/third_party/openssl/crypto/rsa/ |
D | rsa_sign.c | 32 const unsigned char *m, unsigned int m_len) in encode_pkcs1() argument 58 sig.digest->length = m_len; in encode_pkcs1() 69 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, in RSA_sign() argument 77 return rsa->meth->rsa_sign(type, m, m_len, sigret, siglen, rsa); in RSA_sign() 87 if (m_len != SSL_SIG_LENGTH) { in RSA_sign() 94 if (!encode_pkcs1(&tmps, &encoded_len, type, m, m_len)) in RSA_sign() 124 int int_rsa_verify(int type, const unsigned char *m, unsigned int m_len, in int_rsa_verify() argument 163 if (m_len != SSL_SIG_LENGTH) { in int_rsa_verify() 183 if (m_len != 16) { in int_rsa_verify() 206 m_len = EVP_MD_size(md); in int_rsa_verify() [all …]
|
D | rsa_saos.c | 18 const unsigned char *m, unsigned int m_len, in RSA_sign_ASN1_OCTET_STRING() argument 27 sig.length = m_len; in RSA_sign_ASN1_OCTET_STRING() 56 unsigned int m_len, unsigned char *sigbuf, in RSA_verify_ASN1_OCTET_STRING() argument 85 if (((unsigned int)sig->length != m_len) || in RSA_verify_ASN1_OCTET_STRING() 86 (memcmp(m, sig->data, m_len) != 0)) { in RSA_verify_ASN1_OCTET_STRING()
|
D | rsa_local.h | 116 unsigned int m_len, unsigned char *rm,
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/ |
D | user_mbuf.c | 88 m->m_len = 0; in mbuf_constructor_dup() 412 mb->m_len = length; in m_uiotombuf() 430 len += m->m_len; in m_length() 589 m->m_len = 0; in mb_ctor_mbuf() 730 …_DEBUG_USR, "%p: m_len = %ld, m_type = %x, m_next = %p.\n", (void *)m, m->m_len, m->m_type, (void … 855 if (n->m_len >= len) in m_pullup() 859 len -= m->m_len; in m_pullup() 866 m->m_len = 0; in m_pullup() 870 space = (int)(&m->m_dat[MLEN] - (m->m_data + m->m_len)); in m_pullup() 872 count = min(min(max(len, max_protohdr), space), n->m_len); in m_pullup() [all …]
|
D | user_ip6_var.h | 111 if ((m)->m_len >= (off) + (len)) \ 116 KASSERT(t->m_len >= tmp + (len), \
|
D | user_mbuf.h | 220 #define m_len m_hdr.mh_len macro 358 - ((m)->m_data + (m)->m_len) : 0) : \ 359 &(m)->m_dat[MLEN] - ((m)->m_data + (m)->m_len)) 376 _mm->m_len += _mplen; \
|
D | user_socket.c | 3324 mm->m_len = min((int)M_SIZE(mm), remaining); 3325 m->m_pkthdr.len += mm->m_len; 3326 remaining -= mm->m_len;
|
/third_party/boost/boost/interprocess/detail/ |
D | segment_manager_helper.hpp | 232 : mp_str(str), m_len(len) in intrusive_compare_key() 236 std::size_t m_len; member 357 size_type m_len; member 362 : mp_str(nm), m_len(length) in index_key() 368 return (m_len < right.m_len) || in operator <() 369 (m_len == right.m_len && in operator <() 371 (to_raw_pointer(mp_str),to_raw_pointer(right.mp_str), m_len) < 0); in operator <() 377 return m_len == right.m_len && in operator ==() 379 (to_raw_pointer(mp_str), to_raw_pointer(right.mp_str), m_len) == 0; in operator ==() 386 { m_len = len; } in name_length() [all …]
|
/third_party/vk-gl-cts/external/vulkancts/modules/vulkan/amber/ |
D | vktAmberTestCaseUtil.cpp | 37 size_t m_len; member in vkt::cts_amber::AmberIndexFileParser 58 while (m_idx < m_len && isWhitespace(m_str[m_idx])) in skipWhitespace() 67 while (m_idx < m_len && m_str[m_idx] != '\n') in skipCommentLine() 82 if (m_idx >= m_len || m_str[m_idx] != c) in expect() 92 while (m_idx < m_len && i < m_fieldLen && m_str[m_idx] != '"') in captureString() 113 m_len = m_str.length(); in AmberIndexFileParser() 132 if (m_idx < m_len) in parse() 157 while (m_idx < m_len && m_str[m_idx] == ',') in parse()
|
/third_party/boost/boost/interprocess/indexes/ |
D | iset_index.hpp | 95 return (i.m_len < blen) || in operator ()() 96 (i.m_len == blen && in operator ()() 98 (i.mp_str, b.name(), i.m_len) < 0); in operator ()() 104 return (blen < i.m_len) || in operator ()() 105 (blen == i.m_len && in operator ()() 107 (b.name(), i.mp_str, i.m_len) < 0); in operator ()()
|
