/external/boringssl/src/crypto/cmac/ |
D | cmac_test.cc | 56 size_t out_len; in test() local 57 ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len)); in test() 58 EXPECT_EQ(Bytes(expected, sizeof(out)), Bytes(out, out_len)); in test() 69 size_t out_len; in test() local 70 ASSERT_TRUE(CMAC_Final(ctx2.get(), out, &out_len)); in test() 71 EXPECT_EQ(Bytes(expected, sizeof(out)), Bytes(out, out_len)); in test() 162 size_t out_len; in TEST() local 163 ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len)); in TEST() 165 out_len = std::min(out_len, tag_len); in TEST() 168 EXPECT_EQ(Bytes(tag), Bytes(out, out_len)); in TEST() [all …]
|
/external/boringssl/src/crypto/bio/ |
D | printf.c | 69 int out_len, ret; in BIO_printf() local 72 out_len = vsnprintf(buf, sizeof(buf), format, args); in BIO_printf() 78 if (out_len < 0) { in BIO_printf() 80 out_len = _vscprintf(format, args); in BIO_printf() 82 assert(out_len >= (int)sizeof(buf)); in BIO_printf() 86 if (out_len < 0) { in BIO_printf() 90 if ((size_t) out_len >= sizeof(buf)) { in BIO_printf() 91 const int requested_len = out_len; in BIO_printf() 102 out_len = vsnprintf(out, requested_len + 1, format, args); in BIO_printf() 104 assert(out_len == requested_len); in BIO_printf() [all …]
|
/external/harfbuzz_ng/src/ |
D | hb-buffer.hh | 110 unsigned int out_len; /* Length of ->out array if have_output */ member 184 hb_glyph_info_t &prev () { return out_info[out_len ? out_len - 1 : 0]; } in prev() 185 hb_glyph_info_t prev () const { return out_info[out_len ? out_len - 1 : 0]; } in prev() 193 unsigned int backtrack_len () const { return have_output? out_len : idx; } in backtrack_len() 217 if (unlikely (out_info != info || out_len != idx)) { in replace_glyph() 219 out_info[out_len] = info[idx]; in replace_glyph() 221 out_info[out_len].codepoint = glyph_index; in replace_glyph() 224 out_len++; in replace_glyph() 231 if (unlikely (idx == len && !out_len)) in output_glyph() 234 out_info[out_len] = idx < len ? info[idx] : out_info[out_len - 1]; in output_glyph() [all …]
|
D | hb-buffer.cc | 162 if (unlikely (!ensure (out_len + num_out))) return false; in make_room_for() 165 out_len + num_out > idx + num_in) in make_room_for() 170 memcpy (out_info, info, out_len * sizeof (out_info[0])); in make_room_for() 205 out_len = 0; in get_scratch_buffer() 249 out_len = 0; in clear() 298 out_len = 0; in remove_output() 311 out_len = 0; in clear_output() 324 out_len = 0; in clear_positions() 349 len = out_len; in swap_buffers() 350 out_len = tmp; in swap_buffers() [all …]
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
D | cipher.c | 240 int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, in EVP_EncryptUpdate() argument 249 *out_len = i; in EVP_EncryptUpdate() 255 *out_len = 0; in EVP_EncryptUpdate() 261 *out_len = in_len; in EVP_EncryptUpdate() 264 *out_len = 0; in EVP_EncryptUpdate() 276 *out_len = 0; in EVP_EncryptUpdate() 287 *out_len = bl; in EVP_EncryptUpdate() 290 *out_len = 0; in EVP_EncryptUpdate() 299 *out_len += in_len; in EVP_EncryptUpdate() 309 int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len) { in EVP_EncryptFinal_ex() argument [all …]
|
D | aead.c | 107 size_t out_len) { in check_alias() argument 108 if (!buffers_alias(in, in_len, out, out_len)) { in check_alias() 115 int EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, in EVP_AEAD_CTX_seal() argument 138 *out_len = in_len + out_tag_len; in EVP_AEAD_CTX_seal() 146 *out_len = 0; in EVP_AEAD_CTX_seal() 183 int EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, in EVP_AEAD_CTX_open() argument 193 if (!ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open() 225 *out_len = 0; in EVP_AEAD_CTX_open() 260 size_t *out_len) { in EVP_AEAD_CTX_get_iv() argument [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | base64.c | 22 size_t *out_len, in base64_gen_encode() argument 80 if (out_len) in base64_gen_encode() 81 *out_len = pos - out; in base64_gen_encode() 87 size_t *out_len, in base64_gen_decode() argument 151 *out_len = pos - out; in base64_gen_decode() 169 size_t *out_len) in base64_encode() argument 171 return base64_gen_encode(src, len, out_len, base64_table, 1); in base64_encode() 176 size_t *out_len, int add_pad) in base64_url_encode() argument 178 return base64_gen_encode(src, len, out_len, base64_url_table, add_pad); in base64_url_encode() 193 size_t *out_len) in base64_decode() argument [all …]
|
D | base64.h | 13 size_t *out_len); 15 size_t *out_len); 17 size_t *out_len, int add_pad); 19 size_t *out_len);
|
/external/boringssl/src/crypto/base64/ |
D | base64.c | 104 int EVP_EncodedLength(size_t *out_len, size_t len) { in EVP_EncodedLength() argument 121 *out_len = len; in EVP_EncodedLength() 129 void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, in EVP_EncodeUpdate() argument 133 *out_len = 0; in EVP_EncodeUpdate() 172 *out_len = 0; in EVP_EncodeUpdate() 190 *out_len = (int)total; in EVP_EncodeUpdate() 193 void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len) { in EVP_EncodeFinal() argument 195 *out_len = 0; in EVP_EncodeFinal() 207 *out_len = (int)encoded; in EVP_EncodeFinal() 245 int EVP_DecodedLength(size_t *out_len, size_t len) { in EVP_DecodedLength() argument [all …]
|
D | base64_test.cc | 208 int out_len; in TEST_P() local 209 EVP_EncodeUpdate(&ctx, out, &out_len, in TEST_P() 212 size_t total = out_len; in TEST_P() 214 EVP_EncodeFinal(&ctx, out + total, &out_len); in TEST_P() 215 total += out_len; in TEST_P() 224 int out_len; in TEST_P() local 226 int ret = EVP_DecodeUpdate(&ctx, out, &out_len, in TEST_P() 230 total = out_len; in TEST_P() 231 ret = EVP_DecodeFinal(&ctx, out + total, &out_len); in TEST_P() 232 total += out_len; in TEST_P() [all …]
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, in HKDF_extract() argument 54 *out_len = len; in HKDF_extract() 55 assert(*out_len == EVP_MD_size(digest)); in HKDF_extract() 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF_expand() argument 71 n = (out_len + digest_len - 1) / digest_len; in HKDF_expand() 72 if (out_len + digest_len < out_len || n > 255) { in HKDF_expand() 97 if (done + todo > out_len) { in HKDF_expand() 98 todo = out_len - done; in HKDF_expand()
|
D | hkdf_test.cc | 34 const size_t out_len; member 259 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST() 261 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST() 263 ASSERT_TRUE(HKDF(buf, test->out_len, test->md_func(), test->ikm, in TEST() 266 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST()
|
/external/boringssl/src/crypto/fipsmodule/tls/ |
D | kdf.c | 67 static int tls1_P_hash(uint8_t *out, size_t out_len, in tls1_P_hash() argument 98 (out_len > chunk && !HMAC_CTX_copy_ex(&ctx_tmp, &ctx)) || in tls1_P_hash() 108 if (len > out_len) { in tls1_P_hash() 109 len = out_len; in tls1_P_hash() 115 out_len -= len; in tls1_P_hash() 117 if (out_len == 0) { in tls1_P_hash() 138 uint8_t *out, size_t out_len, in CRYPTO_tls1_prf() argument 143 if (out_len == 0) { in CRYPTO_tls1_prf() 147 OPENSSL_memset(out, 0, out_len); in CRYPTO_tls1_prf() 152 if (!tls1_P_hash(out, out_len, EVP_md5(), secret, secret_half, label, in CRYPTO_tls1_prf() [all …]
|
/external/boringssl/src/crypto/ecdh_extra/ |
D | ecdh_extra.c | 80 int ECDH_compute_key(void *out, size_t out_len, const EC_POINT *pub_key, in ECDH_compute_key() argument 83 size_t *out_len)) { in ECDH_compute_key() argument 106 if (kdf(buf, buf_len, out, &out_len) == NULL) { in ECDH_compute_key() 112 if (buf_len < out_len) { in ECDH_compute_key() 113 out_len = buf_len; in ECDH_compute_key() 115 OPENSSL_memcpy(out, buf, out_len); in ECDH_compute_key() 118 if (out_len > INT_MAX) { in ECDH_compute_key() 123 return (int)out_len; in ECDH_compute_key()
