/third_party/openssl/crypto/ec/curve448/ |
D | eddsa.c | 134 const uint8_t *message, size_t message_len, in c448_ed448_sign() argument 168 || !EVP_DigestUpdate(hashctx, message, message_len)) { in c448_ed448_sign() 208 || !EVP_DigestUpdate(hashctx, message, message_len) in c448_ed448_sign() 249 const uint8_t *message, size_t message_len, in c448_ed448_verify() argument 303 || !EVP_DigestUpdate(hashctx, message, message_len) in c448_ed448_verify() 338 int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ED448_sign() argument 343 message_len, 0, context, context_len) in ED448_sign() 347 int ED448_verify(const uint8_t *message, size_t message_len, in ED448_verify() argument 351 return c448_ed448_verify(signature, public_key, message, message_len, 0, in ED448_verify()
|
D | curve448_local.h | 19 int ED448_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, 23 int ED448_verify(const uint8_t *message, size_t message_len,
|
D | ed448.h | 65 const uint8_t *message, size_t message_len, 115 const uint8_t *message, size_t message_len,
|
/third_party/gn/src/base/ |
D | logging.cc | 292 const size_t message_len = strlen(message); in RawLog() local 294 while (bytes_written < message_len) { in RawLog() 296 message_len - bytes_written)); in RawLog() 304 if (message_len > 0 && message[message_len - 1] != '\n') { in RawLog()
|
/third_party/openssl/crypto/bn/ |
D | bn_rand.c | 207 size_t message_len, BN_CTX *ctx) in BN_generate_dsa_nonce() argument 244 SHA512_Update(&sha, message, message_len); in BN_generate_dsa_nonce()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9/src/eap_server/ |
D | eap_server_teap.c | 1729 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1745 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1748 if (message_len < 4) { in eap_teap_process() 1767 message_len, outer_tlv_len); in eap_teap_process() 1774 if (message_len && in eap_teap_process() 1775 (message_len < outer_tlv_len || in eap_teap_process() 1776 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1798 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
/third_party/wpa_supplicant/wpa_supplicant-2.9_standard/src/eap_server/ |
D | eap_server_teap.c | 1888 u32 message_len = 0, outer_tlv_len; in eap_teap_process() local 1904 message_len = WPA_GET_BE32(pos); in eap_teap_process() 1907 if (message_len < 4) { in eap_teap_process() 1926 message_len, outer_tlv_len); in eap_teap_process() 1933 if (message_len && in eap_teap_process() 1934 (message_len < outer_tlv_len || in eap_teap_process() 1935 message_len < 4 + outer_tlv_len)) { in eap_teap_process() 1957 wpabuf_put_be32(resp, message_len - 4 - outer_tlv_len); in eap_teap_process()
|
/third_party/protobuf/python/google/protobuf/pyext/ |
D | descriptor_pool.cc | 575 Py_ssize_t message_len; in AddSerializedFile() local 585 if (PyBytes_AsStringAndSize(serialized_pb, &message_type, &message_len) < 0) { in AddSerializedFile() 590 if (!file_proto.ParseFromArray(message_type, message_len)) { in AddSerializedFile()
|
/third_party/node/src/ |
D | node_api.h | 117 size_t message_len);
|
D | node_api.cc | 743 size_t message_len) { in napi_fatal_error() argument 755 if (message_len != NAPI_AUTO_LENGTH) { in napi_fatal_error() 757 const_cast<char*>(message), message_len); in napi_fatal_error()
|
D | node_crypto.h | 574 bool CheckCCMMessageLength(int message_len);
|
D | node_crypto.cc | 3855 bool CipherBase::CheckCCMMessageLength(int message_len) { in CheckCCMMessageLength() argument 3859 if (message_len > max_message_size_) { in CheckCCMMessageLength()
|
/third_party/ejdb/src/bindings/ejdb2_node/ |
D | node_api.h | 117 size_t message_len);
|
/third_party/openssl/crypto/ec/ |
D | ec_local.h | 657 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, 659 int ED25519_verify(const uint8_t *message, size_t message_len,
|
D | curve25519.c | 5432 int ED25519_sign(uint8_t *out_sig, const uint8_t *message, size_t message_len, in ED25519_sign() argument 5451 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 5461 SHA512_Update(&hash_ctx, message, message_len); in ED25519_sign() 5476 int ED25519_verify(const uint8_t *message, size_t message_len, in ED25519_verify() argument 5532 SHA512_Update(&hash_ctx, message, message_len); in ED25519_verify()
|
/third_party/glib/gio/ |
D | gdbusprivate.c | 726 gssize message_len; in _g_dbus_worker_do_read_cb() local 729 message_len = g_dbus_message_bytes_needed ((guchar *) worker->read_buffer, in _g_dbus_worker_do_read_cb() 732 if (message_len == -1) in _g_dbus_worker_do_read_cb() 740 worker->read_buffer_bytes_wanted = message_len; in _g_dbus_worker_do_read_cb()
|
/third_party/ffmpeg/libavformat/ |
D | http.c | 469 int ret, body = 0, reply_code, message_len; in http_write_reply() local 508 message_len = snprintf(message, sizeof(message), in http_write_reply() 524 message_len = snprintf(message, sizeof(message), in http_write_reply() 536 if ((ret = ffurl_write(s->hd, message, message_len)) < 0) in http_write_reply()
|
/third_party/openssl/include/openssl/ |
D | bn.h | 508 size_t message_len, BN_CTX *ctx);
|
/third_party/mbedtls/tests/suites/ |
D | test_suite_ssl.function | 2634 size_t message_len = 10; 2640 TEST_ASSERT( mbedtls_test_message_queue_push_info( &queue, message_len ) 2641 == (int) message_len );
|
/third_party/googletest/docs/ |
D | gmock_cook_book.md | 500 const char* message, size_t message_len) = 0; 517 const char* message, size_t message_len) override { 520 Log(severity, full_filename, std::string(message, message_len));
|
/third_party/node/doc/api/ |
D | n-api.md | 1299 size_t message_len); 1306 * `[in] message_len`: The length of the message in bytes, or `NAPI_AUTO_LENGTH`
|