D | iunordered_set_index.hpp | 71 return (i.m_len == b.name_length()) && in operator ()() 73 (i.mp_str, b.name(), i.m_len) == 0); in operator ()() 78 return (i.m_len == b.name_length()) && in operator ()() 80 (i.mp_str, b.name(), i.m_len) == 0); in operator ()() 106 *end = beg + i.m_len; in operator ()()
|
D | unordered_map_index.hpp | 64 *end = beg + val.m_len; in operator ()()
|
/third_party/openssl/crypto/evp/ |
D | p_verify.c | 21 unsigned int m_len = 0; in EVP_VerifyFinal() local 26 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_VerifyFinal() 37 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_VerifyFinal() 51 i = EVP_PKEY_verify(pkctx, sigbuf, siglen, m, m_len); in EVP_VerifyFinal()
|
D | p_sign.c | 21 unsigned int m_len = 0; in EVP_SignFinal() local 28 if (!EVP_DigestFinal_ex(ctx, m, &m_len)) in EVP_SignFinal() 39 rv = EVP_DigestFinal_ex(tmp_ctx, m, &m_len); in EVP_SignFinal() 54 if (EVP_PKEY_sign(pkctx, sigret, &sltmp, m, m_len) <= 0) in EVP_SignFinal()
|
/third_party/boost/libs/log/src/ |
D | murmur3.hpp | 36 uint32_t m_len; member in boost::aux::murmur3_32 46 explicit BOOST_CONSTEXPR murmur3_32(uint32_t seed) BOOST_NOEXCEPT : m_state(seed), m_len(0u) in murmur3_32() 59 m_len += 4u; in mix() 65 uint32_t h = m_state ^ m_len; in finalize()
|
/third_party/openssl/crypto/pem/ |
D | pem_sign.c | 32 unsigned int m_len; in PEM_SignFinal() local 40 if (EVP_SignFinal(ctx, m, &m_len, pkey) <= 0) in PEM_SignFinal() 43 i = EVP_EncodeBlock(sigret, m, m_len); in PEM_SignFinal()
|
/third_party/openssl/doc/man3/ |
D | RSA_sign_ASN1_OCTET_STRING.pod | 12 unsigned int m_len, unsigned char *sigret, 16 unsigned int m_len, unsigned char *sigbuf, 22 B<m_len> using the private key B<rsa> represented in DER using PKCS #1 36 B<m> of size B<m_len>. B<dummy> is ignored. B<rsa> is the signer's
|
D | RSA_sign.pod | 11 int RSA_sign(int type, const unsigned char *m, unsigned int m_len, 14 int RSA_verify(int type, const unsigned char *m, unsigned int m_len, 19 RSA_sign() signs the message digest B<m> of size B<m_len> using the 35 matches a given message digest B<m> of size B<m_len>. B<type> denotes
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet/ |
D | sctp_crc32.c | 776 if (offset < (uint32_t)m->m_len) { in sctp_calculate_cksum() 779 offset -= m->m_len; in sctp_calculate_cksum() 785 (unsigned int)(m->m_len - offset)); in sctp_calculate_cksum() 791 (unsigned int)m->m_len); in sctp_calculate_cksum()
|
D | sctp_os_userspace.h | 790 #define SCTP_BUF_LEN(m) (m->m_len)
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/common/ |
D | sae_pk.c | 546 bool ap, const u8 *m, size_t m_len, in sae_pk_hash_sig_data() argument 556 sig_data = wpabuf_alloc(tmp->prime_len * 6 + m_len + pubkey_len + in sae_pk_hash_sig_data() 579 wpabuf_put_data(sig_data, m, m_len); in sae_pk_hash_sig_data() 704 const u8 *m, size_t m_len, in sae_pk_valid_fingerprint() argument 723 hash_data_len = tmp->ssid_len + m_len + k_ap_len; in sae_pk_valid_fingerprint() 730 os_memcpy(pos, m, m_len); in sae_pk_valid_fingerprint() 731 pos += m_len; in sae_pk_valid_fingerprint()
|
/third_party/openssl/engines/ |
D | e_capi.c | 126 unsigned int m_len, unsigned char *sigret, 818 int capi_rsa_sign(int dtype, const unsigned char *m, unsigned int m_len, in capi_rsa_sign() argument
|
/third_party/node/src/ |
D | node_crypto.cc | 4676 unsigned int m_len; in Node_SignFinal() local 4678 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in Node_SignFinal() 4696 m_len) > 0) { in Node_SignFinal() 4917 unsigned int m_len; in VerifyFinal() local 4921 if (!EVP_DigestFinal_ex(mdctx.get(), m, &m_len)) in VerifyFinal() 4931 const int r = EVP_PKEY_verify(pkctx.get(), s, sig.size(), m, m_len); in VerifyFinal()
|
/third_party/gstreamer/gstplugins_bad/ext/sctp/usrsctp/usrsctplib/netinet6/ |
D | sctp6_usrreq.c | 203 if (m->m_len < offset) {
|
/third_party/boost/libs/interprocess/doc/ |
D | interprocess.qbk | 6528 std::size_t m_len;
|