/external/boringssl/src/crypto/cmac/ |
D | cmac_test.cc | 56 size_t out_len; in test() local 57 ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len)); in test() 58 EXPECT_EQ(Bytes(expected, sizeof(out)), Bytes(out, out_len)); in test() 69 size_t out_len; in test() local 70 ASSERT_TRUE(CMAC_Final(ctx2.get(), out, &out_len)); in test() 71 EXPECT_EQ(Bytes(expected, sizeof(out)), Bytes(out, out_len)); in test() 162 size_t out_len; in TEST() local 163 ASSERT_TRUE(CMAC_Final(ctx.get(), out, &out_len)); in TEST() 165 out_len = std::min(out_len, tag_len); in TEST() 168 EXPECT_EQ(Bytes(tag), Bytes(out, out_len)); in TEST() [all …]
|
/external/boringssl/src/crypto/bio/ |
D | printf.c | 69 int out_len, ret; in BIO_printf() local 72 out_len = vsnprintf(buf, sizeof(buf), format, args); in BIO_printf() 78 if (out_len < 0) { in BIO_printf() 80 out_len = _vscprintf(format, args); in BIO_printf() 82 assert(out_len >= (int)sizeof(buf)); in BIO_printf() 86 if (out_len < 0) { in BIO_printf() 90 if ((size_t) out_len >= sizeof(buf)) { in BIO_printf() 91 const int requested_len = out_len; in BIO_printf() 102 out_len = vsnprintf(out, requested_len + 1, format, args); in BIO_printf() 104 assert(out_len == requested_len); in BIO_printf() [all …]
|
/external/harfbuzz_ng/src/ |
D | hb-buffer.hh | 110 unsigned int out_len; /* Length of ->out array if have_output */ member 186 hb_glyph_info_t &prev () { return out_info[out_len ? out_len - 1 : 0]; } in prev() 187 hb_glyph_info_t prev () const { return out_info[out_len ? out_len - 1 : 0]; } in prev() 195 unsigned int backtrack_len () const { return have_output? out_len : idx; } in backtrack_len() 219 if (unlikely (out_info != info || out_len != idx)) { in replace_glyph() 221 out_info[out_len] = info[idx]; in replace_glyph() 223 out_info[out_len].codepoint = glyph_index; in replace_glyph() 226 out_len++; in replace_glyph() 233 if (unlikely (idx == len && !out_len)) in output_glyph() 236 out_info[out_len] = idx < len ? info[idx] : out_info[out_len - 1]; in output_glyph() [all …]
|
/external/boringssl/src/crypto/fipsmodule/cipher/ |
D | cipher.c | 241 int EVP_EncryptUpdate(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len, in EVP_EncryptUpdate() argument 250 *out_len = i; in EVP_EncryptUpdate() 256 *out_len = 0; in EVP_EncryptUpdate() 262 *out_len = in_len; in EVP_EncryptUpdate() 265 *out_len = 0; in EVP_EncryptUpdate() 277 *out_len = 0; in EVP_EncryptUpdate() 288 *out_len = bl; in EVP_EncryptUpdate() 291 *out_len = 0; in EVP_EncryptUpdate() 300 *out_len += in_len; in EVP_EncryptUpdate() 310 int EVP_EncryptFinal_ex(EVP_CIPHER_CTX *ctx, uint8_t *out, int *out_len) { in EVP_EncryptFinal_ex() argument [all …]
|
D | aead.c | 107 size_t out_len) { in check_alias() argument 108 if (!buffers_alias(in, in_len, out, out_len)) { in check_alias() 115 int EVP_AEAD_CTX_seal(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, in EVP_AEAD_CTX_seal() argument 138 *out_len = in_len + out_tag_len; in EVP_AEAD_CTX_seal() 146 *out_len = 0; in EVP_AEAD_CTX_seal() 183 int EVP_AEAD_CTX_open(const EVP_AEAD_CTX *ctx, uint8_t *out, size_t *out_len, in EVP_AEAD_CTX_open() argument 193 if (!ctx->aead->open(ctx, out, out_len, max_out_len, nonce, nonce_len, in, in EVP_AEAD_CTX_open() 216 *out_len = plaintext_len; in EVP_AEAD_CTX_open() 225 *out_len = 0; in EVP_AEAD_CTX_open() 260 size_t *out_len) { in EVP_AEAD_CTX_get_iv() argument [all …]
|
/external/wpa_supplicant_8/src/utils/ |