|
/external/webrtc/talk/session/media/ |
D | srtpfilter_unittest.cc | 98 int rtp_len = sizeof(kPcmuFrame), rtcp_len = sizeof(kRtcpReport), out_len; in TestProtectUnprotect() local 108 sizeof(rtp_packet), &out_len)); in TestProtectUnprotect() 109 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs1)); in TestProtectUnprotect() 111 EXPECT_TRUE(f2_.UnprotectRtp(rtp_packet, out_len, &out_len)); in TestProtectUnprotect() 112 EXPECT_EQ(rtp_len, out_len); in TestProtectUnprotect() 116 sizeof(rtp_packet), &out_len)); in TestProtectUnprotect() 117 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs2)); in TestProtectUnprotect() 119 EXPECT_TRUE(f1_.UnprotectRtp(rtp_packet, out_len, &out_len)); in TestProtectUnprotect() 120 EXPECT_EQ(rtp_len, out_len); in TestProtectUnprotect() 124 sizeof(rtcp_packet), &out_len)); in TestProtectUnprotect() [all …]
|
D | srtpfilter.cc | 214 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { in ProtectRtp() argument 220 return send_session_->ProtectRtp(p, in_len, max_len, out_len); in ProtectRtp() 226 int* out_len, in ProtectRtp() argument 233 return send_session_->ProtectRtp(p, in_len, max_len, out_len, index); in ProtectRtp() 236 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { in ProtectRtcp() argument 242 return send_rtcp_session_->ProtectRtcp(p, in_len, max_len, out_len); in ProtectRtcp() 245 return send_session_->ProtectRtcp(p, in_len, max_len, out_len); in ProtectRtcp() 249 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { in UnprotectRtp() argument 255 return recv_session_->UnprotectRtp(p, in_len, out_len); in UnprotectRtp() 258 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { in UnprotectRtcp() argument [all …]
|
D | srtpfilter.h | 122 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 127 int* out_len, 129 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 132 bool UnprotectRtp(void* data, int in_len, int* out_len); 133 bool UnprotectRtcp(void* data, int in_len, int* out_len); 210 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 215 int* out_len, 217 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 220 bool UnprotectRtp(void* data, int in_len, int* out_len); 221 bool UnprotectRtcp(void* data, int in_len, int* out_len);
|
/external/boringssl/src/include/openssl/ |
D | base64.h | 88 OPENSSL_EXPORT int EVP_EncodedLength(size_t *out_len, size_t len); 97 OPENSSL_EXPORT int EVP_DecodedLength(size_t *out_len, size_t len); 103 OPENSSL_EXPORT int EVP_DecodeBase64(uint8_t *out, size_t *out_len, 127 int *out_len, const uint8_t *in, 133 int *out_len); 150 int *out_len, const uint8_t *in, 157 int *out_len);
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 271 size_t out_len; in RSA_public_encrypt() local 273 if (!RSA_encrypt(rsa, &out_len, to, RSA_size(rsa), from, flen, padding)) { in RSA_public_encrypt() 277 if (out_len > INT_MAX) { in RSA_public_encrypt() 281 return out_len; in RSA_public_encrypt() 284 int RSA_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_sign_raw() argument 287 return rsa->meth->sign_raw(rsa, out_len, out, max_out, in, in_len, padding); in RSA_sign_raw() 290 return rsa_default_sign_raw(rsa, out_len, out, max_out, in, in_len, padding); in RSA_sign_raw() 295 size_t out_len; in RSA_private_encrypt() local 297 if (!RSA_sign_raw(rsa, &out_len, to, RSA_size(rsa), from, flen, padding)) { in RSA_private_encrypt() 301 if (out_len > INT_MAX) { in RSA_private_encrypt() [all …]
|
/external/webrtc/webrtc/base/ |
D | transformadapter.cc | 65 size_t out_len = buffer_len; in Read() local 67 buffer, &out_len, in Read() 77 } else if ((out_len == 0) && (state_ == ST_FLUSHING)) { in Read() 88 if (out_len == 0) in Read() 92 *read = out_len; in Read() 115 size_t out_len = sizeof(buffer_) - len_; in Write() local 117 buffer_ + len_, &out_len, in Write() 131 len_ = out_len; in Write()
