_cipher_suites()
[all …]
/third_party/libwebsockets/lib/jose/jwe/
Djwe.c478 lws_jwe_render_compact(struct lws_jwe *jwe, char *out, size_t out_len) in lws_jwe_render_compact() argument
480 size_t orig = out_len; in lws_jwe_render_compact()
492 jwe->jws.map.len[LJWS_JOSE], out, out_len); in lws_jwe_render_compact()
493 if (n < 0 || (int)out_len == n) { in lws_jwe_render_compact()
500 out_len -= (unsigned int)n + 1; in lws_jwe_render_compact()
503 jwe->jws.map.len[LJWE_EKEY], out, out_len); in lws_jwe_render_compact()
504 if (n < 0 || (int)out_len == n) { in lws_jwe_render_compact()
511 out_len -= (unsigned int)n + 1; in lws_jwe_render_compact()
513 jwe->jws.map.len[LJWE_IV], out, out_len); in lws_jwe_render_compact()
514 if (n < 0 || (int)out_len == n) { in lws_jwe_render_compact()
[all …]
/third_party/gstreamer/gstplugins_base/gst/audioresample/
Dgstaudioresample.c562 gsize out_len, outsize; in gst_audio_resample_dump_drain() local
566 out_len = in gst_audio_resample_dump_drain()
568 if (out_len == 0) in gst_audio_resample_dump_drain()
571 outsize = out_len * resample->out.bpf; in gst_audio_resample_dump_drain()
576 gst_buffer_add_audio_meta (outbuf, &resample->out, out_len, NULL); in gst_audio_resample_dump_drain()
581 abuf.planes, out_len); in gst_audio_resample_dump_drain()
593 gsize out_len; in gst_audio_resample_push_drain() local
602 out_len = in gst_audio_resample_push_drain()
604 if (out_len == 0) in gst_audio_resample_push_drain()
607 outsize = out_len * resample->in.bpf; in gst_audio_resample_push_drain()
[all …]
/third_party/lwip/src/apps/snmp/
Dsnmpv3_mbedtls.c125 size_t out_len; in snmpv3_crypt() local
154 out_len = LWIP_ARRAYSIZE(out_bytes) ; in snmpv3_crypt()
162 … if (mbedtls_cipher_update(&ctx, in_bytes, LWIP_ARRAYSIZE(in_bytes), out_bytes, &out_len) != 0) { in snmpv3_crypt()
166 if (snmp_pbuf_stream_writebuf(&write_stream, out_bytes, (u16_t)out_len) != ERR_OK) { in snmpv3_crypt()
171 out_len = LWIP_ARRAYSIZE(out_bytes); in snmpv3_crypt()
172 if (mbedtls_cipher_finish(&ctx, out_bytes, &out_len) != 0) { in snmpv3_crypt()
176 if (snmp_pbuf_stream_writebuf(&write_stream, out_bytes, (u16_t)out_len) != ERR_OK) { in snmpv3_crypt()
210 size_t out_len = sizeof(out_byte); in snmpv3_crypt() local
215 if (mbedtls_cipher_update(&ctx, &in_byte, sizeof(in_byte), &out_byte, &out_len) != 0) { in snmpv3_crypt()
/third_party/mbedtls/programs/psa/
Dhmac_demo.c130 size_t out_len = 0; in hmac_demo() local
136 PSA_CHECK(psa_mac_sign_finish(&op, out, sizeof(out), &out_len)); in hmac_demo()
137 print_buf("msg1", out, out_len); in hmac_demo()
143 PSA_CHECK(psa_mac_sign_finish(&op, out, sizeof(out), &out_len)); in hmac_demo()
144 print_buf("msg2", out, out_len); in hmac_demo()
/third_party/openssl/crypto/modes/
Dsiv128.c93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p() local
117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p()
118 || out_len != SIV_LEN) in siv128_do_s2v_p()
133 int out_len = (int)len; in siv128_do_encrypt() local
137 return EVP_EncryptUpdate(ctx, out, &out_len, in, out_len); in siv128_do_encrypt()
168 size_t out_len = SIV_LEN; in ossl_siv128_init() local
202 || !EVP_MAC_final(mac_ctx, ctx->d.byte, &out_len, in ossl_siv128_init()
250 size_t out_len = SIV_LEN; in ossl_siv128_aad() local
257 || !EVP_MAC_final(mac_ctx, mac_out.byte, &out_len, in ossl_siv128_aad()
259 || out_len != SIV_LEN) { in ossl_siv128_aad()
/third_party/node/deps/openssl/openssl/crypto/modes/
Dsiv128.c93 size_t out_len = sizeof(out->byte); in siv128_do_s2v_p() local
117 if (!EVP_MAC_final(mac_ctx, out->byte, &out_len, sizeof(out->byte)) in siv128_do_s2v_p()
118 || out_len != SIV_LEN) in siv128_do_s2v_p()
133 int out_len = (int)len; in siv128_do_encrypt() local
137 return EVP_EncryptUpdate(ctx, out, &out_len, in, out_len); in siv128_do_encrypt()
168 size_t out_len = SIV_LEN; in ossl_siv128_init() local
202 || !EVP_MAC_final(mac_ctx, ctx->d.byte, &out_len, in ossl_siv128_init()
250 size_t out_len = SIV_LEN; in ossl_siv128_aad() local
257 || !EVP_MAC_final(mac_ctx, mac_out.byte, &out_len, in ossl_siv128_aad()
259 || out_len != SIV_LEN) { in ossl_siv128_aad()
/third_party/node/src/crypto/
Dcrypto_aes.cc114 int out_len; in AES_Cipher() local
121 &out_len, in AES_Cipher()
138 out_len = 0; in AES_Cipher()
141 &out_len, in AES_Cipher()
147 total += out_len; in AES_Cipher()
148 CHECK_LE(out_len, buf_len); in AES_Cipher()
149 out_len = EVP_CIPHER_CTX_block_size(ctx.get()); in AES_Cipher()
151 ctx.get(), buf.data<unsigned char>() + total, &out_len)) { in AES_Cipher()
154 total += out_len; in AES_Cipher()
244 int out_len = 0; in AES_CTR_Cipher2() local
[all …]
/third_party/openssl/doc/man3/
DEVP_PKEY_gettable_params.pod25 size_t *out_len);
28 size_t *out_len);
65 If I<out_len> is not NULL, I<*out_len> is set to the length of the string
67 the terminating NUL byte can be obtained from I<*out_len> by calling the
72 If I<out_len> is not NULL, I<*out_len> is set to the length of the contents.
73 The required buffer size can be obtained from I<*out_len> by calling the
88 value. If I<out_len> is not NULL, I<*out_len> will be assigned the required

1234567