D | base64.c | 22 size_t *out_len, const char *table, int add_pad) in base64_gen_encode() argument 78 if (out_len) in base64_gen_encode() 79 *out_len = pos - out; in base64_gen_encode() 85 size_t *out_len, const char *table) in base64_gen_decode() argument 148 *out_len = pos - out; in base64_gen_decode() 165 char * base64_encode(const void *src, size_t len, size_t *out_len) in base64_encode() argument 167 return base64_gen_encode(src, len, out_len, base64_table, 1); in base64_encode() 171 char * base64_url_encode(const void *src, size_t len, size_t *out_len) in base64_url_encode() argument 173 return base64_gen_encode(src, len, out_len, base64_url_table, 0); in base64_url_encode() 187 unsigned char * base64_decode(const char *src, size_t len, size_t *out_len) in base64_decode() argument [all …]
|
D | base64.h | 12 char * base64_encode(const void *src, size_t len, size_t *out_len); 13 unsigned char * base64_decode(const char *src, size_t len, size_t *out_len); 14 char * base64_url_encode(const void *src, size_t len, size_t *out_len); 15 unsigned char * base64_url_decode(const char *src, size_t len, size_t *out_len);
|
/external/boringssl/src/crypto/hkdf/ |
D | hkdf.c | 26 int HKDF(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF() argument 35 !HKDF_expand(out_key, out_len, digest, prk, prk_len, info, info_len)) { in HKDF() 42 int HKDF_extract(uint8_t *out_key, size_t *out_len, const EVP_MD *digest, in HKDF_extract() argument 54 *out_len = len; in HKDF_extract() 55 assert(*out_len == EVP_MD_size(digest)); in HKDF_extract() 59 int HKDF_expand(uint8_t *out_key, size_t out_len, const EVP_MD *digest, in HKDF_expand() argument 71 n = (out_len + digest_len - 1) / digest_len; in HKDF_expand() 72 if (out_len + digest_len < out_len || n > 255) { in HKDF_expand() 97 if (done + todo > out_len) { in HKDF_expand() 98 todo = out_len - done; in HKDF_expand()
|
D | hkdf_test.cc | 34 const size_t out_len; member 259 ASSERT_TRUE(HKDF_expand(buf, test->out_len, test->md_func(), prk, prk_len, in TEST() 261 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST() 263 ASSERT_TRUE(HKDF(buf, test->out_len, test->md_func(), test->ikm, in TEST() 266 EXPECT_EQ(Bytes(test->out, test->out_len), Bytes(buf, test->out_len)); in TEST()
|
/external/boringssl/src/crypto/base64/ |
D | base64.c | 104 int EVP_EncodedLength(size_t *out_len, size_t len) { in EVP_EncodedLength() argument 121 *out_len = len; in EVP_EncodedLength() 129 void EVP_EncodeUpdate(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len, in EVP_EncodeUpdate() argument 133 *out_len = 0; in EVP_EncodeUpdate() 172 *out_len = 0; in EVP_EncodeUpdate() 190 *out_len = (int)total; in EVP_EncodeUpdate() 193 void EVP_EncodeFinal(EVP_ENCODE_CTX *ctx, uint8_t *out, int *out_len) { in EVP_EncodeFinal() argument 195 *out_len = 0; in EVP_EncodeFinal() 207 *out_len = (int)encoded; in EVP_EncodeFinal() 245 int EVP_DecodedLength(size_t *out_len, size_t len) { in EVP_DecodedLength() argument [all …]
|
D | base64_test.cc | 208 int out_len; in TEST_P() local 209 EVP_EncodeUpdate(&ctx, out, &out_len, in TEST_P() 212 size_t total = out_len; in TEST_P() 214 EVP_EncodeFinal(&ctx, out + total, &out_len); in TEST_P() 215 total += out_len; in TEST_P() 224 int out_len; in TEST_P() local 226 int ret = EVP_DecodeUpdate(&ctx, out, &out_len, in TEST_P() 230 total = out_len; in TEST_P() 231 ret = EVP_DecodeFinal(&ctx, out + total, &out_len); in TEST_P() 232 total += out_len; in TEST_P() [all …]
|
/external/boringssl/src/crypto/fipsmodule/tls/ |
D | kdf.c | 67 static int tls1_P_hash(uint8_t *out, size_t out_len, in tls1_P_hash() argument 98 (out_len > chunk && !HMAC_CTX_copy_ex(&ctx_tmp, &ctx)) || in tls1_P_hash() 108 if (len > out_len) { in tls1_P_hash() 109 len = out_len; in tls1_P_hash() 115 out_len -= len; in tls1_P_hash() 117 if (out_len == 0) { in tls1_P_hash() 138 uint8_t *out, size_t out_len, in CRYPTO_tls1_prf() argument 143 if (out_len == 0) { in CRYPTO_tls1_prf() 147 OPENSSL_memset(out, 0, out_len); in CRYPTO_tls1_prf() 152 if (!tls1_P_hash(out, out_len, EVP_md5(), secret, secret_half, label, in CRYPTO_tls1_prf() [all …]