|
/external/boringssl/src/crypto/fipsmodule/rand/ |
D | ctrdrbg.c | 131 int CTR_DRBG_generate(CTR_DRBG_STATE *drbg, uint8_t *out, size_t out_len, in CTR_DRBG_generate() argument 135 if (out_len > CTR_DRBG_MAX_GENERATE_LENGTH) { in CTR_DRBG_generate() 157 while (out_len >= AES_BLOCK_SIZE) { in CTR_DRBG_generate() 159 if (todo > out_len) { in CTR_DRBG_generate() 160 todo = out_len; in CTR_DRBG_generate() 179 out_len -= todo; in CTR_DRBG_generate() 182 if (out_len > 0) { in CTR_DRBG_generate() 187 OPENSSL_memcpy(out, block, out_len); in CTR_DRBG_generate()
|
/external/webrtc/webrtc/modules/audio_coding/neteq/ |
D | neteq_unittest.cc | 291 void Process(size_t* out_len); 409 void NetEqDecodingTest::Process(size_t* out_len) { in Process() argument 429 ASSERT_EQ(0, neteq_->GetAudio(kMaxBlockSize, out_data_, out_len, in Process() 431 ASSERT_TRUE((*out_len == kBlockSize8kHz) || in Process() 432 (*out_len == kBlockSize16kHz) || in Process() 433 (*out_len == kBlockSize32kHz) || in Process() 434 (*out_len == kBlockSize48kHz)); in Process() 435 output_sample_rate_ = static_cast<int>(*out_len / 10 * 1000); in Process() 472 size_t out_len = 0; in DecodeAndCompare() local 473 ASSERT_NO_FATAL_FAILURE(Process(&out_len)); in DecodeAndCompare() [all …]
|
/external/boringssl/src/crypto/cipher_extra/ |
D | aead_test.cc | 144 size_t out_len; in TEST_P() local 145 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), out.data(), &out_len, out.size(), in TEST_P() 148 out.resize(out_len); in TEST_P() 508 size_t out_len; in TEST_P() local 510 ctx.get(), out1 /* in - 1 */, &out_len, sizeof(kPlaintext) + max_overhead, in TEST_P() 513 ctx.get(), out2 /* in + 1 */, &out_len, sizeof(kPlaintext) + max_overhead, in TEST_P() 518 EXPECT_FALSE(EVP_AEAD_CTX_open(ctx.get(), out1 /* in - 1 */, &out_len, in TEST_P() 521 EXPECT_FALSE(EVP_AEAD_CTX_open(ctx.get(), out2 /* in + 1 */, &out_len, in TEST_P() 529 ASSERT_TRUE(EVP_AEAD_CTX_seal(ctx.get(), in, &out_len, in TEST_P() 533 Bytes(in, out_len)); in TEST_P() [all …]
|
/external/speex/libspeexdsp/ |
D | testresample.c | 62 spx_uint32_t out_len; in main() local 69 out_len = 2*NN; in main() 72 speex_resampler_process_float(st, 0, fin, &in_len, fout, &out_len); in main() 73 for (i=0;i<out_len;i++) in main() 76 fwrite(out, sizeof(short), out_len, stdout); in main()
|
D | resample.c | 333 …nnel_index, const spx_word16_t *in, spx_uint32_t *in_len, spx_word16_t *out, spx_uint32_t *out_len) in resampler_basic_direct_single() argument 346 while (!(last_sample >= (spx_int32_t)*in_len || out_sample >= (spx_int32_t)*out_len)) in resampler_basic_direct_single() 391 …nnel_index, const spx_word16_t *in, spx_uint32_t *in_len, spx_word16_t *out, spx_uint32_t *out_len) in resampler_basic_direct_double() argument 404 while (!(last_sample >= (spx_int32_t)*in_len || out_sample >= (spx_int32_t)*out_len)) in resampler_basic_direct_double() 440 …nnel_index, const spx_word16_t *in, spx_uint32_t *in_len, spx_word16_t *out, spx_uint32_t *out_len) in resampler_basic_interpolate_single() argument 452 while (!(last_sample >= (spx_int32_t)*in_len || out_sample >= (spx_int32_t)*out_len)) in resampler_basic_interpolate_single() 503 …nnel_index, const spx_word16_t *in, spx_uint32_t *in_len, spx_word16_t *out, spx_uint32_t *out_len) in resampler_basic_interpolate_double() argument 515 while (!(last_sample >= (spx_int32_t)*in_len || out_sample >= (spx_int32_t)*out_len)) in resampler_basic_interpolate_double() 567 …nnel_index, const spx_word16_t *in, spx_uint32_t *in_len, spx_word16_t *out, spx_uint32_t *out_len) in resampler_basic_zero() argument 577 while (!(last_sample >= (spx_int32_t)*in_len || out_sample >= (spx_int32_t)*out_len)) in resampler_basic_zero() [all …]
|