|
/external/boringssl/src/crypto/ecdh_extra/ |
D | ecdh_extra.c | 80 int ECDH_compute_key(void *out, size_t out_len, const EC_POINT *pub_key, in ECDH_compute_key() argument 83 size_t *out_len)) { in ECDH_compute_key() argument 106 if (kdf(buf, buf_len, out, &out_len) == NULL) { in ECDH_compute_key() 112 if (buf_len < out_len) { in ECDH_compute_key() 113 out_len = buf_len; in ECDH_compute_key() 115 OPENSSL_memcpy(out, buf, out_len); in ECDH_compute_key() 118 if (out_len > INT_MAX) { in ECDH_compute_key() 123 return (int)out_len; in ECDH_compute_key()
|
/external/webrtc/talk/session/media/ |
D | srtpfilter_unittest.cc | 98 int rtp_len = sizeof(kPcmuFrame), rtcp_len = sizeof(kRtcpReport), out_len; in TestProtectUnprotect() local 108 sizeof(rtp_packet), &out_len)); in TestProtectUnprotect() 109 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs1)); in TestProtectUnprotect() 111 EXPECT_TRUE(f2_.UnprotectRtp(rtp_packet, out_len, &out_len)); in TestProtectUnprotect() 112 EXPECT_EQ(rtp_len, out_len); in TestProtectUnprotect() 116 sizeof(rtp_packet), &out_len)); in TestProtectUnprotect() 117 EXPECT_EQ(out_len, rtp_len + rtp_auth_tag_len(cs2)); in TestProtectUnprotect() 119 EXPECT_TRUE(f1_.UnprotectRtp(rtp_packet, out_len, &out_len)); in TestProtectUnprotect() 120 EXPECT_EQ(rtp_len, out_len); in TestProtectUnprotect() 124 sizeof(rtcp_packet), &out_len)); in TestProtectUnprotect() [all …]
|
D | srtpfilter.cc | 214 bool SrtpFilter::ProtectRtp(void* p, int in_len, int max_len, int* out_len) { in ProtectRtp() argument 220 return send_session_->ProtectRtp(p, in_len, max_len, out_len); in ProtectRtp() 226 int* out_len, in ProtectRtp() argument 233 return send_session_->ProtectRtp(p, in_len, max_len, out_len, index); in ProtectRtp() 236 bool SrtpFilter::ProtectRtcp(void* p, int in_len, int max_len, int* out_len) { in ProtectRtcp() argument 242 return send_rtcp_session_->ProtectRtcp(p, in_len, max_len, out_len); in ProtectRtcp() 245 return send_session_->ProtectRtcp(p, in_len, max_len, out_len); in ProtectRtcp() 249 bool SrtpFilter::UnprotectRtp(void* p, int in_len, int* out_len) { in UnprotectRtp() argument 255 return recv_session_->UnprotectRtp(p, in_len, out_len); in UnprotectRtp() 258 bool SrtpFilter::UnprotectRtcp(void* p, int in_len, int* out_len) { in UnprotectRtcp() argument [all …]
|
D | srtpfilter.h | 122 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 127 int* out_len, 129 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 132 bool UnprotectRtp(void* data, int in_len, int* out_len); 133 bool UnprotectRtcp(void* data, int in_len, int* out_len); 210 bool ProtectRtp(void* data, int in_len, int max_len, int* out_len); 215 int* out_len, 217 bool ProtectRtcp(void* data, int in_len, int max_len, int* out_len); 220 bool UnprotectRtp(void* data, int in_len, int* out_len); 221 bool UnprotectRtcp(void* data, int in_len, int* out_len);
|
/external/boringssl/src/include/openssl/ |
D | base64.h | 88 OPENSSL_EXPORT int EVP_EncodedLength(size_t *out_len, size_t len); 97 OPENSSL_EXPORT int EVP_DecodedLength(size_t *out_len, size_t len); 103 OPENSSL_EXPORT int EVP_DecodeBase64(uint8_t *out, size_t *out_len, 127 int *out_len, const uint8_t *in, 133 int *out_len); 150 int *out_len, const uint8_t *in, 157 int *out_len);
|
/external/oss-fuzz/projects/lzo/ |
D | lzo_compress_target.c | 37 lzo_uint out_len; in LLVMFuzzerTestOneInput() local 61 r = lzo1x_1_compress(data, size, out, &out_len, wrkmem); in LLVMFuzzerTestOneInput() 65 (unsigned long) size, (unsigned long) out_len); in LLVMFuzzerTestOneInput() 69 if (out_len >= size) in LLVMFuzzerTestOneInput() 79 r = lzo1x_decompress(out, out_len, in, &new_len,/*wrkmem=*/NULL); in LLVMFuzzerTestOneInput() 83 (unsigned long) out_len, (unsigned long) size); in LLVMFuzzerTestOneInput()
|
/external/boringssl/src/crypto/fipsmodule/rsa/ |
D | rsa.c | 271 size_t out_len; in RSA_public_encrypt() local 273 if (!RSA_encrypt(rsa, &out_len, to, RSA_size(rsa), from, flen, padding)) { in RSA_public_encrypt() 277 if (out_len > INT_MAX) { in RSA_public_encrypt() 281 return out_len; in RSA_public_encrypt() 284 int RSA_sign_raw(RSA *rsa, size_t *out_len, uint8_t *out, size_t max_out, in RSA_sign_raw() argument 287 return rsa->meth->sign_raw(rsa, out_len, out, max_out, in, in_len, padding); in RSA_sign_raw() 290 return rsa_default_sign_raw(rsa, out_len, out, max_out, in, in_len, padding); in RSA_sign_raw() 295 size_t out_len; in RSA_private_encrypt() local 297 if (!RSA_sign_raw(rsa, &out_len, to, RSA_size(rsa), from, flen, padding)) { in RSA_private_encrypt() 301 if (out_len > INT_MAX) { in RSA_private_encrypt() [all …]
|
/external/webrtc/webrtc/base/ |
D | transformadapter.cc | 65 size_t out_len = buffer_len; in Read() local 67 buffer, &out_len, in Read() 77 } else if ((out_len == 0) && (state_ == ST_FLUSHING)) { in Read() 88 if (out_len == 0) in Read() 92 *read = out_len; in Read() 115 size_t out_len = sizeof(buffer_) - len_; in Write() local 117 buffer_ + len_, &out_len, in Write() 131 len_ = out_len; in Write()
|
/external/boringssl/src/crypto/fipsmodule/rand/ |
D | ctrdrbg.c | 131 int CTR_DRBG_generate(CTR_DRBG_STATE *drbg, uint8_t *out, size_t out_len, in CTR_DRBG_generate() argument 135 if (out_len > CTR_DRBG_MAX_GENERATE_LENGTH) { in CTR_DRBG_generate() 157 while (out_len >= AES_BLOCK_SIZE) { in CTR_DRBG_generate() 159 if (todo > out_len) { in CTR_DRBG_generate() 160 todo = out_len; in CTR_DRBG_generate() 179 out_len -= todo; in CTR_DRBG_generate() 182 if (out_len > 0) { in CTR_DRBG_generate() 187 OPENSSL_memcpy(out, block, out_len); in CTR_DRBG_generate()
|
/external/speex/libspeexdsp/ |
D | testresample.c | 62 spx_uint32_t out_len; in main() local 69 out_len = 2*NN; in main() 72 speex_resampler_process_float(st, 0, fin, &in_len, fout, &out_len); in main() 73 for (i=0;i<out_len;i++) in main() 76 fwrite(out, sizeof(short), out_len, stdout); in main()
|
/external/webrtc/webrtc/modules/audio_coding/neteq/ |
D | neteq_unittest.cc | 291 void Process(size_t* out_len); 409 void NetEqDecodingTest::Process(size_t* out_len) { in Process() argument 429 ASSERT_EQ(0, neteq_->GetAudio(kMaxBlockSize, out_data_, out_len, in Process() 431 ASSERT_TRUE((*out_len == kBlockSize8kHz) || in Process() 432 (*out_len == kBlockSize16kHz) || in Process() 433 (*out_len == kBlockSize32kHz) || in Process() 434 (*out_len == kBlockSize48kHz)); in Process() 435 output_sample_rate_ = static_cast<int>(*out_len / 10 * 1000); in Process() 472 size_t out_len = 0; in DecodeAndCompare() local 473 ASSERT_NO_FATAL_FAILURE(Process(&out_len)); in DecodeAndCompare() [all …]
|
/external/libsrtp2/crypto/hash/ |
D | null_auth.c | 58 int out_len) in srtp_null_auth_alloc() argument 66 out_len); in srtp_null_auth_alloc() 79 (*a)->out_len = out_len; in srtp_null_auth_alloc() 80 (*a)->prefix_len = out_len; in srtp_null_auth_alloc()
|
/external/boringssl/src/crypto/evp/ |
D | p_ed25519_asn1.c | 75 size_t *out_len) { in ed25519_get_priv_raw() argument 83 *out_len = 32; in ed25519_get_priv_raw() 87 if (*out_len < 32) { in ed25519_get_priv_raw() 94 *out_len = 32; in ed25519_get_priv_raw() 99 size_t *out_len) { in ed25519_get_pub_raw() argument 102 *out_len = 32; in ed25519_get_pub_raw() 106 if (*out_len < 32) { in ed25519_get_pub_raw() 112 *out_len = 32; in ed25519_get_pub_raw()
|